User:Michaela/thesis: Difference between revisions

From XPUB & Lens-Based wiki
 
(33 intermediate revisions by the same user not shown)
Line 4: Line 4:
[[Thesis Guidelines]]
[[Thesis Guidelines]]


Draft_ thesis plan:  
Draft_ thesis skeleton:  


=ABSTRACT=
=ABSTRACT=
==QUESTIONS I WANT TO ADDRESS IN MY ESSAY==
<center>
The traces of digital information are exponential ...<br>
They contain various sources...<br>
They travel, scattered, being trade - transacted or serve as a found footage for an artistic
interventions...<br>
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...<br>
they serve as a subject of recovery, revisit and exposure...''<br>
</center>


'''#problem_aspect #1'''<br>
==INTRO==
THEME: PRIVACY IN DIGITAL REALM <br>
 
The ethical issue I want to address is: who has the right to withdrawal someone's data and how this data could be used, reused or misused?<br>
temporary unavailable will be filled soon!
 
 
==CHAPTERS ==
 
Grad_Skeleton:<br>
'''PART #1'''<br>
              <'''ctrl + C / ctrl +V  chapter''' :.<br> 
              [[File:Esc key 2.jpg|frameless]]
'''question:''' digital object and its properties what has change from analog to digital? <br>
'''argument''': tangible and intangible properties of the digital object or the lost of the physicality makes it difficult to apply the same principles.<br>
use value and copy make hard to distinguish the copy from the original <br>
'''argument''': digital object allows multiple copies of one single file, reproducing an accurate / exact copy of the original. Comparing with the analog object where every copy modifies the original.<br>
Moreover each copying of the copy introduce / induce noise to the copy and the original itself. The digital object inherited share and distribution value.
<br>
 
            <'''Del chapter''' :.<br>
expanded storage / the impossibility to delete the digital file / missing erase button  <br>
the extend of the storage / memory capacity to save, preserve and archive. <br>
Where the story of recovery of data from hard drives comes along ...<br>
analog with the anecdote about Ghana disclosure of data. <br>
 
 
------------------------------
 
 
'''PART#2'''<br>


'''#problem_aspect #2'''<br>
THEME: AUTHORSHIP/CO-AUTHORSHIP/ MULTIPLEAUTHORS<BR>
The problematic aspect of the recovered data: who is the actual author of the final work?<br>


==INTRO==
      <'''Shift chapter''':.
            [[File:Shift_key.jpg|frameless]]
'''question''': How the copyright low is used to constrain and mimic the properties of analog?
For example a digital file (pdf) is threaten the same way as a book.<br>
revisit the copyright law and break the myth of the ownership of digital file.<br>
'''argument''': Copyright enclosure is build on top of laws, applied to physical property. <br>
It can not be applied to the digital objects because of the nature of the digital and the listed properties.<br>
Please see --><br>
#REDIRECT [[User:Michaela/Understanding copyright/ copyleft /copyfarleft]]
<br>
'''Case_study:''' >[http://www.seditionart.com/ Sedition] – an online art platform for selling art where an edition of a hundred unique digital copies are offered for sell. <br>
"Limited edition of art for your digital life"<br>
 
 
              <'''Ctrl chapter''' :.
              [[File:Ctrl key.png|frameless]]
 
'''argument''': The digital / digitization made us believe that the knowledge can be free / share and  common for all.  <br>
This chapter will investigate “ cloud services” and fairness of access. Who is the actual owner of the content available online? Did it become a common property of all, pointed by Richard Barbrook or it is hold by other entity?<br>
What if there is a time-based service that provides the users to obtain certain control over or expiration time on their content or applying a delete key?<br>
'''Case_study''': [http://vanish.cs.washington.edu/ Vanish] is a research project and a software bundle, initiated by Roxana Geambasu, Amit Levy and Yoshi Kohno
which aims to help users to preserve some control, by ensuring that the electronic data, posted on the web such as emails, massages, photos, as well as text becomes permanently unavailable after a specified period of time.
 
Please see the annotation on Vanish project --><br>
#REDIRECT [[User: Michaela/Notes and annotations]]
==Bibliography (so far)==
 
Kleiner. Dmytri, ''The Telekommunist Manifesto''
 
Hyves. Lewis, ''Common as air''
 
Banner. Stuart, ''American Property: A History of How, Why, and What We Own?''
 
Jefrey. Rosen, ''The end of forgetting''
 
Mayer-Schönberger. Viktor, ''Delete:The Virtue of Forgetting in the Digital Age''
 
Barbrook. Richard, <br>
[http://constantvzw.org/verlag/spip.php?page=article&id_article=20&mot_filtre=9&id_lang=0 The Regulation of Liberty: free speech, free trade and free gifts on the Net]
<br>
<br>
'''notes:'''<br>
Blackstone. William //<br>
Locke. John // Of property
 
 
=======================
possible entry_ art context&own practice???
 
I will map a research from art practices as appropriation, DADA, ready-made and SI applied to my own practice or the current grad project - retrieving hard drives and using the information out of them for an artistic purposes.<br><br>
 
=======================
 
'''links ( to be moved from this dir ) :<br>'''
 
[http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article]


How do we leave a trace of an online presence?
[http://boingboing.net/2009/06/25/illegal-e-waste-dump.html  Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets]
The amount of traces/ digital traces in form of caches, cookies, footprint of the browser is stored, tracked and dumped in the system. Various tools – PGP (encrypting your email), browser plug- ins, private networks (VPN) – are used to prevent our location to be tracked, our data to be exposed. All of which limits the traces we leave but it doesn't completely erase them. Driven by my personal motivation to explore the limitations of technology and different methods of resistance I became sceptic about the possibility of being able to not leave traces or in other words the (im)possibility to erase the digital footprint.
The common methods to erase files from systems do not delete them permanently. Those files remain hidden, abandoned in hard drives. The traces left remain present within time in the medium, allowing to be retrieved and becoming a subject of study.


==THECHNICAL ASPECT==
Legend of multiple passes of overwriting:<br>


<DATA RECOVERY / DATA ERASURE / CLUSTERS/PARTITIONS><BR>
http://grot.com/wordpress/?p=154
The discovered cluster must be treated as an ideal representation of data that could be used as a way of recovering the original data back from the “ideal” format. This is the idea of data recovery approach: not only to use the data for finding clusters but also to use the clusters for recovering data. In a general situation, the data recovered from the sumarized custers can not fit the original data exactly, which can be due to various factors such as present of noise in the data.
[[File:Linear-svm-scatterplot.svg|thumbnail]]
Data Entry: research on how to completely erase your data from the operating system. rmv command does not delete the file permanently" or non-restorative. I found indulging the fact that there is a command line "shred" ( available only on linux ), poorly used because of its damaging consequences. Shred erases all the information, by overwriting 20 times or so. There is no "shred" command in OS x instead there is a replacement or security remove command called srm. In comparison with Mac OS x, based on Unix system, a file could be overwritten only three times at the time. In relationship to that I find interesting approach of how to defeat the privace issue by information overflow or noising the channel, by overwriting something infinitive times instead of trying to denoise it.


'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.
http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html


Questions about e-waste and digital recycling, digital trash and data recycling. Except the physical implementation of data storage of digital trash camps outrageously sent to remote areas in Africa nevertheless there is the ethical issue or who has the right  to intervene with someone's data.
https://ssd.eff.org/tech/deletion


=PROJECT=
http://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th
==DESCRIPTION==
I have started a process of retrieving old hard drives disks (data storage) restoring the data out of them, in order to examine abandoned data and leftover traces. By doing this I am exploring the problematic aspect of data erasure.
The hard drive, in this case a rather obsolete object, serves as an ultimate storage of data, container of past and present, which could be also invaded and investigated further.
The traces of information are exponential they contain various sources...they travel, scattered being trade -transacted or serve as a found footage for artistic intervention. This project is trigger by the idea of how the data trace is permanent, could not be destroyed or erased completely. It has been encapsulated within the time, the code and the medium itself.


==METHODOLOGY==
[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video  
I am working on a series of projects related to the topic of these found traces, which will end up leading to the final graduation project. I would like to incorporate a poetic aspect of the retrieve data and the idea of the erasure as the main motive in the final work. <br>
theguardian_snowden-files-computer-destroyed]<br>
I built a simple methodology of data recovery. The data storage is the approached collection of ten hard drives followed by information about the hard drive: the source of origin()<br>
[[File:Diagram dataRec-01.png|diagram_dataRecovery | right | 400px]]
The documentation or the process of recovery consists of video capture of the used software and sound from a spinning hard drive disk (unable to boot). In order to organize this accidentally found archive I simply described the size/ model of each hard drive, the process of the remain time and amount of the restored data.
'''Data collection''' consists of rich content of personal data: img files, videos files, audio files, code or text logs and trash (or unrecoverable files or parasite files etc.)
Sample of found material:<br>
*'''The factory set''' is a 23 min long video documentation of factory for pineapples in Ghana.
The camera follows the production line of workers assembling pineapples, scene by scene revealing every detail of the process.
The moving images are rich by their source of origin, drawing highly graphical, dense scene of workers in factory motionless in their every day basics.<br>
The images serve as a data trails, conveying the trace of the failure of the recovery process, signed for being "broken" or interrupted. Sometimes the freeze of the frame creates conscious break from the meditation, but also suggest that the footage has been manipulated.
==PRACTICE – BASED==
Descriptions of previous projects

Latest revision as of 10:42, 12 March 2014

Useful links:
A Guide to Essay Writing

Thesis Guidelines

Draft_ thesis skeleton:

ABSTRACT

The traces of digital information are exponential ...
They contain various sources...
They travel, scattered, being trade - transacted or serve as a found footage for an artistic interventions...
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...
they serve as a subject of recovery, revisit and exposure...

INTRO

temporary unavailable will be filled soon!


CHAPTERS

Grad_Skeleton:
PART #1

             <ctrl + C / ctrl +V  chapter :.
Esc key 2.jpg

question: digital object and its properties what has change from analog to digital?
argument: tangible and intangible properties of the digital object or the lost of the physicality makes it difficult to apply the same principles.
use value and copy make hard to distinguish the copy from the original
argument: digital object allows multiple copies of one single file, reproducing an accurate / exact copy of the original. Comparing with the analog object where every copy modifies the original.
Moreover each copying of the copy introduce / induce noise to the copy and the original itself. The digital object inherited share and distribution value.

            <Del chapter :.

expanded storage / the impossibility to delete the digital file / missing erase button
the extend of the storage / memory capacity to save, preserve and archive.
Where the story of recovery of data from hard drives comes along ...
analog with the anecdote about Ghana disclosure of data.




PART#2


<Shift chapter:.

            Shift key.jpg

question: How the copyright low is used to constrain and mimic the properties of analog? For example a digital file (pdf) is threaten the same way as a book.
revisit the copyright law and break the myth of the ownership of digital file.
argument: Copyright enclosure is build on top of laws, applied to physical property.
It can not be applied to the digital objects because of the nature of the digital and the listed properties.
Please see -->

  1. REDIRECT User:Michaela/Understanding copyright/ copyleft /copyfarleft


Case_study: >Sedition – an online art platform for selling art where an edition of a hundred unique digital copies are offered for sell.
"Limited edition of art for your digital life"


              <Ctrl chapter :.
              Ctrl key.png

argument: The digital / digitization made us believe that the knowledge can be free / share and common for all.
This chapter will investigate “ cloud services” and fairness of access. Who is the actual owner of the content available online? Did it become a common property of all, pointed by Richard Barbrook or it is hold by other entity?
What if there is a time-based service that provides the users to obtain certain control over or expiration time on their content or applying a delete key?
Case_study: Vanish is a research project and a software bundle, initiated by Roxana Geambasu, Amit Levy and Yoshi Kohno which aims to help users to preserve some control, by ensuring that the electronic data, posted on the web such as emails, massages, photos, as well as text becomes permanently unavailable after a specified period of time.

Please see the annotation on Vanish project -->

  1. REDIRECT User: Michaela/Notes and annotations

Bibliography (so far)

Kleiner. Dmytri, The Telekommunist Manifesto

Hyves. Lewis, Common as air

Banner. Stuart, American Property: A History of How, Why, and What We Own?

Jefrey. Rosen, The end of forgetting

Mayer-Schönberger. Viktor, Delete:The Virtue of Forgetting in the Digital Age

Barbrook. Richard,
The Regulation of Liberty: free speech, free trade and free gifts on the Net

notes:
Blackstone. William //
Locke. John // Of property


===========

possible entry_ art context&own practice???

I will map a research from art practices as appropriation, DADA, ready-made and SI applied to my own practice or the current grad project - retrieving hard drives and using the information out of them for an artistic purposes.

===========

links ( to be moved from this dir ) :

Ghana digital dumping ground article

Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets

Legend of multiple passes of overwriting:

http://grot.com/wordpress/?p=154

http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html

https://ssd.eff.org/tech/deletion

http://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th

[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video theguardian_snowden-files-computer-destroyed]