(Screenshot by Interaksyon via Twitter/_FullyBooked) Screenshot of Twitter exchange between the hacker and Fully Booked followers on Sept. Screenshot of Twitter exchange between the hacker and Fully Booked followers on Sept.
The hacker urged the bookstore to change its password in another post. Hope you understand,” it said with a heart emoticon. “Let’s just wait till (the) owner will see that and get his account back. Installations of Face to Facebook, Amazon Noir, Google Will Eat Itself.It also changed the location of the bookstore from “Manila, Philippines” to wrongly spelled Nigeria, “Niggeria.” Hacking Monopolism Trilogy at Museum China Academy of Art, Hangzhou - China Territory & Resources, Catalog, CinemaCity Festival, Serbia, 2008, ISBN 9788686877109 La Republica XL, Magazine, Review, Italy, Apr. Sculpting the Flow of Reality, Catalog, Aksioma, Slovenia, 2011, Issue N.9 The Routledge Companion, Book, Review, Routledge, UK, 2014, ISBN 1134748744 Thinking Through Digital Media, Book, Palgrave, U.S., 2015, ISBN 9781137433626Ĭien Ojos, Pensar & Poetizar, Journal, Review, Instituto de Arte de Valparaíso, Cile, 2015, ISBN 125779 Hacking art, The Art Newspaper, Magazine, Interview, China, 2016ĭigital Art, Book, Thames and Hudson, UK, 2015, ISBN 9780500204238 Social Algorithm Art, Catalog, Peter Niemann, Text to the World, Germany, 2016, Issue N.16 Flowcharts are displayed as central components, outlining the main processes and algorithms used to execute the concepts of the artworks.įLOWCHARTS, Systems of Systems, Artist Monograph, Lulu, U.S., 2019, ISBN 9780359616718 The installation includes documentation of the reactions and interactions with various elements of the performances, along with legal documents received from the targeted companies. The sophisticated hacks in the technological systems of the Internet giants became a particular mode of creative practice. The concepts in the trilogy both challenged and embodied the economic implications of the Internet, such as invasive advertising, users data mining, and commercialization of intellectual goods. The materials, techniques, and subjects used in these works were groundbreaking for Internet art. Each of these projects was developed during a time of expansion for the Internet giants and before several scandals broke in the following decade. These performances were staged with interactions between the companies targeted, media outlets, and the general public. User data from Facebook, books from Amazon, and Google’s clicks were recontextualized through the concepts of the artworks. These interventions aimed to unsettle their marketing and economic models, which were revealed in the appropriated material. The Hacking Monopolism Trilogy includes the three artworks, Face to Facebook, Amazon Noir, and Google Will Eat Itself.
This trilogy utilized a common methodology through custom hacks programmed by Cirio, finding and exploiting security vulnerabilities within the Internet giants' business models. This trilogy of algorithms exploited the technical and economic vulnerabilities of three major Internet companies, Facebook, Amazon, and Google, reconfiguring the way they concentrate, misappropriate, and monetize large quantity of information and user interactions.