When considering data as the oil of the 21st century, each of us is sitting on a small ground treasure—a resource that is being discretely mined by the most valuable companies in the world. As users of modern services and products, we have long become habituated to trade-offs in which "free" services are offered in exchange for some bits of our personal data. The IoT has introduced a new kind of object into our homes whose functioning greatly depends on collecting such information: Products that are able to observe the users, have the ability to learn from their observations and then make their own decisions without further human interference. With the comfort of automation also comes a subtle danger in our connected devices which process personal information about their users every day. If attempts to restrict the flow of our personal data would consequentially restrict our access to said services and products as well... do we have no other option but to obey and share?
The "Accessories for the Paranoid" explore an alternative approach to data security. As our physical environment reads, collects and stores an increasing amount of user information, this series of parasitic objects are designed to produce fake data. Through blurring our digital profiles, our true data identities get to hide behind a veil of fictive information.
a project by Katja Trinkwalder and Pia-Marie Stute; supervised by Prof. Andreas Muxel at KISD, Cologne.
OBJECT A: UN-HACKING WEBCAMS Anyone with a little sticker on the top center of his laptop is aware that hacking a webcam is not hard, neither for NSA nor the nerd next door. Object C takes the principle of a toy camera and applies it to data security by displaying different scenes through the glance of the webcam.
OBJECT B: KIDDING ALEXA The Echo, Amazon's voice assistant for the connected home, reacts to the call of „Alexa". Thus having to listen at all times, she observes, processes and collects data in her user's home whenever switched on. Object B will prevent your sensitive information to hit the wrong set of ears. The sound device feeds Alexa with fake information or allows to numb her when the situation calls for it.
It offers the choice between three modes to play over the earphone: 1. white noise that lets no information slip through; 2. pre-recorded quests to occupy her with useless tasks; and 3. dialogues from random movie scenes that have her collect fake information about her user and their common surrounding.
OBJECT C: CREATING RANDOM TRACES Connected to any computer, Object B will generate fake online data. On the push of the button, an algorithm will randomly create site-specific content on the websites of services such as google, facebook, youtube, twitter or Amazon. Concentrating on the individualities that are specific to the service, the libraries in the code will be unpredictably influenced by changing content.
At the push of its button, Object C will open the browser and access a popular service to leave fault digital traces: The wish-list on Amazon will be filled with unexpected interests. A post on twitter will be completed through random emojis replacing keywords. The Facebook account will spread indefinite likes. On google search, partially typed requests will be continued through the google auto-completion.
OBJECT D: BLURRING USE PATTERNS As a parasite to any device that is able to collect data, object D pushes their buttons randomly. Activated during the night time or when the user is not actually at home, the object creates blurred user patterns and confuses the host device about its user's daily routines.
Watch the video to see them in action: https://vimeo.com/340898967
Created with Arduino Leonardo, Teensy and Bare Conductive Touchboard.
Create a Core77 Account
Already have an account? Sign In
By creating a Core77 account you confirm that you accept the Terms of Use
Please enter your email and we will send an email to reset your password.
Comments
A great idea !
First off: Great lede.
Second: The detailed paragraphs are weirdly sloppy:
-Under Object A it says, "Object C takes the principle . . . "
-Under Object C it says, "Object B will generate fake online data."
-Under Object D, "object" isn't capitalized.
Otherwise, these are great design concepts and starting-points for saleable products. Also, solid web content.
Thanks very much for this!
I don't know if all of these would really work, but the idea of making a voice assistant run around doing useless tasks and clogging up their servers with more drivel is really entertaining. Reminds me of the CV Dazzle and 'how to hide from machines' projects. Clear problem statement and imaginative solutions.