From
|
jaromil <jaromil@kyuzz.org>
|
Date
|
Tue, 28 May 2002 13:50:05 +0200
|
Subject
|
[HaCkmEeTiNg] <MATERIALI>
|
scusate se la rimando in lista, giusto per riproporla all'interno del
booklet. in piu' allego la versione inglisc
========================================================================
------------------------------
jaromil@dyne.org
------------------------------
30 Mar 2002
{PRELUDIO}
Quando parliamo di software come di arte e' bene considerare l'intero
processo creativo che porta alla sua concezione e realizzazione,
concezione e realizzazione di una nuova operabilita' nel dominio
digitale: stiamo volgendo il nostro sguardo al codice sorgente[*1],
all'affascinante mondo dell'algebra e dell'algoritmo che nell'immanenza
digitale prende forma in espressioni molteplici: dense, riformulabili e
prodruttrici di senso.
Il codice sorgente o meglio gli algoritmi e l'algebra, strumenti
digi-artigianali privilegiati dalla nostra contemporaneita' e memori di
millenarie teorie matematiche[*2], solo da poco piu' di un quarto di
secolo arrivano a costituire il software: strumento di creazione
artistica e di comunicazione, una meta-letteratura che definisce
modalita' di veicolare e (ri)produrre senso moltiplicando le
possibilita' di comunicazione. Come il software e' uno strumento di
meta-comunicazione, cosi' esso stesso a sua volta rappresenta una
"Parole" (citando Saussure) che deriva la sua esecuzione da una
"Langue": l'universo grammaticale e linguistico del codice.
L'esercizio metafisico e' ricorsivo; anche se per molti e' un oscuro
criptogramma il codice sorgente condiziona indirettamente il nostro
modo di comunicare, ed ancor piu' l'efficienza con cui lo facciamo.
E' a fronte di tali premesse che proviamo a considerare il fenomeno dei
virus software: al contempo ribelle atto poetico, sintomo politico e
strutturale, tentativo di escursione della rete nella sua
permeabilita'; intelligenze artificiali (di rado dannose, a dover di
cronaca) che da sempre popolano l'universo digitale.
[*1] Per codice sorgente si intende una formulazione di istruzioni
espresse in un linguaggio comprensibile ad un calcolatore e
concatenate secondo schemi logici e condizionali, che una volta
interpretata ed eseguita da luogo ad un risultato. Tale risultato
varia al variare delle condizioni esterne prese in considerazione
dal codice sorgente, tramite le quali interagiamo con la sua
esecuzione.
Ogni linguaggio e' definito da una grammatica; tale grammatica
viene interpretata da un compilatore che ne "metabolizza" il
contenuto semantico (le istruzioni) producendo un "bytecode" che
il calcolatore puo' eseguire.
[*2] Muhammad Bin Musa al-Khwarizmi e' un matematico vissuto a Bagdad
tra l'813 e l'833 D.C, conosciuto per aver introdotto il concetto
matematico dell'Algoritmo, che da lui prende nome.
{DIGITAL BOHEME}
Nel considerare il codice sorgente letteratura dipingo i virus come
delle "poesie maledette", giambi rivolti contro chi vende la rete come
un posto sicuro e borghese. Il dominio digitale e' regolato da
rapporti di forza e leggi "fisiche" differenti dal dominio naturale:
realizza un chaos - scomodo perche' insolito, fertile - nel quale
navigare; in esso i virus sono delle composizioni spontanee, liriche
nel causare l'imperfezione di macchine "fatte per funzionare" e nel
rappresentare la ribellione dei nostri servi digitali.
Potrebbe sembrare che il lirismo di cui si parla sia apprezzabile solo
grazie a cognizioni tecniche specifiche, ma non e' cosi'; uno dei
tentativi dell'esposizione I LOVE YOU[*] sui virus softwares che si
terra' nel Museo delle Arti Applicate di Francoforte e' proprio questo:
esplorare aspetti troppo spesso trascurati di una "boheme digitale" che
e' riuscita a dare un corpo piu' organico alla rete nella quale ci
muoviamo oggi, elaborando in essa nuove modalita' di circolazione delle
informazioni ed una vera e propria estetica della quale la cosiddetta
net-art ha spesso saputo permearsi.
Il chaos:
"The last possible deed is that which defines perception itself, an
invisible golden cord that connects us: illegal dancing in the
courthouse corridors. If I were to kiss you here they'd call it an
act of terrorism--so let's take our pistols to bed & wake up the
city at midnight like drunken bandits celebrating with a fusillade,
the message of the taste of chaos."
Hakim Bey
Ora digita :(){ :|:& };: in un qualsiasi terminale UNIX.
[*] http://www.digitalcraft.org
{ANTICORPI DELLA RETE}
Cosi' come un organismo difende se' stesso dalle malattie che lo
infettano, cosi' la rete ha reagito producendo anticorpi che assalgono
i bachi di alcuni software difettosi. Una particolare specie di virus
che si e' maggiormente propagata di recente, i worms, lo ha fatto
soprattutto tramite programmi di posta e server di dati. Le case
produttricm dei software vulnerabili sono ancora impegnate nel
tentativo di migliorare la sicurezza dei propri prodotti, che nel
nostro caso significa la privacy delle nostre comunicazioni.
Sul piano politico vediamo che la reazione di molti scrittori di virus,
entita' che si identificano in rete per una profonda conoscenza dei
suoi elementi costitutivi, e' provocata proprio dall'approccio
corporativo e monopolista di alcuni giganti del mercato che sognano di
rendere la rete una piazza virtuale per i propri affari, senza
rispettare l'orizzontalita' che la caratterizza e le abitudini dei
cittadini che l'abitano.
Ad oggi contiamo innumerevoli tentativi di ostacolare la velocita' con
la quale le informazioni possono circolare, dalla censura alle
restrizioni sul copyright: [*]
"Since the earliest days of the personal computer, Cyberspace was
seen as a vehicle to restore disappearing public spaces. Lee
Felsenstein, one of the founders of the personal computer, advocated
using this new tool to restore an information commons (Felsenstein).
Felsenstein and many of his fellow personal computing pioneers
envisioned that the Internet could provide a vast public space that
would reflect diverse interests and encourage free speech and
creativity.
For many years popular discourse framed the Internet as a diverse
free speech zone where "anyone can be a creator". But in the early
days of the WorldWide Web, public areas of the Internet became
increasingly walled-off. In 1994 this author warned of the
"colonizing effect" that commercial interests would have on the
public space that the Internet then represented (Besser 1994). And
in 1995 he discussed how control by large industries would supercede
the public benefit and diversity aspects that the Internet had
promised. Almost a decade later, we see Internet spaces increasingly
fenced off, and peoples' actions increasingly tracked and recorded."
Howard Besser
i virus sono il sintomo politico di una comunita' ad oggi molto vasta e
bandirli non e' la soluzione ai problemi da cui scaturiscono.
Lo stesso discorso valga per anonimato e hacking.
[*] Intellectual Property: the Attack on Public Space in Cyberspace
http://www.gseis.ucla.edu/~howard/Papers/pw-public-spaces.html by
Howard Besser, associate professor at the UCLA School of Education
& Information, describes how various industries are using their
leverage with copyright to make fewer locations on the Internet
less public.
{RHIZOGRAPHY}
Ad uno scrittore di virus interessa esplorare la permeabilita' della
rete. Un rizoma di tali e tante dimensioni come internet non puo'
essere rappresentato in nessuna topografia, ad oggi i tentativi sono
stati molteplici, ma mai completi. La sua estensione puo' essere
tracciata seguendo un cammino: sondare i meandri, seguirne i
percorsi e le connessioni. Iniettare un liquido di contrasto
nell'organismo per seguirne la conformazione e la struttura; al
risalto otteniamo il percorso tipico dei vasi nell'angiogramma.
Ora facciamo uno sforzo e consideriamo le origini dell'Istinto di
Esplorazione cosi' come possiamo rappresentarcelo nella nostra storia,
quella del mondo organico conosciuto.
========================================================================
ENGLISH
========================================================================
:(){ :|:& };:
{PRELUDE}
Any discussion of software as art requires consideration of the whole
creative process involved into its concept and realization, which leads
to a new operability in the digital domain: our attention here is
focused on source codes [*1], the fascinating world of algebra and
algorithm that can be seen in many expressions of form within the
digital immanence and all of them can be reformulated and produce
meaning.
Source codes, or rather algorithms and algebra, are the tools of the
digital craftsman in the modern age with over a thousand years of
mathematical theories behind them [*2], only for little more than a
quarter of a century have they acted as software.
Software is a means of creating art and communicating. It is a
metaliterature which defines how meaning can be carried and (re)produced
by multiplying the possibilities of communication. Just as software is a
means of metacommunication, so it represents a "parole", (to quote
Saussure), deriving its execution from a "langue", i.e. the grammatical
and linguistic universe of the code.
The metaphysical exercise becomes recursive here: although many see the
source code as merely an obscure cryptogram, it has an indirect effect
on the way we communicate and even more on the efficiency with which we
do so.
With all this in mind, let us now turn our attention to the phenomenon
of software viruses. These are a combination of poetical acts of
rebellion, political and structural symptoms, attempts to get into the
cracks of the net exploring its permeability; artificial intelligences,
(rarely harmful, just for the record), which have always populated the
digital universe.
[*1] Source code means a formulation of instructions expressed in a
language understandable to a computer and linked in accordance
with logical and conditional patterns which, once interpreted and
executed, gives rise to a result. This result varies as the
external conditions considered by the source code vary and through
which we interact with its execution. Every language is defined
by a grammar which, in turn, is interpreted by a compiler who
digests its semantic content (instructions) and so produces
a "bytecode" which the computer can execute.
[*2] The term algorithm derives from the name of Muhammad Bin Musa
al-Khwarizmi, a mathematician living in Baghdad between 813 and
833 A.D.
{DIGITAL BOHEME}
In considering a source code as literature, I am depicting viruses as
'poesie maudite', 'giambi' against those selling the net as a safe area
for a bourgeois society. The relations, forces and laws governing the
digital domain differ from those in the natural. The digital domain
produces a form of chaos - sometimes uncomfortable because unusual,
alltough fertile - to surf thru: in that chaos viruses are spontaneous
compositions, lyrical in causing imperfections in machines made to serve
and in representing the rebellion of our digital serfs.
It might seem that this notion comparing viruses to lyrical poetry can
only be appreciated by those with specific technical knowledge but this
cannot be true. This is, in fact, precisely one of the attempts made by
the I LOVE YOU exhibition of digitalcraft.org, exploring the too often
neglected sides of the digital boheme. This succeeds in making the net
we surf today more organic by devising new ways for information to
circulate on it and an aesthetic, in the true sense of the term, which
has often permeated so-called net-art.
The chaos:
"The last possible deed is that which defines perception itself, an
invisible golden cord that connects us: illegal dancing in the
courthouse corridors. If I were to kiss you here they'd call it an
act of terrorism--so let's take our pistols to bed & wake up the city
at midnight like drunken bandits celebrating with a fusillade, the
message of the taste of chaos."
Hakim Bey
Now type in :(){ :|:& };: on any UNIX terminal
{INTERNET ANTIBODIES}
Just as an organism defends itself against the diseases which infect
it, so the net has reacted by producing antibodies attacking the bugs
from several types of defective software. One particular type of virus
spreading recently is worms, which has done so particularly through
e-mail programmes and data servers. Vulnerable software manufacturers
are still busy trying to improve the safety of their products which, in
our case, means the privacy of our communications.
Politically speaking, we see that the reaction from many virus writers,
who can be identified on the net as having a profound knowledge of the
elements that make up the net itself, has been brought about precisely
because of the corporate, monopolistic approach of certain giants on
the market who are dreaming of turning the net into a virtual shopping
area for their own forms of business, with no respect for the horizontal
nature in the relationships of the citizens who live on it. So far, we
have had endless attempts to hamper the speed at which information can
circulate, ranging from censorship to copyright restrictions, with the
precise goal of centralizing the flow: [*]
"Since the earliest days of the personal computer, Cyberspace was seen
as a vehicle to restore disappearing public spaces. Lee Felsenstein,
one of the founders of the personal computer, advocated using this
new tool to restore an information commons (Felsenstein). Felsenstein
and many of his fellow personal computing pioneers envisioned that
the Internet could provide a vast public space that would reflect
diverse interests and encourage free speech and creativity.
For many years popular discourse framed the Internet as a diverse
free speech zone where "anyone can be a creator". But in the early
days of the WorldWide Web, public areas of the Internet became
increasingly walled-off. In 1994 this author warned of the
"colonizing effect" that commercial interests would have on the
public space that the Internet then represented (Besser 1994). And in
1995 he discussed how control by large industries would supercede the
public benefit and diversity aspects that the Internet had promised.
Almost a decade later, we see Internet spaces increasingly fenced
off, and peoples' actions increasingly tracked and recorded."
Howard Besser
Viruses are a political symptom of a community which continues to be
extremely vast and banning them is not the solution to the problems
deriving therefrom. The same holds true for anonymity and hacking.
[*] Intellectual Property: the Attack on Public Space in Cyberspace
http://www.gseis.ucla.edu/~howard/Papers/pw-public-spaces.html by
Howard Besser, associate professor at the UCLA School of Education
& Information, describes how various industries are using their
leverage with copyright to make fewer locations on the Internet
less public.
{RHIZOGRAPHY}
A virus writer is interested in exploring the permability of the net. A
rhizome of such and so many dimensions as the internet cannot be
represented by any map many have tried but no one has so far completed
this task. Its extension may be traced by following a path, sounding
where it wanders off and tracing its directions and connections.
Injecting a contrast medium into the organism to follow shape and
structure will produce an angiogram showing the typical arrangement of
veins.
Let's now make an effort and consider the origins of the Instinct of
Exploration as we can represent it in our own history, the history of
the organic world as we know it.
+------------------------------------------------------------------------
Copyleft 2002 jaromil <http://korova.dyne.org>
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1 or
any later version published by the Free Software Foundation;
with all Sections being Invariant.
Permission is granted to make and distribute verbatim copies of this
document page provided this permission notice are preserved on all
copies.
+------------------------------------------------------------------------
--
jaromil ][ http://dyne.org ][ GnuPG _key__id_
EDEE F1B9 DC92 76C0 6D46 D77A 58B0 82D6 (5B6E 6D97)
---
To unsubscribe from this list: send the line "unsubscribe hackmeeting" in
the body of a message to majordomo@kyuzz.org
---
To unsubscribe from this list: send the line "unsubscribe hackmeeting" in
the body of a message to majordomo@kyuzz.org