Trust is the staple of our diet; responsibility is something we as users can choose to assume or not; promises are meant to be kept, and anger and powerlessness are what we feel as a result of the constant abuse of our trust.

Anger & Powerlessness | Trust | Promises | Responsibility

Anger & Powerlessness

I got back to class and sat down again, Ms Galvez warmly welcoming me back. I unpacked the school’s standard-issue machine and got back into classroom mode. The SchoolBooks were the snitchiest technology of them all, logging every keystroke, watching all the network traffic for suspicious keywords, counting every click, keeping track of every fleeting thought you put out over the net. We’d gotten them in my junior year, and it only took a couple months for the shininess to wear off. Once people figured out that these “free” laptops worked for the man – and showed a never-ending parade of obnoxious ads to boot – they suddenly started to feel very heavy and burdensome. ( Cory Doctorow)


From the second half of the 70s, the world witnessed the birth and affirmation of the so-called Big Tech, the five largest companies that operate in the field of information technology. Also known as “GAFAM” (acronym of Google, Apple, Facebook, Amazon and Microsoft), in the last fifty years they were able to build empires of intellectual properties of technologies and systems through acquisitions of other companies small and large, centring technological innovations within their walls. “GAFAM Empire”, a project developed by DensityDesign Lab and Tactical Tech, collects the information of more than a thousand acquisitions, to have a look back on the history of the industry through limited data publicly available on the web. Thanks to them, a landscape of acquisitions is built to identify common interests that are then broken down into a deep analysis of GAFAM’s history. The project visualises the data with different shapes and through different focuses, allowing the reader to understand a complex system of relationships that is constantly evolving and that is redefining the concepts of competitions and monopoly.

Google Society
by La Loma and Tactical Tech

You are most likely a Google user. Even if you don’t use gmail, it’s likely that you use at least one of the more than 295 products that Google owns. That might not sound like a big deal, until you consider that there are billions of people around the world like you, who depend on Google’s services and whose data Google can access and analyse. The more data Google collects through its suite of products, the more powerful the nsights it can glean about entire populations. It can be hard to quantify exactly how much of the world’s population depends on Google, but by looking at how many users each of their products has, we can begin to extrapolate. This piece visualises the depth and reach of Google and its suite of 295 products and services. It asks you to think about how far Google extends into your daily life, and, in turn, to the billions of other people’s lives who rely on the same products you do, and how, ultimately, this contributes to the growth and revenue of the company.

by La Loma and Tactical Tech

Although Jeff Bezos has promised to make Amazon “Earth’s Best Employer,” the past few years have seen an increasing number of scandals around Amazon’s work practices – from patents for worker ‘cages’ to stories of labour organizers being surveilled.

In a quest to fulfil demand and achieve worker optimization, Amazon has patented a number of innovative – and controversial – ideas for the workplace. This piece shows Amazon’s patents for wearable technologies designed for workers. These devices are designed to maximize efficiency and speed, while minimizing costs and reducing friction between humans and robots.

The patents give us insight into the company’s vision of ‘optimization’: the introduction of more and more systems to monitor and automate human behaviour. These technologies and practices are increasingly becoming the norm not just at Amazon, but at other companies that want to compete with Amazon’s speed, efficiency and profit. When we want our products quickly and cheaply, what are the consequences for workers?

by Marlene Lerperger

On March 9 2018, Science Magazine published an article about the circulation of true and false news on Twitter. “When we estimated a model of the likelihood of retweeting, we found that falsehoods were 70% more likely to be retweeted than the truth.”

The design object illustrates how much faster and more frequent falsehoods are being spread as opposed to the truth. The luminous circles represent tweets shared by users who are depicted as rays. On the left-hand side there are only 5 rays per circle. This means that 5 people shared the tweet. On the right-hand side there are alternately 8 and 9 rays per circle. In this case, the tweet is shared 8 or 9 times meaning that compared to the truth, the rate at which falsehood is retweeted is 70% higher. The illustration reveals the problematic nature of news distribution on the Internet. The bright luminescence of the graphics representing fake news ought to be a wake-up call for us all. The amount of lies and fake news circulating on the Internet is huge. We should not only consume and spread news but also question them and keep an open and critical mind when surfing the Internet.


If we were to accept that we bear responsibility we would see a lot of processes in a different light. Our leisure activities, our communication, our political attitude, our buying behaviour, our search queries, our finances, our fashion style … all of it is connected and interlinked – also for corporations such as Google analysing all of it and drawing conclusions as to which advertiser ought to show us what. By identifying these links, we will be able to make free and autonomous decisions. (Klaudia Zotzmann-Koch)

100+ Protests
by La Loma und Tactical Tech

As tech companies have grown and expanded their global reach, there has been increasingly visible backlash and resistance against their practices from both inside and outside the industry.

This timeline highlights more than 100 protests over the last ten years selected from publicly available information. It offers a view into the consequences of tech companies’ decisions, policies, and practices and their impact on their workforce, users, contractors, vendors, clients, and customers. The timeline also reveals the recent trend toward collective worker resistance within Big Tech. Some of these protests have yielded attention and results, while others have flown under the radar or been overlooked by the media. With governments slow to regulate, and companies reluctant or failing at selfregulation, could these protests point toward a form of accountability?

Data Detox Bar
by Tactical Tech

At this Bar visitors can pick up a copy of the Data Detox Kit. The Data Detox Kit includes everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.

Within the kit, you will find four guides to get you started:

  • SMARTPHONE ANTIOXIDANTS - Control Your Smartphone Data to Increase Your Online Privacy
  • A ZEST FOR LIFE BALANCE – Escape the Defaults to Enhance Your Digital Wellbeing
  • KNOWLEDGE CONCOCTIONS - 6 Tips to Steer Clear of Misinformation Online
  • SETTINGS WITH A TWIST - Shift Your Settings to Secure Your Data

The Ridiculous Scale of Responsibility
by Daniel Kranewitter

How much responsibility can I hand over? The Ridiculous Scale of Responsibility conveys the daily balancing act between private and public sphere on a human level of understanding. Certain objects allow us to trade data for convenience – but who is actually aware of that? Visitors are invited to try for themselves to keep the balance and see to what extent they are willing to give up their privacy in exchange for convenience.

App Kit
by Karin Kaiser

The rapid development and widespread use of apps is changing our communication behaviour in fundamental ways: away from the real and towards the virtual. The exhibit is a critical response to this development wanting to lead from the virtual back to the real world in a playful manner by means of wooden app blocks – apps that can be touched, combined and played with.

A wooden tower of 30 square wooden blocks invites you to play with them. Each cube is furnished on 4 sides with a graphic each corresponding to the most popular social media apps and the alternatives available. At the bottom right corner of the cube there is a marker on the subject of “data hungry app.” The hand-made wooden structure in the shape of a tower represents a haptic antithesis to the prevailing visual touchpoints used in web-based interactions. The tower is the basis for positioning individual cubes on top of and next to each other – making users aware of and exposing their own behaviour when playing together. Which apps can I do without? Which apps promote or prevent social proximity? Which of the apps are related thematically? The app kit can be a catalyst for domino and puzzle games, for big and small, together with others or on one’s own – but always in the real world.

Unwanted Proximity
by Laura Baumgartner

With the pandemic online teaching and working from home have become the norm for many of us. Thanks to video calls we were able to continue our studies or work from home in spite of circumstances. This transformation entailed several advantages but also a number of disadvantages. In some cases, taking work back to one’s own home led to transgressions between private life and professional appearance. Participants for instance were given unwanted insights into the private sphere of their colleagues, teachers or students.

The object is an appeal to the personal responsibility of users of communication platforms to keep up a professional distance between themselves and others. It shows on the one hand examples of how “unwanted proximity” presents itself and on the other how in a private setting a professional distance is maintained.

by Martin Nadal

FANGo is a defence weapon against surveillance capitalism created by the artist Martin Nadal. Disguised as a mobile phone charger, FANGo operates as a microcontroller taking control of the smartphone it is connected to. By making queries to search engines, uploading videos and randomly liking photos on popular social platforms, it deceives data brokers and disrupts the data mining process.

The name FANGo refers to the acronym FANG which stands for Facebook, Amazon, Netflix and Google; these companies are the most important and most high-performing companies on the NASDAQ exchange and the pioneers of what today is known as – following Shoshana Zuboff – surveillance capitalism. In the same way industrial capitalism turned nature and work into commodities, surveillance capitalism turns experiences taking place in a person’s private sphere into commodities that can be bought and sold. The key difference in this new type of capitalism is that it successfully integrates human behaviour in the production process without the individual being aware of it. Thanks to largely invisible algorithmic processes next moves and decisions can be anticipated and thus produce economic profit for the companies.

FANGo wants to disrupt the processes and mechanics of surveillance capitalism by adding white noise to the captured data. Any prediction based on the extraction of false data is thus rendered useless and becomes worthless.


We are confident that providers will pay careful attention to programmes, messengers, platforms and services and that they will for instance prevent any unauthorised access to read along. We post pictures trusting they will remain on the platform and that our followers will not pass them off as their own, save them, modify them, turn them into deepfakes or make use of them in other ways. Trust is not only a central component of human co-existence, but also the basic currency on the Internet – a monetary commodity. (Klaudia Zotzmann-Koch)

Virtual Peephole
von Caroline Buttet

There are an estimated 770 million surveillance cameras around the world. Some of them still have their default password, making them entirely accessible by anyone who has an internet connection.

Virtual peephole is a device to watch some of those unsecured cameras. Made of a common-looking wooden box, it contains a microcomputer and some electronics. At the centre of the box is a peephole. By leaning closer to the box, the viewer can look through the peephole and watch lunsecured live feeds from various camera locations.

Shops, beaches, offices, streets, rooftops, birds nests… Virtual Peephole can access thousands of different streams. By opening and closing the peephole’s lid, the user can manually switch cameras as if he was peeping through a door with an ever-changing scene.

In this installation, the viewer is placed in the position of the voyeur. Virtual Peephole is a hypnotic piece that brings up the topic of internet surveillance, cyber-security and digital presence.

by Danja Vasiliev (The Critical Engineering Working Group)

illustrates a security breach of a video-calling service and demonstrates to the public the extent to which personal biometric data can be intercepted and extracted by malicious cyber-actors and state agencies.

The work seeks to draw attention to the next generation of our interrelationship with the internet and vulnerabilities that come with our accelerating sublimation into cyberspace.

Taking the shape of a large scrying ball on the surface of which images of intercepted video-calls are projected, WannaScry! installation references “remote viewing” - known as an extrasensory ability, today is easily afforded by the functional principals of the internet.

While displaying contents of each video call, WannaScry! attempts to extract facial (biometric) and conversational (sentiment and context) data of those individuals participating in the call, including their geographic location. That information is then relayed visually to the audience.

Vending Private Network (VPN)
by Danja Vasiliev und Julian Oliver (The Critical Engineering Workgroup)

takes the form of a vending machine, such as those typically seen in public toilets, nightclubs and bars. Equipped with mechanical buttons, a coin-slot and USB ports, it offers 4 VPN routes, each with an animated graphic depicting the route as a fantasy destination. Audiences are invited to insert a USB stick into the slot, a coin (1 pound or euro) into the machine, and to select a VPN destination by pressing a mechanical button. In doing so, a unique VPN configuration file is then written to the USB stick. Special instructions (in the form of a README.txt) are also copied, explaining how to use the VPN in a special sheathed mode that evades detection methods (namely Deep Packet Inspection, or DPI) used by corporations and state-controlled infrastructure administrators. This is the only means known to work against state controlled firewalls.

The Real Live of Your Selfie
by Tactical Tech

With every selfie you take and upload, you automatically create a set of data about your facial features. Taken together, different nodal points for a unique set of characteristics called a faceprint. A faceprint can be used to identify you, but is your faceprint really you? Facial recognition makes life more convenient by allowing us to quickly unlock our phones, pay for services and goods and open doors; it’s a process which seems relatively harmless, but what happens when your faceprint is used to measure your emotions and monitor your behaviour?

Facial recognition is actually not about your face. Facial recognition is about how your digital identity can be used to determine your rights. What happens when your selfie becomes the digital you?

Your Phone Number Is Not Only Yours
by Tactical Tech

How your phone number can travel from the services you use to third parties you might not know about.

Today a phone is as much a communication device as it is a tracking device. While your phone enables you to communicate with endless analogue and digital services, it also makes you traceable and exposed to many if not all of these services. Your device’s phone number, besides being a number that one can call, is also a unique identifier that can travel between your devices and activities.

A single phone number is a valuable asset used to verify a person’s identity, as well as their behaviour, not only in digital spaces but also in physical spaces. When it is attached to your device’s unique identifier and your personal log in details, a phone number becomes the most precise identifier of a person – one that stays with us even if we change our phone or our SIM card. Once it’s collected, your phone number is shared and traded with other entities: direct subsidiaries, business affiliates and service providers as well as external parties such as advertisers and government agencies, making it one of the most important fingerprints of the digital era. How long have you had your current phone number?

A Drop in the OCEAN
by Tactical Tech

What does your psychometric profile tell politicians about you? This App is a quiz that helps you understand how psychometric profiling works.

OCEAN (Openness, Constientiousness, Extraversion, Agreeableness, Neuroticism) stands for the set of traits that researchers use to ‘measure’ human personality, a process known as psychometric profiling. See how your personality profile changes as you answer the questions.

Disagree with your profile? Even when the personality predictions made about us are wrong, they are still used. Moreover, most people do not realise they are profiled in the first place.


Eternal love, a slender waist, ethical data processing; being promised something triggers our trust mechanisms. As social beings we tend to believe promises. They make us feel good, a sentiment we associate with security. The advertising industry and big corporations have invested billions in order to find out how we think and come to decisions, what we click on, how we move online and offline and how our attention can be captured for as long as possible. Our brain functions are used against us for the maximisation of profits. (Klaudia Zotzmann-Koch)

Dictator Of Your Choice
Video installation by Gisela Schmalz

Director, Writer: Gisela Schmalz
Camera, Editor: Reinhard Mayr
Starring: Elena Hrncirik / Oskar Kozeluh

Vote while you still can. But who is up for election?

Two tech entrepreneurs are trying to win your vote. With their speeches, they compete for the dictatorship of the world society of the future. Both present their plans for shaping the new society using the latest technologies.

One candidate’s vision is more one of prosperity and pleasure, while the other candidate’s vision is primarily one of security and harmony. Both praise their model as the solution to all problems and themselves as the ideal leader.

Which dictator do you choose?

Notes on an Apology Tour
by La Loma and Tactical Tech

Mark Zuckerberg’s history of public apologies stretches from the launch of his first product, Facemash, in 2003 to the apology tour that followed the Cambridge Analytica scandal in 2018. The objects here give a glimpse into the Facebook founder’s communication strategies and his many ways of saying sorry over the years.

During Zuckerberg’s congressional testimony in 2018, an AP photographer snapped a picture of Zuckerberg’s briefing notes that were left on the table during a break. The notes that were visible in the photograph are transcribed here. The talking points give insights into Facebook’s strategies for spinning its responses to questions.

In the Rolodex you can browse through a sample of the apologies, acknowledgments, lessons learned, pledges, and promises that Zuckerberg has made in the past 16 years. Also included are the questions asked by EU Parliamentarians and US Senators at hearings in 2018.

These objects are based on publicly available data and rely on research and transcriptions by The Washington Post and The Zuckerberg Files, hosted by the University of Wisconsin Milwaukee’s Digital Commons.

Slow Spending or the Bank is a Liar
by Seppo Gründler | Ushi Reiter | Eva Ursprung

With their installation Seppo Gründler, Ushi Reiter, Eva Ursprung raise the issue of digital interdependencies shaping our everyday life. We see a TAN generator which, although no longer fashionable, continues to be a secure way of carrying out digital bank transactions without requiring a smartphone. Online shopping becomes substantially slower with this payment method linked to a bank card. Prevalent are smartphones using equivalent bank Apps that are considered safe and secure. Customers rarely question the fact that they are at the same time forced into a dependency of big IT monopolists in the US. The reason why banks tend to keep quiet about alternatives is that this method opens up their technical interfaces to customer data to other companies and thus to a new business model.

With the old-fashioned TAN generator, transfers are exclusively made via the bank’s institute network meaning that there is no need for infrastructures outside the bank’s reach such as mobile phone networks.

How Your Phone is Designed to Grab your Attention
by Tactical Tech

Are you finding it hard to put down your phone? When you feel your phone buzz, can you resist the urge to check it? It may not be obvious, but every feature, colour and sound on your smartphone has been optimised by teams of designers and psychologists to keep you coming back for more. Find out about some of the most common persuasive design strategies.

von Gerda Lampalzer

Parainformation is a series of works drawing on a display tool which has recently moved to the foreground of public attention: the diagram. Whereas in public communication diagrams are used to present information in an illustrative and generally comprehensible way, Gerda Lampalzer strips them of their meaning and examines them in terms of their formal aspect only. In order to do so she reverts to textile techniques increasingly discussed in a political context. Crocheted, knitted, embroidered and woven diagrams enter an astonishing link between apparent precision and individual forming. The result is an aesthetic disassociation inviting the viewer to imagine alternative bits of information. Parainformation plays with the connotations of scientific nature and subjectivity, of programme and handicraft, while remaining explicitly within the framework of media art.