Human Data Banks and Algorithmic Labour Facebook Algorithmic Factory (2)

This is the second story in our investigation trilogy titled Facebook Algorithmic Factory, created with the intention to map and visualise a complex and invisible exploitation process hidden behind ...
Pročitaj još

Quantified Lives on Discount Facebook Algorithmic Factory (3)

This is the third and final story in our investigation trilogy titled Facebook Algorithmic Factory, created with the intention to map and visualise a complex and invisible exploitation process ...
Pročitaj još

Colonization with love

ccording to Bulgarian theoretician Alexander Kiossev, there is something that he calls “Self-colonizing metaphor”. He used this concept for explaining cultures subordinated to the cultural power ...
Pročitaj još

SHARE investigates: Who knows where you have been last summer?

It was when the commercial use of geolocation technologies began by the end of the last decade, that a possibility of “digital interaction with the physical environment” led the global networked ...
Pročitaj još

Metadata Investigation : Inside Hacking Team

nce online, our every movement, every click, sent or received email, our every activity produces a vast amount of invisible traces. These traces, once collected, put together and analysed, can reveal ...
Pročitaj još

National crypto strategy draft of Slovenia: Blindfolded and going the wrong way

by: oli Author: Domen Savič, an Internet freedom activist from Slovenia. See more ...
Pročitaj još

Hacking Team : The “Italian job” of Serbian security services

Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još

The “Italian job” of Serbian security services

Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još

State employees’ emails available to the public

Internal emails of public sector employees are considered to be official working documents and therefore available under the Law on Free Access to Information of Public Importance, Share Foundation ...
Pročitaj još

Invisible Infrastructures : Surveillance Architecture

n April 2014, we collected about 2000 pages of documents and reports through the series of FOIA1 requests to the Commissioner2 related to the 2012 Report on the inspection procedure over the ...
Pročitaj još
Previous Next