leaking in Liang 2012


er of Things: An Archaeology of the
Human Sciences,_ (New York: Pantheon, 1970).

Ibid, xv.

In Foucault, “Different Spaces,” which was presented as a lecture to the
_Architecture Studies Circle_ in 1967, a few years after the writing of _The
Order of Things_.



ist utopias
continues to retreat, while on the other, a more immediate crisis of faith has
accompanied the widespread sense of diminishing economic prospects felt in so
many places. Not to mention...

## [Shadow Libraries](/journal/37/61228/shadow-libraries/)

![](data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7)

Over the last few monsoons I lived with the dread that the rain would
eventually find its ways through my leaky terrace roof and destroy my books.
Last August my fears came true when I woke up in the middle of the night to
see my room flooded and water leaking from the roof and through the walls.
Much of the night was spent rescuing the books and shifting them to a dry
room. While timing and speed were essential to the task at hand they were also
the key hazards navigating a slippery floor...

Metahaven

## [Captives of the Cloud: Part I](/journal/37/61232/captives-of-the-cloud-
part-i/)

![](data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7)

We are the voluntary prisoners of the cloud; we are being watched over by
governments we did not elect. Wael Ghonim, Google's Egyptian executive, said:
“If you want to liberate


leaking in Dekker & Barok 2017


er-known
1
phenomena.1 Perhaps the biggest change is the ongoing
See for example
shift from mapping people, events, and places towards
https://monoskop.org/
Features. Accessed
synthesizing discourses.
28 May 2016.
A turning point occurred during my studies at the
Piet Zwart Institute, in the Networked Media programme
from 2010–2012, which combined art, design, software,
and theory with support in the philosophy of open source
and prototyping. While there, I was researching aspects of
the networked condition and how it transforms knowledge,
sociality and economics: I wrote research papers on leaking
as a technique of knowledge production, a critique of the
social graph, and on the libertarian values embedded in the
design of digital currencies. I was ready for more practice.
When Aymeric Mansoux, one of the tutors, encouraged me
to develop my then side-project Monoskop into a graduation
work, the timing was good.
The website got its own domain, a redesign, and most
crucially, the Monoskop wiki was restructured from its
2
focus on media art and culture towards the much wider
https://monoskop.org/
embrace
of the arts and humanities. It turned to a media
Symposium. Accessed
28 May 2016.
libr


leaking in Stalder 2018


tal condition, these forms have
likewise shifted to the level of data, and an especially innovative and
effective means of resistance []{#Page_149 type="pagebreak"
title="149"}has been the "leak"; that is, the unauthorized publication
of classified documents, usually in the form of large datasets. The most
famous platform for this is WikiLeaks, which since 2006 has attracted
international attention to this method with dozens of spectacular
publications -- on corruption scandals, abuses of authority, corporate
malfeasance, environmental damage, and war crimes. As a form of
resistance, however, leaking entire databases is not limited to just one
platform. In recent years and through a variety of channels, large
amounts of data (from banks and accounting firms, for instance) have
been made public or have been handed over to tax investigators by
insiders. Thus, in 2014, for instance, the *Süddeutsche Zeitung*
(operating as part of the International Consortium of Investigative
Journalists based in Washington, DC), was not only able to analyze the
so-called "Offshore Leaks" -- a database concerning approximately
122,000 shell companies registered in tax
havens[^62^](#c3-note-0062){#c3-note-0062


stitutions that depend on keeping secrets, such as banks and
intelligence agencies, have to "share" their information internally and
rely on a large pool of technical personnel to record and process the
massive amounts of data. To accomplish these tasks, employees need the
fullest possible access to this information, for even the most secret
databases have to be maintained by someone, and this also involves
copying data. Thus, it is far easier today than it was just a few
decades ago to smuggle large volumes of data out of an
institution.[^65^](#c3-note-0065){#c3-note-0065a}

This new form of leaking, however, did not become an important method of
resistance on account of technical developments alone. In the era of big
data, databases are the central resource not only for analyzing how the
world is described by digital communication, but also for generating
that communication. The power of networks in particular is organized
through the construction of environmental conditions that operate
simultaneously in many places. On their own, the individual commands and
instructions are often banal and harmless, but as a whole they
contribute to a dynamic field that is meant to produce the results

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.