{"id":191,"date":"2015-05-11T12:00:11","date_gmt":"2015-05-11T16:00:11","guid":{"rendered":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/fletcher-bach\/"},"modified":"2016-02-16T22:17:38","modified_gmt":"2016-02-17T03:17:38","slug":"fletcher-bach","status":"publish","type":"post","link":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/fletcher-bach\/","title":{"rendered":"Data Illegibility and Digital Identity"},"content":{"rendered":"<h2><em>Fletcher Bach<\/em><\/h2>\n<p>A series of tools that seek to both expose and confound &#8220;Big Data&#8221; apparatuses with which we engage every day by flooding data collection streams with erroneous information.<\/p>\n<p><a href=\"http:\/\/fletcherbach.com\/filter\/obfuscation\">http:\/\/fletcherbach.com\/filter\/obfuscation<\/a><\/p>\n\n<h3>Description<\/h3>\n<p>Thanks in part to Edward Snowden, we have come to realize both the breadth and the depth of digital surveillance as it exists today. All of the actions or interactions we have at work, at home, and in between leave digital footprints that elements of the surveillance apparatus, whether the NSA or cooperating companies like Google and Facebook, use to construct our virtual identities. My projects pose the question: \u00e2\u20ac\u0153Do we have the right to be illegible?&#8221; and seek to introduce a degree of agency into the current data paradigm by offering users the means to deceive it.<\/p>\n<h3>Classes<\/h3>\n<p>Thesis<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fletcher Bach A series of tools that seek to both expose and confound &#8220;Big Data&#8221; apparatuses with which we engage every day by flooding data collection streams with erroneous information. http:\/\/fletcherbach.com\/filter\/obfuscation Description Thanks in part to Edward Snowden, we have come to realize both the breadth and the depth of digital surveillance as it exists &hellip; <a href=\"https:\/\/itp.nyu.edu\/shows\/thesis2015\/fletcher-bach\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Data Illegibility and Digital Identity<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10292,10707,462,28],"tags":[],"class_list":["post-191","post","type-post","status-publish","format-standard","hentry","category-fletcher-bach","category-katherine-dillon","category-projects","category-thesis"],"_links":{"self":[{"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/posts\/191"}],"collection":[{"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":1,"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/posts\/191\/revisions"}],"predecessor-version":[{"id":440,"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/posts\/191\/revisions\/440"}],"wp:attachment":[{"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/media?parent=191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/categories?post=191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itp.nyu.edu\/shows\/thesis2015\/wp-json\/wp\/v2\/tags?post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}