This is the Sound of Exploitation"
“Our art will be frail like our existence, crafted with love, yet destined to be forgotten with the first ray of light...Our art will not be bought or sold, it will be indecipherable out of its context, it will alienate and confuse” – S.Tigas, On Transient Art, www.morethansounds.net
The merging of underground cultures, its results, and the impact it has on people have always fascinated me. Having been for several years a part of both the information security community and the experimental noise/Grindcore community, I came up with the idea to put elements of both cultures in the blender, with the aim of discovering what hacking actually sounds like.
There in no particular agenda behind this experiment; it was born out of mere curiosity but will hopefully grow into more. This is the bastard offspring of post-modernism, which aims to feature in radical nature and transcendentalism what it lacks in traditional artistic value. In an ideal world, it could constitute a starting point for a new generation of computer hackers and underground musicians to combine forces; it would inspire people, overthrow governments and cause great emotional turmoil.
Ladies and Gentlemen: enjoy the mapping of cold, lifeless Source Code as it shyly enters the realm of Sound. Plunge into to the stubborn waveforms as they fall apart and take down with them Adaptive Firewalls, Intrusion Detection Systems and Honeypots, restoring deterministic chaos into the cyberspace.
All sound manipulation managed with Audacity (http://audacity.sourceforge.net) All exploit code and software is in the public domain; copyright lies with the respective authors.
via pascal cretain