Exhibits at The Glass Room Netherlands

The Glass Room has five thematic areas bringing to life the hidden aspects of digital technologies: Deeply Personal which looks into the dark side of personal data; Invisible Labor which examines the human and environmental processes behind technologies; Trust in Us which features works on Big Tech; Big Mother which looks at the risks and rewards of technology; and Open the Box which examines the journeys that our personal data takes.

Exhibits at The Glass Room Netherlands

Picture featuring an exhibit from the Glass Room
Even if you think your password is unique, according to a 2019 survey by the UK’s National Cyber Security Centre, “123456” is the most commonly use...
Think about the commercials or advertisements you see for the newest phone or laptop. How often do you see the people – other than the designers – ...
By now, Siri and Alexa have become household names. We share both mundane and sensitive information with them. Have you considered the depth of you...
Have you ever jaywalked? Or maybe you’re the type who shoots a look at someone crossing the street illegally. Belgian artist Dries Depoorter’s Jayw...
Sometimes you need to re-charge your phone battery – and your own battery. Meditation Charging Station asks you to do both at once. Plug your phone...
If you wish you had more followers on Instagram, Twitter, Facebook, or YouTube, Quick Fix lets you buy followers or likes in just a few seconds. C...
Emotion recognition, psychometric profiling, and sentiment analysis are increasingly being used by companies, social media platforms, and others to...
Networked Optimization is a series of three crowdsourced versions of popular self-help books: How to Win Friends & Influence People, The 5 Lov...
Tired of endlessly swiping through no-matches on dating apps? Are you over the back-and-forth messaging that leads nowhere? Smell Dating is a new k...
As you make your way around the city each day you are constantly emitting data from your devices and being filmed on closed circuit TV (CCTV). The ...
Have you ever wished you could hide traces of your digital self that are left online? Deletion Process_Only you can see my history exposes artist K...
Remote-control birth control may be the wave of the future. In 2012, the Bill and Melinda Gates Foundation gave a grant of nearly £8 million to Mic...
You are most likely a Google user. Even if you don’t use gmail, it’s likely that you use at least one of the more than 295 products that Google own...
In 2016, a research paper caused an uproar when it revealed that Amazon had patented a mobile cage for warehouse workers. Although the cage patent ...

Open The Box

The short videos help one understand the ways your personal data is used on the ‘other side’ of the screen. Animations and interactive apps demystify digital processes, showing you what social media platforms and websites can infer about you. Interactive apps help you learn how deepfakes are made and how to spot misinformation online. The visualisations explore the growing dependency on technology. Dig deeper into your digital life with these series of visual stories.

‘Fake news’ is more than just false information. Even the term ‘fake news’ is misleading, because in many cases it contains some ‘real’ content – a...
Density Design Tactical Tech @Info_Activism
Today's image-editing software makes it easy to create disinformation by editing, cropping and miscaptioning images, which then spread rapidly acro...
Tactical Tech Varoon Bashyakarla 
The most common model used for psychometric profiling is the OCEAN model, also called the "Big Five" or the "Five Factor Model", named for the five...
This poster looks into the most common design tricks used in technology, posing the question: Who is responsible for the way we interact with techn...
Density Design Tactical Tech @Info_Activism
In Deepfake Lab, researchers take you behind the scenes to reveal how deepfake technology works, the process of how a deepfake is created, and how ...
This visualisation explains how AI-generated synthetic images, text and video have the power to change what we say, what we do and how we look, and...
Have you ever wondered how much time you spend on your mobile phone? For most of us, our mobile phones are with us nearly all the time: either in o...
Density Design Situ Yuming Tactical Tech @Info_Activism
We are becoming increasingly attached to our phones. In fact, an average smartphone user spends about 3 hours per day on their device. This visuali...
This poster looks at what goes on behind your 'selfie', delving into the world of facial recognition technologies, and the points of your face that...
Outside in the sun everyone has a shadow... and in the digital world everyone has a shadow, too. This animation looks at the different ways your "d...
During Tactical Tech’s research into the Influence Industry, we found over 300 companies around the world who use data to give political parties in...
The algorithms that control the devices that make up the Internet of Things - in our homes and our cities - need to be trained to ‘understand‘ us. ...
When you join a dating website or download a dating app, you volunteer information about yourself in hopes of finding a good match. But all these i...
If you use a smartphone, you have on online profile. Do you have one or many? Are you in control of your profile? Is it based on information you ar...
Whenever you browse a website, someone is looking over your shoulder. Almost every site visit is tracked by a third-party that shares and sometimes...
Our personal data is being used for political purposes, and it has become a political asset, a means for political intelligence, and an instrument ...
‘Algorithm’ is a buzzword that is used to explain everything from big data to machine learning. This animation unpicks why we should care about alg...

Big Mother

 
Individual biometric data – that is, our unique facial features, iris patterns, fingerprints, or voice – is being increasingly collected to verify ...
This video, produced by South Africa’s Council for Scientific and Industrial Research (CSIR), introduces their system to verify the identities of c...
Sen.se 
Silver Mother™ is a product that allows you to monitor your elderly relatives without having to be there in person. By installing motion sensors on...
Kepler Vision Technologies has developed a product to help caregivers remotely monitor elderly people in nursing homes, hospitals or at home. Rathe...
In response to COVID-19, the NSO Group, an Israeli developer of cyber intelligence and spyware technologies, developed FLEMING, ‘an epidemiological...
 
As the “feedback society” spreads from restaurants and workplaces into homes and schools, children are given new metrics for success or failure. Li...
The pandemic has opened up the world of biometric surveillance: smart tests, vital signs, data patterns, wearable sensors and apps to monitor welln...
Verkadaprovidessecurity solutions,including cameras, access, sensors and more.The company responded quickly to the pandemic by expanding its portfo...
With the threat of the coronavirus ever-present, technology companies are looking to offer cleaner, safer and healthier workplaces and educational ...

Project by Tactical Tech | Presented by dbieb & OBA & FERS | Funded by FONDS21 & SIDN fonds