The SuperRare Guide to Steganography

The SuperRare Guide to Steganography

A Trip Through The Intentionally Unseeable World of Hiding Data in Imagery

The SuperRare Guide to Steganography

3 years ago

In April, journalist and founder of Motherboard Thobey Campion debuted a missing page from a formerly classified 1983 government investigation into the feasibility of astral projection. During his reporting, he received thousands of emails from astral travelers around the world. He digitally micro-inscribed hundreds of these messages onto a high-resolution digital image of The Gateway Report’s missing page. 

Today, it is being released as an NFT on SuperRare alongside a powerful new digital magnification tool. Developed in partnership with SuperRare and Gigapixel, the new functionality reveals hundreds of hidden details inside ‘The Gateway,’ making it the industry’s first lossless zoom experience. 

A partially-exploded view of The Gateway.
Graphic: Thobey Campion.

While NFTs provide a picture-perfect moment to push the bounds of metadata, hiding information in plain sight goes way back, and it’s got a name: Steganography. In honor of that tradition, here’s a tour through the intentionally unseeable world of hiding information  inside imagery.

Let’s Enhance, HD.

It was Zheng, in the Library, with the Sunset

At 8:42am on an overcast August morning in 2018, Principal Engineer at GE Xiaoqing Zheng was marched out of his home in Eastern New York by the FBI. The event was a hot topic for the sleepy town of Niskayuna, just north of Albany. His LinkedIn includes a degree from the Sloan School of Management, a PHD in Aeronautical Engineering from Northwestern, 13 years as a senior technical leader at one of America’s most venerable technology companies, and 29 patents under his belt. 

GE Principal Engineer being arrested in 2019 in Niskayuna, NY.
Photo: Lori Van Buren / Albany Times Union.

Zheng had just been charged on 14 counts of conspiring to steal General Electric’s trade secrets. According to the complaint, he’d allegedly been exfiltrating GE intellectual property to Tianyi Aviation Technology Co. in Nanjing, a company the feds accused him of starting with funding from the Chinese government.

Over the course of his employment at GE Power & Water in Schenectady, Zheng allegedly stole 20,000 electronic files detailing design models, engineering drawings, configuration files, and material specifications for gas and steam turbines. According to the complaint, Zheng transported the privileged data off of GE’s highly-fortified corporate servers in a manner considered unusual even for the most seasoned Information Security specialists. He concealed it all inside a low-res picture of a sunset. He emailed the image to his personal email account with a note: “Nice view to keep.”

Zheng’s original image (left) and his image containing GE trade secrets (right).
Art: Xiaoqing Zheng.

By hiding the illicit information inside his sunset, Zheng was partaking in an advanced form of a tradition that’s been alive and well for at least two millennia: Steganography.

It’s A Whole Thing and Its Own Thing

The word Steganography comes from the Greek steganós, meaning “covered or concealed,” and graphia meaning “writing.”

In the family of covert communications, steganography has a more well-known sibling in cryptography. Distinguishing the two from the drop is key. Cryptography is the science of writing in secret code (encrypting information), while steganography is concerned with making information invisible entirely, or hiding it in plain sight.

In practice, cryptographers scramble data between point of departure and destination to keep it safe. The intended recipients then receive a key that turns unrecognizable ciphers into intelligible data. No key, no dice. 

Chart: Thobey Campion.

Encrypted information sticks out. It is recognizable by its very randomness. Steganography does not attract attention to itself as an object of scrutiny. So, while cryptography renders data unreadable, steganography hides the presence of the information altogether. It’s the Milford Man of communications. 

Staying true to form, the world of steganography is jam-packed with terms that discourage participation. So I produced this A-Z of Steganography to act as a key word chaperone as we descend into the shadowy depths of hidden data. A high-resolution PDF download is available for paying subscribers here, along with a compendium of groundbreaking steganography papers. 

Chart: Thobey Campion.

The Decidedly Analog Origins of Steganography

Steganography precedes our modern digital world by a solid 2,500 years. From its beginnings onward, the goal has remained the same: Enable one party to communicate with another party without a third party being aware that communication is even occurring.

Here’s a quick rip through the history of physical steganography. 

Nazcan Geoglyhs; Trithemius’ ‘Steganographia’; DaVinci’s ‘Mona Lisa’; Michelangelo’s ‘David and Goliath’; Bosch’s ‘Garden of Earthly Delights”; Microdots; ‘The Casdagli Sampler’; The Digit Affair.
Art by Thobey Campion. Composition: Thobey Campion.

440 BC – The Greek ruler Histiaeus shaved the head of a servant, tattooed his scalp with a secret message, let his hair grow back, then sent him through enemy territory with an instruction – “When thou art come to Miletus, bid Aristagoras shave thy head, and look thereon.”

200 BC – The geoglyphs of the Nazca contain 143 topographical line drawings that went undetected until the 1920s when they were viewed from the air by Peruvian military and civilian pilots. While the meaning of the geoglyphs remains a mystery, researchers are making inroads with the aid of machine learning

1499 – German Benedictine abbot, cryptographer and occultist Johannes Trithemius published Steganographia, a book purporting to be about magic. A decryption key eventually revealed the first two volumes to actually be about cryptography and steganography.

1503 – According to a recent finding by Italian researcher Silvano Vinceti, in his Mona Lisa, Leonardo DaVinci microscopically painted an “L” over the right eye of his subject, an “S” over the left eye and a “72” under an arched bridge in the backdrop.

1509 – A panel on Michelangelo’s contribution to the Sistine Chapel portrays David defeating Goliath. David’s stance is in the shape of the Hebrew letter “gimel.” This letter refers to reward and punishment, paralleling nicely with the underdog story.

1510 – Hieronymus Bosch’s triptych “Garden of Earthly Delights” contains a musical score on a figure’s hindquarters (excuse my language). The notation was discovered in 2014 by a college student and piano teacher, who after playing it, described the music as “LITERALLY the 600-year-old butt song from hell.”

1887 – Two Dutch scientists used a high-intensity X-ray from a particle accelerator to scan Van Gogh’s “Patch of Grass” revealing a hidden portrait of a woman.

1930 – During the Franco-Prussian war, Parisian photographer René Dagron used a photographic shrinking technique to increase the number of messages a pigeon could carry. This shrunken image became known as a Microdot. Post-WW1 German spies adopted the technique of shrinking messages up to 200x. Microdots as small as a typewriter’s period were then covered by reflective adhesives (for findability) or inserted into the side of postcards.

1941 – British army officer Major Alexis Casdagli was captured and imprisoned by the German forces in the early days of WW2. To pass the time he began stitching what would become known as The Casdagli Sampler. Along the border of the embroidered canvas, which features German swastikas, American eagles, British lions and Soviet hammer and sickles, are a series of irregular lines and dots. It is Morse code for “Fuck Hitler”.

1968 – The crew of the USS Pueblo were captured by North Koreans and brutally tortured. In propaganda photos aimed at showing how well the captives were being treated, the POWs snuck in their middle fingers in what became known as The Digit Affair.

Then computers showed up and the decidedly subversive art of hiding imagery in plain sight got a whole lot more sophisticated.

A cheetah sprinting across the bit plane.
Art: Thobey Campion.

Digital Steganography

The personal computer was a lightning rod for new approaches to steganography. The sheer amount of data inside one image offered practitioners an expansive shadow in which to sneak around. Pioneers tried all sorts of approaches: blog-steganography, sneaking data into file info, hiding messages inside file folder systems, and even strategically delaying packets of information that made up an image, the sequence of which formed a message unto itself.

One of the first high-profile applications of digital steganography occurred in 1993. The laptop of suspected World Trade Center and Philippine Airlines Flight 434 bomber Ramzi Youseff was seized. Buried deep in the hard drive were a collection of encrypted files. After their discovery, it took the FBI over a year to decipher two the hidden information. They contained plans for future attacks, flight schedules, projected detonation times, and chemical formulae.

Osama Bin Laden was also an avid practitioner of steganography. USA Today ran a story in 2001 reporting that Bin Laden and his associates had been hiding information crucial to terrorist plots in images on pornographic websites as early as 1996. 

Steganography has been used by criminals and terrorists, but like any form of cryptography, it’s used by a wide array of people. Steganography is used by intelligence agencies, artists, activists, hackers, coders, puzzle makers, and more. As steganographic techniques evolved, so did methods for evaluating their impenetrability. To scrutinize a work, the steganography community developed a risk matrix of sorts, calling it the ‘trade-off tetrahedron.’

A cheetah sprinting across the bit plane.
Art: Thobey Campion.

The four points represent the key requirements for incognito payload transmission. The ‘trade-off’ implies that favoring one of the requirements always compromises the other three in some way.

  1. Robustness -The characteristics of a hidden message that ensure it survives any non-malicious data processing while in transit from sender to recipient.
  2. Security– The built-in protection against a hostile entity’s attempts to remove or disable the hidden message.
  3. Imperceptibility – A hidden message’s ability to exist while not degrading the perceptual content of the host.
  4. Capacity – The amount of information that can be hidden inside the cover.

Of all the digital steganography techniques that proliferated in the early days, one fared particularly well against the trade-off tetrahedron. 

Least Significant Bit Substitution (LSB)

The mid-1980s gave rise to a technique called Least Significant Bit Substitution. LSB hides data inside the information least important to the quality of an image, thereby minimizing image distortion. This information-redundant region of an image consists of the least significant bits of each pixel. 

LSB is often cited as the steganography technique of choice for Middle East terrorist groups. In 2012, suspected Al Qaeda member Masqsood Lodin was apprehended in Germany after a trip to Pakistan. Berlin police seized memory cards and a flash drive from Lodin’s underwear. The drives appeared to contain two pornographic files, titled “Kick Ass” and “Sexy Tanja.” After weeks of laborious scrutiny, German investigators found buried in the data more than 100 Al Qaeda documents. It included plots to seize a cruise ship, a document called “Future Works” outlining attacks throughout Europe, and terrorist training manuals in German, English and Arabic. 

LSB can be performed in 5 arduous steps:

1) Select a host image. Note: Try to find a 1/1 original you created 😉 Using a publicly available photo exposes your file to the risk of being compared to an unaltered available copy, differences being spotted and ultimately compromising the safety of the secret data.

2) Convert the host image to a bit array. That’s the binary code (1s and 0s) that inform the color of the pixels that make up the digital image. Here’s a simple online tool.

3) Locate each binary sequence’s least significant bit. This is the right-most bit at the end of each binary sequence. Below is the binary for a pixel that reads as the color red. 

Art: Thobey Campion.

The circled bit above has the least impact on the color of the pixel the sequence instructs. Aka, if you change this number to 0, the pixel will still look almost exactly as red as it did before the alteration.

To give you an idea how trivial that bit of information on the right is – as you move one-by-one along the bits to the left, they double in value. So in an image’s 8-bit binary sequence the left-most bit is 128x more impactful on what gets delivered to the human eye than the right-most. And that’s just for a single pixel. If you change that last bit you’re changing 1/245th of the pixel. No one’s noticing anything. 

Art: Thobey Campion.

4) Make minor alterations to each least significant bit, so that when each bit is isolated from the sequence and re-compiled they form a new meaning. The example below starts with 3 pixels’-worth of binary data from an image, isolates the least significant bits, and flips 4 of them, so that the least significants together form a new sequence that then spells the letter “e” in binary. The message is now hidden inside the “stego image.” 

Graphic: Thobey Campion.

5) Transmit the stego image to a recipient, who can use an algorithm to detect anomalous changes in pixel value and then extract the hidden message.

Outside of being a total nuisance, Least Significant Bit Substitution has some serious limitations. Chief among them is the LSB method puts a ceiling on how many pixels can be altered and therefore how much data can be hidden. Packing too much hidden data inside pixels eventually causes image degradation. This can be caught by the human eye or the trip wires of forensics software. To remain under the radar, steganographers using the LSB method can only manipulate 15 percent of an image’s content.

Then, along came researchers and high-performance steganographers Richard Eason and Eiji Kawaguchi. In a paper titled Principles and Applications of BPCS-Steganography, the two illustrated how to jack hiding capacity to a staggering 60 percent, meaning 60 percent of the image’s data could be changed behind the scenes without it significantly degrading image quality.

An original image (left) and bit-plane complexity segmented image (right) containing a photo of Abraham Lincoln, and the textual contents of The Gettysburg Address, The Declaration of Independence, The Constitution, The Magna Carta, Romeo and Juliet, Hamlet, Macbeth, A Midsummer Night’s Dream, The Taming of the Shrew, The Tempest and A Comedy of Errors.
Steganography: Eason & Kawaguchi.

Bit-Plane Complexity Segmentation (BPCS)

To raise the bar on the Least Significant Bit technique, Eason and Kawaguchi manipulated the shortcomings of human vision. To maximize perceptual imperceptibility, they devised a method of splitting an image into two distinct regions—an ‘informative region’ and a ‘noise-like region.’ An informative region consists of a simple pattern that the eye can recognize instantaneously; a noise-like region consists of a pattern so complex our brains simply don’t register it.

Imagine you are arriving to a day at the beach. There’s sand as far as the eye can see. This stretch made up of billions of grains is a noise-like region. It’s so many objects with so much sameness your eyes can’t really distinguish one from the other. You can however cross-reference the khaki colored shape that traces the ocean with your memory and be virtually guaranteed that you are indeed at a beach. So, assured, you sit down on a patch of noise-like sand. As you get settled a pink flamingo strolls by your spot. Its pink plumage jumps out from the color of the beach, its impossibly thin stick legs bend recognizably. This is an informative region!

Every image contains informative and noisy regions, which become mathematically mappable at a microscopic scale. Here’s what it looks like up-close.

Graphic: Thobey Campion.

To map these regions, steganographers slice images into 8 planes.

Graphic: Thobey Campion.

That stack of slices looks like this when laid down next to each other.

Graphic: Thobey Campion.

Now broken down into bits, it’s easy to identify informative and noisy regions. To make it even easier, a grid is placed over the image and a noise value is attributed to each cell. This is achieved by measuring the amount of pixel contrast inside each segment. This is also known as an image’s border value. Here are some examples. 

Graphic: Thobey Campion.

In Figure 1, a white pixel is surrounded by 4 black pixels. That gives it a border value of 4 because there are four contrasting borders. In Figure 2, there are no black pixels bumping up against white pixels. This gives it a border value of 0. Figure 3 has a border value of 12. AKA, Figure 2 is informative, whereas Figure 3 is bringing the NOISE.

Eason and Eiji proposed embedding secret data into imagery by matching their noisy regions, which usually consist of 45 percent of the image. That’s the easy part.

To camouflage the informative region of a secret image into a noisy region, it needs to be converted into noise. At the pixel level, that conjugation process looks like this. 

Graphic: Thobey Campion.

In the above, (1) is a piece of an initial image. It sticks out like a sore thumb. By matching it with the host image’s foreground pattern (4) and background pattern (5), it can nestle in undetected.

Here’s an example in action!

Steganography: Eason & Kawaguchi.

The carrier is converted to grayscale. Both images are then plane sliced. A complexity measure is calculated on both blocks for both images. A conjugation is performed on the ‘simple’ or ‘informative’ blocks of the secret image, turning them into noise. And finally, the secret image is then embedded into the carrier image to form a final stego image.

To perform this delicate act you need a finicky software package like Matlab and a tremendous amount of patience. It’s all a lot.

Luckily there are off the shelf tools to do the heavy lifting for you. 

Art: Thobey Campion

You Even Steg, Bro?

A simple Google search returns a mountain of turnkey software out there for the data-cloaking enthusiast. I tried them all. Here are the top three, ranked by ease-of-use, versatility, and whether they flooded my computer with bots. Bonus points for Mac-friendliness, cause that’s where I’m at.

• Steghide: For usability, Steghide shines. It’s also a super-lightweight piece of software. So if you’re trying to hide the very fact that you’re stegging in the first place, there’s an added benefit.

• Xiao Steganography: If you’ve got a PC, this is your best bet. The community generally agrees. An extra security feature enables users to encrypt data before embedding it into the image for double the protection.

 Open Puff: While this piece has remained solely focused on visual steganography, you can conceal data in all types of carrier media files. Open Puff can trojan horse hidden data in a wide array of imagery, audio, video and flash-files.

• Metasynth: On the audio front, don’t sleep on Metasynth. This is the software Aphex Twin used to drop images into his music. A story for another day though.

Art: Thobey Campion

Steganography’s Next Dimension

‘Obfuscation layer’ is a prominent term in the digital forensics lexicon. These layers offer additional levels of protection from attackers. The more layers, the less perceivable and therefore more safe a hidden message. To peer into the future of steganography is to gaze through an ever-growing and increasingly opaque stack of obfuscation layers.

Mind-blowing work is being done to advance the field by re-distributing hidden messages inside the 2-dimensional plane of flat imagery. In 2013, American computer scientist Chuck Easttom filed a patent for processing a data message into a plurality of message blocks each representing a portion of the original. These fragments are in turn inserted into a plurality of images. Zhongliang Yang, a Tsinghua University Doctor of Engineering (and total beast, I might add) has built a model for enhanced cognitive-imperceptibility using neural networks. A 2021 paper outlined a method for mimicking the patterns of human chromosomal sequences to build a ‘DNA algorithm’ that dictates the dispersal of altered bits around an image, thereby increasing a hidden message’s undetectability. 

It is however one dimension beyond flat imagery that poses the most possibility for steganography’s future. Up until a few years ago, techniques mostly focused on embedding data by modifying pixel values. With the increase in accessibility of 3-D hardware for CAD, Virtual Reality, video games and 3D printing, the steganography conversation began tilting towards the usage of 3-D geometry as the host object.

A report funded by The Natural Science Foundation of China has become somewhat of a primer on 3-D steganography. It opens with a promise that “the flexible data structure of 3-D geometry may provide ample room for hosting secret information.”

All digital 3-D objects are comprised of a series of mesh faces, 2-D polygonal shapes that together approximate the shape of an IRL object. The most common polygonal shape used in 3-D objects is the triangle. It’s not uncommon for video game designers to flex the number of triangles in their compositions. Here are some rudimentary 3-D objects composed of triangle mesh. 

Composition: Thobey Campion

Every 3-D object contains a group of rearrangeable vertices and triangles that can be manipulated without changing the geometry of the visual output. 

Composition: Thobey Campion

The above spotlights an extension domain. This is the area in which a hidden message can be stowed away without being noticed. In (A), the height of the domain is established by extending the vertex from v(i) up to v’(i). In (B), the rotation of the domain is then established as a right angle at the base of the vertex. A hidden message can be embedded in this range. Meanwhile, there is no seeable difference in the triangle. 

Composition: Thobey Campion

In (A), v(j) – v (j) – v(k) represents a visible triangle, whereas v(j) – v’(i) – v(k) represents the exit edges that don’t register to the human eye. These are then plotted out along a mesh in (B). Each face represents one bit’s worth of space for a hidden message.

Zooming out, the standard 3-D mesh human figure in say, a video game, contains somewhere in the neighborhood of 150,000 triangles. That puts the triangle count of an entire scene north of 1 million and a count of a billion in an entire game – extraordinary depths in which to hide mountains of data.

While these developments mark a major milestone for embedding capacities, they are merely the beginning of a whole next timeline and range of applications for steganography. Hidden messages can now be contemplated inside 3-D printed material, recording devices inside medical implants and even our own biological systems.

I had a chance to talk with cybersecurity expert and steganography patent-holder Chuck Easttom. We talked about the future of Steganography. “The bottom line is if you really want to hide something, the biggest determining factor on whether or not you’re going to be able to hide it is the ratio between what you’re hiding and what you’re hiding it in,” Chuck said. Forecasting the future, Easttom surmised “any time there is a new venue for any type of communication I would expect someone to eventually utilize that to hide data.”

Steganography has always formed a symbiosis with the ways in which we choose to communicate. As we spend more of our time, sharing via increasingly complex visual modes, the room for hiding data will only increase. For many in the Information Security industry this poses a concern. For other industries though, this innovation promises a quantum leap in range of expression.

What a time to be disguised. 

1

Thobey Campion

Thobey Campion explores the vast netherworld between the scientifically proven and the completely unbelievable on Exo. You can explore this pan-human blindspot by subscribing to Exo’s substack here.

Art

Tech

Curators' Choice

The Gateway: The First 4th-Dimensional NFT

The Gateway: The First 4th-Dimensional NFT

Above: “data privacy” by stockcatalog licensed under CC BY-SA 2.0

The Gateway: The First 4th-Dimensional NFT

3 years ago

Artist Thobey Campion’s life went down a rabbit hole when he came across, “The Gateway Experience.”

This 1983 classified CIA commissioned report spelled out the feasibility of militarizing astral projection.

“We’re talking Cold War,” explains Campion. “We’re talking psychic Soviet spies – where all different types of experimental espionage were being trialed and explored by the U.S.”

The document, which was declassified in 2003, details a training system designed to focus brainwave output to alter consciousness and ultimately escape the restrictions of time and space.

Campion’s February piece for Vice on the CIA document is the basis of his new project: The Gateway – the first 4th-dimensional NFT that contains 658 digitally micro-inscribed astral projection experiences. The experiences were cultivated from thousands of messages Campion received from his readers, and are viewable thanks to SuperRare’s integration of a new lossless zoom functionality.

The Gateway, Thobey Campion (zoom in to read astral projection messages)

The Genesis: Campion’s story opened a Pandora’s Box with readers.

When the piece ran, the declassified CIA report had one glitch: Page 25 was missing from the document.

When society as a whole starts taking it more seriously they’d be surprised what the human mind can do

ASTRAL PROJECTION EXPERIENCE #382

Speculations were afoot on Reddit and Tik Tok regarding the contents. The most intriguing hypothesis: Page 25 was left out of the report on purpose. The idea being, if someone could successfully astral project and move backwards and forwards in time and space, they’d be able to retrieve the page and prove that they had done so by disclosing the content.

“Page 25, it’s not a random page,” Campion explains. “The report crescendos just before the page; you kind of feel as if the secrets of the heavens are about to be unveiled for you…and then the page is just not there.”

Included in Campion’s story was his email address – so people could reach out to him if they had more information about Page 25, as well as share their own astral projection experiences.

I eventually achieved a fast enough FFR to stay “clicked out” long enough to record ALL phases of time

ASTRAL PROJECTION EXPERIENCE #521

Thus, roughly a day after publication, an email frenzy was triggered.

“I’d never seen emails come into my inbox like this. It was totally chaos.

At this point I think I’ve looked at like 23,000 emails,” he says. “They weren’t sad-lonely, but they’re isolated stories of people who have had an experience. They don’t have any way of grounding it in reality – or have anyone to discuss with about it.”

EVERYTIME the rush from “spirit” me into sleeping me would connect, I’d JOLT up

ASTRAL PROJECTION EXPERIENCE #191

Campion found that having an out-of-body experience is a very common phenomenon – and the responses highlighted questions humans have about bridging the gap between the material and spiritual worlds.

“After you read about 30 of them in a row, you kind of lose connection with the physical world yourself,” he explains. “And you’ve got some extraordinary descriptions of people’s experiences traveling around the universe.”

Thus, a spark was ignited: “And so that was my idea; what if we bring them all together into one place?”

But still, an important element needed to be uncovered: Fortunately, one person that reached out to Campion was a representative from the Monroe Institute – the organization that originally conducted the astral projection research project for the CIA.

The sleep paralysis thing is nature’s way of keeping us in our bodies

ASTRAL PROJECTION EXPERIENCE #604

The Monroe Institute email teased: “We’ve got something that I think that you might want.”

The rep, of course, was referring to the mythical Page 25.

The resistance dissipates so the vibrations can travel faster

ASTRAL PROJECTION EXPERIENCE #258

Like a plot from a John le Carré novel, Campion was told that Page 25 was being kept in a bunker below a barn in Virginia. He was then asked the $10,000 question: “Do you want the missing page to the CIA document?”

“The one mystery I have not been able to figure out is why the Monroe Institute had it, but the CIA repeatedly denied that it ever existed.”  

But right after the tease – the Monroe Institute went radio silent.

“They just disappeared,” says Campion. “They never sent me the page and I was left high and dry.”

Once again, Page 25 was a shrouded puzzle.

Our mind generates a map of reality that we confuse for the real thing

ASTRAL PROJECTION EXPERIENCE #83

Until one evening. Campion got a call from Jenny Whedbee, The Monroe Institute’s marketing director. She said: “Look, the corporate people that you were speaking with are no longer at the organization… and here’s the page.” Whedbee added: “I hope you do something weird with it.”

Whedbee explained that Page 25 reappearance was largely due to Campion’s story; and she expressed the contents wouldn’t have been appropriate to previously release, but now, in this post-pandemic world – the timing was right.

“And she just dropped it into an email,” says Campion.

Upon reading, Campion knew there was something more…

“It’s pretty remarkable what it achieves in just one page,” he says. “It basically unites the human tradition of spirituality, quantum physics, huge ideas around cosmology, the forming of the universe, and modern tenets of psychology – into one brief.”

A vivid blue hummingbird flew by me and landed directly on my shoulder. it stuck out its tongue and tickled my ear, I laughed out loud so hard it woke me LOL

ASTRAL PROJECTION EXPERIENCE #498

“And that what’s fascinating to me is that it’s kind of a unifying theory for our existence within the broader spectrum of the cosmos,” he adds. “And it really does lean heavily on the importance of an understanding of the self as a first step in understanding the world around us.”

HOW THE ARTWORK WAS BORN

Campion, who also creates graphics and multimedia for his stories, began to think about what really weird visual project he could do to end his Gateway journey – and bring all the elements together to reflect his experience.

At first, he was a bit reluctant to jump into the NFT project – because of all the whipping winds: “You’ve got the military and a spy organization. You’ve got religion and psychology. You’ve got a lot of people’s personal stories about psychological journeys they’ve gone on,” he says. “So, I decided that the move would be to do a perfect print replica of the page, including all the pollution on the page from being reproduced over the years which was meant to signify the interference that people tend to report having when they try and astral project.”

Undeniable aspect of existence and the one thing that has stopped me from embracing a completely materialist outlook

ASTRAL PROJECTION EXPERIENCE #321

I poked into the nature of the digital file,” Campion says. “And luckily it was a vector image, so it would remain intact no matter how I reproduced it – even if I blew it up to a massive size.”

After jumping in, production moved fast. He received page 25 on March 23rd and completed The Gateway NFT on April 8th..

Campion first printed the page in L.A. – and shipped it to Eugene, Oregon, where Zane Kesey (son of author Ken Kesey) – who is the world’s most renowned blotter artist, perforated the page into 900 individual acid tabs, and then shipped had it back to L.A.

Zane Kesey
Image by Chris Kelly Images is licensed under CC BY-NC-ND 2.0

“At this point, it had become a full-on obsession,” states Campion. “Like, I don’t even know why I’m doing this anymore.”

Campion then brought the page in studio, knocked out one tab, took a photo of it on a medium format camera and then drum-scanned the negative to produce a dangerously crisp TIF file. This allowed him to zoom in on each individual tab and paste in all the different astral projection experiences; one per tab; for a total of 658. In a nod to steganography, each micro-inscription is only visible at 300% magnification.

“When you’re looking at the image from afar, it just looks like a normal piece of paper with some perforations on it. And then you start to see these little bits of text. And as you get closer and closer – you’re able to read them.”

Above all, I understood that everything – absolutely everything in existence follows the exact same pattern

ASTRAL PROJECTION EXPERIENCE #144

WORKING WITH SUPERRARE

The Gateway is being released on SuperRare alongside the debut of an industry-first lossless NFT zoom tool. SuperRare worked with Campion to develop the technology that allows artists to explore the extraordinary detail that can be built into a digital image.

“I see it having a major impact on NFTs as they start to evolve in approach and objective and meaning,” Campion says. “There’s so many people that are going to want to take advantage of essentially the fourth dimension in NFTs.”

The zoom tool is an extension of Campion’s background writing about the possibilities that fit inside of a human perceptual blind spot.  For the tool, Campion took inspiration from artists, such as Daniel Arsham – who pour a lot of detail into a space – along with a zoom feature created by Chinese outfit Big Pixel that allows you to start from afar – to succinctly hone in on people’s irises.

“It should be an option for artists, whether they want to have that level of scrutiny on their pixels,” says Campion. “For the artists that are building more and more detail into their work – you’ve essentially got a whole new dimension to work with. So rather than a flat two-dimensional canvas where what-you-see-is-what-you-get – you’ve got the ability to build worlds inside your work.”

The creation of the zoom tool completes Campion’s quest for Page 25. He found himself personally driven to something that was internal on the page that would explain the gap in our experience as humans.

I have no understanding, no technical language for the math/science/physics I am encountering

ASTRAL PROJECTION EXPERIENCE #606

Ultimately, The Gateway project was an attempt by Campion to create a microcosm to reflect how important it might be for all our voices to come together to realize our potential and serve as a reminder that there is more to life than just what our senses are able to pick up.

“And with that level of curiosity, I have high hopes for humanity,” he says. “We spend so much time in our life looking around us, outside of our own experience, trying to figure things out – and Page 25 was quick to emphasize the importance of the internal world in making sense of our reality.”

What Campion found with Page 25 is that with great power comes great responsibility.  

“Everything it touches, just causes this wild reaction,” Campion concluded. “It’s almost to the point where I want to warn people; as soon as this is in your life, it’s going to cause a reaction you’re so not going to anticipate.”

1

Harmon Leon

Harmon Leon is the the author of eight books—the latest is: 'Tribespotting: Undercover (Cult)ure Stories.' Harmon's stories have appeared in VICE, Esquire, The Nation, National Geographic, Salon, Ozy, Huffington Post, NPR’s 'This American Life' and Wired. He's produced video content for Vanity Fair, The Atlantic, Timeline, Out, FX, Daily Mail, Yahoo Sports, National Lampoon and VH1. Harmon has appeared on This American Life, The Howard Stern Show, Last Call With Carson Daly, Penn & Teller’s Bullshit, MSNBC, Spike TV, VH1, FX, as well as the BBC—and he's performed comedy around the world, including the Edinburgh, Melbourne, Dublin, Vancouver and Montreal Comedy Festivals. Follow Harmon on Twitter @harmonleon.

Art

Tech

Curators' Choice

Flattening of Worlds: 9 Pioneering Crypto Artists Response to Canonical Art History

Flattening of Worlds: 9 Pioneering Crypto Artists Response to Canonical Art History

3 years ago

By Clara Peh, Art Lead @ Appetite Singapore

Zooming in and out of an animated cyber imagination, Miss Al Simpson’s Cybaroque Borghese takes us into the year 2080, when the AI simulation for Villa Borghese in Rome, Italy, has become one of the world’s most popular virtual programs. Miss Al Simpson imagines one of the players to be a young girl, equally enthralled by the exquisite beauty that is Canova’s Paolina Borghese as Venus Victorious (1859) sculpture, as she was when she was a young adult. The girl logs onto the program and finds herself instantly transported into the sweltering heat that is Rome in the summer. The Villa, its gardens and the entirety of its collection, have taken on a second life within the computer program, where they now live untainted by the ruins of time. The girl steps into the digital frame decorated with graffiti. She has the gardens all to herself.

Cybaroque Borghese, Miss Al Simpson

Paolina Borghese as Venus Victorious, Canova (1859)

Cybaroque Borghese speaks to the relationship that crypto art often shares with canonical art history. The piece has one foot in the traditional art world, looking back at the 19th century and the neoclassical era, and the other in the nearing future, as technological innovations continue to evolve and alter our ways of living. Cybaroque Borghese is one of the nine pieces offered in Bonham’s upcoming auction, “CryptOGs: The Pioneers of NFT Art”, held in collaboration with SuperRare. The nine artists participating in the auction represent some of the earliest artists to adopt the practice of minting art on the blockchain and contribute significantly to the growth and flourishment of crypto art.

Across the nine different works, some, like Cybaroque Borghese, appropriate and reinvent historical artworks, some speak to the experimentations and innovations made possible by digital processes, while others highlight the intimacy that can be shared between the digital and physical art world. As participating artist Sarah Zucker puts it, “As a movement, crypto art has a unity of spirit, but not a unity of style. The adoption of NFTs was, for me, a means of creating editions for my long-standing screen-based art practice, But I have become immersed in crypto culture, and see great value in it. My works definitely reflect the interconnectedness of the crypto space.”

As a movement, crypto art has a unity of spirit, but not a unity of style

SARAH ZUCKER

Alongside Miss Al Simpson’s imagination of a virtual future, Alotta Money is another artist whose piece builds upon a historical artwork, giving it new relevance in contemporary culture. Pauline at the Mall  presents a humorous take on Ingres’ Joséphine-Élénore-Marie-Pauline de Galard de Brassac de Béarn (1825 – 1860), Princess de Broglie, placing Pauline inside of a modern-day shopping mall. Adorned with a credit card chip on her neck, clutching onto her “Goocchi” shopping bags and standing against a background of the artist’s previous artworks and metaverse buildings, Pauline looks as though she is right at home in this dystopian portrayal of our current economy. “On this unending escalator of consumerism, Pauline has all she needs,” says Alotta Money, “so the vampires of marketing manipulate her to believe she has lost her youth, all so they can sell her stocks of blood to reinvigorate her youth.” Withdrawn from the tragic fate that befell the young Princess de Broglie, Pauline at the Mall focuses on the visual signifiers within the portrait that are universally identifiable, repurposing the portrait for Alotta Money’s contemporary audience.

Pauline at the Mall, Alotta Money

Joséphine-Éléonore-Marie-Pauline de Galard de Brassac de Béarn (1825–1860), Princesse de Broglie, Jean Auguste Dominique Ingres

The use of postmodernist appropriation is similarly found in Coldie’s Proof of Work – Genesis, which draws parallels between the 19th century Gold Rush which took place in the artist’s hometown in California, and the booming industry of crypto mining. Coldie takes McClure’s A Forty-niner Peers into the Slit of California’s America River (1850), the representative image of the Gold Rush, and positions the figure in the act of mining cryptocurrencies, inserting symbols and iconographies identifiable to any crypto natives. The artist is well-known for his use of stereoscopic imaging – creating depth through layering in his digital collages. Subtle but wittily executed, Proof of Work – Genesis asks poignant questions about the cultures and economic realities that surrounded the Gold Rush and the current state of cryptocurrencies.

A Forty-niner Peers into the Slit of California’s America River, L. C. McClure (1850)

The self-referential nature of Proof of Work – Genesis is shared by XCOPY’s The Death of Cash (Sorry Anon). The work not only articulates the artist’s attitude towards the rise of digital currencies, but also references online interactions across Twitter or relevant forums, a key platform for social discourse and information exchange within the crypto community.  

Janne’s uNtitlEd builds upon crypto culture and brings us into the virtual worldbuilding exercise of the metaverse, where the artist speculates on how the new digital world can touch real world emotions and have tangible effects. Using a style that the artist describes to be fictional realism, Janne takes photographs and found images to create collages that capture a sense of mystery and enigma. Akin to the uncanny emptiness that Giorgio de Chirico’s paintings portray, Janne’s digital collages invite us to question the psychological significance of inhabiting the metaverse. The artist extends an arm and invites us to follow them along this journey, venturing into the digital unknown. 

uNtitlEd, Janne

As Janne fuses fragments of the physical and digital world together, Sarah Zucker, Mattia Cuttini and Matt Kane’s practices bring together creative tools and techniques of the two different dimensions. These artists are particularly interested in digital mediums and methods, presenting artworks that bridge between the analog and digital worlds.

Sarah Zucker’s practice makes use of both cutting-edge and obsolete technologies, mixing analog video feedback with digital video, minted on the blockchain. Originally captured in 2018, Space Loaf portrays a nostalgia for the early days of videography, placing the artist’s beloved cat in a glitchy suspended cosmos, as the cat curiously surveys her curious surroundings. Zucker’s playful video work is immediately relatable to an audience that has grown up around rapidly developing technologies and reflects her longstanding investigation of the digital medium.

Space Loaf, Sarah Zucker

In resonance to Zucker’s work across analog and digital mediums, Mattia Cuttini’s practice centers around the idea of how one thing changes into another, including how the physical can merge with the digital. Spinning Circle is an animated rubber stamped artwork created entirely by the artist, down to the rubber stamps and the manual process of stamping each individual block of colour, to the physical work’s digital transformation and animation. Although the work originates from the physical, the artist says, “the digital is the only real artwork, and the physical fragments are still frames to the animation. The physical pieces are like tools to create the final digital work.”

Spinning Circle, Mattia Cuttini

In a similar vein to Zucker and Cuttini’s fusion of the digital and the physical, Matt Kane draws from his experiences as an exhibiting painter to create intricate and layered patterns in M87 Black Hole Deconstruction #9. Kane is known for building custom software to create his signature vector digital art. He first conceived the idea of writing his own algorithms in 2005 and self-learnt programming skills to achieve this goal. Kane shares, “This desire to build my own software arose out of a promise I made myself when I was 19 – if I were ever to become a digital artist, I’d create my own software, the same way some painters grind their own pigments or stretch their own canvases.” In the creation of this artwork, the artist used an object tracking algorithm to follow a bright red sticker that was stuck on his forehead, while a camera captured the artist as he mediated through the tragic loss of a friend. Recording his movements and expressions as data, the artwork can be seen as a self-portrait, processed through the custom software that lies at the heart of his practice. Kane’s M87 Black Hole Deconstruction #9 builds upon the artist’s painterly expertise, while challenging the misconception that digital paintings may be impersonal or devoid of the artist’s hand.

M87 Black Hole Deconstruction #9, Matt Kane

Osinachi’s In Touch similarly offers a glimpse into the personal experiences of the artist, as the work pays tribute to the artist’s Igbo heritage. Osinachi says, “my work looks at personal experiences within a technological environment. I try to make sense of the experiences I have had growing up, as a Nigerian, as an African, and confront the challenges I see around me.” Reflecting upon his roots, Osinachi presents a contemporary man against the leopard, a highly respected symbol in Igbo culture and a representation of the challenges Igbos face in preserving their heritage, as understandings behind the Igbo word for leopards, Agu, are frequently thought to refer to lions, a confusion Osinachi believes arose from a difficult history of being colonized. Imprinting his culture and identity onto his artworks, Osinachi’s paintings elegantly demonstrate digital art’s capability of conveying emotional sophistication and honest storytelling, prompting collectors new to the world of digital art to take a closer look.

In Touch, Osinachi

Despite the diversity of style and themes presented by the nine different works in “CryptOGs”, all of them demonstrate the evolving maturity of digital art and NFTs today, from artists who have been plugged into the crypto art conversation since its earlier days. While many of these works originate from and reference the crypto art community closely, they are also reflective of an important milestone in contemporary art histories, as methods and ways of making art continue to become more integrated with emerging technologies. From Miss Al Simpson’s virtual imagination of the Villa Borghese to Zucker’s merging of her IRL (in-real-life) cat with rainbow transmission waves, these artworks point to the continual flattening of the physical and digital worlds. “CryptOGs” is not only a celebration of pioneers within the NFT realm, but also an incisive look into the digital condition that you and I both inherit today, and will continue to push forward as we look into the future.

1

Clara Peh

Clara Peh is the Founder of NFT Asia and Art Lead, Curator at Appetite Singapore. She lectures on visual culture at LASALLE College of the Arts, and is an independent arts writer and researcher. She graduated from the Courtauld Institute of Art with a Master’s in Art History.

Art

Tech

Curators' Choice

When Is Men’s History Month?

When Is Men’s History Month?

Above: “data privacy” by stockcatalog licensed under CC BY-SA 2.0

3 years ago

Editorial is open for submissions: [email protected]

by Joe Gisondi

See full article HERE

A Different Kind of Overcompensation

I was naive to think that the crypto art community would have been different than the real world. 

The last two weeks I have listened to stories from women in the crypto art community and it wasn’t enough time.

The fear felt by many of those female artists I spoke with was palpable. Some are terrified to stand up and say something in this growing digital community. So afraid of backlash I cannot even use their names, 

I don’t know if I want to expose myself on this level just yet, particularly when the internet can be such a vicious place. You see how women get treated when they really put themselves out there, too. The second I do…the trolls will be tearing me apart as a physical person, my looks, my facial expressions, my voice, etc.

Some have gone so far as to even hide their gender,

I recently made an account for my art under a pseudonym that has no associated gender. I have fully disassociated it from my real gender (she/her) identity…People seem to be way more open to collaboration- ‘dude this is so sick let’s network’ or ‘bro that’s some dope shit, we should collab.’

The subsets of a minority community, e.g. sex workers, are worse.

@crypt0natrix details her experience as a sex worker in the crypto art world in an op-ed she wrote:

“The first time I shared a newly minted NFT on Rarible’s Discord, the response was: ‘That’s not art. There’s no point in minting, selling, or showing that.’ For reference, I had maybe eight Twitter followers at the time – no support system. I replied by pointing out that if a man tokenized the same thing using a random woman’s body, no one would tell him it’s ‘not art.’ Because men get applauded for doing whatever they please with women’s bodies, with or without consent, while we get shamed for doing what we want with our own.”

Her full article details more experiences such as this.

The experiences of women in the real world appear to be translating to the digital world. If this truly is the democratization of the art world, then we need to ensure that it mirrors our ideals of equality that the real world is slow to implement.

Voice.com can be the vehicle to shine a light on the dark spots of the internet that need attention but the discussions need to begin now. We are at the precipice of a moment beginning in the art world; our words and discussions matter. What we believe, what we see as issues in the real world, what we have been taught about inequities can be implemented here, right now, if we only just decide to manifest it.

No Doom, No Gloom

I am hopeful of change in the real world when we are face-to-face, again. The digital will be more difficult. But, we are at the right time and place where we can begin to shape that change.

Some women have already begun shaping this new digital world. 

One of my colleagues, Jillian Godsill, sees blockchain as an opportunity for women to shine.  

She recently wrote about how blockchain technology can help prevent sexual assault and domestic abuse

Pre-covid she was speaking around the globe on “Why Blockchain Needs Women”. Her short answer? Because diversity makes everything better. The proof? Women crash test dummies.

I like bragging to people that I know Jillian Godsil

Diversity is needed in all realms of the crypto community for it to succeed, not just artists but in art collectors as well.

Etta Tottie, a co-founder of Women of Crypto Art, is taking charge of leading the discussion and steer the movement before it gets off track,

“There’s art for every taste but personally, I’m bored seeing women portrayed as bald naked robots. I know it’s a popular trend right now and there is a demand for it but I don’t know any women collectors who would buy art like that.”

“If art platforms are trying to attract more women collectors they should consider the diversity of art they are featuring on their website. Too many sexy robots may put some women off from becoming collectors.”

With women like Jillian Godsill and Etta Tottie leading the charge our job as men is to simply support them and help amplify their message; they will take care of the rest. 

You gon’ have to pick sides or divide up into tribes

Not by skin, but by your mind, is you Satan or divine?

What’s your ideology?

Either change your behavior or save your apology

TUNDAH FIYAH BY TOBE NWIGWE FT. MUMU FRESH & LANELL GRANT

In the coming weeks I will have stories featuring female artists working hard to bring attention to issues while braving them alone and together. 

To every woman who helped shape this piece, thank you. All I had to do was listen and even then I didn’t always do a good job.

This post is published for Cryptowriter in association with Voice.

Follow Me

Twitter  Instagram

[/et_pb_column]
1

Harmon Leon

Harmon Leon is the the author of eight books—the latest is: 'Tribespotting: Undercover (Cult)ure Stories.' Harmon's stories have appeared in VICE, Esquire, The Nation, National Geographic, Salon, Ozy, Huffington Post, NPR’s 'This American Life' and Wired. He's produced video content for Vanity Fair, The Atlantic, Timeline, Out, FX, Daily Mail, Yahoo Sports, National Lampoon and VH1. Harmon has appeared on This American Life, The Howard Stern Show, Last Call With Carson Daly, Penn & Teller’s Bullshit, MSNBC, Spike TV, VH1, FX, as well as the BBC—and he's performed comedy around the world, including the Edinburgh, Melbourne, Dublin, Vancouver and Montreal Comedy Festivals. Follow Harmon on Twitter @harmonleon.

Art

Tech

Curators' Choice

The Gateway: The First 4th-Dimensional NFT

The Gateway: The First 4th-Dimensional NFT

Above: “data privacy” by stockcatalog licensed under CC BY-SA 2.0

4 years ago

By an and Jose Andres

For the past week, as witnesses to the brutal events and the resulting protests unfolding across the United States – and then across the world, many crypto artists aligned themselves on the side of social justice, using art a an act of protest against racial inequality. Calling for change, they produced powerful artworks addressing the struggle against racism, police violence and inequality. 

This article offers a close look at the crypto art space, including SuperRare, Makersplace, Async Art, KnownOrigin, Rarible, Mintbase, OpenSea and DADA Collective. Through these platforms, crypto artists combine their creative power and expressions with activism to fight for social justice and equality. 

Among the artists and platforms listed below, many have donated their sales to organizations that pledge their support to the Black Lives Matter movement. 

Activism in Crypto Art

Activism is the act to challenge and change power relations in society. Art is the expression to move people emotionally, alter their perceptions in the head, body and soul. Therefore Art Activism is the practice of generating emotional and perceptual experiences that prompt acts to change society.

Throughout history the most effective civic actors have married the arts with campaigns for social change, using aesthetic approaches to provide a critical perspective on the world as it is and imagine the world as it could be. In the struggle for Civil Rights for African Americans in the US, for example, activists drew upon the stories and songs and participatory culture of the black churches, staged media-savvy stunts like Rosa Parks refusing to give up her seat on a segregated bus, played white racist reaction against peaceful protesters as a sympathetic passion play during the campaign to desegregate Birmingham, Alabama, and, most famously, used imaginative imagery (and popular cultural references) in a speech to call America to task for its racist past and articulate a dream of a better future.

WHY ARTISTIC ACTIVISM BY STEPHEN DUNCOMBE AND STEVE LAMBERT

Across the internet, crypto art engages people around the globe who are otherwise separated, in a movement demanding for justice and equality– a goal that is shared by all of humanity. Without physical limitations (especially during the time of Covid-19), crypto art platforms allow artists and collectors to make immediate responses, actions and contributions to the Black Lives Matter movement through art.

This #cryptoart community is 🔥 & 🖤 . It’s been very meaningful to me this week to join fellow artists, collectors, and platforms in the lane of art activism. It’s the best way I’m able to contribute to the voices, minds, and bodies constructively seeking change and justice.

MATT KANE

Together, crypto artists question the world as it is, envision a world as it should be, and join forces to fight for a better world of the future.

I Can’t Breathe, Osinachi
On May 25, 2020, an African-American man, George Floyd was killed by a police officer in Minneapolis. This is just one of the many incidents in which black people have been brutalised and killed by the police in the US. So, as expected, it has sparked global outrage, even leading to the arrest of the officer. This piece recollects that event, pointing out “I CAN’T BREATHE”, which Floyd repeated said as the officer choked him with his knee. It is a sad phrase that we have heard over and again in cases of police brutality against African-Americans. As a black person, I am deeply touched by this. Part of the proceeds from this NFT will go to the Black Lives Matter movement. #JusticeforGeorgeFloyd

8 minutes 46 seconds – In Memoriam George Floyd, Matt Kane
4K Animated GIF, 3840 x 2160 All proceeds from this initial sale will go to Campaign Zero: https://www.joincampaignzero.org/ On May 31st, there was an interaction between Minneapolis Police Chief Medaria Arradondo and the Floyd family in which CNN reporter Sara Sidner was a conduit, asking the family’s question of the chief. “I want to know if he’s going to get justice for my brother, arrest all the officers, and convict them.” How Chief Arradondo answered, removing his cap, should not soon be forgot. “Silence and inaction, you’re complicit,” he said of the officers he fired the day after George Floyd was murdered. If we are to see meaningful change in this world, we need leaders who are willing to buck the old culture and put forth new models. Chief Arradondo’s words set a new standard of expectation for accountability. Change arrives by leadership from within the institutions we seek change from. Therefore, we must not allow these rare interruptions to the status quo become covered over by noise. To create this animation, I introduced the database of this painting to various amounts of noise, to simulate the chaos created by so many voices speaking at once. No matter the noise, facts and the record of words spoken remain crystallized. This artwork is part of a larger series in which I investigate the people and messages featured on and aesthetics of fiat currency. I have released the first frame of this animation as a high resolution JPG, under a non-commercial license. Whomever connects to this artwork can freely print it, post it, use however suits the cause for justice. https://creativecommons.org/licenses/by-nc-sa/4.0 Additional Assets can be found here: https://collect.mattkane.com/minted-works/8-minutes-46-seconds-in-memoriam-george-floyd I ask future collectors whom sell or trade this NFT to consider taking any amount and donating toward a cause that would serve to honor the memory of George Floyd.

[/et_pb_column]

Rider in the protest, goldweard
Cast in bronze, a protester holds up a sign while riding a horse. Based on a video by dreadheadcowboy where he claims to have stolen a police horse while participating in the George Floyd protests.

BlackOutTuesday, Max Retoka

Shattered Image 1-3, MANARDS
In light of the recent events…

Solidarity, mick
The Power Fist, first used in 1917, is a symbol of unity, strength, defiance, and resistance. It has served to represent oppressed peoples and their fight against those that put unjust actions upon them. It shall continue to do so when any abusers of power continue quell the rights, freedoms, and voices of those that would challenge them. I hope a day comes that it is not needed for we have come to learn that we are a human race first and foremost.

No Peace Without Justice, jivinci
Depicting the death of yet another man of colour , at the hands of police agression. This piece shows the outrage this event sparked through minneaopolis and the world. In solidarity with everyone who got hurt and the death of George Floyd on 25th may, which became the last straw of a decade worth fighting for equality. Part of the proceeds of this piece will go to the #blacklivesmatter movement original painting by Caravaggio (1608)

[/et_pb_column]

Series of 3 by zeit
I can’t breathe [Eric Garner] (left), ‘I can’t breathe’ is a portrait of the death of Eric Garner, killed by police during arrest in 2014, NY. This is the still version, colored.
MINNEAPOLIS2020 (central), MINNEAPOLIS2020 displays the dead of George Floyd, killed by police. The painting is a blind drawing, transformed digitally and tokenized. gif in 480 × 640px.
OUR HOUSE (right), ‘OUR HOUSE’ is a digitally transformed artwork based on a shot made during the riots in Minneapolis caused by the brutally death of George Floyd. The artwork is an animated gif in 512 × 640 px.

THE BELLS OF FREEDOM, miss al simpson
All of the proceeds of the sale of this artwork will go to the Black Lives Matter movement, in memory of George Floyd. On August 28, 1963, the March on Washington for Jobs and Freedom took place. A. Philip Randolph led off the day, closing his speech with the promise that “We here today are only the first wave. When we leave, it will be to carry the civil rights revolution home with us into every nook and cranny of the land, and we shall return again and again to Washington in ever growing numbers until total freedom is ours.” On that famous day, departing from his prepared notes, Martin Luther King launched into the most famous part of his speech: “And so even though we face the difficulties of today and tomorrow, I still have a dream.” From there, he built to his dramatic ending, in which he announced the tolling of the bells of freedom from one end of the country to the other. “And when this happens…we will be able to speed up that day when all God’s children, black men and white men, Jews and Gentiles, Protestants and Catholics, will be able to join hands and sing in the words of the old Negro spiritual, ‘Free at last! Free at last! Thank God Almighty, we are free at last!’”

BROKEN, XCOPY
Proceeds will be donated to bailproject.org

Fiat est violentiam – Police State, Carlos Marcial
The 8th part of the “Fiat est violentiam” series was inspired by this quote: “When police departments are sued for police brutality, that money should come from the unions and pension funds, rather than the taxpayers. Power of the purse. When you cut off the unlimited cash supply, police will begin to give a shit.” – Todd Hagopian | 5,000 x 4,045px PNG (rendered at 100 dpi)

Black to the Future, Yura Miron
Afrofuturism is the reimagining of a future filled with arts, science and technology seen through a black lens. The term was conceived a quarter-century ago by white author Mark Dery in his essay “Black to the Future,” which looks at speculative fiction within the African diaspora. The essay rests on a series of interviews with black content creators. Dery laid out the questions driving the philosophy of Afrofuturism: Can a community whose past has been deliberately rubbed out, and whose energies have subsequently been consumed by the search for legible traces of its history, imagine possible futures? Furthermore, isn’t the unreal estate of the future already owned by the technocrats, futurologists, streamliners, and set designers ― white to a man ― who have engineered our collective fantasies? All prosceeds from sale of this artwork will be donated to the Black Visions Collective. “BLVC is committed to a long term vision in which ALL Black lives not only matter, but are able to thrive. What we know to be true in order to create this world is that oppressed people, especially Black people, need to build collective power in order to create systems transformation.” www.blackvisionsmn.org

ˈrīət, Animatttic
“See if we keep them silent, then they’ll resort to violence, and that’s how we criminalize change.” – Rou Reynolds, Enter Shikari

The Battle for Justice, Bit Errror
Inspired by the Battle of Los Angeles RATM album cover
All proceeds will be donated to blacklivesmatter.com

JUSTICE, Anonymous Nobody
An Injustice met with Justice.

Choose the Man You Will Become, Osinachi
The work of 20+ unique owners coming together in true Async community within
Osinachi’s “Choose the Man You Will Become.”
BlackOutTuesday #BlackLivesMatter #GeorgeFloyd

[/et_pb_column]

Breaking News!, An0nym0us Nobody
Black Lives Matter.
This is my first non-promotional release that is not 1/1. I feel that extraordinary circumstances call for extraordinary measures, and I’d like to get this piece in as many hands as possible in order to create awareness, show my support for the Black Lives Matter movement, and to help fund a cause that is very important to humanity.
100% of all sales will go to the Black Lives Matter movement at this address:
https://secure.actblue.com/donate/ms_blm_homepage_2019

Justice for Some 1.0, CryptoChild
Justice for Some: George Floyd lived and tragically died knowing this. Now, more and more citizens are discovering this: if they try to exercise their rights they are met with “Overwhelming force. Domination.” To fight for Justice means taking on the ‘biggest gang in town’ Justice for some leads to Justice for none.

This is America, Josie
This Artwork was created to honor the lives of Eric Garner, Michelle Cusseaux, Tanisha Anderson, Tamir Rice, Natasha McKenna, Walter Scott, Bettie Jones, Philando Castile, Botham Jean, Atatiana Jefferson, Eric Reason, Dominique Clayton, Breona Taylor, George Floyd, and so many other black people that were senselessly murdered by police officers.
If you decide to sell this NFT, please consider donating a portion of the proceeds to George Floyd Memorial Fund https://www.gofundme.com/f/georgefloyd or organizations like NAACP that are fighting to ensure a society in which all individuals have equal rights without discrimination based on race.

Black America, RETRONYMOUS
NFT from the ‘Black America’ series. Black Lives Matter.

[/et_pb_column]

No Justice No Peace
Art project by the DADA Collective in collaboration with Dapphero, in support of Black Lives Matter and police reform
99% of killings by police in the United States have not resulted in officers being charged with a crime in the period from 2013 to 2019. Images of their victims circulate massively in the media but there seems to be a wall of silence around the names or photographs of the police officers that have been accused of killing unarmed Black people. They are not easy to find. As we say the names of the victims, we must also remember the names and faces of the killers. This is an aggregator of the police officers that have been involved or may be involved in the future in the violent deaths of unarmed Black people. The names and faces of the perpetrators, as well as the names of their victims and the circumstances of their deaths are now registered. immutably on the blockchain. All the information contained in the tokens is sourced from public records. A wallet has been created in the name of each victim. Each wallet holds a token with the image of their killers. The private keys of the wallets that control these tokens have been destroyed. No one controls these tokens. These tokens can’t be censored, modified, or taken down.

1

Harmon Leon

Harmon Leon is the the author of eight books—the latest is: 'Tribespotting: Undercover (Cult)ure Stories.' Harmon's stories have appeared in VICE, Esquire, The Nation, National Geographic, Salon, Ozy, Huffington Post, NPR’s 'This American Life' and Wired. He's produced video content for Vanity Fair, The Atlantic, Timeline, Out, FX, Daily Mail, Yahoo Sports, National Lampoon and VH1. Harmon has appeared on This American Life, The Howard Stern Show, Last Call With Carson Daly, Penn & Teller’s Bullshit, MSNBC, Spike TV, VH1, FX, as well as the BBC—and he's performed comedy around the world, including the Edinburgh, Melbourne, Dublin, Vancouver and Montreal Comedy Festivals. Follow Harmon on Twitter @harmonleon.

Art

Tech

Curators' Choice