1-20 of 22 Search Results for

encryption

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
Social Text (2018) 36 (1 (134)): 81–89.
Published: 01 March 2018
...After Globalism Writing Group This section examines how we recount our lives, particularly those lost and forgotten in history. Oftentimes, the one who recounts is expected to do so with clarity and truthfulness. We turn here to other acts of recollection that involve amnesia and encryption. 2...
FIGURES
Journal Article
Social Text (2016) 34 (3 (128)): 137–152.
Published: 01 September 2016
... of the father and its necessary repression of desire in modern, cinematic capitalism. Norman is an algorithmic encryption of the law placed under duress by cine-mediated scopophilia and the mobilization of desire beyond the capacities of the symbolic order to contain it. What would Norman’s name...
Journal Article
Social Text (2018) 36 (1 (134)): 15–23.
Published: 01 March 2018
... of Christ, redemption, and salvation absorbed in a narrative of pro-life. Perhaps a rethinking of the grammars of life not conditioned by the colonial artifact of religious encryption matters in the here and now. What is a planetary framework of futurity not predicated upon the reduction of life? A planet...
Journal Article
Social Text (2004) 22 (3 (80)): 51–73.
Published: 01 September 2004
... Communication beyond Meaning 55 (telegraphy, telephony, radio, and television) and its military applications (command and control systems and encryption).8 Yet information theory also had larger implications for our...
Journal Article
Social Text (2018) 36 (1 (134)): 45–54.
Published: 01 March 2018
... of discourse, images, institutions, and practices into its operating systems. It’s all of social relations — the sordid history of “the human” — that has been encrypted into the machine architecture at the level of the code. All those punch cards perfected in the management of the colonial census and genocide...
FIGURES
Journal Article
Social Text (2017) 35 (4): 113–152.
Published: 01 December 2017
... —referencing Hans Haake’s 1965 sculpture Condensation Cube —is an encrypted server that is a casing both artistic and political. Trevor Paglin’s collaboration with WikiLeaks on Autonomy Cube is a merger of minimalist sculpture and hacktivism ( fig. 11 ). Designed for art museums, galleries, and civic spaces...
FIGURES | View All (15)
Journal Article
Social Text (2009) 27 (3 (100)): 219–222.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2009) 27 (3 (100)): 223–229.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 230.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 231–241.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 242–245.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2009) 27 (3 (100)): 247–250.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2009) 27 (3 (100)): 251–256.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 257–262.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2022) 40 (1 (150)): 135–155.
Published: 01 March 2022
... and security during preparations, using code names, encrypted communication, and technology-free in-person meetings. This implied a careful navigation of the complex balance between agility and safety. As the date approached, the European network of allies cooperated in the organization of meetings...
Journal Article
Social Text (2010) 28 (1 (102)): 35–58.
Published: 01 March 2010
...- ter, director of “Project X” — in which vocoder technology was used for speech encryption — also coordinated a wartime cryptanalysis project. His team built the sound spectrograph as the vocoder’s twin, a code- breaker. When Potter introduced the sound spectrograph to readers...
Journal Article
Social Text (2016) 34 (2 (127)): 21–44.
Published: 01 June 2016
... of language, psychoanalysis, and capital, Jean-Joseph Goux writes of the amortization of consciousness in the historical working up of the transcendental abstractions. The “I,” the phallus, the value form—these are the results of practical activities that are amortized and thus encrypted in the abstractions...
FIGURES
Journal Article
Social Text (2013) 31 (4 (117)): 25–47.
Published: 01 December 2013
...”: the accumulation of cultural leavings or the “polyvocal manifestations of the passage of people through time and space.”19 Indeed, there are unnamed yet powerfully present absences encrypted in the structures inherited from the Marcos regime.20...
Journal Article
Social Text (2010) 28 (4 (105)): 65–89.
Published: 01 December 2010
... alone defeat. As Siva Vaidhyanathan notes, “The rhetorical value of alleging a ‘network’ at the heart of a threat to security or identity is clear: It’s impossible to tell when a war against a network is over because it can’t be seen. A network can be dispersed, distributed, encrypted...
Journal Article
Social Text (2023) 41 (2 (155)): 45–73.
Published: 01 June 2023
....” Eschewing (or at least encrypting) an older language of blood and soil based in a sense of endangered social solidarity, derivative fascisms address deracinated and isolated financialized subjects, habituated to participate by and in derivative sociality. With this in mind, and in light...