The waveform is a veil: hacking sound and the illusion of ownership

“Don’t make a sound”? Ironically, one of the most effective ways to sneak into a computer system is by making a sound.

Read more

Maryanne Amacher

To open the “third ear”, as she called it, all of these components had to be exact to her specifications, without compromise.

Read more
Go top