top of page
VULNERABLE
Hacking always involves two parts: the hacker and the hack.
The hacker investigates thoroughly who to hack in order to discover his vulnerabilities and exploit them.
Hacking exists due to "the flaws in the system”.
The weakness of one becomes the strength of the other.
Vulnerability is everywhere.
It’s part of everything.
It depends on the observer’s point of view.
Suspended images. Instants.
A series of authentic shots stolen to a fleeting dimension.
Contact
Gaia Magurno
Annamaria Naso
annamaria_naso@studenti.naba.it
Barbara Rizzo
barbara_rizzo@studenti.naba.it
bottom of page