top of page
VULNERABLE
 

Hacking always involves two parts: the hacker and the hack.
The hacker investigates thoroughly who to hack in order to discover his vulnerabilities and exploit them. 
Hacking exists due to "the flaws in the system”.
The weakness of one becomes the strength of the other.

Vulnerability is everywhere. 
It’s part of everything. 
It depends on the observer’s point of view. 
Suspended images. Instants. 
A series of authentic shots stolen to a fleeting dimension.

Contact

Gaia Magurno

gaia_magurno@studenti.naba.it

Annamaria Naso 

annamaria_naso@studenti.naba.it

Barbara Rizzo

barbara_rizzo@studenti.naba.it

Gaia Magurno Annamaria Naso Barbara Rizzo 

bottom of page