‘Face to Facebook’ Is Part Art, Part Hack

‘Face to Facebook’ Is Part Art, Part Hack

Featured

Feb 9, 2011
Part art project, part dating site, and part ingenious hacking exercise, ‘Face to Facebook’ is the brain child of Paolo Cirio and Alessandro Ludovico. The digital artists stole (in their own words) one million Facebook profiles — everything from interests to photos — provided that data was public. With their massive collection of liberated data, Cirio and Ludovico began poring over the information when they struck upon an idea that seemed rather obvious in retrospect: that people are on Facebook to meet other people. The goal is to connect with others, potentially in a romantic way. So the duo decided to filter the accounts based on their profile photos. Images were fed through an algorithm that sorted accounts into certain personality types (such as “easy going” or “funny”) based on facial expressions. The pre-sorted accounts were then posted to a site called Lovely Faces.'Face to Facebook As a companion piece to the site, Cirio and Ludovico collected more than 2,000 of the profile images, printed them out and mounted them at the Transmediale Festival in Berlin.

Frequently Asked Questions?

Blockchain is a decentralized, distributed ledger that records transactions across multiple computers. It ensures transparency, security, and immutability in data storage.
AR overlays digital information onto the real world through devices like smartphones or AR glasses, enhancing the user's perception of the environment.
IoT refers to the network of interconnected devices that communicate and share data. It enables smart homes, wearable tech, and efficient industrial processes.
AI involves creating computer systems capable of performing tasks that typically require human intelligence. It includes machine learning, natural language processing, and computer vision.
VR creates a simulated environment that users can interact with. It typically involves the use of VR headsets to provide an immersive experience.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks. It includes measures like firewalls, antivirus software, and encryption.
Search
Subscribe

Join our subscribers list to get the latest news and special offers.