Graduated from UAL: London College of Communication in BA Graphic and Media Design in 2015.

Send me an email at


64 computer controlled players that are each assigned different characteristics battle it out in a tournament of the classic video game Pong.


Encrypted data is intended to be indistinguishable from random data until a correct key is provided.

This computer runs a script that will cause it to continuously create files with a size of 5 MiB.

[1] A random 1/3 of these files contain random data sourced from Wikipedia Encrypted with a 24 character password.
[2] The remaining 2/3 of these files are generated as pseudo-random binary data, noise.

These two types of files are indistinguishable from each other, even under close analysis. Unless a correct key is provided they will both appear as noise.

In the UK, under the 'Regulation of Investigatory Powers Act', if you are thought to have had access to a key for an encrypted file in your possession that is under investigation, you can be convicted for failing to provide a key.

Every decision the macro makes is sourced from random data. This means the owner of the computer has no knowledge of which files are encrypted data and which are just noise. Even then, there is no way to know what the contents of the encrypted files are, or the passwords to the encrypted files.

[1] Encrypt Data:
a. Save content from random wikipedia article.
b. Use TrueCrypt software to encrypt saved data with 24 character password.

[1] Generate Random Data:
a. Use "/dev/urandom" command on Terminal to generate 5 MiB of random binary data.

Counter-Strike Grenade Mapping

A series of posters mapping out the paths of all thrown projectiles in the game Counter-Strike: Global Offensive, a multiplayer first person shooter video game. The data is parsed from replay files from the DreamHack Winter 2014 CS:GO grand finals.

de_dust2 poster de_inferno poster de_overpass poster

Generating Loss

A short clip of someone talking about the changes computers are bringing to business is fed through a vhs machine repeatedly until nothing is left.

Twitter Triggered Sound

Geotag data attached to Tweets means they can be organised based on longatude and then a corresponding note played. Throughout the day the activity in different areas of the world changes meaning the most dominant note will be different over the course of 24hours.

Surveillance in the Home

When Microsoft announced the Xbox One, there was a lot of debate surrounding the controversial feature of the 'Kinnect' system being 'Always On' and listening, as well as its potential use for licence enforcement through face recognition.