Re-articulated Enquiry 13/01/25


An exploration of encryption: looking at the embedding of information in coded systems. How could one graphically explore and communicate data which is encoded? The computer was born, in a sense, to spy. This enquiry is one of investigation into the way symbols, letters, diagrams, alphabets, have been used and can be used to hide, conceal, convey, protect messages and/or truths. It may be interwoven with other disciplines such as mathematics, textiles, and technology.

Branching off from previous research into Ogham, a historic tree alphabet used for signalling and concealing information, this enquiry is growing in a direction of exploration into other ways information has been made deliberately accessible/inaccessible, and the historic development of ciphers and codes. It may include consideration of what it is to be a holder of a ‘key’ to a cipher, or the capacity to work out such a key, such as the Rosetta Stone.


Leave a Reply

Your email address will not be published. Required fields are marked *