Un aggeggetto, fatto come una vecchia bomba a mano sovietica, per catturare e trasmettere conversazioni e traffico internet (e-mail comprese). Con tanto di georeferenziazione.
Ne parla la newsletter di Kurzweil: Detonate the transparency grenade to instantly collect and leak sensitive data | KurzweilAI
The transparency grenade allows you to leak information from anywhere just by pulling a pin. The device is essentially a small computer with a powerful wireless antenna and a microphone.
It intercepts local network traffic and captures audio data, then the data is streamed anonymously to a dedicated server where it is mined for bits of emails, HTML code, images and audio material.
These are then neatly presented in the form of a feed that can be accessed when clicking on the red dot highlighting the place of the leakage on a map available online.
The ease of use and the mobility of this solution could make the transparency grenade a very powerful weapon in the hands of a concerned citizen or disgruntled civil servant.

kurzweilai.net / Credit: Transparency Grenade
Qui il link al sito degli inventori (che, per la verità, a me sembra un po’ sospetto). Si tratta di un’opera d’arte in realtà, ma fino a che punto gli autori scherzano, e quanto fanno sul serio?
Introduction
The lack of Corporate and Governmental transparency has been a topic of much controversy in recent years, yet our only tool for encouraging greater openness is the slow, tedious process of policy reform.
Presented in the form of a Soviet F1 Hand Grenade, the Transparency Grenade is an iconic cure for these frustrations, making the process of leaking information from closed meetings as easy as pulling a pin.
Equipped with a tiny computer, microphone and powerful wireless antenna, the Transparency Grenade captures network traffic and audio at the site and securely and anonymously streams it to a dedicated server where it is mined for information. Email fragments, HTML pages, images and voice extracted from this data are then presented on an online, public map, shown at the location of the detonation.
Whether trusted employee, civil servant or concerned citizen, greater openness was never so close at hand..
Details
This is a one-off object created in January 2012 by Julian Oliver for the Studio Weise7 exhibition at Labor 8, Haus der Kulturen der Welt, Berlin, curated by Transmediale 2012 Director, Kristoffer Gansing.
The core concept will continue to live on as an application for Android devices and server-side software. See the section Android application below for more..
The body is made of Tusk2700T, a highly resilient translucent resin, printed from a stereo-lithography model made by CAD designer Ralph Witthuhn based on a replica Soviet F1 Hand Grenade. Metal parts were hand-crafted from 925/1000 sterling silver by Susanne Stauch, complete with operational trigger mechanism, screw-on locking caps and engraving.
Android application
Thanks to a generous donation from Scott Robinson (@quadhome), development of an Android application is underway, for rooted Android devices. This will mimic some of the functionality of the grenade, with the TG program running ‘invisibly’ on their phone as a backgrounded application. A GUI will be provided for configuration. It will allow upload using a 2048 bit SSH tunnel over the user’s own 4G connection, automatically determining the location via the device’s own GPS system and using this to position the ‘detonation’ on the map interface. Naturally this is a little more practical than walking into a meeting with a grenade in your jacket pocket.
Due to legal concerns the author will not provide a server for using this application. However, all code will be published for study and so that others can set up their own service, should they find a worthy need for it.

transparencygrenade.com