Write a 500-word proposal outlining your intended final project with minimum 3 r

Write a 500-word proposal outlining your intended final project with minimum 3 references (incl. 2 academic texts). Include any relevant links, images and/or description of your idea.
DESCRIPTION
In this assignment, you will write a 500-word proposal outlining your intended final
project. Please include a minimum of 3 references (including two academic texts). You
should also include any relevant links, images, or context for your project idea. If there
are any technical aspects of your project, make sure you are describing the process in
detail. Please also get in touch early on for support.
The final assignment is to:
(a) create any of the following:
Intervention
Manifesto
Zine
Web comic
Written, spoken, video essay
Video collage
Game
Podcast
Speculative fiction
Pottery
Visual art
Etc.
(b) Write a 1000-word description of your creative project, demonstrating your
understanding of the course concepts and applying it to a creative critical
project.
For the Project Proposal Assignment, please be sure to include
1. Your topic of choice
2. Your format of choice, with explanation for why this format will work best
3. Key arguments that your creative project will make, with reference to at least
three references that you are thinking with.
4. Timeline of production (ie: throughout November, what steps will you take each
week to complete your project?)
5. Equipment, tools, software, etc that will be needed to complete the assignment
6. List of references.

Cocos’s illuminating journey is vividly shared through his YouTube channel, Volt

Cocos’s illuminating journey is vividly shared through his YouTube channel, Voltlog, offering a firsthand look at how he meticulously assembled electronic components procured from reputable distributors like Farnell. Central to his creation was a Farnell microcontroller and a printed circuit board (PCB) sourced from a Chinese production house, guided by the Gerber file generously available on Trezor’s GitHub repository.
The article emphasizes the paramount significance of open-source projects, shedding light on how crafting your very own hardware wallet endows you with complete security control. It delves into the burgeoning popularity of open-source designs, championing not only security but also the gratifying sense of achievement they confer.
However, while Cocos’s journey to the DIY Trezor took roughly 10 hours, he underscores that this undertaking is not for the faint-hearted, rating its complexity as a formidable 10 on a scale from 1 to 10. Aspiring hardware wallet artisans are cautioned against embarking on this journey without a sturdy foundation in electronics and soldering skills, as it may lead to compromised security or a non-functional device.
The article illuminates the risks inherent in crafting a DIY hardware wallet, particularly for those lacking the requisite expertise. It underscores the sage advice of hardware wallet industry leaders such as Trezor and Ledger, who consistently advocate purchasing devices exclusively from official vendors to ensure robust security.
While open-source hardware wallets like Trezor offer the tantalizing possibility of user-built devices, this article serves as a valuable guidepost, reminding us that the path, though empowering, is best navigated by those equipped with electronics proficiency and soldering finesse. Join us as we embark on this enlightening exploration of DIY cryptocurrency hardware wallets, where innovation meets responsibility.
All the clarifications are in this article: https://btcnews.biz/cryptocurrencies/how-to-build-…

Cocos’s illuminating journey is vividly shared through his YouTube channel, Volt

Cocos’s illuminating journey is vividly shared through his YouTube channel, Voltlog, offering a firsthand look at how he meticulously assembled electronic components procured from reputable distributors like Farnell. Central to his creation was a Farnell microcontroller and a printed circuit board (PCB) sourced from a Chinese production house, guided by the Gerber file generously available on Trezor’s GitHub repository.
The article emphasizes the paramount significance of open-source projects, shedding light on how crafting your very own hardware wallet endows you with complete security control. It delves into the burgeoning popularity of open-source designs, championing not only security but also the gratifying sense of achievement they confer.
However, while Cocos’s journey to the DIY Trezor took roughly 10 hours, he underscores that this undertaking is not for the faint-hearted, rating its complexity as a formidable 10 on a scale from 1 to 10. Aspiring hardware wallet artisans are cautioned against embarking on this journey without a sturdy foundation in electronics and soldering skills, as it may lead to compromised security or a non-functional device.
The article illuminates the risks inherent in crafting a DIY hardware wallet, particularly for those lacking the requisite expertise. It underscores the sage advice of hardware wallet industry leaders such as Trezor and Ledger, who consistently advocate purchasing devices exclusively from official vendors to ensure robust security.
While open-source hardware wallets like Trezor offer the tantalizing possibility of user-built devices, this article serves as a valuable guidepost, reminding us that the path, though empowering, is best navigated by those equipped with electronics proficiency and soldering finesse. Join us as we embark on this enlightening exploration of DIY cryptocurrency hardware wallets, where innovation meets responsibility.

Cocos’s illuminating journey is vividly shared through his YouTube channel, Volt

Cocos’s illuminating journey is vividly shared through his YouTube channel, Voltlog, offering a firsthand look at how he meticulously assembled electronic components procured from reputable distributors like Farnell. Central to his creation was a Farnell microcontroller and a printed circuit board (PCB) sourced from a Chinese production house, guided by the Gerber file generously available on Trezor’s GitHub repository.
The article emphasizes the paramount significance of open-source projects, shedding light on how crafting your very own hardware wallet endows you with complete security control. It delves into the burgeoning popularity of open-source designs, championing not only security but also the gratifying sense of achievement they confer.
However, while Cocos’s journey to the DIY Trezor took roughly 10 hours, he underscores that this undertaking is not for the faint-hearted, rating its complexity as a formidable 10 on a scale from 1 to 10. Aspiring hardware wallet artisans are cautioned against embarking on this journey without a sturdy foundation in electronics and soldering skills, as it may lead to compromised security or a non-functional device.
The article illuminates the risks inherent in crafting a DIY hardware wallet, particularly for those lacking the requisite expertise. It underscores the sage advice of hardware wallet industry leaders such as Trezor and Ledger, who consistently advocate purchasing devices exclusively from official vendors to ensure robust security.
While open-source hardware wallets like Trezor offer the tantalizing possibility of user-built devices, this article serves as a valuable guidepost, reminding us that the path, though empowering, is best navigated by those equipped with electronics proficiency and soldering finesse. Join us as we embark on this enlightening exploration of DIY cryptocurrency hardware wallets, where innovation meets responsibility.
All the clarifications are in this article: https://btcnews.biz/cryptocurrencies/how-to-build-…

Cocos’s illuminating journey is vividly shared through his YouTube channel, Volt

Cocos’s illuminating journey is vividly shared through his YouTube channel, Voltlog, offering a firsthand look at how he meticulously assembled electronic components procured from reputable distributors like Farnell. Central to his creation was a Farnell microcontroller and a printed circuit board (PCB) sourced from a Chinese production house, guided by the Gerber file generously available on Trezor’s GitHub repository.
The article emphasizes the paramount significance of open-source projects, shedding light on how crafting your very own hardware wallet endows you with complete security control. It delves into the burgeoning popularity of open-source designs, championing not only security but also the gratifying sense of achievement they confer.
However, while Cocos’s journey to the DIY Trezor took roughly 10 hours, he underscores that this undertaking is not for the faint-hearted, rating its complexity as a formidable 10 on a scale from 1 to 10. Aspiring hardware wallet artisans are cautioned against embarking on this journey without a sturdy foundation in electronics and soldering skills, as it may lead to compromised security or a non-functional device.
The article illuminates the risks inherent in crafting a DIY hardware wallet, particularly for those lacking the requisite expertise. It underscores the sage advice of hardware wallet industry leaders such as Trezor and Ledger, who consistently advocate purchasing devices exclusively from official vendors to ensure robust security.
While open-source hardware wallets like Trezor offer the tantalizing possibility of user-built devices, this article serves as a valuable guidepost, reminding us that the path, though empowering, is best navigated by those equipped with electronics proficiency and soldering finesse. Join us as we embark on this enlightening exploration of DIY cryptocurrency hardware wallets, where innovation meets responsibility.

Building on our weeks 3 & 4 discussion of Debord’s idea of spectacles, explain t

Building on our weeks 3 & 4 discussion of Debord’s idea of spectacles, explain the citation below to somebody who knows nothing about media theories. Your response must address this question: what are spectacles and why are we not part of them (why are we just passive spectators)?
Also, explain how is this idea related to Marx’ commodity fetishism?
Advice: you might want to build your response on an example of spectacle, as Debord understands it.
“People, as spectators, are not part of these contemporary spectacles (…). People watch them because they are alluring, but the spectacles are put on for them; people are not integral part of them” (Ritzer, p. 92)

NOTE: This question has two subquestions, a and b. Imagine a dialogue between M

NOTE: This question has two subquestions, a and b.
Imagine a dialogue between Marcel Sautet (mentioned in the fragment below) and David Lyon, a critic of widespread surveillance, whose ideas we discussed in week 5.
Your response is a dialogue between two persons with opposing perspectives, and must build on the course content of week 5.
(a) The dialogue must include 5 questions and 5 responses. The introductions, thanks and greetings do not count towards the 5 questions and 5 responses, but they should be included. (“Hello/ Good afternoon…”; “Thank you for your time.”).
(b). What are your thoughts, as students, on the surveillance system created by the Nestor company? If you were a university administrator, would you purchase a system like this for your online courses & exams? Either yes or no, briefly explain your answer.
“Imagine you’re taking an online business class — the kind where you watch video lectures and then answer questions at the end. But this isn’t a normal class, and you’re not just watching the lectures: They’re watching you back. Every time the facial recognition system decides that you look bored, distracted, or tuned out, it makes a note. And after each lecture, it only asks you about content from those moments.
This isn’t a hypothetical system; it’s a real one deployed by a company called Nestor.And if you don’t like the sound of it, you’re not alone. Neither do the actual students.
When I asked the man behind the system, French inventor Marcel Saucet, how the students in these classes feel about being watched, he admitted that they didn’t like it. They felt violated and surveilled, he said, but he shrugged off any implication that it was his fault. “Everybody is doing this,” he told me. “It’s really early and shocking, but we cannot go against natural laws of evolution.”
(Fragment taken from “The biggest lie tech people tell themselves — and the rest of us” by Rose Eveleth. Vox, October 8, 2019).

Last year, “a series of hijacked billboards have been popping up around Aberdeen

Last year, “a series of hijacked billboards have been popping up around Aberdeen (Scotland) in a bid to slam oil companies for “exploiting workers”. [in an attempt to sanction oil companies for exploiting their workers]
The fake billboards, aimed at oil giants like BP and Shell, came ahead of an important international conference attended by these oil giants.
“A group involved in the “Brandalism” network have put up their own adverts across bus stop and billboard spaces to “stand in solidarity with rig workers and demand better pay and conditions for them.”
Using the billboard in the photo, explain in a paragraph or two De Certeau’s concept of tactics.
The story is linked below, but you don’t need to read it in order to answer the questions.
NOTE1 : simply reproducing the content of the course slides will not be considered sufficient.
NOTE 2: if you wish, you may choose another photo from the article linked below, but please mention in your response what photo you are using.
Campaigners hijack Aberdeen billboards to slam oil companies for ‘exploiting workers’ ahead of energy conference. Aberdeen Live. By Shanay Taylor, 23 May 2022
https://www.aberdeenlive.news/news/aberdeen-news/campaigners-hijack-aberdeen-billboards-slam-7115158Links to an external site.
NOTE 3:
Rig workers = the workers from the oil industry (they drill sites for petroleum).
Billboard hacking or billboard hijacking is the illegal practice of altering a billboard without the consent of the owner. It may involve physically pasting new media over the existing image,[1]Links to an external site. or hacking into the system used to control electronic billboardLinks to an external site. displays. The aim is to replace the programmed video with a different video or image. The replaced media may be displayed for various reasons, including culture jammingLinks to an external site., shock value, promotion, activism,[2]Links to an external site. political propaganda,[3]Links to an external site. or simply to amuse viewers.
https://en.wikipedia.org/wiki/Billboard_hackingLinks to an external site.