Our mobile phones are a very persuasive form of computing. It engages with our direct environment and contains a lifeworthy amount of data. The devices are everywhere and have the ability to operate within several abstraction levels. It functions fully automated and coordinates human failure for example photos that are taken not saved on our mobile phone but also in an external drive called a cloud in so doing you can access your photos even when you lost or broke your phone. The life capturing devices seek to become merciless and ubiquitous memories (Galloway, 2007). Our mobile phones ask us to rethink the ethics of forgetting and the meaning behind forgetting that what we have saved. How should we engage with images that are not necessarily important anymore, a how did we measure that importance from the start? ‘’Forgetting allows people to be feasible, to evolve their social identities, to live new lives, to reconcile their own paradoxes and contractions and to be part of society’’ (Kitchin and Dodge, 2011, p. 253).
This project engages with the imagery we collect on our mobile phones in terms of waste and pollution. The link between memory, the preservation of memory and the re-enactment of memory go hand in hand with the production of elements we could mark as waste and polluting. Fake, nonvaluable elements of something sacred, personal and true. One could debate that the preservation of memory, collective if not, now a day undergoes a process of visual purification. Memories are saved as imagery, texts and objects within our physical and digital space that is prone to the aesthetic preferences of its owner. For this project, I focused on the digital memory encrypted within the hard disks of the smartphone. Images that are a subject of truthfulness and honesty always available in our pocket. Snapshot footage that embodies our mobiles preferences for aesthetics, guiding the spectator through that what is important to the individual that owns it.
Bounded digital laser print on glossy paper
150 x 80 mm (5,9 x 3,1 inch)
Galloway, A. R., & Thacker, E. (2007). The exploit: A theory of networks (Vol.21). U of Minnesota Press.
Kitchin, R., & Dodge, M. (2011). Code/space: Software and everyday life. Mit Press.