Exploring the consequence of destruction through the rearrangement of internet-sourced portraits using software hacking, custom-scripting, and the manual arrangement of image bytes
Exploring the consequence of destruction through the rearrangement of internet-sourced portraits using software hacking, custom-scripting, and the manual arrangement of image bytes