Posts
Just yesterday I went to the Lumisfera show. There, a symphony orchestra plays covers of…
January 3, 2026 at 5:08 PM•Max Knyazev is typing…Telegram mirror

Just yesterday I went to the show
Lumisfera
. There the symphony orchestra plays covers of various musical works (
although there were even elements of ballet
). It was super cool, honestly, I recommend it to everyone. On my profile (
@MaxiEnergy
) the stories are there, if you want, take a look
📱
But the channel is not about music. So here it is
The show took place at the Gelendzhik Arena ( yes, I celebrated New Year by the sea, because because ). And so I walk into the foyer, and there is an exhibition that I did not expect to see right here.
😳
Author of the works, Krivenko Damir Petrovich , working in the direction palitrism ( he is also the founder of this direction ). And this is really my weakness, when art begins to become friends with technology, hardware and texture. I love finding beauty in man-made technologies and the deep understanding of technology by purely creative people. Actually, that’s why I didn’t pass by and filmed a bunch of everything for you. I’ll add everything I took in the comments to this post.
🤝
And now to the work, which fits perfectly into the theme of the channel ( it is located above all this text in the post )
"Hacker." 2014 Plastic, oil, elements of computer systems ( in fact, these are motherboards assembled into a mosaic ). And on top of this, a black silhouette of a man. Without a face or any details. Just extruded darkness, represented by a silhouette. In the job description the phrase "The whole world knows who a hacker is, but who knows what he looks like?"
I haven't gone far from art ( I went to art studio for 7 years + classical guitar for 5 years ). Therefore, let's try to analyze this work from the perspective of painting and my main activity ( information protection ). Light analysis. Let's go
⤵️
In the work, the author showed us the nature of myth. A hacker in popular culture is always someone wearing a hood, with green letters, and an anonymous mask. But when you look at this work, the hood disappears. There remains a void, or rather, a place for projection. Everyone adds their own stuff there. Someone imagines an intruder. To someone, a person whose face we do not see. Whom we can't identify
🧐
The silhouette stands directly against the background of the motherboards. And this beautifully hits at the simple idea that in the digital world a person is often perceived as a function of the system. Not a personality, but an interface. Not a biography, but access. Not a face, but a role. Today you are an admin, tomorrow you are a pentester, the day after tomorrow you are the same "p" suspicious type" because you just have specific knowledge and hands from the right place
🧠
The composition seems to say that the “hacker” is not one person. This is an environment or an entire culture. This is the accumulated experience of generations of hardware and software. These boards look like an archeology of technology ( How do you like the metaphor?). Different colors, different eras, different standards. And the silhouette is one, universal, because history always repeats itself. Boards change, OSes change, languages change, but the principle is the same. Those who understand the system can break it. Or fix it. Sometimes on the same day
🥳
People of my direction ( yes, including me ) in fact can also be called “hackers”, although I don’t particularly like this word and try to avoid it ( in my channel you will hardly find any mentions of him ). We do exactly what is scary about the word “hacker”. We look for weaknesses, think about how to bypass restrictions, simulate attacks, and sometimes also show all this in reports
😉
The difference is not in skills, but in vector and responsibility. One person sees a hole and thinks about how to crawl through it. Another sees a hole and thinks about how to patch it. But the tools, thinking, passion, attention to detail, all this is from the same universe
💀
And therefore the silhouette without a face is very appropriate here. Because the face of a hacker, like the face of an information security specialist, is almost always unimportant. What matters is what you do and whether you know how to stop
Look at the work again carefully after everything that you have read here, and catch yourself thinking about who exactly you drew there in this silhouette ( and then tell us in the comments what you think about it all ). Interesting to chat
👨💻
#information_security
Open original post on TelegramBut the channel is not about music. So here it is
The show took place at the Gelendzhik Arena ( yes, I celebrated New Year by the sea, because because ). And so I walk into the foyer, and there is an exhibition that I did not expect to see right here.
Author of the works, Krivenko Damir Petrovich , working in the direction palitrism ( he is also the founder of this direction ). And this is really my weakness, when art begins to become friends with technology, hardware and texture. I love finding beauty in man-made technologies and the deep understanding of technology by purely creative people. Actually, that’s why I didn’t pass by and filmed a bunch of everything for you. I’ll add everything I took in the comments to this post.
And now to the work, which fits perfectly into the theme of the channel ( it is located above all this text in the post )
"Hacker." 2014 Plastic, oil, elements of computer systems ( in fact, these are motherboards assembled into a mosaic ). And on top of this, a black silhouette of a man. Without a face or any details. Just extruded darkness, represented by a silhouette. In the job description the phrase "The whole world knows who a hacker is, but who knows what he looks like?"
I haven't gone far from art ( I went to art studio for 7 years + classical guitar for 5 years ). Therefore, let's try to analyze this work from the perspective of painting and my main activity ( information protection ). Light analysis. Let's go
In the work, the author showed us the nature of myth. A hacker in popular culture is always someone wearing a hood, with green letters, and an anonymous mask. But when you look at this work, the hood disappears. There remains a void, or rather, a place for projection. Everyone adds their own stuff there. Someone imagines an intruder. To someone, a person whose face we do not see. Whom we can't identify
The silhouette stands directly against the background of the motherboards. And this beautifully hits at the simple idea that in the digital world a person is often perceived as a function of the system. Not a personality, but an interface. Not a biography, but access. Not a face, but a role. Today you are an admin, tomorrow you are a pentester, the day after tomorrow you are the same "p" suspicious type" because you just have specific knowledge and hands from the right place
The composition seems to say that the “hacker” is not one person. This is an environment or an entire culture. This is the accumulated experience of generations of hardware and software. These boards look like an archeology of technology ( How do you like the metaphor?). Different colors, different eras, different standards. And the silhouette is one, universal, because history always repeats itself. Boards change, OSes change, languages change, but the principle is the same. Those who understand the system can break it. Or fix it. Sometimes on the same day
People of my direction ( yes, including me ) in fact can also be called “hackers”, although I don’t particularly like this word and try to avoid it ( in my channel you will hardly find any mentions of him ). We do exactly what is scary about the word “hacker”. We look for weaknesses, think about how to bypass restrictions, simulate attacks, and sometimes also show all this in reports
The difference is not in skills, but in vector and responsibility. One person sees a hole and thinks about how to crawl through it. Another sees a hole and thinks about how to patch it. But the tools, thinking, passion, attention to detail, all this is from the same universe
And therefore the silhouette without a face is very appropriate here. Because the face of a hacker, like the face of an information security specialist, is almost always unimportant. What matters is what you do and whether you know how to stop
Look at the work again carefully after everything that you have read here, and catch yourself thinking about who exactly you drew there in this silhouette ( and then tell us in the comments what you think about it all ). Interesting to chat
#information_security
Discussion
Comments
Comments are available only to confirmed email subscribers. No separate registration or password is required: a magic link opens a comment session.
Join the discussion
Enter the same email that you already used for your site subscription. We will send you a magic link to open comments on this device.
There are no approved comments here yet.