Filter Bubbles: Hide and Seek On Your Feed
Social media platforms can bring us closer - but they also use algorithms to separate us. Find out how 'filter bubbles' are created, and how you can burst yours, in this article from the Data Detox Kit.

In May 2017 artist Joana Moll, alongside Tactical Tech, purchased 1 million online dating profiles for 136€ from USDate, a supposedly US-based company that trades in dating profiles from all over the globe. The batch of dating profiles we purchased included pictures (almost 5 million of them), usernames, e-mail addresses, nationality, gender, age and detailed personal information about all of the people who had created the profiles, such as their sexual orientation, interests, profession, thorough physical characteristics and personality traits. Purchasing this data exposed a vast network of companies that are capitalising on this information without the conscious consent of the users, whom ultimately are the ones being exploited. This project discloses the original dating profile dataset we received from USDate after purchasing it and offers an extensive report on the origin of the profiles and the vast network of companies that are capitalising on them.
Joana Moll is a Barcelona / Berlin based artist and researcher. Her work critically explores the way post-capitalist narratives affect the alphabetization of machines, humans and ecosystems.
Social media platforms can bring us closer - but they also use algorithms to separate us. Find out how 'filter bubbles' are created, and how you can burst yours, in this article from the Data Detox Kit.
This paper looks at shrinking civic space in terms of the digital, in particular the role that digital technologies can have on restricting the spaces of civil society organisations and their activities.
There has been a lot of resources written on safer use of digital technologies and social media platforms for CSOs, grassroots groups, activists and politically-active individuals. Here we present a curated list of resources, a pool of links that can help you respond to existing risks and threats.
One of 14 country studies looking at how data is used in political processes. This report, published in partnership with Elonnai Hickok, looks at the use of digital platforms and technologies in Indian elections.
At every stage, travelling means giving away an immense amount of data that is either required by governments or by companies that provide travel-related services, or that can be automatically generated in the background. This article gives insight into the data you give away when travelling.
In this overview we analyse the challenges faced by politically-active women who are using digital technologies to express themselves, politically organise or carry out their work.
Caroline Sinders explains how machine learning is already changing product design and software and how this might impact ethics and the agency of humans.
Kate J. Sim examines how the prevailing cultural notion of sexual assault survivors as liars, and the widely held belief of technological objectivity, converge to instruct the design of anti-rape technologies.
The GDPR compliance explained with a last-minute checklist for civil society organisations and grassroot groups to help you check that you are handling data according to the GDPR requirements.
When you tweet your opinion about Brexit or Trump, you probably don't expect the content of your tweet to become part of an analysis of public opinion on the topic. This article explains the emerging field of digital listening and how it assess the feeling of individual potential voters and the overall public mood.
Weaponised design is a process that allows for harm of users within the defined bounds of a designed system. This article takes a look at how it can be faciliated by designers who are oblivious to the politics of digital infrastructure or consider their design practice output to be apolitical.
This article examines a few moments related to the history of homosexuality and its categorisation. It starts with recent facial recognition algorithms to distinguish straight and gay faces and ends with Alan Turing’s questions about gender and The Imitation Game.