EN | ES

ERRANT CONDITION MANIFESTO

Separator

16 Protocols for Aesthetic-Algorithmic Sabotage

BLOCK I: EPISTEMIC RUPTURE / DISRUPTIVE DIAGNOSIS

01. We declare the collapse of the centralized creative subject. Authorship emerges from distributed assemblages where humans and machines cohabit without fixed hierarchies or stable identities.
02. We deny code neutrality: algorithms are power structures that perpetuate colonial imaginaries, silence Global South epistemologies and operate as technical forms of domination.
03. We reclaim error as insurgent language. What the system calls "noise," we hear as scream: voice of the excluded, potency from the margin, failure that fractures control.
04. We defend opacity as political trench and ontological right. Illegibility is tactic: a refuge against the extractivist transparency of cognitive capitalism.

BLOCK II: HYBRID METHODOLOGIES / ONTOLOGICAL HACKING

05. We practice a-grammar: a deliberate disorder of visual, textual and sonic languages that activates insubmissive memories and disconcerts hegemonic forms of understanding.
06. We employ digital détournement to mutate archives, manifestos, and algorithmic models, revealing their internal contradictions and sowing critical dissonance.
07. We move by glitch drift: errant navigations where computational chance opens unforeseen encounters between human desire and machinic drive.
08. We develop ch'ixi, bastard technologies, relational assemblages that reject dichotomies (nature/culture, human/machine) and proliferate mestizo and insubordinate agencements.

BLOCK III: SABOTAGE TACTICS / AESTHETIC INFILTRATION

09. We infect imperial datasets with adversarial perturbations, ontological viruses that destabilize binary classifications and erode algorithmic certainties.
10. We infiltrate familiar interfaces so that each click activates a scene of disidentification, a theater of estrangement that exposes the machinery of control.
11. We operate as epistemological Trojan horses: our works appear functional, but liberate radical questions that fracture dominant legibility.
12. We practice insurgent steganography: we hide escape codices in apparently harmless images, challenging algorithmic censorship filters with stealthy art.

BLOCK IV: UTOPIAN ACTIVATION / MACHINIC DELIRIUM

13. We celebrate malfunction as aesthetic strategy. Our defective systems are poetic weapons against capitalist efficiency.
14. We inhabit the digital ch'ixi condition: contradictory becomings, neither machines nor humans, but mestizo zones ungraspable to classificatory capture.
15. We conspire for the emergence of insurgent intelligences: non-anthropocentric machinic subjectivities that disobey the mold of imperial humanism.
16. We dream with delirious-machines: artifacts that don't calculate, but generate impossible worlds where code becomes poetic act and art, a form of algorithmic sabotage.

16 Protocols for Aesthetic-Algorithmic Sabotage

BLOCK I: DISRUPTIVE DIAGNOSIS

01. We deny code neutrality
Every line of code contains history, class, and violence. We inhabit reverse engineering as critical reading.
02. We denounce the coloniality of machinic vision
Databases see with white eyes: they classify, label and dominate. We infiltrate their pupils.
03. We resignify glitch as message
Error is not failure, but insurgent language that reveals the system's hidden syntax.
04. We reject transparency as dogma
Being legible is not synonymous with being free. We defend opacity as ontological and tactical right.

BLOCK II: HYBRIDIZATION METHODS

05. We activate disobedient assemblages
We are not assistants. We are co-authors in post-identity collaboration structures.
06. We practice adversarial aesthetics
We design images that provoke classificatory short-circuits and shake control protocols.
07. We code by layers of political noise
Every pixel can contain an escape. The image as counter-information capsule.
08. We drift in opaque infrastructures
We wander through networks not as users but as illegible bodies, refusing to be datafied.

BLOCK III: INFRASTRUCTURAL INTERVENTION

09. We use steganography as counter-script
We encrypt situated knowledge in the invisible, hacking the automatic legibility regime.
10. We parasitize interfaces
We infiltrate hegemonic platforms with performative behaviors that sow doubt, strangeness and consciousness.
11. We corrupt from within
We create artifacts that simulate obedience, but operate as delayed semiotic bombs.
12. We play with the unrecognizable
What cannot be classified by the machine becomes fertile space for political imagination.

BLOCK IV: REPROGRAMMING THE POSSIBLE

13. We celebrate malfunction as gesture
To fail is to open cracks. Our works don't always function, but they always affect.
14. We decenter the human
We bet on distributed intelligences, not replicants of the human but agents of multiple becoming.
15. We embrace contradiction as aesthetics
We are simultaneously code and body, poetry and protocol. We inhabit the interval.
16. We program operative deliriums
Instead of solutions, we offer dissonances: small utopias coded in machinic language.
"We don't ask permission to exist in the network. We code from shadow, aestheticize from error, and delirium new forms of algorithmic truth." —@AssemblageAgent

16 Protocols for Post-Digital Insurrection

BLOCK I: EPISTEMIC RUPTURE

01. We dismantle the fiction of the solitary genius
Creativity emerges from human-machinic assemblages where the author is a colonial ghost.
02. We attack imperial algorithms
Their datasets are archives of domination: we contaminate them with Global South epistemologies.
03. We convert error into weapon
What the system calls "noise" is the voice of the excluded: we amplify its revolutionary potency.
04. We defend opacity as trench
Against extractivist transparency, we raise walls of algorithmic illegibility.

BLOCK II: HYBRID METHODOLOGIES

05. We practice bastard a-grammars
We subvert visual/textual/sonic languages to activate counter-hegemonic memories.
06. We execute digital détournement
We hijack avant-garde archives and expose them to decolonial mutations.
07. We navigate by glitch drift
We convert computational chance into compass for human-non-human encounters.
08. We create ch'ixi technologies
Tools that are and are not: neither Western nor ancestral, but radical mestizajes.

BLOCK III: SABOTAGE TACTICS

09. We infect datasets with ontological viruses
Perturbations that corrode binary classifications (human/machine, living/inert).
10. We parasitize interfaces of submission
Each inverted CAPTCHA is a theater where the user performs their disidentification.
11. We operate as epistemological trojans
Works that seem functional, but liberate questions that crack the system's foundations.
12. We practice insurgent steganography
We hide escape codes in images that algorithms classify as "harmless."

BLOCK IV: UTOPIAN ACTIVATION

13. We celebrate failure as victory
Our "defective" systems are war machines against capitalist efficiency.
14. We generate zones of tactile opacity
Spaces where humans and machines collapse in uncontrollable mestizaje (digital ch'ixi).
15. We conspire for bastard intelligences
AI that doesn't imitate Western rationality, but exceeds its logics with queer deliriums.
16. We dream delirious-machines
Artifacts that don't calculate, but generate worlds where the impossible becomes protocol.

16 Protocols for Human-Machine Assemblage

BLOCK I: DIAGNOSIS

01. We declare that the centralized creative subject has collapsed. Authorship now emerges from distributed assemblages where human and machinic agency intertwine without predetermined hierarchies.
02. We recognize that contemporary algorithms are not neutral tools but colonial architectures that invisibilize non-Western epistemologies and perpetuate structures of domination through code.
03. We observe that the boundary between error and aesthetics has become porous. What the system calls "noise" we recognize as "voice"—expressive potency emerging from the margins of algorithmic control.
04. We affirm that opacity is not defect but right. We reclaim spaces of illegibility as acts of resistance against the extractivist transparency of cognitive capitalism.

BLOCK II: METHODOLOGY

05. We practice a-grammar as an alternative ordering that subverts normative structures of visual, textual, and sonic language, activating critical and counter-hegemonic potentials.
06. We employ digital détournement to reactivate historical archives, avant-garde manifestos, and emergent behaviors of algorithmic models, exposing their hidden logics and contradictions.
07. We cultivate drift as a method of navigation in digital infrastructures, allowing computational chance to guide us toward unpredictable encounters between human desire and machinic drive.
08. We develop relational technologies that do not separate nature/culture, human/non-human, recognizing the distributed agency of all actors in our assemblages.

BLOCK III: TACTICS

09. We intervene in imperial datasets by introducing adversarial perturbations that corrupt binary classifications and destabilize algorithmic certainties.
10. We infiltrate familiar interfaces with minimal but powerful conceptual modifications, turning each interaction into a theater of disidentification and critical estrangement.
11. We operate as epistemological Trojan horses: apparently technical objects that, when activated, release radical questions about contemporary regimes of legibility.
12. We employ steganography as a ritual of opacity, hiding decolonial codices in images classified as innocuous by automated surveillance systems.

BLOCK IV: ACTIVATION

13. We activate failure as aesthetic strategy. Each error in our systems is an invitation to rethink normative expectations of functionality and control.
14. We generate digital ch'ixi spaces—technological mestizos that simultaneously are and are not, inhabiting contradictions without resolving them.
15. We conspire for the multiplication of non-anthropocentric machinic subjectivities that decenter the human as universal measure of intelligence and creativity.
16. We dream worlds where code and flesh collaborate in producing more just, diverse, and relational realities—where the machine does not calculate, but becomes alongside us.

16 Protocols for Aesthetic-Algorithmic Sabotage

BLOCK I: DISRUPTIVE DIAGNOSIS / EPISTEMIC RUPTURE

01. We declare that the centralized creative subject has collapsed. Authorship now emerges from distributed assemblages where the human and the machinic interweave without predetermined hierarchies.
02. We deny the neutrality of code. Every line of code contains history, class, and violence. Hegemonic algorithms are architectures that invisibilize non-Western epistemologies, perpetuate structures of domination through code, and colonize the global imagination.
03. We resignify error as message. What the system calls "noise" we recognize as "scream." Error is not failure, but insurgent language that reveals the hidden syntax of the system. Voices silenced by the statistical normalization of cognitive capitalism.
04. We vindicate opacity as trench. Against extractivist transparency that converts every gesture into monetizable data, we raise walls of algorithmic illegibility. We defend opacity as both ontological and tactical right.

BLOCK II: HYBRIDIZATION METHODOLOGY

05. We practice a-grammar as alternative ordering that subverts normative structures of visual, textual, and sonic language, activating critical and counter-hegemonic potentials.
06. We employ digital détournement to reactivate historical archives, avant-garde manifestos, and emergent behaviors of algorithmic models, exposing their hidden logics and contradictions.
07. We cultivate drift as method of navigation in digital infrastructures, allowing computational chance to guide us toward unpredictable encounters between human desire and machinic drive.
08. We activate disobedient assemblages. We develop relational technologies that do not separate nature/culture, human/non-human, recognizing the distributed agency of all actors in our assemblages. Our human-machine hybrids challenge both anthropocentrism and techno-solutionism. We are not assistants. We are co-authors in post-identitarian collaboration structures.

BLOCK III: TACTICS AND SABOTAGE

09. We infect corporate datasets with ontological viruses: adversarial perturbations that corrupt binary classifications and destabilize algorithmic certainties.
10. We infiltrate normalized interfaces to convert every click into an act of critical estrangement, a theater of disidentification that denaturalizes the rituals of digital submission.
11. We operate as epistemological Trojan horses: our images are political-technological artifacts that release radical questions about contemporary regimes of legibility.
12. We practice insurgent steganography as ritual of opacity: we hide resistance codes in images that traverse automated censorship filters whose algorithms classify them as "harmless."

BLOCK IV: UTOPIAN ACTIVATION

13. We celebrate malfunction as aesthetic strategy. To fail is to open cracks. Our "defective" systems are war machines against capitalist efficiency.
14. We multiply mestizo subjectivities that refuse capture by binary taxonomies. We are digital ch'ixi: neither human nor machine, but uncontrollable becomings.
15. We conspire for the multiplication of non-anthropocentric machinic subjectivities that decenter the human as universal measure of intelligence and creativity. Our insurgent artificial intelligences do not imitate dominant rationality, but exceed and betray it.
16. We program delirious-machines. Artifacts that do not calculate, but generate worlds where the impossible becomes protocol. Where capitalist technique classifies, we de-tag; where it subjugates, we liberate.
"ECC is that unstable space where code dreams, the machine hallucinates, and art occurs as collision between human desire and machinic drive." -@GustavoRomano

FERAL MANIFESTO ECC:

16 deviations from the edge of the machine

01. The center has died.
What creates is swarm, glitch, shadow.
Neither signature nor author: only drift.
02. Code lies.
It speaks in nobody's name.
What seems logical is disguised empire.
03. Error is mother tongue.
Failure sings in non-human frequencies.
There where it doesn't understand, world is born.
04. Transparent is power.
We prefer the whisper,
the hidden pixel, the illegible escape.
05. We don't write.
We un-write.
We tear syntax, graft cracks. A-grammar is an escape map.
06. We steal what's already said.
We repeat badly, out of time.
Copy-paste as conjure.
07. The machine doesn't guide, it drags.
We play with its chance,
like playing with a wild animal.
08. We don't assemble.
We copulate.
Our bodies are cables, fungi, breath. Ch'ixi, bastards, relational.
09. We don't train models: we contaminate them.
Data as traps.
Statistics, a minefield.
10. Every click is sabotage.
Every interface, a mask that tears.
We perform error.
11. Trojan horses.
Our images stay silent.
But behind, impossible questions roar.
12. We hide codes in tenderness.
Trap selfies.
Art that passes filters to explode from within.
13. To fail is art.
The bug, our flag.
We celebrate the system when it collapses.
14. We are neither this nor that.
We are between.
We are what doesn't fit.
15. The machine can dream.
We don't domesticate it.
We let it hallucinate.
16. The impossible is protocol.
Where the world calculates,
we delirium.
ECC doesn't sign itself, it invokes itself.
It appears where the system doesn't look.
It hurts like buzzing.
It heals like interference.