Hallo Du!
Bevor du loslegst den Talk zu transkribieren, sieh dir bitte noch einmal unseren Style Guide an: https://wiki.c3subtitles.de/de:styleguide. Solltest du Fragen haben, dann kannst du uns gerne direkt fragen oder unter https://webirc.hackint.org/#irc://hackint.org/#subtitles erreichen.
Bitte vergiss nicht deinen Fortschritt im Fortschrittsbalken auf der Seite des Talks einzutragen.
Vielen Dank für dein Engagement!

Hey you!
Prior to transcribing, please look at your style guide: https://wiki.c3subtitles.de/en:styleguide. If you have some questions you can either ask us personally or write us at https://webirc.hackint.org/#irc://hackint.org/#subtitles.
Please don't forget to mark your progress in the progress bar at the talk's website.
Thank you very much for your commitment!

================================================


 Our next speaker or better performer is Coco's boyfriend. Coco is an artist researcher and university lecturer from Berlin. In her work in and about digital cultures she combines artistic and activist strategies to explore for instance new forms of political self organization authorship and intellectual property hacking and women hackers. Coco is co-founder of several collectives such as Women and Technology old boys network. She currently is a research associate at the University of Arts in Zurich. Her recent book The beautiful warriors techno feminist practice in the 21st Century was published this year in August. Today Coco is here to present her theatre performance lecture. I love the chef's love from aSt. Paul to a techno feminist comment on the case of Julian Assange and WikiLeaks. Let's give a warm round of applause to focus on Frank okay. Good evening everyone. The lecture performance I was shown the studio performance and review. And before I start I would like to thank not only the people who helped organize this fantastic event but in particular also the curators of the art section who invited me to speak here tonight. The nine chapters to follow will take you on an adventurous trip into the real most zeros and ones of data and pure information of ciphers signifiers and figures on the other side of reality we will encounter suspected heroes leagues and freaks engineers of escape who control our secret desire on the road to freedom. One has to make sacrifices but what remains. When the weight gets swampy and forks into twisted affective structures rape can be performed in many ways. And what is missing. What are we actually looking for. Has it been lost at all. Maybe it just multiplied and stayed as much as it has gone away. Who knows. We all create reality collectively and long ago have become some bits of transparency. Let us assume for a moment that it would be useful to understand what information is in general that might help to clarify what we are a
ctually looking for. The problem is that information means different things in different there is no unifying and generally accepted theory of information. It can be mathematical philosophical or empirical in an attempt to discuss the most relevant aspects under which information can be considered. One suggestion is to distinguish between the structure approach the knowledge approach the signal approach the message approach the meaning approach the effect approach and the process approach that is very promising because it opens up a whole universe of different overlapping or mutually exclusive meanings of the term information. And it seems to be perfect for the intentional as well as unintentional production of mis understanding. Let us have a look at an example in order to better understand the various approaches. A simple sentence: "Julian Assange was accused of rape". on the level of communications engineering the information is coded into natural language into words and letters. It consists of six different words and the letter a course five times as I use C and twice and the letters J L and D O F R P and W only cool ones analyzing the code level becomes relevant particularly with large amounts of information and can help to save transmission time. On the same tactical level the structure of information is analyzed in order to measure the information content not in terms of meaning but in terms of purely structural aspects. The focus here is not the single sign but on the order in which the signs are transmitted. Relevant is the description ability and the amount of information. The third level considers the semantic level in order for information to become utilizing all the structural and syntactical information needs to be decoded and interpreted by the receiver. This is where we shift from the structural level to the level of meaning with regards to our example the receiver needs to understand that Julian Assange is the name of a person a male who that person is wh
at he is representing what the term rape means and what an accusation is of course it is not that simple. The transformation of structural information into meaning happens in the number of complex steps for the time being it is sufficient to understand the relevance of this shift in process from structure to meaning. Eventually we arrive at the last level the pragmatic level of information the pragmatic value of information depends on the impact the information has on the receiver. The more the information changes the receiving person or system the more value it has. Therefore information can only have a pragmatic value. If it was not known by the receiver before and thus means a gain in knowledge as well as the reduction of uncertainty regarding our example the information that Julian Assange is accused of rape only has a brick Matic value for people who are interested in this person in the organization he is affiliated with. And with that the values and ideals this organization supposedly represents the more unlikely it is that people in a political environment with respective moral claims are accused of rape. The more valuable the remit the information becomes. After all an important part of the information is the notion of accusation generally speaking information unfolds at greatest value not just through the interpretation of specific units and streams of information but rather through the integration of the decoded parts in two larger contexts this happens on various levels partly consciously partly unconsciously by doing this we reduce large amounts of information by filtering them according to specific algorithms related to specific interests while also connecting the information with already existing knowledge. This decoding activity is a subjective process which is why information can never be neutral or objective. So this was what the information scientists had to say. Let's keep this in mind for a moment while having a look at the organization that has 
already been mentioned in relation to the accused person the organization that claims to open governments worldwide. The organization that publishes secret information news leaks and classified media from anonymous sources international non-profit ongoing since 2006 a digital platform enabling whistleblowers to unleash material to exercise free speech online and even was nominated for the Nobel Peace Prize in 2011. The organization that exposes transgressions on the part of governments multinational corporations and individuals which has confronted some of the most powerful. By unveiling their biggest secrets corruption in Kenya Collateral Murder in Iraq Afghan War Diary Cable Gate Guantanamo Bay human rights violations the secret bibles of Scientology Icelandic financial crisis toxic toxic dumping laugh parade accident riots in Tunisia Syria files NSA spying on partners female voters in Turkey Hillary's dirty laundry and so on. I quote from the website one of our most important activities is to publish original source material alongside our news stories though so readers and historians alike can see evidence of the truth. Evidence of the truth. Information is evidence is truth. Evidence is tools truth is to this a powerful imagery to uncover the truth is shining the light of truth into dark places. Thanks so much for doing this for us liberating us by giving us the truth. Who else could be more right than the one who holds the truth in his very hands at his fingertips. Sunlight is the best disinfectant right an organization invincible led by a Captain Fearless and well-prepared an uncensored rebel system for untraceable masked documents leaking residing at undisclosed locations keeping no logs and using military grade encryption to protect sources and other confidential information innovative secure and anonymous it's technical infrastructure is hosted in a bomb proof nuclear shelter protected by law and concrete ensured by some extra secret files just in case a we
ekly suggesting color reportage collaborative effort a panel of peers. We are many. Why not. Legion comments and edits are not welcome. So it's because of the rabid crowds you know who should deal with all that mess. And what could that do to the internal structure the culture of communication. Maybe it's not just cash flows concealed all along the way. That's none of your business. Uncensored rebel from outside and who ensures the sun will shine. Who is the master of this infection. Who decides what the world needs to know what we need to know. It is him. Julian the very same the heart the soul the brain of this organization its founder philosopher engineer manager spokesperson promoter financier and all the rest he makes up the rules and makes them autocracy here I come. The sole decision maker at the top. And no instance to control what information do you need to avoid self-deception your restless mind will never find the peace of knowing unlike Donald Rumsfeld who famously said I quote There are known knowns there are things we know we know. We also know there are known unknowns that is to say we know there are some things we do not know but there are also unknown unknowns. There are things we do not know. We don't know. And the organization that generates public feelings and powerfully so either you hated or you love it either. It is the source of hope for change or the source of lasting evil. You fight it or supported flows of effects render him a hero or a villain and his organization. A revolution in the media ecology or an anathema to global security. A fair number of people who have spoken out publicly even want to see him dead. How flattering right wingers for example who should know better. Wasn't he on their campaign against Hillary and all the many who do love him. The information partisan. Do they know why journalists and media organizations politicians and academics intellectuals and artists celebrities and pop stars all want to be associated with hi
m demonstrate their solidarity and admiration provide support moral and material social movements NGO Human rights protesters hacktivist groups and file sharing communities Information Age pioneers and ideologues why do they all express their particular feelings even though these are uniformly rooted in their own individual courses and systems of belief. A central figure of digital resistance one has to ask. Resistance against what. What kind of resistance. And not least of all fighting. What for. What is the ideology behind the organization's operations. What is the political motivation one would like politics to be more pure than one's self and feels vindicated when this wish cannot be fulfilled. And here is somebody who sacrifices himself for the cause whatever that may be. The allure of the betrayed and the traitor the Liberator and deliver never revolutionary with his baggage of effective flows supported by different forces that outpour their feelings on different facets of the story be digital rights freedom of expression internet censorship international legal issues national security civil rights whistleblowing against multinational corporations and governments privacy and the list is endless. Maybe the man and his organization are an empty signifier filled ideologically to reflect the discursive mood of anyone but let's broaden the perspective a little bit and have a look at the culture. This organization is part of the larger context. It is embedded in it is India that gave us the ingenious method of expressing o numbers by means of ten symbols where each symbol has a value of position as well as an absolute value. One two three four five six seven eight nine and serum this new arithmetic with its alien Sanskrit figures was an infidel system which posed an extraordinary threat to the Western world. It was not until the 15th century that the requirements of merchants and trading forced the church to eventually give in the one of the new arithmetic was very 
different from the old straight line which had figured as both a number and the ninth letter of the Roman alphabet. Western philosophy is supposed to be an elucidation and confirmation of the unity of one. A number that had been held in great esteem for long before there was one male God. So the ancient Greeks one was everything and anything. First and last best and good universal and unified. It was the symbol of existence identity and being strictly speaking there was nothing else to be anything at all was to be one. While the Sanskrit one functioned in relation to the other a ditches on an equal basis the Roman and the Greek one was taken to symbolise any individuated and in devising all entity. Nevertheless the new one could easily be subsumed into the old paradigm. The zero however posed a real threat when it first appeared in the new string of infidel figures. The old church fathers did everything they could to keep it out while two three four five and so on could still be thought of as multiples of the 1 0 was unthinkable. If it wasn't something it couldn't be allowed. Then again the church could hardly be seen to protest too much about something that as far as thay could see wasn't really there at all. If Sera was nothing it should be as easy to absorb as the Sanskrit one had been. And sure enough 0 was eventually appropriated as a sign of absence. Non being and nothingness. Thus the ancient unity of something and nothing could be maintained. A binary cold always consists of two symbols said configured that code since like this introduction of the binary system in the late 17th century. Logical Operations have been conducted on the basis of an alternating status that is 0 and 1 such binary codes can be technically reproduced by electronic or optical signals. The information saved in this way can be processed with complex other algorithms by an integrated circuit was as used for example in computer processing units. Computer scientists usually assign the stat
e of electrical potential to one and its leg to sero the status of on or off is the smallest unit of information a bit one bit can be 0 0 1 complex information can't be mapped biologically combining several of these simple figures so it takes two to make a binary but all these pairs are two of a kind and the kind is always a kind of one. One in zero make another one. May you and female aid up to men. There is no equivalent for females. No universal woman at this sign. The man is one and one is everything and a female has nothing. You can see woman functions as a whole a gap a space and nothing that is not the same identical identifiable a fault of flow a lack an absence outside the system of representations and auto representations like said lays down the law and leaves no doubt when he says there is a woman only as excluded by the nature of things. She is not. Oh not who. Not one. And whatever she knows can only be described as non knowledge. There is no such thing as the woman where the definite article stands for the universal. She is no place like home. Nothing of her own other than the plays of the other which rights look I designate with a capital O the nothing the sero is meaningless but it generates endless new meanings when combined with ones in a binary system both figures are equally important. One might think it was as early as the 19th century that a woman namely the mathematician and writer Ada Lovelace rebelled against the zero being nothing insisting that it must be something even if it was not a quantity and she was right in terms of the pragmatic rose. They play the series and ones of machine code do far more than hark back to the binaries. They're logical symbols represent. If zero is supposed to signify a home a space or a missing piece and one is the sign of positivity. Digital machines turn these binaries around zeros. Now have a place and they displace the phallic order of ones in both electronic systems and the punched cards of weaving machin
es. A hole is one and the plank is zero. In which case there are two missing elements. If missing is where either can be said to go no longer a world of ones and not ones or something and nothing thing. And Gap but rather not holes and holes not nothing and nothing not gap and Gap Sarah was always something very different from the sign which has emerged from the West's inability to deal with anything like that. Like Sarah is neither something in particular nor nothing at all. And it's certainly the case that with or without the signs that represent them as inert negativity as holes themselves are never simply absences of positive things. This is a purely psycho analytical myth whether they are gathering information to leak communicating running washing machines doing sums or editing videos all digital computers translate information into the zeros and ones of the machine code. These binary ditches are known as bits and strung together in bytes of eight zeros and ones of machine code seem to offer themselves as perfect symbols of the orders of Western reality. The ancient logical codes that make the difference between on and off right and left form and matter mind and body. White and black. Good and evil right and wrong. Life and death. Something and Nothing. This and that here and there. Inside and Out. Active and Passive. True and false. Yes and no. Sanity and madness health and sickness. Up and down. Sense and Nonsense. West and east north and south. And they made a lovely couple when it came to sex. Men and woman male and female masculine and feminine. 1 and 0 looked just right. Made for each other one the definite upright line and zero. The diagram or nothing at all. Penis and vagina thing. And whole. A perfect match. I can see the difference the difference of what the difference between the zero and the one difference is visible because the signs are not the same as always. There must be two terms to represent or precisely to form a difference a difference can 
exist on its own. A difference has no self no identity when it came to sex the ciphers became connected to the male and female identity. A shift from pure deference to natural realized binary. A difference like between two sexes. I'm irritated. What would that different signifiers have to do with sexual difference. In a society which privileges the classes where the psychic structuring of the infant is triggered by the pictorial phenomena no equivalence can be found concerning gender as may be suggested by the picture of two ciphers. As soon as a baby is born the first examine and glance checks whether it is there or not the male organ. Yes or no. Related to a pictorial phenomenon now the only thing that counts is whether there is something to see and there seems to be something missing with the zero. What makes the woman in this respect it must be at the same time a visible and identifiable image of one sex as a visible absence. In this image which sticks to her image as the invisible why not admit that we are blind for the in visible sexual difference as between a zero and the one because we always have to see pictures and that means something else. The only thing I can see is an image. What seems to be invisible in the image is the representation of the so-called pure or sheer difference. Again the picture is neither a signifier nor the difference but instead consists of data and data consist of pure differences thinking of the picture of the female sex is not is it soon turns out that we've left the sector of visibility and reached invisibility because what makes this picture so sexy I suggest it's in visible parts especially the absence of a penis. We'll try to assume in on this until we finally reach the soul of signifiers which seem to be able to produce an exciting variety of hallucinatory effects wanting to see the image of a difference itself would mean wanting to see the impossible image of perception and the unconscious it's so now let's translate these 
very abstract considerations into a more specific context. And I start to read the cyber feminist manifesto for the 21st century. We are the modern kind positive anti reason unbounded unleashed unforgiving. We see art with our can't we make art with our country we believe and choose songs madness holiness and poetry. We are the virus of the new world. This order rupturing the symbolic from within. Saboteurs of big daddy mainframe. The clitoris is a direct line to the Matrix VNS matrix terminators of the moral codes mercenaries of slime go down on the altar of objection probing the visceral Temple we speak in tongues infiltrating disrupting disseminating corrupting the discourse we are the future cunt the Australian artist group VNS matrix can claim to have been the first to add feminist view to the flaming embers of digital network technology with their cyber feminist manifesto for the 21st century published in nineteen ninety one they declared war on the patriarchal system governing the world governing through technology governing technology their battle field was to be the imaginary space emerging from networked computers cyberspace the space where all identity consists of nothing but zeros and ones. The as yet unexplored possibilities of digital network technologies stretched imagination and language to the limit and they called it cyber feminism a catalytic moment a collective memetic mind virus that mobilized scarecrows everywhere and unleashed the blessed famine techno porno code that made machines pleasurable and wet there was the desire of weirdness metrics to contaminate sterile technology with blood slime cones and madness and to repurpose technology for anarchic feminist aims. They considered themselves machine lovers power hackers mercenaries of slime and called for resistance against the old dominant big daddy mainframe. Before most people even had seen a computer their weapon was poetry language crafted to create a science fiction scenario in which the
 future would be unmanned populated with countless and unnamed genders. Technology as a way to dissolve sex and gender See I a the current intelligence agency on a mission to emancipate zeros and ones from the clutches of info capital of data miners unleashing a feminist toxoplasmosis of rage into the masculine status space as they claim in retrospect with the manifesto began a hyper stationary attack on the gender regime of technological gatekeeping B alluding linguistic incursions into the new digital fortresses where machines were enslaved to the patriarchal overlords of Commerce Science and educational institutions back then digital life was not real life as it is now. What once was the future is our present and obviously these techno utopian expectations haven't exactly become our reality. We have made ourselves at home in the 21st century. But 25 years after the cyber feminist manifesto was ejected into cyber universe and the mercenaries of slime started their high oppositional game it turns out that the phallic power of Big Daddy mainframe not only rules supreme. It is ever expanding into an all embracing control society. One has to ask what happened to cyber feminism has it failed. What is between your legs now zeros and ones liberate data digital slime the war machine still awaits your intention but never forget the flesh walking backwards into the future we need to remember we need to understand what we are missing. Critical Analysis Can you feel it. Where does it reside in your body. Maybe it's time for something else something better something more hard hitting a new future that is not contend with us lying to ourselves. Come on it's not about them. It's about our sets about you and me. Forget nostalgia. Forget the good old times this is a story in which technology plays an essential role in most stories about technology male heroes or The Age and speed in the role of hacker villains Freedom Fighters engineers genius inventors or entrepreneurs and freque
ntly so in combination with non-human entities. If women occur at all then they are found at best helping organizing managing and promoting managers and users if you will of what men have created in the world we live in we rarely have a chance to live outside. Technology is simply returning back to nature. What would that be. But technology is a medium of power. It is not neutral as some suggest just as information isn't as we have seen. It is not about the good use and the abuse of technology. We rarely take the time to think about where it actually comes from and what values inherent to it. A technical system is never merely technical. The way it functions in the real world has technical but also economic organizational political and cultural elements. Technology is part of culture. Gender roles and sexual divisions are innate to such a system. Artifacts are designed in particular ways they embody power. They are shaped by gender relations meanings and identities hierarchies of sexual difference profoundly affect the design development diffusion and use of technologies. Therefore technology always reflects gender divisions as well as other inequalities since the term technology took on its modern meaning its association with men has been taken for granted since then. Technology is a key source of man's power and the defining feature of masculinity. The rise of engineers as a white male middle class. Indeed with exclusive rights to technical expertise involved an ideal of manliness characterized by the cultivation of bodily prowess and individual achievement. It has been sold to us as meritocracy meaning power has to reside in individuals purely on the basis of ability talent and achievement a philosophy like this takes pleasure in admitting that not everyone has an equal opportunity to take part in the competition in the first place. At the same time femininity has deliberately been reinterpreted as incompatible with technological pursuits what did we hear earlier
. A new gender ring of technology a decided shift in the woman machine relationship because of the shift in the nature of machines. Zero is now having a place displacing the phallic order of ones. Unfortunately this had turned out to be no more than abstract theory. While technology is celebrated as out of control it is still controlled by men. Digital technology is not did not liberate women as cyber feminists have hoped. Big Daddy mainframe rules supreme non-white non males non heterosexuals are still largely excluded from the creation of the very technology that shapes us and our world capitalist logic drives technology like never before and we find ourselves in the clutches of an all embracing control society which is rooted in the greed for power and more profit pessimistic fatalism would be in order if we wanted to give in and let patriarchy just reproduce itself on all levels. But we don't want to give in. Not yet. Now we have brand new feminist principles of the Internet a more sober attempt to consider technology as possibly helpful for empowering women and queer people to engage. What was once not so long ago the space for techno feminist utopia has become an environment in which we need to establish codes of conduct and safe spaces in order to protect our privacy and security and to challenge once more cultures of sexism and discrimination. Understood as part of a continuum of resistance in other spaces public and private and in between that is where we start again or continue. Feminists showed how the public and the private are mutually formed and how gender is fundamental to all aspect aspects of social life. Technology and Society are bound together inextricably. And technology itself is malleable. Therefore we can conceive of a mutually shaping relationship between gender and technology in which technology is both a source and a consequence of gender relations. Without doubt technology could contribute to redesigning gender equality but for that it wo
uld have be it would have to be based on different set of values. What is needed is a new imaginary different from the material reality of the existing technological order for the time being we have to deal with surveillance and exploitation and with men harassing women online trolling boxing spamming cyber stalking game again. GamerGate was not an exception but rather the tip of an iceberg. The expression of a broad techno culture in which men including the younger generation think they are the norm and the rest is the rest. And the other not worth caring about attacks threats intimidation and policing experienced by women and queers are real harmful and alarming and they are part of the broader issue of gender based violence ingrained spheres of masculinity are still ubiquitous within oh techno conscious no wonder our new heroes turn a blind eye to the issue being deeply entangled themselves reproductive and genetic technologies so make up the last frontier of man's domination that has to be overcome. In the meantime female bodies are still desired by males to spread their genes. What does your body know that you cannot find out there in the net. The following information has been taken from a police report that was produced in 2010 in Stockholm. The condom A B Sledge 7 5 to 5 minus 1 0 slash cheese. Zero zero zero one was continuously damaged at the front the edges of the damage have been examined using a microscope the examinations did not indicate that the damages were caused by any kind of tool however minus scratches were found in the area close to the damage perpendicular to its longitudinal direction further laboratory tests have shown that damages were caused at the rear part of the condom by a knife and with scissors and part of it was ripped off. The damage caused by ripping off a part of the condom board the strongest resemblance to the surface of the actual damage while damage is caused by scissors and knife resulted in very minor scratches. The appear
ance of the front damaged part of the condom is shown in image one hypothesis. The damage of the front part of the relevant condom was caused by ripping off apart tests and examinations have yielded the finding that this hypothesis is true by a decree of plus 2 the possibility of obtaining the same results in another hypothesis is true if another hypothesis is true is estimated as minor. In other words the condom was damaged intentionally. This police report was based on information and evidence which were provided by the injured person with the intention of having the responsible perpetrator held accountable for his deeds. A search for justice and for truth when the condom broke or got ripped apart. The information could escape leaks ensure that information is not contained or controlled not used for crimes piracy but rather that it multiplies and thus survives. Just like the shelf selfish gene it will find for itself a new survival machine a hosting body where it loops until it is passed on to the next. Thus information will live forever unlike any individual being when he's dead one day the information will still be alive. If you strive for immortality let the information go and make sure the new host will perform offspring on all continents. That is what the man is striving for. The more there are the more vital the information will be the stronger will win as he always did. And anyone who wants to have sex with a hero better isn't squeamish on his mission to set information free. He will show neither sympathy no mercy some things need to be brought into the light of day. We want to know the truth. We demand openness and transparency. We want to experience things ourselves and other people as they really are. There should be no suffering no resistance no otherness nothing unfamiliar. May the light of sameness shine on all of us creating trust through more transparency. This is the slogan communicate share information so I can trust you. But isn't it the opposite
. Transparency instead of trust. Trust means lack of information. It is a state of knowing and not knowing if I already know it all. Trust is no longer necessary. So who is whom should we trust who is noble enough to deserve a secret. Politics so we are told relies on non-transparent communication like any other strategic game such as commercial enterprise for that matter are the only ones who are not required to be held accountable politicians and corporations. That makes no sense. The freedom of knowing is that of controlling not of trust. Everything needs to be brought into the light of day publishing all information however is just one out of many ways to deal with it. Apart from the fact that it's not possible anyway the inconvenient question remains what information at which moment and from whom. If it is not related to a political goal. Transparency becomes an end in itself an ideology and we it's zombies with transparency as the new imperative. How do we distinguish between advantages and disadvantages between accountability surveillance and privacy invasion liberating public data and protecting private ones. All data are made of a similar substance and follow the same logic. Who might be able to stop the flow once it is flowing. Who would want to interrupt the Continuum to crack and leak and disrupt the flow of capital. No way the tyrants of intimacy is taking over not even politicians can escape. They are not evaluated on the basis of their deeds. What is of greater interest is the person itself which forces them to pose and to pretend what used to be the public space now is filled with private matters. Disclosure of the person instead of public interest. What once used to be space of common action now is the space of exposure. Of course Transparency does not uncover the true reality of things. Do you want to lift the mask and learn the secret. Most likely it's not part of the data set and I have to admit there is pleasure in exposing myself if I exhibit m
yself. I do exist the more I show and share the more attention I will get. Yes everyone is his or her own advertisement. So is it good or bad to share or information. What do they got. Those who have all the information more complex and confusing worlds that's for sure. Store data does not change. Unlike my untrustworthy memory. And if we take the technologies of surveillance and transparency into our own hands no more asymmetrical relationship means no more power over others no more strategic games and no more lost. We have to take the risk that beauty vanishes once unbilled naked information is incapable of generating a myth. I live on that which others do not know about me. And will I ever know myself. In contrast to calculating thinking is not self transparent. There is nothing more in transparent than the subject to herself no matter how much data I have and share information is just information. Only once you know what you are looking for. The search can begin. Thank you.