kL9!sP2#zR
7hG&jK4$mN
bV1*xZ6@cQ
pO8^iU3&yT
4sD_fG9!hJ
`mB2~vC7
9qW#eR4%tY
uI5@oP0*aS
1lK?jH6/gF
zX3(cV8)bN
rT2{yU7}iO
3fD:sG9;hJ
kL6#pO2!iU
mN4%bV9&xZ
wE1*rT6@qW
aS9_dF4!gH
mN5*tV8@xB
2pQ^rS9&tU
5yH+uI1=oP
wE7%rT4$qW
8iKpM
aS4\dF1/gH
6zX*cN0&vB
hJ7^kL3$mN
rT9!yU4#iO
wE5%rT1$qW
8iKpM
aS1\dF4/gH
`mB5~vC2
9qW#eR1%tY
uI4@oP9*aS
1lK?jH4/gF
jK1$dL6%fS
8vB!nM3#xZ
9lK?jH2/gF
zX5(cV9)bN
rT6{yU0}iO
3fD:sG8;hJ
kL1#pO9!iU
mN5%bV2&xZ
qW3#eR8!tY
4uI@oP7*aS
6dF$sA2&kL
1nM*mB4_vC
7pL[oK3]jH
zX2@cN8$vB
5yT^uI1&oP
8iK+oL4=pM
`hJ6~kL0
rT5#yU1%iO
wE4^rT8$qW
aS2$dF7%gH
mB6*vC1@xZ
9qW_eR5!tY
tY4$uI9&oP
2fG*hJ7@kL
zX1#cN6!vB
mN8%bV3^xZ
5rT@yU0*iO
wE2_qW7!eR
8pLjH
aS3\dF9/gH
kL5(pO1)iU
mB7~vC2|xZ
I wondered what remains of the concept of "access" when the keys we hold in our hands outlive the systems they were meant to protect.
In this project, I moved the logic of digital security into a physical, outdated dimension. I took each key and isolated it, stripping away its use through a repetitive and methodical cataloguing. In these photos, the keys are no longer mechanical tools; they look like strings of data that have lost their meaning.
I wanted the series to mirror the cold structure of computer code, where each object loses its uniqueness to become just a small variation in shape within a closed group. These keys aren't broken, yet they no longer open anything: the worlds they guarded no longer exist. In this archive of metal and shadow, function disappears, and only form remains. It is an inventory of denied access: the tangible proof of a digital identity turned into silent metal.