Hip Hop Chambers

We just got back from a chamber music concert. In between the Beethoven and the Brahms, they played some modern music. A piece by Dieter Ammann called “apres le silence”. It seemed to me massively incongruous for people to be subverting, even abusing, their instruments to such a degree while wearing tails and a smart gown. That sort of music should be played in disused warehouses and on street corners by down and out ruffians who vie with each other to coax ever weirder sounds out of any grand pianos that happen to be lying around. It should be for people from single parent families whose frustrated genius compels them into unappreciated works of art. People in suits with tails should play instruments as they were designed to be played. Maybe it wouldn’t have been so bad if they’d slashed their suits a bit first, or put on some bling. I appreciated that the girl liberated a little of her hair to dance around in front of her face, but it really wasn’t enough.

It makes me think that perhaps the whitehairs rebelling against convention any way that they can are not all that different from the young rappers trying to make a new art out of what they have around them. How different would the world have been if classical composers had taken up hip hop and rappers had chosen chamber music?

The subverting of pianos reminded me of another group of people who like to take a system and make it do things it wasn’t designed for: Hackers. That would make Mr Benjamin Engeli (the pianist tonight) a Grand Piano Hacker, or perhaps since the hacks were originally performed by a composer, and notated into a score, he’s more like a script kiddie. sC0R3 k1DD13Z. That’s an unfair comparison, because no matter how rigid the score, it requires an awful lot of expertise and creativity to make the hacks work. I would have liked to be there for the discovery of a 0 day piano exploit. The great thing about piano hacking is there is no need for Mr Steinway to send out patches – the technique will become passe when the grey or white hat composers start using it, and eventually the black hat composers have to try to find another exploit.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: