Obfuscation: A User's Guide for Privacy and Protest (The MIT Press)

Obfuscation: A User's Guide for Privacy and Protest (The MIT Press) cover

Download Obfuscation: A User’s Guide for Privacy and Protest (The MIT Press) PDF EPUB


Author: Finn Brunton

Pages: 136

Size: 2.305,60 Kb

Publication Date: September 4,2015

Category: Privacy & Surveillance



Download PDF  Download EPUB


How exactly we can evade, protest, and sabotage today’s pervasive digital surveillance by deploying even more data, not much less―and why we ought to. They describe a number of historical and modern examples, which includes radar chaff deployed by Globe Battle II pilots, Twitter bots that hobbled the cultural media strategy of well-known protest movements, and software program that may camouflage users’ search queries and stymie internet marketing. They are phoning us never to the barricades but to your computers, offering us methods to battle today’s pervasive digital surveillance―the assortment of our data by governments, corporations, marketers, and hackers. To the toolkit of personal privacy safeguarding techniques and tasks, they propose adding obfuscation: the deliberate usage of ambiguous, complicated, or misleading details to hinder surveillance and data collection tasks. Obfuscation will show users to rebel, software programmers to keep their consumer data safe, and plan makers to assemble data without misusing it. Brunton and Nissenbaum offer equipment and a rationale for evasion, non-compliance, refusal, even sabotage―specifically for typical users, those folks not able to opt out or exert control over data about ourselves.

Brunton and Nissenbaum present helpful information to the forms and platforms that obfuscation has used and explain how exactly to craft its execution to suit the target and the adversary.

With Obfuscation , Finn Brunton and Helen Nissenbaum imply to start out a revolution. Each goes to consider obfuscation in even more general terms, talking about why obfuscation is essential, whether it’s justified, how it operates, and how it could be integrated with other personal privacy practices and technology.



See also