Obfuscation: A User's Guide for Privacy and Protest (MIT Press)

Obfuscation: A User's Guide for Privacy and Protest (MIT Press)

Finn Brunton, Helen Nissenbaum


With Obfuscation, Finn Brunton and Helen Nissenbaum suggest to begin a revolution. they're calling us to not the barricades yet to our pcs, delivering us how you can struggle brand new pervasive electronic surveillance -- the gathering of our facts via governments, companies, advertisers, and hackers. To the toolkit of privateness maintaining ideas and tasks, they suggest including obfuscation: the planned use of ambiguous, complicated, or deceptive info to intrude with surveillance and information assortment tasks. Brunton and Nissenbaum supply instruments and a cause for evasion, noncompliance, refusal, even sabotage -- specifically for commonplace clients, these people now not able to decide out or exert regulate over information approximately ourselves. Obfuscation will train clients to beat back, software program builders to maintain their consumer information secure, and coverage makers to assemble info with no misusing it.

Brunton and Nissenbaum current a consultant to the kinds and codecs that obfuscation has taken and clarify find out how to craft its implementation to fit the objective and the adversary. They describe a chain of old and modern examples, together with radar chaff deployed via international struggle II pilots, Twitter bots that hobbled the social media technique of renowned protest events, and software program that may camouflage clients' seek queries and stymie web advertising. They pass directly to think of obfuscation in additional common phrases, discussing why obfuscation is important, if it is justified, the way it works, and the way it may be built-in with different privateness practices and technologies.

Show sample text content

Download sample