Obfuscation: A User's Guide for Privacy and Protest by Helen Nissenbaum, Finn Brunton

By Helen Nissenbaum, Finn Brunton

With Obfuscation, Finn Brunton and Helen Nissenbaum suggest to begin a revolution. they're calling us to not the barricades yet to our desktops, supplying us how one can struggle today’s pervasive electronic surveillance—the selection of our information by means of governments, businesses, advertisers, and hackers. To the toolkit of privateness retaining options and tasks, they suggest including obfuscation: the planned use of ambiguous, complicated, or deceptive info to intervene with surveillance and information assortment initiatives. Brunton and Nissenbaum offer instruments and a intent for evasion, noncompliance, refusal, even sabotage—especially for common clients, these people now not able to choose out or exert keep watch over over information approximately ourselves. Obfuscation will educate clients to beat back, software program builders to maintain their person information secure, and coverage makers to assemble info with no misusing it.

Brunton and Nissenbaum current a consultant to the kinds and codecs that obfuscation has taken and clarify easy methods to craft its implementation to fit the aim and the adversary. They describe a sequence of old and modern examples, together with radar chaff deployed through global warfare II pilots, Twitter bots that hobbled the social media technique of well known protest pursuits, and software program that could camouflage users’ seek queries and stymie web advertising. They move directly to give some thought to obfuscation in additional basic phrases, discussing why obfuscation is critical, if it is justified, the way it works, and the way it may be built-in with different privateness practices and applied sciences.

Show description

Read Online or Download Obfuscation: A User's Guide for Privacy and Protest PDF

Best technology books

Fabricated: The New World of 3D Printing

Fabricated tells the tale of 3D printers, humble production machines which are bursting out of the manufacturing facility and into faculties, kitchens, hospitals, even onto the style catwalk. Fabricated describes our rising global of printable items, the place humans layout and 3D print their very own creations as simply as they edit an internet rfile.

Parametric Optimization: Singularities, Pathfollowing and Jumps

This quantity is meant for readers who, whether or not they be mathematicians, staff in different fields or scholars, are accustomed to the fundamental methods and strategies of mathematical optimization. the subject material is anxious with optimization difficulties during which a few or the entire person info concerned rely on one parameter.

Additional info for Obfuscation: A User's Guide for Privacy and Protest

Sample text

People purportedly receiving kidney transplants or recovering from motorcycle accidents had actually gone deep underground with new identities and then had returned to South Africa, “opening the road” for Mandela’s release. Given the surveillance inside and outside South Africa, the possible compromise of pre-existing ANC communications channels, and the interest of spies and law-enforcement groups around the world, Operation Vula had to have secure ways of sharing and coordinating information.

Vortex ingeniously provides an entertaining and friendly way to display, manage, and share cookies. As you generate cookies, collect cookies, and swap cookies with other players, you can switch from one cookie to another with a click, thereby effectively disguising yourself and experiencing a different Web, a different set of filters, a different online self. This makes targeted advertising into a kind of choice: you can toggle over to cookies that present you as having a different gender, a different ethnicity, a different profession, and a different set of interests, and you can turn the ads and “personalized” details into mere background noise rather than distracting and manipulative components that peg you as some marketer’s model of your identity.

If a user setting up a clone were to select from drop-down menus that the clone is American and is interested in photography and camping, the system would figure out that the clone should be interested in the work of Ansel Adams. , subscribing to a mailing list devoted to deals on wilderness excursions, or following National Geographic’s Twitter account). These interests may draw on the user’s actual interests, as inferred from things such as the user’s browsing history, but may begin to diverge from those interests in a gradual, incremental way.

Download PDF sample

Rated 4.42 of 5 – based on 31 votes