|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Finn Brunton (Assistant Professor of Media, Culture, and Communication, New York University) , Helen Nissenbaum (Professor, Cornell Tech)Publisher: MIT Press Ltd Imprint: MIT Press Dimensions: Width: 12.70cm , Height: 1.00cm , Length: 20.30cm Weight: 0.136kg ISBN: 9780262529860ISBN 10: 0262529866 Pages: 136 Publication Date: 02 September 2016 Recommended Age: From 18 years Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAt Obfuscation's core is a dystopian vision, offering solutions for users who are assumed to have enough want-to and know-how to follow the authors down this road. It is a shame that obfuscation to this degree has become necessary. But at least we are now armed with the necessary knowledge, thanks to this book. Times Higher Education Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collective protest. Motherboard At Obfuscation's core is a dystopian vision, offering solutions for users who are assumed to have enough want-to and know-how to follow the authors down this road. It is a shame that obfuscation to this degree has become necessary. But at least we are now armed with the necessary knowledge, thanks to this book. * Times Higher Education * Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today.... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collective protest. * Motherboard * Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today.... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collective protest. -Motherboard At Obfuscation's core is a dystopian vision, offering solutions for 'users' who are assumed to have enough want-to and know-how to follow the authors down this road. It is a shame that obfuscation to this degree has become necessary. But at least we are now armed with the necessary knowledge, thanks to this book. -Times Higher Education * Reviews * Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today.... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collective protest. -Motherboard * Reviews * Author InformationFinn Brunton is Assistant Professor of Media, Culture, and Communication at New York University and the author of Spam- A Shadow History of the Internet (MIT Press). Helen Nissenbaum is Professor of Media, Culture, and Communication and Computer Science at New York University, where she is Director of the Information Law Institute. Tab Content 6Author Website:Countries AvailableAll regions |