At Obfuscation's core is a dystopian vision, offering solutions for 'users' who are assumed to have enough want-to and know-how to follow the authors down this road. It is a shame that obfuscation to this degree has become necessary. But at least we are now armed with the necessary knowledge, thanks to this book. Times Higher Education
Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today.... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collective protest.
Motherboard
Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today.... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collective protest.
Motherboard
At Obfuscation's core is a dystopian vision, offering solutions for 'users' who are assumed to have enough want-to and know-how to follow the authors down this road. It is a shame that obfuscation to this degree has become necessary. But at least we are now armed with the necessary knowledge, thanks to this book. Times Higher Education
Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today.... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collectiveprotest.
Motherboard
Right now we're being watched. It might not be literal watching: it might be that a computer somewhere, owned by a government or a corporation, is collecting or mining the crumbs of data we all left around the world today.... When it comes to maintaining their digital privacy, many people probably think about software like encrypted messaging apps and Tor browsers. But as Brunton and Nissenbaum detail in Obfuscation, there are many other ways to hide one's digital trail. Obfuscation, the first book-length look at the topic, contains a wealth of ideas for prankish disobedience, analysis-frustrating techniques, and other methods of collectiveprotest.
Motherboard