03546oam 2200721I 450 991079768890332120190503073427.097802623313190-262-33132-20-262-33131-4(CKB)3710000000473147(EBL)4093096(SSID)ssj0001552973(PQKBManifestationID)16171284(PQKBTitleCode)TC0001552973(PQKBWorkID)13847506(PQKB)11576915(StDuBDS)EDZ0001530832(MiAaPQ)EBC4093096(CaBNVSL)mat07307711(IDAMS)0b00006484a9042d(IEEE)7307711(OCoLC)920881714(OCoLC)959272307(OCoLC)959590944(OCoLC)959950793(OCoLC)960443848(OCoLC)960929308(OCoLC-P)920881714(MaCbMITP)9929(Au-PeEL)EBL4093096(CaPaEBR)ebr11119528(CaONFJC)MIL829504(OCoLC)920881714(EXLCZ)99371000000047314720150911h20152015 uy 0engur|n|---|||||txtrdacontentcrdamediacrrdacarrierObfuscation a user's guide for privacy and protest /Finn Brunton, Helen NissenbaumCambridge, Massachusetts ;London, England :The MIT Press,[2015]©20151 online resource (x, 123 pages)Description based upon print version of record.0-262-02973-1 Includes bibliographical references and index.Contents; Acknowledgments; Introduction; I. An Obfuscation Vocabulary; 1 Core Cases; 2 Other Examples; II. Understanding Obfuscation; 3 Why Is Obfuscation Necessary?; 4 Is Obfuscation Justified?; 5 Will Obfuscation Work?; Epilogue; Notes; Bibliography; IndexWith Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage -- especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it. --Publisher.Privacy, Right ofUnited StatesInformation technologySocial aspectsUnited StatesInformation policyUnited StatesINFORMATION SCIENCE/Internet StudiesINFORMATION SCIENCE/Technology & PolicyINFORMATION SCIENCE/Communications & TelecommunicationsPrivacy, Right ofInformation technologySocial aspectsInformation policy323.4/3Brunton Finn1980-848393Nissenbaum Helen Fay523098OCoLC-POCoLC-PBOOK9910797688903321Obfuscation3723457UNINA