01343nam 2200385 n 450 99638770800331620221108021451.0(CKB)1000000000632781(EEBO)2240955783(UnM)99870087(EXLCZ)99100000000063278119940817d1650 uy |engurbn||||a|bb|To the supreme authority, the people assembled in Parliament[electronic resource]The humble petition of Lieutenant Colonel John Lilburne[London s.n.1650]1 sheet ([1] p.)Imprint from Wing.Dated at end: March 1649.Annotation on Thomason copy: "Mar. 12".Reproduction of the original in the British Library.eebo-0018Debt cancellationEnglandEarly works to 1800Great BritainHistoryCommonwealth and Protectorate, 1649-1660Early works to 1800Debt cancellationLilburne John1614?-1657.1001077England and Wales.Parliament.Cu-RivESCu-RivESCStRLINWaOLNBOOK996387708003316To the supreme authority, the people assembled in Parliament2359680UNISA03546oam 2200721I 450 991079768890332120190503073427.097802623313190-262-33132-20-262-33131-4(CKB)3710000000473147(EBL)4093096(SSID)ssj0001552973(PQKBManifestationID)16171284(PQKBTitleCode)TC0001552973(PQKBWorkID)13847506(PQKB)11576915(StDuBDS)EDZ0001530832(MiAaPQ)EBC4093096(CaBNVSL)mat07307711(IDAMS)0b00006484a9042d(IEEE)7307711(OCoLC)920881714(OCoLC)959272307(OCoLC)959590944(OCoLC)959950793(OCoLC)960443848(OCoLC)960929308(OCoLC-P)920881714(MaCbMITP)9929(Au-PeEL)EBL4093096(CaPaEBR)ebr11119528(CaONFJC)MIL829504(OCoLC)920881714(EXLCZ)99371000000047314720150911h20152015 uy 0engur|n|---|||||txtrdacontentcrdamediacrrdacarrierObfuscation a user's guide for privacy and protest /Finn Brunton, Helen NissenbaumCambridge, Massachusetts ;London, England :The MIT Press,[2015]©20151 online resource (x, 123 pages)Description based upon print version of record.0-262-02973-1 Includes bibliographical references and index.Contents; Acknowledgments; Introduction; I. An Obfuscation Vocabulary; 1 Core Cases; 2 Other Examples; II. Understanding Obfuscation; 3 Why Is Obfuscation Necessary?; 4 Is Obfuscation Justified?; 5 Will Obfuscation Work?; Epilogue; Notes; Bibliography; IndexWith Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage -- especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it. --Publisher.Privacy, Right ofUnited StatesInformation technologySocial aspectsUnited StatesInformation policyUnited StatesINFORMATION SCIENCE/Internet StudiesINFORMATION SCIENCE/Technology & PolicyINFORMATION SCIENCE/Communications & TelecommunicationsPrivacy, Right ofInformation technologySocial aspectsInformation policy323.4/3Brunton Finn1980-848393Nissenbaum Helen Fay523098OCoLC-POCoLC-PBOOK9910797688903321Obfuscation3723457UNINA