"This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies."
TOC
I An Obfuscation Vocabulary
There are many obfuscation strategies. They are...
MIT :
"This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies."
TOC
I An Obfuscation Vocabulary
There are many obfuscation strategies. They are...
Core Cases
Other Examples
II Understanding Obfuscation
Why Is Obfuscation Necessary?
Is Obfuscation Justified?
Will Obfuscation Work?