A User's Guide for Privacy and Protest

Book - 2015
Average Rating:
Rate this:
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage -- especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it. --Publisher.
Publisher: Cambridge, Massachusetts :, The MIT Press,, [2015]
ISBN: 9780262029735
Branch Call Number: 323.448 B911o 2015
Characteristics: x, 123 pages ; 21 cm
Additional Contributors: Nissenbaum, Helen Fay


From Library Staff

Obfuscation is a look at privacy and what tools computer users can use as a form of protest. Looking to sabotage today's pervasive digital surveillance? This book is all about using more data to interrupt the invasions of privacy we all suffer.

From the critics

Community Activity


Add a Comment
Jun 27, 2017

This is a neat little book with a wealth of information.
I was especially impressed with the subchapter 2.18 Manufacturing conflicting evidence: confounding investigation [p. 41], describing the account of the investigation into the murder of Bishop Gerardi of Guatemala [The Art of Political Murder: Who Killed the Bishop? by Francisco Goldman] and how those behind the murder [and too many others] produced TOO MUCH CONFLICTING EVIDENCE, too many witnesses and testimonials, too many possible stories. By drowning the investigators and public with ambiguous data they would instill despair at ever discovering the truth!
This harkens back to the aftermath of the murder of President Kennedy - - while other political assassinations ere far greater controlled events [Rev. Martin Luther King, Jr., Sen. Bobby Kennedy and Sen. Paul Wellstone and members of his family], the JFK assassination was too public - - thus endless stories were concocted about pro-Castro Cubans, and anti-Castro Cubans, the KGB, Mafia, Texan super-rightwingers, and as truth-seekers edged closer to the French connection [the assassins were all French-speaking***], then more concocted stories about Mafia-Union Corse connections and the Corsican Brotherhood [interchangeable with the Union Corse], et cetera.
In 1977, the year of the accidental FOIA request releases, one by the NY Times discovered the CIA strategy to flood the airwaves, beginning back in 1964 with the release of the Warren Commission Report, with the terms // conspiracy theory \\ and // conspiracy theorists \\ in an attempt to discredit all truth seekers! Not a day goes by but that I hear either NPR stooges - - or my fellow citizens - - mention multiple times such terms!
***The assassins were Lucien Conein - - CIA, Jean Rene Souetre - - French Army deserter and OAS member, Lazlo - - French Foreign Legion deserter and OAS member, and Mozes Maschkivitzan - - Belgian criminal and CIA contract killer.

Apr 25, 2017

In these days of continuous tracking, unexposed selling, and intrusive dicing of our private, personal data---including vicious techniques like doxing---every citizen should read this well-written, 95-page book and learn better protection from the unscrupulous. The authors walk you through asymmetrical strategies (some quite funny), open source tools (AdNauseaum, TrackMeNot, CacheCloak), and a step-by-step Protective Goal decision tree that gives you a toolkit for a safer, more private online life. Thank you to MIT and NYU for nurturing the authors and this timely topic. For those of us over 30, remember the internet fondly, the way it used to be before it was polluted. From the last page: "There is no simple solution to the problem of privacy, because privacy itself is a solution to societal challenges that are in constant flux. Some are natural and beyond our control; others are technological and should be within our control but are shaped by a panoply of complex social and material forces with indeterminate effects. Privacy does not mean stopping the flow of data; it means channeling it wisely and justly to serve societal ends and values and the individuals who are its subjects, especially the vulnerable and the disadvantaged." Amen.


Add Age Suitability

There are no ages for this title yet.


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number


Subject Headings


Find it at TCCL

To Top