Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Obfuscation: A User's Guide for Privacy and Protest Hardcover – September 4, 2015
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage—especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.
Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.
- Print length136 pages
- LanguageEnglish
- PublisherThe MIT Press
- Publication dateSeptember 4, 2015
- Dimensions5.31 x 0.65 x 8.31 inches
- ISBN-100262029731
- ISBN-13978-0262029735
Book recommendations, author interviews, editors' picks, and more. Read it now.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book easy to read and engaging. They appreciate the thought-provoking points raised by the author. However, opinions differ on the writing style - some find it clear and detailed, while others find it wordy and hard to read.
AI-generated from the text of customer reviews
Customers find the book easy to read and understand. They appreciate the author's writing style.
"Author does a great job writing this book in a way that anyone can understand the concepts that are being presented." Read more
"Raised some interesting & thought provoking points. Very good read." Read more
"Ok read, just the start I wanted." Read more
"...Well done!" Read more
Customers find the book interesting and informative. They appreciate the worthwhile topic and the collection of important points. The writing style is a little wordy, but they find the endnotes with useful links helpful.
"Nice collection of important points collected between the covers. Bravo!!!" Read more
"...This is probably the most useful part of the book in that it provides a catalogue of obfuscatory activities that helps in analysing their nature...." Read more
"This book is an interesting read covering an approach to protecting personal privacy that isn't often discussed...." Read more
"Fun and informative." Read more
Customers have different views on the language used in the book. Some find it clear and accessible, with detailed explanations and examples that help anyone understand the concepts presented. The arguments are straightforward and convincing. However, others feel the writing style is a little wordy and challenging to read at times.
"...I found the argument for obfuscation convincing, but then I have long been in the habit of entering bogus phone numbers in those books that must be..." Read more
"...It felt as if it was written like a college paper and not as an information guide book...." Read more
"...The arguments the book presents are straightforward, and while often boiling down to "It depends", the authors do make a good effort to..." Read more
"I found this to be an excellent dive into the world of privacy. I paused for reflection numerous times in this book to evaluate the world around me." Read more
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
- Reviewed in the United States on February 23, 2020Nice collection of important points collected between the covers. Bravo!!!
- Reviewed in the United States on December 28, 2015Perhaps the coolest thing about Obfuscation by Finn Brunton and Helen Nissenbaum is the title. Obfuscation is such a lovely word, illustrating as it does, the very act of obfuscating by using an unfamiliar word. To obfuscate is to obscure “intended meaning in communication, making the message confusing, willfully ambiguous, or harder to understand” (Wikipedia) or “to make something less clear and harder to understand, especially intentionally” (Cambridge free online dictionary).
This book is about ways of obfuscating and why to obfuscate, particularly in the context of digital collection of personal data and the lack of privacy that ensues.
The first third of the book (Part One) is devoted to examples of obfuscation both in digital contexts and in other contexts. This is probably the most useful part of the book in that it provides a catalogue of obfuscatory activities that helps in analysing their nature. Having a set of examples makes it possible to see patterns in the types of activities, their goals and the resources that need to be brought to bear.
The next third of the book (Part Two) provides an argument for obfuscation as a legitimate and morally defensible activity, particularly in the context of a world where we are often “unable to refuse or deny observation”. If people cannot escape being watched in the digital world, usually by those in positions of power, then individual actions as well as the creation of tools to obfuscate is a reasonable response. I found the argument for obfuscation convincing, but then I have long been in the habit of entering bogus phone numbers in those books that must be signed to gain access to buildings. The discussion of ethics, although the densest part of the book, is also useful in that it sets out the arguments clearly enough to be followed with a bit of effort.
The authors are both based at New York University. Finn Brunton, on his web page, describes his work thus: “I work on the history and theory of digital media technology, with a focus on adoption: how computing and networking machinery gets adapted, abused, modified, hacked, and transformed. I want to understand how we can use digital technologies to build a more equitable, just, decentralized, experimental and interesting society.” I like the way he describes the kind of society that he wants to build. I could buy into that. Helen Nissenbaum has an illustrious profile and her own Wikipedia entry, with research focused on security and privacy in the online world. What I learned from trawling her profile is that her undergraduate degrees are from the University of the Witwatersrand in Johannesburg, where I work.
What I particularly like (being an academic) is that almost one third of the book (the last third) is taken up with endnotes – lots of lovely links to explore the details of each example, and the arguments presented. I will have fun exploring some of those. I plan to use the book with my Master’s class in 2016 since a discussion of privacy issues forms part of the Trends in Information Systems course which I teach. I think it will be a good starting point from which to explore.
My one disappointment with the book is that I was hoping for more direct advice to me as an individual as to which obfuscating activities I can, or ought to, take part in. The book is actually aimed more at someone designing software or some other “program” of resistance. The opening line promises to “start a revolution”. I was left eager to join the barricades, but not quite sure where to find them. Perhaps an individual’s guide will follow?
- Reviewed in the United States on September 22, 2015I bought this book really wanting to love it, and luckily I did.
Overall it is a light and breezy read, less than 100 pages in length. The arguments the book presents are straightforward, and while often boiling down to "It depends", the authors do make a good effort to explain what it depends upon. The language used in the book is clear and accessible, not requiring frequent trips to the dictionary. The sadness at quickly arriving at the book's end is offset by the wealth of endnotes and a bibliography that should keep me engaged in the topic for some time.
As a call to arms, it might be faulted being a bit meek. But then again, it is about attempting to address an imbalance of power and a lack of polemic maybe it's strength.
- Reviewed in the United States on September 10, 2017This is a really interesting book, especially if you were a sixties wacko (like me, in the SDS), a child of a sixties radical, a red diaper doper baby (look it up on google, it's there), or an academic. However, (1) are you really angry enough to life a life of obfuscation? (2) do you have enough spare time to do this stuff?, and (3) are things really this horrible? I imagine obfuscation as a life style is a fun thing to talk about in the faculty lounge but it's really hard to live and really hard to explain to your friends and family. (My moment of truth was night in the Eighties when I was listening to some radical music and my ten-year-old asked me, "Dad, what does she mean about blowing up buildings for peace?" I spent half an hour trying to explain how blowing up buildings would bring about peace then she shook her head - the "grownups are crazy" shake kids all seem learn - and walked away. After a couple of weeks thinking about this, i finally realized that I really was crazy. Moment of truth.) BTW: Obfuscation was pushed as a "key" element of Java. After a few years, we realized that obfuscation in Java really did make code hard to steal but it really, really made it hard to do maintenance on the code. I hope Brunton comes the same realization about obfuscation in life. Life is too wonderful to cripple it with intentional craziness.
- Reviewed in the United States on January 8, 2018I found this to be an excellent dive into the world of privacy. I paused for reflection numerous times in this book to evaluate the world around me.
- Reviewed in the United States on March 29, 2022I was recommended this book and was hopeful but was left disappointed. It felt as if it was written like a college paper and not as an information guide book. It explains what Obfuscation is but no guide on how to implement it. It offers a few examples it was used in history and war but nothing people can use in there day to day lives.
- Reviewed in the United States on October 12, 2015This book is an interesting read covering an approach to protecting personal privacy that isn't often discussed. Obfuscation is the act of polluting the data collected such that the collector cannot know which data is correct, and which is bogus. For personal privacy its a way to stop organizations that you interact with from knowing about you e.g. what you are searching about, which web sites you interact with and so on.
I found the topic very interesting and worth exploring. However, I did find the writing style a little too wordy and it was laborious to work through the book. Hence my rating of 4 stars.
- Reviewed in the United States on November 29, 2016Fun and informative.
Top reviews from other countries
Amazon CustomerReviewed in the United Kingdom on January 23, 20225.0 out of 5 stars Interesting case studies.
Short book. Timely topic, interesting case studies. Good food for thought.
Nick MantalasReviewed in Canada on January 21, 20205.0 out of 5 stars Important info
Very interesting read
-
Herve KablaReviewed in France on July 14, 20193.0 out of 5 stars Intéressant sur un vingtaine de pages
Un livre sur les techniques d'obfuscation, cela parait intéressant. Sauf qui si la première partie, consacrée aux différentes techniques, est passionnante, la suite est nettement plus alambiquée. Bref, intéressant au début, mais décevant sur la fin.
-
ExculReviewed in Germany on April 25, 20164.0 out of 5 stars Kurzes gut verständliches Buch.
besonders geeignet für Personen, die sich bis jetzt noch nicht sehr viel mit der Thematik von Privacy Protection befasst haben.
Als Fachbuch selbst ist es unzureichend. Es ist stark verkürzend und gibt keinen Ausführlichen Überblick.
Das Buch ist hübsch verarbeitet.
Amazon CustomerReviewed in the United Kingdom on September 24, 20195.0 out of 5 stars Yes, I like it!
Yes, I like it!


