Finn Brunton and Helen Nissenbaum
- Published in print:
- 2015
- Published Online:
- September 2016
- ISBN:
- 9780262029735
- eISBN:
- 9780262331319
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029735.001.0001
- Subject:
- Information Science, Information Science
This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, ...
More
This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.Less
This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.
Finn Brunton and Helen Nissenbaum
- Published in print:
- 2015
- Published Online:
- September 2016
- ISBN:
- 9780262029735
- eISBN:
- 9780262331319
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029735.003.0002
- Subject:
- Information Science, Information Science
The authors provide thirteen “core cases” of obfuscation in practice. These cases clarify what obfuscation does in particular scenarios across a variety of technologies and social, legal, and ...
More
The authors provide thirteen “core cases” of obfuscation in practice. These cases clarify what obfuscation does in particular scenarios across a variety of technologies and social, legal, and political contexts. While the cases are diverse -- including radar chaff, “false tells” in poker, and collective identity drawn from popular culture and historical applications -- the focus is on digital data and online activism illustrated through instances, such as concealing activity on social networks, protecting search queries, and providing aid to activists involved in the release of Nelson Mandela.Less
The authors provide thirteen “core cases” of obfuscation in practice. These cases clarify what obfuscation does in particular scenarios across a variety of technologies and social, legal, and political contexts. While the cases are diverse -- including radar chaff, “false tells” in poker, and collective identity drawn from popular culture and historical applications -- the focus is on digital data and online activism illustrated through instances, such as concealing activity on social networks, protecting search queries, and providing aid to activists involved in the release of Nelson Mandela.
Finn Brunton and Helen Nissenbaum
- Published in print:
- 2015
- Published Online:
- September 2016
- ISBN:
- 9780262029735
- eISBN:
- 9780262331319
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029735.003.0003
- Subject:
- Information Science, Information Science
The authors provide an additional eighteen examples of obfuscation. By contrast with the core cases of I.1, these examples are broader and more varied in their application, including speculative ...
More
The authors provide an additional eighteen examples of obfuscation. By contrast with the core cases of I.1, these examples are broader and more varied in their application, including speculative design projects, patents, file-sharing tools, and business and financial strategies. This section does not expand the fundamental lexicon of what obfuscation is and does, but instead shows how it is applied to specific kinds of challenges, including textual stylometry, facial recognition, loyalty cards, criminal investigations, and software code.Less
The authors provide an additional eighteen examples of obfuscation. By contrast with the core cases of I.1, these examples are broader and more varied in their application, including speculative design projects, patents, file-sharing tools, and business and financial strategies. This section does not expand the fundamental lexicon of what obfuscation is and does, but instead shows how it is applied to specific kinds of challenges, including textual stylometry, facial recognition, loyalty cards, criminal investigations, and software code.
Finn Brunton and Helen Nissenbaum
- Published in print:
- 2015
- Published Online:
- September 2016
- ISBN:
- 9780262029735
- eISBN:
- 9780262331319
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029735.003.0004
- Subject:
- Information Science, Information Science
This chapter concisely defines obfuscation in terms of data, and information and power asymmetries. What can those whose data is being collected know and do about how data about them is captured, ...
More
This chapter concisely defines obfuscation in terms of data, and information and power asymmetries. What can those whose data is being collected know and do about how data about them is captured, accumulated, transmitted, analysed, and used? Discussing these challenges creates the context for the necessity of obfuscation in the larger domain of privacy strategies and techniques, including governmental regulation, business best practice, and purely technological solutions. The authors argue that “opting out” to protect private data is not a reasonable solution, and build on James C. Scott’s concept of “Weapons of the Weak” to distinguish obfuscation from other privacy approaches.Less
This chapter concisely defines obfuscation in terms of data, and information and power asymmetries. What can those whose data is being collected know and do about how data about them is captured, accumulated, transmitted, analysed, and used? Discussing these challenges creates the context for the necessity of obfuscation in the larger domain of privacy strategies and techniques, including governmental regulation, business best practice, and purely technological solutions. The authors argue that “opting out” to protect private data is not a reasonable solution, and build on James C. Scott’s concept of “Weapons of the Weak” to distinguish obfuscation from other privacy approaches.
Finn Brunton and Helen Nissenbaum
- Published in print:
- 2015
- Published Online:
- September 2016
- ISBN:
- 9780262029735
- eISBN:
- 9780262331319
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029735.003.0005
- Subject:
- Information Science, Information Science
This chapter takes up moral and ethical arguments for and against obfuscation. Is obfuscation a form of lying, a waste of resources or a kind of pollution, an act of free riding on the willingness of ...
More
This chapter takes up moral and ethical arguments for and against obfuscation. Is obfuscation a form of lying, a waste of resources or a kind of pollution, an act of free riding on the willingness of others to disclose data about themselves, or even an attack on a data collection system itself? The authors discuss each of these objections in turn, urging readers to look beyond these immediate challenges toward deeper issues of ethical means and ends, and “informational justice” (drawing on the work of Rawls, in particular). It considers the moral obligations individuals owe, or do not owe, to data collectors, and vice versa. Finally, the authors turn to the distribution of risk in the collection of data, and discuss obfuscation as a strategy for equitably redistributing risk.Less
This chapter takes up moral and ethical arguments for and against obfuscation. Is obfuscation a form of lying, a waste of resources or a kind of pollution, an act of free riding on the willingness of others to disclose data about themselves, or even an attack on a data collection system itself? The authors discuss each of these objections in turn, urging readers to look beyond these immediate challenges toward deeper issues of ethical means and ends, and “informational justice” (drawing on the work of Rawls, in particular). It considers the moral obligations individuals owe, or do not owe, to data collectors, and vice versa. Finally, the authors turn to the distribution of risk in the collection of data, and discuss obfuscation as a strategy for equitably redistributing risk.
Finn Brunton and Helen Nissenbaum
- Published in print:
- 2015
- Published Online:
- September 2016
- ISBN:
- 9780262029735
- eISBN:
- 9780262331319
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029735.003.0006
- Subject:
- Information Science, Information Science
This chapter takes up the question of how obfuscation strategies should be designed, measured, assessed, and improved. To answer, it describes different approaches to obfuscation in terms of threats ...
More
This chapter takes up the question of how obfuscation strategies should be designed, measured, assessed, and improved. To answer, it describes different approaches to obfuscation in terms of threats and adversaries: what is the nature of the challenge a particular application of obfuscation should meet? In these terms, every obfuscation strategy can be described with six goals (from “buying time” to “expressing protest”) and four questions (from “individual or collective?” to “short-term or long-term?”). These goals and questions are the framework for the design of specific obfuscation efforts.Less
This chapter takes up the question of how obfuscation strategies should be designed, measured, assessed, and improved. To answer, it describes different approaches to obfuscation in terms of threats and adversaries: what is the nature of the challenge a particular application of obfuscation should meet? In these terms, every obfuscation strategy can be described with six goals (from “buying time” to “expressing protest”) and four questions (from “individual or collective?” to “short-term or long-term?”). These goals and questions are the framework for the design of specific obfuscation efforts.