by Finn Brunton
87–89
Justification, 63, 64
Privacy systems, 58–62
Profiling interference, 90
Likefarming, 40
Protest expression, 90
Linguistic constructions, 30, 31
LiveJournal, 9–10, 9–12
Quote stuffing, 27, 28
Location-based services (LBSs),
12, 13
Radar, 7, 8, 26, 88
Loyalty card swapping, 28, 29
Rawls, John, 76–78
Ludlow, Kevin, 38, 39
Resource limitations, 65–67
Lying, 64, 65
Robots, 50
Rob’s Giant Bonus Card Swap Meet, 29
Marx, Gary, 56, 63
Russian political struggle, 9–11
Masks, 40, 41
Means v. ends, 70–83
Scott, James C., 55–57
Medical information, 31, 93–95
Selective obfuscation, 92–94
Mexican political struggle, 11, 12
Selvaggio, Leo, 40, 41
Misleading signals, 8, 9
Service denial, 9–12
Morality, 70–83
Shopping pattern tracking, 28, 29
Moral responsibility, 68, 69
Shuffling SIM cards, 18, 19
Social benefits, 80–82
National Security Agency (NSA), 18, 19
Social media, 86
Necessary visibility, 85, 86
Social stenography, 86
Network effect, 90, 91
South African political struggle, 21–24
Stand-ins, 25
Obfuscation attacks, 32, 33
Stock exchanges, 27, 28
OpenLeaks, 14, 15
Stylometric analysis attacks, 31–33
Operation Vula, 21–24, 88, 89
Subversion, 69, 70
Opting out, 53–58
System damage, 69, 70
122
Index
Taxi-replacement companies, 25, 26
Threat models, 85–87
Time-buying, 8, 88, 92
Tor relays, 19, 20
Total surveillance, 54, 55
TrackMeNot, 13, 14, 36, 63–66, 72, 73,
77, 89, 90, 92
Translation attacks, 32
Troublemaking, 62
Twitter bots, 9–12
Ultimate Shopper project, 29
Uploads to leak sites, 14, 15
URME surveillance, 40, 41
Vortex, 37, 38, 90
Wastefulness, 65–67, 72, 76, 77
WikiLeaks, 14, 15
Zarsky, Tal, 51
Index
123
Document Outline
Contents
Acknowledgments
Introduction
I. An Obfuscation Vocabulary 1 Core Cases
2 Other Examples
II. Understanding Obfuscation 3 Why Is Obfuscation Necessary?
4 Is Obfuscation Justified?
5 Will Obfuscation Work?
Epilogue
Notes
Bibliography
Index