Obfuscation

Home > Other > Obfuscation > Page 17
Obfuscation Page 17

by Finn Brunton


  87–89

  Justification, 63, 64

  Privacy systems, 58–62

  Profiling interference, 90

  Likefarming, 40

  Protest expression, 90

  Linguistic constructions, 30, 31

  LiveJournal, 9–10, 9–12

  Quote stuffing, 27, 28

  Location-based services (LBSs),

  12, 13

  Radar, 7, 8, 26, 88

  Loyalty card swapping, 28, 29

  Rawls, John, 76–78

  Ludlow, Kevin, 38, 39

  Resource limitations, 65–67

  Lying, 64, 65

  Robots, 50

  Rob’s Giant Bonus Card Swap Meet, 29

  Marx, Gary, 56, 63

  Russian political struggle, 9–11

  Masks, 40, 41

  Means v. ends, 70–83

  Scott, James C., 55–57

  Medical information, 31, 93–95

  Selective obfuscation, 92–94

  Mexican political struggle, 11, 12

  Selvaggio, Leo, 40, 41

  Misleading signals, 8, 9

  Service denial, 9–12

  Morality, 70–83

  Shopping pattern tracking, 28, 29

  Moral responsibility, 68, 69

  Shuffling SIM cards, 18, 19

  Social benefits, 80–82

  National Security Agency (NSA), 18, 19

  Social media, 86

  Necessary visibility, 85, 86

  Social stenography, 86

  Network effect, 90, 91

  South African political struggle, 21–24

  Stand-ins, 25

  Obfuscation attacks, 32, 33

  Stock exchanges, 27, 28

  OpenLeaks, 14, 15

  Stylometric analysis attacks, 31–33

  Operation Vula, 21–24, 88, 89

  Subversion, 69, 70

  Opting out, 53–58

  System damage, 69, 70

  122

  Index

  Taxi-replacement companies, 25, 26

  Threat models, 85–87

  Time-buying, 8, 88, 92

  Tor relays, 19, 20

  Total surveillance, 54, 55

  TrackMeNot, 13, 14, 36, 63–66, 72, 73,

  77, 89, 90, 92

  Translation attacks, 32

  Troublemaking, 62

  Twitter bots, 9–12

  Ultimate Shopper project, 29

  Uploads to leak sites, 14, 15

  URME surveillance, 40, 41

  Vortex, 37, 38, 90

  Wastefulness, 65–67, 72, 76, 77

  WikiLeaks, 14, 15

  Zarsky, Tal, 51

  Index

  123

  Document Outline

  Contents

  Acknowledgments

  Introduction

  I. An Obfuscation Vocabulary 1 Core Cases

  2 Other Examples

  II. Understanding Obfuscation 3 Why Is Obfuscation Necessary?

  4 Is Obfuscation Justified?

  5 Will Obfuscation Work?

  Epilogue

  Notes

  Bibliography

  Index

 

 

 


‹ Prev