Jump to ContentJump to Main Navigation
ObfuscationA User's Guide for Privacy and Protest$
Users without a subscription are not able to see the full content.

Finn Brunton and Helen Nissenbaum

Print publication date: 2015

Print ISBN-13: 9780262029735

Published to MIT Press Scholarship Online: September 2016

DOI: 10.7551/mitpress/9780262029735.001.0001

Show Summary Details
Page of

PRINTED FROM MIT PRESS SCHOLARSHIP ONLINE (www.mitpress.universitypressscholarship.com). (c) Copyright The MIT Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in MITSO for personal use.date: 26 October 2020

Other Examples

Other Examples

Chapter:
(p.25) 2 Other Examples
Source:
Obfuscation
Author(s):

Finn Brunton

Helen Nissenbaum

Publisher:
The MIT Press
DOI:10.7551/mitpress/9780262029735.003.0003

The authors provide an additional eighteen examples of obfuscation. By contrast with the core cases of I.1, these examples are broader and more varied in their application, including speculative design projects, patents, file-sharing tools, and business and financial strategies. This section does not expand the fundamental lexicon of what obfuscation is and does, but instead shows how it is applied to specific kinds of challenges, including textual stylometry, facial recognition, loyalty cards, criminal investigations, and software code.

Keywords:   Obfuscation, Privacy, Networks, Identity, Tracking, Filesharing

MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.