The authors provide an additional eighteen examples of obfuscation. By contrast with the core cases of I.1, these examples are broader and more varied in their application, including speculative design projects, patents, file-sharing tools, and business and financial strategies. This section does not expand the fundamental lexicon of what obfuscation is and does, but instead shows how it is applied to specific kinds of challenges, including textual stylometry, facial recognition, loyalty cards, criminal investigations, and software code.
MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.
If you think you should have access to this title, please contact your librarian.
To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.