Obfuscation

Obfuscation

A User's Guide for Privacy and Protest

Finn Brunton, Helen Nissenbaum

In the world after Snowden, it has become clear that, for many national-security, espionage, and law-enforcement organizations, having a population already predisposed to disclose to companies huge volumes of information about themselves that can either be subpoenaed or covertly exploited is all to the good. 23 Poorly designed and managed social platforms create an efficiently self-spying population, doing their own wiretapping gratis with photos uploaded with their EXIF metadata intact and with detailed social chit-chat waiting to be subjected to data-mining algorithms.

Link · 1223