|
|
Showing 1 - 4 of
4 matches in All Departments
The fascinating untold story of digital cash and its creators-from
experiments in the 1970s to the mania over Bitcoin and other
cryptocurrencies Bitcoin may appear to be a revolutionary form of
digital cash without precedent or prehistory. In fact, it is only
the best-known recent experiment in a long line of similar efforts
going back to the 1970s. But the story behind cryptocurrencies like
Bitcoin and its blockchain technology has largely been untold-until
now. In Digital Cash, Finn Brunton reveals how technological
utopians and political radicals created experimental money to bring
about their visions of the future: to protect privacy, bring down
governments, prepare for apocalypse, or launch a civilization of
innovation and abundance that would make its creators immortal.
Filled with marvelous characters, stories, and ideas, Digital Cash
is an engaging and accessible account of the strange origins and
remarkable technologies behind today's cryptocurrency explosion.
How we can evade, protest, and sabotage today's pervasive digital
surveillance by deploying more data, not less-and why we should.
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a
revolution. They are calling us not to the barricades but to our
computers, offering us ways to fight today's pervasive digital
surveillance-the collection of our data by governments,
corporations, advertisers, and hackers. To the toolkit of privacy
protecting techniques and projects, they propose adding
obfuscation: the deliberate use of ambiguous, confusing, or
misleading information to interfere with surveillance and data
collection projects. Brunton and Nissenbaum provide tools and a
rationale for evasion, noncompliance, refusal, even
sabotage-especially for average users, those of us not in a
position to opt out or exert control over data about ourselves.
Obfuscation will teach users to push back, software developers to
keep their user data safe, and policy makers to gather data without
misusing it. Brunton and Nissenbaum present a guide to the forms
and formats that obfuscation has taken and explain how to craft its
implementation to suit the goal and the adversary. They describe a
series of historical and contemporary examples, including radar
chaff deployed by World War II pilots, Twitter bots that hobbled
the social media strategy of popular protest movements, and
software that can camouflage users' search queries and stymie
online advertising. They go on to consider obfuscation in more
general terms, discussing why obfuscation is necessary, whether it
is justified, how it works, and how it can be integrated with other
privacy practices and technologies.
Scholars from communication and media studies join those from
science and technology studies to examine media technologies as
complex, sociomaterial phenomena. In recent years, scholarship
around media technologies has finally shed the assumption that
these technologies are separate from and powerfully determining of
social life, looking at them instead as produced by and embedded in
distinct social, cultural, and political practices. Communication
and media scholars have increasingly taken theoretical perspectives
originating in science and technology studies (STS), while some STS
scholars interested in information technologies have linked their
research to media studies inquiries into the symbolic dimensions of
these tools. In this volume, scholars from both fields come
together to advance this view of media technologies as complex
sociomaterial phenomena. The contributors first address the
relationship between materiality and mediation, considering such
topics as the lived realities of network infrastructure. The
contributors then highlight media technologies as always in motion,
held together through the minute, unobserved work of many,
including efforts to keep these technologies alive. Contributors
Pablo J. Boczkowski, Geoffrey C. Bowker, Finn Brunton, Gabriella
Coleman, Gregory J. Downey, Kirsten A. Foot, Tarleton Gillespie,
Steven J. Jackson, Christopher M. Kelty, Leah A. Lievrouw, Sonia
Livingstone, Ignacio Siles, Jonathan Sterne, Lucy Suchman, Fred
Turner
What spam is, how it works, and how it has shaped online
communities and the Internet itself. The vast majority of all email
sent every day is spam, a variety of idiosyncratically spelled
requests to provide account information, invitations to spend money
on dubious products, and pleas to send cash overseas. Most of it is
caught by filters before ever reaching an in-box. Where does it
come from? As Finn Brunton explains in Spam, it is produced and
shaped by many different populations around the world: programmers,
con artists, bots and their botmasters, pharmaceutical merchants,
marketers, identity thieves, crooked bankers and their victims,
cops, lawyers, network security professionals, vigilantes, and
hackers. Every time we go online, we participate in the system of
spam, with choices, refusals, and purchases the consequences of
which we may not understand. This is a book about what spam is, how
it works, and what it means. Brunton provides a cultural history
that stretches from pranks on early computer networks to the
construction of a global criminal infrastructure. The history of
spam, Brunton shows us, is a shadow history of the Internet itself,
with spam emerging as the mirror image of the online communities it
targets. Brunton traces spam through three epochs: the 1970s to
1995, and the early, noncommercial computer networks that became
the Internet; 1995 to 2003, with the dot-com boom, the rise of
spam's entrepreneurs, and the first efforts at regulating spam; and
2003 to the present, with the war of algorithms-spam versus
anti-spam. Spam shows us how technologies, from email to search
engines, are transformed by unintended consequences and
adaptations, and how online communities develop and invent
governance for themselves.
|
You may like...
Ambulance
Jake Gyllenhaal, Yahya Abdul-Mateen II, …
DVD
(1)
R260
Discovery Miles 2 600
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|