Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
-
- 8,99 €
-
- 8,99 €
Publisher Description
“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
PUBLISHERS WEEKLY
Security technologist Schneier (Schneier on Security) eloquently limns the challenges of maintaining privacy in the Internet age, and offers some thoughtful proposals to preserve individual freedom without compromising national security. Even readers well versed in the issues are likely to be shocked by some instances of technological intrusions, such as when a school district near Philadelphia lent high school students laptops installed with highly invasive spyware. Schneier plausibly makes the case that the powerful algorithms of companies such as Facebook could be used to actually manipulate American elections. The book also notes the psychological aspects of the loss of control of one's data. For example, for most of human history "interactions and conversations have been ephemeral," and the indefinite preservation of online interactions has social and emotional repercussions for which society is unprepared. Schneier may be accused by some of minimizing the threat from terrorism, however, as when he dismisses terrorists as no more of a danger than organized crime, an analogy that weakens the overall strength of his case.