DOI: 10.1016/s1521-6136(07)00212-6
|View full text |Cite
|
Sign up to set email alerts
|

Hacking the panopticon: Distributed online surveillance and resistance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 19 publications
0
9
0
1
Order By: Relevance
“…As one example of everyday resistance, we will look at surveillance. While the field of surveillance studies has largely ignored the surveilled and their reactions and practices, for example practices of resistance, this is slowly beginning to change (see, for example, Dupont, 2008).…”
Section: The Concept Of Repertoiresmentioning
confidence: 99%
“…As one example of everyday resistance, we will look at surveillance. While the field of surveillance studies has largely ignored the surveilled and their reactions and practices, for example practices of resistance, this is slowly beginning to change (see, for example, Dupont, 2008).…”
Section: The Concept Of Repertoiresmentioning
confidence: 99%
“…A criminal on the lamb might engage in a “masking move” by putting on a wig and fake mustache. On the Internet, Tor allows users the most secure of masks for their digital identity by participating in a “distributed masking move” which involves employing multiple servers (Dupont 2008:273). In the next section, we describe anonymity-granting technologies and consider the reasons people use them.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Another response is a "masking move," in which one attempts to shield one's identity from surveillance (Marx 2003). Using Tor is what Dupont (2008) has referred to as a "distributed masking move," in which one collaborates with others digitally to shield their identity from surveillance (pg. 273).…”
Section: Anonymity and The Snowden Revelationsmentioning
confidence: 99%