operation vula
How to Disappear in a Fog of Data (and Why)
In ‘Obfuscation: A User’s Guide for Privacy and Protest’ co-authors Finn Brunton and Helen Nissenbaum discuss strategies for privacy protecting. Brunton recently spoke to Motherboard about some of these strategies.
Advertisement