Who's Hacking Whom?

Renée Ridgway

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearch

    Abstract

    What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.
    Original languageEnglish
    Title of host publicationHacks, Leaks, and Breaches
    EditorsE. Gabriella Coleman, Christopher M. Kelty
    PublisherCreateSpace
    Publication date2017
    Pages120-126
    ISBN (Print)9781974177103
    Publication statusPublished - 2017
    SeriesLimn
    Volume8

    Cite this