Who's Hacking Whom?

Renée Ridgway

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearch

Abstract

What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.
Original languageEnglish
Title of host publicationHacks, Leaks, and Breaches
EditorsE. Gabriella Coleman, Christopher M. Kelty
PublisherCreateSpace
Publication date2017
Pages120-126
ISBN (Print)9781974177103
Publication statusPublished - 2017
SeriesLimn
Volume8

Cite this

Ridgway, R. (2017). Who's Hacking Whom? In E. G. Coleman, & C. M. Kelty (Eds.), Hacks, Leaks, and Breaches (pp. 120-126). CreateSpace. Limn, Vol.. 8 http://limn.it/whos-hacking-whom/