![]() ![]() ![]() ![]() The book makes the argument that those anonymity tools will enable the next WikiLeaks, too.īut Morozov contends that granting sources uncrackable anonymity isn't the ultimate test of a leaking conduit. ![]() This Machine Kills Secrets traces the history of anonymity technologies, showing how the advent of cryptographic anonymity tools like Mix Networks and later Tor-the software used by both WikiLeaks and its alleged source Bradley Manning-concealed the identities of leakers and made WikiLeaks possible. "Even seasoned observers of WikiLeaks will find something new and interesting in this book," Morozov writes, and the Times very kindly selected it for its Editor's Choice list.īut Morozov also debates a few ideas in the book, and I want to respond to his arguments here. In fact, Morozov uses the first half of his review to enumerate things he likes: The "historical approach" I applied to WikiLeaks, placing it in the history of the Cypherpunks and the Crypto Wars, the accessible explanations of technical ideas in anonymity and cryptography, and the first-person storytelling as I traveled the world looking for the hacktivist project that will become the next WikiLeaks. So I was relieved and grateful to find that Morozov's review of my new book, This Machine Kills Secrets, in the New York Times Book Review took a much friendlier approach. ![]()
0 Comments
Leave a Reply. |