Who's Hacking Whom?

Research output: Contributions to collected editions/worksContributions to collected editions/anthologiesResearch

Authors

What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.
Original languageEnglish
Title of host publicationHacks, Leaks, and Breaches
EditorsE. Gabriella Coleman, Christopher M. Kelty
Number of pages7
Volume8
Place of PublicationUnited States
PublisherCreateSpace Independent Publishing
Publication date02.2017
Pages120-126
ISBN (print)9781974177103
Publication statusPublished - 02.2017

Links