Who's Hacking Whom?

Research output: Contributions to collected editions/worksContributions to collected editions/anthologiesResearch

Standard

Who's Hacking Whom? / Ridgway, Renée.
Hacks, Leaks, and Breaches. ed. / E. Gabriella Coleman; Christopher M. Kelty. Vol. 8 United States: CreateSpace Independent Publishing, 2017. p. 120-126 (Limn; Vol. 8).

Research output: Contributions to collected editions/worksContributions to collected editions/anthologiesResearch

Harvard

Ridgway, R 2017, Who's Hacking Whom? in EG Coleman & CM Kelty (eds), Hacks, Leaks, and Breaches. vol. 8, Limn, vol. 8, CreateSpace Independent Publishing, United States, pp. 120-126. <http://limn.it/whos-hacking-whom/>

APA

Ridgway, R. (2017). Who's Hacking Whom? In E. G. Coleman, & C. M. Kelty (Eds.), Hacks, Leaks, and Breaches (Vol. 8, pp. 120-126). (Limn; Vol. 8). CreateSpace Independent Publishing. http://limn.it/whos-hacking-whom/

Vancouver

Ridgway R. Who's Hacking Whom? In Coleman EG, Kelty CM, editors, Hacks, Leaks, and Breaches. Vol. 8. United States: CreateSpace Independent Publishing. 2017. p. 120-126. (Limn).

Bibtex

@inbook{29c6dd9622864d7baa23fee6603db18b,
title = "Who's Hacking Whom?",
abstract = "What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.",
keywords = "Cultural studies, Science of art",
author = "Ren{\'e}e Ridgway",
year = "2017",
month = feb,
language = "English",
isbn = "9781974177103",
volume = "8",
series = "Limn",
publisher = "CreateSpace Independent Publishing",
pages = "120--126",
editor = "Coleman, {E. Gabriella} and Kelty, {Christopher M.}",
booktitle = "Hacks, Leaks, and Breaches",
address = "United States",

}

RIS

TY - CHAP

T1 - Who's Hacking Whom?

AU - Ridgway, Renée

PY - 2017/2

Y1 - 2017/2

N2 - What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.

AB - What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.

KW - Cultural studies

KW - Science of art

M3 - Contributions to collected editions/anthologies

SN - 9781974177103

VL - 8

T3 - Limn

SP - 120

EP - 126

BT - Hacks, Leaks, and Breaches

A2 - Coleman, E. Gabriella

A2 - Kelty, Christopher M.

PB - CreateSpace Independent Publishing

CY - United States

ER -

Links