This Machine Kills Secrets: How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information

Written by:
Andy Greenberg
Narrated by:
Mike Chamberlain

Unabridged Audiobook

Ratings
Book
2
Narrator
2
Release Date
September 2012
Duration
12 hours 50 minutes
Summary
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.This powerful technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world's institutional secrecy. Never have the seemingly powerless had so much power to disembowel big corporations and big government.
Reviews
Profile Avatar
Feanor

I think this was a good book, but the dirth of information, and how to tamp it down into a book, forces the writer away from the minutiae that I was hoping to hear about.

Profile Avatar
Ian M

This is a very interesting book about the history of data breaches. It has a lot to say about Wikileaks and the cypherpunks. Greenberg documents the lives of the biggest names in data breaches, like Assange and Ellsberg, but also that of less well known figures. Greenberg is detailed, constructs a believable narrative on those details, and weaves them together to form a big picture concerning the history and state of data breaches. It seems pretty clear that Mr. Greenberg maintains and editorial policy greatly in favor of leakers. No doubt this attitude helped him get close to the people who he writes about in this book, but his writing comes off as a little biased. Still, because the biased is fairly apparent, one can consciously account for it. Since computers are becoming more important every day in our day to day lives and in the functionality of states and large non-state entities it's important to be aware of the nature of the deliberate data breach movement as well as some of the benefits and hazards associated with deliberate data breaches.

1 book added to cart
Subtotal
$19.99
View Cart