0%

What you must know to protect yourself today

The digital technology explosion has blown everything to bits--and the blast has provided new challenges and opportunities. This second edition of Blown to Bits delivers the knowledge you need to take greater control of your information environment and thrive in a world thats coming whether you like it or not.

Straight from internationally respected Harvard/MIT experts, this plain-English bestseller has been fully revised for the latest controversies over social media, fake news, big data, cyberthreats, privacy, artificial intelligence and machine learning, self-driving cars, the Internet of Things, and much more.

  • Discover who owns all that data about youand what they can infer from it

  • Learn to challenge algorithmic decisions

  • See how close you can get to sending truly secure messages

  • Decide whether you really want always-on cameras and microphones

  • Explore the realities of Internet free speech

  • Protect yourself against out-of-control technologies (and the powerful organizations that wield them)

You will find clear explanations, practical examples, and real insight into what digital tech means to you--as an individual, and as a citizen.

Table of Contents

  1. Cover Page
  2. About This eBook
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Contents at a Glance
  7. Register Your Book
  8. Contents
  9. Acknowledgments
  10. About the Authors
  11. Preface
  12. Chapter 1 Digital Explosion Why Is It Happening, and What Is at Stake?
    1. The Explosion of Bits, and Everything Else
    2. The Koans of Bits
    3. Good and Ill, Promise and Peril
    4. Endnotes
  13. Chapter 2 Naked in the Sunlight Privacy Lost, Privacy Abandoned
    1. 1984 Is Here, and We Like It
    2. Location, Location, Location
    3. Big Brother, Abroad and in the United States
    4. The Internet of Things
    5. Endnotes
  14. Chapter 3 Who Owns Your Privacy? The Commercialization of Personal Data
    1. What Kind of Vegetable Are You?
    2. Footprints and Fingerprints
    3. Fair Information Practice Principles
    4. Always On
    5. Endnotes
  15. Chapter 4 Gatekeepers Who’s in Charge Here?
    1. Who Controls the Flow of Bits?
    2. The Open Internet?
    3. Connecting the Dots: Designed for Sharing and Survival
    4. The Internet Has No Gatekeepers?
    5. Links Gatekeepers: Getting Connected
    6. Search Gatekeepers: If You Can’t Find It, Does It Exist?
    7. Social Gatekeepers: Known by the Company You Keep
    8. Endnotes
  16. Chapter 5 Secret Bits How Codes Became Unbreakable
    1. Going Dark
    2. Historical Cryptography
    3. Lessons for the Internet Age
    4. Secrecy Changes Forever
    5. Cryptography Unsettled
    6. Endnotes
  17. Chapter 6 Balance Toppled Who Owns the Bits?
    1. Stealing Music
    2. Automated Crimes, Automated Justice
    3. The Peer-to-Peer Upheaval
    4. No Commercial Skipping
    5. Authorized Use Only
    6. Forbidden Technology
    7. Copyright Koyaanisqatsi: Life Out of Balance
    8. The Limits of Property
    9. Endnotes
  18. Chapter 7 You Can’t Say That on the Internet Guarding the Frontiers of Digital Expression
    1. Child Sex Trafficking Goes Digital
    2. Publisher or Distributor?
    3. Protecting Good Samaritans—and a Few Bad Ones
    4. Digital Protection, Digital Censorship, and Self-Censorship
    5. What About Social Media?
    6. Takedowns
    7. Endnotes
  19. Chapter 8 Bits in the Air Old Metaphors, New Technologies, and Free Speech
    1. Censoring the Candidate
    2. How Broadcasting Became Regulated
    3. The Path to Spectrum Deregulation
    4. The Most Beautiful Inventor in the World
    5. What Does the Future Hold for Radio?
    6. Endnotes
  20. Chapter 9 The Next Frontier AI and the Bits World of the Future
    1. Thrown Under a Jaywalking Bus
    2. What’s Intelligent About Artificial Intelligence?
    3. Machine Learning: I’ll Figure It Out
    4. Algorithmic Decisions: I Thought Only People Could Do That
    5. What’s Next
    6. Bits Lighting Up the World
    7. A Few Bits in Conclusion
    8. Endnotes
  21. Index
  22. Code Snippets
54.166.170.195