Customer Reviews for

Cypherpunks: Freedom and the Future of the Internet

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 review with 5 star rating   See All Ratings
Page 1 of 1
  • Anonymous

    Posted December 11, 2012

    Julian Assange Cypherpunks WikiLeaks

    This is a highly informative book, perhaps the best published on the substance of WikiLeaks, its technology, philosophy, origin and purpose, rooted in the Cypherpunks resistance to authority through encryption and anonymizing technology. The trenchant and salient, wide-ranging discussion among Assange, Appelbaum, Müller-Maguhn and Zimmermann, is derived from a four-part RT series with additional editorial material and a summarizing prologue by Assange, "A Call to Cryptographic Arms." It is an excellent introduction to the struggle for control of digital communications, economics and governance. A prime candidate for inclusion of reading lists of the enemies of authoritarian institutions, corporations and governments heavily invested in the Internet and aiming to control it by secret collusion for their purposes -- at the global public's expense, loss of privacy and reduced democracy. It claims to be a "watchman's warning" against the threat posed by the Internet and cellphone technology. The panel asserts: 1. The internet is a threat to human civilization because of its panoptic surveillance and profiling of users. 2. "Strategic surveillance" gathers all online and cellphone data as distinguished from tactical surveillance with is specifically targeted. 3. Internet and cellphones allow surveillance more efficiently and pervasively than in the physical world. 4. Individuals can be surveilled more easily if they remain mesmerized by computers, cellphones and social media. 5. Encryption prevents access to private secrets by official and commercial online surveillance and by cellphones. 6. Protestors in Arab Spring went to the streets when cellphone and online systems were disabled and thereby escaped digital surveillance. 7. General purpose computers avoid the built-in controls of special purpose computers and devices. 8. Free software avoids the control of restrictive governmental and commercial software. 9. Free encryption and anonymizing technologies can protect against authoritarian aggression embedded in the equipment and operating systems of computers, cellphones, networks, internet service providers, financial institutions and governments. 10. Younger generations will need to invent and distribute ideas, critiques, code and technology against the legacy controls of older generations indoctrinated in submissive acceptance of authority. 11. Diverse, heterogenic concepts and technology will be required to oppose centralizing, homogenizing intents of the government- and commerce-dominated Internet and cellphones. The greatest virtue of this book is its description of what comes after the lessons learned of Cypherpunks and WikiLeaks -- from the diverse initiatives nobody yet knows about due to deliberate avoidance of preening, crippling publicity. Lesson one: Protect yourself by keeping quiet, offline and sans cell, avoiding vanguards.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 3, 2013

    No text was provided for this review.

Sort by: Showing all of 2 review with 5 star rating   See All Ratings
Page 1 of 1