10 - Obfuscation
Created by Andreas Gajdošík

deliberate stupidity
foot dragging
feigned ignorance
slowdowns
pretense of compliance
Poaching
Squating
Weapons of the Weak
Konformita
Uprising
merchandise shrinkage
Pilfering
obfuscation
Thumb on the scale
hidden transcript
uzivani bez omezeni
slander
neuzivani sluzeb / sifrovani
It’s not just armed uprising or nothing at all
gossip
evasive muttering
Situations arise in which we are obligated to be visible.
Obfuscation does sometimes come in handy for powerful actors with strong systems for privacy already in place, and we discuss that aspect accordingly, but it is a tool more readily adopted by those stuck with a weak system.
Strong cryptography - optimal system
Obfuscation is not only for the weak
Obfuscation
bolstering strong security systems
Opting out
individuals’ opting out of any platform, service, or interaction that would misuse their data. This is a solution that seems to be free of moral compromise—they disagree and therefore decline, causing no trouble. Though such opting out may be possible for a very narrow range of possible users and uses, it isn’t a practical or reasonable choice for all.
Martyrdom is rarely a productive choice in a political calculus
Utility of obfuscation
covering up some specific action
Obfuscation is, in part, a troublemaking strategy.
making it harder for adversary
mere gesture of refusal
Obfuscation obscures by making noise and muddying the waters; it can be used for data disobedience under difficult circumstances and as a digital weapon for the informationally weak.
Trace Noizer - Annina Rüst
http://www.anninaruest.com/a/tracenoizer/index.html
Super Villainizer - Annina Rüst
http://www.anninaruest.com/a/supervillainizer/index.html
relying on superior technological solutions
Net art - Examples of obfuscation
Relying on businesses
Relying on government
Decoy Browsing Triptych - Plummer Fernandez
https://www.plummerfernandez.com/works/decoy-browsing-triptych/
Adoption is fraught with complex engineering and usability issues for the developers.
But they operate slowly, and whatever momentum propels agents of government and law in the direction of protecting privacy in the public interest it is amply counterbalanced by opposing forces of corporations and other insti- tutional actors, including government itself.
Go Rando - Ben Grosser
https://bengrosser.com/projects/go-rando/
Facebook-rocking-best-automation
https://github.com/mig1984/facebook-rockin-best-automation-selenium-scrape-no-api-tool-bot-machine-made-to-destroy-facebook
it isn’t in a company’s interest to support general restraints on access to this information.