Skip to main content
Adversarial Theory

Anti-Surveillance Data Pollution: A User's Guide to Obfuscation

by Finn Brunton & Helen Nissenbaum

Price: Check Price

The theory behind adversarial AI countermeasures: when you cannot prevent data collection, corrupt the quality of the data collected. The intellectual foundation for IR-flooding, adversarial patterns, noise injection, and every privacy tool based on obfuscation rather than concealment.

Key Takeaways

  • Defines obfuscation as a distinct privacy strategy separate from concealment
  • Historical case studies from wartime camouflage to cookie stuffers
  • Ethical and political framework for obfuscation as legitimate protest
  • Analysis of ad-blocker noise, TrackMeNot, and data pollution tools
  • Accessible MIT Press format — short, dense, and precise
Why Read This
About the Author
Related Gear

Obfuscation is the core principle behind the most effective privacy tools: adversarial AI clothing patterns, IR-flooding devices, cookie stuffers, and browser fingerprint rotators all work by generating false data rather than by hiding. Brunton and Nissenbaum named and formalized this strategy before it was widely understood.

If you want to understand why adversarial pattern clothing actually defeats recognition systems — not just that it does — this is the book.

Finn Brunton is a professor at UC Davis specializing in the history of technology. Helen Nissenbaum is a professor at Cornell Tech and one of the world's leading scholars on privacy, values-in-design, and the ethics of information systems. Together they produced the most concise and rigorous treatment of obfuscation as a privacy strategy.

Our Mission

InvisibleWare builds and curates counter-surveillance technology for activists, journalists, and anyone who refuses to accept mass monitoring as the cost of participation. We stock adversarial AI-disruption clothing, IR-blocking gear, Faraday equipment, and the essential books that explain why this work matters.

Your privacy is not a preference — it is a prerequisite for political freedom. Your data stays yours.