• Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
This Machine Kills Secret... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par -betterworldbooks-
État: D'occasion: Très bon
Commentaire: Expedier des Etats-Unis. Distribution privu en 2-3 semaines. Nous proposons la communication par e-mail en francais. Condition très bonne pour un livre d'occasion. Usure minime. Sous garantie de remboursement complet. Plus de plus d'un million clients satisfaits! Votre alphabétisation dans le monde achat avantages!
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers (Anglais) Broché – 25 septembre 2013

5.0 étoiles sur 5 1 commentaire client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Broché
"Veuillez réessayer"
EUR 15,24
EUR 9,50 EUR 0,73
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés


Descriptions du produit

Revue de presse

New York Times Editors' Choice

“Greenberg is at his best when on the road — driving through a volcano-ridden Iceland, flying a decrepit Soviet plane with nine hackers, swimming in the Black Sea with fearless Bulgarian journalists. Even seasoned observers of WikiLeaks will find something new and interesting in this book.”— Evgeny Morozov, NEW YORK TIMES BOOK REVIEW

"Computer hackers haven’t been made into heroes like this since Stieg Larsson created Lisbeth Salander—and luckily Greenberg shares a bit of Larsson’s flair for suspense, too." — SLATE 
Greenberg delves eloquently into the magicians of the all-powerful technology that shatters the confidentiality of any and all state secrets while tapping into issues of personal privacy. — PUBLISHER’S WEEKLY

While lawmakers and law enforcers struggle with the philosophy and practicality of these issues, the people Greenberg profiles have made up their minds, and they are a few steps ahead. If you’re wondering who they are and why they feel so strongly, look no further than this book. — NEW SCIENTIST

“…fascinating and well-researched.” –WALL STREET JOURNAL

“Forbes magazine journalist Andy Greenberg takes readers on a terrific and revealing — if considerably unsettling — investigation into the shadowy war rooms behind our computer screens.” –CLEVELAND PLAIN DEALER

"A globe trotting exploration into the heart of the contentious world of brilliant, eccentric and erratic game changers who have taken the tools at hand and turned them into powerful weapons that can — and have in some cases — altered the course of history…Greenberg went looking for a story and nailed it." — PAPER MAGAZINE

"A series of moving and deeply complex portraits… In all, Greenberg has created a seriously riveting read." — CAPITAL NEW YORK

Gripping…For all the technical detail (which Greenberg excels at explaining), this book is still about human feats and failings, idealism, trust and betrayal. — IRISH TIMES

Présentation de l'éditeur

Who Are The Cypherpunks?
 
This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, and We Steal Secrets: The Story of Wikileaks, a documentary out now.

 
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.

Forbes journalist Andy Greenberg has traced its shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond.

This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.

With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.




Détails sur le produit

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
1
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoile
0
Voir le commentaire client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Relié Achat vérifié
This book will become important for kids of the 20's
Like Steven Levy's Hackers was for kids of the 80's
Extraordinary clever people doing extraordinary things of their life.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x94463198) étoiles sur 5 39 commentaires
24 internautes sur 25 ont trouvé ce commentaire utile 
HASH(0x9444fa74) étoiles sur 5 A Gripping And Perfectly Reported Tale Of The History Of Leaking 18 septembre 2012
Par Miguel Morales - Publié sur Amazon.com
Format: Relié
Andy Greenberg crafts an incredibly compelling tale that begins with the historic Pentagon Papers leak and moves through the next four decades of internet activism, hacking and cyberleaking, always keeping the colorful cast of hacktivists front and center.

It's amazing that he managed to interview so many of these (rightly) secretive folks, including Wikileaks' Julian Assange. What's more surprising is that he can convey the principles of hacking and cybersecurity clearly and make those subjects fascinating at the same time.

Greenberg manages to transform the tug of war between prying government agencies and the internet freedom fighters who want to make our lives private again into something compulsively readable, operatic even. The way he weaves different storylines and manages to neither lionize the hacktivists and pillory the state is commendable.

Everything about this book--its writing, its scope and reporting, its ability to show how central hacking and privacy is to our world's future--is tops.
21 internautes sur 22 ont trouvé ce commentaire utile 
HASH(0x9444fad4) étoiles sur 5 Reads like a good novel 14 septembre 2012
Par Timothy C May - Publié sur Amazon.com
Format: Relié Achat vérifié
A gripping read! Very well-told. And for the parts and personalities I am directly familiar with, accurate. (A few tiny errors, a few compressions of events, etc., but generally accurate.)

I had a copy on pre-order with Amazon, so it arrived on Sept. 13th. I took it to the County Fair with me and read big chunks of the book while sitting on a bench.

The style of telling parts of life stories (Ellsberg, Zimmerman, Assange, Manning, me, etc.) and then interleaving with the stories of others, gradually moving forward in time, was especially interesting. Almost like a novel, or a musical piece, with themes, counterpoint, fugue-like developments. It gave a panorama of the themes and (some of) the players from the 1960s to the present, with an underlying motif.

I haven't really gotten to the second half of the book, except by skipping around and peeking. It seems more disjointed. Perhaps because I wasn't active in those events, or perhaps because the outcome just hasn't been written yet. Or maybe it's those crazy kids! The level of back-stabbing in Cypherpunks was not a fraction of what seems to have happened in the Wikileaks denouement.

Well done! It reminds me of Tracy Kidder's "The Soul of a New Machine" in a lot of ways.
11 internautes sur 12 ont trouvé ce commentaire utile 
HASH(0x954c94cc) étoiles sur 5 Great history, not so good on technology 17 décembre 2012
Par Ilya Grigorik - Publié sur Amazon.com
Format: Relié
I'll rank this book on two axis. The first is the historical narrative, which offers a great perspective on the evolution of how, and what it means to "leak information". The book starts with the Pentagon Papers incident, and then moves forward through several decades of tools, crypto, hacking, activism, and cyberleaking developments. In the process, you'll be introduced to all the major individuals who have left their footprints on the field - this part deserves a solid 5/5 stars. Great, engaging stories and well written.

The second axis is the technical one: here, the reader is left in the dark. The book covers the basics, but does so superficially. Now, this book is not meant to be a technical how-to, but given the subject, I fear this is an oversight - the book appears to give you an explanation, but there are too many gaps. The book should have made clear that these explanations are limited, at best, and should not be relied on. Don't read it for the technology, but do read it for the history and the personal stories.
19 internautes sur 24 ont trouvé ce commentaire utile 
HASH(0x94290ce4) étoiles sur 5 Non Glib Ex Nihilo WikiLeaks Exploitation 13 septembre 2012
Par John Young - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
9 October 2012

After re-reading on Kindle the book is even better. Searching, cross-linking and assembling one or more of Greenberg's characters provides different narratives than his unsettling multiple disjointedness. Read Tim May next to Julian Assange, Mudge next to John Gilmore, Adrian Lamo next to Jacob Appelbaum, Daniel Domscheit-Berg next to Phil Zimmermann. With Kindle these juxtapositions, and others, your own book can be read next to Greenberg's. The book should be put on the web for many variable readings -- it is that valuable to mine, reconfigure, rewrite, argue with its characters and author.

-----

This is a well-researched book that doesn't settle for glib exploitation of fictional ex nihilo WikiLeaks singularity.

Andy Greenberg has invented a gallery of "characters" (me among them) from selected debris of interviews for "This Machine Kills Secrets," an exceptionally informative account of the technical and philosophical global battle for control of communication between lock-step hierarchies of authorities armed with military-grade secrecy and armored with lie-dispensing public relations and diversely distributed, far smarter and agile, anarchical dissidents intending to swarm and undermine official "full-spectrum dominance" of information.

These challengers of abusive control of information see official secrecy as destructive of democracy and unfettered, unspied-upon communication among the citizenry. Their main weapon against the Big Iron Arms of authority (military, espionage, legislation, finance) is pervasive public encryption to protect personal privacy, identity and communication -- supplemented by creative ways to work around authoritative information control and censorship.

With unprecedented access to mostly little known key participants Greenberg amply describes the decades-long campaign for public secrecy and privacy, the deployment of unauthorized disclosures, anonymity, pseudonymity, untraceability, subterfuge, chicanery, feints, ploys, humor and ricidule for direct open confrontation and defiance of authority as exemplary demonstration of digital democracy in action.

This will serve as a worldwide guide to understand why authorities -- gov, com, edu, org -- dread loss of centralized power through the uncontrolled, decentralized, anonymous, open Internet and are feverishly, stupidly attempting to devise Big Iron control measures. As Greenberg warns -- hark journalists, himself, Forbes and ilk -- "get used to it, this machine for killing secrets will not stop."

I.e., a leak of the book's contents, list of characters and index: [URL deleted by Amazon, see cryptome.org, August 21, 2012]
[...]
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x942821f8) étoiles sur 5 How Did WikiLeaks Really Happen? 20 octobre 2012
Par Robert McMillan - Publié sur Amazon.com
Format: Relié
Could the Pentagon Papers have been leaked without a photocopier? Though now seen as the most famous leak in U.S. history, and a catalyst for the end of the Vietnam war, the Pentagon Papers did not happen overnight. Far from it, it took Daniel Ellsberg close to a year of tedious nighttime photocopying and daytime pruning (Ellsberg had to remove an Top Secret markings from his documents in order to recopy them for the press at a commercial copy-shop) before he finished the eight foot stack of documents. Today a CD-burner can write fifty times Ellsberg's document haul in minutes.

That's what Bradley Manning is accused using to pull of the biggest leak since Ellsberg -- hundreds of thousands of classified documents on the wars in Iraq and Afghanistan and a quarter of a million state department cables, all of which eventually ended up in the hands of Wikileaks.

Ellsberg's colleagues at RAND suspected him immediately. Manning might never have been found out, had he not confessed his crime to a hacker named Adrian Lamo, who quickly turned him in.

Too much has been written about Wikileaks and, particularly, the activists and hackers who have sustained and defended it. So it's a welcome relief to come across a book like Andy Greenberg's "This Machine Kills Secrets," which goes beyond the obvious and sketches out the rich cultural and technical history that ultimately made Wikileaks possible.

Greenberg is that rare writer who can breathe life and color into a complex story about technology without embarrassing himself to the geeks. And he shows off his skills in "This Machine Kills Secrets" with wonderful profiles of people like the godfather of the Cypherpunks Tim May, Wilikeaks Julian Assange, and (my favorite) the anarchic shit-disturber John Young, whose Cryptome.org led the way for Wikileaks.

The book is smart and great fun to read.

"This Machine Kills Secrets" describes the decades-long quest for a sort of Internet-age Philosopher's Stone: a set of technologies that can grant someone true anonymity. If someone can be truly anonymous on the Internet -- and that is technically possible now -- then we are entering a radical new era of global free speech... and leaking.

That last point is where Greenberg's is at his weakest. Are we really entering a new age, or is this all, as Evgeny Morozov pointed out in his New York Times review of the book, merely a blip. Paralyzed by internecine rivalries and an international criminal prosecution, Wikileaks has stalled. And nothing has stepped in to fill its shoes. You get the sense that Greenberg embarked on this book hoping for the start of a revolution that never happened.

But I disagree with Morozov's assessment that the momentum has now turned against the leakers. True, it takes a certain type of person to pull off a Cablegate -- someone with technical sophistication of a Bradley Manning -- but systems for controlling the dissemination of documents are only good enough to deter the technically naive. Lock them down too much, and they become unusable. Security will always be a series of trade-offs and new technologies will continue to shift this balance for years to come. But if you want to get a clear picture of where we are today, read this book.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?