Audiobook9 hours
Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World
Written by Bruce Schneier
Narrated by Dan John Miller
Rating: 4 out of 5 stars
4/5
()
About this audiobook
A fellow at the Harvard Center for Internet and Society, Bruce Schneier has been called "one of the world's foremost security experts" (Wired). In Data and Goliath, Schneier offers a sobering look at government/corporate surveillance and the ever-rising threat to personal privacy and freedom.
More audiobooks from Bruce Schneier
Schneier on Security Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Not with a Bug, But With a Sticker: Attacks on Machine Learning Systems and What to Do About Them Rating: 0 out of 5 stars0 ratingsLiars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 4 out of 5 stars4/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5
Related to Data and Goliath
Related audiobooks
Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Cyber Privacy: Who Has Your Data and Why You Should Care Rating: 2 out of 5 stars2/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 5 out of 5 stars5/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5Data For the People: How to Make Our Post-Privacy Economy Work for You Rating: 3 out of 5 stars3/5Augmented: Life in The Smart Lane Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech Rating: 4 out of 5 stars4/5Obfuscation: A User's Guide for Privacy and Protest Rating: 4 out of 5 stars4/5Trafficking Data: How China is Winning the Battle for Digital Sovereignty Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5The Ethical Algorithm: The Science of Socially Aware Algorithm Design Rating: 5 out of 5 stars5/5Rage Inside the Machine: The Prejudice of Algorithms, and How to Stop the Internet Making Bigots of Us All Rating: 4 out of 5 stars4/5Who Owns the Future? Rating: 4 out of 5 stars4/5The Filter Bubble: What the Internet Is Hiding from You Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5The Technology Fallacy: How People Are the Real Key to Digital Transformation Rating: 4 out of 5 stars4/5The Mesh: Why the Future of Business is Sharing Rating: 0 out of 5 stars0 ratingsBreached!: Why Data Security Law Fails and How to Improve It: 1st Edition Rating: 5 out of 5 stars5/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsIf It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Internet Things Rating: 4 out of 5 stars4/5
Security For You
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Blockchain For Dummies Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsThe Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 5 out of 5 stars5/5
Reviews for Data and Goliath
Rating: 4.090909104132232 out of 5 stars
4/5
121 ratings9 reviews
- Rating: 3 out of 5 stars3/5A bit boring if you're not a CISSP professional. Fails on not making it interesting for non techies.
1 person found this helpful
- Rating: 5 out of 5 stars5/5Excellent book, highly recommended ?
I enjoyed it a lot - Rating: 4 out of 5 stars4/5Good info that all should know. Schneier is good at making a very technically challenging subject understandable. Surprising the editor didn't catch that the reader didn't get the author's name right, though.
- Rating: 5 out of 5 stars5/5“Data and Goliath” by Bruce Schneier. This is a good overview of the internet and privacy. The internet of things is the next frontline on the loss of privacy and the increase in surveillance over us all. I didn’t learn all that much that was new to me because I have been following this issue ever since PCs became a thing. Well worth reading though.
- Rating: 4 out of 5 stars4/5A fascinating account of the way in which corporations are invading our privacy for profit at the same time governments are doing so for poorly founded security concerns. Both groups tend to see privacy and prohibitions against unreasonable search, and seizure as outmoded and even dangerous values. Schneier's well researched book documents shocking and insidious assaults on privacy on almost every page. Reading these specific incidents gives the reader a much deeper understanding of the problem than the more vague and global perspective from the mainstream media, even after the specificity of the Snowden revelations. Also helpful are the concrete methods individuals can use to defend themselves, though these are constantly changing due to new technologies such as facial recognition.
- Rating: 4 out of 5 stars4/5This book is an excellent summary of the current situation of big data and internet privacy and security concerns. It is meant for an educated adult audience, but probably would make sense to a sufficiently tech-savvy teen. The book does not provide any new information, if you keep up with these kinds of issues on your own, but it is the perfect way to introduce someone to the topic without sending them a pile of jargon-heavy links. People who are concerned about their personal privacy online, the risks of "cyber-warfare", and the goings-on of the NSA would all find this book interesting. Schneier has probably maintained a popular blog for so long because he is extremely good at condensing complex issues and remaining non-alarmist. If I have a complaint it's that it is sometimes repetitive, but it may not seem that way to someone new to these ideas. It is also worth noting that the last 1/3rd of the book is all footnotes and citations, so it's not actually as long as it looks.
- Rating: 5 out of 5 stars5/5This is your wake-up call about your lack of recorded data security and privacy. That's the consensus on this book (Data and Goliath, written by Bruce Schneier) from the noted writers Malcolm Gladwell, Seymour M. Hersh, Richard A. Clarke, and Steven Pinker. There was a lot even for me to learn (I've done computer network support work, and have studied the disclosures of Edward Snowden since 2013). So, how does Data and Goliath compare with 2015's other blockbuster book in this subject area, "Privacy In The Modern Age?" Author Schneier has a short chapter in the EPIC nonprofit group's "Privacy In The Modern Age," which takes a wider, deeper, and more galvanizing survey of our horrifying 21st century privacy problems and solutions. Most of those privacy problems are not discussed in Schneier's own book, due to the complexity of privacy issues. (See my LT review of Privacy In The Modern Age to understand my use here of the word "horrifying.") The focus of Data and Goliath is on our victimization by nonstop surveillance through our own data; it examines what is being collected and how that is being done. Then, in the words of Seymour Hersh, "it tells the average low-tech citizen what steps he or she can take to limit surveillance and thus fight those who are seeking to strip privacy from all of us."
- Rating: 4 out of 5 stars4/5This is a comprehensive look at the various challenges for human privacy and security in an age of ever-increasing corporate and government ability to surveil and influence us. Nothing is likely to surprise anyone who’s been reading Wired, the EFF’s blog, or similar sources for the past few years, but Schneier provides an elegant update of the truism that those who sacrifice privacy for security will end up having neither.
- Rating: 4 out of 5 stars4/5If you have followed the Snowden revelations and are aware of IT privacy issues, then you aren't really part of the target audience for this book which spends a good amount of its pages on recapitulating the events. Its intended recipients are people enrolled in some introduction course on information security and privacy to create some awareness about the issues. Bruce Schneier is a noted expert and I had hoped that the book would go deeper than what his blog and columns already presented. While there is a chapter on "Solutions for the Rest of Us", the dirty truth is that collective action on an international level is needed to limit the power grab and violation of individual rights.Storing and processing information is getting cheaper and cheaper. Companies and governments demand more and more data. The mandatory US visa waiver entry form now demands that you pay by credit card, that you give an email address, that you list your employer, the names of your parents and a whole lot of other personal but not really pertinent information for a tourist visit to the United States. For this so called visa waiver program that is hard to distinguish from an actual visa application you are then gouged for a processing fee (part of which finances US tourism programs). The collected information is then supplemented by the mandatory flight information and upon entry, finger print and passport information. Combined with the NSA stack of information, the United States' mantra of "collect it all" has created a Stasi on steroids system that keeps on growing and will be used by the modern J. Edgar Hoovers to nefarious purposes.David stood an unfair chance and prevailed against expectations over Goliath (except in Malcolm Gladwell's interpretation of Goliath as a handicapped person). In the modern confrontation, Goliath has all the power and the data to crush individual liberties. The protagonists of the US Stasi see no compunction in breaking their own laws, lie to their courts and oversight committees. Up to now, only those that stood to preserve liberties have been punished. There is no battle, it is a silent massacre of the bill of rights and its amendments. The devil' bargain of the Chinese model is all too active in the West already: The state will not interfere as long as citizens act as docile consumers. I had hoped that the end of history looked different than the utopia presented in WALL-E.