References
- Aas, K. F. 2006. ‘The Body Does Not Lie’: Identity, Risk and Trust in Technoculture. Crime, Media, Culture, 2(2):143–158. doi: https://doi.org/10.1177/1741659006065401
- Amoore, Louise & Alexandra Hall. 2009. Taking People Apart: Digitised Dissection and the Body at the Border. Environment and Planning D: Society and Space, 27(3):444–464. doi: https://doi.org/10.1068/d1208
- Arendt, Hannah. 1973. The Origins of Totalitarianism (New ed.). New York, NY: Harcourt Brace Jovanovich.
- Boellstorff, Tom. 2008. Coming of Age in Second Life: An Anthropologist Explores the Virtually Human. Princeton: Princeton University Press.
- Browne, Simone. 2015. Dark Matters: On the Surveillance of Blackness. Durham: Duke University Press.
- CCC. 2013. Chaos Computer Club Hackt Apple TouchID. Chaos Computer Club. https://www.ccc.de/updates/2013/ccc-breaks-apple-touchid (Accessed 21 September 2013).
- CCC. 2014. Ich sehe, also bin ich … Du: Gefahren von Kameras für (biometrische) Authentifizierungsverfahren. Hamburg. https://media.ccc.de/v/31c3_-_6450_-_de_-_saal_1_-_201412272030_-_ich_sehe_also_bin_ich_du_-_starbug.
- CCC. 2016. 33C3 Main Page. Chaos Computer Club. https://events.ccc.de/congress/2016/wiki/Main_Page (Accessed 27 December 2016).
- CCC. 2017. Heute Mal Ohne Biometrie: Reisepass “well Done”. Chaos Computer Club. https://www.ccc.de/en/updates/2017/chip-zappen (Accessed 7 April 2017).
- Cohen, Julie. 2012. What Privacy Is For. Harvard Law Review, 126(7):1904–1933.
- Coleman, E. Gabriella. 2010. Ethnographic Approaches to Digital Media. Annual Review of Anthropology, 39(1):487–505. doi: https://doi.org/10.1146/annurev.anthro.012809.104945
- Coleman, E. Gabriella. 2013. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton: Princeton University Press.
- Coleman, E. Gabriella. 2015. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. London: Bloomsbury.
- Coleman, E. Gabriella. 2017. From Internet Farming to Weapons of the Geek. Current Anthropology, 58(S15):S91–S102. doi: https://doi.org/10.1086/688697
- Coleman, E. Gabriella & Alex Golub. 2008. Hacker Practice: Moral Genres and the Cultural Articulation of Liberalism. Anthropological Theory, 8 (3):255–277. doi: https://doi.org/10.1177/1463499608093814
- Comaroff, Jean & John L. Comaroff. 2012. Theory From the South: Or, How Euro-America Is Evolving Toward Africa. Boulder: Paradigm Publ.
- CryptoParty. 2018. What Is a CryptoParty? https://www.cryptoparty.in/ (Accessed 11 January 2018).
- De Filippi, Primavera & Félix Tréguer. 2015. Expanding the Internet Commons: The Subversive Potential of Wireless Community Networks. Journal of Peer Production (6):1–40.
- Deleuze, Gilles. 1992. Postscript on the Societies of Control. October 59: 3–7.
- Deseriis, Marco. 2015. Improper Names: Collective Pseudonyms From the Luddites to Anonymous. Minneapolis: University of Minnesota Press.
- Dubrofsky, Rachel E. & Shoshana Magnet (eds). 2015. Feminist Surveillance Studies. Durham: Duke University Press.
- Escobar, Arturo, David Hess, Isabel Licha, Will Sibley, Marilyn Strathern & Judith Sutz. 1994. Welcome to Cyberia: Notes on the Anthropology of Cyberculture. Current Anthropology, 35(3):211–231. doi: https://doi.org/10.1086/204266
- Fernando, Mayanthi. 2014. The Republic Unsettled: Muslim French and the Contradictions of Secularism. Durham: Duke University Press.
- Hawthorne, Camilla. 2019. Dangerous Networks: Internet Regulations as Racial Border Control in Italy. In DigitalSTS: A Field Guide for Science & Technology Studies, edited by J. Vertesiet al., 178–197. Princeton, NJ: Princeton University Press.
- Hughes, Eric. 1993. A Cypherpunk’s Manifesto. https://www.activism.net/cypherpunk/manifesto.html (Accessed 9 March 1993).
- Jackson, Michael. 2012. Between One and One Another. Berkeley: University of California Press.
- Jones, Graham M. 2014. Secrecy. Annual Review of Anthropology, 43(1):53–69. doi: https://doi.org/10.1146/annurev-anthro-102313-030058
- Jordan, Tim & Paul A. Taylor. 2004. Hacktivism and Cyberwars: Rebels with a Cause? London: Routledge.
- Juris, Jeffrey S. 2008. Networking Futures: The Movements Against Corporate Globalization. Experimental Futures. Durham: Duke University Press.
- Kahn, Jonathan. 2003. Privacy as a Legal Principle of Identity Maintenance. Seton Hall Law Review, 33(2):371–410.
- Kelty, Christopher M. 2008. Two Bits: The Cultural Significance of Free Software. Durham: Duke University Press.
- Kubitschko, Sebastian. 2015. Hackers’ Media Practices: Demonstrating and Articulating Expertise as Interlocking Arrangements. Convergence: The International Journal of Research Into New Media Technologies, 21(3):388–402. doi: https://doi.org/10.1177/1354856515579847
- Landes, Joan B. (ed). 1998. Feminism, the Public and the Private. Oxford: Oxford University Press.
- Leach, James, Dawn Nafus & Bernhard Krieger. 2009. Freedom Imagined: Morality and Aesthetics in Open Source Software Design. Ethnos, 74(1):51–71. doi: https://doi.org/10.1080/00141840902751188
- Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. Garden City, N.Y: Anchor Press/Doubleday.
- Luna, Sarah. 2018. Affective Atmospheres of Terror on the Mexico–U.S. Border: Rumors of Violence in Reynosa’s Prostitution Zone. Cultural Anthropology, 33(1):59–84. doi: https://doi.org/10.14506/ca33.1.03
- Lyon, David (ed). 2003. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. London: Routledge.
- Magnet, Shoshana. 2011. When Biometrics Fail: Gender, Race, and the Technology of Identity. Durham: Duke University Press.
- Maguire, Mark, Catarina Frois & Nils Zurawski (ed). 2014. The Anthropology of Security: Perspectives From the Frontline of Policing, Counter-Terrorism and Border Control. London: Pluto Press.
- Mahmud, Lilith. 2014. The Brotherhood of Freemason Sisters: Gender, Secrecy, and Fraternity in Italian Masonic Lodges. Chicago: The University of Chicago Press.
- Manderson, Lenore, Mark Davis, Chip Colwell & Tanja Ahlin. 2015. On Secrecy, Disclosure, the Public, and the Private in Anthropology. Current Anthropology, 56(S12):S183–S190. doi: https://doi.org/10.1086/683302
- Marx, Gary. 2006. Soft Surveillance: The Growth of Mandatory Volunteerism in Collecting Personal Information. In Surveillance and Security: Technological Politics and Power in Everyday Life, edited by Torin Monahan, 37–56. Portland: Wilan.
- Marx, Gary. 2016. Windows Into the Soul: Surveillance and Society in an Age of High Technology. Chicago: University of Chicago Press.
- Mehta, Uday Singh. 1999. Liberalism and Empire: A Study in Nineteenth-Century British Liberal Thought. Chicago: University of Chicago Press.
- Nippert-Eng, Christena. 2010. Islands of Privacy. Chicago: University of Chicago Press.
- Nissenbaum, Helen. 2004. Hackers and the Contested Ontology of Cyberspace. New Media & Society, 6 (2):195–217. doi: https://doi.org/10.1177/1461444804041445
- O’Hagan, Andrew. 2016. The Satoshi Affair. The London Review of Books, June 2016.
- Opsahl, Kurt & William Budington. 2017. Protecting Your Privacy at the Border: Traveling with Digital Devices in the Golden Age of Surveillance. Presented at the 34th Chaos Communication Congress, Leipzig, Germany, December 29. https://events.ccc.de/congress/2017/Fahrplan/events/9086.html.
- Postill, John. 2018. The Rise of Nerd Politics: Digital Activism and Political Change. Anthropology, Culture & Society. London: Pluto Press.
- Razsa, Maple. 2015. Bastards of Utopia: Living Radical Politics After Socialism. Bloomington: Indiana University Press.
- Reiman, Jeffrey. 1976. Privacy, Intimacy, and Personhood. Philosophy & Public Affairs, 6 (1):26–44.
- Rogaway, Phillip. 2015. The Moral Character of Cryptographic Work. IACR Distinguished Lecture. Auckland, New Zealand.
- Sales, Erin M. 2014. The Biometric Revolution: An Erosion of the Fifth Amendment Privilege to Be Free From Self-Incrimination. University of Miami Law Review, 69(1):193–240.
- Salter, Mark B. 2008. When the Exception Becomes the Rule: Borders, Sovereignty, and Citizenship. Citizenship Studies, 12(4):365–380. doi: https://doi.org/10.1080/13621020802184234
- Schrodt, Paul. 2016. Edward Snowden Just Made an Impassioned Argument for Why Privacy Is the Most Important Right. Business Insider, September 15, 2016. http://www.businessinsider.com/edward-snowden-privacy-argument-2016-9.
- Simmel, Georg. 1906. The Sociology of Secrecy and of Secret Societies. American Journal of Sociology, 11(4):441–498. doi: https://doi.org/10.1086/211418
- Stadler, Felix. 2002. Opinion: Privacy Is Not the Antidote to Surveillance. Surveillance & Society, 1(1):120–124.
- Suter, Sonia M. 2010. All in the Family: Privacy and DNA Familial Searching. Harvard Journal of Law & Technology, 23(2):310–399.
- Thomson, Judith Jarvis. 1975. The Right to Privacy. Philosophy & Public Affairs, 4 (4):295–314.
- Turkle, Sherry. 2005. The Second Self: Computers and the Human Spirit. Cambridge: MIT Press.
- Zuboff, Shoshana. 2015. Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology, 30(1):75–89. doi: https://doi.org/10.1057/jit.2015.5