• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Reviews / Book Review: Little Brother by Cory Doctorow

Book Review: Little Brother by Cory Doctorow

2010-06-14 by Jason

Little Brother by Cory Doctorow, the co-editor of the popular site boingboing.net, is a work of fiction for young adults (and even us adults) that was on the New York Times best-seller list for seven weeks. Although a fictional account of the events after an event similar to 9-11, the story relates to those interested in IT security very readily. Deeply embroiled as a political thriller, Little Brother was also very capable of showing how technology can be used against oneself and how we should really understand the things we use and become dependent upon on a daily basis.

Disguising quite a bit of education within the context of the story, Little Brother explains interesting topics such as the Electronic Frontier Foundation, cryptography, Bayesian probability, encryption and the public key infrastructure, RFID hacking, and privacy and security. All right in line with its story about e-terrorismm, Little Brother captivates the reader in the scary practicality and possibility of what seemed like a far-fetched plot at the beginning. For example, here’s a small excerpt explaining a fictional operating system (although most things don’t need to be made-up) that is used in the story:

Paranoid Linux is an operating system that assumes that its operator is under assault from the government (it was intended for use by Chinese and Syrian dissidents), and it does everything it can to keep your communications and documents a secret. It even throws up a bunch of “chaff” communications that are supposed to disguise the fact that you’re doing anything covert. So while you’re receiving a political message one character at a time, Paranoid Linux is pretending to surf the Web and fill in questionnaires and flirt in chat-rooms. Meanwhile, one in every five hundred characters you receive is your real message, a needle buried in a huge haystack.

Although available from Amazon in paperback and hardback formats, the author also has Creative Commons-licensed copies of the book available for download from his website in all sorts of formats.

I actually listened to this book instead of reading it and, read by Kirby Heyborne, found it to be one of the best audiobooks I’ve listened to before.

Filed Under: Reviews

Trending

  • How do you keep track of dozens of screws during a hardware replacement?
    In Tech Solutions
  • Good in Theory, Poor Execution: A/C in the Home Office
    In Going Green, Hardware, Gadgets, and Products, Tech Solutions
  • HTC One (M9), Samsung Galaxy S6 and other announcements from MWC 2015
    In Hardware, Gadgets, and Products

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in