📖 Overview
This Machine Kills Secrets examines the rise of digital whistleblowers and the technological tools that enable anonymous information leaks. The book traces key figures and events in the evolution of digital transparency movements, from early cypherpunks to WikiLeaks and beyond.
The narrative follows cryptographers, hackers, and activists who developed technologies to protect whistleblowers and enable secure information sharing. Through interviews and investigation, Greenberg documents their technical innovations and the high-stakes conflicts that emerged as governments and institutions fought to maintain control of sensitive information.
Andy Greenberg presents the personalities, motivations, and methods behind major information leaks while explaining the underlying cryptographic systems in clear terms. The book covers both successful and failed attempts to create secure digital pipelines for exposing secrets.
The work raises fundamental questions about privacy, security, and transparency in the digital age, exploring the tension between institutional secrecy and the public's right to information. At its core, it chronicles a technological arms race between those who wish to reveal hidden information and those who seek to keep it concealed.
👀 Reviews
Readers found the book offered clear explanations of complex technical concepts around cryptography, whistleblowing, and information security. Many noted it reads like an investigative thriller while delivering thorough journalism.
Readers appreciated:
- Detailed profiles of cypherpunks and key figures
- Historical context for WikiLeaks and modern leaking
- Accessible explanations of encryption technology
- Balanced perspective on controversial topics
Common criticisms:
- Some sections drag with excessive technical detail
- Later chapters feel rushed compared to earlier ones
- A few readers wanted more analysis of leaks' impacts
- Some found the chronological jumps confusing
Ratings across platforms:
Goodreads: 4.0/5 (1,200+ ratings)
Amazon: 4.3/5 (90+ ratings)
LibraryThing: 3.9/5 (40+ ratings)
One reader noted: "It connects technological dots that help explain today's digital privacy landscape." Another said: "Too much focus on personalities instead of the bigger picture of government surveillance."
📚 Similar books
We Are Anonymous by Parmy Olson
A history of the hacktivist group Anonymous traces their operations, methods, and impact on global institutions.
The Cuckoo's Egg by Clifford Stoll The true account of an astronomer-turned-systems-manager who tracked a KGB hacker through computer networks in 1986.
Ghost in the Wires by Kevin D. Mitnick The autobiography of a notorious hacker details his exploits, techniques, and years as a fugitive from the FBI.
The Code Book by Simon Singh A comprehensive history of encryption and code-breaking spans from ancient Egypt to quantum cryptography.
Dark Territory by Fred Kaplan The origins and evolution of cyber warfare unfold through the actions of presidents, generals, and hackers who shaped modern digital security.
The Cuckoo's Egg by Clifford Stoll The true account of an astronomer-turned-systems-manager who tracked a KGB hacker through computer networks in 1986.
Ghost in the Wires by Kevin D. Mitnick The autobiography of a notorious hacker details his exploits, techniques, and years as a fugitive from the FBI.
The Code Book by Simon Singh A comprehensive history of encryption and code-breaking spans from ancient Egypt to quantum cryptography.
Dark Territory by Fred Kaplan The origins and evolution of cyber warfare unfold through the actions of presidents, generals, and hackers who shaped modern digital security.
🤔 Interesting facts
🔍 The encryption method PGP (Pretty Good Privacy), which is discussed extensively in the book, was originally written by Phil Zimmermann in 1991 on a single Macintosh computer.
💻 Author Andy Greenberg is a senior writer for WIRED magazine and has been covering cybersecurity, privacy, and information freedom for over a decade.
🌐 WikiLeaks, a central focus of the book, published its first document in December 2006 - a decision signed by a Somali Islamic courts official to assassinate government officials.
🔐 The term "cypherpunk" was coined in 1992 by Jude Milhon, combining "cipher" and "cyberpunk," and the movement's mailing list began in the same year.
🏆 The book won the 2023 American Library Association's Intellectual Freedom Round Table's Eli M. Oboler Memorial Award for writing that advocates for intellectual freedom.