
Critic Reviews
Great
Based on 7 reviews on

"Unsettling, absolutely riveting, and--for better or worse--necessary reading." --Brian Christian, author of Algorithms to Live By and The Alignment Problem
An entertaining account of the philosophy and technology of hacking--and why we all need to understand it.
"Shapiro is funny and unflaggingly fascinated by his subject, luring even the nonspecialist into technical descriptions of coding by teasing out connections between computer programming and, say, the paradox of Achilles and the tortoise . . . A single paragraph moves nimbly from Putin to Descartes to The Matrix . . . Readers [. . .] will find that their expectations have been entertainingly subverted." --Jennifer Szalai, The New York Times
"Scott Shapiro is a pretty rare bird--an eminent legal scholar who is also a geek . . . [He] manages to carve a readable path through the conceptual undergrowth . . . [Fancy Bear Goes Phishing is] an impressive achievement . . . [An] absorbing tour of cyberspace's netherworld." --John Naughton, The Observer "[Shapiro] masterfully blends consideration of two sorts of code, software and legal . . . His narrative zips between technical explanations, legal reasoning and the ideas of thinkers including René Descartes and Alan Turing . . . [Shapiro] succeeds in making [hacking] intelligible to non-specialist readers." --The Economist "Scott Shapiro's lively history . . . [uses] vivid case studies to dramatise a technically complex subject . . . His chronological big five hacks are springboards for the stories of pioneers such as . . . John von Neumann . . . or a deft exploration of how virus writers exploit cognitive biases . . . His impish humour and freewheeling erudition suit a world saturated in pop culture . . . All [hackers] have something in common . . . they see it as a game. Shapiro's achievement is to tell you how it is played." --Dorian Lynskey, The Guardian "Gripping . . . Fancy Bear Goes Phishing offers level-headed suggestions to reduce cybercrime, decrease cyber-espionage and mitigate the risks of cyberwar, arguing that we need to move beyond an obsession with technical fixes and focus instead on the outdated and vulnerable upcode that shapes the shoddy downcode we live with now." --Richard Lea, The Wall Street Journal