Kevin Mitnick - The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
Just finished this book...
Its great as a summation- if youve been around these parts for a while you probably already know a good quarter of the book
-Covers the issues with cellphones of all flavors quite well, how to avoid pinging towers, how to get a cell phone anonymously etc
-Talks about anon emails and remailers
-Doesnt dive too deep in most topics (great for the tecnically uninclined) but gives you a practical “do this instead of that”
-Specifically uses real world drug dealing opsec failures periodically, for example a man with 12 burner phones dealing 500 million dollars worth of ecstasy was caught after calling a journalist... they pinged his location and identity
-Obvious stuff you “should” already be doing: using long passwords, changing passwords, etc
-Horror stories of individuals at security conferences compromising just about every digital hardware that has a radio: smart appliances rf cars you name it
-Router security
-Pgp
-does not talk about OS’s to use too much other than a brief USE TAILS
-staying anonymous while traveling
Useful quick read