Перейти к содержанию сайта
The Art of Invisibility
Book

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Little, Brown US, 2017 подробнее...

Buy book or audiobook

Read offline


Editorial Rating

8

Qualities

  • Applicable
  • Concrete Examples
  • Insider's Take

Recommendation

The government can read your emails, marketers can target ads based on your search history, and crooks can kidnap your data. Former hacker, Kevin Mitnick, now a computer security consultant, says you can minimize surveillance and cyberattacks by becoming “invisible” online – obscuring your identity and your trail. He explains these strategies with a minimum of tech jargon and a maximum of hands on utility. Most of his tactics are straightforward, though just a few require huge effort. Unless you’re on the run from INTERPOL, they might be overkill. He offers illuminating chapters on strong passwords, public Wi-Fi and encrypted communication, all a big help to any member of today’s technological society.

Summary

Since the September 11, 2001, terrorist attacks, Americans have faced unprecedented levels of surveillance.

As digital connectivity spreads into more areas of life, the threat to your personal privacy increases. Networking now embraces much more than computers and phones. The Internet of Things is integral to myriad machines, such as cars and household appliances. Each new use of networking opens another portal for prying eyes.

Such intrusions follow a range of legal and illegal paths. Governments and law enforcement have taken surveillance to unprecedented levels since the terrorist attacks on September 11, 2001. They can tap phones, read emails and texts, obtain computer search histories, and trace your movements through a cellphone or smartwatch. Corporations track consumers’ online activity and purchases and use the information to target their ads. Criminals steal personal information, or they lock their victims’ accounts and hold their data for ransom. No defense against surveillance and attacks is perfect. A determined hacker can crack any protections. But you can make the hacker’s job more difficult and time-consuming.

Use long passwords...

About the Author

Former hacker Kevin Mitnick is now CEO of Mitnick Security Consulting. Robert Vamosi is a cybersecurity expert and journalist.


Comment on this summary