The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

paperback

Published Feb. 14, 2017 by Hachette Book Group USA.

ISBN:
978-0-316-55454-1
Copied ISBN!

View on OpenLibrary

View on Inventaire

4 stars (1 review)

From the publisher: Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded …

2 editions

Accessible and perturbing overview of how you can be hacked and tracked

4 stars

As a longtime software developer I already had a vague understanding of security and privacy issues, but even though this book is written for the general public it goes into a lot of detail that's new to me (you can be identified from your keyboard by your typing pattern - time to let the cat walk all over it!). There are a lot of tips on how to operate anonymously, whether to avoid the feds or facebook, but just the steps required (burner phones, bitcoin, prepaid cards) bring home the surveillance society we're in. But even if you're not the next Snowden or dark web drug kingpin, this book is worth reading or gifting to your relatives who are always asking you to fix their wifi so they adopt safety tips like clearing the browser history in public computers, installing vpns, using mobile hotspot, etc.