PDF The Art of Invisibility The World Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data Audible Audio Edition Kevin Mitnick Ray Porter Hachette Audio Books

By Kelley Ramos on Wednesday, June 5, 2019

PDF The Art of Invisibility The World Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data Audible Audio Edition Kevin Mitnick Ray Porter Hachette Audio Books





Product details

  • Audible Audiobook
  • Listening Length 9 hours and 17 minutes
  • Program Type Audiobook
  • Version Unabridged
  • Publisher Hachette Audio
  • Audible.com Release Date February 14, 2017
  • Language English, English
  • ASIN B01NC39SM6




The Art of Invisibility The World Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data Audible Audio Edition Kevin Mitnick Ray Porter Hachette Audio Books Reviews


  • This is a very informative book. While I'm not looking to go underground or off- grid, I will be making changes to protect my privacy online. I was outraged by the decision made by our country's legislators to allow Internet providers to disclose and sell the online browsing histories of their customers, which could affect prospective jobs and insurance. For example, if you or your child have a health issue or disability, and you search the Internet for information, a prospective employer who has access to this browsing history could interpret this to mean you will take more time off from work, or be more of a liability with insurance. This is just one type of example the book brings up, among numerous other situations I would never have even thought about. Great book, and thank-you, Kevin Mitnick!
  • This book addresses a great topic The Art of Invisibility. The subtitle could have easily been Why you do it, how you do it and what happens to you if you don’t do it.

    I’ve read all of Kevin’s books and I always keep a ballpoint pen and bright yellow marker at hand so that I can mark those special tidbits I want to remember, or refer back to at a later date. This book is so chucked full of information, I literally highlighted almost every paragraph and page.

    The theme of the book is that we are all being tracked. If you use email, you are being tracked. If you visit a website, you are being tracked. If you use a cell phone, or shop at the market, drive a car, use WiFi or have a refrigerator that’s hooked up to the Internet, you are most likely being tracked. Do you use a credit card with a little square, silver colored chip on it? Have you ever wondered how much personal information maybe on that chip? The author discusses all of these things and much more. If you don't like being tracked and want to learn how to become invisible, the author tells what to look for and how to harden your personal security in an effort to achieving that goal. In the end, however, he warns that becoming invisible is a very difficult task.

    I highly recommend this book.
  • Where do I begin? I've been a computer geek my entire life. Well, since 1982, anyway. My dad bought me a Commodore 64 computer back then. I can't hardly remember a single day that has passed since then that I haven't had a computer in front of me at some point during the day. Heh, I don't know if that's a good thing or a bad thing!

    Anyway, as a developer and security enthusiast, I've always been interested in the hacking scene. Back then, when Kevin Mitnick and Kevin Poulson were in the news because of their "activities", I was glued to the t.v. I wanted to know everything they did! See, the thing is, I was like them. I craved knowledge. I wanted to explore that hidden and forbidden world of the byte and the baud that consisted of inter-connected mainframes and central stations via phone lines. I dialed into a lot of "boards" (BBSes) and got "forbidden knowledge" of what they used to call "phreaking" (phone hacking) from text files uploaded by phreakers. I thought it was just fun and games and never really did anything with the so-called "power" that I had gleaned from those text files.

    Fast forward to today, things are a lot worse, security-wise, with regards to computer security and threats to your private information. Especially since our daily lives are now entertwined with this ubiquitous thing called the internet. Every interaction we perform in our browsers, or internet-enabled applications, leaves information and trails that can be used against us. Our phones, even our automobiles, can be used to track us via GPS. Our credit card purchases can be used to build profiles of us that can be bought and sold to third party customers. Recently, the current U.S. Republican administration repealed a bill that would've prevented ISPs from selling your browsing information to private parties. Nothing you do online is private anymore. Nothing. This isn't like information that Facebook and Google collect on you. The ISP information is every single page that you go to in your browser. Think about this, for a moment You have a medical condition. It's being treated and no one but your closest family knows about it. Like almost everyone with your condition, you browse online about it and have joined online support groups. Your child also suffers from a condition. They are autistic. Like almost any concerned parent, you look online to learn more about you child's condition and, too, to share your experiences and learn from others in similar situations. Recently, you've applied for a new job through a recruiter. They assure you that you're a perfect fit based on your resume and your phone screening interview with them. They want to pass your resume on to the company now, which you give your consent to do so. Now, the company that will be doing the hiring does something that, in the past, they couldn't have done They buy your browsing history from your local ISP. They don't need your consent for this. Your browsing data is considered the ISPs property now and can be sold as a commodity that is tied directly to you. Your prospective employer can now see that, based on your browsing history, that you have a medical condition and a child with autism. Which, more than likely, means you will probably miss a lot of work. So, they do what any good business will do They pass on your resume. You don't even get a chance to interview with them. Your resume gets deep-sixed based soley off your browsing history and nothing else.

    Now, with that nightmare scenario fresh in your head, I want you to understand that when I say this book can help you to avoid such a situation, I really mean it. From encrypting your email, to setting up a VPN, to using the anonymous Tor Onion browser and other security methods, this book can help someone that doesn't know anything about internet security by showing them how to secure their private information, their browsing habits, their email, and all online activity. Seriously, in this day and age, it's almost a sin not to be aware of at least the basic dangers out there in "cyberspace". With this book, you can be very sure that if you follow the steps provided, you'll be very secure from most of those threats.
  • I'm a 20 year IT sys admin and this book was awesome. Much of this stuff I knew already but Kevin puts it together like nobody else can; moreover, he puts it together so anyone can understand.

    It's not just a book about how to become invisible to today's technology grid, it's the Bible of how you are being screwed and used by what you probably don't understand about your favorite gadget, app or appliance.

    I don't care if you don't know the difference between Outlook or AOL, you need to get this book and finish it. It might very well be the most important book you read in the next five years.
  • ****** Starts out with basic security info concepts and builds on that nicely. In two places you are referred to later chapters where the tool for spoofing the MAC address is never actually identified - so Google it! The book identifies and describes a lot of useful tools and techniques. I originally gave this a 4 - I had hoped to learn more from it. But I've just re-read it and pushed my rating from a 4 up to a 5 and wish I could give it a 6! I've been in security for quite a while and still learned a thing or two. When's the last time you enjoyed reading resource material? Great coverage of a great topic.