← Back to Books
Book Notes

The Art of Invisibility

By Kevin Mitnick

privacy security anonymity
"Rule number 1 about being invisible: you can't ever link your anonymous online persona with your real-world persona. You just can't."

What You'll Learn

Programs & Tools

Key Notes

Messaging & Communication

When downloading any app for text messaging from app store, look for OTR (Off-The-Record) messaging, which is a higher-standard E2E protocol.

Private Browsing

Private browsing doesn't create temporary files, and therefore it keeps your browsing history off your laptop or mobile device.

Emulate Geolocation Coordinates

While in Chrome, press Ctrl+Shift+I on Windows or Cmd+Option+I on Mac to open the Chrome Developer Tools. The Console window will open, and you can click the three vertical dots at the top right of the Console, then select More Tools > Sensors. A sensor tab will open. This allows you to define the exact latitude and longitude you want to share.

MAC Address

To stay invisible, the MAC address should be changed each time you connect to the wireless network so your Internet sessions cannot easily be correlated to you.

Image Metadata

Certainly the metadata inside your image files can be used to locate you. EXIF data in a digital image contains:

Device Tracking

Accelerometer device (chip) is responsible for determining the orientation of your device, whether you are holding it in landscape or portrait view. This can be used for fingerprinting.

Physical Surveillance

Automated License Plate Recognition (ALPR) technology is used by law enforcement to recognize vehicles.

IoT Security Risks

An attacker can use Google filters to search for "D-Link Internet cameras." The attacker can then look for the models that default to no authentication, then go to a website such as Shodan, click a link, and view the video streams at his leisure.

Useful Links

Key Takeaways