Tor and the Dark Art of Anonymity
Written by Lance Henderson
Narrated by James Lewis
5/5
()
About this audiobook
The verdict is in: Tor & the Dark Art of Anonymity is 'unputdownable'. The evidence is in: It's 1984 and you want privacy now, not 6 months from now. It is high time the gloves came off. It's time to FIGHT BACK. Other books tell you to install Tor, the anonymous browser and encrypt your hard drive and leave it at that. This book goes much deeper, delving into the very heart of online invisibility, both offline and on: How to create a new darknet persona and leave no electronic trail when you disappear. In essence, how to be anonymous without looking like you're trying to be anonymous. Other subjects covered in Tor: Darknet Marketplaces & Opsec requirements. Why Silk Road Failed. Bitcoins, Guns & Drugs and The Hidden Wiki. What To Do If Caught. How to Run a Hidden Server on the Deep Web the Right Way. Linux, Darknet Edition, Encryption & Mobile Tor and last but not least... Darknet Personas. Makes an excellent companion piece to The Hacker Playbook by Peter Kim and The Art of Invisibility by Kevin Mitnick. Start today... because tomorrow may be too late!
More audiobooks from Lance Henderson
Burners and Black Markets: How to Be Invisible on Android, Blackberry & Iphone Rating: 5 out of 5 stars5/5Invisibility Toolkit Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Usenet: The Ultimate Guide Rating: 0 out of 5 stars0 ratingsThe Invisibility Toolkit: How to Be Invisible to Stalkers, Criminals and Rogue Governments Rating: 0 out of 5 stars0 ratings
Related to Tor and the Dark Art of Anonymity
Related audiobooks
HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Usenet - The Ultimate Guide Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsFacing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Come and Take It: The Gun Printer's Guide to Thinking Free Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Rating: 0 out of 5 stars0 ratingsMurder on the Dark Web: True Tales From the Dark Side of the Internet Rating: 4 out of 5 stars4/5The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Hackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsCYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsETHICAL HACKING FOR BEGINNERS: HOW TO BUILD YOUR PEN TEST LAB FAST Rating: 4 out of 5 stars4/5
Security For You
Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Blockchain For Dummies Rating: 5 out of 5 stars5/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5
Reviews for Tor and the Dark Art of Anonymity
3 ratings0 reviews