Take Back Your Privacy: The Barefoot Anarchist's Guide to Navigating Today's Digital Landscape
4/5
()
Currently unavailable
Currently unavailable
About this ebook
Curious about surveillance? Wondering about the security of your computer or phone?
These are just a couple of possible starting points. The author, with decades of experience in the field, takes us on a journey through the digital landscape. Exhaustively researched, with hundreds of links, it's nevertheless written in an informal and entertaining style.
Do you know the difference between "a web browser" and "the internet"? That's about all you'll need, to start. When you're done with this book, you'll know more than most IT (information technology) professionals do about digital security. You'll be able to analyze the claims made by tech bloggers and those who flog their own products. You'll know much, much more about the risks to your privacy and anonymity--and why they're both so important--in today's fast-moving world.
Then, at the end, the author tells how he once went to jail for trying to help protect thousands of college students (including himself). It's a chilling reminder of just how easily "spin" can replace substance. And yet, it's a funny story.
Come on in and give this book a try. You'll be glad you did.
The Table of Contents:
- Dedication
- Who needs this book?
- What's a Barefoot Anarchist?
- Chapter 1: Why Privacy? Why Encrypt?
- Chapter 2: Threat Modeling
- Chapter 3: Connections
- Chapter 4: Downloading Files
- Chapter 5: Digital Purchases
- Chapter 6: General Computing
- Chapter 7: Operating Systems
- Chapter 8: Telephony
- Chapter 9: Web Browsing
- Chapter 10: "Cloud" Backups
- Chapter 11: Email
- Chapter 12: Putting It All Together
- Appendix A: Encryption Primer
- Appendix B: Jail!
- Thanks for Reading!
- Excerpt from Shiver on the Sky
David Haywood Young
David Haywood Young started writing books for his younger brother and sister when he was about six years old. It turned out that he couldn't make a living that way, though. Not yet, anyway. So for the first twenty or so years after he started needing to buy his own groceries, he split his time between software development and professional poker. On the software side, he had his own company until late 2012. On the poker side, he might enjoy yours. Now, though? He writes. A lot. And he's extremely happy about it. From the author: Thanks, and please feel free to drop me a line! Comments, suggestions, criticisms: all good. Also, starting 7/31/2013 I promised to post a free "Weekly Challenge" story on my blog every Wednesday. So far it's been a huge amount of fun. And I don't seem to have left myself any wiggle room...cool! Want to come watch and see what happens?
Related to Take Back Your Privacy
Related ebooks
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies Rating: 5 out of 5 stars5/5Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies Rating: 5 out of 5 stars5/5The Paranoid's Guide to Using the Internet Rating: 1 out of 5 stars1/5Your Safety and Privacy Online: The CIA and NSA Rating: 0 out of 5 stars0 ratingsWifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsPrivacy Online: The Practical Privacy Guide For Anyone Rating: 0 out of 5 stars0 ratingsBeating The Beast Goldmine Rating: 0 out of 5 stars0 ratingsGuidebook For Your Digital World: How To Avoid the Scammers and Pickpockets on Your Digital Journey Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsPasswords Made Easy+ Rating: 0 out of 5 stars0 ratingsOnline Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet Rating: 4 out of 5 stars4/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratings10 Things That Used to be Good Ideas in Data Security Rating: 0 out of 5 stars0 ratingsConquering The Beast Goldmine Rating: 0 out of 5 stars0 ratingsEasy Marketing Step-By-Step: Start Your Internet Business in The Next 5 Days Rating: 0 out of 5 stars0 ratingsCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5What Else Can I Do on the Internet? Rating: 0 out of 5 stars0 ratingsPrivileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratingsOWNED: Why hacking continues to be a problem Rating: 0 out of 5 stars0 ratingsStay Anonymous Online:A Short and Simple Guide to Hide Yourself In The Internet Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Ultimate Ethical Hacking Boot Camp Beginner to Pro Rating: 0 out of 5 stars0 ratingsOmerta.com Rating: 0 out of 5 stars0 ratingsIBM i Security Administration and Compliance Rating: 0 out of 5 stars0 ratingsThe Art And Science Of Software Development Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsBlockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5
Reviews for Take Back Your Privacy
1 rating0 reviews