haileystewart6's review against another edition

Go to review page

challenging informative medium-paced

4.25

linuxlibrarian's review against another edition

Go to review page

reflective

1.0

Sadly a bit out of date. 

lzebarah's review against another edition

Go to review page

informative medium-paced

2.5

At some point, someone needed to sit down with Mitnick and figure out who this book was written for. Ideally, after that conversation, someone would look at the organization of this book and fix it.

The first chapter is about choosing a good password and setting up 2FA.

The next chapter throws you into PGP encryption keys.

Then, about 3 chapters after that, he tells you what HTTPS is.

There seems to be no rhyme or reason to it. Someone in the editing process just completely dropped the ball, and it's not a great look.

Expand filter menu Content Warnings

nicole_rietveld's review against another edition

Go to review page

informative reflective medium-paced

4.5

Trebuie citită de toată lumea având în vedere faptul că e atât de comun să transmiți prin intermediul Internetului mai multe informații decât ar trebui despre tine fără să fi conștient de potențialele riscuri.

Tot pe același subiect sau asemănător recomand: 
• Minimalism digital, Cal Newport.
• Dosar permanent, Edward Snowden.
• ghidul de pe canalul de Youtube Techlore pentru a deveni anonim pe Internet.
• canalul de Youtube Scammer Payback pentru a observa cât de comune sunt înșelătoriile online și cum mulți pică în plasă.

Cred că e important ca atunci când te caută un străin pe Internet să nu îți afle tot istoricul vieții tale. (Și da, se poate.)

Pentru mai multe sfaturi, sunt oricând deschisă la discuții despre securitatea cibernetică, mai ales că este domeniul în care îmi doresc să profesez.

tsmith0810's review against another edition

Go to review page

informative lighthearted reflective medium-paced

3.5

johnbreeden's review against another edition

Go to review page

5.0

This was a very enlightening view into just how valuable and accessible our personal information is. It's amazing just how much effort has to go into keeping privacy private. The world is clearly set up to glean every last bit of data possible. Honestly, I could not hope to reach the levels of invisibility described in this book. I often considered that being harmless was enough. I will definitely take these precautions to heart and consider before doing things to expose my information.

Compared to other books on the subject, I will say that Mitnick's book is much more readable for someone who is not 100% up on the trends in technology.

crobey's review against another edition

Go to review page

3.0

Thought provoking and a little eye opening to how little privacy we really have each day.

nick_latanick's review against another edition

Go to review page

2.0

I work in IT, and am interested both professionally and personally in info-sec. In addition, I've been a fan of Kevin Mitnick himself since tuning in to 2600 as a kid and hearing "Not Kevin" as a frequent guest. Combining these two fact, I thought this book would be a slam-dunk and bought it immediately -what a mistake.

This book is disappointingly not about Kevin's own time being 'invisible' while on the run from the FBI in the 90's (when he earned the moniker "World's most wanted hacker"), instead Kevin wants to teach YOU how to be invisible online, and takes you behind the scenes to reveal such esoteric secrets of the deep web as: 'why you shouldn't download email attachments from strangers', 'how to clear your internet browsing history', and 'don't reuse the same weak password on every website'. If you're even moderately tech-savvy (or a millennial) this book is not for you; it's for your grandparents.

That's fine I guess. A book on basic internet hygiene is, I'm sure, genuinely useful to a lot of people, and the information provided about various attack vectors is thorough. But then many of Kevin's solutions to avoid run-of-the-mill corporate tracking are way too advanced for folks just learning what a "strong" password means: he suggests using TOR and Bitcoin, and spoofing your laptop's MAC address every time you connect to a new WiFi network (just to list a few) - tasks your grandparents are unlikely to master with aplomb (and are completely unnecessary for most people).

On the plus side, many of the anecdotes recounted in the book are interesting, and Kevin uses them to dissect real-world attack scenarios and show how users (even sophisticated ones) can fall prey to clever threat-actors, but disappointingly few stories are Kevin's, most are taken from the news. And an unfortunately large amount of the rest of the book is numbingly dry, at least as an audiobook: URLs, click-paths for settings and configurations, and technical details make it a bit hard to get though. The narrator's attempt to add dramatic gravitas to these sections almost seems like a self-parody.

TL;DR, I think this book would have been better if it was not written by Kevin Mitnick. No one who knows who he is should read it, and no one who should read it knows who he is. Think of it more like a sort of "Idiot's guide to internet security".

expat37's review against another edition

Go to review page

4.0

Overall a really great read. Mitnick makes the topic interesting and accessible without getting to serious. A great starting point for anyone interested in taking back their digital privacy (though I would suggest it is only a starting point in many areas, while in others you don't necessarily need to be so extreme). Generally a fun read.

karenreads1000s's review against another edition

Go to review page

4.0

This book contains actual action items regarding maintaining privacy in our electronic world.