Take Back Your Privacy: The Barefoot Anarchist's Guide to Navigating Today's Digital Landscape
4/5
()
Currently unavailable
Currently unavailable
About this ebook
Curious about surveillance? Wondering about the security of your computer or phone?
These are just a couple of possible starting points. The author, with decades of experience in the field, takes us on a journey through the digital landscape. Exhaustively researched, with hundreds of links, it's nevertheless written in an informal and entertaining style.
Do you know the difference between "a web browser" and "the internet"? That's about all you'll need, to start. When you're done with this book, you'll know more than most IT (information technology) professionals do about digital security. You'll be able to analyze the claims made by tech bloggers and those who flog their own products. You'll know much, much more about the risks to your privacy and anonymity--and why they're both so important--in today's fast-moving world.
Then, at the end, the author tells how he once went to jail for trying to help protect thousands of college students (including himself). It's a chilling reminder of just how easily "spin" can replace substance. And yet, it's a funny story.
Come on in and give this book a try. You'll be glad you did.
The Table of Contents:
- Dedication
- Who needs this book?
- What's a Barefoot Anarchist?
- Chapter 1: Why Privacy? Why Encrypt?
- Chapter 2: Threat Modeling
- Chapter 3: Connections
- Chapter 4: Downloading Files
- Chapter 5: Digital Purchases
- Chapter 6: General Computing
- Chapter 7: Operating Systems
- Chapter 8: Telephony
- Chapter 9: Web Browsing
- Chapter 10: "Cloud" Backups
- Chapter 11: Email
- Chapter 12: Putting It All Together
- Appendix A: Encryption Primer
- Appendix B: Jail!
- Thanks for Reading!
- Excerpt from Shiver on the Sky
David Haywood Young
David Haywood Young started writing books for his younger brother and sister when he was about six years old. It turned out that he couldn't make a living that way, though. Not yet, anyway. So for the first twenty or so years after he started needing to buy his own groceries, he split his time between software development and professional poker. On the software side, he had his own company until late 2012. On the poker side, he might enjoy yours. Now, though? He writes. A lot. And he's extremely happy about it. From the author: Thanks, and please feel free to drop me a line! Comments, suggestions, criticisms: all good. Also, starting 7/31/2013 I promised to post a free "Weekly Challenge" story on my blog every Wednesday. So far it's been a huge amount of fun. And I don't seem to have left myself any wiggle room...cool! Want to come watch and see what happens?
Related to Take Back Your Privacy
Related ebooks
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies Rating: 5 out of 5 stars5/5Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies Rating: 5 out of 5 stars5/5The Paranoid's Guide to Using the Internet Rating: 1 out of 5 stars1/5Your Safety and Privacy Online: The CIA and NSA Rating: 0 out of 5 stars0 ratingsHow to Beat Real-time Copyright Infringers Version 2.0: A Savvy Approach for Creative Professionals Rating: 0 out of 5 stars0 ratingsWifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsPrivacy Online: The Practical Privacy Guide For Anyone Rating: 0 out of 5 stars0 ratingsBeating The Beast Goldmine Rating: 0 out of 5 stars0 ratingsGuidebook For Your Digital World: How To Avoid the Scammers and Pickpockets on Your Digital Journey Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsPasswords Made Easy+ Rating: 0 out of 5 stars0 ratingsOnline Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet Rating: 4 out of 5 stars4/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratings10 Things That Used to be Good Ideas in Data Security Rating: 0 out of 5 stars0 ratingsConquering The Beast Goldmine Rating: 0 out of 5 stars0 ratingsEasy Marketing Step-By-Step: Start Your Internet Business in The Next 5 Days Rating: 0 out of 5 stars0 ratingsCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5What Else Can I Do on the Internet? Rating: 0 out of 5 stars0 ratingsPrivileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratingsOWNED: Why hacking continues to be a problem Rating: 0 out of 5 stars0 ratingsStay Anonymous Online:A Short and Simple Guide to Hide Yourself In The Internet Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Ultimate Ethical Hacking Boot Camp Beginner to Pro Rating: 0 out of 5 stars0 ratingsOmerta.com Rating: 0 out of 5 stars0 ratingsEasy Ways to Be More Private on the Internet (Second Edition) Rating: 0 out of 5 stars0 ratingsOpen Handbook Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for Take Back Your Privacy
1 rating0 reviews