Check out the Pride Celebration Treasure Hunt!
This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

The Art of Invisibility by Kevin D. Mitnick

The Art of Invisibility (edition 2017)

by Kevin D. Mitnick, Robert Vamosi (Author.)

MembersReviewsPopularityAverage ratingMentions
1589113,309 (4.03)11
Title:The Art of Invisibility
Authors:Kevin D. Mitnick
Other authors:Robert Vamosi (Author.)
Info:New York : Little, Brown and Company, 2017.
Collections:Ex audible
Tags:Cybercrime, Computers, Technology, Security, Privacy, Internet, Hackers, Data, Theft, 2019

Work details

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick

  1. 00
    V for Vendetta by Alan Moore (neverstopreading)
    neverstopreading: Intersection between fiction and reality.

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 11 mentions

Showing 1-5 of 9 (next | show all)
In this age of government and corporate online surveillance, being anonymous while online is becoming more and more important. This book, from "the most famous computer hacker in the world" (according to Publishers Weekly) gives some pointers.

In this day and age, anyone who still uses "password" or "12345" for their computer password should be ashamed of themselves. Change that password to a long and random string of letters and numbers, like twenty or twenty-five characters long. Write it down, or use a password management program, and frequently change it.

If you are on a public wifi connection, like at the local library or coffee shop, do not do any online banking or e-commerce. It is very easy for a hacker to get your information, or send you to a site that looks legitimate but is not legitimate. If you are using anyone's computer, other than your own, it is a very good idea to delete the browser history, and reboot or shut off the computer before you leave it.

Did you know that many printers, including work printers, have a hard drive that records everything that was printed? Save the printing of personal items, like medical test results or your credit report, until you get home. You can be sure that your boss is keeping a close eye on your internet usage, even during your lunch hour.

For anyone traveling to the US, even American citizens returning from overseas, border authorities have the right to seize your laptop or cellphone, and keep it for as long as they want, searching through files. It is possible to use "strong" encryption on any personal files, store those files securely in the cloud, then wipe, not just delete (there is a difference) those files from your computer, and re-download them later.

Parts of this book may be too technical for the average reader. The rest of the book may be considered common knowledge, but it certainly bears repeating. It is very much recommended. ( )
  plappen | May 18, 2018 |
This is a crucial book to read. It will open your eyes to how little privacy you have on the internet. Everyone, well, almost everyone, knows that Facebook isn't private. But what about out regular activities? What about our internet searches? (How could an advertiser see that you're looking on WebMD on athlete's foot or chlamydia symptoms even if you're using HTTPS?) What about our home network? Is your home network vulnerable to a vengeful neighbor who wants to plant child porn on your computer? (probably, even if it is password protected). The downside is that there is a lot of jargon that can turn people off, and sometimes it seems as if he's writing only to those committing illegal activities (he's not). Nevertheless, read it! ( )
  neverstopreading | Mar 13, 2018 |
The book is about digital anonymity. It starts with the very basic asks - strong passwords, securing your home network and the like. But soon gets on to things that most wouldn't even imagine. Burner phones are just a baffling idea.

Sites like DuckDuckGo, StartPage and ProtonMail are interesting tools that can be used. Features like pixel tracking, canvas fingerprinting allow online companies to know a lot about what you're doing on their site.

Reading about Tor was refreshing as I had known and used it quite a few years ago. HTTPS Everywhere, PGP and CanvasBlocker are innovative plug-ins for your browser to assist in staying hidden. It was mind-numbing to know that your typing "style" can be tracked as well and Keyboard Privacy defends you by randomizing the keystrokes before they go to DOM.

The last part of the book details the steps for you to stay "alone" in this connected world. ( )
  nmarun | Sep 15, 2017 |
Great book by one of the experts. Written for beginners, covers a lot of material but could have been a bit more in depth. Everyone with an interest in privacy online should read. ( )
  mattnik | Aug 9, 2017 |
Excellent book on how to protect yourself from hackers and other intrusive eyes on your data and information while using a computer, smart phone and other technology. If you are paranoid about being online or sending emails, you will find the tips and advice enlightening. The chapter on creating passwords alone is well worth the read of this book. ( )
  writemoves | Jul 16, 2017 |
Showing 1-5 of 9 (next | show all)
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
Important places
Important events
Related movies
Awards and honors
First words
Last words
Disambiguation notice
Publisher's editors
Publisher series
Original language
Information from the German Common Knowledge. Edit to localize it to your language.
Canonical DDC/MDS

References to this work on external resources.

Wikipedia in English


Book description
Haiku summary

Amazon.com Product Description (ISBN 0316380504, Hardcover)

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

(retrieved from Amazon Fri, 04 Nov 2016 15:08:55 -0400)

"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening."--Dust jacket.… (more)

(summary from another edition)

» see all 3 descriptions

Quick Links

Popular covers


Average: (4.03)
2 1
3 4
3.5 2
4 14
5 8

Is this you?

Become a LibraryThing Author.


About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 135,475,177 books! | Top bar: Always visible