Gratuit avec l’offre d'essai

  • The Art of Invisibility

  • The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
  • De : Kevin Mitnick
  • Lu par : Ray Porter
  • Durée : 9 h et 17 min
  • 4,3 out of 5 stars (6 notations)

Écoutez en illimité un large choix de livres audio, créations & podcasts Audible Original et histoires pour enfants.
Recevez 1 crédit audio par mois à échanger contre le titre de votre choix - ce titre vous appartient.
Gratuit avec l'offre d'essai, ensuite 9,95 €/mois. Résiliez à tout moment.
Acheter pour 28,44 €

Acheter pour 28,44 €

Utiliser la carte qui se termine par
En finalisant votre achat, vous acceptez les Conditions d'Utilisation. Veuillez prendre connaissance de notre Politique de Confidentialité et de notre Politique sur la Publicité et les Cookies.
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !

    Description

    Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.

    Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

    In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility". Mitnick is the world's most famous - and formerly the most wanted - computer hacker. He has hacked in to some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

    In The Art of Invisibility Mitnick provides both online and real-life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes - privacy is a power you deserve and need in this modern age.

    ©2017 Kevin Mitnick (P)2017 Hachette Audio

    Ce que les auditeurs disent de The Art of Invisibility

    Moyenne des évaluations utilisateurs. Seuls les utilisateurs ayant écouté le titre peuvent laisser une évaluation.
    Global
    • 4.5 out of 5 stars
    • 5 étoiles
      4
    • 4 étoiles
      0
    • 3 étoiles
      2
    • 2 étoiles
      0
    • 1 étoile
      0
    Interprétation
    • 5 out of 5 stars
    • 5 étoiles
      4
    • 4 étoiles
      1
    • 3 étoiles
      0
    • 2 étoiles
      0
    • 1 étoile
      0
    Histoire
    • 4.5 out of 5 stars
    • 5 étoiles
      4
    • 4 étoiles
      0
    • 3 étoiles
      1
    • 2 étoiles
      0
    • 1 étoile
      0

    Commentaires - Veuillez sélectionner les onglets ci-dessous pour changer la provenance des commentaires.

    Il n'y a pas encore de critique disponible pour ce titre.
    Trier par :
    Trier par:
    • Global
      2 out of 5 stars
    • Interprétation
      4 out of 5 stars
    • Histoire
      2 out of 5 stars
    Image de profile pour James C
    • James C
    • 14/10/2017

    Limited value for the average person

    Mitnik's book has a handful of decent ideas for how the average person can better protect their privacy, but this content isn't worth the 9 hour listen, much of which is just rambling about the countless ways in which our lives and activities can be monitored in the digital age. Mitnik comes across as a bit full of himself, which would be fine if the content was more worthwhile.

    It's unclear at what demographic the book is targeted, as some of the stuff is applicable to everyone, but he also spends a lot of time on topics that would seem to only be of interest to criminals or the truly paranoid (hiring a homeless person to buy you a throw-away phone, which you then use to establish an anonymous identity, and so on).

    Save yourself the read...below are the main ideas that seem relevant to most people, you can probably find better info on these elsewhere than this book:
    - Your personal data (hometown, mother's maiden name, etc.) is probably compromised, so don't use it as your "Secure Questions" for accounts. Instead, develop a list of specific, fake answers to these questions.
    - Use 12-20 digit passwords on your accounts, don't use the same password for different stuff
    - Establish Two Factor Authentication on all your accounts/devices, using Google Authenticator if available
    - Use a dedicated device for accessing your most sensitive (financial) acccounts
    - Ensure your router has updated firmware and isn't configured to use outdated WPA encryption

    817 personnes ont trouvé cela utile

    • Global
      2 out of 5 stars
    • Interprétation
      4 out of 5 stars
    • Histoire
      4 out of 5 stars
    Image de profile pour Amazon Customer
    • Amazon Customer
    • 20/06/2017

    Audio is Not the Right Format

    After about an hour I've decide to return the book and buy a paper or Kindle copy instead.
    A line in an audio book that says, "For more instructions... see page 117" is about as clear of an indicator as you can get that audio is the wrong format. It's a pity because I really like both the content and the performance, but to make practical use of the book, I need something I can read.

    220 personnes ont trouvé cela utile

    • Global
      5 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour aaron
    • aaron
    • 29/03/2017

    Authors, PLEASE Hire Ray Porter to Read Your Books

    This is the first nonfiction book I've listened to Ray Porter read. WOW! What an experience! Mitnick is a fantastic writer to begin with, not boring at all, but Porter takes his words to the next level. I never found myself drifting off, thinking about other things. I was 100% present in the book throughout. This is a rarity, as some readers are an absolute chore to stay tuned in to. Not Ray!

    I encourage ALL nonfiction writers to start hiring Ray Porter to read their books. He adds an excitement to academic tomes that is welcome and refreshing.

    As for the book itself, it's OUTSTANDING. The other reviews praising it are spot on. Mitnick is WAYYYYYYYYYY ahead of the techno-curve, and wants you to be as well. Buy this book for its practical advice. Enjoy the book because of RAY!

    112 personnes ont trouvé cela utile

    • Global
      3 out of 5 stars
    • Interprétation
      2 out of 5 stars
    • Histoire
      3 out of 5 stars
    Image de profile pour John Ryan
    • John Ryan
    • 28/06/2017

    Enough bits to be worth the read; overly focused on wrong threat models

    If you're like me, you came to this book just wanting to protect your privacy. You'll get some good ideas from Mitnick. However, too much of the book was aimed at the unlikely reader: someone truly wanting to cover their tracks from government surveillance... and then only in the final chapter did he truly pull together a formula for establishing enough identity encryption to do so.

    There are some entertaining stories you'd hope from an ex-Black Hat. He kept what could be a dry topic fun to read.

    Ray Porter (narrator) did a great job of adding emphasis to enliven the book. However, it was disappointing when he fully mispronounced essential terms; it immediately drained creditability from the author's voice. Also, Porter's emphasis was a bit thick, so much so that he made Mitnick sound down right bratty and annoying.. I've seen Mitnick in interviews and he doesn't come across that way to me.

    Technically, you will walk away with a couple of good tips and product recommendations as well as understanding why they are good choices.

    95 personnes ont trouvé cela utile

    • Global
      5 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour Max Casey
    • Max Casey
    • 18/03/2017

    Mitnick delivers yet again

    I'm a 20 year IT admin, and know a lot about many of the technologies Kevin discusses in this book, but the real gold is how he explains the how's, whys, gotchas and more when it comes to online privacy. Unless your name is Edward Snowden, you should get this book. You will love it.

    45 personnes ont trouvé cela utile

    • Global
      2 out of 5 stars
    • Interprétation
      4 out of 5 stars
    • Histoire
      1 out of 5 stars
    Image de profile pour J. Pobst
    • J. Pobst
    • 22/09/2017

    An uninteresting how-to of extreme measures

    Any additional comments?

    The interesting parts and the actionable advice that most people would find reasonable (like using a password manager) could be summed up in maybe 10 minutes. The rest was advice that most people would find absolutely unreasonable to incorporate into their lives (e.g., pay a stranger to purchase prepaid gift cards that you can use to buy a mobile hotspot, whose mac address you'll change every time you use it, or set up multiple email accounts to launder bitcoins,...). If you're a big time criminal, some of these things are worth you time, but for most of us they aren't.

    33 personnes ont trouvé cela utile

    • Global
      3 out of 5 stars
    • Interprétation
      4 out of 5 stars
    • Histoire
      2 out of 5 stars
    Image de profile pour david
    • david
    • 21/11/2017

    Maybe reading the book is better

    -This book works a lot like a checklist and a guide as to how to be invisible online.

    It obviously goes into details about what is what, and the reason to be invisible by citing different cases, such as the Snowden files, bitcoin ransoming, viruses etc, and then HOW you can avoid such things, or gain access to certain things with things that the author suggests.

    -The author DOES actually suggest what to use, and how to use it, and at the end, a full step by step solution to be invisible online. In this, i think it would honestly be better to read it, and then you can come back to it later.

    -In audio format, although many things were indeed interesting, its difficult to come back to easily as audio chapters are not marked.. or of course you have to take notes going all the way through.

    -I'm happy to have listened to it, and i found many of the things worthwhile, but i probably wouldn't listen to it again.

    28 personnes ont trouvé cela utile

    • Global
      4 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      4 out of 5 stars
    Image de profile pour Andrew
    • Andrew
    • 10/03/2017

    very good overall

    Great information, good stories and examples as proof, and an enjoyable audiobook overall. there is a lot of great information in here both for the casual web surfer and rmailer, as well as for even the most experienced sys admin or sys eng.

    24 personnes ont trouvé cela utile

    • Global
      5 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour Lance
    • Lance
    • 14/03/2017

    Excellent Book!

    Mitnick does an excellent job balancing technical jargon and audience engagement. He masterfully simplifies complex subject matter and explains cyber security concepts in a way that the general populous can understand and learn from.
    I highly recommend listening through once for an overview of the ideas, and then at least once more if you plan on putting his words into practice.

    22 personnes ont trouvé cela utile

    • Global
      4 out of 5 stars
    • Interprétation
      4 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour Rajkumar M
    • Rajkumar M
    • 04/05/2017

    It's not about just internet.

    Lots of valuable information. This book is not about just internet. It's about your privacy and security.

    15 personnes ont trouvé cela utile

    Trier par :
    Trier par:
    • Global
      4 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      4 out of 5 stars
    Image de profile pour Dr. Andreas J. Häusler
    • Dr. Andreas J. Häusler
    • 13/10/2018

    Even paranoid internet citizens can learn here

    While the first couple of chapters did not tell me much new, but then things get creepy fast. Something that is missing from the e-mail chapter is the recommendation to always read everything in plain text mode. And of course, writing this comment is somewhat going against what the book wants to teach... Ray Porter is doing a great job here narrating, as always.

    2 personnes ont trouvé cela utile

    • Global
      3 out of 5 stars
    • Interprétation
      3 out of 5 stars
    • Histoire
      3 out of 5 stars
    Image de profile pour Pippi Langstrumpf
    • Pippi Langstrumpf
    • 19/12/2020

    Nicht praktikabel

    Wer sich ein wenig mit der Materie auskennt, wird nichts Neues erfahren. Hinzu kommt, dass die Vorschläge im Buch an der Realität vorbei gehen.

    So mutet der Vorschlag, sich ein Prepaid-Handy von einem Obdachlosen kaufen zu lassen, ziemlich skurril an. Ist es in Deutschland doch so, dass man sich mit einem Ausweisdokument authentifizieren muss, um eine Prepaidkarte freischalten zu lassen. Mal ganz davon abgesehen, dass man Schwierigkeiten haben wird, seinen Wunsch dem Obdachlosen gegenüber vertrauensvoll zu erläutern. Selbstverständlich, laut Buch, mit dreisten Lügen.

    Auch der Rest ist absurd. Auf den Punkt gebracht kann man es vergessen, anonym zu bleiben. Man wird es nur schaffen, die Zeit bis zur Entdeckung zu strecken. Oder den Aufwand so zu erhöhen, dass Kleinkriminelle und Werbetreibende aufgeben. Ist man dem Staat ein Dorn im Auge, wird man sich nicht verstecken können.

    1 personne a trouvé cela utile