Gratuit avec l’offre d'essai
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Lu par : Ray Porter
- Durée : 9 h et 17 min
Échec de l’élimination de la liste d'envies.
Impossible de suivre le podcast
Impossible de ne plus suivre le podcast
Acheter pour 28,44 €
Aucun moyen de paiement n'est renseigné par défaut.
Désolés ! Le mode de paiement sélectionné n'est pas autorisé pour cette vente.

Vous êtes membre Amazon Prime ?
Bénéficiez automatiquement de 2 livres audio offerts.Bonne écoute !
Description
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility". Mitnick is the world's most famous - and formerly the most wanted - computer hacker. He has hacked in to some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.
In The Art of Invisibility Mitnick provides both online and real-life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes - privacy is a power you deserve and need in this modern age.
Autres livres audio du même :
Ce que les auditeurs disent de The Art of Invisibility
Moyenne des évaluations utilisateurs. Seuls les utilisateurs ayant écouté le titre peuvent laisser une évaluation.Commentaires - Veuillez sélectionner les onglets ci-dessous pour changer la provenance des commentaires.
-
Global
-
Interprétation
-
Histoire

- James C
- 14/10/2017
Limited value for the average person
Mitnik's book has a handful of decent ideas for how the average person can better protect their privacy, but this content isn't worth the 9 hour listen, much of which is just rambling about the countless ways in which our lives and activities can be monitored in the digital age. Mitnik comes across as a bit full of himself, which would be fine if the content was more worthwhile.
It's unclear at what demographic the book is targeted, as some of the stuff is applicable to everyone, but he also spends a lot of time on topics that would seem to only be of interest to criminals or the truly paranoid (hiring a homeless person to buy you a throw-away phone, which you then use to establish an anonymous identity, and so on).
Save yourself the read...below are the main ideas that seem relevant to most people, you can probably find better info on these elsewhere than this book:
- Your personal data (hometown, mother's maiden name, etc.) is probably compromised, so don't use it as your "Secure Questions" for accounts. Instead, develop a list of specific, fake answers to these questions.
- Use 12-20 digit passwords on your accounts, don't use the same password for different stuff
- Establish Two Factor Authentication on all your accounts/devices, using Google Authenticator if available
- Use a dedicated device for accessing your most sensitive (financial) acccounts
- Ensure your router has updated firmware and isn't configured to use outdated WPA encryption
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
841 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- Amazon Customer
- 20/06/2017
Audio is Not the Right Format
After about an hour I've decide to return the book and buy a paper or Kindle copy instead.
A line in an audio book that says, "For more instructions... see page 117" is about as clear of an indicator as you can get that audio is the wrong format. It's a pity because I really like both the content and the performance, but to make practical use of the book, I need something I can read.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
227 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- aaron
- 29/03/2017
Authors, PLEASE Hire Ray Porter to Read Your Books
This is the first nonfiction book I've listened to Ray Porter read. WOW! What an experience! Mitnick is a fantastic writer to begin with, not boring at all, but Porter takes his words to the next level. I never found myself drifting off, thinking about other things. I was 100% present in the book throughout. This is a rarity, as some readers are an absolute chore to stay tuned in to. Not Ray!
I encourage ALL nonfiction writers to start hiring Ray Porter to read their books. He adds an excitement to academic tomes that is welcome and refreshing.
As for the book itself, it's OUTSTANDING. The other reviews praising it are spot on. Mitnick is WAYYYYYYYYYY ahead of the techno-curve, and wants you to be as well. Buy this book for its practical advice. Enjoy the book because of RAY!
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
115 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- John Ryan
- 28/06/2017
Enough bits to be worth the read; overly focused on wrong threat models
If you're like me, you came to this book just wanting to protect your privacy. You'll get some good ideas from Mitnick. However, too much of the book was aimed at the unlikely reader: someone truly wanting to cover their tracks from government surveillance... and then only in the final chapter did he truly pull together a formula for establishing enough identity encryption to do so.
There are some entertaining stories you'd hope from an ex-Black Hat. He kept what could be a dry topic fun to read.
Ray Porter (narrator) did a great job of adding emphasis to enliven the book. However, it was disappointing when he fully mispronounced essential terms; it immediately drained creditability from the author's voice. Also, Porter's emphasis was a bit thick, so much so that he made Mitnick sound down right bratty and annoying.. I've seen Mitnick in interviews and he doesn't come across that way to me.
Technically, you will walk away with a couple of good tips and product recommendations as well as understanding why they are good choices.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
98 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- Max Casey
- 18/03/2017
Mitnick delivers yet again
I'm a 20 year IT admin, and know a lot about many of the technologies Kevin discusses in this book, but the real gold is how he explains the how's, whys, gotchas and more when it comes to online privacy. Unless your name is Edward Snowden, you should get this book. You will love it.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
47 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- J. Pobst
- 22/09/2017
An uninteresting how-to of extreme measures
Any additional comments?
The interesting parts and the actionable advice that most people would find reasonable (like using a password manager) could be summed up in maybe 10 minutes. The rest was advice that most people would find absolutely unreasonable to incorporate into their lives (e.g., pay a stranger to purchase prepaid gift cards that you can use to buy a mobile hotspot, whose mac address you'll change every time you use it, or set up multiple email accounts to launder bitcoins,...). If you're a big time criminal, some of these things are worth you time, but for most of us they aren't.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
36 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- david
- 21/11/2017
Maybe reading the book is better
-This book works a lot like a checklist and a guide as to how to be invisible online.
It obviously goes into details about what is what, and the reason to be invisible by citing different cases, such as the Snowden files, bitcoin ransoming, viruses etc, and then HOW you can avoid such things, or gain access to certain things with things that the author suggests.
-The author DOES actually suggest what to use, and how to use it, and at the end, a full step by step solution to be invisible online. In this, i think it would honestly be better to read it, and then you can come back to it later.
-In audio format, although many things were indeed interesting, its difficult to come back to easily as audio chapters are not marked.. or of course you have to take notes going all the way through.
-I'm happy to have listened to it, and i found many of the things worthwhile, but i probably wouldn't listen to it again.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
28 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- Andrew
- 10/03/2017
very good overall
Great information, good stories and examples as proof, and an enjoyable audiobook overall. there is a lot of great information in here both for the casual web surfer and rmailer, as well as for even the most experienced sys admin or sys eng.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
24 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- Lance
- 14/03/2017
Excellent Book!
Mitnick does an excellent job balancing technical jargon and audience engagement. He masterfully simplifies complex subject matter and explains cyber security concepts in a way that the general populous can understand and learn from.
I highly recommend listening through once for an overview of the ideas, and then at least once more if you plan on putting his words into practice.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
22 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- Rajkumar M
- 04/05/2017
It's not about just internet.
Lots of valuable information. This book is not about just internet. It's about your privacy and security.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
15 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- Dr. Andreas J. Häusler
- 13/10/2018
Even paranoid internet citizens can learn here
While the first couple of chapters did not tell me much new, but then things get creepy fast. Something that is missing from the e-mail chapter is the recommendation to always read everything in plain text mode. And of course, writing this comment is somewhat going against what the book wants to teach... Ray Porter is doing a great job here narrating, as always.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
2 personnes ont trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- Pippi Langstrumpf
- 19/12/2020
Nicht praktikabel
Wer sich ein wenig mit der Materie auskennt, wird nichts Neues erfahren. Hinzu kommt, dass die Vorschläge im Buch an der Realität vorbei gehen.
So mutet der Vorschlag, sich ein Prepaid-Handy von einem Obdachlosen kaufen zu lassen, ziemlich skurril an. Ist es in Deutschland doch so, dass man sich mit einem Ausweisdokument authentifizieren muss, um eine Prepaidkarte freischalten zu lassen. Mal ganz davon abgesehen, dass man Schwierigkeiten haben wird, seinen Wunsch dem Obdachlosen gegenüber vertrauensvoll zu erläutern. Selbstverständlich, laut Buch, mit dreisten Lügen.
Auch der Rest ist absurd. Auf den Punkt gebracht kann man es vergessen, anonym zu bleiben. Man wird es nur schaffen, die Zeit bis zur Entdeckung zu strecken. Oder den Aufwand so zu erhöhen, dass Kleinkriminelle und Werbetreibende aufgeben. Ist man dem Staat ein Dorn im Auge, wird man sich nicht verstecken können.
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !
1 personne a trouvé cela utile
-
Global
-
Interprétation
-
Histoire

- W. Mair
- 13/12/2022
Very basic and irrelevant
A lot of filling text and irrelevant information.
Just a few examples:
A hacker is 600 miles away!
The light bulb has 16 mio colors!
If you are away from your desk, lock your screen.
Buy a new router every year to make sure it is always patched!
etc…
Something went wrong. Please try again in a few minutes.
Merci. Votre vote a été pris en compte.
Vous avez donné votre avis sur cette évaluation !