Sorted By Most Useful
By James C on 14-10-17
Limited value for the average person
Mitnik's book has a handful of decent ideas for how the average person can better protect their privacy, but this content isn't worth the 9 hour listen, much of which is just rambling about the countless ways in which our lives and activities can be monitored in the digital age. Mitnik comes across as a bit full of himself, which would be fine if the content was more worthwhile.
It's unclear at what demographic the book is targeted, as some of the stuff is applicable to everyone, but he also spends a lot of time on topics that would seem to only be of interest to criminals or the truly paranoid (hiring a homeless person to buy you a throw-away phone, which you then use to establish an anonymous identity, and so on).
Save yourself the read...below are the main ideas that seem relevant to most people, you can probably find better info on these elsewhere than this book:
- Your personal data (hometown, mother's maiden name, etc.) is probably compromised, so don't use it as your &quot;Secure Questions&quot; for accounts. Instead, develop a list of specific, fake answers to these questions.
- Use 12-20 digit passwords on your accounts, don't use the same password for different stuff
- Establish Two Factor Authentication on all your accounts/devices, using Google Authenticator if available
- Use a dedicated device for accessing your most sensitive (financial) acccounts
- Ensure your router has updated firmware and isn't configured to use outdated WPA encryption
499 of 506 people found this review helpful
By Amazon Customer on 20-06-17
Audio is Not the Right Format
After about an hour I've decide to return the book and buy a paper or Kindle copy instead.
A line in an audio book that says, "For more instructions... see page 117" is about as clear of an indicator as you can get that audio is the wrong format. It's a pity because I really like both the content and the performance, but to make practical use of the book, I need something I can read.
158 of 161 people found this review helpful
By John Ryan on 28-06-17
Enough bits to be worth the read; overly focused on wrong threat models
If you're like me, you came to this book just wanting to protect your privacy. You'll get some good ideas from Mitnick. However, too much of the book was aimed at the unlikely reader: someone truly wanting to cover their tracks from government surveillance... and then only in the final chapter did he truly pull together a formula for establishing enough identity encryption to do so.
There are some entertaining stories you'd hope from an ex-Black Hat. He kept what could be a dry topic fun to read.
Ray Porter (narrator) did a great job of adding emphasis to enliven the book. However, it was disappointing when he fully mispronounced essential terms; it immediately drained creditability from the author's voice. Also, Porter's emphasis was a bit thick, so much so that he made Mitnick sound down right bratty and annoying.. I've seen Mitnick in interviews and he doesn't come across that way to me.
Technically, you will walk away with a couple of good tips and product recommendations as well as understanding why they are good choices.
75 of 80 people found this review helpful
By J. Pobst on 22-09-17
An uninteresting how-to of extreme measures
Any additional comments?
The interesting parts and the actionable advice that most people would find reasonable (like using a password manager) could be summed up in maybe 10 minutes. The rest was advice that most people would find absolutely unreasonable to incorporate into their lives (e.g., pay a stranger to purchase prepaid gift cards that you can use to buy a mobile hotspot, whose mac address you'll change every time you use it, or set up multiple email accounts to launder bitcoins,...). If you're a big time criminal, some of these things are worth you time, but for most of us they aren't.
22 of 23 people found this review helpful
By Travis on 07-02-18
Unfortunately, btc and other digital currencies now count as property and are therefore taxable. So, if you follow the advice given you will be guilty of tax evasion.
9 of 9 people found this review helpful
By david on 21-11-17
Maybe reading the book is better
-This book works a lot like a checklist and a guide as to how to be invisible online.
It obviously goes into details about what is what, and the reason to be invisible by citing different cases, such as the Snowden files, bitcoin ransoming, viruses etc, and then HOW you can avoid such things, or gain access to certain things with things that the author suggests.
-The author DOES actually suggest what to use, and how to use it, and at the end, a full step by step solution to be invisible online. In this, i think it would honestly be better to read it, and then you can come back to it later.
-In audio format, although many things were indeed interesting, its difficult to come back to easily as audio chapters are not marked.. or of course you have to take notes going all the way through.
-I'm happy to have listened to it, and i found many of the things worthwhile, but i probably wouldn't listen to it again.
7 of 7 people found this review helpful