Goodreads helps you keep track of books you want to read.
Start by marking “The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data” as Want to Read:
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
by
The world's most famous hacker reveals the secrets on how citizens and consumers can stay connected and on the grid safely and securely by using cloaking and counter-measures in today's age of Big Brother and Big Data.
Your every step online is being tracked and stored, and your identity is easily stolen. Big companies and big governments want to know and exploit what you ...more
Your every step online is being tracked and stored, and your identity is easily stolen. Big companies and big governments want to know and exploit what you ...more
Audible Audio, Unabridged, 10 pages
Published
February 14th 2017
by Hachette Audio
Friend Reviews
To see what your friends thought of this book,
please sign up.
Reader Q&A
To ask other readers questions about
The Art of Invisibility,
please sign up.
Popular Answered Questions
This book is not yet featured on Listopia.
Add this book to your favorite list »
Community Reviews
Showing 1-30

Start your review of The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

The Art of Invisibility by Kevin Mitnick: The world’s most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data- is a Little, Brown, and Company publication.
Online privacy is always of concern, but after the Snowden revelation, people became even more aware of how easy it is for companies and the government to spy on us. VPN’s suddenly became mainstream and browsers like DuckDuckGo and programs like Tor became commonplace ...more
Online privacy is always of concern, but after the Snowden revelation, people became even more aware of how easy it is for companies and the government to spy on us. VPN’s suddenly became mainstream and browsers like DuckDuckGo and programs like Tor became commonplace ...more

If you're into stuff like this, you can read the full review.
This is How the World Will End: "The Art of Invisibility" by Kevin Mitnick, Robert Vamosi
This book calls for a limerick of "me" own:
This is how the world will end.
This is how the world will end.
Not with the roar of a lion
But with the click of a mouse.
Mitnick's and Vamosi's book is for the layman. You won't find here buffer overflows (NOP sled, or overwriting the stack return pointer), network scans/DoS attacks, integer overflow expl ...more
This is How the World Will End: "The Art of Invisibility" by Kevin Mitnick, Robert Vamosi
This book calls for a limerick of "me" own:
This is how the world will end.
This is how the world will end.
Not with the roar of a lion
But with the click of a mouse.
Mitnick's and Vamosi's book is for the layman. You won't find here buffer overflows (NOP sled, or overwriting the stack return pointer), network scans/DoS attacks, integer overflow expl ...more

Dec 24, 2017
Bradley
rated it
it was amazing
·
review of another edition
Shelves:
non-fiction,
2018-shelf
Scary.
I mean, what non-fiction book about the sheer amount of security loopholes wouldn't be scary? I mean, we're talking about our identities online, in our homes and through all our smart devices, our cars, our workplaces, and everywhere.
It's not even about government abuses. It's about the fact that everyone, everywhere, is at risk. Snowdon may have opened our eyes, but the reality remains that your breasts are still online. Everywhere. Never to be deleted. Always accessible. Forever.
If you' ...more
I mean, what non-fiction book about the sheer amount of security loopholes wouldn't be scary? I mean, we're talking about our identities online, in our homes and through all our smart devices, our cars, our workplaces, and everywhere.
It's not even about government abuses. It's about the fact that everyone, everywhere, is at risk. Snowdon may have opened our eyes, but the reality remains that your breasts are still online. Everywhere. Never to be deleted. Always accessible. Forever.
If you' ...more

You may be questioning why a digital marketer would encourage reading the Art of Invisibility. It’s a book teaching how to hide your online life. Hiding online actions does tend to make our jobs as digital marketers rather difficult.
However, you need to read this book for several reasons. First, I believe in informed choices. Yes, we use audience data for decision making (well, we should). And the data isn’t always anonymized. But our audiences should know and consent to this. Second, this book ...more
However, you need to read this book for several reasons. First, I believe in informed choices. Yes, we use audience data for decision making (well, we should). And the data isn’t always anonymized. But our audiences should know and consent to this. Second, this book ...more

Nov 30, 2019
RM(Alwaysdaddygirl) Griffin (alwaysdaddyprincess)
rated it
it was amazing
·
review of another edition
5 stars
Will read again.
🇺🇸💀
Will read again.
🇺🇸💀

Consider this as the self-help guide for those interested in privacy protection.
This was a random pick but a fortunate one. It must be the first non-fiction book that is exactly the right length, has the perfect ratio between providing background, facts, anecdotes and recommendations/tips for the reader. From my perspective, it also didn't have as much bias as other books that I've encountered, with (personal) anecdotes often including mistakes rather than infallible moments.
And what better tha ...more
This was a random pick but a fortunate one. It must be the first non-fiction book that is exactly the right length, has the perfect ratio between providing background, facts, anecdotes and recommendations/tips for the reader. From my perspective, it also didn't have as much bias as other books that I've encountered, with (personal) anecdotes often including mistakes rather than infallible moments.
And what better tha ...more

Trust Me: Even You Are Not Invisible. At Least Not Yet.
THE ART OF INVISIBILITY is a little bit scary. The authors, Kevin Mitnick and Robert Vamosi, document the myriads of ways that others can spy on our activities. You might think no one knows what you are doing, but you are wrong: "Each and every one of us is being watched." If you carry a cell phone, "You are being surveilled."
Mitnick tells the story of how the famous John McAfee, on the lam, was found supposedly by coordinates listed in the ...more
THE ART OF INVISIBILITY is a little bit scary. The authors, Kevin Mitnick and Robert Vamosi, document the myriads of ways that others can spy on our activities. You might think no one knows what you are doing, but you are wrong: "Each and every one of us is being watched." If you carry a cell phone, "You are being surveilled."
Mitnick tells the story of how the famous John McAfee, on the lam, was found supposedly by coordinates listed in the ...more

3.5 stars.
I had many different thoughts and feelings while reading this. The author is an ex-hacker and has done jail time. So some of this felt like it was written by a criminal FOR CRIMINALS.
The author offered a wide range of ideas on how to protect one's identity while on the computer. With some of his ideas, I felt a little pride because I could say, "Did it already." There were also some other useful ideas that I felt I could easily implement. But some of this was so completely over my hea ...more

Ok, technically I didn't finish this but only because I want the ebook version so I can actually try to do some of these things. You can't exactly do the steps by audio. 😁 I have the book on hold at the library and will finish this then. The audio was great and I thought about finishing just because it was interesting, but decided I shouldn't waste time when I was just going to read it later.
4 stars. I have NO idea this guy knows what he is talking about. It is all way over my head, but it sound ...more
4 stars. I have NO idea this guy knows what he is talking about. It is all way over my head, but it sound ...more

Sep 25, 2018
Maru Kun
rated it
really liked it
·
review of another edition
Shelves:
programming,
current-affairs
I just watched on Japan’s main nightly news program an interview with the Cambridge Analytica whistleblower Christopher Wylie in which he explained how Facebook data was used by CA to manipulate the results US 2016 Presidential election and the Brexit Referendum, both of which it is worth remembering were extremely close.
According to Mr Wylie 200 Facebook “likes” are enough to reliably categorize you by age, gender, political affiliation, marital status and a host of other indicators including h ...more
According to Mr Wylie 200 Facebook “likes” are enough to reliably categorize you by age, gender, political affiliation, marital status and a host of other indicators including h ...more

Target audience: The primary target of the book are the common people who use computers and have a basic understanding of they work. The secondary target are people who activate in the domain of cybersecurity.
About the author: According to Wikipedia, Kevin David Mitnick is an American computer security consultant, author, and convicted hacker, best known for his high-profile 1995 arrest and five years later in prison for various computer and communications-related crimes. He now runs the securit ...more
About the author: According to Wikipedia, Kevin David Mitnick is an American computer security consultant, author, and convicted hacker, best known for his high-profile 1995 arrest and five years later in prison for various computer and communications-related crimes. He now runs the securit ...more

Cybersecurity had been a big interest of mine for a while, so this book didn't bring enlightment but I certainly learned a few things. Author, in simple language designed for average Joe, describes basics of security in the era of internet. He mentions few useful applications and websites, but this is not step by step guide how to install Tor on your computer for example. This book could be two edge sword - it can make you feel depressed, as there is not such a thing as a complete invisibility i
...more

Dec 10, 2020
Narilka
rated it
really liked it
·
review of another edition
Shelves:
ebook,
read-in-2020
Do you use a cell phone? A tablet? Any "smart" devices? Drive a car manufactured in the 1980s or later? Use the internet? Have a job? Go shopping? Post on social media? Basically live in a modern society? You are being tracked. Constantly. Big Brother and Big Data are everywhere, collecting information about you and your habits every minute of every day. Some claim it's for the greater good, such as fitness devices providing health data, or to better target marketing, such as department stores t
...more

Did you know that it's relatively easy for an attacker to turn on your webcam or microphone without you knowing it? If not, you might get something out of this book. If you are aware that it can and has happened on many very public occasions, you will not be treated to anything new. In either case, you're going to have to wade through the bad writing, pointless stories, errors, and potential bad advice to get through Mitnick's latest effort.
Admittedly, there is a lot less of Mitnick's preteen wr ...more
Admittedly, there is a lot less of Mitnick's preteen wr ...more

A cautionary tale of just how visible you are on the internet and in todays connected society.
First off I am fully aware of the irony of posting a review of this book online on Goodreads, my blog and Facebook after reading a book on how to be invisible on the internet.....
This was a an entertaining read and although I work in the IT field, there were still some security facts in the book that I was not aware so I learnt a fair amount. There are also some useful references for security tools that ...more
First off I am fully aware of the irony of posting a review of this book online on Goodreads, my blog and Facebook after reading a book on how to be invisible on the internet.....
This was a an entertaining read and although I work in the IT field, there were still some security facts in the book that I was not aware so I learnt a fair amount. There are also some useful references for security tools that ...more

I read Mitnick's Ghost in the Wires in 2011-ish (my review) and really liked it - I knew about Mitnick from being a geeky wanna-be kid computer hacker; reading about his strung-together exploits was great wish fulfillment.
I'll start with a couple things I liked about The Art of Invisibility. In each chapter there were stories and anecdotes of people (mis)using technologies to conduct their business, or get caught in the act - these were consistently interesting. The book is decently accessible ...more
I'll start with a couple things I liked about The Art of Invisibility. In each chapter there were stories and anecdotes of people (mis)using technologies to conduct their business, or get caught in the act - these were consistently interesting. The book is decently accessible ...more

This is a lot of material, and obviously most of it won't apply to most people, but it's a fascinating look into just how much we take for granted in today's world of electronic devices. This is a good reference for anyone who wants to learn about technology in general, or the internet specifically, and if it teaches even a few people to be a bit less free with their personal information, then I think the author would consider writing the book time well spent.
...more

this book gives you a lot of information about the privacy in the virtual world (internet).
what are the things are being tracked, why you're tracked, what are the impacts and much more, and more importantly, how to protect your self from those trackings.
It's better to read the written addition of the book, if you decided to go with the audiobook keep something to take notes while reading, you may need write down some names of add-ons or software.
some information is repeated so many times, but li ...more
what are the things are being tracked, why you're tracked, what are the impacts and much more, and more importantly, how to protect your self from those trackings.
It's better to read the written addition of the book, if you decided to go with the audiobook keep something to take notes while reading, you may need write down some names of add-ons or software.
some information is repeated so many times, but li ...more

A fascinating and tremendously helpful piece of writing. Because of this book, I spent hours changing all my passwords, my online accounts, hours reconfiguring my laptop and cellphone, haha.
The writing isn't that great, and Mitnick's ego gets in the way often, but well, I pick up the book for the other infos that he provides. I have little knowledge in cyber security so this is awesome, but for others with stronger background, it may not be so. I wish the book were more detailed on the exact wo ...more
The writing isn't that great, and Mitnick's ego gets in the way often, but well, I pick up the book for the other infos that he provides. I have little knowledge in cyber security so this is awesome, but for others with stronger background, it may not be so. I wish the book were more detailed on the exact wo ...more

“This book is all about staying online while retaining our precious privacy.”
3 1/2 stars. Well, reading The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data has certainly been a very sobering experience. If Mitnick’s goal in writing this book was to to scare us readers into paranoia, he’s for sure succeeded.
Nowadays, none of us could imagine living without our electronics, but how much do we really know about the way they w ...more

Jul 13, 2018
Chad Warner
rated it
it was amazing
·
review of another edition
Recommends it for:
security enthusiasts, privacy enthusiasts
Shelves:
cybersecurity,
non-fiction
Packed with strategies and tactics for increasing your digital security and privacy. It instills a privacy mindset. Each chapter raises awareness by explaining some privacy challenges in a not overly-technical way, usually with specific examples or stories, then gives instructions and advice on how to protect your privacy in the face of those challenges.
Average computer and phone users will likely be overwhelmed; this book is most useful to those whose tech-savviness is above average.
You'll quic ...more
Average computer and phone users will likely be overwhelmed; this book is most useful to those whose tech-savviness is above average.
You'll quic ...more

So, you want to be invisible online? Great. All you'll need is three separate computers -- one for your top secret business, one for your banking, and one for your everyday use; a few new email addresses, a handful of burner phones, a large pile of cash to buy gift cards and electronics without leaving a credit trace, a slightly larger pile if you intend on paying strangers to buy said cards and electronics for you, an ability to habitually lie, and the concentration of a criminal mastermind to
...more

I think I've been in denial about how little privacy we have on the internet. Kevin Mitnick has soundly disabused me of my unfounded sense of security. He goes through pretty much every device and/or convenience connected to the web and illuminates their vulnerabilities and ways they can be exploited. Thankfully he follows this by explaining how individuals can protect themselves, should they so choose. The technical aspects are clearly written, and wryly interspersed with anecdotes to add levit
...more

Much of this was over my head, but my main takeaway is to realize that all of our technology gathers an incredible amount of information about us, and that dossier of information is easily accessible to bad people unless you work hard at protecting yourself. Mitnick shares a lot of practical advice to make yourself 'invisible', advice that I expect to be obsolete in a couple of years seeing the rate of technological advance. Scary.
...more

A great resource for authors!

recommended by mom
topics | posts | views | last activity | |
---|---|---|---|---|
Beyond the Book: Are you changing your passwords tonight? | 1 | 8 | May 01, 2018 12:51PM | |
Goodreads Librari...: Please add details | 3 | 15 | Feb 26, 2018 07:11PM | |
Goodreads Librari...: The Art of Invisibility | 2 | 14 | Oct 15, 2017 12:36PM | |
The Art of Invisibility page count missing | 2 | 8 | Oct 15, 2017 09:58AM |
Goodreads is hiring!
Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows,
...more
News & Interviews
“I'm in a weird place because the book is about to come out. So I'm basically just walking around like a raw nerve and I'm not sure that I...
37 likes · 7 comments
No trivia or quizzes yet. Add some now »
“Take a moment and surf over to Panopticlick.com. This is a site built by the Electronic Frontier Foundation that will determine just how common or unique your browser configuration is compared to others, based on what’s running on your PC or mobile device’s operating system and the plug-ins you may have installed.”
—
0 likes
“In security, you are only as secure as the weakest link.”
—
0 likes
More quotes…