The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Rate it:
Open Preview
2%
Flag icon
In fact, privacy is recognized as a fundamental human right in the 1948 United Nations Universal Declaration of Human Rights.
6%
Flag icon
In other words, we will use password managers as a back door to get the keys to the kingdom.
6%
Flag icon
First, strong passphrases, not passwords, should be long—at least twenty to twenty-five characters. Random characters—ek5iogh#skf&skd—work best. Unfortunately the human mind has trouble remembering random sequences. So use a password manager. Using a password manager is far better than choosing your own. I prefer open-source password managers like Password Safe and KeePass that only store data locally on your computer.
7%
Flag icon
It is the password hashes, not the passwords themselves, that are stored in the protected memory of our computers and can be obtained from a compromise of targeted systems or leaked in data breaches.
9%
Flag icon
The more red herrings you provide, the more you become invisible online.
9%
Flag icon
When attempting to authenticate a user, sites or applications look for at least two of three things. Typically these are something you have, something you know, and something you are.
12%
Flag icon
Symmetrical encryption means that the same key is used both to lock and unlock the encrypted message. Symmetrical keys are hard to share, however, when two parties are unknown to each other or physically far apart, as they are on the Internet.
13%
Flag icon
Sometimes in order to become invisible you have to use the visible.
13%
Flag icon
Both the strength of the mathematical operation and the length of the encryption key determine how easy it is for someone without a key to crack your code.
14%
Flag icon
What is e-mail metadata? It is the information in the To and From fields as well as the IP addresses of the various servers that handle the e-mail from origin to recipient. It also includes the subject line, which can sometimes be very revealing as to the encrypted contents of the message. Metadata, a legacy from the early days of the Internet, is still included on every e-mail sent and received, but modern e-mail readers hide this information from display.6 PGP, no matter what “flavor” you use, does not encrypt the metadata—the To and From fields, the subject line, and the time-stamp ...more
14%
Flag icon
Social engineering is a hacking technique that uses manipulation, deception, and influence to get a human target to comply with a request.
16%
Flag icon
One way to mask your IP address is to use the onion router (Tor), which is what Snowden and Poitras did.
16%
Flag icon
A very basic rule is that you have to keep your anonymous accounts completely separate from anything that could relate back to your true identity. To be invisible you will need to start with a clean slate for each new secure contact you make. Legacy e-mail accounts might be connected in various ways to other parts of your life—friends, hobbies, work. To communicate in secrecy, you will need to create new e-mail accounts using Tor so that the IP address setting up the account is not associated with your real identity in any way.
19%
Flag icon
In security, you are only as secure as the weakest link.
22%
Flag icon
In addition to using end-to-end encryption, Signal also uses perfect forward secrecy (PFS). What is PFS? It’s a system that uses a slightly different encryption key for every call, so that even if someone does manage to get hold of your encrypted phone call and the key that was used to encrypt it, your other calls will remain secure. All PFS keys are based on a single original key, but the important thing is that if someone compromises one key, it doesn’t mean your potential adversary has access to your further communications.
23%
Flag icon
In the United States, law enforcement is not permitted to open a physically sealed letter without the recipient’s permission. The expectation of privacy is a legal test. It is used to determine whether the privacy protections within the Fourth Amendment to the United States Constitution apply.
24%
Flag icon
In general, open-source and nonprofit organizations provide perhaps the most secure software and services because there are literally thousands of eyes poring over the code and flagging anything that looks suspicious or vulnerable. When you use proprietary software, you more or less have to take the vendor’s word.
25%
Flag icon
As the Electronic Frontier Foundation has said, “no logs are good logs.”
25%
Flag icon
Those that provide encryption from end to end—meaning that the communication can’t be read by third parties because the keys are stored on the individual devices.
25%
Flag icon
When you’re on the app store or Google Play, look for apps that use something called off-the-record messaging, or OTR. It is a higher-standard end-to-end encryption protocol used for text messages, and it can be found in a number of products.20 Your ideal text message app should also include perfect forward secrecy (PFS). Remember that this employs a randomly generated session key that is designed to be resilient in the future. That means if one key is compromised, it can’t be used to read your future text messages.
25%
Flag icon
It also provides something called certificate pinning. That means it includes a proof-of-identity certificate, which is stored on the device. Upon each contact with the servers at ChatSecure, the certificate within the app on your device is compared with the certificate at the mother ship. If the stored certificate does not match, the session does not continue.
26%
Flag icon
There are also commercial apps that provide end-to-end encryption. The only caveat is that their software is proprietary, and without independent review their security and integrity cannot be confirmed.
27%
Flag icon
Unsure whether you answered that browser question in the past? Then try the test page at http://benwerd.com/lab/geo.php. This is one of many test sites that will tell you whether your browser is reporting your location.
32%
Flag icon
Google.com). Mozilla’s Firefox offers one of the best defenses against third-party tracking through a plug-in called NoScript.
34%
Flag icon
When we use OAuth, we’re giving up a lot of privacy for the sake of convenience.
37%
Flag icon
The EFF states that an IP address is not a person, meaning that wireless subscribers may not be responsible for the actions of others using their wireless networks.
38%
Flag icon
Just like hidden wireless SSIDs, it’s trivial to bypass MAC address filtering.
43%
Flag icon
If the connection is not encrypted, it is legal to intercept the traffic because it is generally available to the public.
43%
Flag icon
Seriously, if you really have something sensitive to do away from your house, then I recommend using the cellular connection on your mobile device instead of using the wireless network at the airport or coffee shop.
44%
Flag icon
The underlying VPN technology, IPsec (Internet protocol security), automatically includes PFS (perfect forward secrecy; see here), but not all services—even corporate ones—actually bother to configure it.
44%
Flag icon
the protocol most use by default. However, choosing a VPN service that uses the TCP protocol instead of UDP, such as TorGuard or ExpressVPN, can greatly improve performance.
45%
Flag icon
To be invisible, it’s always best to layer your privacy. Your risk of having your traffic viewed by others in a public network declines with each additional layer of security you employ. For example, from a public Wi-Fi network, access your paid VPN service, then access Tor with the HTTPS Everywhere extension installed by default in the Firefox browser.
45%
Flag icon
According to documents released by Edward Snowden, the Communications Security Establishment Canada (CSEC) can identify travelers passing through Canadian airports just by capturing their MAC addresses. These are readable by any computer that is searching for any probe request sent from wireless devices. Even if you don’t connect, the MAC address can be captured. So if you don’t need it, turn off your Wi-Fi.
45%
Flag icon
To stay invisible, the MAC address should be changed each time you connect to the wireless network so your Internet sessions cannot easily be correlated to you. It’s also important not to access any of your personal online accounts during this process, as it can compromise your anonymity.
46%
Flag icon
In the security business, we speak of the principle of “least privilege,” which means that a machine grants a user only the minimum privileges he or she needs to get the job done.
54%
Flag icon
Most people would never equate simply carrying a cell phone with forfeiting their right not to be tracked by the government—but that’s what carrying a phone amounts to these days.
54%
Flag icon
The word sousveillance, coined by privacy advocate Steve Mann, is a play off the word surveillance. The French word for “above” is sur; the French word for “below” is sous. So sousveillance means that instead of being watched from above—by other people or by security cameras, for example, we’re being watched from “below” by the small devices that we carry around and maybe even wear on our bodies.
61%
Flag icon
model. Perhaps that will change—someone could invent a one-stop button that removes an entire user profile from your car. Until then, at least go online and change all your social media passwords after you sell your car.
64%
Flag icon
Zoz Cuccias of Nest later told VentureBeat, “All hardware devices—from laptops to smartphones—are susceptible to jailbreaking;
71%
Flag icon
printers and copy machines, depending on the model, have one important thing in common—they both may contain hard drives. And unless that hard drive is encrypted—and many are still not—it is possible to access what has been printed at a later date.
72%
Flag icon
Google’s Android operating system allows movements from the sensors to be read at 200 Hz, or 200 cycles per second. Most human voices range from 80 to 250 Hz. That means the sensor can pick up a significant portion of those voices.
72%
Flag icon
Officially, says security researcher Michael Ossmann, whom Cui credits for the idea, “a funtenna is an antenna that was not intended by the designer of the system to be an antenna, particularly when used as an antenna by an attacker.”
72%
Flag icon
First of all, because femtocells are base stations for cellular communications, your mobile device will often connect to them without informing you. Think about that.
74%
Flag icon
A huge concern about using the cloud is that your data does not have the same Fourth Amendment protections that it would have if it were stored in a desk drawer or even on your desktop computer. Law enforcement agencies are requesting cloud-based data with increasing (and unsettling) frequency. And they can obtain access with relative ease, since everything you upload online—whether to a Web-based e-mail service, Google Drive, or Shutterfly—goes to a server that belongs to the cloud service provider, not to you.
76%
Flag icon
Wiping data is not the same as deleting data. Deleting data only changes the master boot record entry for a file (the index used to find parts of the file on the hard drive); the file (or some of its parts) remains on the hard drive until new data is written over that part of the hard drive. This is how digital forensics experts are able to reconstruct deleted data. Wiping, on the other hand, securely overwrites the data in the file with random data. On solid-state drives, wiping is very difficult, so I carry a laptop that has a standard hard drive and wipe it with at least thirty-five passes.
77%
Flag icon
What I do is reboot my iPhone before approaching immigration control in any country. And when it powers up, I deliberately do not put in my passcode. Even though I have enabled Touch ID, that feature is by default disabled until I first put in my passcode. The US courts are clear that law enforcement cannot demand your password. Traditionally, in the United States, you cannot be compelled to give testimonial evidence; however, you can be compelled to turn over a physical key to a safe. As such, a court can compel you to provide your fingerprints to unlock the device.4 Simple solution: reboot ...more
78%
Flag icon
If I have to leave my laptop behind, then I never leave it in hibernate mode. Rather, I power it down. If I didn’t, an attacker could possibly dump the memory and obtain my PGP Whole Disk encryption keys.6 So I turn it all the way off.
86%
Flag icon
So remember to change your MAC address each time you access public Wi-Fi (see here
88%
Flag icon
Well, the time interval between the sender’s tapping of a key and the tapping of the key again can be measured. This method of differentiation later became known as the Fist of the Sender. Various Morse code key operators could be identified by their unique “fists.”
88%
Flag icon
There’s a truism in the security business that a persistent attacker will succeed given enough time and resources.