The Art of Invisibility is a book about methods of maintaining privacy and anonymity in an age of surveillance by American hacker and cybersecurity analyst Kevin Mitnick. The book gives advice on every aspect of modern technology which could expose one to nosy neighbors, identity thieves, law enforcement, and other sources of unwanted attention. The book is divided into sixteen chapters which advise the reader about various measures that can be taken to improve security.

The introduction begins with the revelations made about the NSA’s activities by Edward Snowden, then discusses the information that is publicly available about most people with very little searching required. The first chapter is about password security and security questions. Tips are given for choosing a strong password, using a password manager, creating answers for security questions, and using multi-factor authentication. The second and third chapters cover surveillance of email and phones. Mitnick covers the concepts of metadata, encryption, and social engineering. He explains how the Tor browser and MAC addresses work. He discusses several current and historic methods of wiretapping phone conversations and pinpointing the location of a phone, then explains how a burner phone may be used to obtain some privacy.

Chapter 4 is about the functionality and use of encryption to thwart eavesdroppers. This is discussed in the context of text messages, cell phones, and computers, each of which is remarkably vulnerable without it. The next chapter begins with the Sarbanes-Oxley Act, which is now being used to prosecute anyone who deletes browser history that federal prosecutors wish preserved. Mitnick makes the obvious recommendation of not collecting such history in the first place, then instructs the reader on how to do so. He then discusses how Internet browsers track a user’s location and how this may be countered. The chapter concludes with the dangers of connecting devices and cloud storage.

Read the entire article at