Skip to content

Take Back Your Privacy


Privacy-Cover3Curious about surveillance? Wondering about the security of your computer or phone?

These are just a couple of starting points. The author, with decades of experience in the field, takes us on a journey through the digital landscape. Exhaustively researched, with hundreds of links, it’s nevertheless written in an informal and entertaining style.

Do you know the difference between “a web browser” and “the internet”? That’s about all you’ll need, to start. When you’re done with this book, you’ll know more than most IT (information technology) professionals about digital security. You’ll be able to analyze the claims made by tech bloggers and those who flog their own products. You’ll know much, much more about the risks to your privacy and anonymity–and why they’re both so important–in today’s fast-moving world.

Then, at the end, the author tells how he once went to jail for trying to help protect thousands of college students (including himself). It’s a chilling reminder of just how easily “spin” can replace substance. And yet, it’s a funny story.

Come on in and give this book a try. You’ll be glad you did.

The Table of Contents:

  • Dedication
  • Who needs this book?
  • What’s a Barefoot Anarchist?
  • Chapter 1: Why Privacy? Why Encrypt?
    1. The Free Speech Argument
    2. Dangers of Self-Incrimination
  • Chapter 2: Threat Modeling
    1. Sounds Ominous!
    2. You Can’t Be Totally Anonymous
    3. You Must Decide What You Can Live With
    4. Attack Surfaces
    5. Your IT department
    6. Software: Open-Source vs. Closed
    7. Companies & Policies
    8. Advertising
    9. Government & Privacy
  • Chapter 3: Connections
    1. Internet Service Providers (ISPs)
    2. Virtual Private Networks (VPNs)
    3. The Onion Router (Tor)
    4. Wi-Fi Networks
  • Chapter 4: Downloading Files
    1. Download Sites
    2. Use BitTorrent?
    3. How About Usenet?
  • Chapter 5: Digital Purchases
    1. Credit Card Options
    2. A Note on Card/Banking Security
    3. A Note on Credit Itself
    4. PayPal & Similar Services
    5. Bitcoin and Friends
  • Chapter 6: General Computing
    1. Virtual Machines
    2. Physical Security
    3. Disk Encryption
    4. Passwords & Logins
    5. Smart Cards & Biometrics
    6. Sending Anonymous Data
    7. Automatic Software Updates
    8. Anti-Virus Software
  • Chapter 7: Operating Systems
    1. Windows?
    2. Instead of Windows?
    3. Other Linux Distros
  • Chapter 8: Telephony
    1. Location Tracking
    2. Cellular Eavesdropping
    3. Text Messaging
    4. Baseband Hacking…and Beyond?
    5. The Metadata is the Message
    6. Phones and Wi-Fi
    7. Near-Field Communication (NFC)
    8. Android vs iOS vs Others
    9. Voice over IP (VoIP)
    10. Texting Alternatives
    11. All-in-one? Silent Circle vs. Signal
  • Chapter 9: Web Browsing
    1. Search Engines
    2. Which Browser?
    3. “Secure” Connections
    4. Fingerprinting
    5. Advertising
    6. Other Plugins
  • Chapter 10: “Cloud” Backups
    1. Dropbox and Friends
    2. SpiderOak & Its Pals
    3. Curmudgeonly Advice
    4. Make a Decision
  • Chapter 11: Email
    1. Who’s giving it to you?
    2. How to encrypt it?
  • Chapter 12: Putting It All Together
    1. What’s Your Threat Model?
    2. How Do We Fix Privacy?
  • Appendix A: Encryption Primer
    1. Just the Basics
  • Appendix B: Jail!
  • Thanks for Reading!
  • Excerpt from Shiver on the Sky

 

Buying Options:

Available in paperback, large-print paperback, and ebook formats. Links below are to ebooks. Note: not all retailers offer print versions. Also note that the paperbacks cost more than ebooks, and do not have hundreds of clickable links!

Amazon