28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

streets. Actuallyy, the opposite is true. Manyy of us, even manyy readers of this

book, now accept to at least some degree the fact that everyything we do—

all our phone calls, our texts, our e-mails, our social media—can be seen byy

others.

And that’s disappointing.

Perhaps yyou have broken no laws. You live what yyou think is an average

and quiet life, and yyou feel yyou are unnoticed among the crowds of others

online todayy. Trust me: even yyou are not invisible. At least not yyet.

I enjoyy magic, and some might argue that sleight of hand is necessaryy for

computer hacking. One popular magic trick is to make an object invisible.

The secret, however, is that the object does not phyysicallyy disappear or

actuallyy become invisible. The object alwayys remains in the background,

behind a curtain, up a sleeve, in a pocket, whether we can see it or not.

The same is true of the manyy personal details about each and everyy one

of us that are currentlyy being collected and stored, often without our

noticing. Most of us simplyy don’t know how easyy it is for others to view

these details about us or even where to look. And because we don’t see this

information, we might believe that we are invisible to our exes, our parents,

our schools, our bosses, and even our governments.

The problem is that if yyou know where to look, all that information is

available to just about anyyone.

Whenever I speak before large crowds—no matter the size of the room

—I usuallyy have one person who challenges me on this fact. After one such

event I was challenged byy a veryy skeptical reporter.

I remember we were seated at a private table in a hotel bar in a large US

cityy when the reporter said she’d never been a victim of a data breach.

Given her yyouth, she said she had relativelyy few assets to her name, hence

few records. She never put personal details into anyy of her stories or her

personal social media—she kept it professional. She considered herself

invisible. So I asked her for permission to find her Social Securityy number

and anyy other personal details online. Reluctantlyy she agreed.

With her seated nearbyy I logged in to a site, one that is reserved for

private investigators. I qualifyy as the latter through myy work investigating

hacking incidents globallyy. I alreadyy knew her name, so I asked where she

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!