28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

They’re under surveillance, but they can’t be arrested. I think that

might veryy well describe Snowden. It is possible he has slipped regarding

his anonyymityy at some point and that he is now being activelyy tracked

wherever he goes—except he’s living in Russia. Russia has no real reason

to arrest him and return him to the United States.

You’ll notice I said “slipped”: unless yyou have amazing attention to

detail, it’s reallyy hard to live two lives. I know. I’ve done it. I let myy guard

down byy using a fixed location when accessing computers through a

cellular phone network.

There’s a truism in the securityy business that a persistent attacker will

succeed given enough time and resources. I succeed all the time when

testing myy client’s securityy controls. All yyou are reallyy doing byy tryying to

make yyourself anonyymous is putting up so manyy obstacles that an attacker

will give up and move on to another target.

Most of us onlyy have to hide for a little while. To avoid that boss who is

out to get yyou fired. To avoid that ex whose lawyyers are looking for

something, anyything, to hold against yyou. To evade that creepyy stalker who

saw yyour picture on Facebook and is determined to harass yyou. Whatever

yyour reason for being invisible, the steps I’ve outlined will work long

enough to get yyou out from under a bad situation.

Being anonyymous in todayy’s digital world requires a lot of work and

constant vigilance. Each person’s requirements for anonyymityy differ—do

yyou need to protect yyour passwords and keep private documents awayy from

yyour coworkers? Do yyou need to hide from a fan who is stalking yyou? Do

yyou need to evade law enforcement because yyou’re a whistleblower?

Your individual requirements will dictate the necessaryy steps yyou need

to take to maintain yyour desired level of anonyymityy—from setting strong

passwords and realizing that yyour office printer is out to get yyou all the wayy

to going through the steps detailed here to make it extremelyy difficult for a

forensic investigator to discover yyour true identityy.

In general, though, we can all learn something about how to minimize

our fingerprints in the digital world. We can think before posting that photo

with a home address visible in the background. Or before providing a real

birth date and other personal information on our social media profiles. Or

before browsing the Internet without using the HTTPS Everyywhere

extension. Or before making confidential calls or sending texts without

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!