The Art of Invisibility cover art

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Preview

Try for $0.00
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Premium Plus auto-renews for $14.95/mo + applicable taxes after 30 days. Cancel anytime.

The Art of Invisibility

Written by: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
Narrated by: Ray Porter
Try for $0.00

$14.95 a month after 30 days. Cancel anytime.

Buy Now for $28.27

Buy Now for $28.27

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Tax where applicable.
Cancel

About this listen

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility". Mitnick is the world's most famous - and formerly the most wanted - computer hacker. He has hacked in to some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

In The Art of Invisibility Mitnick provides both online and real-life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes - privacy is a power you deserve and need in this modern age.

©2017 Kevin Mitnick (P)2017 Hachette Audio
History & Culture Internet & Social Media Security & Encryption Computer Security Hacking Personal Security
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about The Art of Invisibility

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    65
  • 4 Stars
    26
  • 3 Stars
    11
  • 2 Stars
    3
  • 1 Stars
    1
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    62
  • 4 Stars
    18
  • 3 Stars
    8
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 4.5 out of 5 stars
  • 5 Stars
    52
  • 4 Stars
    20
  • 3 Stars
    12
  • 2 Stars
    3
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

Information everyone should know

Kevin Mitnick, in case you aren’t familiar with the name, is a former hacker and convicted criminal now turned white-hat penetration tester - and author of several books about it. And as you can judge from the subtitle, not at all modest about it either. But undeniably a font of knowledge on the matter.

You may be aware that your actions online aren’t totally anonymous, but in the past few years changes to technology and to laws have made that drastically even less true, likely without you realizing. This book is a very useful eye-opener for everyone, whether you think you need it or not. Do you have “smart appliances” or tv in your home? Did you know you can go to jail for deleting your browser history even if you’ve done nothing wrong? Do you want to know how to minimize your risk online? This is a good overview and summary of all these and more.

Mitnick goes all the way to showing you how to be completely invisible online, which is a very difficult thing these days, but you can take away as much or as little of that as you need. Still, as he points out there are legitimate reasons why you might need to know this stuff. For example, escaping an abusive relationship (or talking to a friend who is). Going through a bitter divorce. Living in or travelling to a country with very restrictive internet rules. Need to travel overseas with a laptop or other device containing confidential data that you’re professionally obliged to protect (doctor/lawyer confidentiality for example, or company research secrets). This book will help you become aware of issues you may not even know about, and how to deal with them to whatever level you need.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

2 people found this helpful

  • Overall
    3 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    3 out of 5 stars

Good for its time

This would have been good....4 years ago. Its mostly pretty obvious and outdated information now.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    3 out of 5 stars

Mixed Feelings.

I have mixed feelings about the book, and it wasn't quite what I was expecting. I'll rate it four stars because I think it's good content but probably just not for me.

The first thing I noticed is that the advice given either seems to fall into two categories. The very basic, such as password strength guides and tips, how passwords are broken, password managers, drive encryption, browser cache and private browsing, recommended addons, etc. These are great for someone who is new to computer security, but ultimately I didn't learn much from it.

The second category is the very advanced, specific, and involved. Things like getting burner phones, separate devices to separate your anonymous presence from your real world identity, bribing strangers to purchase gift cards on your behalf, TOR onion routing, laundering bitcoin, plausible deniability, etc. All of these things are rather extreme steps, probably only useful to a foreign affairs reporter or whistleblower, not greatly useful to the average person trying to minimize their online footprint. Worse is that a lot of it is presented as "this is what this infamous criminal did wrong and got him caught, and here's what he should have done", this could be Mitnick leaning into the romanticized hacker archetype or his 'badboy' reputation, but it gives the book a certain... Shady vibe? Like saying that it's useful to reporters for plausible deniability while sounding like the advice was intended for an audience with more questionable intent. Idk, pet peeve maybe, but nonetheless I doubt most people would benefit from or understand this half of the books advice.

There are a couple of chapters in the middle that have more useful general advice; For example, how sites track you, example cases, and what to do about it. These are more just case studies highlighting how electronic tracking in the modern world has spiraled out of control and why you should care about privacy.

Lastly, although the book is only a few years old it's already starting to show its age. As rapidly evolving and ever-changing technology marches on, I expect that in a few more years a good portion of the specific advice will be outdated.

So if you've done any IT-Sec before you probably won't learn much new, and the more extreme steps / advice are unlikely to be beneficial for most people. Take these things into consideration and decide whether this book is right for you.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

Good content, good narration.

Very good content from Kevin in this book. Even though I'll probably never get to the point where I need to exercise this information, it's good to have it as a resource. #Audible1

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

Excellent information to protect your privacy.

Excellent information on the many ways you are vulnerable to data, privacy and sensitive information attacks.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    3 out of 5 stars

Good but not his best

Not nearly as Mitnick’s Ghost in the Wires (it was FANTASTIC and full of real life suspense), but still interesting. Lots of practical information.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    2 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    2 out of 5 stars

Good book but

If you have some knowledge of privacy tools it may be redundant. I learned some new things but was expecting better stories and technology.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

3 people found this helpful