The Hacker's Guide To Privacy
We've come full circle. The first section of this book examined the dark side of technology; the final section reveals the bright side; how to use technology to protect your privacy. Figure II.1 pinpoints the zones in which our privacy is subject to invasion. Regardless of which zone you're in, there are practical steps you can take to secure your privacy and personal information. I sought the advice of several hackers and security experts profiled in this book to prepare a practical guide to help you protect yourself. That's what zone defense is all about.
You're a target! Wherever you go, there you are. Presence awareness technology is here. Our information is being harvested and there's nothing we can do about it! But you can protect your privacy by practicing stealth and using your digital doppelganger. Common sense and technological countermeasures can help you evade the invaders !
I hope you enjoyed reading this book as much as I enjoyed writing it. I'd like to end it with these three words...
Think for yourself!