Preface

As the world becomes more connected through the web, new data collection innovations have opened ways to exploit privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web.

You will start the book by understanding what anonymity is and why it is important. Understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you’ll learn how to configure tools and understand the architectural components of the cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking the relevant precautions.

By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity.

Who this book is for

This book is targeted at journalists, security researchers, ethical hackers, and anyone who wishes to stay anonymous while using the web. This book is also for parents who wish to keep their kid’s identities anonymous on the web.

What this book covers

Chapter 1, Understanding Sensitive Information, will provide you with an understanding of sensitive information and what privacy and cyber anonymity are – this is the introductory chapter for the book.

Chapter 2, Ways That Attackers Use Your Data, will explain why attackers are interested in your privacy and the ways that attackers use stolen data after data breaches. Often, attackers use stolen data to commit more crimes or as entry points to attack other companies.

Chapter 3, Ways That Attackers Reveal the Privacy of Individuals and Companies, will detail how attackers reveal the privacy of individuals and companies.

Chapter 4, Techniques that Attackers Use to Compromise Privacy, will describe what types of techniques attackers will use to compromise your privacy.

Chapter 5, Tools and Techniques That Attackers Use, will uncover what different tools attackers use to compromise privacy. This will improve the reader’s knowledge of the different kinds of tools that attackers can use.

Chapter 6, Artifacts that Attackers Can Collect from You, will outline what type of data attackers are interested in collecting from companies and individuals.

Chapter 7, Introduction to Cyber Anonymity, will introduce you to cyber anonymity and cover the basics of the layers of cyber anonymity.

Chapter 8, Understanding the Scope of Access, will provide information on how to set up cyber anonymity and requirements to maintain cyber anonymity.

Chapter 9, Avoiding Behavior Tracking Applications and Browsers, will explain how to maintain cyber anonymity and the areas and techniques that we can use to maintain cyber anonymity.

Chapter 10, Proxy Chains and Anonymizers, will explain the tools and techniques that can be used to maintain cyber anonymity.

Download the color images

We also provide a PDF file that has color images of the screenshots and diagrams used in this book. You can download it here: https://packt.link/PmYh6.

Conventions used

There are a number of text conventions used throughout this book.

Code in text: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “Attackers can dump this file using the fgdump, samdump, and pwddump tools.”

Bold: Indicates a new term, an important word, or words that you see onscreen. For instance, words in menus or dialog boxes appear in bold. Here is an example: “On the Security tab, you can see the list of users including built-in and inherited users that have access to the given object.”

Tips or important notes

Appear like this.

Get in touch

Feedback from our readers is always welcome.

General feedback: If you have questions about any aspect of this book, email us at [email protected] and mention the book title in the subject of your message.

Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packtpub.com/support/errata and fill in the form.

Piracy: If you come across any illegal copies of our works in any form on the internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected] with a link to the material.

If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.

Share Your Thoughts

Once you’ve read An Ethical Guide to Cyber Anonymity, we’d love to hear your thoughts! Please click here to go straight to the Amazon review page for this book and share your feedback.

Your review is important to us and the tech community and will help us make sure we’re delivering excellent quality content.

Download a free PDF copy of this book

Thanks for purchasing this book!

Do you like to read on the go but are unable to carry your print books everywhere?

Is your eBook purchase not compatible with the device of your choice?

Don’t worry, now with every Packt book you get a DRM-free PDF version of that book at no cost.

Read anywhere, any place, on any device. Search, copy, and paste code from your favorite technical books directly into your application.

The perks don’t stop there, you can get exclusive access to discounts, newsletters, and great free content in your inbox daily

Follow these simple steps to get the benefits:

  1. Scan the QR code or visit the link below

https://packt.link/free-ebook/978-1-80181-021-0

  1. Submit your proof of purchase
  2. That’s it! We’ll send your free PDF and other benefits to your email directly
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset