Kevin Mitnick gives tips to be on the internet “invisible”

Whomever wants to be "invisible" on the Internet would be wise to encrypt emails and use the Tor network, so advises the famous former hacker and security expert Kevin Mitnick . He was once the most wanted hacker in the world and was eventually sentenced to a prison term of five years for breaking into several large companies.

Nowadays he works as a security consultant and wrote several books. Two weeks ago, the latest book by Mitnick, " The Art of Invisibility ," which he explains how people on the Internet can hide their tracks. In Wired Mitnick published a summary of the book. First, he explains the risks of using webmail services such as Gmail or Outlook. These third parties may have access to e-mails from users and even if users delete their emails, this does not mean that they're really gone.

To prevent others from reading your emails Mitnick recommends the use of encryption. In the case of webmail services he calls the plug-in Mailvelope , which should simplify the use of encryption. "To really be invisible in the digital world is to do more than just encrypt your messages," says Mitnick. Users must namely hide their IP address. Therefore, the security expert recommends the use of the Tor network.

However, he also notes that Tor has several vulnerabilities. So users have no control over the exit servers and the network may be slow. In addition, the Tor network should not be used from the computer where you normally surf it. Mitnick also recommends a separate notebook for Tor. Furthermore Mitnick examines the anonymous purchase and use of the burner phones "for example, to enable e-mail accounts. "As you can see, what is required to be invisible and remain unprecedented is discipline and constant attention. But it's worth it," concludes the expert.

Source: The Security Council

Topics: security expert, Speaking Engagements, The Art of Invisibility, Tor network, email encryption, Outlook, burner phones, digital privacy, internet, IP address, Mailvelope, security consultant, anonymity, gmail, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg