Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Dedication
Table of Contents
Who needs this book?
What's a Barefoot Anarchist?
Chapter 1: Why Privacy? Why Encrypt?
The Free Speech Argument
Dangers of Self-Incrimination
Chapter 2: Threat Modeling
Sounds Ominous!
You Can't Be Totally Anonymous
You Must Decide What You Can Live With
Attack Surfaces
Your IT department
Software: Open-Source vs. Closed
Companies & Policies
Advertising
Government & Privacy
Chapter 3: Connections
Internet Service Providers (ISPs)
Virtual Private Networks (VPNs)
The Onion Router (Tor)
Wi-Fi Networks
Chapter 4: Downloading Files
Download Sites
Use BitTorrent?
How About Usenet?
Chapter 5: Digital Purchases
Credit Card Options
A Note on Card/Banking Security
A Note on Credit Itself
PayPal & Similar Services
Bitcoin and Friends
Chapter 6: General Computing
Virtual Machines
Physical Security
Disk Encryption
Passwords & Logins
Smart Cards & Biometrics
Sending Anonymous Data
Automatic Software Updates
Anti-Virus Software
Chapter 7: Operating Systems
Windows?
Instead of Windows?
Other Linux Distros
Chapter 8: Telephony
Location Tracking
Cellular Eavesdropping
Text Messaging
Baseband Hacking...and Beyond?
The Metadata is the Message
Phones and Wi-Fi
Near-Field Communication (NFC)
Android vs iOS vs Others
Voice over IP (VoIP)
Texting Alternatives
All-in-one? Silent Circle vs. Signal
Chapter 9: Web Browsing
Search Engines
Which Browser?
"Secure" Connections
Fingerprinting
Advertising
Other Plugins
Chapter 10: "Cloud" Backups
Dropbox and Friends
SpiderOak & Its Pals
Curmudgeonly Advice
Make a Decision
Chapter 11: Email
Who's giving it to you?
How to encrypt it?
Chapter 12: Putting It All Together
What's Your Threat Model?
How Do We Fix Privacy?
Appendix A: Encryption Primer
Just the Basics
Appendix B: Jail!
Thanks for Reading!
Excerpt from Shiver on the Sky
← Prev
Back
Next →
← Prev
Back
Next →