Kevin Mitnick gives tips to be on the internet “invisible”

Whomever wants to be "invisible" on the Internet would be wise to encrypt emails and use the Tor network, so advises the famous former hacker and security expert Kevin Mitnick . He was once the most wanted hacker in the world and was eventually sentenced to a prison term of five years for breaking into several large companies.

Nowadays he works as a security consultant and wrote several books. Two weeks ago, the latest book by Mitnick, " The Art of Invisibility ," which he explains how people on the Internet can hide their tracks. In Wired Mitnick published a summary of the book. First, he explains the risks of using webmail services such as Gmail or Outlook. These third parties may have access to e-mails from users and even if users delete their emails, this does not mean that they're really gone.

To prevent others from reading your emails Mitnick recommends the use of encryption. In the case of webmail services he calls the plug-in Mailvelope , which should simplify the use of encryption. "To really be invisible in the digital world is to do more than just encrypt your messages," says Mitnick. Users must namely hide their IP address. Therefore, the security expert recommends the use of the Tor network.

However, he also notes that Tor has several vulnerabilities. So users have no control over the exit servers and the network may be slow. In addition, the Tor network should not be used from the computer where you normally surf it. Mitnick also recommends a separate notebook for Tor. Furthermore Mitnick examines the anonymous purchase and use of the burner phones "for example, to enable e-mail accounts. "As you can see, what is required to be invisible and remain unprecedented is discipline and constant attention. But it's worth it," concludes the expert.

Source: The Security Council

Topics: security expert, Speaking Engagements, The Art of Invisibility, Tor network, email encryption, Outlook, burner phones, digital privacy, internet, IP address, Mailvelope, security consultant, anonymity, gmail, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

5 Interview Questions to Ask Penetration Testing Companies

If you've never experienced a data breach, consider yourself lucky. If you have, you know it's an absolute nightmare. With cyber criminals looking for..

Read more ›

4 Ways Security Awareness Training Can Benefit Your Organization

Threat actors rely on human error, counting on employees to fall for their tricks.

Read more ›

3 Common Penetration Test Findings You May Find Surprising

How secure is your critical data from cyber threats? If you’re not sure, a penetration test can provide the answer.

Read more ›
tech-texture-bg