Your Safety and Privacy Online
This book is 100% complete
Completed on 2019-08-18
About the Book
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal is to explain online threats in terms that don’t require technical background to understand. All techno-speak will be limited, and where it cannot be avoided, I will first be explained in everyday non-computer terms.
This book should be accessible to anyone with enough computer knowledge to use Facebook, Twitter, and other social media, do some online shopping, use google to search for cat videos and pay your bills online, all the important stuff. If you are comfortable doing those things, you are in the core demographics for this book.
While this book was written with a US consumer in mind, this book will be equally applicable all over the world. There may be an occasional inside joke that folks outside the USA won’t understand but that shouldn’t detract anything from the book.
What is different about this book is that I’m targeting non-technical folks and I’m explaining the issues and the threats without resulting to scare tactics or threats which seem so prevalent in today's security training. Something called FUD, Fear Uncertainty and Doubt, is very prevalent in today information security space. I’m avoiding all FUD in this book.
If I were to summarize this book in few short bullet points, it would be like this:
· Don’t be clicking on links or attachments in strange unexpected emails
· Don’t share your password, like ever
· Do use a password manager for all your password
· Do use long unpredictable and unique passwords for every site.
· Do use critical thinking skills and don’t be swayed by emotions.
At this stage I have a lot of editing left to do but all the content will be there. I greatly appreciate any feedback you can provide. You can email me at firstname.lastname@example.org or use the forum. The current title is a working title, haven't decided if I'll keep that. If you can think of a pithier title please let me know. I've set the minimum price to $0 as it more important to me to get the information out there than making a profit. Your support will help me pay for an editor, cover art and cover printing cost to get this into brick and mortar book stores..
About This Book
- About the author
1 General Principles
- 1.1 Threat Modeling
- 1.2 Threat actors
- 1.3.1 Physical address privacy
- 1.3.2 Once posted it never goes away
1.3.3 Loading remote content in emails
- 188.8.131.52 Proton Mail
- 184.108.40.206 Thunderbird Mail
- 220.127.116.11 Gmail
- 18.104.22.168 Outlook Application
- 1.3.4 Free stuff
- 1.3.5 Free Seminars
- 1.3.6 Raffles and drawings
- 1.4 Critical thinking skills
- 1.5 Paranoia minus tin foil hats
- 1.6 Shared computers
- 1.7 Social Engineering
- 1.8 A Balancing Act
- 1.9 Deleting stuff
- 1.10 Keep stuff Updated
- 1.11 Multiple email accounts
- 1.12 Parts of an URL
- 1.13 Where is an email address hosted?
1.14 The CIA and NSA
- 1.14.1 Confidentiality
- 1.14.2 Integrity
- 1.14.3 Availability
- 1.15.1 Synchronous encryption
- 1.15.2 Asynchronous Encryption
- 1.15.3 Encrypting a thing
- 1.15.4 Encrypted Connections
- 1.15.5 Hashing
2.1 Authentication Factors
- 2.1.1 SMS MFA
- 2.1.2 FIDO U2F USB Keys
- 2.1.3 Authentication Apps
- 2.2 Password Selection and Handling
2.3 Managing Passwords
- 2.3.1 Physical Password Managers
- 2.3.2 Sticky notes
- 2.3.3 The Notepad
2.3.4 Password manager applications
- 22.214.171.124 Local password managers
- 126.96.36.199 Online Password Managers
- 2.4 Federated Logins
- 2.5 Remember Me
- 2.1 Authentication Factors
3 NSA, SSL, TLS, VPN, and TLA
- 3.1 The NSA
- 3.2 SSL and TLS
- 3.3 VPN’s Defined
- 3.4 VPN Use Cases
- 3.5 Problems with public hotspots.
- 3.6 Selecting a good VPN service
4 Malware Threats
- 4.1 Viruses and Worms
- 4.2 Trojan Horse
- 4.3 Malvertising
- 4.4 Ways to get infected with malware
- 4.5 Protection approaches
- 4.6 Example
5 Scams, cons, and other dangers
- 5.1 Let’s go phishing
- 5.2 Common scams
- 5.3 Scareware
- 5.4 Fake Sales
- 5.5 Free Offers
- 5.6 Saving money on sales
- 5.7 Bait and Switch
- 5.8 Click Baits
- 5.9 Congratulatory ads
- 5.10 General offer for help
- 5.11 Common themes
- 6 In Closing
Electronic Frontier Foundation
Defending your civil liberties in a digital world.https://www.eff.org/
Based in San Francisco, EFF is a donor-supported membership organization working to protect fundamental rights regardless of technology.
The Leanpub 45-day 100% Happiness Guarantee
Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Free Updates. Free App. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets), MOBI (for Kindle) and in the free Leanpub App (for Mac, Windows, iOS and Android). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.