Book Image

An Ethical Guide to Cyber Anonymity

By : Kushantha Gunawardana
Book Image

An Ethical Guide to Cyber Anonymity

By: Kushantha Gunawardana

Overview of this book

As the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web. You will start the book by understanding what anonymity is and why it is important. After understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you’ll learn how to configure tools and understand the architectural components of cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking relevant precautions. By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity.
Table of Contents (16 chapters)
1
Part 1: The Basics of Privacy and Cyber Anonymity
4
Part 2: Methods and Artifacts That Attackers and Competitors Can Collect from You
9
Part 3: Concepts and Maintaining Cyber Anonymity

Impersonation and identity theft

Impersonation is when the attacker uses stolen data to pretend to be someone else. This information can be collected from social media or any type of privacy compromise. Then, the attacker can pretend to be you for different purposes.

Identity theft is when an attacker uses stolen data to access your bank accounts and create fake IDs and even passports. Also, attackers can use stolen personal information to get financial benefits such as car loans, credit cards, and checks without your knowledge or any type of consent. When they receive financial benefits, you will be naturally liable for them. The information stolen can be different from country to country and region to region. For example, in the United States, the most targeted piece of personal information is your social security number. Attackers use this to get financial benefits and even to release criminals on bail using stolen social security numbers, and eventually, the real owner will...