Cybersecurity for Activists: Books III & IV Audiolibro Por Cybersecurity Condor, JD Everhard arte de portada

Cybersecurity for Activists: Books III & IV

Mobile OS Hardening to Zoom Bombers

Muestra de Voz Virtual
Prueba por $0.00
Escucha audiolibros, podcasts y Audible Originals con Audible Plus por un precio mensual bajo.
Escucha en cualquier momento y en cualquier lugar en tus dispositivos con la aplicación gratuita Audible.
Los suscriptores por primera vez de Audible Plus obtienen su primer mes gratis. Cancela la suscripción en cualquier momento.

Cybersecurity for Activists: Books III & IV

De: Cybersecurity Condor, JD Everhard
Narrado por: Virtual Voice
Prueba por $0.00

Escucha con la prueba gratis de Plus

Compra ahora por $3.99

Compra ahora por $3.99

Confirma la compra
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
Cancelar
Background images

Este título utiliza narración de voz virtual

Voz Virtual es una narración generada por computadora para audiolibros..

Acerca de esta escucha

Vol. 3 & 4: Mobile, Metadata, and the Machines Watching You
Because it’s not paranoia if they really are listening, tracking, and triangulating your location.

Welcome to the part of the fight where things get uncomfortable: mobile spyware, Stingrays disguised as friendly cell towers, rogue QR codes, AI-powered OSINT engines scraping your every move.

This volume goes deeper: mobile OS lockdown, open-source tools that don’t betray you, quiet ways to communicate when the rest of the internet is on fire. We hit nodes, ransomware, privilege escalation, and Pegasus. We dissect Onion routing and dive into quantum threats before they quantum you.

Yes, we talk passwords. But we also go way past passwords. Into the territory of peer-to-peer trust, protest preparation, and open-source tools used by actual insurgents and whistleblowers—not marketing departments.

Whether you’ve been doxxed, surveilled, hacked, or just want to stay a few steps ahead of the authoritarian playbook, Vol. 3 is your tradecraft field manual.

This volume covers:

  • 🐍 Stingrays, spyware, and your leaky smartphone

  • 🛠️ Hardening Android, sidestepping Apple, escaping app store traps

  • ⚠️ OAuth, QR codes, and other digital Trojan horses

  • 🧱 Proton, Qubes, Bitwarden, and the tools that actually work

  • 🥋 Prepping for protest and staying secure in the streets

  • 🧅 Tor, Onionshare, and the truth about “going dark”

Read it before you need it. Surveillance states don’t wait for your consent—and safety starts before you hit the streets.

~~~~~~~~~~~~~~~~~~~
FULL Table of Contents Book 3

⚠️Mobile OS Hardening: Securing Your Phone 5

🛠️ MX Linux 8

🧱 NFTs and Blockchain 10

🛡️ Nodes and Vulnerable Gateways Every network has weak spots. These are some of them. 12

🎯 OSINT (Offensive) 14

🎯 OSINT, Defensive: 17

🔐 Onionshare 20

🐧 Open-Source Software 25

☠️ Operation Paperclip 32

📍 Organic Maps 33

⚠️ OAuth (Open Authorization) 35

🧅 Onion Routing / The Onion Router (Tor) 41

🔐 PGP (Pretty Good Privacy) 43

🔑 Password Managers 48

☂️ Password Manager: Bitwarden 53

🔑 Password Security 55

🌍 Peer-to-Peer Trust Networks 62

☢️ Pegasus and Spyware 64

☢️ Patriot Act (USA) 68

🛡️ Passphrase 68

☂️ Penetration Testing (Pen Testing) 72

⚠️ Phishing Attacks 75

🥋 Personal Security for Activists 80

🍍 Pineapple (Wi-Fi Pineapple) 84

🛡️ Play Store, App Store & F-Droid 88

☢️ Predator: The Silent Hunter of Spyware 91

🔓 Privilege Escalation 93

🦉 Protest Preparation 94

🛠️ ProtonMail (Proton) 97

🦉Proton Sentinel 103

❗ QR Codes: Scan with Caution 103

🛠️ Quantum Computing and Security 106

☂️ Quarantining Threats 113

🛠️ Qubes OS 114

☢️ Ransomware 118

Seguridad y Cifrado
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todavía no hay opiniones