The late Kevin Mitnick’s book, Art of Invisibility, was released in 2017. I didn’t read it until 2024. Though some of the topics covered were a little dated, the majority of them are quite relevant.
While making my way through the book, I made a checklist of actions a person can take to enhance their digital privacy and security. Most suggestions are good, practical, and easy-to-implement actions. Others are rather drastic and don’t necessarily apply to most folks that just want to safeguard their digital presence a little better.
I’ve made a key to indicate what I think is the practicality of each suggestion. I’m also a big fan of Apple’s iCloud+ service, and the Passwords app, and the security enhancements they offer, so I’ve indicated which items can be implemented with them.

Key

Symbol Meaning
👍 Something everybody should do
🤔 Something worth doing, but will take some effort
🫤 Impractical for most
🔐 Passwords App
Available via iCloud+

Comprehensive Privacy and Security Action Items

1. Account and Password Security

  • 👍 🔐 Use strong, unique passwords (20-25 characters, mix of characters)
  • 👍 🔐 Utilize a reputable password manager
  • 👍 Implement Two-Factor Authentication (2FA)
  • 👍 Be cautious with security questions
  • 🤔 Regularly monitor accounts for unauthorized activity
  • 🤔 Use a “security” birthday–not your real birthday–for identity verification

2. Device and Network Security

  • 👍 Secure mobile devices with strong passcodes, encryption, and auto-lock
  • 👍 Lock computers when not in use
  • 👍 Use up-to-date antivirus and anti-malware protection
  • 👍 Secure home Wi-Fi networks (strong passwords, WPA2/WPA3 encryption)
  • 🤔 Disable WPS and update router firmware regularly
  • 🤔 Use MAC address filtering for network access control
  • 👍 Be cautious when using public Wi-Fi
  • 🫤 Use a separate device for sensitive transactions
  • 👍 Cover webcams when not in use
  • 🤔 Regularly update firmware on all devices, including IoT
  • 🤔 Disable unnecessary features on smart devices
  • 🤔 Monitor network traffic for unusual patterns
  • 🤔 Reboot IoT devices regularly to clear potential malware

3. Communication Security

  • 👍 Use end-to-end encrypted messaging apps (e.g., Signal)
  • 🤔 Encrypt emails using PGP, OpenPGP, or GPG
  • 🤔 Be aware of metadata in communications
  • 🫤 Consider using burner phones for sensitive communications
  • 🤔 Utilize secure VoIP options with strong encryption
  • 🤔 Use disposable email addresses for temporary communications

4. Online Privacy and Browsing

  • 👍 Use private browsing mode and clear browser data regularly
  • 🤔 Disable location tracking in browsers
  • 👍 Use privacy-focused search engines (e.g., DuckDuckGo)
  • 🤔 Be cautious with cloud backups and syncing
  • 🤔 Block third-party requests and manage cookies
  • 👍 Use privacy-focused browser extensions (e.g., NoScript, Ghostery)
  • 🤔 Start browsing sessions from neutral sites
  • 🤔 Regularly change MAC addresses
  • 🫤 Use virtual machines for enhanced browsing security
  • 🫤 Utilize the Tor browser for accessing the Dark Web
  • 🫤 Maintain a persistent Tor connection to avoid identifiable patterns

5. Anonymity and VPN Usage

  • 👍 Use VPNs to mask IP addresses, especially on public Wi-Fi
  • 🫤 Utilize the Tor network for enhanced anonymity
  • 🤔 Consider using anonymous remailers for email
  • 🫤 Create new anonymous accounts when necessary
  • 🤔 Evaluate VPN providers carefully for privacy policies and security features
  • 🤔 Use tools for location obfuscation (e.g., proxy servers, ProxyHam)

6. App and Software Management

  • 🤔 Review and adjust app permissions regularly
  • 🤔 Prefer open-source software for critical privacy tools
  • 👍 Keep all software and operating systems updated
  • 👍 Be skeptical of unverified security claims
  • 👍 Avoid unnecessary toolbars and add-ons

7. Social Media and Online Presence

  • 👍 Limit personal information sharing on social platforms
  • 👍 Regularly review and adjust privacy settings
  • 👍 Be cautious with photo sharing and metadata
  • 🤔 Monitor your digital footprint and online presence
  • 👍 Educate children about online privacy and monitor their activity
  • 👍 Be wary of friend requests from strangers
  • 🤔 Avoid linking real-world and online identities

8. Mobile Device Privacy

  • 🤔 Manage location and connectivity settings (GPS, Bluetooth, Wi-Fi)
  • 🫤 Use airplane mode when not actively using wireless features
  • 🤔 Regularly clear app data and review permissions
  • 👍 Be cautious with mobile apps and their data access

9. Physical Security

  • 👍 Protect against physical access to devices
  • 👍 Be aware of surroundings when discussing sensitive matters
  • 👍 Secure physical documents and storage devices
  • 🤔 Use secure printing methods in shared environments
  • 🤔 Be cautious of physical surveillance and eavesdropping

10. Data Management and Protection

  • 👍 Regularly back up important data securely
  • 🤔 Be aware of data retention policies of service providers
  • 👍 Minimize sharing of personal information online
  • 👍 Use encryption for sensitive files and communications
  • 🫤 Consider using Bitcoin for anonymous transactions (with proper precautions)
  • 🤔 Securely wipe data from devices before selling or discarding

11. Workplace Privacy

  • 👍 Lock devices when leaving your desk
  • 🤔 Limit personal activities on work devices
  • 👍 Use secure printing methods
  • 👍 Be cautious with office cameras and microphones
  • 👍 Secure videoconferencing systems
  • 🤔 Remove metadata from documents before sharing externally
  • 👍 Separate work and personal communications

12. IoT and Smart Home Security

  • 🤔 Change default passwords on all IoT devices
  • 🫤 Disable unnecessary features on smart devices
  • 👍 Physically secure devices to prevent tampering
  • 🤔 Use strong authentication methods for smart home ecosystems
  • 🤔 Avoid connecting sensitive devices to shared networks

13. Vehicle Privacy and Security

  • 👍 Update vehicle software regularly
  • 🤔 Limit telematics and remote features when not in use
  • 👍 Clear infotainment system data before selling or returning a vehicle
  • 👍 Be cautious with connected car features and data sharing

14. Travel Security

  • 👍 Clean up sensitive data from devices before travel
  • 🤔 Use whole-disk encryption and consider hidden encrypted folders
  • 👍 Upload encrypted data to secure cloud services
  • 👍 Be aware of local laws regarding device searches
  • 👍 Avoid leaving devices unattended in hotel rooms
  • 🤔 Use a VPN immediately upon connecting to hotel Wi-Fi

15. Education and Awareness

  • 🤔 Stay informed about current privacy and security threats
  • 🤔 Educate others about privacy and security best practices
  • 🤔 Regularly review and update security measures
  • 👍 Be aware of phishing attempts and social engineering tactics
  • 👍 Know your rights regarding privacy laws and regulations
  • 👍 Advocate for stronger privacy protections
  • 👍 Be aware of surveillance practices by companies and governments
  • 👍 Use caution with intellectual property and sensitive information online

17. Incident Response

  • 🤔 Have a plan for responding to potential security breaches or identity theft
  • 🤔 Know how to report and address unauthorized access or data leaks
  • 👍 Monitor accounts and credit reports for signs of compromise

18. Advanced Anonymity Techniques

  • 👍 Use public Wi-Fi cautiously and with proper protection
  • 🤔 Create and maintain separate email accounts for different personas

<
Previous Post
MacAdmins Conference 2024 Presentation Resources
>
Next Post
Protecting Employees and Customers Digital Presence