Burners & Black Markets
How to Be Invisible on Android, Blackberry & iPhone
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
James C. Lewis
-
By:
-
Lance Henderson
About this listen
The FBI wants to backdoor your smartphone. So does the NSA. They failed with Apple's iPhone but like most bullies, they'll try softer targets - targets that don't fight back. That's why unless you've got the proper tools to ward them off, they'll return.
Be ready for them. Buy this book and master anonymity and give the NSA a burn notice they'll never forget. A lot of books say install this, avoid that, but here you'll find easy steps to starve the beast.
No BS, no fluff, no lame theories, and no sugar coating. Just rock-solid tactical strategies for Tor, Tails, and burner phones, field-tested and easy to understand. Listen to this to learn how to be invisible without looking like you're trying to be invisible. Anywhere.
Covered in Burners & Black Markets:
- Best Burner Phones & Laptops
- How to Be Anonymous on Android, Blackberry, iPhone, Laptops - Anything!
- Cops & Cell Phones
- Online Privacy & Disaster Preparedness
- Tor & Tails & Android
- Anti-Hacker Tricks
- Buyer & Vendor Opsec for Black Markets
- How to Protect Yourself from Scammers, Phishers & Identity Thieves on the Black Market
Makes for an excellent companion piece to How to Be Invisible by J.J Luna and How to Disappear by Frank Ahearn. This book is required listening if you want to take anonymity to the next level.
©2016 Lance Henderson (P)2016 Lance HendersonListeners also enjoyed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 2 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever.
-
-
This writer talks a lot of shit
- By John Albert on 12-10-15
By: Lance Henderson
-
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 3 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
This manual will give you the incognito tools that'll make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive...and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll grow a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online.
-
-
It's not really me.
- By Douglas C. on 10-22-15
By: Lance Henderson
-
Darknet
- A Beginner's Guide to Staying Anonymous Online
- By: Lance Henderson
- Narrated by: John T. Parker
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Want to surf the web anonymously? This audiobook is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox, and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else.
-
-
Good information, even for techies.
- By J on 01-06-15
By: Lance Henderson
-
How to Disappear
- Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace
- By: Frank M. Ahearn, Eileen C. Horan
- Narrated by: Michael Kramer
- Length: 5 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Written by the world's leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker.
-
-
Smug Author
- By Mike Swims on 12-27-14
By: Frank M. Ahearn, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 2 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever.
-
-
This writer talks a lot of shit
- By John Albert on 12-10-15
By: Lance Henderson
-
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 3 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
This manual will give you the incognito tools that'll make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive...and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll grow a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online.
-
-
It's not really me.
- By Douglas C. on 10-22-15
By: Lance Henderson
-
Darknet
- A Beginner's Guide to Staying Anonymous Online
- By: Lance Henderson
- Narrated by: John T. Parker
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Want to surf the web anonymously? This audiobook is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox, and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else.
-
-
Good information, even for techies.
- By J on 01-06-15
By: Lance Henderson
-
How to Disappear
- Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace
- By: Frank M. Ahearn, Eileen C. Horan
- Narrated by: Michael Kramer
- Length: 5 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Written by the world's leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker.
-
-
Smug Author
- By Mike Swims on 12-27-14
By: Frank M. Ahearn, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
100 Deadly Skills
- The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
- By: Clint Emerson
- Narrated by: Pete Simonelli
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers - modified from the world of black ops - to help you take action in numerous "worst case" scenarios from escaping a locked trunk to making an improvised Taser to tricking facial recognition software. With easy-to-understand instructions, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces.
-
-
Only a small fraction of the information is useful
- By Mike Kirby on 11-18-15
By: Clint Emerson
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Hooked: How to Build Habit-Forming Products
- By: Nir Eyal, Ryan Hoover
- Narrated by: Nir Eyal
- Length: 4 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why do some products capture our attention, while others flop? What makes us engage with certain products out of habit? Is there a pattern underlying how technologies hook us? This audiobook introduces listeners to the "Hooked Model", a four-step process companies use to build customer habits. Through consecutive cycles through the hook, successful products reach their ultimate goal of bringing users back repeatedly - without depending on costly advertising or aggressive messaging.
-
-
Great book, wish the narration was a little better.
- By Todays The Best Day - Dani Davis on 07-21-15
By: Nir Eyal, and others
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
Crisis in the Red Zone
- The Story of the Deadliest Ebola Outbreak in History, and of the Outbreaks to Come
- By: Richard Preston
- Narrated by: Ray Porter
- Length: 13 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
An urgent wake-up call about the future of emerging viruses and a gripping account of the doctors and scientists fighting to protect us, told through the story of the deadly 2013-2014 Ebola epidemic. From the number-one best-selling author of The Hot Zone, now a National Geographic original miniseries....
-
-
Much thriller, not so much science
- By ahoi on 07-28-19
By: Richard Preston
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Survive Like a Spy
- Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too
- By: Jason Hanson
- Narrated by: Jason Hanson
- Length: 6 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everyone loves a good spy story, but most of the ones we hear are fictional. That's because the most dangerous and important spycraft is done in secret, often without anyone even noticing. In Survive Like a Spy, best-selling author and former CIA officer Jason Hanson takes the listener deep inside the world of espionage, revealing true stories and expert tactics from real agents engaged in life-threatening missions around the world.
-
-
Fantastic book, practical tips, too much marketing
- By Jennifer Sights on 04-05-18
By: Jason Hanson
-
Spy Secrets That Can Save Your Life
- A Former CIA Officer Reveals Safety and Survival Techniques to Keep You and Your Family Protected
- By: Jason Hanson
- Narrated by: Jason Hanson
- Length: 6 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
The New York Times best seller that reveals the safety, security, and survival techniques that 99 percent of Americans don’t know - but should. When Jason Hanson joined the CIA in 2003, he never imagined that the same tactics he used as a CIA officer for counter intelligence, surveillance, and protecting agency personnel would prove to be essential in every day civilian life. In his engaging and empowering book Spy Secrets That Can Save Your Life, Jason shares this know-how with listeners.
-
-
Fantastic, Practical and Useful Information
- By Sara on 10-08-15
By: Jason Hanson
-
The Panama Papers
- How the World's Rich and Powerful Hide Their Money
- By: Frederik Obermaier, Bastian Obermayer
- Narrated by: Simon Shepherd
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Late one evening investigative journalist Bastian Obermayer receives an anonymous message offering him access to secret data. Through encrypted channels he then receives documents showing a mysterious bank transfer for $500 million in gold. This is just the beginning. Obermayer and fellow Süddeutsche Zeitung journalist Frederik Obermaier find themselves immersed in a secret world where complex networks of shell companies help to hide people who don't want to be found.
-
-
highly recommended for the ears of the 99% and 1%
- By Craig S Smith on 12-06-18
By: Frederik Obermaier, and others
-
Survival Theory
- A Preparedness Guide
- By: Jonathan Hollerman
- Narrated by: Jim Pelletier
- Length: 9 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
This preparedness guide will help you develop a plan to escape the deadly rioting and looting, showing you where you can take your family to keep them safe, even if you can't afford a fully-stocked survival retreat. Jonathan Hollerman's in-depth expertise and recommendations will cover many topics including bug-out bags, SHTF Weapons, tactical gear, survival tools, knives, long-term food storage, livestock, bug-out locations, survival retreat recommendations, and much more.
-
-
Literally a half decent book.
- By LA on 09-29-16
Related to this topic
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Survive Like a Spy
- Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too
- By: Jason Hanson
- Narrated by: Jason Hanson
- Length: 6 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everyone loves a good spy story, but most of the ones we hear are fictional. That's because the most dangerous and important spycraft is done in secret, often without anyone even noticing. In Survive Like a Spy, best-selling author and former CIA officer Jason Hanson takes the listener deep inside the world of espionage, revealing true stories and expert tactics from real agents engaged in life-threatening missions around the world.
-
-
Fantastic book, practical tips, too much marketing
- By Jennifer Sights on 04-05-18
By: Jason Hanson
-
Dave Barry in Cyberspace
- By: Dave Barry
- Narrated by: Shadoe Stevens
- Length: 4 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
When Dave Barry goes mano a mano with the Information Superhighway, it's guaranteed to be a rip-roaring adventure. This self-proclaimed computer geek and Pulitzer Prize-winning journalist starts with the motto, "Never read the instructions," and slides from there into the world of hardware, software, Windows 95, and the critical issue of RAM ("the bottom line is, if you're a guy, you cannot have enough RAM").
-
-
Disappointing and Dated
- By Alan Rither on 09-13-04
By: Dave Barry
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- By: Andy Greenberg
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
-
Good writing, a little outdated by now
- By Sam on 08-08-15
By: Andy Greenberg
-
Exploding the Phone
- The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
- By: Phil Lapsley
- Narrated by: Johann North
- Length: 12 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary "harmonic telegraph", by the middle of the 20th century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.
-
-
Great Story along with Great Technical Research
- By Elsa Braun on 04-25-16
By: Phil Lapsley
People who viewed this also viewed...
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- By: William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrated by: Teri Schnaubelt
- Length: 12 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
By: William F. Reyor III, and others
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
How to Disappear and Start a New Life
- How to Get a Complete New Identity Legally, How to Delete Yourself from the Internet
- By: Raymond Phillips
- Narrated by: Clay Willison
- Length: 2 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
My name is Raymond Phillips. I graduated in 1996 with a bachelor's degree in criminal justice. After graduating, I went to work for a private security firm as an analyst and during my time there I was assigned to a big corporate client who was involved in some illegal activities and unfortunately I was exposed to their actual act of crime. Afterward, I found myself running for my own safety and had to disappear seven years ago.
-
-
Unedited and amateur narration
- By Yigosh on 11-22-17
By: Raymond Phillips
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 2 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever.
-
-
This writer talks a lot of shit
- By John Albert on 12-10-15
By: Lance Henderson
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- By: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrated by: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Length: 12 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- By Silvershopper on 01-18-23
By: Laurent Richard, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- By: William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrated by: Teri Schnaubelt
- Length: 12 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
By: William F. Reyor III, and others
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
How to Disappear and Start a New Life
- How to Get a Complete New Identity Legally, How to Delete Yourself from the Internet
- By: Raymond Phillips
- Narrated by: Clay Willison
- Length: 2 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
My name is Raymond Phillips. I graduated in 1996 with a bachelor's degree in criminal justice. After graduating, I went to work for a private security firm as an analyst and during my time there I was assigned to a big corporate client who was involved in some illegal activities and unfortunately I was exposed to their actual act of crime. Afterward, I found myself running for my own safety and had to disappear seven years ago.
-
-
Unedited and amateur narration
- By Yigosh on 11-22-17
By: Raymond Phillips
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 2 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever.
-
-
This writer talks a lot of shit
- By John Albert on 12-10-15
By: Lance Henderson
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- By: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrated by: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Length: 12 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- By Silvershopper on 01-18-23
By: Laurent Richard, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
What listeners say about Burners & Black Markets
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Anonymous User
- 08-04-19
Awesome Information
Definitely useful, best part is being in audiobook form to listen on commute, runs (maybe a walk), showers, mornings.
Worth the buy.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Eric b
- 02-14-24
treasure trove of useful stuff.
a recap of the invisibility tool kit but still a good read for anyone hoping to preserve there privacy in a increasingly insane world.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Public Name different than account
- 02-28-17
This book will set you on the right path.
What was one of the most memorable moments of Burners & Black Markets?
The discussions of meta data analysis and the debunking of theories/methods to stay in the shadows... i.e. browser settings being used as an identifier.
What about James C. Lewis’s performance did you like?
Started off general, then established a relate able scenario ending with details and tactics. This is a niche realm so a lot of the methods seem to grow irrelevant but the author addresses that. Good read for those who may have a introductory knowledge yet fine for those who are well versed.
Was this a book you wanted to listen to all in one sitting?
It took me a day to burn through it.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful