Cybersecurity for Activists: Books III & IV Audiobook By Cybersecurity Condor, JD Everhard cover art

Cybersecurity for Activists: Books III & IV

Mobile OS Hardening to Zoom Bombers

Virtual Voice Sample

$0.00 for first 30 days

Try for $0.00
Access a growing selection of included Audible Originals, audiobooks, and podcasts.
You will get an email reminder before your trial ends.
Audible Plus auto-renews for $7.95/mo after 30 days. Upgrade or cancel anytime.

Cybersecurity for Activists: Books III & IV

By: Cybersecurity Condor, JD Everhard
Narrated by: Virtual Voice
Try for $0.00

$7.95 a month after 30 days. Cancel anytime.

Buy for $3.99

Buy for $3.99

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use, License, and Amazon's Privacy Notice. Taxes where applicable.
Cancel
Background images

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks.

About this listen

Vol. 3 & 4: Mobile, Metadata, and the Machines Watching You
Because it’s not paranoia if they really are listening, tracking, and triangulating your location.

Welcome to the part of the fight where things get uncomfortable: mobile spyware, Stingrays disguised as friendly cell towers, rogue QR codes, AI-powered OSINT engines scraping your every move.

This volume goes deeper: mobile OS lockdown, open-source tools that don’t betray you, quiet ways to communicate when the rest of the internet is on fire. We hit nodes, ransomware, privilege escalation, and Pegasus. We dissect Onion routing and dive into quantum threats before they quantum you.

Yes, we talk passwords. But we also go way past passwords. Into the territory of peer-to-peer trust, protest preparation, and open-source tools used by actual insurgents and whistleblowers—not marketing departments.

Whether you’ve been doxxed, surveilled, hacked, or just want to stay a few steps ahead of the authoritarian playbook, Vol. 3 is your tradecraft field manual.

This volume covers:

  • 🐍 Stingrays, spyware, and your leaky smartphone

  • 🛠️ Hardening Android, sidestepping Apple, escaping app store traps

  • ⚠️ OAuth, QR codes, and other digital Trojan horses

  • 🧱 Proton, Qubes, Bitwarden, and the tools that actually work

  • 🥋 Prepping for protest and staying secure in the streets

  • 🧅 Tor, Onionshare, and the truth about “going dark”

Read it before you need it. Surveillance states don’t wait for your consent—and safety starts before you hit the streets.

~~~~~~~~~~~~~~~~~~~
FULL Table of Contents Book 3

⚠️Mobile OS Hardening: Securing Your Phone 5

🛠️ MX Linux 8

🧱 NFTs and Blockchain 10

🛡️ Nodes and Vulnerable Gateways Every network has weak spots. These are some of them. 12

🎯 OSINT (Offensive) 14

🎯 OSINT, Defensive: 17

🔐 Onionshare 20

🐧 Open-Source Software 25

☠️ Operation Paperclip 32

📍 Organic Maps 33

⚠️ OAuth (Open Authorization) 35

🧅 Onion Routing / The Onion Router (Tor) 41

🔐 PGP (Pretty Good Privacy) 43

🔑 Password Managers 48

☂️ Password Manager: Bitwarden 53

🔑 Password Security 55

🌍 Peer-to-Peer Trust Networks 62

☢️ Pegasus and Spyware 64

☢️ Patriot Act (USA) 68

🛡️ Passphrase 68

☂️ Penetration Testing (Pen Testing) 72

⚠️ Phishing Attacks 75

🥋 Personal Security for Activists 80

🍍 Pineapple (Wi-Fi Pineapple) 84

🛡️ Play Store, App Store & F-Droid 88

☢️ Predator: The Silent Hunter of Spyware 91

🔓 Privilege Escalation 93

🦉 Protest Preparation 94

🛠️ ProtonMail (Proton) 97

🦉Proton Sentinel 103

❗ QR Codes: Scan with Caution 103

🛠️ Quantum Computing and Security 106

☂️ Quarantining Threats 113

🛠️ Qubes OS 114

☢️ Ransomware 118

Security & Encryption Computer Security Hacking Technology
adbl_web_global_use_to_activate_webcro805_stickypopup
No reviews yet