
Cybersecurity for Activists: Books III & IV
Mobile OS Hardening to Zoom Bombers
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por $3.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Virtual Voice

Este título utiliza narración de voz virtual
Acerca de esta escucha
Vol. 3 & 4: Mobile, Metadata, and the Machines Watching You
Because it’s not paranoia if they really are listening, tracking, and triangulating your location.
Welcome to the part of the fight where things get uncomfortable: mobile spyware, Stingrays disguised as friendly cell towers, rogue QR codes, AI-powered OSINT engines scraping your every move.
This volume goes deeper: mobile OS lockdown, open-source tools that don’t betray you, quiet ways to communicate when the rest of the internet is on fire. We hit nodes, ransomware, privilege escalation, and Pegasus. We dissect Onion routing and dive into quantum threats before they quantum you.
Yes, we talk passwords. But we also go way past passwords. Into the territory of peer-to-peer trust, protest preparation, and open-source tools used by actual insurgents and whistleblowers—not marketing departments.
Whether you’ve been doxxed, surveilled, hacked, or just want to stay a few steps ahead of the authoritarian playbook, Vol. 3 is your tradecraft field manual.
This volume covers:
🐍 Stingrays, spyware, and your leaky smartphone
🛠️ Hardening Android, sidestepping Apple, escaping app store traps
⚠️ OAuth, QR codes, and other digital Trojan horses
🧱 Proton, Qubes, Bitwarden, and the tools that actually work
🥋 Prepping for protest and staying secure in the streets
🧅 Tor, Onionshare, and the truth about “going dark”
Read it before you need it. Surveillance states don’t wait for your consent—and safety starts before you hit the streets.
~~~~~~~~~~~~~~~~~~~
FULL Table of Contents Book 3
⚠️Mobile OS Hardening: Securing Your Phone 5
🛠️ MX Linux 8
🧱 NFTs and Blockchain 10
🛡️ Nodes and Vulnerable Gateways Every network has weak spots. These are some of them. 12
🎯 OSINT (Offensive) 14
🎯 OSINT, Defensive: 17
🔐 Onionshare 20
🐧 Open-Source Software 25
☠️ Operation Paperclip 32
📍 Organic Maps 33
⚠️ OAuth (Open Authorization) 35
🧅 Onion Routing / The Onion Router (Tor) 41
🔐 PGP (Pretty Good Privacy) 43
🔑 Password Managers 48
☂️ Password Manager: Bitwarden 53
🔑 Password Security 55
🌍 Peer-to-Peer Trust Networks 62
☢️ Pegasus and Spyware 64
☢️ Patriot Act (USA) 68
🛡️ Passphrase 68
☂️ Penetration Testing (Pen Testing) 72
⚠️ Phishing Attacks 75
🥋 Personal Security for Activists 80
🍍 Pineapple (Wi-Fi Pineapple) 84
🛡️ Play Store, App Store & F-Droid 88
☢️ Predator: The Silent Hunter of Spyware 91
🔓 Privilege Escalation 93
🦉 Protest Preparation 94
🛠️ ProtonMail (Proton) 97
🦉Proton Sentinel 103
❗ QR Codes: Scan with Caution 103
🛠️ Quantum Computing and Security 106
☂️ Quarantining Threats 113
🛠️ Qubes OS 114
☢️ Ransomware 118