Surveillance and the Art of Digital Camouflage
In this book, you pass four milestones to achieve perfectly protected digital message exchange. The four milestones are full control of your computer, receptive anonymity, expressive anonymity, and uniting anonymity and encryption. Each milestone has a chapter assigned to it.
At the beginning of each chapter, the text defines and explains the respective milestone. Then we introduce some free, open-source tools which we will employ to reach the milestone's goals. The third section of the chapters is a practical part of numerous exercises to put the tools to work and practice stealth communication. Each of those begins with a header listing the difficulty, the estimated working time, and prerequisites if needed. When reading the exercise sections, you should have a running computer at your side, your gaze switching between the computer screen and book pages, and your fingers on the keyboard. The book will encourage you to double-check assertions from the book against the results of your Internet inquests, to reproduce findings with your system, to install and use free, open-source software for your digital defense, and to practice challenging modes of communication. In the finalizing section of the chapters, the author describes attackers' options against the techniques practiced before and means to defend against those attacks.