Case Study: Online Identity Search

Debit and credit cards are currently the most convenient forms of purchase. Cybercash-type technologies have not yet made it into the mainstream of Internet technologies, although they eventually will. If all your bank account information is tied to a debit card, how easily can some malicious person gain that information? Let's break down what type of information the malicious attacker (for the rest of this book we will call him/her HackerX) needs to re-create your debit card information or gather every piece of information about you. The first piece of information used to track you down is your name. You might think this is the most important piece of information, but as we will see throughout the book, other ...

Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.