Chapter 14. Securing Your Privacy Using Other Digital Devices

In previous chapters, we have discussed technologies that focus on the Internet because therein lies the major source of threat to your personal privacy. However, as other technologies expand and grow that take advantage of the Internet and allow access to your personal data through other methods, you will be faced with new forms of attacks. Personal digital assistants, wireless technologies, and new protocols for sharing data have the potential to compromise your personal life the same as a hacker on the Internet can.

The use of digital devices over the past several years has grown tremendously. Businesspeople as well as students carry personal digital assistants (PDAs). People pulling ...

Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.