-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

An Ethical Guide to Cyber Anonymity
By :

An individual using multiple devices has become the norm in today’s world. Most of the devices we use today store our identities in various forms. This allows our identity information to be easily exposed. This can happen at an operating system level, an application level, a storage level, or a network level. Using various devices makes our life easy, but we are sacrificing identities and other sensitive information by ignoring privacy. If a device is stolen, stored data can be accessed easily unless the device storage is encrypted. Most identities are exposed due to unawareness of various types of attacks.
Individual identities can be exposed in multiple ways, including the following:
Change the font size
Change margin width
Change background colour