Book Overview - My Data My Privacy My Choice by Rohit Srivastwa
1. Brief Overview - My Data My Privacy My Choice
This book will help you understand how much of your personal
information gets freely shared on the internet without your
explicit knowledge and authorization. This book will also give
specific and comprehensive instructions on how you can take
control of all that information.
By the end of this book, you will have ensured that the
information being leaked by your phone, your desktop, your
browser, and your internet connection is minimal-to-none. All
your online accounts for email, social networks, banking,
shopping, etc. will be secure and (significantly) impervious to attackers. You will have
complete control over all of your personal information that is available to public view. In fact,
if you so choose, you will even be able to create ‘purposeful misinformation’ to counter any
potential threats to your privacy and security, if and when necessary.
Over the 15 chapters in this book, you will learn the following:
Chapter 1 introduces a quick self-assessment and establishes some ‘ground-rules’ by
defining various terms and concepts such as #RohitRecommends and the scoring system
used throughout this book.
Chapter 2 explains how various devices, services, and adversaries of all kinds have the
potential to track and extract your private information by outlining basic and advanced
methods to proactively identify leakage of personal information.
Chapter 3 discusses the Android operating system, explores the privacy concerns
surrounding them, and provides recommendations on how to deal with such issues.
Chapter 4 looks at the various Apple devices available in the market, attempts to understand
the privacy concerns surrounding them and provides recommendations on how to deal with
such issues.
Chapter 5 highlights the various issues with the app-ecosystem present in both the mobile
platforms – Android and iOS – and provides recommendations on how to identify and deal
with such apps.
Chapter 6 explores various ‘smart’ devices available in the market and how they can impact
the privacy of your personal data and provides specific recommendations on how to ensure
the privacy of your personal data while using smart devices and/or IoT.
Chapter 7 evaluates how known vulnerabilities in popular desktop operating systems can be
exploited by malicious actors to prey on your personal data and provides recommendations
on how to deal with these vulnerabilities/exploits.
Chapter 8 evaluates how commonly exploited vulnerabilities in software applications can be
exploited by malicious actors to prey on your personal data and provides recommendations
on how to deal with these vulnerabilities/exploits.
2. Chapter 9 evaluates commonly used desktop browsers, discusses how they can be exploited
by malicious actors to prey on your personal data and provides recommendations on how to
deal with these vulnerabilities/exploits.
Chapter 10 explores the privacy issues and threats associated with accessing email, how it
can be compromised by malicious actors, and provides recommendations to secure your
email inbox.
Chapter 11 evaluates different categories of software provided as services (a.k.a. SaaS) over
the internet, i.e., Social Networks, Netbanking, Shopping websites, etc. and the privacy issues
and threats to consider while accessing these services over the internet.
Chapter 12 discusses the various methods of connecting to different networks (such as
Broadband, Wi-Fi, GSM/CDMA, Bluetooth, NFC, etc.) and evaluates each of them from a
privacy perspective.
Chapter 13 discusses Operational Security (OPSEC) and presents simple Dos and Don’ts
that you can follow to implement OPSEC-like behaviours in your daily routines.
Chapter 14 summarizes all the learning from the previous chapters and invites you to re-
assess yourself. If you did everything right up to this point, you should be able to see significant
improvement over the results you received in the first chapter!
Chapter 15 contains information that is important to know but a little too detailed for casual
reading. You can skip this chapter if you’d like, but I strongly recommend you read it anyway.
Available at
Book Website: https://privacy.clinic
Amazon.in (Kindle): https://amzn.to/3925Hqs
Amazon.in (Paperback): https://bit.ly/rohit11book
Amazon World: https://amzn.to/2WhI4om
Publisher: https://bpbonline.com/products/my-data-my-privacy-my-choice
GoogleBooks:
https://play.google.com/store/books/details/Rohit_Srivastwa_My_Data_My_Privacy_My_Cho
ice?id=bH_pDwAAQBAJ
Kobo: https://www.kobo.com/in/en/ebook/my-data-my-privacy-my-choice-a-step-by-step-
guide-to-secure-your-personal-data-and-reclaim-your-online-privacy
Good Reads: https://www.goodreads.com/book/show/53863904-my-data-my-privacy-my-
choice