This chapter explains how to protect yourself against spying. General protection methods are covered in each chapter; however, this chapter covers what is not directly discussed in each specific chapter’s technology realm. This chapter wraps up the book as a summary and offers more tips on how to safeguard yourself and your belongings (data) from theft or harm.
As we end this book on how to defend yourself against surveillance and reconnaissance attacks, the best advice up front would be to protect yourself, your data, and your assets. Protect your identity. ...