December 2019
Intermediate to advanced
205 pages
5h 2m
English
In this age of identity attack vectors , protecting one’s identity cannot be done stand-alone. There are plenty of opportunities for a threat actor to steal your identity using the very information technology that we embrace every day. We have covered that in detail in previous chapters. However, there is another mitigation approach called Privacy Filters that can limit a threat actor’s ability to create that critical linkage between account, identity, and data and craft identity obfuscation.