screens
Digital Security for Celebrities
A guide for those who are especially exposed and lack technical knowledge to face the most advanced digital threats.

About this book

In today’s digital ecosystem, singers, influencers, politicians, and people in positions of responsibility play by the same rules as everyone else—but they have far more at stake. The online world is far less forgiving with them. This practical guide provides everything you need to design and implement a personal cyber defense strategy tailored to these highly exposed profiles.


With a careful, rigorous, and beginner-friendly approach, it walks readers through 5 sections, 24 chapters, 5 quick-reference guides, and more than 250 notes. Non-technical readers will find clear, straightforward explanations to help them protect their identity and data. For more extreme cases, it also includes advanced operational security tactics to counter highly targeted threats. Readers outside these high-exposure groups will still find practical insights to help them lower their risk against the digital threats we all face.


Prologue by Pedro Cardona Suanzes (click to read)

24 Chapters

Divided into 5 parts, each chapter is broken down into sections that allow readers to digest the content in small doses, using clear language free of jargon.

5 Quick Reference Guides

At the end of each part, a quick reference guide is included that summarizes the main tactics from each chapter.

+250 References

Throughout the book, references and notes are included to allow for deeper exploration of selected content.


Contents

Part I: The Digital Ecosystem

Introduces the context of the book and the main properties of the digital ecosystem we navigate daily.

  1. A golden digital cage
  2. You are the product
  3. How Software works (click to read)
  4. On incidents and data leaks
  5. Choose your threats

Part II: Everything begins and ends on a device

Where the devices we use are introduced as the center of gravity for all our digital activity and as a tool to safeguard our data.

  1. Devices: the Alpha and the Omega
  2. Choosing a device
  3. Smartphones - Android and iOS
  4. Personal computers
  5. Relevant configuration
  6. Preparing for device loss

Part III: Your digital identity

Dedicated to our digital identity, online accounts, and the mechanisms we use to prove we are who we say we are.

  1. Registering online accounts
  2. Passwords
  3. Strong authentication
  4. The life cycle of your digital identity

Part IV: Your digital activity

Explores the activity we engage in with our accounts, the data we generate, and the strategies to stay safe online.

  1. The science of protecting your data
  2. Reducing our exposure
  3. Metadata
  4. Staying safe online

Part V: Operational security, anonymity, and privacy

Introduces the concept of advanced operational security and builds on previous parts to adapt our cyber defense strategy to particularly demanding practical cases.

  1. Introduction to Operational Security
  2. When reality surpasses fiction
  3. OpSec 101
  4. Advanced tactics
  5. Applied OpSec
ipad

Learn and apply the fundamentals of digital security

A comprehensive guide tailored for celebrities, but full of tactics perfectly applicable by people who iron their own shirts

Buy on Amazon