ComSec: Off-The-Grid Communication Strategies
ComSec: Off-The-Grid Communication Strategies
Summary
“ComSec” addresses the pervasive surveillance capabilities of cellular phones, which track and collect extensive personal data. This information is often sold and stored by numerous companies and government entities, raising concerns about privacy in our communications.
The book emphasizes the importance of secure communication in a free society and reveals how businesses and governments exploit the technology we use daily. It provides insights into methods for mitigating the risks associated with digital communication, sharing techniques typically reserved for covert operatives and law enforcement.
Whether you’re a journalist, politician, activist, or simply someone concerned about privacy, “ComSec” offers essential strategies for maintaining secure communications. Readers can choose tactics based on their individual threat models, from basic privacy measures to more extreme solutions.
Key Takeaway: If secure communication is a priority for you, “ComSec” is an indispensable resource.
The Birches –
This book was incredibly eye opening. Purchasing this book will be your guide to successfully operating off the grid. The knowledge these authors display in this book is easy to comprehend because it’s worded in a way that makes it seem achievable… no matter how difficult it could appear. Incredibly invaluable!
AmazonCustomer902872653 –
Got my copy and read the entire book in one day. I have to say this is a must have for any privacy enthusiast. It is well written and easy to follow and then implement. The authors cover different options you can chose to use depending on your threat model, but after reading Chapter 1 I can’t see how you wouldn’t want to go as far as you can.
Dr. Dubious –
This was a very easy read and is a good starting point for privacy advocates.
The only downside is that the book references specific solutions that may not exist in the near future or may already be compromised. You delegate your trust into these third-parties, which based on your threat model, may not be sufficient.
I would have liked to see more solutions that can withstand the test of time and even some examples of home-built solutions for covert communications.
iLoveScotchScotchyScotchScotch –
As someone who has received extensive COMSEC training for work, I was curious to see what this book had to offer. I was not disappointed. The authors present the topic in such a way that the reader needs little to no prior knowledge to grasp the key concepts. They offered scalable options for best practices to mitigate threats. I also liked the fact that all of the information was very current since it was published in 2018. I personally think the material this book covers should be required reading in schools.
oldranger53 –
Nothing special