The Course
Dive into the next generation of the internet with us as we explore the ins and outs of privacy in a decentralized online world.
Grasp the opportunity to not only protect your digital footprint but also to harness the power of Web 3.0 for innovative solutions across various industries.
Whether you're a developer looking to build privacy-centric applications, a business professional aiming to stay ahead of the curve, or just a curious mind eager to understand this transformative technology, this course has got you covered.
Join us, and let's pave the way to a more private, empowered internet experience together.
Curriculum
- Course intro (0:49)
- What is Privacy? Part 1 “Glenn Greenwald: Why Privacy Matters” (1:49)
- What is Privacy? Part 2 “The Significance of Privacy in Web3”
- Privacy Fundamentals Part 1 "The Ethereum Transition to Cypherpunk" (3:31)
- Privacy Fundamentals Part 2"The Core of Crypto Is Punks and Principles"
- Activism and Privacy Part 1 "Why Privacy Matters for Activism" (0:54)
- Activism and Privacy Part 2 "Privacy as a Universal Right"
- Activism and Privacy Part 3 "Voices of Courage"
- The Role of Cypherpunks in Privacy Protection Part 1 "A Brief History of Cypherpunks"
- The Role of Cypherpunks in Privacy Protection Part 2 "Revitalizing Cypherpunk Principles in Ethereum and Beyond"
- The Role of Cypherpunks in Privacy Protection Part 3 "The Cypherpunk Manifesto"
- Privacy in Cryptocurrency Part 1 "Why Cryptocurrency Needs Privacy"
- Privacy in Cryptocurrency Part 2 "How Cryptocurrency Promotes Privacy"
- Privacy Resources Part 1 "Module 1 Glossary"
- Privacy Resources Part 2 "List of 700+ Web3 Privacy Projects"
- Knowledge Check
- Module 1 extra materials
- History of Privacy Threats Part 1 "Bitcoin: History Through the Lens of Cypherpunk"
- History of Privacy Threats Part 2 "The Evolution of Privacy Threats"
- Privacy Threats in the Digital World Part 1 "Why Privacy Matters" (2:32)
- Privacy Threats in the Digital World Part 2 "Snowden on Cryptographic Threats"
- Privacy Threats in the Digital World Part 3 "Threat Modeling Basics"
- Web2 data breaches and lessons learned Part 1 "History of the Cambridge Analytica Controversy"
- Web2 data breaches and lessons learned Part 2 "Equifax Data Breach Explained: A Case Study"
- Web2 data breaches and lessons learned Part 3 "Interactive map of data breaches"
- Web2 data breaches and lessons learned Part 4 "Case Study"
- Evolution of Surveillance in Web3 Part 1 "In the Face of AI-Powered Surveillance"
- Evolution of Surveillance in Web3 Part 2 "The Next Threat to Speech" (4:02)
- Identifying Privacy Threats Part 1 "Why Privacy Matters" (1:48)
- Identifying Privacy Threats Part 2 "Identifying Major Attack Types"
- Identifying Privacy Threats Part 3 "Threat Modeling in Web3"
- Analyzing Privacy Violations Part 1 "Types of Privacy Violations and Their Impact"
- Analyzing Privacy Violations Part 2 "Type of threat actors"
- Analyzing Privacy Violations Part 3 “Module 2 Glossary”
- Knowledge Check
- Module 2 extra materials
- Privacy Protection Systems Part 1 "Data Protection Systems in Web3"
- Privacy Protection Systems Part 2 “Technologies for Privacy in Web3”
- Protecting Cryptocurrency Data Part 1 "Privacy Coins 101: Anonymity-Enhanced Cryptocurrencies"
- Protecting Cryptocurrency Data Part 2 "Privacy Coins Explained"
- Protecting Personal Data Part 1 "Metadata Protection in the Digital World"
- Protecting Personal Data Part 2 "Frameworks for Data and Privacy Protection"
- Ethics in Privacy Part 1 "Why Privacy Matters" (1:42)
- Ethics in Privacy Part 2 "Ethics in Big Data and Privacy"
- Ethics in Privacy Part 3 "Ethical Challenges in Web3 Development"
- Adopting a Privacy Framework
- Analyzing Privacy Threats Part 1 "How to Model Threats Correctly"
- Analyzing Privacy Threats Part 2 "Global Privacy Breaches and Their Impact"
- Analyzing Privacy Threats Part 3 "Module 3 Glossary”"
- Knowledge Check
- Module 3 extra materials
- Essential Privacy Tools Part 1 "Best Privacy Tools in Web3"
- Essential Privacy Tools Part 2 "Top Privacy-Enhancing Tools in Web3"
- Essential Privacy Tools Part 3 "Web3 Privacy Protecting Tools"
- Decentralized Communication Tools Part 1 "The Future of Business Communication: Decentralized, Secure, and Efficient"
- Decentralized Communication Tools Part 2 "Privacy-Respecting Messaging Apps"
- Privacy-Focused Browsing Part 1 "Introduction to Private Browsers"
- Privacy-Focused Browsing Part 2 "Age of Surveillance Capitalism"
- Open-Source Privacy Tools Part 1 "Open Source in Web3"
- Open-Source Privacy Tools Part 2 "Use Open-Source Technologies"
- Evaluating Privacy in Web3 Projects "Guide to Analyzing Privacy in Web3"
- Wrapping Up the Course Part 1 "How to Restore Your Privacy Freedom"
- Wrapping Up the Course Part 2 "Module 4 Glossary"
- Module Quiz
- Wrapping Up the Course Part 3 "Conclusion: Why Privacy Matters & Next Steps"
- Final Test
- Module 4 extra materials
What you will learn
This isn't your typical course on data protection; it's a deep dive into understanding how blockchain technologies, smart contracts, and cryptocurrencies can be leveraged to create a more private, secure web experience.
From the underlying principles of decentralized identity to the nuts and bolts of zero-knowledge proofs, you'll become adept at not just navigating, but also shaping the landscape of online privacy.