Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Privacy 101
Module 1: Introduction to Privacy (7 Days)
Course intro (0:49)
What is Privacy? Part 1 “Glenn Greenwald: Why Privacy Matters” (1:49)
What is Privacy? Part 2 “The Significance of Privacy in Web3”
Privacy Fundamentals Part 1 "The Ethereum Transition to Cypherpunk" (3:31)
Privacy Fundamentals Part 2"The Core of Crypto Is Punks and Principles"
Activism and Privacy Part 1 "Why Privacy Matters for Activism" (0:54)
Activism and Privacy Part 2 "Privacy as a Universal Right"
Activism and Privacy Part 3 "Voices of Courage"
The Role of Cypherpunks in Privacy Protection Part 1 "A Brief History of Cypherpunks"
The Role of Cypherpunks in Privacy Protection Part 2 "Revitalizing Cypherpunk Principles in Ethereum and Beyond"
The Role of Cypherpunks in Privacy Protection Part 3 "The Cypherpunk Manifesto"
Privacy in Cryptocurrency Part 1 "Why Cryptocurrency Needs Privacy"
Privacy in Cryptocurrency Part 2 "How Cryptocurrency Promotes Privacy"
Privacy Resources Part 1 "Module 1 Glossary"
Privacy Resources Part 2 "List of 700+ Web3 Privacy Projects"
Knowledge Check
Module 1 extra materials
Module 2: Evolution of Privacy Threats (7 Days)
History of Privacy Threats Part 1 "Bitcoin: History Through the Lens of Cypherpunk"
History of Privacy Threats Part 2 "The Evolution of Privacy Threats"
Privacy Threats in the Digital World Part 1 "Why Privacy Matters" (2:32)
Privacy Threats in the Digital World Part 2 "Snowden on Cryptographic Threats"
Privacy Threats in the Digital World Part 3 "Threat Modeling Basics"
Web2 data breaches and lessons learned Part 1 "History of the Cambridge Analytica Controversy"
Web2 data breaches and lessons learned Part 2 "Equifax Data Breach Explained: A Case Study"
Web2 data breaches and lessons learned Part 3 "Interactive map of data breaches"
Web2 data breaches and lessons learned Part 4 "Case Study"
Evolution of Surveillance in Web3 Part 1 "In the Face of AI-Powered Surveillance"
Evolution of Surveillance in Web3 Part 2 "The Next Threat to Speech" (4:02)
Identifying Privacy Threats Part 1 "Why Privacy Matters" (1:48)
Identifying Privacy Threats Part 2 "Identifying Major Attack Types"
Identifying Privacy Threats Part 3 "Threat Modeling in Web3"
Analyzing Privacy Violations Part 1 "Types of Privacy Violations and Their Impact"
Analyzing Privacy Violations Part 2 "Type of threat actors"
Analyzing Privacy Violations Part 3 “Module 2 Glossary”
Knowledge Check
Module 2 extra materials
Module 3: Privacy Protection Strategies (7 Days)
Privacy Protection Systems Part 1 "Data Protection Systems in Web3"
Privacy Protection Systems Part 2 “Technologies for Privacy in Web3”
Protecting Cryptocurrency Data Part 1 "Privacy Coins 101: Anonymity-Enhanced Cryptocurrencies"
Protecting Cryptocurrency Data Part 2 "Privacy Coins Explained"
Protecting Personal Data Part 1 "Metadata Protection in the Digital World"
Protecting Personal Data Part 2 "Frameworks for Data and Privacy Protection"
Ethics in Privacy Part 1 "Why Privacy Matters" (1:42)
Ethics in Privacy Part 2 "Ethics in Big Data and Privacy"
Ethics in Privacy Part 3 "Ethical Challenges in Web3 Development"
Adopting a Privacy Framework
Analyzing Privacy Threats Part 1 "How to Model Threats Correctly"
Analyzing Privacy Threats Part 2 "Global Privacy Breaches and Their Impact"
Analyzing Privacy Threats Part 3 "Module 3 Glossary”"
Knowledge Check
Module 3 extra materials
Module 4: Privacy Tools and Techniques (8 Days)
Essential Privacy Tools Part 1 "Best Privacy Tools in Web3"
Essential Privacy Tools Part 2 "Top Privacy-Enhancing Tools in Web3"
Essential Privacy Tools Part 3 "Web3 Privacy Protecting Tools"
Decentralized Communication Tools Part 1 "The Future of Business Communication: Decentralized, Secure, and Efficient"
Decentralized Communication Tools Part 2 "Privacy-Respecting Messaging Apps"
Privacy-Focused Browsing Part 1 "Introduction to Private Browsers"
Privacy-Focused Browsing Part 2 "Age of Surveillance Capitalism"
Open-Source Privacy Tools Part 1 "Open Source in Web3"
Open-Source Privacy Tools Part 2 "Use Open-Source Technologies"
Evaluating Privacy in Web3 Projects "Guide to Analyzing Privacy in Web3"
Wrapping Up the Course Part 1 "How to Restore Your Privacy Freedom"
Wrapping Up the Course Part 2 "Module 4 Glossary"
Module Quiz
Wrapping Up the Course Part 3 "Conclusion: Why Privacy Matters & Next Steps"
Final Test
Module 4 extra materials
Teach online with
Protecting Personal Data Part 2 "Frameworks for Data and Privacy Protection"
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock