Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Privacy 101
Module 1: Introduction to Privacy (7 Days)
Course intro (0:49)
What is Privacy? - Part 1: “Who's Watching Us: Why Privacy Matters”
What is Privacy? - Part 2: “The Significance of Privacy in Web3”
Privacy Fundamentals - "The Core of Crypto Is Punks and Principles"
Activism and Privacy - Part 1 "Privacy as a Universal Right"
Activism and Privacy - Part 2: "Voices of Courage"
The Role of Cypherpunks in Privacy Protection - Part 1: "A Brief History of Cypherpunks"
The Role of Cypherpunks in Privacy Protection - Part 2: "The Cypherpunk Manifesto"
The Role of Cypherpunks in Privacy Protection - Part 3: "Revitalizing Cypherpunk Principles in Ethereum and Beyond"
Privacy in Cryptocurrency - Part 1: "Why Cryptocurrency Needs Privacy"
Privacy in Cryptocurrency - Part 2: "How Cryptocurrency Promotes Privacy"
Module 1 Glossary
Privacy Resources - "List of 700+ Web3 Privacy Projects"
Knowledge Check
Module 1 extra materials
Module 2: Evolution of Privacy Threats (7 Days)
History of Privacy Threats - Part 1: "Bitcoin: History Through the Lens of Cypherpunk"
History of Privacy Threats - Part 2: "The Evolution of Privacy Threats"
Privacy Threats in the Digital World - Part 1: "Why Privacy Matters" (2:32)
Privacy Threats in the Digital World - Part 2: "Snowden on Cryptographic Threats"
Privacy Threats in the Digital World - Part 3: "Threat Modeling Basics"
Web2 data breaches and lessons learned - Part 1: "History of the Cambridge Analytica Controversy"
Web2 data breaches and lessons learned - Part 2: "Interactive map of data breaches"
Web2 data breaches and lessons learned - Part 3: "Case Study"
Evolution of Surveillance in Web3 - Part 1: "In the Face of AI-Powered Surveillance"
Evolution of Surveillance in Web3 - Part 2: "The Next Threat to Speech" (4:02)
Identifying Privacy Threats - Part 1: "Why Privacy Matters" (1:48)
Identifying Privacy Threats - Part 2: "Identifying Major Attack Types"
Identifying Privacy Threats - Part 3: "Threat Modeling in Web3"
Analyzing Privacy Violations - Part 1: "Types of Privacy Violations and Their Impact"
Analyzing Privacy Violations - Part 2: "Type of threat actors"
Module 2 Glossary
Knowledge Check
Module 2 extra materials
Module 3: Privacy Protection Strategies (7 Days)
Privacy Protection Systems - Part 1: "Data Protection Systems in Web3"
Privacy Protection Systems - Part 2: “Technologies for Privacy in Web3”
Protecting Cryptocurrency Data - Part 1: "Privacy Coins 101: Anonymity-Enhanced Cryptocurrencies"
Protecting Cryptocurrency Data - Part 2: "Privacy Coins Explained"
Protecting Personal Data - Part 1: "Metadata Protection in the Digital World"
Protecting Personal Data - Part 2: "Frameworks for Data and Privacy Protection"
Ethics in Privacy - Part 1: "Why Privacy Matters" (1:42)
Ethics in Privacy - Part 2: "Ethics in Big Data and Privacy"
Ethics in Privacy - Part 3: "Ethical Challenges in Web3 Development"
Adopting a Privacy Framework
Analyzing Privacy Threats - Part 1: "How to Model Threats Correctly"
Analyzing Privacy Threats - Part 2: "Global Privacy Breaches and Their Impact"
Module 3 Glossary
Knowledge Check
Module 3 Extra Materials
Module 4: Privacy Tools and Techniques (8 Days)
Essential Privacy Tools Part 1 "Best Privacy Tools in Web3"
Essential Privacy Tools Part 2 "Top Privacy-Enhancing Tools in Web3"
Essential Privacy Tools Part 3 "Web3 Privacy Protecting Tools"
Decentralized Communication Tools Part 1 "The Future of Business Communication: Decentralized, Secure, and Efficient"
Decentralized Communication Tools Part 2 "Privacy-Respecting Messaging Apps"
Privacy-Focused Browsing Part 1 "Introduction to Private Browsers"
Privacy-Focused Browsing Part 2 "Age of Surveillance Capitalism"
Open-Source Privacy Tools Part 1 "Open Source in Web3"
Open-Source Privacy Tools Part 2 "Use Open-Source Technologies"
Evaluating Privacy in Web3 Projects "Guide to Analyzing Privacy in Web3"
Wrapping Up the Course: "How to Restore Your Privacy Freedom"
Module 4 Glossary
Module Quiz
Final Test
Module 4 extra materials
Wrapping Up the Course Part 3 "Conclusion: Why Privacy Matters & Next Steps"
Teach online with
Essential Privacy Tools Part 2 "Top Privacy-Enhancing Tools in Web3"
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock