Web3 Privacy Basics Course Module 1: Introduction to Privacy (7 Days) Day 1: What is Privacy? • Video: “Welcome to the Privacy Course” (1 min): An inspiring video featuring KOLs discussing the importance of privacy. • Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 0:00–1:49)It addresses the general topic of what privacy is, why it is important, and touches on the basics of privacy interference. https://www.youtube.com/watch?v=pcSlowAhvUk • Reading: “The Significance of Privacy in Web3” (5 mins) https://cointelegraph.com/learn/articles/the-significance-of-privacy-in-web3 • Reading: "The Core of Crypto Is Punks and Principles" https://mirror.xyz/yarak.eth/Mj6cCdR74K96AIrz3RTgANCB1L3W9jGvCwJYVO1wCfE Day 2: Privacy Fundamentals • Video: “The Ethereum Transition to Cypherpunk” (3:30 mins) https://youtu.be/EzgN0xEDXow • Reading: "The Core of Crypto Is Punks and Principles" https://mirror.xyz/yarak.eth/Mj6cCdR74K96AIrz3RTgANCB1L3W9jGvCwJYVO1wCfE Day 3: Activism and Privacy • Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 6:41–7:36 - “we change our behavior when being watched”) The fundamental principles of why privacy is important for the protection of freedom of speech and activism are mentioned. https://www.youtube.com/watch?v=pcSlowAhvUk • Video: “Privacy as a Human Right” (3 mins) https://youtu.be/p4oOrMejI3k • Interview: “Edward Snowden on Privacy Rights” (13 mins) https://youtu.be/0hLjuVyIIrs Day 4: The Role of Cypherpunks in Privacy Protection • Video: “Cypherpunk History in 2 Minutes” (2 mins) https://youtu.be/sqL1ms9sYEI • Reading: “A 5 Step Guide to Make Ethereum—and Crypto—Cypherpunk Again” (5 mins) https://mirror.xyz/0x0f1F3DAf416B74DB3DE55Eb4D7513a80F4841073/rLjHO6TzGQZ7rmg6-nKG0HNr8ovjJExhRxagqk--yis • Extre Reading: “Cypherpunk Manifesto” (5 mins) https://www.activism.net/cypherpunk/manifesto.html Day 5: Privacy in Cryptocurrency • Video: “Why Cryptocurrency Needs Privacy” (1:30 mins) https://youtu.be/tTXA3-Gtd4E • Reading: “How Cryptocurrency Promotes Privacy” (8 mins) https://blog.ueex.com/solving-the-dilemma-privacy-vs-transparency-in-crypto/ Day 6: Privacy Resources • Reading: “Glossary of Key Privacy Terms” (10 mins) https://nakamotoinstitute.org/library/crypto-glossary/ https://www.bitcoinlayers.org/glossary • Reading: “List of 700+ Web3 Privacy Projects” (10 mins) https://github.com/web3privacy/web3privacy/blob/main/README.md#contents Day 7: Knowledge Check • Quiz: “Privacy Fundamentals” (10 mins): A custom quiz based on the module content. Bonus Materials for Module 1 Module 1 extra materials • Video: “On Surveillance” (30 mins) https://www.youtube.com/watch?v=7V66HWx76Nc • Workshop: “Privacy Workshop” (30 mins) https://youtu.be/iukzbf95qGk • Reading: “The Role of Cypherpunks in Modern Privacy” (12 mins) https://vitalik.eth.limo/general/2023/12/28/cypherpunk.html Module 2: Evolution of Privacy Threats (7 Days) Day 1: History of Privacy Threats • Video: “Bitcoin: History Through the Lens of Cypherpunk” (8 mins) https://youtu.be/abKev1nIe6c • Reading: “The Evolution of Privacy Threats” (10 mins) https://theconversation.com/your-sense-of-privacy-evolved-over-millennia-that-puts-you-at-risk-today-but-could-improve-technology-tomorrow-175474 Day 2: Privacy Threats in the Digital World • Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 1:23–3:55) Demonstrates how mass surveillance is used by governments and corporations and why it is a threat. https://www.youtube.com/watch?v=pcSlowAhvUk • Video: “Snowden on Cryptographic Threats” (9 mins) https://youtu.be/OPd9NcyIuy0 • Reading: “Threat Modeling Basics” (5 mins) https://www.privacyguides.org/en/basics/threat-modeling/ Day 3 Web2 data breaches and lessons learned Reading: History of the Cambridge Analytica Controversy (5 mins) https://bipartisanpolicy.org/blog/cambridge-analytica-controversy/ Reading: Equifax Data Breach Explained: A Case Study (5 mins) https://www.breachsense.com/blog/equifax-data-breach/ Reading: Interactive map of data breaches (5 mins) https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ • Case Study: 1. Tracking US Soldiers in Germany Article: “How Phone Data Tracks US Soldiers and Spies in Germany” https://www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/ Key Insight: Over 3 billion phone data points reveal military movements, highlighting vulnerabilities. 2. Chinese Surveillance State Selling Citizen Data Article: “Chinese Surveillance State Selling Data” https://www.wired.com/story/chinese-surveillance-state-is-selling-citizens-data-as-a-side-hustle/ Key Insight: Government officials sell surveillance data on the black market, showcasing systemic flaws. Day 4 Evolution of Surveillance in Web3 In the face of AI-powered surveillance, we need decentralized confidential computing https://cryptoslate.com/in-the-face-of-ai-powered-surveillance-we-need-decentralized-confidential-computing/ Video: Edward Snowden - The Next Threat to Speech - TOKEN2049 Singapore 2024 (3.49-7.50) https://youtu.be/XD-XU6Y3TfA?si=e73l5r5k-BrE6Iqp Day 5: Identifying Privacy Threats • Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 7:08–8:49) Mapping Privacy Threats: From Surveillance to Social Control https://www.youtube.com/watch?v=pcSlowAhvUk • Reading: “Identifying Major Attack Types” (8 mins) https://linddun.org/threat-types/ • Video: “Threat Modeling in Web3” (7 mins) https://youtu.be/VlYjtWg4Thw Day 6: Analyzing Privacy Violations • Reading: “Types of Privacy Violations and Their Impact” (10 mins) https://www.pewresearch.org/internet/2023/10/18/views-of-data-privacy-risks-personal-data-and-digital-privacy-laws/ Reading “Types of Privacy Violations and Their Impact ” https://docs.google.com/document/d/1mzNKemBLxXnJP4Mljo3bBdcWU8JdZ2mkU3g8WQdhzYw/edit?usp=sharing Reading. “type of threat actors ” (10 mins) Based on : “Understanding attackers” Coursera lesson https://docs.google.com/document/d/1XfLxYUjdKqpathuKSbNroNQihgnKzX-Ohh5M_uEIOnI/edit?usp=sharing • Reading: “Glossary of Key Privacy Terms” (5 mins) https://clym.io/documentation-glossary Day 7: Knowledge Check • Quiz: “Evolution of Privacy Threats” (10 mins): A custom test based on the module content. Bonus Materials for Module 2 Podcast: Edward Snowden: Why Privacy Matters in the Digital Age (16 mins) https://www.kuow.org/stories/edward-snowden-why-does-online-privacy-matter Shipyard Academy - Lecture 5 : Privacy, the big picture with CSO Jaya Brekke https://youtu.be/7KVLGIukBEA?si=vvtPY8pldgVv-Bjb Module 3: Privacy Protection Strategies (7 Days) Day 1: Privacy Protection Systems • Reading: “Data Protection Systems in Web3” (10 mins) https://blockapps.net/blog/enhancing-digital-security-and-user-privacy-with-web3/ • Reading: “Technologies for Privacy in Web3” (10 mins) https://coingeek.com/blockchain101/blockchain-and-data-privacy-in-the-web3-era-how-to-secure-and-protect-your-data/ Day 2: Protecting Cryptocurrency Data • Video: “5 Tools to Protect Crypto Privacy” (6 mins, start at 1:30) https://youtu.be/tTXA3-Gtd4E • Reading: “Privacy vs Transparency in Cryptocurrencies” (8 mins) https://blog.ueex.com/solving-the-dilemma-privacy-vs-transparency-in-crypto/ Day 3: Protecting Personal Data • Video: “Metadata Protection in the Digital World” (8 mins) https://youtu.be/QBX5AK3DXqw • Reading: “Frameworks for Data and Privacy Protection” (10 mins) https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/a-guide-to-selecting-and-adopting-a-privacy-framework Day 4: Ethics in Privacy • Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 13:17–14:48) The video touches on the ethical aspects of privacy, including its importance for a democratic society. https://www.youtube.com/watch?v=pcSlowAhvUk • Video: “Ethics in Big Data and Privacy” (10 mins) https://www.youtube.com/watch?v=KJmqiwNjfMI • Reading: “Ethical Challenges in Web3 Development” (8 mins) https://www.quora.com/What-are-the-ethical-considerations-in-Web3-development-especially-regarding-data-privacy-and-user-consent#:~:text=Users%20should%20understand%20the%20implications Day 5: Adopting a Privacy Framework • Reading: “A Four-Step Approach to Adopting a Privacy Framework” (5 mins) https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/a-four-step-approach-to-adopting-a-privacy-framework Day 6: Analyzing Privacy Threats • Video: ‘How to model threats correctly’ (10 min) https://www.youtube.com/watch?v=DHZRhboZhfI • Reading: “Global Privacy Breaches and Their Impact” (8 mins) https://www.pewresearch.org/internet/2023/10/18/views-of-data-privacy-risks-personal-data-and-digital-privacy-laws/ Day 7: Knowledge Check • Quiz: “Frameworks and Strategies for Privacy Protection” (10 mins): A custom quiz based on the module content. Bonus Materials for Module 3 Module 3 extra material • Video: “Bitcoin Privacy by Snowden” (30 mins) https://youtu.be/f3NBhSXtE5g Rachel Rose O'Leary - Rise, Anon: Lunarpunk and Memetic Warfare [Autonomous Ecologies #2] https://youtu.be/KChN9v7dTzc?si=YnQfOGxbxjni6TuJ Add a book here Module 4: Privacy Tools and Techniques (8 Days) Day 1: Essential Privacy Tools • Reading: “Best Privacy Tools in Web3” (10 mins) https://hackyourmom.com/en/pryvatnist/rekomendovanyj-soft-dlya-pidvyshhennya-pryvatnosti-2/ • Reading: “Top Privacy-Enhancing Tools in Web3” (10 mins) https://medium.com/coinmonks/top-10-web3-privacy-enhancement-tools-and-protocols-protecting-user-privacy-in-a-decentralized-ee2e68976d63 Reading: “Web3 Privacy Protecting Tools” (10 mins) https://www.perplexity.ai/search/web3-privacy-protecting-tools-99J8.PdaSPukHOP8Ja2CoA#0 Day 2: Decentralized Communication Tools • Video: “The Future of Business Communication: Decentralized, Secure, and Efficient” (1min) https://www.youtube.com/watch?v=asQ9fnSE3zc • Reading: “Privacy-Respecting Messaging Apps” (8 mins) https://www.privacyguides.org/en/tools/#messaging Day 3: Privacy-Focused Browsing • Reading: “Introduction to Private Browsers” (10 mins) https://hackyourmom.com/en/kibervijna/oglyad-anonimnyh-brauzeriv-dlya-pryvatnogo-serfingu/ • Video: “Age of Surveillance Capitalism” (8 mins) https://youtu.be/Vo6K-bPh39M Day 4: Open-Source Privacy Tools • Reading: “Overview of Open-Source Tools for Privacy” (10 mins) https://www.privacyguides.org/en/tools/ • Video: “Open Source in Web3” (4 mins) https://youtu.be/hhcQCdz_Kl0 Video: Use Open-Source Technologies | Franzi x Department of Decentralization [ETHBerlin] (1min) https://www.youtube.com/watch?feature=shared&v=Sr72VSjoOWw Day 5: Evaluating Privacy in Web3 Projects • Reading: “Guide to Analyzing Privacy in Web3” (10 mins) https://mirror.xyz/0x0f1F3DAf416B74DB3DE55Eb4D7513a80F4841073/90XEXa7AG_qc-VgYKs40i88xB1HF97gr1zqb-qvnif0 Day 6: Wrapping Up the Course • Reading: “How to Find and Engage with Privacy Communities” (5 mins) https://restoreprivacy.com/privacy-tools/ • Video: “Conclusion: Why Privacy Matters & Next Steps” (4 mins) OUR Video Day 7: Module Quiz • Quiz: “Tools and Technologies for Privacy Protection” (10 mins): A custom quiz based on module content. Day 8: Final Test • Test: “Comprehensive Privacy Knowledge Test” (15 mins): A final test covering all course modules. Bonus Materials for Module 4 • Video: “How to Become Anonymous” (30 mins) https://youtu.be/a1i-3xwcSGA • Video: “Edward Snowden at Web3 Summit 2019” (60 mins) https://youtu.be/pXksLYW4380 Recommended readings for intro module • https://www.freehaven.net/anonbib/ • https://www.amazon.com/Privacy-Hard-Seven-Other-Myths/dp/0262045826 • Book 3 get 5 books from here https://github.com/web3privacy/cypherpunkacademy/tree/main/Books