Web3 Privacy Basics Course
Module 1: Introduction to Privacy (7 Days)
Day 1: What is Privacy?
• Video: “Welcome to the Privacy Course” (1 min): An inspiring video featuring KOLs discussing the importance of privacy.
• Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 0:00–1:49)It addresses the general topic of what privacy is, why it is important, and touches on the basics of privacy interference.
https://www.youtube.com/watch?v=pcSlowAhvUk
• Reading: “The Significance of Privacy in Web3” (5 mins)
https://cointelegraph.com/learn/articles/the-significance-of-privacy-in-web3
• Reading: "The Core of Crypto Is Punks and Principles"
https://mirror.xyz/yarak.eth/Mj6cCdR74K96AIrz3RTgANCB1L3W9jGvCwJYVO1wCfE
Day 2: Privacy Fundamentals
• Video: “The Ethereum Transition to Cypherpunk” (3:30 mins)
https://youtu.be/EzgN0xEDXow
• Reading: "The Core of Crypto Is Punks and Principles"
https://mirror.xyz/yarak.eth/Mj6cCdR74K96AIrz3RTgANCB1L3W9jGvCwJYVO1wCfE
Day 3: Activism and Privacy
• Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 6:41–7:36 - “we change our behavior when being watched”) The fundamental principles of why privacy is important for the protection of freedom of speech and activism are mentioned.
https://www.youtube.com/watch?v=pcSlowAhvUk
• Video: “Privacy as a Human Right” (3 mins)
https://youtu.be/p4oOrMejI3k
• Interview: “Edward Snowden on Privacy Rights” (13 mins)
https://youtu.be/0hLjuVyIIrs
Day 4: The Role of Cypherpunks in Privacy Protection
• Video: “Cypherpunk History in 2 Minutes” (2 mins)
https://youtu.be/sqL1ms9sYEI
• Reading: “A 5 Step Guide to Make Ethereum—and Crypto—Cypherpunk Again” (5 mins)
https://mirror.xyz/0x0f1F3DAf416B74DB3DE55Eb4D7513a80F4841073/rLjHO6TzGQZ7rmg6-nKG0HNr8ovjJExhRxagqk--yis
• Extre Reading: “Cypherpunk Manifesto” (5 mins)
https://www.activism.net/cypherpunk/manifesto.html
Day 5: Privacy in Cryptocurrency
• Video: “Why Cryptocurrency Needs Privacy” (1:30 mins)
https://youtu.be/tTXA3-Gtd4E
• Reading: “How Cryptocurrency Promotes Privacy” (8 mins)
https://blog.ueex.com/solving-the-dilemma-privacy-vs-transparency-in-crypto/
Day 6: Privacy Resources
• Reading: “Glossary of Key Privacy Terms” (10 mins)
https://nakamotoinstitute.org/library/crypto-glossary/
https://www.bitcoinlayers.org/glossary
• Reading: “List of 700+ Web3 Privacy Projects” (10 mins)
https://github.com/web3privacy/web3privacy/blob/main/README.md#contents
Day 7: Knowledge Check
• Quiz: “Privacy Fundamentals” (10 mins): A custom quiz based on the module content.
Bonus Materials for Module 1
Module 1 extra materials
• Video: “On Surveillance” (30 mins)
https://www.youtube.com/watch?v=7V66HWx76Nc
• Workshop: “Privacy Workshop” (30 mins)
https://youtu.be/iukzbf95qGk
• Reading: “The Role of Cypherpunks in Modern Privacy” (12 mins)
https://vitalik.eth.limo/general/2023/12/28/cypherpunk.html
Module 2: Evolution of Privacy Threats (7 Days)
Day 1: History of Privacy Threats
• Video: “Bitcoin: History Through the Lens of Cypherpunk” (8 mins)
https://youtu.be/abKev1nIe6c
• Reading: “The Evolution of Privacy Threats” (10 mins)
https://theconversation.com/your-sense-of-privacy-evolved-over-millennia-that-puts-you-at-risk-today-but-could-improve-technology-tomorrow-175474
Day 2: Privacy Threats in the Digital World
• Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 1:23–3:55) Demonstrates how mass surveillance is used by governments and corporations and why it is a threat.
https://www.youtube.com/watch?v=pcSlowAhvUk
• Video: “Snowden on Cryptographic Threats” (9 mins)
https://youtu.be/OPd9NcyIuy0
• Reading: “Threat Modeling Basics” (5 mins)
https://www.privacyguides.org/en/basics/threat-modeling/
Day 3 Web2 data breaches and lessons learned
Reading: History of the Cambridge Analytica Controversy (5 mins)
https://bipartisanpolicy.org/blog/cambridge-analytica-controversy/
Reading: Equifax Data Breach Explained: A Case Study (5 mins)
https://www.breachsense.com/blog/equifax-data-breach/
Reading: Interactive map of data breaches (5 mins)
https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
• Case Study:
1. Tracking US Soldiers in Germany
Article: “How Phone Data Tracks US Soldiers and Spies in Germany”
https://www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/
Key Insight: Over 3 billion phone data points reveal military movements, highlighting vulnerabilities.
2. Chinese Surveillance State Selling Citizen Data
Article: “Chinese Surveillance State Selling Data”
https://www.wired.com/story/chinese-surveillance-state-is-selling-citizens-data-as-a-side-hustle/
Key Insight: Government officials sell surveillance data on the black market, showcasing systemic flaws.
Day 4 Evolution of Surveillance in Web3
In the face of AI-powered surveillance, we need decentralized confidential computing
https://cryptoslate.com/in-the-face-of-ai-powered-surveillance-we-need-decentralized-confidential-computing/
Video: Edward Snowden - The Next Threat to Speech - TOKEN2049 Singapore 2024 (3.49-7.50)
https://youtu.be/XD-XU6Y3TfA?si=e73l5r5k-BrE6Iqp
Day 5: Identifying Privacy Threats
• Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 7:08–8:49) Mapping Privacy Threats: From Surveillance to Social Control
https://www.youtube.com/watch?v=pcSlowAhvUk
• Reading: “Identifying Major Attack Types” (8 mins)
https://linddun.org/threat-types/
• Video: “Threat Modeling in Web3” (7 mins)
https://youtu.be/VlYjtWg4Thw
Day 6: Analyzing Privacy Violations
• Reading: “Types of Privacy Violations and Their Impact” (10 mins)
https://www.pewresearch.org/internet/2023/10/18/views-of-data-privacy-risks-personal-data-and-digital-privacy-laws/
Reading “Types of Privacy Violations and Their Impact ”
https://docs.google.com/document/d/1mzNKemBLxXnJP4Mljo3bBdcWU8JdZ2mkU3g8WQdhzYw/edit?usp=sharing
Reading. “type of threat actors ” (10 mins)
Based on : “Understanding attackers” Coursera lesson
https://docs.google.com/document/d/1XfLxYUjdKqpathuKSbNroNQihgnKzX-Ohh5M_uEIOnI/edit?usp=sharing
• Reading: “Glossary of Key Privacy Terms” (5 mins)
https://clym.io/documentation-glossary
Day 7: Knowledge Check
• Quiz: “Evolution of Privacy Threats” (10 mins): A custom test based on the module content.
Bonus Materials for Module 2
Podcast: Edward Snowden: Why Privacy Matters in the Digital Age (16 mins)
https://www.kuow.org/stories/edward-snowden-why-does-online-privacy-matter
Shipyard Academy - Lecture 5 : Privacy, the big picture with CSO Jaya Brekke
https://youtu.be/7KVLGIukBEA?si=vvtPY8pldgVv-Bjb
Module 3: Privacy Protection Strategies (7 Days)
Day 1: Privacy Protection Systems
• Reading: “Data Protection Systems in Web3” (10 mins)
https://blockapps.net/blog/enhancing-digital-security-and-user-privacy-with-web3/
• Reading: “Technologies for Privacy in Web3” (10 mins)
https://coingeek.com/blockchain101/blockchain-and-data-privacy-in-the-web3-era-how-to-secure-and-protect-your-data/
Day 2: Protecting Cryptocurrency Data
• Video: “5 Tools to Protect Crypto Privacy” (6 mins, start at 1:30)
https://youtu.be/tTXA3-Gtd4E
• Reading: “Privacy vs Transparency in Cryptocurrencies” (8 mins)
https://blog.ueex.com/solving-the-dilemma-privacy-vs-transparency-in-crypto/
Day 3: Protecting Personal Data
• Video: “Metadata Protection in the Digital World” (8 mins)
https://youtu.be/QBX5AK3DXqw
• Reading: “Frameworks for Data and Privacy Protection” (10 mins)
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/a-guide-to-selecting-and-adopting-a-privacy-framework
Day 4: Ethics in Privacy
• Video: “Glenn Greenwald: Why Privacy Matters” (20:41 mins, segment 13:17–14:48) The video touches on the ethical aspects of privacy, including its importance for a democratic society.
https://www.youtube.com/watch?v=pcSlowAhvUk
• Video: “Ethics in Big Data and Privacy” (10 mins)
https://www.youtube.com/watch?v=KJmqiwNjfMI
• Reading: “Ethical Challenges in Web3 Development” (8 mins)
https://www.quora.com/What-are-the-ethical-considerations-in-Web3-development-especially-regarding-data-privacy-and-user-consent#:~:text=Users%20should%20understand%20the%20implications
Day 5: Adopting a Privacy Framework
• Reading: “A Four-Step Approach to Adopting a Privacy Framework” (5 mins)
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/a-four-step-approach-to-adopting-a-privacy-framework
Day 6: Analyzing Privacy Threats
• Video: ‘How to model threats correctly’ (10 min)
https://www.youtube.com/watch?v=DHZRhboZhfI
• Reading: “Global Privacy Breaches and Their Impact” (8 mins)
https://www.pewresearch.org/internet/2023/10/18/views-of-data-privacy-risks-personal-data-and-digital-privacy-laws/
Day 7: Knowledge Check
• Quiz: “Frameworks and Strategies for Privacy Protection” (10 mins): A custom quiz based on the module content.
Bonus Materials for Module 3
Module 3 extra material
• Video: “Bitcoin Privacy by Snowden” (30 mins)
https://youtu.be/f3NBhSXtE5g
Rachel Rose O'Leary - Rise, Anon: Lunarpunk and Memetic Warfare [Autonomous Ecologies #2]
https://youtu.be/KChN9v7dTzc?si=YnQfOGxbxjni6TuJ
Add a book here
Module 4: Privacy Tools and Techniques (8 Days)
Day 1: Essential Privacy Tools
• Reading: “Best Privacy Tools in Web3” (10 mins)
https://hackyourmom.com/en/pryvatnist/rekomendovanyj-soft-dlya-pidvyshhennya-pryvatnosti-2/
• Reading: “Top Privacy-Enhancing Tools in Web3” (10 mins)
https://medium.com/coinmonks/top-10-web3-privacy-enhancement-tools-and-protocols-protecting-user-privacy-in-a-decentralized-ee2e68976d63
Reading: “Web3 Privacy Protecting Tools” (10 mins)
https://www.perplexity.ai/search/web3-privacy-protecting-tools-99J8.PdaSPukHOP8Ja2CoA#0
Day 2: Decentralized Communication Tools
• Video: “The Future of Business Communication: Decentralized, Secure, and Efficient” (1min)
https://www.youtube.com/watch?v=asQ9fnSE3zc
• Reading: “Privacy-Respecting Messaging Apps” (8 mins)
https://www.privacyguides.org/en/tools/#messaging
Day 3: Privacy-Focused Browsing
• Reading: “Introduction to Private Browsers” (10 mins)
https://hackyourmom.com/en/kibervijna/oglyad-anonimnyh-brauzeriv-dlya-pryvatnogo-serfingu/
• Video: “Age of Surveillance Capitalism” (8 mins)
https://youtu.be/Vo6K-bPh39M
Day 4: Open-Source Privacy Tools
• Reading: “Overview of Open-Source Tools for Privacy” (10 mins)
https://www.privacyguides.org/en/tools/
• Video: “Open Source in Web3” (4 mins)
https://youtu.be/hhcQCdz_Kl0
Video: Use Open-Source Technologies | Franzi x Department of Decentralization [ETHBerlin] (1min)
https://www.youtube.com/watch?feature=shared&v=Sr72VSjoOWw
Day 5: Evaluating Privacy in Web3 Projects
• Reading: “Guide to Analyzing Privacy in Web3” (10 mins)
https://mirror.xyz/0x0f1F3DAf416B74DB3DE55Eb4D7513a80F4841073/90XEXa7AG_qc-VgYKs40i88xB1HF97gr1zqb-qvnif0
Day 6: Wrapping Up the Course
• Reading: “How to Find and Engage with Privacy Communities” (5 mins)
https://restoreprivacy.com/privacy-tools/
• Video: “Conclusion: Why Privacy Matters & Next Steps” (4 mins) OUR Video
Day 7: Module Quiz
• Quiz: “Tools and Technologies for Privacy Protection” (10 mins): A custom quiz based on module content.
Day 8: Final Test
• Test: “Comprehensive Privacy Knowledge Test” (15 mins): A final test covering all course modules.
Bonus Materials for Module 4
• Video: “How to Become Anonymous” (30 mins)
https://youtu.be/a1i-3xwcSGA
• Video: “Edward Snowden at Web3 Summit 2019” (60 mins)
https://youtu.be/pXksLYW4380
Recommended readings for intro module
• https://www.freehaven.net/anonbib/
• https://www.amazon.com/Privacy-Hard-Seven-Other-Myths/dp/0262045826
• Book 3
get 5 books from here https://github.com/web3privacy/cypherpunkacademy/tree/main/Books