Information Privacy with Applications (Fall 2018)
Contents
Quick Information
Instructor: | David Sidi |
Office Location: | HARV 456 / HARV 454 |
Office Hours: | Fridays at 10:30 AM |
Telephone: | (520) 621-5703 |
Email: | dsidi@email.arizona.edu |
PGP Fingerprint: | 9FB6 167B D4BD 44FE 90F7 51D0 87B6 0D65 3A14 517D |
Home page: | https://u.arizona.edu/~dsidi/ |
Live question tool: | https://sidiprojects.us/live_questions |
Grades: | https://d2l.arizona.edu/ |
More information is in the syllabus
Assignments
Write-ups
There is a write-up due before class on any day in which we have a visiting speaker.
- Writing assignments
- Diffie-Hellman Writing Assignment
- End of Trust Writing Assignment
- Final write up and presentation guidelines
Assignment 0: Quick exercises in the shell
There is no deadline for this assignment, as it will not be turned in for a grade, but you should try to get it done in the next day or two.
Assignment 0 - A few quick exercises in the shell, to get used to things.
Assignment 1: Permissions
Due Tuesday, 28 August 2018, by 11:59 PM (MST).
Assignment 1: Permissions challenge
Assignment 2: Watchfulness
Due Tuesday, 18 September 2018, by 11:59 PM (MST).
Assignment 2: Scripting and cracking challenge
Assignment 3: Threat Modeling
Due Tuesday, 02 October 2018, by 11:59 PM (MST).
Assignment 4: "Trust me"
Due Tuesday, 18 October 2018, by 11:59 PM (MST).
Assignment 4: Delegated trust challenge (updated)
Assignment 5: Anonymity
Due Tuesday, 18 October 2018, by 11:59 PM (MST).
Assignment 5: Working with Tor
Assignment 6: Layer 8+ Privacy
Due Tuesday, 27 November 2018, by 11:59 PM (MST).
Tutorial for working with OpenCV in the VM is here
Class Sessions
Why care about privacy?
Lectures
- Lecture 1: Course introduction
- Lecture 2: Consumer Privacy I
- Lecture 3: Consumer Privacy II
- Lecture 4: Citizen Privacy I (guest)
- Lecture 5: Citizen Privacy II
- Lecture 6: Citizen Privacy III
- Lecture 7: Ethics I
- Lecture 8: Ethics II (guest)
Readings not linked in the syllabus
- Hursthouse, 'Environmental Ethics'
- Snowden, 'Statement at the Moscow Airport'
- Stephens-Davidowitz, Everybody lies (excerpt)
- Pasquale, The Black Box Society (excerpt)
- Brandimarte, Does Government Surveillance Give Twitter the Chills? (excerpt)
- Greenwald, No Place to Hide (excerpt)
Trust and Privacy
Lectures
- Lecture 9: Privacy and Trust, Threat modeling I
- Lecture 10: Privacy and Trust, Threat modeling II
- Lecture 11: Privacy and Trust III: PGP and the Web of Trust
- Lecture 12: Privacy and Trust IV
Readings not linked in the syllabus
- Thompson, 'Reflections on Trusting Trust'
- Wheeler, 'Countering Trusting Trust through Diverse Double-Compiling'
- Czeskis et al., 'DeadDrop/StrongBox Security Assessment'
The Landscape of Privacy Technologies
Lectures
- Lecture 13: Trust and the Landscape of Privacy Technologies -- Note: For those who learn better with some text to reflect on while listening,I am publishing "notes" slides from now on before class.
Readings not linked in the syllabus
- 'Why is obfuscation necessary?' and 'Core cases' in Obfuscation: a user's guide for privacy and protest
- Diaz and Gürses, 'Understanding the landscape of privacy technologies'
- Le Métayer, 'Whom to Trust? Using Technology to Enforce Privacy'
- Rawat et al., 'Practical Data Protection' - From the esteemed Journal of Craptology
Anonymity
Lectures
- Lecture 16: Anonymity networking background
- Lecture 17: Anonymous communication I (Mixnets)
- Lecture 18: Anonymous communication II (Mixnets and Tor)
- Lecture 19: Anonymous communication III (Tor continued)
Readings not linked in the syllabus
- Guard sets for onion routing
- George Danezis and Claudia Diaz, 'A survey of anonymous communication channels'
- TCP/IP overview
Communications Privacy
Lectures
Readings not linked in the syllabus
- Useful links for some of the in-class work
- Whitfield Diffie and Martin E. Hellman, 'New Directions in Cryptography'
Layer 8+ Privacy
Lectures
- Lecture 23: Layer 8+ introduction
- Lecture 24: Biometrics and Face recognition
- Lecture 25: Analog Keyhole Problems
Readings not linked in the syllabus
Last Day
Lectures
Other things mentioned in class
- Recent news that Google tracking of your location continues in surprising ways even after you try to turn it off
- More on the RockYou password breach (old)
- Preparation for implementing some cryptographic primitives in Python
- MIT researchers with a good sense of humor -- $250K network analyzer used to look into the efficacy of aluminum hats in attenuating radio frequencies entering and exiting the head. (Crackpots have long wondered about mind control using radio signals).