Information Privacy with Applications (Fall 2018): Difference between revisions
Jump to navigation
Jump to search
(→Readings not linked in the syllabus: Added Hursthouse) |
(→Assignments: Added assignment 3 (threat modeling)) |
||
| Line 46: | Line 46: | ||
[[:File:Esoc_488_Privacy_Technology_Assignment_2.pdf|Assignment 2: Watchfulness]] | [[:File:Esoc_488_Privacy_Technology_Assignment_2.pdf|Assignment 2: Watchfulness]] | ||
===Assignment 2: Watchfulness=== | |||
''Due Tuesday, 02 October 2018, by 11:59 PM (MST).'' | |||
[[:File:Esoc_488_Privacy_Technology_Assignment_3.pdf|Assignment 3: Threat Modeling]] | |||
== Class Sessions == | == Class Sessions == | ||
Revision as of 20:11, 25 September 2018
Quick Information
| Instructor: | David Sidi |
| Office Location: | HARV 456 / HARV 454 |
| Office Hours: | Fridays at 10:30 AM |
| Telephone: | (520) 621-5703 |
| Email: | dsidi@email.arizona.edu |
| PGP Fingerprint: | 9FB6 167B D4BD 44FE 90F7 51D0 87B6 0D65 3A14 517D |
| Home page: | https://u.arizona.edu/~dsidi/ |
| Live question tool: | https://sidiprojects.us/live_questions |
| Grades: | https://d2l.arizona.edu/ |
More information is in the syllabus
Assignments
Write-ups
There is a write-up due before class on any day in which we have a visiting speaker.
Assignment 0: Quick exercises in the shell
There is no deadline for this assignment, as it will not be turned in for a grade, but you should try to get it done in the next day or two.
Assignment 0 - A few quick exercises in the shell, to get used to things.
Assignment 1: Permissions
Due Tuesday, 28 August 2018, by 11:59 PM (MST).
Assignment 1: Permissions challenge - Find the mistake on the server that allows you to defeat the permissions keeping you from reading the file named 'SECRET.'
Assignment 2: Watchfulness
Due Tuesday, 18 September 2018, by 11:59 PM (MST).
Assignment 2: Watchfulness
Due Tuesday, 02 October 2018, by 11:59 PM (MST).
Class Sessions
Why care about privacy?
Lectures
- Lecture 1: Course introduction
- Lecture 2: Consumer Privacy I
- Lecture 3: Consumer Privacy II
- Lecture 4: Citizen Privacy I (guest)
- Lecture 5: Citizen Privacy II
- Lecture 6: Citizen Privacy III
- Lecture 7: Ethics I
- Lecture 8: Ethics II (guest)
Readings not linked in the syllabus
- Hursthouse, 'Environmental Ethics'
- Snowden, 'Statement at the Moscow Airport'
- Stephens-Davidowitz, Everybody lies (excerpt)
- Pasquale, The Black Box Society (excerpt)
- Brandimarte, Does Government Surveillance Give Twitter the Chills? (excerpt)
- Greenwald, No Place to Hide (excerpt)
Other things mentioned in class
- Recent news that Google tracking of your location continues in surprising ways even after you try to turn it off
- More on the RockYou password breach (old)
- Preparation for implementing some cryptographic primitives in Python
- MIT researchers with a good sense of humor -- $250K network analyzer used to look into the efficacy of aluminum hats in attenuating radio frequencies entering and exiting the head. (Crackpots have long wondered about mind control using radio signals).