Information Privacy with Applications (Fall 2018): Difference between revisions
Jump to navigation
Jump to search
(→Lectures: added anonymity slides) |
(→Lectures: added anonymity lecture 2) |
||
| Line 108: | Line 108: | ||
====Lectures==== | ====Lectures==== | ||
* [[:File:Anonymity_background_I.pdf|Lecture 16: Anonymity networking background]] | * [[:File:Anonymity_background_I.pdf|Lecture 16: Anonymity networking background]] | ||
* [[:File:Anonymous_communication_II.pdf|Lecture 17: Anonymous communication I]] | |||
====Readings not linked in the syllabus==== | ====Readings not linked in the syllabus==== | ||
Revision as of 20:48, 25 October 2018
Quick Information
| Instructor: | David Sidi |
| Office Location: | HARV 456 / HARV 454 |
| Office Hours: | Fridays at 10:30 AM |
| Telephone: | (520) 621-5703 |
| Email: | dsidi@email.arizona.edu |
| PGP Fingerprint: | 9FB6 167B D4BD 44FE 90F7 51D0 87B6 0D65 3A14 517D |
| Home page: | https://u.arizona.edu/~dsidi/ |
| Live question tool: | https://sidiprojects.us/live_questions |
| Grades: | https://d2l.arizona.edu/ |
More information is in the syllabus
Assignments
Write-ups
There is a write-up due before class on any day in which we have a visiting speaker.
Assignment 0: Quick exercises in the shell
There is no deadline for this assignment, as it will not be turned in for a grade, but you should try to get it done in the next day or two.
Assignment 0 - A few quick exercises in the shell, to get used to things.
Assignment 1: Permissions
Due Tuesday, 28 August 2018, by 11:59 PM (MST).
Assignment 1: Permissions challenge
Assignment 2: Watchfulness
Due Tuesday, 18 September 2018, by 11:59 PM (MST).
Assignment 2: Scripting and cracking challenge
Assignment 3: Threat Modeling
Due Tuesday, 02 October 2018, by 11:59 PM (MST).
Assignment 4: "Trust me"
Due Tuesday, 18 October 2018, by 11:59 PM (MST).
Assignment 4: Delegated trust challenge (updated)
Class Sessions
Why care about privacy?
Lectures
- Lecture 1: Course introduction
- Lecture 2: Consumer Privacy I
- Lecture 3: Consumer Privacy II
- Lecture 4: Citizen Privacy I (guest)
- Lecture 5: Citizen Privacy II
- Lecture 6: Citizen Privacy III
- Lecture 7: Ethics I
- Lecture 8: Ethics II (guest)
Readings not linked in the syllabus
- Hursthouse, 'Environmental Ethics'
- Snowden, 'Statement at the Moscow Airport'
- Stephens-Davidowitz, Everybody lies (excerpt)
- Pasquale, The Black Box Society (excerpt)
- Brandimarte, Does Government Surveillance Give Twitter the Chills? (excerpt)
- Greenwald, No Place to Hide (excerpt)
Trust and Privacy
Lectures
- Lecture 9: Privacy and Trust, Threat modeling I
- Lecture 10: Privacy and Trust, Threat modeling II
- Lecture 11: Privacy and Trust III: PGP and the Web of Trust
- Lecture 12: Privacy and Trust IV
Readings not linked in the syllabus
- Thompson, 'Reflections on Trusting Trust'
- Wheeler, 'Countering Trusting Trust through Diverse Double-Compiling'
- Czeskis et al., 'DeadDrop/StrongBox Security Assessment'
The Landscape of Privacy Technologies
Lectures
- Lecture 13: Trust and the Landscape of Privacy Technologies -- Note: For those who learn better with some text to reflect on while listening,I am publishing "notes" slides from now on before class.
Readings not linked in the syllabus
- 'Why is obfuscation necessary?' and 'Core cases' in Obfuscation: a user's guide for privacy and protest
- Diaz and Gürses, 'Understanding the landscape of privacy technologies'
- Le Métayer, 'Whom to Trust? Using Technology to Enforce Privacy'
- Rawat et al., 'Practical Data Protection' - From the esteemed Journal of Craptology
Anonymity
Lectures
Readings not linked in the syllabus
Other things mentioned in class
- Recent news that Google tracking of your location continues in surprising ways even after you try to turn it off
- More on the RockYou password breach (old)
- Preparation for implementing some cryptographic primitives in Python
- MIT researchers with a good sense of humor -- $250K network analyzer used to look into the efficacy of aluminum hats in attenuating radio frequencies entering and exiting the head. (Crackpots have long wondered about mind control using radio signals).