Mitigating Risk While Complying With Data Retention Laws

Mitigating Risk While Complying With Data Retention Laws

Association for Computing Machinery (ACM) via YouTube Direct link

How the Encryption Happens

6 of 11

6 of 11

How the Encryption Happens

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Mitigating Risk While Complying With Data Retention Laws

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Unpacking the Title
  3. 3 "Obvious" Solutions
  4. 4 Adversarial Cases
  5. 5 Dragchute Escrow - High Level
  6. 6 How the Encryption Happens
  7. 7 Lock - Creating the Time Window
  8. 8 Unlocking Data
  9. 9 Enabling Proofs of Compliance
  10. 10 Locking and Attesting
  11. 11 Lock Performance Comparison

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.