Privacy-preserving Approaches to Transparency Logs

Privacy-preserving Approaches to Transparency Logs

Linux Foundation via YouTube Direct link

Guiding principles

13 of 21

13 of 21

Guiding principles

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Privacy-preserving Approaches to Transparency Logs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Hash Functions
  3. 3 Merkle Trees - Inclusion
  4. 4 Transparency Logs - Consistency
  5. 5 Witnessing - Split View Attack
  6. 6 Witnessing - Gossiping
  7. 7 Monitoring
  8. 8 Certificate Transparency
  9. 9 Binary Transparency - Sigstore
  10. 10 Key Transparency
  11. 11 Goals of Privacy Law
  12. 12 Transparency Logs & Privacy
  13. 13 Guiding principles
  14. 14 Destructive - Deleting entries from log
  15. 15 Destructive - Removing log
  16. 16 Prevent - Appropriate checks
  17. 17 Prevent - Pseudonymity
  18. 18 Log Frontend Blocks Requests
  19. 19 Move Sensitive Data Out of Log
  20. 20 Keep Log Operator Accountable
  21. 21 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.