Completed
Guiding principles
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Privacy-preserving Approaches to Transparency Logs
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Hash Functions
- 3 Merkle Trees - Inclusion
- 4 Transparency Logs - Consistency
- 5 Witnessing - Split View Attack
- 6 Witnessing - Gossiping
- 7 Monitoring
- 8 Certificate Transparency
- 9 Binary Transparency - Sigstore
- 10 Key Transparency
- 11 Goals of Privacy Law
- 12 Transparency Logs & Privacy
- 13 Guiding principles
- 14 Destructive - Deleting entries from log
- 15 Destructive - Removing log
- 16 Prevent - Appropriate checks
- 17 Prevent - Pseudonymity
- 18 Log Frontend Blocks Requests
- 19 Move Sensitive Data Out of Log
- 20 Keep Log Operator Accountable
- 21 Conclusion