Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Anonymity
YouTube
education
Showing:
28
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
TED
The Psychology of Evil - Understanding and Challenging Human Behavior
0
rewiews
Explore the nature of evil, its psychological roots, and the potential for heroism in this thought-provoking talk by Philip Zimbardo, drawing insights from famous experiments and real-world events.
Add to list
17
Lesons
23 minutes
On-Demand
Free-Video
IEEE
Privacy and Access Control for Outsourced Personal Records
0
rewiews
Cryptographic system GORAM protects outsourced data secrecy, integrity, and access control while ensuring anonymity and unlinkability, addressing cloud storage security concerns for sensitive applications.
Add to list
5
Lesons
18 minutes
On-Demand
Free-Video
TheIACR
Threshold Ring Signatures: New Definitions and Post-Quantum Security
0
rewiews
Explore threshold ring signatures, including new definitions and post-quantum security. Learn about passive adversaries, hardness assumptions, and proof techniques in the post-quantum setting.
Add to list
20
Lesons
24 minutes
On-Demand
Free-Video
OWASP Foundation
Privacy vs Security Intricacies - Balancing Expectations and Realities
0
rewiews
Explore the complex relationship between privacy and security, examining their definitions, societal impacts, and technological implications in the digital age.
Add to list
27
Lesons
44 minutes
On-Demand
Free-Video
HackerSploit
How to Fully Anonymize Kali Linux Using Whonix
0
rewiews
Learn to enhance Kali Linux's anonymity using Whonix, a secure operating system that routes all traffic through Tor. Discover setup, configuration, and best practices for maximum privacy and security.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
DevConf
Preserving Anonymity in Data Collection - The Story of Differential Privacy
0
rewiews
Explore differential privacy techniques for collecting user data while preserving anonymity. Learn key concepts, historical development, and potential applications in software telemetry.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
media.ccc.de
Digital Identity and Digital Euro - EU Proposals for Online Identification and Currency
0
rewiews
Explore EU proposals for digital identity wallets and digital euro, examining potential impacts on online anonymity, privacy, and digital rights. Learn about ongoing negotiations and ways to engage.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
TheIACR
Tor and Circumvention: Lessons Learned, by Roger Dingledine
0
rewiews
Explore Tor's anonymity network, its importance for various user groups, and challenges in maintaining privacy online. Learn about Tor's design, potential threats, and ongoing efforts to improve circumvention techniques.
Add to list
21
Lesons
1 hour 8 minutes
On-Demand
Free-Video
TheIACR
Anonymity, Verifiability, and Robustness in Cryptography - TCC 2022 Session
0
rewiews
Explore cutting-edge research on anonymity, verifiability, and robustness in cryptography at this Theory of Cryptography Conference session.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
TheIACR
Anonymity Surveillance and Tampering - TCC 2023
0
rewiews
Explore cutting-edge research on anonymity, surveillance, and tampering in cryptography at this TCC 2023 session, chaired by Manoj Prabhakaran.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
TheIACR
Anonymity in Cryptography - Session 1, Talk 1
0
rewiews
Explore cutting-edge research on anonymity in cryptography at Asiacrypt 2023. This session features the first of four talks, offering insights into the latest developments in the field.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Introduction to Darknets - Tor and I2P
0
rewiews
Explore anonymous networks Tor and I2P, learn setup, usage, and hidden services. Analyze real-world cases to understand security risks and best practices for maintaining anonymity online.
Add to list
1
Lesons
2 hours 59 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Malicious Contracts
0
rewiews
Explore the potential of smart contracts as anonymous rootkit C2 infrastructure, demonstrating their immutability, anonymity, and scalability for controlling infected devices remotely.
Add to list
8
Lesons
29 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Privacidad, Intimidad, Anonimato - ¿estamos perdiendo?
0
rewiews
Análisis profundo sobre la pérdida de privacidad, intimidad y anonimato en la era digital, explorando sus implicaciones y posibles soluciones para proteger nuestros datos personales.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Security in the Wild for Low-Profile Activists - Zeynep Tufekci - USENIX Enigma Conference - 2017
0
rewiews
Insights into digital security challenges faced by low-profile activists, exploring their unique needs, behaviors, and concerns in various global contexts.
Add to list
15
Lesons
22 minutes
On-Demand
Free-Video
Docker
How Docker Containers Can Be Used to Spawn Onion Services
0
rewiews
Learn to securely spawn Tor onion services using Docker containers, exploring encryption, network architecture, and practical implementation techniques.
Add to list
11
Lesons
21 minutes
On-Demand
Free-Video
nullcon
Pretty Easy Privacy - Making Privacy The Default For Everyone
0
rewiews
Explore p≡p's innovative approach to automating digital privacy, making end-to-end encryption and anonymity the default for everyone, regardless of technical expertise.
Add to list
14
Lesons
43 minutes
On-Demand
Free-Video
IEEE
Bitcoin Over Tor Isn't a Good Idea
0
rewiews
Explores security vulnerabilities when using Bitcoin with Tor, demonstrating how attackers can compromise user privacy, control information flow, and potentially identify users despite anonymization attempts.
Add to list
7
Lesons
22 minutes
On-Demand
Free-Video
IEEE
Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks
0
rewiews
Explore techniques to protect Tor against active routing attacks, including a new guard relay selection algorithm and a real-time BGP monitoring system for detecting routing anomalies.
Add to list
10
Lesons
18 minutes
On-Demand
Free-Video
USENIX
Ghostor - Toward a Secure Data Sharing System from Decentralized Trust
0
rewiews
Explore a secure data-sharing system that protects user privacy and ensures data integrity through decentralized trust, hiding identities and detecting server-side violations.
Add to list
18
Lesons
21 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
AEZAKMI - Browser Anonymity & Fingerprinting Bypass
0
rewiews
Explore AEZAKMI, a tool for browser anonymity and fingerprinting bypass. Learn how it obfuscates common parameters to enhance online privacy and support multi-account usage.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
media.ccc.de
Kaffeefahrt ins Darknet
0
rewiews
Entdecke das Darknet: Grundlagen, Mythen und Live-Tour durch die "digitale Unterwelt". Erfahre, wie man es erreicht, wie es funktioniert und was es wirklich bietet.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
media.ccc.de
Tech for Sex Work
0
rewiews
Exploring technology's impact on sex work: challenges, solutions, and current status. Covers definitions, daily tech usage, legal obstacles, and stigma-related issues faced by sex workers in the digital age.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
What If Petraeus Was a Hacker - Email Privacy for the Rest of Us
0
rewiews
Explore email privacy, FBI access, and tools for secure communication. Learn from high-profile cases and discover practical solutions for protecting your digital correspondence.
Add to list
12
Lesons
27 minutes
On-Demand
Free-Video
Dropping Docs on Darknets Part 2 - Identity Boogaloo
0
rewiews
Explore advanced techniques for anonymous document sharing on darknets, focusing on identity protection and secure communication methods in this in-depth presentation.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
TheIACR
Anonymity - Closing Remarks
0
rewiews
Explore anonymity concepts and concluding insights in cryptography and information security research.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
Blind Signatures - Crypto 2024
0
rewiews
Explore advanced cryptographic concepts and applications of blind signatures in this cutting-edge session from Crypto 2024, chaired by Masayuki Abe.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
USENIX
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning
0
rewiews
Explore how deep reinforcement learning enhances anonymity protection in Ethereum mixing services through automated pattern detection and guidebook enrichment for safer transactions.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
load more...