YoVDO

Privacy-preserving Approaches to Transparency Logs

Offered By: Linux Foundation via YouTube

Tags

Privacy Courses Cryptography Courses Data Integrity Courses Hash Functions Courses Merkle Tree Courses Certificate Transparency Courses Sigstore Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore privacy-preserving approaches to transparency logs in this informative conference talk. Delve into the technical details of append-only logs and their growing prominence in infrastructure, including certificate authorities and Sigstore. Examine the challenges of maintaining log integrity while addressing privacy concerns and right to erasure requests. Compare and contrast techniques for providing immutable, auditable logs while preserving users' rights. Learn about hash functions, Merkle trees, witnessing, monitoring, and various transparency log implementations. Discover guiding principles and strategies for balancing transparency and privacy, such as destructive methods, prevention techniques, and ways to keep log operators accountable. Gain insights into the intersection of transparency logs and privacy laws, equipping yourself with knowledge to navigate this complex landscape.

Syllabus

Intro
Hash Functions
Merkle Trees - Inclusion
Transparency Logs - Consistency
Witnessing - Split View Attack
Witnessing - Gossiping
Monitoring
Certificate Transparency
Binary Transparency - Sigstore
Key Transparency
Goals of Privacy Law
Transparency Logs & Privacy
Guiding principles
Destructive - Deleting entries from log
Destructive - Removing log
Prevent - Appropriate checks
Prevent - Pseudonymity
Log Frontend Blocks Requests
Move Sensitive Data Out of Log
Keep Log Operator Accountable
Conclusion


Taught by

Linux Foundation

Tags

Related Courses

Algorithms for Searching, Sorting, and Indexing
University of Colorado Boulder via Coursera
An Introduction to Cryptography
University of Leeds via FutureLearn
An Introduction to Cryptography
University of Leeds via Coursera
Applied Cryptography
University of Colorado System via Coursera
Blockchain Security
Infosec via Coursera