The Course
Step into the future of the internet—where privacy isn’t optional, it’s fundamental.
🔍 Understand the stakes—how data is tracked, stored, and exploited in Web2, and why Web3 offers a new path.
🛠️ Learn the tools—from encryption to decentralized tech, get hands-on with the privacy stack shaping tomorrow.
🚀 Make an impact—whether you're a builder, a strategist, or just privacy-curious, this course arms you with the knowledge to navigate and shape the decentralized web.
Privacy is power. Take yours back. Join us.
Privacy 101 Curriculum
- Course intro (0:49)
- What is Privacy? - Part 1: “Who's Watching Us: Why Privacy Matters”
- What is Privacy? - Part 2: “The Significance of Privacy in Web3”
- Privacy Fundamentals - "The Core of Crypto Is Punks and Principles"
- Activism and Privacy - Part 1 "Privacy as a Universal Right"
- Activism and Privacy - Part 2: "Voices of Courage"
- The Role of Cypherpunks in Privacy Protection - Part 1: "A Brief History of Cypherpunks"
- The Role of Cypherpunks in Privacy Protection - Part 2: "The Cypherpunk Manifesto"
- The Role of Cypherpunks in Privacy Protection - Part 3: "Revitalizing Cypherpunk Principles in Ethereum and Beyond"
- Privacy in Cryptocurrency - Part 1: "Why Cryptocurrency Needs Privacy"
- Privacy in Cryptocurrency - Part 2: "How Cryptocurrency Promotes Privacy"
- Module 1 Glossary
- Privacy Resources - "List of 700+ Web3 Privacy Projects"
- Knowledge Check
- Module 1 extra materials
- History of Privacy Threats - Part 1: "Bitcoin: History Through the Lens of Cypherpunk"
- History of Privacy Threats - Part 2: "The Evolution of Privacy Threats"
- Privacy Threats in the Digital World - Part 1: "Why Privacy Matters" (2:32)
- Privacy Threats in the Digital World - Part 2: "Snowden on Cryptographic Threats"
- Privacy Threats in the Digital World - Part 3: "Threat Modeling Basics"
- Web2 data breaches and lessons learned - Part 1: "History of the Cambridge Analytica Controversy"
- Web2 data breaches and lessons learned - Part 2: "Interactive map of data breaches"
- Web2 data breaches and lessons learned - Part 3: "Case Study"
- Evolution of Surveillance in Web3 - Part 1: "In the Face of AI-Powered Surveillance"
- Evolution of Surveillance in Web3 - Part 2: "The Next Threat to Speech" (4:02)
- Identifying Privacy Threats - Part 1: "Why Privacy Matters" (1:48)
- Identifying Privacy Threats - Part 2: "Identifying Major Attack Types"
- Identifying Privacy Threats - Part 3: "Threat Modeling in Web3"
- Analyzing Privacy Violations - Part 1: "Types of Privacy Violations and Their Impact"
- Analyzing Privacy Violations - Part 2: "Type of threat actors"
- Module 2 Glossary
- Knowledge Check
- Module 2 extra materials
- Privacy Protection Systems - Part 1: "Data Protection Systems in Web3"
- Privacy Protection Systems - Part 2: “Technologies for Privacy in Web3”
- Protecting Cryptocurrency Data - Part 1: "Privacy Coins 101: Anonymity-Enhanced Cryptocurrencies"
- Protecting Cryptocurrency Data - Part 2: "Privacy Coins Explained"
- Protecting Personal Data - Part 1: "Metadata Protection in the Digital World"
- Protecting Personal Data - Part 2: "Frameworks for Data and Privacy Protection"
- Ethics in Privacy - Part 1: "Why Privacy Matters" (1:42)
- Ethics in Privacy - Part 2: "Ethics in Big Data and Privacy"
- Ethics in Privacy - Part 3: "Ethical Challenges in Web3 Development"
- Adopting a Privacy Framework
- Analyzing Privacy Threats - Part 1: "How to Model Threats Correctly"
- Analyzing Privacy Threats - Part 2: "Global Privacy Breaches and Their Impact"
- Module 3 Glossary
- Knowledge Check
- Module 3 Extra Materials
- Essential Privacy Tools Part 1 "Best Privacy Tools in Web3"
- Essential Privacy Tools Part 2 "Top Privacy-Enhancing Tools in Web3"
- Essential Privacy Tools Part 3 "Web3 Privacy Protecting Tools"
- Decentralized Communication Tools Part 1 "The Future of Business Communication: Decentralized, Secure, and Efficient"
- Decentralized Communication Tools Part 2 "Privacy-Respecting Messaging Apps"
- Privacy-Focused Browsing Part 1 "Introduction to Private Browsers"
- Privacy-Focused Browsing Part 2 "Age of Surveillance Capitalism"
- Open-Source Privacy Tools Part 1 "Open Source in Web3"
- Open-Source Privacy Tools Part 2 "Use Open-Source Technologies"
- Evaluating Privacy in Web3 Projects "Guide to Analyzing Privacy in Web3"
- Wrapping Up the Course: "How to Restore Your Privacy Freedom"
- Module 4 Glossary
- Module Quiz
- Final Test
- Module 4 extra materials
- Wrapping Up the Course Part 3 "Conclusion: Why Privacy Matters & Next Steps"
What You’ll Learn
This isn’t just another data protection course—it’s your hands-on guide to real privacy in Web3.
🔗 Leverage blockchain for privacy—understand how smart contracts, cryptography, and decentralized identity can put you in control.
🛠️ Master the tools of the trade—zero-knowledge proofs, privacy-preserving protocols, and the tech shaping a censorship-resistant internet.
🌐 Go beyond theory—learn not just how to navigate Web3 securely, but how to build and advocate for a truly private, decentralized future.
Privacy isn’t a setting—it’s a movement. Get ahead. Stay sovereign.