Covers privacy mechanisms, their pros and cons, and their application in various scenarios, emphasizing privacy as a security property and its significance in society.
Explores zero-knowledge proofs, their properties, practical applications, and implementation in real-world scenarios, including attribute-based credentials.
Explores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.