Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Prevent Phishing & Impersonation

Strange Loop Conference via YouTube

Overview

This course aims to teach learners how to prevent phishing and impersonation attacks by introducing an alternative data model for structuring identities and relationships. The course covers topics such as building systems resistant to attacks, integrating security measures into collaboration software, and balancing simplicity, security, and usability. The teaching method involves presenting a prototype called Backchannel, a local-first address book that implements distributed systems primitives. The intended audience for this course includes individuals interested in cybersecurity, data privacy, and collaborative software development.

Syllabus

Intro
Phishing
Social Engineering
Four Steps
What Organizations Do
What If
User Profiles
Apple iMessage
Namespaces
Relationships
Notion
Recognition
Resilient
Secure
Checkmark
Keybase
Blockchain
Magic Wormhole
Backchannel
Codes
Code Errors
Naming
New Mental Model
Pet Name System
Relays
Linking Multiple Devices
Auto Merge
Device List
tombstone message
example demo
overall findings
comments
location sharing
rendering codes
phone numbers
nicknames
test results
new mental models
known vulnerabilities
whats next
groups
enterprise
team

Taught by

Strange Loop Conference

Reviews

Start your review of Prevent Phishing & Impersonation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.