Overview
This course aims to teach learners how to prevent phishing and impersonation attacks by introducing an alternative data model for structuring identities and relationships. The course covers topics such as building systems resistant to attacks, integrating security measures into collaboration software, and balancing simplicity, security, and usability. The teaching method involves presenting a prototype called Backchannel, a local-first address book that implements distributed systems primitives. The intended audience for this course includes individuals interested in cybersecurity, data privacy, and collaborative software development.
Syllabus
Intro
Phishing
Social Engineering
Four Steps
What Organizations Do
What If
User Profiles
Apple iMessage
Namespaces
Relationships
Notion
Recognition
Resilient
Secure
Checkmark
Keybase
Blockchain
Magic Wormhole
Backchannel
Codes
Code Errors
Naming
New Mental Model
Pet Name System
Relays
Linking Multiple Devices
Auto Merge
Device List
tombstone message
example demo
overall findings
comments
location sharing
rendering codes
phone numbers
nicknames
test results
new mental models
known vulnerabilities
whats next
groups
enterprise
team
Taught by
Strange Loop Conference