This course aims to explore the topic of personal information leakage through the abuse of the GDPR 'Right of Access'. By evaluating the verification processes of various organizations, participants will learn about the vulnerabilities that can lead to unauthorized access to personal data. The course covers techniques such as social engineering and provides insights into policy improvements to prevent data leaks. The intended audience includes individuals interested in data protection, privacy, and cybersecurity.
Overview
Syllabus
Intro
Resource Questions
How to Improve Identity Verification
What Credentials are Being Asked
Home address
ID card
Proof of identity
Leaked Data
Recommendations
Ethics
Questions
Taught by
USENIX