newline's Introduction to Privacy on Ethereum

In this course, we'll show you how to implement privacy in your applications and build fun projects like rock paper scissors

 

What You Will Learn

Building rock paper scissors on Ethereum using Solidity

How privacy focussed Blockchains work like ZCash, Monero, and more

How to implement rock paper scissors with complete privacy

Learn about cryptography primitives and how to use them

How to hide data within public Blockchains

When does privacy break and looking into Post-Quantum Cryptography

Welcome to the newline guide to privacy on blockchains, In this course we are going to be looking at privacy techniques used in blockchain and implementing really cool games like Rock, Paper, Scissors on Ethereum and using cryptography primitives to help us improve privacy for our own applications.

Interested about building decentralized applications?

Want to learn how to store sensitive data in public chain or database?

Want to learn how privacy focussed cryptocurrencies actually keep transactions private?

Want to know all the tools of cryptography that you can use today?

Privacy is a very important concept in blockchains, writing a smart contract is one thing, but designing the privacy aspects of your application is another, using cryptography as a toolbox can be a way to achieve privacy that can yield very good results. For example, hashes with salt has been used for a long time to store user passwords without actually knowing the user passwords and even if the security gets compromised and they are stolen, no user data can be accessed by using the hash without knowing the preimage of the hash.

Privacy is at the heart of blockchains. Blockchains such as Bitcoin and Ethereum are very public by nature, to use them for your applications, you must not put any sensitive data on them, but you have to put something so at a later date, you can prove that a supply chain holds or a product is legitimate, but how do you go about putting data on blockchains without really revealing what the data is?

In this course we'll look at the various privacy technologies and then implement a simple but nuanced game in Solidity: Rock, Paper, Scissors. This game will give us a hands-on lesson in creating real-world applications that handle private data on a public blockchain.

Course Content

4 modules28 lessons1h 37m total

Understanding Blockchains, Mining, and the Problem of Privacy

10 lessons 30m total

Intro to the course

Introduction to the course and building foundation of blockchain and privacy

INTRODUCTION

3:08 minutes

Introduction to the module

Introduction to the module and building foundation of blockchain and privacy

INTRODUCTION

1:29 minutes

Introduction to Privacy

Introduction to the course and building foundation of blockchain and privacy

INTRODUCTION

4:13 minutes

What is a blockchain

Understand the nature of public and permissioned blockchains and how they work

LESSON

2:49 minutes

What is mining in blockchain?

Understand the consensus of blockchains and how blocks are linked together using proof of work

INTRODUCTION

4:38 minutes

What is mining in blockchain?

Understand the consensus of blockchains and how blocks are linked together using proof of work

LESSON

3:23 minutes

What is privacy within blockchains

A look into what privacy means on blockchains and trying to make sense of the data from the block explorers

LESSON

2:13 minutes

Why is Privacy important - Bitcoin?

Privacy is awesome but why do we care at all ? why cant we keep the data all public and the dangers of the applications without privacy on blockchains

LESSON

4:22 minutes

Why is Privacy important - Ethereum?

Privacy is awesome but why do we care at all ? why cant we keep the data all public and the dangers of the applications without privacy on blockchains

LESSON

2:44 minutes

Will Quantum computing break privacy?

privacy techniques are based on cryptographic principles, some of which are heavily affected by the advent of quantum computing, in this lesson, we will explore this concept further and see which techniques are affected and what can be done to improve upon them

LESSON

1:49 minutes

Privacy Techniques in Various Blockchains

7 lessons 14m total

A brief look at privacy techniques in blockchains

There are so many privacy techniques, lets take a brief look at how each of them works from a higher level, looking at Zcash, Monero, Dash, Mixers (General)

LESSON

1:04 minutes

ZCash

There are so many privacy techniques, lets take a brief look at how each of them works from a higher level, looking at Zcash, Monero, Dash, Mixers (General)

LESSON

2:15 minutes

Moneoro

There are so many privacy techniques, lets take a brief look at how each of them works from a higher level, looking at Zcash, Monero, Dash, Mixers (General)

LESSON

2:35 minutes

Coinjoin

There are so many privacy techniques, lets take a brief look at how each of them works from a higher level, looking at Zcash, Monero, Dash, Mixers (General)

LESSON

2:33 minutes

Dash

There are so many privacy techniques, lets take a brief look at how each of them works from a higher level, looking at Zcash, Monero, Dash, Mixers (General)

LESSON

2:02 minutes