Skip to content

Commit

Permalink
add a meeting agenda
Browse files Browse the repository at this point in the history
  • Loading branch information
feamster committed Sep 30, 2024
1 parent 7a34d3b commit a31a898
Show file tree
Hide file tree
Showing 2 changed files with 27 additions and 2 deletions.
22 changes: 22 additions & 0 deletions docs/agenda.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
## Agenda

### Meeting 1

* Overview
* Course Objectives and Context
* Format
* Debates
* Labs
* Lecture Coverage: Trusting Trust
* Reading Discussions: Reflections on Trusting Trust
* How does this concept apply beyond the specific example he gives about compilers and backdoors?
* How can we protect against similar threats in today’s highly interconnected and complex systems?
* How would the concerns addressed in this paper extend to AI-based systems?
* Lecture Coverage: Why Cryptosystems Fail
* Reading Discussion: Why Cryptosystems Fail
* How can these failures be mitigated through better design and operational practices?
* How do regulatory frameworks, like GDPR and CCPA, impact the development and implementation of cryptosystems?
* Lecture Coverage: Ethics
* Reading Discussion: Bit-by-Bit
* How do the ethical considerations in this paper apply to the development and deployment of AI systems?
* What are the implications of the ethical considerations in this paper for the design of privacy-preserving systems?
7 changes: 5 additions & 2 deletions docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@ and recommendations.

More detailed information is available in the [syllabus](syllabus.md).

Information about the agenda for each class meeting is available in the
[agenda](agenda.md).

## Schedule

**Readings:** Please read the posted material and
Expand All @@ -34,13 +37,13 @@ meeting.
| 4 | Modern Authentication | [Access](readings/04-oauth.pdf) | Lab: [PKI](assignments/pki.md) |
| 5 | Denial of Service Attacks | [Cannon](readings/05-paxson-cannon.pdf) | |
| 6 | DNS Security and Privacy | [Kaminsky](readings/06-kaminsky.pdf) | Debate: [Backdoors](debates/backdoors.md) |
| 7 | Web Security | [Same Origin](readings/07-same-origin.pdf) | |
| 7 | Web Security and Privacy | [Same Origin](readings/07-same-origin.pdf) | |
| 8 | Large-Scale Attacks | [Roundup](readings/08-cooke-botnets.pdf) | Lab: [Authentication](assignments/api.md) |
| 9 | Data Collection and Surveillance | [Solove](readings/09-privacy.pdf) | |
| 10 | Web and Device Tracking | [Englehardt](readings/10-tracking.pdf) | Debate: [Omnibus](debates/omnibus.md) |
| 11 | Privacy Law and Regulations | [Warren](readings/11-warren.pdf) | |
| 12 | Automated Compliance Checking | [CPRA] | Lab: [Privacy](assignments/privacy.md) |
| 13 | Softeware and Content Copyright | [Copyright] | |
| 13 | Software and Content Copyright | [Copyright] | |
| 14 | Content Moderation | [Moderation] | Debate: [Moderation](debates/moderation.md) |
| 15 | Censorship | [Roberts](readings/16-censorship.pdf) | |
| 16 | AI Fairness | [Mitchell](readings/17-ml-fairness.pdf) | Lab: [Internet Equity](assignments/access.md) |
Expand Down

0 comments on commit a31a898

Please sign in to comment.