top of page

COURSE 1: PRIVATE & SECURE COMPUTING

​

1. Secure hardware:

1.1. Intro

1.2. BIOS settings

2. Secure OS Tails:

2.1. Introduction

2.2. Installation

2.3. Setup of Persistent Volume

2.4. Tails Overview

2.5. Cloning & Backup

2.5.1. Cloning of OS only

2.5.2. Cloning of OS + Persistent Volume

2.5.3. Backup of Persistent Volume

2.6. KeePassXC offline password manager

2.7. Additional software

2.8. Securely deleting files

3. PGP encryption:

3.1. Introduction

3.2. Symmetric encryption

3.2.1. Encryption/decryption of text

3.2.1.1. Kleopatra (gui)

3.2.1.2. Terminal (cli)

3.2.2. Encryption/decryption of files

3.2.2.1. Kleopatra (gui)

3.2.2.2. Terminal (cli)

3.3. Private-public key encryption:

3.3.1. Creation of a key pair

3.3.1.1. Kleopatra (gui)

3.3.1.2. Terminal (cli)

3.3.2. Encryption/decryption of text

3.3.2.1. Kleopatra (gui)

3.3.2.2. Terminal (cli)

3.3.3. Encryption/decryption of files

3.3.3.1. Kleopatra (gui)

3.3.3.2. Terminal (cli)

3.3.4. Encryption/decryption of email

3.3.4.1. Email client configuration (Thunderbird)

3.3.4.2. Email PGP encryption/decryption

3.3.5. Verify Software

4. Encryption of volumes (e.g. USB keys) and file containers

4.1. LUKS (volume formatting)

4.2. VeraCrypt

4.2.1. Plausible deniability

4.2.2. Verify software

4.2.3. Encryption/decryption (outside of Tails)

4.2.4. Encryption in Tails (ZuluCrypt)

4.2.5. Decryption in Tails

5. Hiding and encrypting data inside media (steganography):

5.1. Steghide

6. Nested encryption

7. Cold computing

 

 

 

COURSE 2: PRIVATE & SECURE BITCOINING

​

​​1. Introduction

1.1. What is Bitcoin?

1.2. How does Bitcoin work?

1.3. Why is privacy/security important in Bitcoin?

2. Secure seed generation:

2.1. BIP32 (12 words using Electrum)°

2.2. BIP39 (24 words, and 24+1 using iancoleman)°

2.3. BIP39 (24 words using dice)°

2.4. Hardware wallets (Coldcard)°

3. Wallet generation:

3.1. Standard Wallets°

3.2. Multisig wallets°

3.3. Watch-only wallets^

3.4. Electrum wallet overview

4. Cold/secure generation and storage°

5. Node (Parmanode):

5.1. Intro

5.2. Setup^

5.3. Connection of Electrum wallet to a node^

6. Transactions:

6.1. Standard transactions

6.1.1. online^

6.1.2. air-gapped°^

6.2. Multisig transactions

6.2.1. online^

6.2.2. air-gapped°^

7. Buying Bitcoin (decentralized exchange: Robosats)^

8. CoinJoin

8.1. General principle

8.2. Electrum CoinJoin

8.2.1. Checklist before you start

8.2.2. 1st step (all participants)°^

8.2.3. 2nd step (leader)°^

8.2.4. 3rd step (all participants except leader and last to sign)°^

8.2.5. 4th step (last participant to sign)°^

8.3. JoinMarket (coming one day)

9. Lightning Network (LN):

9.1. Introduction

9.2. Custodial LN (easy, non-sovereign)^

9.3. Non-custodial LN (difficult, sovereign - coming one day)^

10. Bitcoin-backed loans

bottom of page