COURSE 1: PRIVATE & SECURE COMPUTING
​
1. Secure hardware:
2. Secure OS Tails:
2.3. Setup of Persistent Volume
2.5. Cloning & Backup
2.5.2. Cloning of OS + Persistent Volume
2.5.3. Backup of Persistent Volume
2.6. KeePassXC offline password manager
3. PGP encryption:
3.2. Symmetric encryption
3.2.1. Encryption/decryption of text
3.2.2. Encryption/decryption of files
3.3. Private-public key encryption:
3.3.1. Creation of a key pair
3.3.2. Encryption/decryption of text
3.3.3. Encryption/decryption of files
3.3.4. Encryption/decryption of email
3.3.4.1. Email client configuration (Thunderbird)
3.3.4.2. Email PGP encryption/decryption
4. Encryption of volumes (e.g. USB keys) and file containers
4.2. VeraCrypt
4.2.3. Encryption/decryption (outside of Tails)
4.2.4. Encryption in Tails (ZuluCrypt)
5. Hiding and encrypting data inside media (steganography):
COURSE 2: PRIVATE & SECURE BITCOINING
​
​​1. Introduction
1.3. Why is privacy/security important in Bitcoin?
2. Secure seed generation:
2.1. BIP32 (12 words using Electrum)°
2.2. BIP39 (24 words, and 24+1 using iancoleman)°
2.3. BIP39 (24 words using dice)°
2.4. Hardware wallets (Coldcard)°
3. Wallet generation:
4. Cold/secure generation and storage°
5. Node (Parmanode):
5.3. Connection of Electrum wallet to a node^
6. Transactions:
6.1. Standard transactions
6.2. Multisig transactions
7. Buying Bitcoin (decentralized exchange: Robosats)^
8. CoinJoin
8.2. Electrum CoinJoin
8.2.1. Checklist before you start
8.2.2. 1st step (all participants)°^
8.2.4. 3rd step (all participants except leader and last to sign)°^
8.2.5. 4th step (last participant to sign)°^
8.3. JoinMarket (coming one day)
9. Lightning Network (LN):
9.2. Custodial LN (easy, non-sovereign)^
9.3. Non-custodial LN (difficult, sovereign - coming one day)^