Loading...
Loading...
4
Sessions
4
Videos
25
Students
Build privacy-preserving applications. Stealth addresses and ZK-based systems.
Understand different levels of privacy on Ethereum.
2h 0m
An overview of privacy levels on Ethereum, examining threat models, privacy primitives, and the foundational concepts needed to build privacy-preserving applications.
3h 15m
A hands-on session implementing stealth address protocols to enable private token transfers on Ethereum without revealing recipient identities.
2h 30m
An exploration of privacy pool designs using zero-knowledge proofs, examining how to create compliant yet private transaction systems on Ethereum.
3h 45m
A practical guide to designing end-to-end private decentralized applications, covering architecture patterns that preserve user privacy at every layer of the stack.
Verification project for Privacy on Ethereum: Theory to Application.
Verification project for Privacy on Ethereum: Theory to Application.
Verification project for Privacy on Ethereum: Theory to Application.
Verification project for Privacy on Ethereum: Theory to Application.
Verification project for Privacy on Ethereum: Theory to Application.
Verification project for Privacy on Ethereum: Theory to Application.
Verification project for Privacy on Ethereum: Theory to Application.
Verification project for Privacy on Ethereum: Theory to Application.
Build a privacy-preserving token transfer system.