๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What will you learn ? ๐ŸŽ“
  • How to use the field guide?
  • What are the Learning Paths? ๐ŸŽ
  • So what are you waiting for?

Was this helpful?

Privacy Engineering Field Guide Season 1

This season of the Field Guide aims to help non-techs learn the basic concepts behind computing, networks, websites & mobile apps and even quantum computing!

PreviousChapter 5 : Introduction to the Lifecycle of AINextโ“Decoding the Digital World: Exploring Everyday Technology

Last updated 2 months ago

Was this helpful?

What will you learn ? ๐ŸŽ“

Looking to take your privacy engineering career to the next level? Or perhaps you're a seasoned professional seeking to expand your knowledge of privacy-enhancing technologies? Look no further!

HGPE offers everything you need to succeed in this exciting and rapidly-growing field.

Hitchhiker's Guide to Privacy Engineering is an essential resource for privacy lawyers looking to deepen their understanding of privacy engineering principles and practices, and better address the complex privacy challenges faced by today's organizations.

How to use the field guide?

HGPE is a comprehensive online learning environment designed to provide privacy lawyers with the knowledge and skills necessary to navigate the complex world of privacy.

The field guide is ideal for those who are just starting their career in privacy law or for those who want to expand their technical privacy knowledge.

The guide starts by explaining why privacy matters and how it affects individuals, businesses, and governments. It then delves into the technical aspects of privacy, including how computers work, how the internet works, and the basics of cryptography. As you progress through the academy, you'll explore more advanced topics such as quantum computing and privacy-enhancing technologies.

After completing a chapter, you'll have the opportunity to test your newly learned tech skills on learning paths. These hands-on exercises provide you with practical experience applying the knowledge you've gained, allowing you to see how the concepts can be applied in the real world.

What are the Learning Paths? ๐ŸŽ

Here are the learning paths that you can embark on to start your privacy engineering journey. Each learning path is filled with stories coupled with puzzles to test your skills.

When you complete the learning tracks, you will earn badges which will allow you to get access to harder learning paths.

๐Ÿšจ๐Ÿšจ You can get early access to learning paths by registering to the HGPE Waitlist from below. (If you signup today youโ€™ll also get a bonus puzzle ๐ŸŽ)

[ ]

Each learning path requires unraveling complex investigations into the unknown, need to uncover clues, and use their own wits and newly learned skills.

The Academy is where you can learn about the learning paths right away, however, the puzzle and games you need to wait a little longer.

๐Ÿšจ๐Ÿšจ You can get early access to learning paths by registering to the HGPE Waitlist from below. (If you signup today youโ€™ll also get a bonus puzzle ๐ŸŽ)

We have carefully designed puzzles and skill checks that will challenge you to think critically about privacy issues and come up with creative solutions to complex problems. Completing the learning path will equip you with the necessary knowledge and skills to tackle privacy issues in the real world.

Earn badges and move up the ladder to become a galactic privacy champion.

However, here is the tricky part! You can only complete the learning paths by solving the relevant puzzles and games of the learning path.

So what are you waiting for?

Overall, Privacy Academy is an excellent resource for anyone looking to expand their knowledge and skills in the field of privacy law. With its comprehensive approach and engaging learning experience, the academy is sure to help you succeed in this exciting and ever-evolving field.

Start learning today and join the thousands of professionals who have already discovered the power of HGPE.

[ ]

Join the Waitlist
Join the Waitlist
๐ŸŽ“
Page cover image
Cover

Why Privacy Matters?

Fundamental importance of privacy, including the ethical and legal considerations of privacy.

Cover

Computers and Privacy

Core technologies that underpin modern information systems.

Cover

Networks and Privacy

Network architectures, data storage, network protocols, and cybersecurity.

Cover

Websites and Privacy

Learn how websites work and the online risk and threats to data privacy

Cover

Mobile Apps and Privacy

Focuses on the unique privacy challenges posed by mobile apps.

Cover

Quantum and Privacy

Learn more about quantum computing and its privacy risks

Cover

Usable Privacy & Privacy UX

The importance of designing privacy features that are user-friendly and easy to use.

Cover

Scripting Languages

Core concepts of programming, including data types, variables, control structures, and functions.

Cover

Privacy Enhancing Technologies

This chapter is still being written ๐Ÿ‘€

Cover

Machine Learning and Privacy

GANs, neural networks, supervised and unsupervised learning, and explains how machine learning can impact privacy.

Cover

Online Tracking & Advertising

Explores the ways in which online tracking and advertising can impact privacy, including the use of cookies, tracking pixels, and fingerprinting.

Cover

Input Privacy

Preventing the disclosure of personal data that may be contained in the data being used as input.

Cover

Output Privacy

Peventing the disclosure of personal data that may be contained in the output of a computation.

Cover

Threat Modeling & Risk Assessment

Assessment of the likelihood and impact of privacy risks, and the development of strategies to mitigate those risks.

Cover

Privacy by Design

Explains the concept of designing privacy into systems from the start, rather than as an afterthought.