๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page

Was this helpful?

Privacy Engineering Field Guide Season 2

Prepare to embark on the second season where you'll encounter all wondrous techniques and acquire skills to take your first step into privacy engineering concepts!

PreviousBring Your Own Device (BYOD)NextIntroduction to Privacy Engineering for Non-Techs

Last updated 1 year ago

Was this helpful?

The first season of Hitchhikerโ€™s Guide to Privacy Engineering was a thrilling ride, tailor-made for privacy lawyers, compliance officers, business managers, and anyone curious about deciphering the technical lingo of dev and security teams that we come across during our day-to-day operations. ๐Ÿ”

The first season was fueled by a genuine passion to empower individuals from all walks of life with the knowledge of the technology that shapes our world. We embarked on a journey, unraveling the inner workings of everyday tech companions - routers, browsers, mobile phones, and even venturing into the realm of quantum computers. ๐ŸŒ

If you haven't checked it out yet, now is the time to and dive into the world of HGPE! ๐Ÿ‘ฝ

Stay updated with each exhilarating episode of the upcoming Season 2, which will start focusing on more advanced topics around privacy engineering.

๐Ÿ‘‰ Subscribe to the ๐Ÿ‘ˆ

Season 1 โœ…

Season 2 (coming soon!) ๐Ÿ‘€

โœ… S1 / Epilogue:

โœ… S1 / Episode 1:

โœ… S1 / Episode 2:

โœ… S1 / Episode 3:

โœ… S1 / Episode 4:

โœ… S1 / Episode 5:

โœ… S1 / Episode 6:

๐Ÿ’ฅ Read more about the HGPE's

๐Ÿ“บ Check out the

๐Ÿ’ก Learn more about the concepts around , and much more!

๐Ÿš€ Exciting News ๐Ÿ“ฃ

Season 2 is all about diving into more advanced topics in privacy engineering, and that's just the beginning.

We've named it the "Playground of Privacy Professionals." ๐Ÿงฉ

After a successful closed beta phase, we're swinging open the doors for public beta access. ๐Ÿš€

This platform is designed to immerse players in the intricate realm of privacy engineering by infusing game mechanics into the learning experience. ๐ŸŽฏ

It's perfect for individuals who've grappled with traditional learning methods and want a hands-on, sandbox environment to truly grasp concepts like #encryption, #deidentification, #datamapping, and much more.

Think of it as a creative privacy tool that makes learning privacy engineering a dynamic, interactive adventure!

Join us in our next "creative privacy framework" experiment around privacy education!

Let's reimagine the way we learn and engage with data privacy as humanity ๐ŸŒ

and I are thrilled to introduce a groundbreaking initiative - the world's first Privacy Capture The Flag (CTF) platform! ๐ŸŽฎ

But that's not all. Our platform will also host the Privacy Treasure Hunt Game event we initially launched to celebrate Data Privacy Day '23 in collaboration with , , and !

subscribe
HGPE newsletter
Introduction to Hitchhikerโ€™s Guide to Privacy Engineering
Why Privacy Matters?
How do Computers Work?
How the Internet Works?
How do Websites Work?
How do Quantum Computers Work?
Mobile Apps and Privacy
Story and Lore
Videos, Audio Book and Soundtracks
Creative Privacy Framework
Privacy Engineering Skillz Map,
Gokhan Sari
The Shifting Privacy Left Podcast
Istanbul Legal Hackers
Istanbul Bilgi University Privacy Innovation Lab
๐Ÿ•ต๏ธโ€โ™‚๏ธ
Page cover image