Resources
Our organizing team has compiled a non-exhaustive list of relevant resources. We hope these can be useful both for brainstorming project ideas as well as general learning.
Co-Design
- Design from the Margins: Centering the Most Marginalized and Impacted in Design Processes—from Ideation to Production
- Introduction to community-led co-design
- Community Co-Design Tools and Tactics: An approach to equitable community engagement and action
Community Needs
- Engineering privacy for vulnerable populations
- Consentful Tech Zine
- Toward Safer Intimate Futures: Recommendations for Tech Platforms to Reduce Image Based Sexual Abuse
- SoK: Safer Digital-Safety Research Involving At-Risk Users
Community Applications
- Applications of MP-FHE for Vulnerable Communities
- Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct
- Privacy Preserving Data Governance
Guides: Privacy, Digital Safety and Self-Defense
- Digital Defense Fund: Privacy Guides
- T4Tech: Digital Personas Zine, Doxxing Self Defense
- Zebra Crossing: Digital Safety Checklist
- EFF: Surveillance Self-Defense
Cryptography and Privacy-Enhancing Technologies (PETs)
Programmable Cryptography
A framework for applying cryptographic primitives such as zero-knowledge, multi-party computation, fully homomorphic encryption, and more.
- Programmable Cryptography (Part 1)
- Three Easy Pieces in Programmable Cryptography - Download (easy.pdf)
- 0xPARC notes
Zero-knowledge (ZK):
- Zero-Knowledge Proofs: A Beginner’s Guide
- Modern Zero Knowledge Cryptography
- Zero-Knowledge Proof: Applications and Use Cases
Multi-party computation (MPC):
Fully homomorphic encryption (FHE):
- A 6-minute introduction to Fully Homomorphic Encryption (FHE)
- A High-Level Technical Overview of Fully Homomorphic Encryption
- TFHE Deep Dive
- Homomorphic Encryption Use Cases
- FHE math:
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based - lacks explanation of bootstrapping needed for computing circuits in FHE
- Fully Homomorphic Encryption Using Ideal Lattices - on bootstrapping
- Efficient Fully Homomorphic Encryption from (Standard) LWE - explains dimension and modulus reduction needed for bootstrapping
Other privacy-enhancing technologies
- Trusted Execution Environments (TEEs) - can achieve privacy without cryptography