Here's the full course (20+ lectures) on youtube if anyone's interested:<p><a href="https://www.youtube.com/results?search_query=6.858+Fall+2014" rel="nofollow">https://www.youtube.com/results?search_query=6.858+Fall+2014</a>
From Pretty Good Chat:<p>"We consider the case of the private key being stolen as very unlikely. The users themselves are
not able to access it outside the app, and no other adversary will be able to either"
Interesting how 4 of the 25 projects are related to Bitcoin. It just goes show that the cryptocurrency inspires a good fraction of computer & network security people:<p>CheckBits: <a href="http://css.csail.mit.edu/6.858/2014/projects/adat-bschang-ericadu-ptew.pdf" rel="nofollow">http://css.csail.mit.edu/6.858/2014/projects/adat-bschang-er...</a><p>TorCoin: <a href="http://css.csail.mit.edu/6.858/2014/projects/bchrobot-ynnad19-dereklax.pdf" rel="nofollow">http://css.csail.mit.edu/6.858/2014/projects/bchrobot-ynnad1...</a><p>Dryer21, a Bitcoin Anonymizer Service: <a href="http://css.csail.mit.edu/6.858/2014/projects/asuhl-dannybd-snp.pdf" rel="nofollow">http://css.csail.mit.edu/6.858/2014/projects/asuhl-dannybd-s...</a><p>Merkelized Abstract Syntax Trees: <a href="http://css.csail.mit.edu/6.858/2014/projects/jlrubin-mnaik-nityas.pdf" rel="nofollow">http://css.csail.mit.edu/6.858/2014/projects/jlrubin-mnaik-n...</a>
I was a consultant for MIT and a student decided his final project would be to hack the custom LMS system we were working on. To our surprise, he figured out at least two ways before letting us know he was working on a final project. Gotta love MIT.
To compare with previous years (<a href="http://css.csail.mit.edu/6.858/2013/projects.html" rel="nofollow">http://css.csail.mit.edu/6.858/2013/projects.html</a>):<p>2013 vs 2014<p>2/35 vs 4/25 - Bitcoin Projects<p>12/35 vs 4/25 - Encrypted Filesystems<p>2/35 vs 1/25 - Privilege Separation
The reference materials page is also worth checking out: <a href="http://css.csail.mit.edu/6.858/2014/reference.html" rel="nofollow">http://css.csail.mit.edu/6.858/2014/reference.html</a>