Skip to content
Computer Science · 10th Grade

Active learning ideas

Privacy Enhancing Technologies

Privacy-enhancing technologies can feel abstract to students, but hands-on comparison and discussion make them tangible. Active learning works here because students test tools they already use, uncover real trade-offs, and confront misconceptions with evidence rather than abstract warnings.

Common Core State StandardsCSTA: 3A-IC-26
25–40 minPairs → Whole Class3 activities

Activity 01

Formal Debate40 min · Small Groups

Comparative Analysis: PET Trade-off Chart

Provide small groups with a description of five PETs (VPN, Tor, Signal, privacy search engine, ad blocker) and four evaluation criteria (anonymity strength, speed impact, ease of use, trust model). Groups complete the chart and then recommend the right tool for three user scenarios: a journalist in a repressive country, a student using school Wi-Fi, a person avoiding targeted ads.

Explain how a Virtual Private Network (VPN) enhances online privacy.

Facilitation TipDuring the PET Trade-off Chart, have students start with tools they already know, like private browsing, to build confidence before comparing VPNs and Tor.

What to look forPose the following to students: 'Imagine you are choosing between a free VPN service and a paid one. What are the potential privacy risks of the free service? What trade-offs might you accept with the paid service?' Guide students to discuss data logging policies and trust in service providers.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 02

Think-Pair-Share25 min · Pairs

Think-Pair-Share: What Does a VPN Actually Hide?

Present a diagram showing what a VPN hides from different observers (your ISP, the website you visit, someone on your local network, the VPN provider itself). Students individually annotate what each party can and cannot see, pair to reconcile differences, then share the most surprising finding with the class.

Compare different privacy-enhancing technologies and their effectiveness.

Facilitation TipFor the Think-Pair-Share, assign specific roles: one student traces data flow, one checks browser settings, and one documents what the VPN does not hide.

What to look forPresent students with three scenarios: 1) accessing a bank account on public Wi-Fi, 2) researching a sensitive health topic, 3) streaming geo-restricted content. Ask them to identify which privacy-enhancing technology (VPN, Tor, privacy search engine) would be most appropriate for each scenario and briefly explain why.

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Formal Debate40 min · Small Groups

Formal Debate: Privacy vs. Convenience Trade-offs

Present a series of real product design decisions: a map app that requires location data at all times vs. only while in use, a smart speaker that processes voice locally vs. in the cloud, a browser that blocks all tracking vs. allows it for free services. Small groups argue for one side, then the class votes and discusses where the line should be drawn.

Analyze the trade-offs between privacy and convenience in digital services.

Facilitation TipDuring the debate, require students to back claims with evidence from the trade-off chart or prior quick-check scenarios.

What to look forOn an index card, ask students to write: 'One way a VPN protects my privacy is...' and 'One potential downside of using a privacy-enhancing technology is...'. Collect these to gauge understanding of core concepts and trade-offs.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

A few notes on teaching this unit

Teachers should begin with students’ lived experiences—asking where they use private browsing or worry about public Wi-Fi—then layer technical vocabulary and concrete data flows. Avoid overwhelming students with too many tools at once; focus on VPNs as a bridge to more complex systems like Tor. Research shows that students grasp trade-offs better when they see visual comparisons and debate consequences in real contexts.

Successful learning looks like students accurately describing what a VPN hides and shows, weighing privacy benefits against convenience, and correcting common myths with specific technical details. They should move from vague ideas like 'VPNs make me safe' to precise statements like 'A VPN hides my IP from websites but not from the VPN provider.'


Watch Out for These Misconceptions

  • During the Think-Pair-Share activity on what a VPN hides, watch for students who claim a VPN makes them completely invisible online.

    During the Think-Pair-Share activity, redirect students to the data flow diagram: ask them to trace how websites still see logged-in accounts and how browser fingerprinting can link sessions, then have them revise their statements using the sentence stem 'A VPN hides ___ but not ___ because ___'.

  • During the PET Trade-off Chart activity, watch for students who believe private browsing mode keeps their activity private from everyone.

    During the PET Trade-off Chart activity, have students create two columns on their chart: one for what private browsing hides on the device, and one for what it leaves exposed. Then ask them to compare those columns to the VPN’s exposed data, using the chart’s structure to correct the misconception.


Methods used in this brief