Bruce Schneier is an internationally renowned authority on technology and security with a level-headed, must-hear message for any audience concerned about our digital security and privacy. Called a “security guru” by The Economist, Bruce is the author of sixteen books, including the New York Times bestseller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.
For this year’s edition of the Finance & Technology Conference the Swiss Finance Institute (sfi) and the Center for Digital Trust (C4DT), EPFL are teaming up again to focus on Decentralized Finance (DeFi). The conference will be held on Thursday 26th of April at the Starling Hotel @ EPFL, Switzerland.
For more information and the agenda please click here.
Blockchain, smart contracts, cryptocurrencies, platforms, big data – new technologies are challenging lawyers. They must grasp the main social, economic and technical challenges of digitalisation and find the right legal instruments to react to the upheavals caused by digital technology. This is the perspective of the “Digitalisation Week”.
Gain in-depth understanding of the digital ecosystem, cybersecurity and digital trust, and interface with internal and external ICT stakeholders.
During the month of December, Advent of Code passes out a new puzzle every day. The daily challenges are a fun way to learn new algorithms and getting to know new ways of programming. In our software engineering team we followed along at least the first half of the programming challenges and enjoyed discussing the solutions (…)
The past two years saw a new vulnerability make headlines: software supply chains. Events such as the SolarWinds and Kaseya cyberattacks or the discovery of the Log4j vulnerability forced organizations to reevaluate their cyber risk exposure.
This one-day conference provides a platform for academia, government, business, NGOs and standard-setting bodies to shed light on software supply chain risks, outline persisting challenges, and discuss mitigation tactics, solutions, and best practices as well as emerging frameworks and standardization initiatives.
For more information click here.
Why? Nowadays, Linux is deployed in many component of the network fabric. Your home NAT probably runs it, your datacenter’s router also. As it needs to handle incoming packet on gigabits links, the speed at which the system handles the packets becomes important. If you run your router in user-space, the kernel needs to read (…)
November 5th, 2021, Swiss Tech Convention Center, EPFL Distributed Ledger Technology has the potential to reshape the traditional financial system. An example is decentralized finance, which allows people to combine open-source building blocks into sophisticated financial products utilizing DLT. Central banks, as another example, face growing competition from private actors offering their own digital alternative (…)
February 7-11th, 2022, online Artificial Intelligence holds great promise for the economy and society. It has also led to the explosion of new ethical challenges, such as biased decision making, filter bubbles, data protection, face recognition, deep fakes and cyber security. During this week we aim to create awareness of the ethical and privacy dilemmas (…)
September 23rd, 2022, Starling Hotel, EPFL The Federal Council described cyberattacks as “a serious threat for Switzerland’s security and economy” and proposed a law for a reporting obligation for cyberattacks on critical infrastructures in its press release of January 12th 2022. These reports should allow the National Cybersecurity Centre (NCSC) to assess the threat situation (…)
This installment of C4DT’s Digital Governance Book Review focuses on Vili Lehdonvirta’s 2022 book Cloud Empires. How Digital Platforms are Overtaking the State and how we can Regain Control Cambridge, Massachusetts: The MIT Press, 283 pages.
An acutely current and fascinating analysis of the adverse effects digital platforms have on our societies.
The revamped course “Foundations of ICT and Digital Trust for Decision Makers” becomes a catalyst for responsible digital transformation. The 7th edition of this course took place throughout the week of October 31, 2022, in collaboration with the Fondation Lombard Odier.
For a side-project of mine I’m looking at Kademlia (Wikipedia), which is used in peer-to-peer (P2P) systems. One problem of P2P systems is that nodes come and go randomly. So it’s not easy to retrieve stored data. Where to store data? And then how to find it again? What happens if a node with the (…)
DevOps is rather a confusing term. Everyone uses it a lot and not everyone is able to define what it really means. Here are some thoughts of what our team think when we hear DevOps: CI/CD. Source-code, compilation. Kubernetes, Ops responsabilities. Automated tests. These are some good talking point, as they definitely have to be (…)
Some time ago I read the developer skill matrix and thought it was very interesting. I put it in the infamous “Read later” bookmark folder, and actually came back to it! So last Monday, during our regular group catchup time, I presented this page. In fact every week one of us three engineers presents something (…)
IC Tenure Track Assistant Professor Carmela Troncoso has won this year’s EPFL Latsis University Prize. She has been recognized by the Latsis Foundation for exceptionally important contributions at a Swiss university by researchers under the age of 40.
The Center for Digital Trust (C4DT) digital trust policy fellowship program supports scholars and practitioners working at the intersection of trust-building tech and public policy to identify, analyze, and respond to critical issues concerning digital trust, e.g., privacy protection, cyber security, artificial intelligence (AI) & machine learning (ML), digital ledgers, big data, or the internet of (…)
This installment of C4DT’s Digital Governance Book Review focuses on Bruce Schneier’s 2018 Click Here to Kill Everybody. Security and Survival in a Hyper-connected World New York; London: W.W. Norton & Company, 319 pages.
A must-read for anyone interested in the mounting cyber security challenges posed by the rapid growth of IoT-devices.
In “Click here to Kill Everybody”, computer security, privacy, and cryptography specialist Bruce Schneier argues for the pressing need for greater internet security in the wake of the unrelenting expansion of the Internet into our physical world, specifically the Internet of Things (IoT).
On the Digital Cooperation Day, the Geneva Internet Platform (GIP) will present the findings of the second edition of the Geneva Digital Atlas which maps overall digital developments in International Geneva. Based on this mapping, the discussion will be conducted with the UN Secretary-General’s envoy on technology (a key catalyst of the process towards the GDC) on priority policy questions for actors in Geneva. The discussion will include answers that the vibrant Geneva scene can provide to the global community.
Call for Applications (CfA): Become a Digital Trust Policy Fellow at C4DT and write cutting-edge, technology-grounded policy papers on current technological challenges in the area of digital trust! Check out our program website for more information. Deadline is November 1, 2022.
With the discussion of this book, the C4DT begins a new publication series, the Digital Governance Book Review: Hereafter, every month, we will summarize and contextualize a book we consider relevant. The book will be either a classic, whose lessons are worth recalling, or a new publication our readers should become aware of. Over the next two years, we plan to present approximately 25 books that we think will help our readers understand the essence of digitalization.
We begin the series with the now classic 2002 book by Milton Mueller Ruling the Root. Internet Governance and the Taming of Cyberspace. Cambridge, Mass.: MIT Press, 317 pages.
For our weekly meeting-presentation I took the stackoverflow-stats from 2022. Then with the team we went through it and discussed the different statistics. First I thought we’ll get bored quickly, but after 1h30 I had to push the meeting to other subjects. So here are some things we found: Developer Profile Learning how to code: (…)
Have you ever tried using ssh on a train? Or closed your laptop and found that all of your remote session are now frozen? Or using it via a crowded antenna tower? In all theses cases, ssh fails to work as expected. This is due to the fact that common ssh connections are transported via (…)