Skip to content

How to reclaim power in the digital world? – A Conversation with Bruce Schneier

Bruce Schneier is an internationally renowned authority on technology and security with a level-headed, must-hear message for any audience concerned about our digital security and privacy. Called a “security guru” by The Economist, Bruce is the author of sixteen books, including the New York Times bestseller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.

How to build Trust in Decentralized Finance?

For this year’s edition of the Finance & Technology Conference the Swiss Finance Institute (sfi) and the Center for Digital Trust (C4DT), EPFL are teaming up again to focus on Decentralized Finance (DeFi). The conference will be held on Thursday 26th of April at the Starling Hotel @ EPFL, Switzerland.

For more information and the agenda please click here.

UNIL Digiweek conference

Blockchain, smart contracts, cryptocurrencies, platforms, big data – new technologies are challenging lawyers. They must grasp the main social, economic and technical challenges of digitalisation and find the right legal instruments to react to the upheavals caused by digital technology. This is the perspective of the “Digitalisation Week”.

Mob programming – Adventofcode Day 12

During the month of December, Advent of Code passes out a new puzzle every day. The daily challenges are a fun way to learn new algorithms and getting to know new ways of programming. In our software engineering team we followed along at least the first half of the programming challenges and enjoyed discussing the solutions (…)

Software Supply Chain Security Conference 2023

The past two years saw a new vulnerability make headlines: software supply chains. Events such as the SolarWinds and Kaseya cyberattacks or the discovery of the Log4j vulnerability forced organizations to reevaluate their cyber risk exposure.

This one-day conference provides a platform for academia, government, business, NGOs and standard-setting bodies to shed light on software supply chain risks, outline persisting challenges, and discuss mitigation tactics, solutions, and best practices as well as emerging frameworks and standardization initiatives.

For more information click here.

eBPF: fast bytecode for the kernel

Why? Nowadays, Linux is deployed in many component of the network fabric. Your home NAT probably runs it, your datacenter’s router also. As it needs to handle incoming packet on gigabits links, the speed at which the system handles the packets becomes important. If you run your router in user-space, the kernel needs to read (…)

Finance and Technology Conference 2021

November 5th, 2021, Swiss Tech Convention Center, EPFL Distributed Ledger Technology has the potential to reshape the traditional financial system. An example is decentralized finance, which allows people to combine open-source building blocks into sophisticated financial products utilizing DLT. Central banks, as another example, face growing competition from private actors offering their own digital alternative (…)

AI & Ethics Week

February 7-11th, 2022, online Artificial Intelligence holds great promise for the economy and society. It has also led to the explosion of new ethical challenges, such as biased decision making, filter bubbles, data protection, face recognition, deep fakes and cyber security. During this week we aim to create awareness of the ethical and privacy dilemmas (…)

C4DT Conference on Cyberattack Reporting Obligation

September 23rd, 2022, Starling Hotel, EPFL The Federal Council described cyberattacks as “a serious threat for Switzerland’s security and economy” and proposed a law for a reporting obligation for cyberattacks on critical infrastructures in its press release of January 12th 2022. These reports should allow the National Cybersecurity Centre (NCSC) to assess the threat situation (…)

Digital Governance Book Review: Cloud Empires (2022)

This installment of C4DT’s Digital Governance Book Review focuses on Vili Lehdonvirta’s 2022 book Cloud Empires. How Digital Platforms are Overtaking the State and how we can Regain Control Cambridge, Massachusetts: The MIT Press, 283 pages.

An acutely current and fascinating analysis of the adverse effects digital platforms have on our societies.
 
 

7th edition of Foundations of ICT and Digital Trust for Decision Makers course

The revamped course “Foundations of ICT and Digital Trust for Decision Makers” becomes a catalyst for responsible digital transformation. The 7th edition of this course took place throughout the week of October 31, 2022, in collaboration with the Fondation Lombard Odier.

Revisiting Kademlia

For a side-project of mine I’m looking at Kademlia (Wikipedia), which is used in peer-to-peer (P2P) systems. One problem of P2P systems is that nodes come and go randomly. So it’s not easy to retrieve stored data. Where to store data? And then how to find it again? What happens if a node with the (…)

What is DevOps?

DevOps is rather a confusing term. Everyone uses it a lot and not everyone is able to define what it really means. Here are some thoughts of what our team think when we hear DevOps: CI/CD. Source-code, compilation. Kubernetes, Ops responsabilities. Automated tests. These are some good talking point, as they definitely have to be (…)

Developer skill matrix

Some time ago I read the developer skill matrix and thought it was very interesting. I put it in the infamous “Read later” bookmark folder, and actually came back to it! So last Monday, during our regular group catchup time, I presented this page. In fact every week one of us three engineers presents something (…)

Digital Trust Policy Fellowship Program

The Center for Digital Trust (C4DT) digital trust policy fellowship program supports scholars and practitioners working at the intersection of trust-building tech and public policy to identify, analyze, and respond to critical issues concerning digital trust, e.g., privacy protection, cyber security, artificial intelligence (AI) & machine learning (ML), digital ledgers, big data, or the internet of (…)

Book Review: Click Here to Kill Everybody (2018)

In “Click here to Kill Everybody”, computer security, privacy, and cryptography specialist Bruce Schneier argues for the pressing need for greater internet security in the wake of the unrelenting expansion of the Internet into our physical world, specifically the Internet of Things (IoT).

Digital Cooperation Day: Discussion on the Global Digital Compact

On the Digital Cooperation Day, the Geneva Internet Platform (GIP) will present the findings of the second edition of the Geneva Digital Atlas which maps overall digital developments in International Geneva. Based on this mapping, the discussion will be conducted with the UN Secretary-General’s envoy on technology (a key catalyst of the process towards the GDC) on priority policy questions for actors in Geneva. The discussion will include answers that the vibrant Geneva scene can provide to the global community.

Digital Governance Book Review: Ruling the Root (2002)

With the discussion of this book, the C4DT begins a new publication series, the Digital Governance Book Review: Hereafter, every month, we will summarize and contextualize a book we consider relevant. The book will be either a classic, whose lessons are worth recalling, or a new publication our readers should become aware of. Over the next two years, we plan to present approximately 25 books that we think will help our readers understand the essence of digitalization.

We begin the series with the now classic 2002 book by Milton Mueller Ruling the Root. Internet Governance and the Taming of Cyberspace. Cambridge, Mass.: MIT Press, 317 pages.

Having fun with stackoverflow stats

For our weekly meeting-presentation I took the stackoverflow-stats from 2022. Then with the team we went through it and discussed the different statistics. First I thought we’ll get bored quickly, but after 1h30 I had to push the meeting to other subjects. So here are some things we found: Developer Profile Learning how to code: (…)

mosh: the mobile shell

Have you ever tried using ssh on a train? Or closed your laptop and found that all of your remote session are now frozen? Or using it via a crowded antenna tower? In all theses cases, ssh fails to work as expected. This is due to the fact that common ssh connections are transported via (…)