Search Results for: all
Trust Valley Day
The Trust Valley is pleased to invite you ONLINE on October 4th for the annual event of the Trust Valley.
Trust Valley sets off at EPFL
An alliance for excellence supported by multiple public, private and academic actors, the “TRUST VALLEY” was launched on Thursday, October 8, 2020. Cantons, Confederation, academic institutions and captains of industry such as ELCA, Kudelski and SICPA, come together to co-construct this pool of expertise and encourage the emergence of innovative projects.
Please click below for more information.
Vaud and Geneva join forces to create the Trust Valley
Building on the expertise of 300 companies and 500 experts, the Vaud and Geneva Cantons of Switzerland are launching the Trust Valley, a public private cooperation for safe digital transformation, cybersecurity and innovation. Among the founding partners are C4DT members ELCA, Kudelski Group and SICPA.
For more information please click below.
Crypto Valley Conference 2020
The 3rd edition of the Crypto Valley Conference will be held on On June 11-12 in Rotkreuz, Switzerland, with two days of in-depth discussions on the current state and future of blockchain technology.
More information will follow shortly. To access the event’s website, click below.
Launch event – Crypto Valley Association Western Chapter
The Crypto Valley is now connecting Zug with Romandie. The Valley is Switzerland in its integrality, and beyond. To celebrate this major step, the Crypto Valley Association is officially launching its Western Switzerland Chapter on December 02 at EPFL, Lausanne. Join them in order to meet the dynamic local blockchain and crypto community. During the event, a specific focus will be kept on crypto finance, digital assets and blockchain education.
December 2nd, 2019 @ 17:00-19:00, Polydôme EPFL
All Your Clicks Belong to Me: Investigating Click Interception on the Web
By Prof. Wei Meng, Chinese University of Hong Kong
Click is the prominent way that users interact with web applications. Attackers aim to intercept genuine user clicks to either send malicious commands to another application on behalf of the user or fabricate realistic ad click traffic. In this talk, Prof. Wei Meng investigates the click interception practices on the Web.
Tuesday July 23rd, 2019 @10:00, room BC 420
Explaining AI for Everyone : Promises and Challenges of the Black Box Approach
Citizens have a right to an explanation of the decisions affecting them. However, if AIs are to be used in decision procedures, how can we explain complex AI systems to the general public, while so many computer scientists find them inscrutably opaque? In this presentation, an optimistic approach to this seemingly hopeless question will be presented.
Parallel Systems Architecture Laboratory
Cloud computing
Anticipating the Agentic Era: Assessing the Disruptions by AI Agents
This full-day conference explores the potential disruptions caused by the rise of AI agents and their impact on existing systems and structures. Bringing together industry leaders, researchers, policymakers, and stakeholders, the event will facilitate in-depth discussions on the challenges and opportunities presented by AI agents. Participants will assess the risks, examine strategies to mitigate emerging threats, and collaborate on establishing resilient frameworks for responsible innovation.
This event is organized by the Center for Digital Trust (C4DT) at EPFL.
Recap of the eID Privacy Hands-on Workshop
The Center for Digital Trust hosted a successful workshop on Privacy-Preserving eID last week. We welcomed 14 participants from seven partner organizations including Be-Ys, ELCA, FOITT, Kudelski, SICPA, Swiss Post/SwissSign, and Swisscom. The day-long event combined theoretical foundations with hands-on technical demonstrations. Our focus centered on swiyu, Switzerland’s proposed eID project developed by FOITT, and (…)
Air Traffic Control in the US Still Runs on Windows 95 and Floppy Disks
This article highlights the alarming reliance of critical infrastructure on outdated technology, exposing significant vulnerabilities in essential systems. The need for uninterrupted operation and compatibility requirements presents major challenges to the modernization of these legacy systems, and the costs to upgrade are steep. Yet the potential for catastrophic failure due to obsolete equipment underscores the (…)
The NO FAKES Act Has Changed – and It’s So Much Worse
This article highlights significant flaws within the proposed NO FAKES Act, whose repercussions would extend far beyond U.S. borders. I found it particularly insightful because of the parallels it draws between this bill and existing mechanisms for addressing copyright infringement, outlining how the deficiencies within the latter are likely to be mirrored in the former.
What happens when you feed AI nothing
Driven by ethical concerns about using existing artwork to train gen AI models, an artist created his own model that produces output untrained on any data at all. What was interesting to me is that, in exploring whether gen AI could create original art, he also demonstrated a potential path to better understanding how such (…)
The lethal trifecta for AI agents: private data, untrusted content, and external communication
As LLM agents become ‘en vogue’, we need to rethink the attacks they open to malicious third parties. Here Simon Willison describes a combination often seen in such agents that will put your private data at risk. Unfortunately, there is currently not much you can do, except be aware that all the data that agents (…)
Menstrual tracking app data is a ‘gold mine’ for advertisers that risks women’s safety – report
Cycle tracking apps are not only helpful for those trying to conceive, but also serve as important tools for keeping track of one’s general reproductive health. As this article discusses, however, such tools can quickly become a double-edged sword due to the high value of the data they collect, which can potentially end up in (…)
Techno-Legal Internet Controls in Indonesia and Their Impact on Free Expression
This article underscores that neither digital policies nor technologies can be discussed in isolation. Using Indonesia as an example, it lays out how the country’s laws and regulations on internet content are actually implemented by the ISPs and examines how the combination of vaguely worded laws and sweeping filtering methods ultimately impacts citizens’ access to (…)
In a world first, Brazilians will soon be able to sell their digital data
This article is interesting because it highlights the opportunities and challenges of personal data ownership. Although tools such as dWallet claim to empower users, they can encourage the poorest and least educated people to sell their data without understanding the risks, thereby widening the digital divide. True data empowerment means that everyone must have the (…)
Global Digital Collaboration Conference 2025
To foster wallets, credentials and trusted infrastructure for the benefit of all humans. Leading organizations from across the globe coming together to shape the future of digital identity, in particular in the realm of secure, interoperable wallets, credentials and trusted infrastructure.
Disclosure: Covert Web-to-App Tracking via Localhost on Android
That is a very nice attack on privacy-protection in the mobile browsers: even if you don’t allow any cookies and don’t consent on being tracked, you’re browsing behaviour is still tracked. The idea of communicating from the mobile browser to your locally installed app is technically very interesting, and seems to be difficult to avoid (…)
Atlas of Automation Switzerland: AlgorithmWatch CH sheds light on the algorithmic black box
This atlas of algorithmic systems curated by AlgorithmWatch CH is a nonexhaustive yet revealing list of algorithms currently deployed in Switzerland, whether to ‘predict, recommend, affect or take decisions about human beings’ or to ‘generate content used by or on human beings.’ The atlas is really eye-opening for me – so many systems that we (…)
‘Ghost Student’ Bots Steal Millions from California Colleges
Agentic AI has only recently emerged, yet it is already being used to commit fraud. This trend is not new; historically, fraudsters have exploited new technologies to target unsuspecting users and weak security systems, as seen with the first instances of voice phishing during the rise of telephony in the early 20th-century. These challenges have (…)
C4DT Insight #3 on privacy-preserving data sharing is out!
This policy paper highlights the crucial trade-off between privacy and utility in data sharing and call for a shift from technology-centric solutions to purpose-driven policies. The paper formulates eight actionable recommendations to guide realistic, privacy-preserving data-sharing practices in Europe.
Swiss AI Weeks
Join the movement! Swiss {ai} Weeks calls on researchers, developers, businesses, and citizens to come together and build the future of AI — hands-on, ethical, and open. This isn’t just exploration, it’s collaboration in action.