PET Links
The C4DT Factory team selected some Privacy Enhancing Technology (PET) links for you. They are all related to digital trust: security, privacy, trust in general, we have you covered!
The C4DT Factory team selected some Privacy Enhancing Technology (PET) links for you. They are all related to digital trust: security, privacy, trust in general, we have you covered!
Switzerland’s E-ID journey so far In 2021, the Swiss E-ID law proposition was rejected by a public referendum. The reason for the refusal was due to privacy concerns in the implementation and management of that system. In a nutshell, the idea that a private entity would be in control of users’ data was frowned upon. (…)
Switzerland’s E-ID journey so far In 2021, the Swiss E-ID law proposition was rejected by a public referendum. The reason for the refusal was due to privacy concerns in the implementation and management of that system. In a nutshell, the idea that a private entity would be in control of users’ data was frowned upon. (…)
May/June [tbc}, 2024, 10h00-12h00online Introduction The adoption of multicloud architectures is a strategic response to evolving organizational needs in today’s digital landscape. Motivations for this transition include mitigating risks, such as disaster recovery and business continuity. Diversifying across multiple cloud providers enables organizations to weather potential service outages by seamlessly shifting services to maintain business (…)
The Open-Source AI Models track draws attention to the pivotal role that open-source AI models play in the responsible development of artificial intelligence and highlights the challenges that this field faces, including ethical and responsible usage of AI models, sustainability, and licensing and legal issues.
The AI Safety track addresses the pressing need for responsible AI usage beyond sensationalized risks. While global leaders address extreme threats, the track spotlights often-overlooked but crucial challenges, such as bias mitigation, individuals’ privacy protection, generation of inaccurate or fabricated information, and AI alignment with human values. It serves as a platform for experts from diverse fields to share insights, tackle challenges, and suggest solutions for a safer, human-centric, and trustworthy AI future.
By Melanie Kolbe-Guyot, Head of Policy, C4DT It is no secret that we are in the midst of an intense technological rivalry among the great powers of the United States, China, and the European Union; a rivalry that encompasses economic, security, and geopolitical dimensions. The development, control, and weaponization of digital technologies has become (…)
February 29th, 2024, 10h00-11h45online Introduction In today’s rapidly evolving technological landscape, the adoption of private cloud solutions has become a strategic imperative for many organizations seeking enhanced security and control over their data. Additionally, by opting for an open-source cloud stack as the foundation of their private cloud solution, they commit to achieving greater transparency (…)
This book explores China’s agenda to establish itself as a cyber superpower through their strategic data governance approach, which, the author Aynne Kokas suggests, could pose a threat to global data autonomy.
Maya Frühauf of the Education Outreach Department of EPFL asked the C4DT to participate in a 1-day NFT workshop. The Collège Sismondi from Geneva organized a special “semaine informatique” for its students. The C4DT Factory prepared a hands-on workshop to show how to use NFTs. Habiba Zürcher created a project where the students made artwork (…)
In order to facilitate innovation and insights between academia, civil society, industry, and government on Digital Trust, C4DT established a global network of academic centers on the subject The goals of this group are to: Currently, the following centers are part of the network: Berkman Klein Center for Internet and Society Harvard University USA Blavatnik (…)
Establishing trust in AI relies on transparency. To realize this goal, we must overcome three critical challenges. How do we cultivate open-source AI, crucial for community development? How do we ensure clarity on data used in model training, handling copyright and bias concerns? How do we promote explainability, clearly delineating where AI is applicable and where it lacks maturity for extensive use? Join our session for a comprehensive exploration of AI transparency and its impact on trust and technology acceptance.
The C4DT launches 3 different initiatives to promote and enable trustworthy and sovereign cloud computing. They build on C4DT’s Conference on Trustworthy and Sovereign Cloud Computing, which was held in September 2023 at the Starling Hotel in St.-Sulpice, and discussions with our partners and conference participants. Each initiative targets a different challenge: C4DT Cloud Initiatives (…)
Bring together the Swiss formal methods and verification community, especially students and post-docs, for a day of informal talks.
[English] Ethics are critical to the IT field. That is why The International Committee of the Red Cross (ICRC) works digitally towards preserving the trust of interlocutors and communities they serve in order to access affected areas. During this webinar, their goal is to tell you about their backgrounds and how they got to work in ICT and cybersecurity at the ICRC.
Prof. Carmela Troncoso from the SPRING lab, together with Dr. Bogdan Kulynych gave us an introduction to how data can be leaked from any machine learning model. In the afternoon, led by the C4DT Factory team, the partners explored a set of data and discovered how one can measure this leakage, and how one can protect the model from leaking in the first place.
Course given under the GymInf program of swissuniversities by Linus Gasser.
Subjects for the course:
– why your opinion is worth money
– abusive data collection on personal devices
– protecting internet connections using TLS
– usefulness of blockchains for the decentralization of trust
– homomorphic cryptography for secure data sharing
– legislation on security and privacy in Switzerland, Europe, and elsewhere
Course given under the GymInf program of swissuniversities by Linus Gasser.
Subjects for the course:
– why your opinion is worth money
– abusive data collection on personal devices
– protecting internet connections using TLS
– usefulness of blockchains for the decentralization of trust
– homomorphic cryptography for secure data sharing
– legislation on security and privacy in Switzerland, Europe, and elsewhere
Course given under the GymInf program of swissuniversities by Linus Gasser.
Subjects for the course:
– why your opinion is worth money
– abusive data collection on personal devices
– protecting internet connections using TLS
– usefulness of blockchains for the decentralization of trust
– homomorphic cryptography for secure data sharing
– legislation on security and privacy in Switzerland, Europe, and elsewhere
This project aims to develop economically based terminology and conceptualizations as well as a sound understanding of digital markets and their regulation in order to propose key values for a Swiss digital policy with a focus on data policy. The resulting framework for analyzing the origins and effects of challenges in digital policy from an economic perspective will then be applied to current political and regulatory initiatives in Switzerland and the EU. Recommendations are derived from this.
For this Factory Update called “Ethical EOF” we invited Sylvain from Prof. Carmela Troncoso’s SPRING lab. He gave us an introduction to “Fully Homomorphic Encryption (FHE)”. We learnt how it can be used in privacy-preserving technologies (PET). Sylvain presented a use case to us which is federated learning. As FHE allows for performing data analysis (…)
The advent of digitalization has profoundly transformed societal and economic structures by reshaping traditional value chains into digital platform-driven networks, impacting various sectors, including public services in Switzerland. This project aims to examine the influence of digital platforms on Swiss public services and proposes recommendations for a digital policy.
On October 4th, C4DT brought together 20 stakeholders from the Swiss service public sector, administration, politics, civil society and academia to discuss the relationship between digital platforms and traditional physical public services. The goal was to explore the need for action, room for maneuver, and potential initiatives to develop recommendations for the formulation of a (…)
This website collects several ressources for technology policy paper writing. This collection is not exhaustive but periodically updated. What is a Policy Paper? Very succinctly and a bit simplified put: A policy paper is a concise summary of what is known about a particular issue or problem and what political actions are recommended to address (…)