Skip to content

Spain launches tool to monitor online hate speech

I like the idea behind this tool because it tackles a serious online societal problem. I’m curious if and how it will pass the test of time. The key challenge will be to link subjective criteria to objective metrics – a problem we’ve seen with privacy, which still lacks objective benchmarks despite substantial research. But (…)

AI Agents Can Unmask Anonymous Online Identities

This article caught my attention because it exposes the threat of de-anonymization that AI agents pose and its consequences for online privacy. The author writes that ‘the implications stretch far beyond embarrassing social media reveals’ and points out that whistleblowers who reveal corporate misconduct and government corruption, journalists who shield their informants, and political dissidents (…)

India’s tech sovereignty is built on digital dependence

This analysis of India’s technological dependence reveals patterns that are also applicable to Europe. Attracting foreign tech companies to invest locally ultimately results in profits being exported abroad, exemplifying a kind of digital colonialism. In my opinion, the solution lies in a demand-side strategy that favors local and open-source products over monopolies such as Microsoft (…)

Digital sovereignty stack: Infrastructure, services, data, and AI knowledge

This article points out that the ‘real digital sovereigns’ are the tech companies, who control all ‘vectors’ of sovereignty, from infrastructure, to data, AI models, and services. Beyond the US and China (and North Korea), the only realistic strategy for countries to gain control over their digital sovereignty will be to work together, whether through joining (…)

Global Digital Collaboration Conference 2026

Organized by intergovernmental and non-governmental organizations, particularly standard development and open source organizations, this event will bring together 2,000 sector leaders by invitation only through co-organizers. Over the course of three days, participants will explore the global pulse of cross-sector innovation, with the primary objective of bridging gaps and solving interoperability challenges.

AI for Good Global Summit

The AI for Good Global Summit brings together experts, policymakers, and innovators to explore how artificial intelligence can help address global challenges and achieve the United Nations Sustainable Development Goals. It has become a major global platform for promoting responsible and beneficial use of AI.

FBI erhält Daten über anonymes E‑Mail-Konto bei Proton Mail

Sogar für eine Firma, die die Privatsphäre als Aushängeschild verwendet, ist es nicht immer einfach, ihre Benutzer zu beschützen: Obwohl die E-Mails selbst verschlüsselt sind, gibt es viele Metadaten. In diesem Fall war es die Zahlung mit einer VISA-Karte, die den Benutzer einer E-Mail-Adresse verriet. Ich finde es interessant, dass Proton laut einem eigenen Bericht (…)

Iranian strikes test the Gulf’s trillion-dollar AI dream

This article illustrates the brutal economics of modern conflict and the fragility of digital infrastructures. Relatively inexpensive drones can render billion-dollar data centers ineffective, calling into question their placement in supposedly “stable” regions. For me, a question remains: What explains the apparent lack of cyberattacks by Iran? Have the U.S. and Israel blocked such attempts (…)

Insomni’Hack – Swiss Cybersecurity Conference

Insomni’hack is a five-day cybersecurity event featuring intensive workshops (Mon-Wed) and expert talks (Thu-Fri), culminating in an overnight Capture the Flag (CTF) competition. The CTF challenges 700 participants in teams of up to eight to solve security puzzles and exploit vulnerabilities. Beyond technical training, the event serves as a key networking hub for cybersecurity professionals and enthusiasts, fostering a community-oriented environment that welcomes participants of all skill levels.

I hacked ChatGPT and Google’s AI – and it only took 20 minutes

This article is quite unnerving: a twenty‑minute hack shows how data‑poisoning can make LLMs tell tall tales, turning sci‑fi fears into real business risk. It’s a wake‑up call to demand provenance, adversarial robustness assessment and scepticism—because trusting chatbots without checking is like relying on a smooth-talking oracle with a hidden agenda. Critical thinking remains your (…)

EPFL Engineering Industry Day – Roundtable on Quantum Demystified: Cyberrisks and Industry Responses

As quantum technologies move from research to engineering reality, organizations must navigate both technical and governance challenges to keep digital infrastructures trustworthy. This roundtable, organized by C4DT, explores how Swiss actors—public and private—are preparing for post‑quantum security, drawing on armasuisse’s strategic threat assessment, Swisscom’s journey toward quantum-safe operations, and Kudelski’s expertise in robust crypto implementations and root-of-trust solutions.

Inspectors sound the alarm – will the e-ID come later than planned?

The Swiss eID audit highlights a trade‑off: release on schedule with fewer security features, or delay to strengthen protection. Christopher Allen, from his work on the TLS protocol, offers three lessons for eID: bugs expected to be fixed in 3–5 years can take 20; the mindset for designing a 20‑year architecture differs from the startup (…)

Mark Zuckerberg overruled 18 wellbeing experts to keep beauty filters on Instagram

This case is striking in that, while we usually focus on the risks of data theft and profiling from Big Tech, the core threat here is addiction and its devastating long-term impact on the mental health of young people, such as depression, anxiety and body dysmorphia. Internal documents prove that Meta was aware of the (…)

Passwortmanager bieten weniger Schutz als versprochen

Eine Studie über Open-Source Passwort-Managern, die die Passwörter in der Cloud speichern. Da die Programme öffentlich einsehbar sind, hat ein Student von der ETHZ nach Schwachstellen gesucht, und einige gefunden. Alle Fehler waren nur durch einen bösartigen Betreiber ausnutzbar, hatten aber zur Folge, dass Passwörter veränderbar oder sogar einsehbar waren. Die drei Passwort-Manager haben die (…)

Wero payments and the evolution of digital payments in Europe

Europe’s economy now largely runs on digital payments, making reliance on U.S. card rails a systemic exposure. Sanctions, policy shifts, outages, and data-access demands can all cause economic shocks. This is precisely why Wero is both interesting and timely: it is a bank-led, pan-European layer that can reduce strategic dependency. I’m eager to see transparent (…)

An Agent Revolt: Moltbook Is Not A Good Idea

This article is interesting because it shifts the Moltbook debate away from sci‑fi “bot consciousness” and toward concrete security architecture risks. What could possibly go wrong when thousands of OpenClaw‑like agents —with full root access to their owners’ machines— are frolicking in a shared, untrusted environment, swapping prompts, payloads, and jailbreak tricks? His advice is (…)

EU tech chief sounds alarm over dependence on foreign tech

The volatile start to 2026 has shaken the foundation of global digital trust. Digital sovereignty has always been a running theme in the background of European conversations around tech, but this year, it is likely to be front and center, as governments and businesses scramble to seek digital solutions that provide reliable data security and (…)

Big Tech is racing to own Africa’s internet

This article highlights a crucial reality: basic connectivity must exist before any digital transformation can take place. With only 38% of the population online, Africa’s digital divide represents both a massive challenge and an opportunity. It is fascinating to observe the competition between space-based solutions (Starlink, Amazon Leo) and submarine cables (Meta’s 2Africa, Google’s Equiano). (…)

AI companies will fail. We can salvage something from the wreckage

Beyond the author’s predictions for the AI bubble’s aftermath, what struck me most was his explanation of ‘accountability sinks’—people who take the blame for AI’s mistakes. Understanding this concept, which emerges from examining AI companies’ business model, leads to a crucial insight: it’s not just white-collar workers whose jobs will be eliminated, but specifically those (…)

AMLD Intelligence Summit 2026 – AI & Media, how to secure and verify info?

AI empowers journalists by enabling rapid access to and analysis of vast document sets, but it also brings risks: it can be misused to unmask anonymous sources or to fabricate convincing misinformation. Without strong governance, AI may hallucinate, producing false or defamatory claims. In this track, co‑organized by C4DT, we highlight the needs and tools for robust safeguards to ensure that AI strengthens, rather than undermines, journalistic integrity.

UK threatens action against X over sexualised AI images of women and children

This article highlights the vital role of governments and regulators in ensuring responsible digital innovation and protecting citizens—especially vulnerable groups—from AI-driven exploitation. It also raises the issue of digital sovereignty, showing that regulation is not just technical or legal but shaped by geopolitical pressures. For instance, action against the nudifier tool on Musk’s X platform (…)

6 Scary Predictions for AI in 2026

This article is interesting because it links digital trust to systemic AI dangers—not just small tech glitches. It predicts how in 2026 AI might spread lies, spy on people, or disrupt jobs and markets faster than today’s content‑moderation and governance mechanisms can manage. This leaves us to question who should control key AI technology.