AI for Good is identifying innovative AI applications, building skills and standards, and advancing partnerships to solve global challenges.
The summit is organized by ITU in partnership with over 40 UN Sister Agencies and co-convened with the Government of Switzerland.
AI plays a vital role in the digitalization of the public sector. The strategy for integrating AI systems within the Swiss Federal Administration highlights the need for a multipronged approach. While I agree that developing skills and building trust are essential initial steps and likely top priorities, the true challenge lies in addressing the lack (…)
Restarting USAID and putting all payments on a blockchain? Why not? Well, for one, as one expert in the sector is quoted as saying: ‘I don’t think we were ever able to find an instance where people were using blockchain where they couldn’t use existing tools’. The Trump administration says that the move to blockchain (…)
Supply chain attacks will continue to hit the news in an increasingly interconnected development ecosystem as organizations rely on third-party components and actions. This seems inevitable. What I find interesting about this case is the threat actors’ approach to compromise software while it is still under development, which sets itself apart from attacks such as (…)
This investigation highlights a crucial cybersecurity reality: while we often focus on sophisticated zero-day exploits, the greater threat comes from known vulnerabilities and misplaced trust. One million Android devices weren’t compromised through cutting-edge techniques but through traditional means – preinstalled backdoors and users installing unvetted apps outside official stores. The victims were vulnerable because they (…)
Interesting to see y-combinator, an incubator for early-stage startups, supporting an EU directive. They say that the European Digital Markets Act actually allows smaller companies to grow, by limiting what the behemoths of the market are allowed to do. Who would’ve thought that at least one of the regulations gets supported by the US Startup (…)
We often hear or talk about ‘IT for good’ and ‘responsible behaviour’ in the digital world, assuming a single universal common understanding of what’s good and what’s responsible. Things start to get confusing when we think about for whom a service or action is good or responsible: for all humanity, including the ‘bad guys’? for (…)
This symposium is jointly organized by Trust Valley and Groupe Mutuel. It is part of the Tech4Trust Roadshow event series, which supports startups in the field of cybersecurity and digital trust. Expect insightful panel discussions and engaging startup pitches. During this Roadshow, discover the issues and challenges related to Ethical & Explainable AI, economy of data, data privacy, data security. C4DT’s academic director Jean-Pierre Hubaux will speak at the event. More information will follow.
My colleague Melanie’s pick last week about Swiss supermarket chain Coop using AI-supported video surveillance in its stores for security purposes reminded me of the recent revelation that American supermarket chain Kroger may be engaging in surveillance pricing, i.e., using algorithms and data collected on customers (including through facial recognition technology) to determine the highest (…)
I find China’s attempt to treat data as a formal business asset quite interesting, especially given the massive amount of data the country generates. Companies seem reluctant to adopt this policy though, with only 283 out of 60 million companies participating. But it is still early days, and the months and years to come will (…)
Nobody would seriously argue that a chat bot can replace school counselors in helping pupils taking their first steps on their career paths. However, in the face of a shortage of counselors, aren’t chat bots better than no guidance at all? I like this article for its nuanced discussion of young people relying on specialized (…)
Undersea telecommunication cables are an invisible but integral part of the central nervous system of our digital society. With digitalization encroaching on ever more parts of our day-to-day lives, we become ever more dependent on telecommunication infrastructure. All the more worrying is the string of ‘incidents’ involving the undersea cables in recent years, many of (…)
With physical media, no one can reach into your home and remove what you bought from your shelf.’ Not only can Amazon delete books remotely, the shift towards cloud-based storage for e-books means that copies can be modified by Amazon and publishers at will. With the rapid pace of change in the political environment, it (…)
Bien que la tech du Silicon Valley se plaint toujours de la régulation, je pense que l’état actuel des choses est bien en leur faveur. Laisser ces réseaux dicter la narration, qui est suivie par la plus grande partie de la population, a déjà passablement érodé la confiance dans les organisation étatiques. Vu que les (…)
The article reports that the US may have paused its offensive cyber operations against Russia, suggesting it is likely part of a broader diplomatic strategy to encourage talks over the Ukraine conflict, or to possibly focus more on addressing cyber threats posed by China. Scaling back offensive actions without reciprocal guarantees risks exposing critical infrastructure (…)
‘Quantum computing applications may become practical within the next 5 years’, according to recent claims by Microsoft and Google, both of which released statements within days of each other. The fact that these two rival tech giants made the same prediction at the same time lends credibility to the statement, especially given the ongoing global (…)
What started as a small-scale hacking contest in 2008, has now become one of the largest cybersecurity events in Switzerland and neighboring Europe, as well as one of the largest on-site CTF’s worldwide gathering a wide spectrum of cybersecurity professionals and enthusiasts from all over the globe.
Eye of the Cyber – Create Tomorrow. With the new motto, the Swiss Cyber Security Days is addressing the urgency of actively and courageously shaping the digital future. The focus is on the challenges of cyberspace and the potential of new technologies.
EPFL has set up a Mastodon server for the School community, allowing members to post and share content in a way that’s aligned with the values of open science. We opted for Mastodon because independence and effective communication tools are critical.
Matrix is a widely used open source chat platform. It is an alternative to platforms such as Slack and MSTeams. In line with C4DT’s objective to promote services in the realm of digital trust, we set up our own Matrix instance and migrated our professional communications there in 2019. A privacy-first approach with encrypted chat (…)
Donald Trump’s new Department of Government Efficiency, led by Elon Musk, is set to transform the US Digital Service into the US DOGE Service, ostensibly to modernize federal technology. However, there are indications that the true focus is on cost-cutting and workforce reduction, as evidenced by executive orders mandating a government-wide hiring freeze and allowing (…)
UBS has completed a proof-of-concept (PoC) for its ‘UBS Key4 Gold’ offering on the Ethereum layer-2 network, zkSync. I liked UBS’s step-by-step progress toward adopting blockchain technologies. Initially, the company implemented its private blockchain network, leveraging the inherent traceability of blockchain. Now, with this PoC, UBS is seeking scalability by deploying its ‘UBS Key4 Gold’ (…)
Interesting work from OpenAI, who are testing how good their models are at convincing people to change their minds. Currently, they’re running the tests only internally on pre-selected human testers. But who knows where this will eventually be used, and whether in the open or hidden? For that matter, what about the LLM-generated messages Meta (…)
The new laws targeting AI-generated CSAM position the UK as the first nation to criminalize the possession, creation, or distribution of AI tools used for generating such material, imposing penalties of up to five years in prison. These measures also prohibit related manuals, penalize those operating websites that share CSAM, and grant Border Force the (…)