Skip to content

Meta and YouTube found negligent in landmark social media addiction case

This case is groundbreaking because it’s the first time a jury has held social media companies legally accountable for harm caused by their platform designs, not just user content.The verdict challenges the tech industry’s traditional legal protections and directly links addictive platform features to mental health harm in young users. As a “bellwether” case, it (…)

Switzerland built a secure alternative to BGP. The rest of the world hasn’t noticed yet

I was pleasantly surprised to read this interesting article about SCION, Switzerland’s approach to improved internet routing and security. What struck me was Prof. Perrig’s preference for ‘optionality’ over ‘sovereignty’ — freedom to choose paths, trust roots or network. The solution works yet adoption stalls because organisations are ‘numb’ to known vulnerabilities and reluctant to (…)

Think Twice Before Buying or Using Meta’s Ray-Bans

While the future will tell whether smart glasses will catch on this time around, I use the occasion of its reappearance to take stock of the creeping loss of privacy both in private and public spaces over my lifetime and find it shocking. This guide gives good advice on the dos and don’ts when using (…)

‘Another internet is possible’: Norway rails against ‘enshittification’

Enjoy the ‘enshittificator’ video, then head to the Norwegian Consumer Council’s report for solutions. What’s heartening is the technical tools, know-how, and laws (in some jurisdictions) already exist to counter digital service deterioration. What’s missing is the political will to deploy and enforce them. But that takes time. Look at Ralph Nader’s 1960s auto safety (…)

Digital sovereignty stack: Infrastructure, services, data, and AI knowledge

This article points out that the ‘real digital sovereigns’ are the tech companies, who control all ‘vectors’ of sovereignty, from infrastructure, to data, AI models, and services. Beyond the US and China (and North Korea), the only realistic strategy for countries to gain control over their digital sovereignty will be to work together, whether through joining (…)

Souveraineté numérique et cloud: les clarifications de l’avocat Sylvain Métille

Je trouve cet article intéressant, car il apporte, par un professeur de droit reconnu, une clarification juridique précise sur le cloud en Suisse, distinguant clairement ce qui relève du droit de ce qui relève de la stratégie. Le Prof. Métille démontre qu’aucun obstacle juridique n’empêche l’utilisation de clouds américains certifiés DPF. Cette distinction est cruciale (…)

Can social media age verification really protect kids?

I found this article interesting because it highlights the tension between protecting children online — not just on social media, but also on shopping, gambling and adult sites — and preserving privacy. The challenge of enforcing age laws without collecting sensitive data remains, regardless of whether the burden is placed on users or platforms. eID (…)

From magic to malware: How OpenClaw’s agent skills become an attack surface

OpenClaw is just the latest in a series of AI-powered tools that turn out to be an absolute security nightmare. It is easy (and up to a certain point justified) to blame individual developers for lowering their guard and abandoning good security practices. On the other hand, there is an enormous pressure on developers nowadays (…)

Des données suisses sensibles stockées dans un cloud américain

Est-ce la faute aux utilisateurs qui n’ont pas bien respecté les règles ou au choix controversé, par les autorités, de l’infrastructure où la moindre erreur peut s’avérer grave et vraisemblablement répétitive? Tant que la réponse n’est pas claire, il n’y a pas de responsabilisation, et le problème risque de persister.

Big Tech is racing to own Africa’s internet

This article highlights a crucial reality: basic connectivity must exist before any digital transformation can take place. With only 38% of the population online, Africa’s digital divide represents both a massive challenge and an opportunity. It is fascinating to observe the competition between space-based solutions (Starlink, Amazon Leo) and submarine cables (Meta’s 2Africa, Google’s Equiano). (…)

Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking

Researchers at KU Leuven disclosed flaws in Google’s Fast Pair Bluetooth protocol that let attackers within Bluetooth range silently pair with seventeen different models of headphones or speakers made by ten different vendors, including Sony, Xiaomi, and even Google itself. This set of vulnerabilities enables cheap, practical hijacking, eavesdropping, and tracking of millions of earbuds (…)

AMLD Intelligence Summit 2026 – Assessing the Disruption by AI Agents: Economic, Security and Legal Perspectives

AI agents are moving from prototypes to production as autonomous coders, analysts, designers, and decision tools. This track, organized by C4DT, unites experts in economics, cybersecurity, and law to examine productivity gains, new attack surfaces, and accountability. We’ll probe impacts on labor, competition, security-by-design, and how regulation and governance must evolve when agents cause harm.

6 Scary Predictions for AI in 2026

This article is interesting because it links digital trust to systemic AI dangers—not just small tech glitches. It predicts how in 2026 AI might spread lies, spy on people, or disrupt jobs and markets faster than today’s content‑moderation and governance mechanisms can manage. This leaves us to question who should control key AI technology.

The US Invaded Venezuela and Captured Nicolás Maduro. ChatGPT Disagrees

I find this article interesting because it puts a spotlight on how the technical limits and product decisions of LLMs can shape, and sometimes distort, people’s perception of real-world events. It’s striking to see the same news prompt produce authoritative, up-to-date answers from some models and a blunt, incorrect denial from others, simply because of (…)

To sign or not to sign: Practical vulnerabilities in GPG & friends

This technical talk points out several vulnerabilities in PGP implementations that are not caused by errors in the underlying cryptographic algorithms. It serves as a great reminder that software engineering is not just ‘writing code.’ To actually implement the entire stack correctly from algorithm to user interface, it is a craft that requires an understanding (…)