Les systèmes de paiement en Suisse et en Europe sont largement contrôlés par les Etats-Unis. De récentes sanctions américaines contre des juges de la CPI ont mis en lumière ce quasi monopole. Le point sur les risques avec Jean-Pierre Hubaux, directeur académique de C4DT.
This case is groundbreaking because it’s the first time a jury has held social media companies legally accountable for harm caused by their platform designs, not just user content.The verdict challenges the tech industry’s traditional legal protections and directly links addictive platform features to mental health harm in young users. As a “bellwether” case, it (…)
I was pleasantly surprised to read this interesting article about SCION, Switzerland’s approach to improved internet routing and security. What struck me was Prof. Perrig’s preference for ‘optionality’ over ‘sovereignty’ — freedom to choose paths, trust roots or network. The solution works yet adoption stalls because organisations are ‘numb’ to known vulnerabilities and reluctant to (…)
While the future will tell whether smart glasses will catch on this time around, I use the occasion of its reappearance to take stock of the creeping loss of privacy both in private and public spaces over my lifetime and find it shocking. This guide gives good advice on the dos and don’ts when using (…)
Enjoy the ‘enshittificator’ video, then head to the Norwegian Consumer Council’s report for solutions. What’s heartening is the technical tools, know-how, and laws (in some jurisdictions) already exist to counter digital service deterioration. What’s missing is the political will to deploy and enforce them. But that takes time. Look at Ralph Nader’s 1960s auto safety (…)
This article points out that the ‘real digital sovereigns’ are the tech companies, who control all ‘vectors’ of sovereignty, from infrastructure, to data, AI models, and services. Beyond the US and China (and North Korea), the only realistic strategy for countries to gain control over their digital sovereignty will be to work together, whether through joining (…)
Je trouve cet article intéressant, car il apporte, par un professeur de droit reconnu, une clarification juridique précise sur le cloud en Suisse, distinguant clairement ce qui relève du droit de ce qui relève de la stratégie. Le Prof. Métille démontre qu’aucun obstacle juridique n’empêche l’utilisation de clouds américains certifiés DPF. Cette distinction est cruciale (…)
I always liked Anthropic’s stance of doing the right thing and setting standards with regards to security and ethics in LLMs. Unfortunately, they budged and will now only define ‘goals that we will openly grade our progress towards’. These goals will be non-binding, and future LLMs from Anthropic will blaze ahead even if they get (…)
I found this article interesting because it highlights the tension between protecting children online — not just on social media, but also on shopping, gambling and adult sites — and preserving privacy. The challenge of enforcing age laws without collecting sensitive data remains, regardless of whether the burden is placed on users or platforms. eID (…)
C4DT is organising a special edition of our bi-annual open-source software services meet-up with an external guest speaker, David Monniaux from Université Grenoble Alpes.
Other speakers from EPFL are Khadidja Malleck, RCP’s operational director, Prof. Mathias Payer, leader of the HexHive lab, and Rafael Corvalán, director of the DSI.
Click for more information
Let us celebrate a milestone in digital safety. The European Commission has found TikTok in breach of the EU Digital Services Act for its algorithms designed to hook users. This follows another recent win, with Australia’s social media ban on minors under the age of 16. While the wheels of governance move achingly slow in (…)
OpenClaw is just the latest in a series of AI-powered tools that turn out to be an absolute security nightmare. It is easy (and up to a certain point justified) to blame individual developers for lowering their guard and abandoning good security practices. On the other hand, there is an enormous pressure on developers nowadays (…)
Est-ce la faute aux utilisateurs qui n’ont pas bien respecté les règles ou au choix controversé, par les autorités, de l’infrastructure où la moindre erreur peut s’avérer grave et vraisemblablement répétitive? Tant que la réponse n’est pas claire, il n’y a pas de responsabilisation, et le problème risque de persister.
This article highlights a crucial reality: basic connectivity must exist before any digital transformation can take place. With only 38% of the population online, Africa’s digital divide represents both a massive challenge and an opportunity. It is fascinating to observe the competition between space-based solutions (Starlink, Amazon Leo) and submarine cables (Meta’s 2Africa, Google’s Equiano). (…)
Researchers at KU Leuven disclosed flaws in Google’s Fast Pair Bluetooth protocol that let attackers within Bluetooth range silently pair with seventeen different models of headphones or speakers made by ten different vendors, including Sony, Xiaomi, and even Google itself. This set of vulnerabilities enables cheap, practical hijacking, eavesdropping, and tracking of millions of earbuds (…)
AI agents are moving from prototypes to production as autonomous coders, analysts, designers, and decision tools. This track, organized by C4DT, unites experts in economics, cybersecurity, and law to examine productivity gains, new attack surfaces, and accountability. We’ll probe impacts on labor, competition, security-by-design, and how regulation and governance must evolve when agents cause harm.
This publication summarizes key insights shared by the speakers during the conference “Anticipating the agentic era: Assessing the disruptions by AI agents” organized by the C4DT on November 19th, 2025.
This article is interesting because it links digital trust to systemic AI dangers—not just small tech glitches. It predicts how in 2026 AI might spread lies, spy on people, or disrupt jobs and markets faster than today’s content‑moderation and governance mechanisms can manage. This leaves us to question who should control key AI technology.
I find this article interesting because it puts a spotlight on how the technical limits and product decisions of LLMs can shape, and sometimes distort, people’s perception of real-world events. It’s striking to see the same news prompt produce authoritative, up-to-date answers from some models and a blunt, incorrect denial from others, simply because of (…)
This technical talk points out several vulnerabilities in PGP implementations that are not caused by errors in the underlying cryptographic algorithms. It serves as a great reminder that software engineering is not just ‘writing code.’ To actually implement the entire stack correctly from algorithm to user interface, it is a craft that requires an understanding (…)
How does trust translate to social media use by children? Does it mean a ban on their access? Australia decided that children under the age of 16 are not allowed on social media. Companies are complying and installing age verification mechanisms to avoid fines. I’m looking forward to seeing how this large-scale experiment turns out.
📣 New Publication Alert! 📣
📽️ The recordings of the November 19th Conference on “Anticipating the Agentic Era: Assessing the Disruptions by AI Agents” are now accessible here