Skip to content

Air Traffic Control in the US Still Runs on Windows 95 and Floppy Disks

This article highlights the alarming reliance of critical infrastructure on outdated technology, exposing significant vulnerabilities in essential systems. The need for uninterrupted operation and compatibility requirements presents major challenges to the modernization of these legacy systems, and the costs to upgrade are steep. Yet the potential for catastrophic failure due to obsolete equipment underscores the (…)

Amazon will nicht, dass die Republik Verträge mit dem Bund sieht

Digitale Souveränität und doch bei einem der ‘Großen’ einkaufen? Mit diesem Versprechen sind US-amerikanische Tech-Giganten in den letzten Jahren in Europa werben gegangen. Doch wie passt das zusammen mit dem Versuch der schweizerischen Öffentlichkeit die Details der Rahmenverträge mit dem Bund vorenthalten zu wollen?

Microsoft open sources Windows Subsystem for Linux – well, most of it

It’s fascinating to see the tightrope dance Microsoft is doing with open source. While most of its operating system is closed source, Microsoft actively participates in several open source projects and provides some of its programs under an open source license. Open sourcing is beneficial because it allows security researchers to examine the source code (…)

How agentic AI can drive workforce transformation

‘I call it the ‘AI dilemma’: while AI may threaten many jobs, it also serves as an essential tool to mitigate its own impact by boosting re-skilling and upskilling initiatives. I appreciate this article because it demonstrates how agentic AI can be employed in lifelong learning systems to reduce skill gaps, which are in part (…)

White House scraps plan to block data brokers from selling Americans’ sensitive data

A senior official in the Trump administration has withdrawn a proposal that would have prevented data brokers from selling Americans’ personal and financial information, leaving these companies exempt from federal privacy regulations that apply to other companies. It’s puzzling that sharing health data requires strict consent and safeguards, while other personal data can be shared (…)

Das neue Policy Paper C4DT Insight #2 mit dem Titel “Datenstrategie,-Policy und -Regulierung für die Schweiz” ist erschienen!

Melanie Kolbe-Guyot und Matthias Finger diskutieren die Notwendigkeit einer umfassenden Datenpolitik für die Schweiz, um das Potenzial von Daten durch klare Regeln und Anreize zu nutzen und die Wettbewerbsfähigkeit langfristig zu sichern. Es formuliert 6 Handlungsempfehlungen für die Politik.

C4DT Insight #2: Datenstrategie,-Policy und -Regulierung für die Schweiz

In diesem Paper diskutieren Melanie Kolbe-Guyot und Matthias Finger die Notwendigkeit einer umfassenden Datenpolitik für die Schweiz, um das Potenzial von Daten durch klare Regeln und Anreize zu nutzen und die Wettbewerbsfähigkeit langfristig zu sichern. Es formuliert 6 Handlungsempfehlungen für die Politik.

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

Supply chain attacks are improving through automation. Adding new libraries to a software project has always been a point of vulnerability, but now that tools like ‘Cursor’ can add libraries automatically, developers are paying less attention to what gets installed. Some tools add libraries that send API keys of LLMs to attackers and load other (…)

Strategic Theme 2/2 for 2025 – Trustworthy Software

Interested in this theme? Looking to participate or collaborate on an initiative? The increasing prevalence of AI-powered systems and autonomous agents requires a shift in how we approach software development. It is critical to explore technologies, policies, and collaborations that enhance trust in software applications, particularly in an era where AI agents play an active (…)

Strategic Theme 1/2 for 2025 – Secure & Resilient Digital Democracy

Interested in this theme? Looking to participate or collaborate on an initiative? In an increasingly digital society, trust in democratic processes, institutions, and identity systems is fundamental to maintaining social stability and governance. Digital democracy relies on resilient e-governance infrastructures such as secure and privacy-preserving digital identities, trusted online platforms for citizen participation and cybersecure (…)

Launch of CMU-Africa’s Digital Experience Centre

Carnegie Mellon University Africa, through its Upanzi Network initiative, has launched the Digital Experience Centre (DEC). The DEC serves as a hub for exploring and testing digital public infrastructure, digital public goods, cybersecurity, public health, agriculture and more. It demonstrates how key digital solutions—such as digital identity, digital payments and secure infrastructure—interoperate in real-world scenarios.

aicode.danvoronov.com

If you’re into vibe-coding (programming entirely through interactions with an LLM) or are looking to use LLMs for your coding, here is a list of the latest projects, including both paid and free tools. However, when using these tools, it’s essential to consider the potential security and privacy risks. LLMs may generate code with vulnerabilities (…)

Open source devs say AI crawlers dominate traffic, forcing blocks on entire countries

We all heard that big AI companies need petabytes of data for training their new models. And we all heard that they don’t really care where they get their data from. Besides potential copyright infringement, this crawling takes another toll on some Open Source projects: Continuously requesting data over and over is similar to a (…)

Even More Venmo Accounts Tied to Trump Officials in Signal Group Chat Left Data Public

If the revelation that Trump administration officials accidentally added journalist Jeffrey Goldberg to a Signal group chat about sensitive military plans for airstrikes in Yemen wasn’t alarming enough, new reports now show that multiple Venmo accounts linked to former Trump officials were left publicly accessible, exposing sensitive connections and financial transactions. While the data leaked (…)

1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers

This investigation highlights a crucial cybersecurity reality: while we often focus on sophisticated zero-day exploits, the greater threat comes from known vulnerabilities and misplaced trust. One million Android devices weren’t compromised through cutting-edge techniques but through traditional means – preinstalled backdoors and users installing unvetted apps outside official stores. The victims were vulnerable because they (…)

Kroger’s Surveillance Pricing Harms Consumers and Raises Prices, With or Without Facial Recognition

My colleague Melanie’s pick last week about Swiss supermarket chain Coop using AI-supported video surveillance in its stores for security purposes reminded me of the recent revelation that American supermarket chain Kroger may be engaging in surveillance pricing, i.e., using algorithms and data collected on customers (including through facial recognition technology) to determine the highest (…)