Fellay Lab – Human Genomics of Infection and Immunity (GR-FE)
Health and genomic information management
Health and genomic information management
Artificial intelligence
[et_pb_section fb_built=”1″ _builder_version=”3.18.2″ background_color=”rgba(255,255,255,0.03)” background_size=”contain” background_position=”top_left” custom_padding=”0|0px|20px|0px|false|false” top_divider_color=”#0091aa” top_divider_height=”44px” top_divider_flip=”horizontal” bottom_divider_height=”33px” bottom_divider_flip=”horizontal|vertical” custom_margin=”65px||”][et_pb_row custom_padding=”0|144px|0|23px|false|false” custom_padding_tablet=”|0px||7px|false|false” custom_padding_last_edited=”on|phone” _builder_version=”3.18.2″ background_size=”contain” background_position=”bottom_right”][et_pb_column type=”4_4″ _builder_version=”3.17.6″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.18.2″ _dynamic_attributes=”content” text_font=”|700|||||||” background_layout=”dark” custom_margin=”||0px”]{“dynamic”:true,”content”:”post_title”,”settings”:{“before”:” “,”after”:” “}}[/et_pb_text][et_pb_text _builder_version=”3.18.2″ _dynamic_attributes=”content” text_font=”Verdana||||||||” text_font_size=”22px” text_font_size_tablet=”18px” text_font_size_phone=”16px” text_font_size_last_edited=”on|phone” text_line_height=”1.4em” background_layout=”dark”]{“dynamic”:true,”content”:”post_excerpt”,”settings”:{“before”:””,”after”:””,”words”:””,”read_more_label”:””}}[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.17.6″ top_divider_flip=”vertical” bottom_divider_color=”#111111″ bottom_divider_height=”44px” custom_padding=”3px|0px|54px|0px|false|false”][et_pb_row custom_padding=”|||25px” _builder_version=”3.17.6″ custom_margin_last_edited=”on|desktop”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_code _builder_version=”3.18.2″][loop type=article paged=5 (…)
A growing number of wearable devices are becoming available. By their ability to measure physical activity and physiological characteristics such as heart rate, blood pressure, sleep patterns, etc., they constitute a cornerstone for the quantified self and personalized health. Yet, unavoidably, they bring a number of challenges in terms of security and privacy. 10:15-13:00 – (…)
A growing number of wearable devices are becoming available. By their ability to measure physical activity and physiological characteristics such as heart rate, blood pressure, sleep patterns, etc., they constitute a cornerstone for the quantified self and personalized health. Yet, unavoidably, they bring a number of challenges in terms of security and privacy.
This workshop will be held on Thursday, 6 December from 10:15-13:00, in room BC 410 at the EPFL.
The International Red Cross (ICRC) is confronted to unique information-security challenges when providing aid to disaster victims. A group of C4DT-affiliated researchers has been closely working with ICRC to better understand specific computer security challenges.
For that work, Steven Leblond and his colleagues led by professors Ford and Hubaux were awarded the Distinguished Best Paper Award at the 39th IEEE Symposium on Security and Privacy in San Francisco.
A group of lawyers and policy workers from the International Red Cross (ICRC) and other organizations concluded a computing and digital trust awareness-raising training at EPFL.The week-long course in collaboration with C4DT is intended to equip them with the tools to evaluate the impact of information systems on their humanitarian activities. The course starts from computing basics and touches cloud computing, information security and privacy preservation.
A group of lawyers and policy workers from the International Red Cross (ICRC) and other organizations concluded a computing and digital trust awareness-raising training at EPFL.The week-long course in collaboration with C4DT is intended to equip them with the tools to evaluate the impact of information systems on their humanitarian activities. The course starts from computing basics and touches cloud computing, information security and privacy preservation.
Finally, the term I’ve been looking for! Technology paternalism: when technical systems shape, restrict, or pre-decide our choices before we can make them. What strikes me most about this concept is how it finds echoes in so many current political debates—collective goals (safety, security, efficiency) versus individual choice; autonomy versus dependency; who holds power and (…)
Choudary, Sangeet Paul (2025) Reshuffle: Who wins when AI restacks the knowledge economy (ISBN-13: 979-8294127213), Independently published, 460 pages. By Olivier Crochat “AI’s value lies less in automating tasks and more in enabling new coordination and decision-making architectures.” In his book Reshuffle, Choudary offers a compelling framework for leaders to navigate the organisational impact of (…)
If you have an iOS device, now is a good time to make sure updates are applied automatically, and get the latest software version. Somebody posted an exploit on GitHub that gives hackers full control of any iOS device not updated since September 2025. Usually, these exploits are usually well-kept secrets, as they are very (…)
If you’ve ever looked to Google Maps for inspiration on where to eat and wondered why a restaurant that you know exists didn’t show up, this video breaks it down for you. What resonates with me is the gap the journalist’s investigation lays bare between what people value (food quality, customer service) and what Google’s (…)
The Swiss Crypto Day is an informal event to promote research in cryptology in Switzerland. In 2026, the sixth edition will be held on September 4th in Zürich. More info will follow soon.
Generative AI models not only replicate but amplify human biases. Though efforts exist to correct these discriminatory biases, they remain hard to identify as they’re often implicit. Anna Sotnikova, a postdoctoral researcher at Bob West’s NLP Lab, affiliated with C4DT, provides an update.
The spread of deepfakes, erosion of trust in authentic images and hallucinating chatbots are today well-known issues. These phenomena are especially problematic in rapidly evolving situations, when people are looking for updates, but reliable information is not yet available. Add algorithmic content distribution to the mix, and you get a perfect storm of misinformation. While (…)
Google startete schon 2010 ein ‘Vulnerability Reward Program’, ein Bug-Bounty für alle Services von Google, das Belohnungen auszahlt, allein 17 Millionen US-$ 2025. Dieser Betrag wurde an mehr als 700 Analysten verteilt, die Fehler in Android, der Google Cloud, aber auch in verbreiteten und häufig gebrauchten Open Source Programmen und Bibliotheken fanden. Auch wenn 17 (…)
The camera hacking issue is problematic because it weaponizes civilian devices without owners’ consent, creating an accountability gap where victims can’t control the security of cameras used against them. It democratizes military intelligence by replacing expensive satellites with cheap consumer cameras,and is nearly impossible to solve since millions of unpatched devices exist worldwide. Most fundamentally, (…)
This article fascinates me because it exposes Proton Mail’s privacy limits under Swiss law. While Swiss law shields direct foreign access, Mutual Legal Assistance Treaties (MLAT) enables indirect cooperation—Swiss firms must disclose available metadata like payment data. This reveals limitations in what Switzerland’s privacy protections can shield users from in cross-border investigations.
Human Rights Week is a 3-day congress exploring the dual impact of digital tools: empowering activism while enabling new forms of control. Participants examine how technology is transforming human rights and envision a more just digital future. Dr Olivier Crochat, C4DT’s executive director, will join a panel on digital platforms’ role in contemporary conflicts.
We are incredibly proud to announce the publication of C4DT’s 2025 Annual Report. As geopolitical tensions and the AI race intensify concerns about digital sovereignty, our work has never been more vital, thanks to our partners, researchers, and dedicated team.
I like the idea behind this tool because it tackles a serious online societal problem. I’m curious if and how it will pass the test of time. The key challenge will be to link subjective criteria to objective metrics – a problem we’ve seen with privacy, which still lacks objective benchmarks despite substantial research. But (…)
This article caught my attention because it exposes the threat of de-anonymization that AI agents pose and its consequences for online privacy. The author writes that ‘the implications stretch far beyond embarrassing social media reveals’ and points out that whistleblowers who reveal corporate misconduct and government corruption, journalists who shield their informants, and political dissidents (…)
This analysis of India’s technological dependence reveals patterns that are also applicable to Europe. Attracting foreign tech companies to invest locally ultimately results in profits being exported abroad, exemplifying a kind of digital colonialism. In my opinion, the solution lies in a demand-side strategy that favors local and open-source products over monopolies such as Microsoft (…)