Skip to content

Articles

[et_pb_section fb_built=”1″ _builder_version=”3.18.2″ background_color=”rgba(255,255,255,0.03)” background_size=”contain” background_position=”top_left” custom_padding=”0|0px|20px|0px|false|false” top_divider_color=”#0091aa” top_divider_height=”44px” top_divider_flip=”horizontal” bottom_divider_height=”33px” bottom_divider_flip=”horizontal|vertical” custom_margin=”65px||”][et_pb_row custom_padding=”0|144px|0|23px|false|false” custom_padding_tablet=”|0px||7px|false|false” custom_padding_last_edited=”on|phone” _builder_version=”3.18.2″ background_size=”contain” background_position=”bottom_right”][et_pb_column type=”4_4″ _builder_version=”3.17.6″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.18.2″ _dynamic_attributes=”content” text_font=”|700|||||||” background_layout=”dark” custom_margin=”||0px”]{“dynamic”:true,”content”:”post_title”,”settings”:{“before”:” “,”after”:” “}}[/et_pb_text][et_pb_text _builder_version=”3.18.2″ _dynamic_attributes=”content” text_font=”Verdana||||||||” text_font_size=”22px” text_font_size_tablet=”18px” text_font_size_phone=”16px” text_font_size_last_edited=”on|phone” text_line_height=”1.4em” background_layout=”dark”]{“dynamic”:true,”content”:”post_excerpt”,”settings”:{“before”:””,”after”:””,”words”:””,”read_more_label”:””}}[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.17.6″ top_divider_flip=”vertical” bottom_divider_color=”#111111″ bottom_divider_height=”44px” custom_padding=”3px|0px|54px|0px|false|false”][et_pb_row custom_padding=”|||25px” _builder_version=”3.17.6″ custom_margin_last_edited=”on|desktop”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_code _builder_version=”3.18.2″][loop type=article paged=5 (…)

Security and Privacy of Wearable Devices

A growing number of wearable devices are becoming available. By their ability to measure physical activity and physiological characteristics such as heart rate, blood pressure, sleep patterns, etc., they constitute a cornerstone for the quantified self and personalized health. Yet, unavoidably, they bring a number of challenges in terms of security and privacy. 10:15-13:00 – (…)

Workshop on Security and Privacy of Wearable Devices

A growing number of wearable devices are becoming available. By their ability to measure physical activity and physiological characteristics such as heart rate, blood pressure, sleep patterns, etc., they constitute a cornerstone for the quantified self and personalized health. Yet, unavoidably, they bring a number of challenges in terms of security and privacy.

This workshop will be held on Thursday, 6 December from 10:15-13:00, in room BC 410 at the EPFL.

Best Paper for “Digital Immunity” Work with ICRC

The International Red Cross (ICRC) is confronted to unique information-security challenges when providing aid to disaster victims. A group of C4DT-affiliated researchers has been closely working with ICRC to better understand specific computer security challenges.

For that work, Steven Leblond and his colleagues led by professors Ford and Hubaux were awarded the Distinguished Best Paper Award at the 39th IEEE Symposium on Security and Privacy in San Francisco.

C4DT Teaches “Digital Trust” Skills to ICRC Lawyers

A group of lawyers and policy workers from the International Red Cross (ICRC) and other organizations concluded a computing and digital trust awareness-raising training at EPFL.The week-long course in collaboration with C4DT is intended to equip them with the tools to evaluate the impact of information systems on their humanitarian activities. The course starts from computing basics and touches cloud computing, information security and privacy preservation.

C4DT’s Academy teaches “digital trust” skills to ICRC lawyers

A group of lawyers and policy workers from the International Red Cross (ICRC) and other organizations concluded a computing and digital trust awareness-raising training at EPFL.The week-long course in collaboration with C4DT is intended to equip them with the tools to evaluate the impact of information systems on their humanitarian activities. The course starts from computing basics and touches cloud computing, information security and privacy preservation.

Technology Paternalism Expands — A Case for Self-Sovereign Identity

Finally, the term I’ve been looking for! Technology paternalism: when technical systems shape, restrict, or pre-decide our choices before we can make them. What strikes me most about this concept is how it finds echoes in so many current political debates—collective goals (safety, security, efficiency) versus individual choice; autonomy versus dependency; who holds power and (…)

Reshuffle: Who wins when AI restacks the knowledge economy (2025)

Choudary, Sangeet Paul (2025) Reshuffle: Who wins when AI restacks the knowledge economy (ISBN-13: ‎979-8294127213), Independently published, 460 pages. By Olivier Crochat “AI’s value lies less in automating tasks and more in enabling new coordination and decision-making architectures.” In his book Reshuffle, Choudary offers a compelling framework for leaders to navigate the organisational impact of (…)

How Google Maps is shaping where we eat – video

If you’ve ever looked to Google Maps for inspiration on where to eat and wondered why a restaurant that you know exists didn’t show up, this video breaks it down for you. What resonates with me is the gap the journalist’s investigation lays bare between what people value (food quality, customer service) and what Google’s (…)

Swiss Crypto Day

The Swiss Crypto Day is an informal event to promote research in cryptology in Switzerland. In 2026, the sixth edition will be held on September 4th in Zürich. More info will follow soon.

A photo of Iran’s bombed schoolgirl graveyard went viral. Why did AI say it wasn’t real?

The spread of deepfakes, erosion of trust in authentic images and hallucinating chatbots are today well-known issues. These phenomena are especially problematic in rapidly evolving situations, when people are looking for updates, but reliable information is not yet available. Add algorithmic content distribution to the mix, and you get a perfect storm of misinformation. While (…)

Google: 17,1 Millionen US-Dollar im Bug-Bounty-Programm 2025 ausgezahlt

Google startete schon 2010 ein ‘Vulnerability Reward Program’, ein Bug-Bounty für alle Services von Google, das Belohnungen auszahlt, allein 17 Millionen US-$ 2025. Dieser Betrag wurde an mehr als 700 Analysten verteilt, die Fehler in Android, der Google Cloud, aber auch in verbreiteten und häufig gebrauchten Open Source Programmen und Bibliotheken fanden. Auch wenn 17 (…)

From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’

The camera hacking issue is problematic because it weaponizes civilian devices without owners’ consent, creating an accountability gap where victims can’t control the security of cameras used against them. It democratizes military intelligence by replacing expensive satellites with cheap consumer cameras,and is nearly impossible to solve since millions of unpatched devices exist worldwide. Most fundamentally, (…)

Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester

This article fascinates me because it exposes Proton Mail’s privacy limits under Swiss law. While Swiss law shields direct foreign access, Mutual Legal Assistance Treaties (MLAT) enables indirect cooperation—Swiss firms must disclose available metadata like payment data. This reveals limitations in what Switzerland’s privacy protections can shield users from in cross-border investigations.

Human Rights Week: Digital Frontlines

Human Rights Week is a 3-day congress exploring the dual impact of digital tools: empowering activism while enabling new forms of control. Participants examine how technology is transforming human rights and envision a more just digital future. Dr Olivier Crochat, C4DT’s executive director, will join a panel on digital platforms’ role in contemporary conflicts.

Spain launches tool to monitor online hate speech

I like the idea behind this tool because it tackles a serious online societal problem. I’m curious if and how it will pass the test of time. The key challenge will be to link subjective criteria to objective metrics – a problem we’ve seen with privacy, which still lacks objective benchmarks despite substantial research. But (…)

AI Agents Can Unmask Anonymous Online Identities

This article caught my attention because it exposes the threat of de-anonymization that AI agents pose and its consequences for online privacy. The author writes that ‘the implications stretch far beyond embarrassing social media reveals’ and points out that whistleblowers who reveal corporate misconduct and government corruption, journalists who shield their informants, and political dissidents (…)

India’s tech sovereignty is built on digital dependence

This analysis of India’s technological dependence reveals patterns that are also applicable to Europe. Attracting foreign tech companies to invest locally ultimately results in profits being exported abroad, exemplifying a kind of digital colonialism. In my opinion, the solution lies in a demand-side strategy that favors local and open-source products over monopolies such as Microsoft (…)