Without defending any party or attacking the other, I find this article interesting because it somehow presents a new situation whose implications we should carefully consider: First, can Microsoft’s logic be extended from the use of cloud storage and AI to the use of operating systems? What about communications services or even hardware? Can this (…)
Zyklus-Apps sind eine praktische Hilfe, um den eigenen Zyklus zu beobachten und besser verstehen zu lernen, und können sogar bei der Familienplanung unterstützen. Die dabei geteilten Daten sind sehr sensibel, aber auch gleichzeitig sehr begehrt, denn sie geben einen Hinweis darauf, dass sich Konsumgewohnheiten ändern könnten, wenn sich eine Schwangerschaft andeutet. Deswegen besteht das Risiko, (…)
This issue explores the rapid spread of AI-powered video surveillance, from supermarkets to large public gatherings, and examines the legal, ethical, and societal challenges it raises. With insights from Sébastien Marcel (Idiap Research Institute) and Johan Rochel (EPFL CDH), it looks at Switzerland’s sectoral approach versus the EU’s new AI Act, and what this means (…)
From supermarket checkouts to Olympic stadiums, smart surveillance technologies are spreading rapidly, raising new questions about privacy, trust, and oversight. How should societies balance the benefits of AI-powered cameras with the risks of bias, misuse, and erosion of democratic freedoms? And how will the upcoming European AI Act reshape the governance of biometric surveillance, both in the EU and in Switzerland? This edition of C4DT Focus examines these pressing issues by offering a legal and ethical perspective on intelligent video surveillance, with insights from Sébastien Marcel (Idiap Research Institute) and Johan Rochel (EPFL CDH).
I like this article because it offers a thought-provoking perspective. It discusses how digital payment and identity systems are closely linked and can help countries become more independent, inclusive, and resilient—in other words, more sovereign. By linking digital trust to infrastructure ownership and policy-making, the article encourages reflection on whether societies truly control their digital (…)
This is a nice reminder of the state of the foundation upon which our public key infrastructure stands. Depending on the angle you’re looking at, it is either stable or shaky. The incident in question was a certificate authority that emitted a rogue certificate for “test purposes.” What ensued and how Cloudflare responded shows how (…)
Semiconductors power nearly all modern devices, so controlling their production is strategically crucial. By revoking TSMC’s authorization to export advanced US chipmaking tools to China, the US hinders China’s ability to produce state-of-the-art chips (though TSMC only makes less advanced chips there). While this may curb China’s capacities in the short run, in the long-term, (…)
A comprehensive policy is necessary to unlock the economic and social potential of data in our country’s and its citizens’ interest, a study from EPFL Center for Digital Trust concludes.
While it was to be expected that Anthropic will also use the users’ chats for training, I think the way they’re approaching this is not too bad. Perhaps the pop-up is not clear enough, but at least past chats will not get in the LLM training grinder. One of the big question will be of (…)
I appreciate this second, more critical, take on the E-ID from dnip for moving beyond a purely technical discussion or a legal dissection, and instead exploring the broader societal impact of the E-ID.
A successful—and almost uplifting—example of collaboration across law enforcement, government agencies, and businesses against cybercrime is exemplified by the Cybercrime Atlas project. In a sweeping INTERPOL-coordinated operation, authorities across Africa arrested 1,209 cybercriminals who targeted nearly 88,000 victims. The crackdown recovered USD 97.4 million and dismantled 11,432 malicious infrastructures. This operation demonstrates how cross-border collaboration (…)
This SDSC Connect conference explores through keynotes, panels, and case studies how AI can meet clinical needs. It connects researchers, practitioners, and data scientists to foster insight, innovation, and collaboration.
As the speed that articles can be generated has increased with the rise of LLMs, Wikipedia just increased the speed it can delete them. If an article has obvious signs of having been created by an LLM, it can be deleted quickly with only two approvals. I think this is a good way of making (…)
The AI Policy Summit advances to its sixth edition in 2025!
The AI Policy Summit brings together a growing global expert community to foster cross-sectorial and cross-regional collaboration in AI policy, and is recognized as a leading AI policy event in Europe.
From a cryptographer’s point of view, the big breakthrough in quantum computing would be if it can successfully factorize numbers in the 1000-digit range. As it turns out, this is actually quite difficult. The record from 2012 of factorizing the number 21 is still unbeaten! And all reports of factorizing bigger numbers used very, very (…)
This full-day conference explores the potential disruptions caused by the rise of AI agents and their impact on existing systems and structures. Bringing together industry leaders, researchers, policymakers, and stakeholders, the event will facilitate in-depth discussions on the challenges and opportunities presented by AI agents. Participants will assess the risks, examine strategies to mitigate emerging threats, and collaborate on establishing resilient frameworks for responsible innovation.
This event is organized by the Center for Digital Trust (C4DT) at EPFL.
Here’s an interesting take on what happens if security bugs are found in Open Source libraries. Now that more and more of Open Source libraries find their way into commercial products from Google, Microsoft, Amazon, and others, the problem of fixing security bugs in a timely manner is becoming a bigger problem. Open Source projects (…)
Contrary to what the author posits, I don’t think there is anything to fix about social media: it gives people the adrenaline rush they want, and comforts VC money by showing exponential growth. What can be changed is the way we prioritize seeking spaces to hang out with people we like. Mastodon is one such (…)
This article highlights the alarming reliance of critical infrastructure on outdated technology, exposing significant vulnerabilities in essential systems. The need for uninterrupted operation and compatibility requirements presents major challenges to the modernization of these legacy systems, and the costs to upgrade are steep. Yet the potential for catastrophic failure due to obsolete equipment underscores the (…)
As LLM agents become ‘en vogue’, we need to rethink the attacks they open to malicious third parties. Here Simon Willison describes a combination often seen in such agents that will put your private data at risk. Unfortunately, there is currently not much you can do, except be aware that all the data that agents (…)
I was intrigued by this article, as it highlights how war impacts a country’s digital assets – something that is very relevant, yet little discussed, in today’s digitalized world.
This atlas of algorithmic systems curated by AlgorithmWatch CH is a nonexhaustive yet revealing list of algorithms currently deployed in Switzerland, whether to ‘predict, recommend, affect or take decisions about human beings’ or to ‘generate content used by or on human beings.’ The atlas is really eye-opening for me – so many systems that we (…)
Digitale Souveränität und doch bei einem der ‘Großen’ einkaufen? Mit diesem Versprechen sind US-amerikanische Tech-Giganten in den letzten Jahren in Europa werben gegangen. Doch wie passt das zusammen mit dem Versuch der schweizerischen Öffentlichkeit die Details der Rahmenverträge mit dem Bund vorenthalten zu wollen?
It’s fascinating to see the tightrope dance Microsoft is doing with open source. While most of its operating system is closed source, Microsoft actively participates in several open source projects and provides some of its programs under an open source license. Open sourcing is beneficial because it allows security researchers to examine the source code (…)