Skip to content

Microsoft cuts off some services used by Israeli military unit

Without defending any party or attacking the other, I find this article interesting because it somehow presents a new situation whose implications we should carefully consider: First, can Microsoft’s logic be extended from the use of cloud storage and AI to the use of operating systems? What about communications services or even hardware? Can this (…)

Datenschutzfreundliche Perioden-Apps: Zyklus-Tracking ohne Tracking

Zyklus-Apps sind eine praktische Hilfe, um den eigenen Zyklus zu beobachten und besser verstehen zu lernen, und können sogar bei der Familienplanung unterstützen. Die dabei geteilten Daten sind sehr sensibel, aber auch gleichzeitig sehr begehrt, denn sie geben einen Hinweis darauf, dass sich Konsumgewohnheiten ändern könnten, wenn sich eine Schwangerschaft andeutet. Deswegen besteht das Risiko, (…)

New C4DT Focus #9, titled “Smart surveillance on the rise: A legal and ethical crossroads”, is out!

This issue explores the rapid spread of AI-powered video surveillance, from supermarkets to large public gatherings, and examines the legal, ethical, and societal challenges it raises. With insights from Sébastien Marcel (Idiap Research Institute) and Johan Rochel (EPFL CDH), it looks at Switzerland’s sectoral approach versus the EU’s new AI Act, and what this means (…)

C4DT FOCUS 9 Smart surveillance on the rise: A legal and ethical crossroads

From supermarket checkouts to Olympic stadiums, smart surveillance technologies are spreading rapidly, raising new questions about privacy, trust, and oversight. How should societies balance the benefits of AI-powered cameras with the risks of bias, misuse, and erosion of democratic freedoms? And how will the upcoming European AI Act reshape the governance of biometric surveillance, both in the EU and in Switzerland? This edition of C4DT Focus examines these pressing issues by offering a legal and ethical perspective on intelligent video surveillance, with insights from Sébastien Marcel (Idiap Research Institute) and Johan Rochel (EPFL CDH).

The New Digital Sovereignty: Why Payments and Identity Now Shape National Policy

I like this article because it offers a thought-provoking perspective. It discusses how digital payment and identity systems are closely linked and can help countries become more independent, inclusive, and resilient—in other words, more sovereign. By linking digital trust to infrastructure ownership and policy-making, the article encourages reflection on whether societies truly control their digital (…)

Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1

This is a nice reminder of the state of the foundation upon which our public key infrastructure stands. Depending on the angle you’re looking at, it is either stable or shaky. The incident in question was a certificate authority that emitted a rogue certificate for “test purposes.” What ensued and how Cloudflare responded shows how (…)

The Chip War: US vs. China Semiconductor Production Stats in 2020-2030

Semiconductors power nearly all modern devices, so controlling their production is strategically crucial. By revoking TSMC’s authorization to export advanced US chipmaking tools to China, the US hinders China’s ability to produce state-of-the-art chips (though TSMC only makes less advanced chips there). While this may curb China’s capacities in the short run, in the long-term, (…)

Anthropic will start training its AI models on chat transcripts

While it was to be expected that Anthropic will also use the users’ chats for training, I think the way they’re approaching this is not too bad. Perhaps the pop-up is not clear enough, but at least past chats will not get in the LLM training grinder. One of the big question will be of (…)

eID: The Bigger Picture

I appreciate this second, more critical, take on the E-ID from dnip for moving beyond a purely technical discussion or a legal dissection, and instead exploring the broader societal impact of the E-ID.

African authorities dismantle massive cybercrime and fraud networks, recover millions

A successful—and almost uplifting—example of collaboration across law enforcement, government agencies, and businesses against cybercrime is exemplified by the Cybercrime Atlas project. In a sweeping INTERPOL-coordinated operation, authorities across Africa arrested 1,209 cybercriminals who targeted nearly 88,000 victims. The crackdown recovered USD 97.4 million and dismantled 11,432 malicious infrastructures. This operation demonstrates how cross-border collaboration (…)

Translating AI to Clinical Practice

This SDSC Connect conference explores through keynotes, panels, and case studies how AI can meet clinical needs. It connects researchers, practitioners, and data scientists to foster insight, innovation, and collaboration.

Wikipedia Editors Adopt ‘Speedy Deletion’ Policy for AI Slop Articles

As the speed that articles can be generated has increased with the rise of LLMs, Wikipedia just increased the speed it can delete them. If an article has obvious signs of having been created by an LLM, it can be deleted quickly with only two approvals. I think this is a good way of making (…)

AI Policy Summit 2025 – REG HORIZON

The AI Policy Summit advances to its sixth edition in 2025!

The AI Policy Summit brings together a growing global expert community to foster cross-sectorial and cross-regional collaboration in AI policy, and is recognized as a leading AI policy event in Europe.

Anticipating the Agentic Era: Assessing the Disruptions by AI Agents

This full-day conference explores the potential disruptions caused by the rise of AI agents and their impact on existing systems and structures. Bringing together industry leaders, researchers, policymakers, and stakeholders, the event will facilitate in-depth discussions on the challenges and opportunities presented by AI agents. Participants will assess the risks, examine strategies to mitigate emerging threats, and collaborate on establishing resilient frameworks for responsible innovation.

This event is organized by the Center for Digital Trust (C4DT) at EPFL.

Libxml2’s “no security embargoes” policy

Here’s an interesting take on what happens if security bugs are found in Open Source libraries. Now that more and more of Open Source libraries find their way into commercial products from Google, Microsoft, Amazon, and others, the problem of fixing security bugs in a timely manner is becoming a bigger problem. Open Source projects (…)

Air Traffic Control in the US Still Runs on Windows 95 and Floppy Disks

This article highlights the alarming reliance of critical infrastructure on outdated technology, exposing significant vulnerabilities in essential systems. The need for uninterrupted operation and compatibility requirements presents major challenges to the modernization of these legacy systems, and the costs to upgrade are steep. Yet the potential for catastrophic failure due to obsolete equipment underscores the (…)

Amazon will nicht, dass die Republik Verträge mit dem Bund sieht

Digitale Souveränität und doch bei einem der ‘Großen’ einkaufen? Mit diesem Versprechen sind US-amerikanische Tech-Giganten in den letzten Jahren in Europa werben gegangen. Doch wie passt das zusammen mit dem Versuch der schweizerischen Öffentlichkeit die Details der Rahmenverträge mit dem Bund vorenthalten zu wollen?

Microsoft open sources Windows Subsystem for Linux – well, most of it

It’s fascinating to see the tightrope dance Microsoft is doing with open source. While most of its operating system is closed source, Microsoft actively participates in several open source projects and provides some of its programs under an open source license. Open sourcing is beneficial because it allows security researchers to examine the source code (…)