A new cryptography framework for secure genomic studies
Developed from EPFL research, in collaboration with MIT and Yale, the combination of secure computation and distributed algorithms opens a new era for data collaborations in medical research.
Developed from EPFL research, in collaboration with MIT and Yale, the combination of secure computation and distributed algorithms opens a new era for data collaborations in medical research.
Last week, I had numerous conversations about the decision by Coop, a major Swiss supermarket chain, to implement AI-supported video surveillance technology. What struck me was that everyone—from NGOs to official delegates—was in the dark about this until the news broke. I am even more surprised that there has been less public outcry compared to (…)
The article reports that the US may have paused its offensive cyber operations against Russia, suggesting it is likely part of a broader diplomatic strategy to encourage talks over the Ukraine conflict, or to possibly focus more on addressing cyber threats posed by China. Scaling back offensive actions without reciprocal guarantees risks exposing critical infrastructure (…)
‘Quantum computing applications may become practical within the next 5 years’, according to recent claims by Microsoft and Google, both of which released statements within days of each other. The fact that these two rival tech giants made the same prediction at the same time lends credibility to the statement, especially given the ongoing global (…)
In our latest edition of the C4DT Digital Governance Book Review, we discuss Marietje Schaake’s book which explores the deep intertwining of Big Tech with politics, highlighting its threat to democracy and proposing practical regulatory solutions to reclaim democratic processes and safeguard state sovereignty.
Schaake, Marietje (2024). The Tech Coup – How to Save Democracy from Silicon Valley. Princeton University Press, 336 pages. By Melanie Kolbe-Guyot It is safe to say that probably no other book should more be on your reading list this year than Marietje Schaake’s 2024 “The Tech Coup – How to Save Democracy from Silicon Valley”. (…)
The European Summit on Applied Generative AI. 2025 Edition.
We’re eagerly gearing up for the third annual Summit of Centers this August 2025! This year’s spotlight is on collaborations with industry and private foundations. Stay tuned for announcements of our external guests!
Here is an article, in Cory Doctorow’s signature style, discussing social networks and what drives them and what makes people leave or stay. I like specifically how he dissects the way the once-good services these platforms used to provide got untethered from the profits their creators and CEOs were chasing over the years. Towards the (…)
The Ethics of Privacy and Surveillance by Carissa Véliz, Oxford University Press – 256 pages by Hector Garcia Morales “Privacy matters because it shields us from possible abuses of power”. Such a strong statement opens the introduction of the book, setting the grounds for the following pages. The thesis is that, in digital societies, there (…)
For a long time, Google dominated the search market, but this may be changing with new search habits emerging. Instead of googling multiple sites, I now primarily use two AI chatbots, challenge them to avoid hallucinations, and, if needed, click on their suggested links. For me, this is a more concise and much faster way (…)
In a sea of unsettling news, the US’s new Cyber Trust Mark labelling program is a welcome beacon of light. With consumers’ personal and home office spaces increasingly populated by connected devices, from door locks and doorbells, to baby monitors, vacuums, and TVs, the security of “smart home ecosystems” has never been more important. The (…)
Say cheese! This artist has created a whimsical website that allows New Yorkers to take selfies with traffic surveillance cameras installed all over the city. Maybe it can be used to track Santa’s whereabouts?
This article reveals how smart devices gather more information than typically required for their functions, including personal data, location, audio recordings … and this even for devices (like air fryers) that clearly do not require those. This (again) shows a lack of transparency and poses critical questions about consumer privacy.
I always supposed naively that once a breach in a system is detected, it will be fixed in a timely manner. Even more so if it’s in an important system from the government, like the networks used for data gathering of the telecommunication companies. Reality shows that even after many months, the FBI is still (…)
I like this article because it gives us a peek into how an organization develops responsibly and with intention an AI use policy aligned with its mission and operations. In this case, the stakes are high, as the International Committee of the Red Cross operates in conflict zones and humanitarian crises. They emphasize the importance (…)
This publication revisits key questions with speakers from the Oct 1st conference on “Deepfakes, Distrust and Disinformation” through the lens of public perception and seeks to advance the debate surrounding AI, misinformation, and disinformation, especially in political contexts.
Most people are nowadays aware of phishing attempts by e-mail and double-check an e-mails trustworthiness before clicking any links. But how many are just as cautious with their physical mail? This unusual campaign distributes its malware via the Swiss postal services. Phishing attempts by letter is definitely a new one for me, and a reminder (…)
I found this article fascinating since it highlights the complexity of defining what ‘open-source AI’ should mean. Today, it is a confusing topic, with many models being ‘open-source’ in name only. For neural networks, training data and source code are inseparable; together, they define how the model is programmed. Therefore, should we be allowed to (…)
EPFL and UNIL invite you to a special event on the theme of Artificial Intelligence on Saturday 23 November 2024 at the Rolex Learning Center.
A unique opportunity to better understand and embrace the AI revolution, while discussing the issues surrounding its use with an exclusive panel of scientists and experts. Laboratory demonstrations and workshops for adults and young people will also be on offer. The event is free of charge and open to all, aged 10 and over.
The Change Healthcare breach is deeply concerning, highlighting the vulnerabilities in centralized data systems used to protect sensitive healthcare information. The response to this illustrates a consistently reactive (rather than proactive) political action, where acceptable cybersecurity standards in legislation are only proposed after a significant data breach affects 100 million Americans.
The temporal evolution of the structure of dynamic networks carries critical information about the development of complex systems in various applications, from biology to social networks. While this topic is of importance, the literature in network science, graph theory, or network machine learning, still lacks of relevant models for dynamic networks, proper metrics for comparing network structures, as well as scalable algorithms for anomaly detection. This project exactly aims at bridging these gaps.
The main objective of the project is to perform online monitoring of technologies and technology actors in publicly accessible information sources. The monitoring concerns the early detection of mentions of new technologies, of new actors in the technology space, and the facts related to new relations between technologies and technology actors (subsequently, all these will be called technology mentions). The project will build on earlier results obtained on the retrieval of technology-technology actors using Large Language Models (LLMs).