Skip to content

12 Questions on the Digital Immunity Passport

The certificate linked to the virus will not be available before June in Switzerland. Until then, here are twelve answers linked to questions of security, data and accessibility concerning what some call the “Immunity Passport”. In particular, Jean-Pierre Hubaux, C4DT Academic Director, provides insights on the questions linked to data.

Prof. Jean-Pierre Hubaux’s opinion piece in ‘LeTemps” on Trusting SwissCovid App

French-language news paper ‘Le Temps’ published an opinion piece by C4DT’s Academic Director and Head of the LDS lab at EPFL, Jean-Pierre Hubaux, on trusting the SwissCovid app. Prof. Hubaux raises the point that the excessive focus on privacy protection has cast doubt on a tool which makes it possible to defend other rights. Read the article in French on ‘www.letemps.ch’ by clicking the following link.

Joint C4DT-CyberPeace Institute-CTEI conference on “Manipulating elections in cyberspace: are democracies in danger?”

Increasingly, reports warn that state-sponsored actors use social media to spread fake news/disinformation in order to sow distrust and create panic during pandemics and create discord and polarized opinions among people on political issues during democratic elections. Adding to this, social media platforms’ algorithms “add salt to the wound” by feeding their users posts which are aligned with their opinion in order to increase their screen time. How serious and how massive is the problem? What are its implications? And what can/should be done about it?

During this forum, organized jointly by the Center for Digital Trust (C4DT), the CyberPeace Institute and the Graduate Institute’s Centre for Trade and Economic Integration (CTEI) in Geneva, we will discuss not only the technological aspects of this phenomena, but also the regulatory role executive and legislative branches of governments should play. Societal, economical and geopolitical implications will also be debated. This event is open to the general public.

For more information please click below

SwissCovid: EPFL is working on the question of public acceptance of the SwissCovid application

Following the webinar SwissCovid (DP^3T project) – a proximity-tracing app against COVID-19: building trust in a technology solution organized today by C4DT, the explanations of journalist Marielle Savoy on the question of the population’s support for the Swisscovid application.
Click below to listen to the full report

Launch of the CyberPeace Institute in Geneva

Thursday 26 September 2019 saw the launch of the CyberPeace Institute, an independent NGO that will address the growing impact of major cyberattacks, assist vulnerable communities, promote transparency, and advance global discussions on acceptable behavior in cyberspace. EPFL President Martin Vetterli will be sitting on the Executive Board, and the Center for Digital Trust is named as a scientific partner.

The C4DT is looking forward to working with the @cyberpeaceinst led by @DuguinStephane and @MarietjeSchaake and supporting its mission to enhance the stability of #cyberspace. Please click below to access the official announcement.

C4DT Distinguished Lecture : Talk by Dr. Dan Bogdanov, Cybernetica, Estonia

In this talk, Dan Bogdanov will start by introducing secure computing technologies and their potential in enterprise and government use. He will then look at a focus group study of the barriers of adopting such technologies based on interviews in many industries.

September 4, 2019 @ 14:15 in BC 410

C4DT Distinguished Lecture : Hidden Backdoors in Deep Learning Systems

by Prof. Ben Zhao, Univ. of Chicago
The lack of transparency in today’s deep learning systems has paved the way for a new type of threats, commonly referred to as backdoor or Trojan attacks. In this talk, Ben Zhao will describe two recent results on detecting and understanding backdoor attacks on deep learning systems.
September 24th, 2019 @ 14:15, room BC 420

DataShare: Decentralized Privacy-Preserving Search Engine for Investigative Journalists

Kasra Edalatnejad presents DataShare, a decentralized and privacy-preserving global search system that enables journalists worldwide to find documents via a dedicated network of peers. This work stems from the need of the International Consortium of Investigative Journalists (ICIJ) for securing their search and discovery platform.
Wednesday, July 3rd 2019 @16:15, room BC 410

All Your Clicks Belong to Me: Investigating Click Interception on the Web

By Prof. Wei Meng, Chinese University of Hong Kong
Click is the prominent way that users interact with web applications. Attackers aim to intercept genuine user clicks to either send malicious commands to another application on behalf of the user or fabricate realistic ad click traffic. In this talk, Prof. Wei Meng investigates the click interception practices on the Web.
Tuesday July 23rd, 2019 @10:00, room BC 420

The Summer Research Institute on Security and Privacy

EPFL’s IC School invites you to the 2019 edition of the IC Summer Research Institute (SuRI), held in Lausanne (EPFL, BC 420) on June 13-14. The conference brings together renowned researchers and experts from academia and industry who will present their latest research in cybersecurity, privacy, and cryptography. The event is open to everyone and attendance is free of charge. For more information and to register please click here…

Claude, The Doctor Will See You Now

This philosophical rumination on whether or not LLMs have a consciousness has actual implications on how to train LLMs and how users will interact with them. It is possible to train LLMs as pure technology and remove any reference to a consciousness, but then alignement becomes very difficult, as there is no basis to anchor (…)

Mythos and Cybersecurity

Since Anthropic announced that it’ll not publicly release its newest Claude Mythos model because of concerns around its capabilities in exploiting software vulnerabilities, I have been searching for a good analysis of this non-release. I wondered whether this was truly responsible disclosure or nothing but a marketing stunt. Bruce Schneier’s take on it finally answered (…)

Stanford just proved your AI chatbot is flattering you into bad decisions

We’re used to the terms “echo chambers” and “filter bubbles” when discussing the dangers of social networks, search engines, and personalized ads. Now, with AI chatbots, a new term joins the ranks: “sycophancy”, or telling people what they want to hear. Could sycophantic chatbots be more harmful than social media echo chambers? My gut says (…)

Webinaire: Cybermenaces contre les entreprises: comment faire face en 2026?

Le dernier rapport de l’Office fédéral de la cybersécurité indique une personnalisation et une sophistication des cyberattaques visant les entreprises et les particuliers en Suisse. Quelles sont les menaces les plus dangereuses qui ciblent l’économie? Comment les prévenir? Et comment bien former son personnel face à ces attaques? Giuseppe Bianco, Head Cash Management chez UBS et Olivier Crochat, directeur exécutif du Center for Digital Trust (C4DT) de l’EPFL en débattront avec Anouch Seydtaghia du journal Le Temps.

Swiss Internet Governance Forum

The Swiss IGF 2026 will take place on Tuesday, June 16 at Welle 7 in Bern. Participation in the conference is still open to all individuals and organisations, but it is worth becoming a member of the association, as the previous participation rights of the steering group are now open to all members. More info soon!

Book Review “On Privacy and Technology”, by Solove, Daniel J. (2025)

In “On Privacy and Technology”, Prof. Solove distils years of rigorous academic research into an accessible analysis that cuts through the noise surrounding privacy debates with surgical precision. What makes this work particularly compelling is Solove’s unflinching exposure of uncomfortable truths: the consent model is fundamentally flawed, self-regulation has failed and cannot succeed, and current (…)

Businesses scramble to get noticed by AI search

From Search Engine Optimisation (SEO), to Answer Engine Optimisation (AEO) – also sometimes called Generative Engine Optimisation (GEO), it’s interesting to notice how much we rely on specific tools to “see the world”. With search engines, we had to scroll down the results and decide ourselves which links were relevant (and still feared how much (…)

Technology Paternalism Expands — A Case for Self-Sovereign Identity

Finally, the term I’ve been looking for! Technology paternalism: when technical systems shape, restrict, or pre-decide our choices before we can make them. What strikes me most about this concept is how it finds echoes in so many current political debates—collective goals (safety, security, efficiency) versus individual choice; autonomy versus dependency; who holds power and (…)

Reshuffle: Who wins when AI restacks the knowledge economy (2025)

Choudary, Sangeet Paul (2025) Reshuffle: Who wins when AI restacks the knowledge economy (ISBN-13: ‎979-8294127213), Independently published, 460 pages. By Olivier Crochat “AI’s value lies less in automating tasks and more in enabling new coordination and decision-making architectures.” In his book Reshuffle, Choudary offers a compelling framework for leaders to navigate the organisational impact of (…)

How Google Maps is shaping where we eat – video

If you’ve ever looked to Google Maps for inspiration on where to eat and wondered why a restaurant that you know exists didn’t show up, this video breaks it down for you. What resonates with me is the gap the journalist’s investigation lays bare between what people value (food quality, customer service) and what Google’s (…)

Switzerland built a secure alternative to BGP. The rest of the world hasn’t noticed yet

I was pleasantly surprised to read this interesting article about SCION, Switzerland’s approach to improved internet routing and security. What struck me was Prof. Perrig’s preference for ‘optionality’ over ‘sovereignty’ — freedom to choose paths, trust roots or network. The solution works yet adoption stalls because organisations are ‘numb’ to known vulnerabilities and reluctant to (…)

From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’

The camera hacking issue is problematic because it weaponizes civilian devices without owners’ consent, creating an accountability gap where victims can’t control the security of cameras used against them. It democratizes military intelligence by replacing expensive satellites with cheap consumer cameras,and is nearly impossible to solve since millions of unpatched devices exist worldwide. Most fundamentally, (…)

Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester

This article fascinates me because it exposes Proton Mail’s privacy limits under Swiss law. While Swiss law shields direct foreign access, Mutual Legal Assistance Treaties (MLAT) enables indirect cooperation—Swiss firms must disclose available metadata like payment data. This reveals limitations in what Switzerland’s privacy protections can shield users from in cross-border investigations.