Skip to content

Prof. Jean-Pierre Hubaux’s opinion piece in ‘LeTemps” on Trusting SwissCovid App

French-language news paper ‘Le Temps’ published an opinion piece by C4DT’s Academic Director and Head of the LDS lab at EPFL, Jean-Pierre Hubaux, on trusting the SwissCovid app. Prof. Hubaux raises the point that the excessive focus on privacy protection has cast doubt on a tool which makes it possible to defend other rights. Read the article in French on ‘www.letemps.ch’ by clicking the following link.

Joint C4DT-CyberPeace Institute-CTEI conference on “Manipulating elections in cyberspace: are democracies in danger?”

Increasingly, reports warn that state-sponsored actors use social media to spread fake news/disinformation in order to sow distrust and create panic during pandemics and create discord and polarized opinions among people on political issues during democratic elections. Adding to this, social media platforms’ algorithms “add salt to the wound” by feeding their users posts which are aligned with their opinion in order to increase their screen time. How serious and how massive is the problem? What are its implications? And what can/should be done about it?

During this forum, organized jointly by the Center for Digital Trust (C4DT), the CyberPeace Institute and the Graduate Institute’s Centre for Trade and Economic Integration (CTEI) in Geneva, we will discuss not only the technological aspects of this phenomena, but also the regulatory role executive and legislative branches of governments should play. Societal, economical and geopolitical implications will also be debated. This event is open to the general public.

For more information please click below

SwissCovid: EPFL is working on the question of public acceptance of the SwissCovid application

Following the webinar SwissCovid (DP^3T project) – a proximity-tracing app against COVID-19: building trust in a technology solution organized today by C4DT, the explanations of journalist Marielle Savoy on the question of the population’s support for the Swisscovid application.
Click below to listen to the full report

Launch of the CyberPeace Institute in Geneva

Thursday 26 September 2019 saw the launch of the CyberPeace Institute, an independent NGO that will address the growing impact of major cyberattacks, assist vulnerable communities, promote transparency, and advance global discussions on acceptable behavior in cyberspace. EPFL President Martin Vetterli will be sitting on the Executive Board, and the Center for Digital Trust is named as a scientific partner.

The C4DT is looking forward to working with the @cyberpeaceinst led by @DuguinStephane and @MarietjeSchaake and supporting its mission to enhance the stability of #cyberspace. Please click below to access the official announcement.

C4DT Distinguished Lecture : Talk by Dr. Dan Bogdanov, Cybernetica, Estonia

In this talk, Dan Bogdanov will start by introducing secure computing technologies and their potential in enterprise and government use. He will then look at a focus group study of the barriers of adopting such technologies based on interviews in many industries.

September 4, 2019 @ 14:15 in BC 410

C4DT Distinguished Lecture : Hidden Backdoors in Deep Learning Systems

by Prof. Ben Zhao, Univ. of Chicago
The lack of transparency in today’s deep learning systems has paved the way for a new type of threats, commonly referred to as backdoor or Trojan attacks. In this talk, Ben Zhao will describe two recent results on detecting and understanding backdoor attacks on deep learning systems.
September 24th, 2019 @ 14:15, room BC 420

DataShare: Decentralized Privacy-Preserving Search Engine for Investigative Journalists

Kasra Edalatnejad presents DataShare, a decentralized and privacy-preserving global search system that enables journalists worldwide to find documents via a dedicated network of peers. This work stems from the need of the International Consortium of Investigative Journalists (ICIJ) for securing their search and discovery platform.
Wednesday, July 3rd 2019 @16:15, room BC 410

All Your Clicks Belong to Me: Investigating Click Interception on the Web

By Prof. Wei Meng, Chinese University of Hong Kong
Click is the prominent way that users interact with web applications. Attackers aim to intercept genuine user clicks to either send malicious commands to another application on behalf of the user or fabricate realistic ad click traffic. In this talk, Prof. Wei Meng investigates the click interception practices on the Web.
Tuesday July 23rd, 2019 @10:00, room BC 420

The Summer Research Institute on Security and Privacy

EPFL’s IC School invites you to the 2019 edition of the IC Summer Research Institute (SuRI), held in Lausanne (EPFL, BC 420) on June 13-14. The conference brings together renowned researchers and experts from academia and industry who will present their latest research in cybersecurity, privacy, and cryptography. The event is open to everyone and attendance is free of charge. For more information and to register please click here…

From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’

The camera hacking issue is problematic because it weaponizes civilian devices without owners’ consent, creating an accountability gap where victims can’t control the security of cameras used against them. It democratizes military intelligence by replacing expensive satellites with cheap consumer cameras,and is nearly impossible to solve since millions of unpatched devices exist worldwide. Most fundamentally, (…)

Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester

This article fascinates me because it exposes Proton Mail’s privacy limits under Swiss law. While Swiss law shields direct foreign access, Mutual Legal Assistance Treaties (MLAT) enables indirect cooperation—Swiss firms must disclose available metadata like payment data. This reveals limitations in what Switzerland’s privacy protections can shield users from in cross-border investigations.

Spain launches tool to monitor online hate speech

I like the idea behind this tool because it tackles a serious online societal problem. I’m curious if and how it will pass the test of time. The key challenge will be to link subjective criteria to objective metrics – a problem we’ve seen with privacy, which still lacks objective benchmarks despite substantial research. But (…)

India’s tech sovereignty is built on digital dependence

This analysis of India’s technological dependence reveals patterns that are also applicable to Europe. Attracting foreign tech companies to invest locally ultimately results in profits being exported abroad, exemplifying a kind of digital colonialism. In my opinion, the solution lies in a demand-side strategy that favors local and open-source products over monopolies such as Microsoft (…)

Digital sovereignty stack: Infrastructure, services, data, and AI knowledge

This article points out that the ‘real digital sovereigns’ are the tech companies, who control all ‘vectors’ of sovereignty, from infrastructure, to data, AI models, and services. Beyond the US and China (and North Korea), the only realistic strategy for countries to gain control over their digital sovereignty will be to work together, whether through joining (…)

Hands-on Training on LLM Benchmarks

The C4DT Factory, together with Dr. Anna Sotnikova from Prof. Antoine Bosselut’s Natural Language Processing lab, is happy to invite you to our upcoming hands-on workshop on LLM evaluation and benchmarking. Our hands-on workshop is designed to demystify LLM benchmarking and provide you with a clear roadmap for your next LLM project.  You will learn: (…)

Souveraineté numérique et cloud: les clarifications de l’avocat Sylvain Métille

Je trouve cet article intéressant, car il apporte, par un professeur de droit reconnu, une clarification juridique précise sur le cloud en Suisse, distinguant clairement ce qui relève du droit de ce qui relève de la stratégie. Le Prof. Métille démontre qu’aucun obstacle juridique n’empêche l’utilisation de clouds américains certifiés DPF. Cette distinction est cruciale (…)

Iranian strikes test the Gulf’s trillion-dollar AI dream

This article illustrates the brutal economics of modern conflict and the fragility of digital infrastructures. Relatively inexpensive drones can render billion-dollar data centers ineffective, calling into question their placement in supposedly “stable” regions. For me, a question remains: What explains the apparent lack of cyberattacks by Iran? Have the U.S. and Israel blocked such attempts (…)

AIs can’t stop recommending nuclear strikes in war game simulations

Even 3 years into the current AI hype, it is still difficult to differentiate between its true capabilities and salestalk. Hopefully military leaders have a more clear-eyed view of the technology, as it is clearly not ready to be deployed in high-stakes decision-making processes.

Can social media age verification really protect kids?

I found this article interesting because it highlights the tension between protecting children online — not just on social media, but also on shopping, gambling and adult sites — and preserving privacy. The challenge of enforcing age laws without collecting sensitive data remains, regardless of whether the burden is placed on users or platforms. eID (…)

I hacked ChatGPT and Google’s AI – and it only took 20 minutes

This article is quite unnerving: a twenty‑minute hack shows how data‑poisoning can make LLMs tell tall tales, turning sci‑fi fears into real business risk. It’s a wake‑up call to demand provenance, adversarial robustness assessment and scepticism—because trusting chatbots without checking is like relying on a smooth-talking oracle with a hidden agenda. Critical thinking remains your (…)

Projet Phishing, des solutions pour mieux se protéger des attaques cybercriminelles

Les attaques de phishing, de plus en plus ciblées et difficiles à détecter, touchent PME, institutions et particuliers ; pour y répondre la HEIG‑VD a lancé le projet « Combattre le Phishing – quelles innovations apporter » en partenariat avec le Center for Digital Trust (C4DT) de l’EPFL, l’UNIL, la Police cantonale vaudoise, la DGNSI, (…)

Wero payments and the evolution of digital payments in Europe

Europe’s economy now largely runs on digital payments, making reliance on U.S. card rails a systemic exposure. Sanctions, policy shifts, outages, and data-access demands can all cause economic shocks. This is precisely why Wero is both interesting and timely: it is a bank-led, pan-European layer that can reduce strategic dependency. I’m eager to see transparent (…)

From magic to malware: How OpenClaw’s agent skills become an attack surface

OpenClaw is just the latest in a series of AI-powered tools that turn out to be an absolute security nightmare. It is easy (and up to a certain point justified) to blame individual developers for lowering their guard and abandoning good security practices. On the other hand, there is an enormous pressure on developers nowadays (…)