Building Our Digital Utopia

At Trustless Computing Association we are building a uniquely accountable, resilient and independent Trustless Computing Certification Body- and a compliant open ecosystem and computing base – to bring radically-unprecedented levels of trustworthiness to society-critical IT systems, while concurrently preventing their abuse by ensuring legitimate lawful access. Initially for our most sensitive human communications and transactions, and then for root-of-trusts of critical AI, 5G networks, social media and more.

Through advances in AI and IT security technologies and certification governance models, we could soon easily realize a durable and unprecedented increase in humanity wellbeing: eliminate poverty, scarcity and unpleasant work; radically improve our health and safety; and greatly advance freedom and democracy

Yet, we are currently heading straight towards dystopia and catastrophic risks. The incredible insecurity of even the most critical IT systems has caused World economic and political power to increasingly accrue to entities with the most informational and hacking superiority, while the geopolitics and economy are increasingly dominated by a reckless winner-take-all-race for AI capability dominance irrespective of huge medium and long-term safety concerns

The causes of such cyberinsecurity are a lack of adequate and enforceable international standards to ensure limits hyper-complexity, increase independent oversight, and eliminate up-front unverified trust. But, after, we resolved those issues in civil aviation (with FAA) and nuclear safety (with IAEA). Why not for IT? Because the ultimate cause is the unresolved apparent dichotomy between digital freedoms and cyber-investigation capabilities which has led powerful nations since the 90s to break all IT and standards to preserve their ability to intercept suspects of grave crimes. 

Fortunately, as we discovered, it is not an “either or” or zero-sum-game. We discovered It is instead a “both or neither” challenge, that can be largely resolved by applying the same uncompromising zero-trust safeguards – down to CPU design and fabrication oversight – and re-conceptualizing IT security as the by-product of the governance of human organizations critically involved in the entire lifecycle

Our Unique Paradigms

Cybersecurity is a Governance Problem

All and every software, hardware and processes that are critically involved in an IT service provisioning or life-cycle – from CPU design to fabrication, from hosting room access to standard setting – are subject to extreme verification relative to complexity, or to extremely resilient cyber-social oversight, based on offline citizen-witness or citizen-jury processes. We re-conceptualize the cybersecurity of any given critical IT system/experience as the by-product of the intrinsic resilience, accountability, and competency of organizational and cyber-social processes.

Our Mission

Radically Increase IT and AI Trustworthiness

Since 2013, we’ve promoted the creation and wide adoption of new IT security standard setting and certification body – and a compliant open computing base and ecosystem – that radically-exceeds the state-of-the-art in trustworthiness of critical human computing IT, and then AI systems, while concurrently solidly enabling legitimate lawful access. Initially for mass-market human computing scenarios in the private sector, and then in critical governmental and AI fields. The new Certification Body, while free-standing as a voluntary public-private initiative, will also be proposed as a “schema” within the EU Cybersecurity Certification Framework and as a new initiative under UN International Telecommunication Union (ITU-T) processes.

Our Digital Utopia: Civil Rights & Democracy

 Since 2013, we have been pursuing a vision whereby the back of mobile phones will be occupied by an ultra-secure standalone open ultra-thin human computing device. Since 2014 the real thickness of smartphones has been  4.75mm. Users found them “too thin to handle”, so they were made thicker to best fit in your hands. 

Our smartphones have become our digital public sphere, the digital equivalent of the square, streets and shopping mall, with even richer opportunities for human connection, entertainement and socialization. Yet their hardware, software and supply-chain complexity make it impossible for them to also act as our private sphere. 

Perfect IT security will never exist, but high enough levels can reconstitute true digital private sphere, the digital equivalent of the living room. This will enable us to enjoy meaningful enforcement of our rights to confidentiality, freedom of speech, freedom of assembly, ourselves and our close ones, transactions security, business security, an

publicsphere-privatesphere

The Need

Why do We Need a
New Certification Body?

Even the most secure IT certifications and technologies available today offer levels of trustworthiness – and trustworthiness measurability – that are radically lower than what is required by many narrow or wide-market critical societal use cases. This problem extends to critical AI systems, which must rely on such IT for their most critical “root-of-trust” sub-systems.

Our Governance

Extreme Accountability and Competency

The statute of the Trustless Computing Association and its planned Trustless Computing Certification Body are conceived to ensure they will continuously remain extremely user-accountable, citizen-accountable, ethical, and technically proficient. By statute, it’s decision-making power will be transferred to a mix of end-users, informed random-sampled citizens, democratic nations, and top ethical cybersecurity experts.

Our Story

A Quest for Freedom Within & Through IT

Trustless Computing Association and its spin-off startup TRUSTLESS.AI are primarily the fruit of 17 years of the single-minded quest by Rufo Guerreschi to realize the potential of ICT to radically improve individual civil freedoms and democratic participation, by founding multiple NGOs and startups in the areas of e-participation, free software, and bleeding-edge privacy-enhancing technologies and standards. In 2013, he crossed path with Roberto Gallo, on a similar quest with similar determination – and highly complementary skills – creating a steel bond that lasts to this day. Since 2015, it has accrued top governance, technical and end-user partners.

Our Digital Utopia: Humans & AI

By wresting control over AI capability explosion and IT secuirty innovations, we could soon easily realize previously unimaginable wellbeing of humanity, such as eradicate poverty, scarcity and unpleasant work; radically improve our health and safety; and greatly advance freedom and democracy; even have Artificial Wisdom. How does TCA contribute to such? The governance models of our Trustless Computing Certification Body and its initial computing base, will provide for a radically more trustworthy and accountable root-of-trust of critical AIs systems. 

Action Lines

TRUSTLESS.AI is a startup spinoff of the Trustless Computing Association, based in Geneva at the Fintech Fusion accelerator. It is building a standalone 2mm-thin touch-screen human computing device that seamlessly delivers radically-unprecedented of privacy and security to your most sensitive business and personal computing. Initially only for high net-worth individuals, wealth managers and executives, and then embedded as a ultra secure second display in the back of millions of smartphones.

Ongoing since 2015, the Free and Safe in Cyberspace event series has been held in Brussels, New York, and Iguazu, Berlin, and last in Geneva on April 9-10th 2019, has attracted amazing world-class speakers. Its sole purpose has been to create a wide consensus on the Trustless Computing Paradigms and the need, feasibility, and nature of a new Trustless Computing Certification Body.

The Trustless Computing Campus and Cluster initiative is proposed public-private initiative – co-funded by EU, local and nations public funding – to jump start in Western Switzerland regions, the World’s leading research and competence centre for leading-edge cybersecurity security for communication, cyber-physical and artificial intelligence systems, by offering an unmatched array of scientific, quality of life and economic incentives to the very best talents, researchers, startups, accelerators and companies in such sectors.

publications-research-initiatives

PUBLICATIONS & RESEARCH INITIATIVES

  • On 4/2018, we published on ResearchGate our 43-pager  Position Paper –  Case for a Trustless Computing Certification Body (A 1-pager Summary and link to the PDF). Fruit of 3 years of work, and dozens of contributors, it makes a formal case for the technical feasibility and public benefit of the creation of such a certification body and a compliant open ecosystem.

  • On 4/2016, we submitted a 4M€ proposal to H2020 DS-01-2016 RIA (113-pager PDF) titled “TRUSTLESS socio-technical systems for ultra-high assurance ICT certifications, and a compliant open target architecture, life-cycle and ecosystem, for critical societal use cases and consumer adoption. Included an ultra-resilient binding conditional MoU among key R&D partners including licensing, patenting and non-compete under Swiss law.

  • On 4/2016, we submitted a 1M€ proposal to H2020 DS-01-2016 CSA (80-pager PDF) to build the Certification Body, titled: “TRUSTLESS: Facilitating the evolution to uniquely comprehensive and comparable certification of ICT services and lifecycles“. 

  • On 2/2016, a 2nd version of “Free and Safe in Cyberspace – Aims and Backgrounder” was published by Rufo Guerreschi and Jovan Golic (PDF)

  • On 9/2015, we submitted a 4M€ proposal to H2020 FET-Open (44-pager PDF): “ Trustless socio­technical systems for trustworthy critical computing and organizations

  • On 6/2015, we made a draft proposal titled User Verified E-Government (44-pager PDF), which added to the CivicPod and CivicDock, the concepts of CivicCard (a more secure digital ID card) and CivicKiosk, a kiosk for e-services with the security of the CivicPod that could be used by citizens’ to deal with sensitive e-services from, public, postal office or pharmacies

  • On 7/2015, in advance of our 1st Free and Safe in Cyberspace edition we published the 1st version of the Position Paper for a Trustless Computing Certification Body, in the form of a long blog post titled “Trustless Computing: a proposal for an international certification body for highest-assurance IT and lawful access systems (1st draft).

Team

ADVISORS

REINHARD POSCH
GERHARD KNECHT
PAUL NEMITZ
TODD DAVIES
SUNIL ABRAHAM
JAMES S. FISHKIN
KAI RANNENBERG
JOVAN GOLIC
JON SHAMAH
MIKA LAUHDE
PAOLO GIORGINI
DANIELE ARCHIBUGI
JOSHUA WEISS
PIERLUIGI PAGANINI
BART PRENEEL
ROMAN YAMPOLSKIY