Building our Digital Private Sphere

Since 2013, the Trustless Computing Association has been building a uniquely accountable, resilient and independent Trustless Computing Certification Body (“TCCB”) – and a compliant open ecosystem, computing base and a 2mm-thin human computing device – to achieve radically-unprecedented levels of trustworthiness to society-critical IT systems, while concurrently ensuring legitimate lawful access, to prevent their crimnal abuse. Initially for the most sensitive human communications and transactions of the wealthy and powerfull, and millions of citizens. And then for root-of-trust of critical AI, 5G networks, social media, public security system, and more.

 
 
17946.jpg
 

Our Mission

Radically Increase IT and AI Trustworthiness

Since 2013, we’ve promoted the creation and wide adoption of new IT security standard setting and certification body – and a compliant open computing base and ecosystem – that radically-exceeds the state-of-the-art in trustworthiness of critical human computing IT, and then AI systems, while concurrently solidly enabling legitimate lawful access. Initially for mass-market human computing scenarios in the private sector, and then in critical governmental and AI fields. The new Certification Body, while free-standing as a voluntary public-private initiative, will also be proposed as a “schema” within the EU Cybersecurity Certification Framework and as a new initiative under UN International Telecommunication Union (ITU-T) processes.

Read more

Our Unique Paradigms

Cybersecurity is a Governance Problem

All and every software, hardware and processes that are critically involved in an IT service provisioning or life-cycle – from CPU design to fabrication, from hosting room access to standard setting – are subject to extreme verification relative to complexity, or to extremely resilient cyber-social oversight, based on offline citizen-witness or citizen-jury processes. We re-conceptualize the cybersecurity of any given critical IT system/experience as the by-product of the intrinsic resilience, accountability, and competency of organizational and cyber-social processes.

Read more

 
 

Our Vision for a Digital Private Sphere of Communications

Our smartphones have become our digital public sphere,the digital equivalent of the square, streets and shopping mall, with even richer opportunities for human connection, entertainement and socialization. Yet their hardware, software and supply-chain complexity make it impossible for them to also act as our private sphere. 

Perfect IT security will never exist, but high enough levels can reconstitute true digital private sphere, the digital equivalent of the living room. This will enable us to enjoy meaningful enforcement of our rights to confidentiality, freedom of speech, freedom of assembly, ourselves and our close ones, transactions security, business security.

Since 2013, we have been pursuing a vision whereby the back of mobile phones will be occupied by an ultra-secure standalone open ultra-thin human computing device. Since 2014 the real thickness of smartphones has been 4.75mm. Users found them “too thin to handle”, so they were made thicker to best fit in your hands.

We are building radically more trustworthy digital security certifications and a new personal computing device to allow anyone to regain his/her constitutional right to a private sphere of communication.

 
bg.jpg
 

The Need

Why do We Need a New Certification Body?

Even the most secure IT certifications and technologies available today offer levels of trustworthiness – and trustworthiness measurability – that are radically lower than what is required by many narrow or wide-market critical societal use cases. This problem extends to critical AI systems, which must rely on such IT for their most critical “root-of-trust” sub-systems.

Read more

Our Governance

Extreme Accountability and Competency

The statute of the Trustless Computing Association and its planned Trustless Computing Certification Body are conceived to ensure they will continuously remain extremely user-accountable, citizen-accountable, ethical, and technically proficient. By statute, it’s decision-making power will be transferred to a mix of end-users, informed random-sampled citizens, democratic nations, and top ethical cybersecurity experts.

Read more

 

Our Story

A Quest for Freedom Within & Through IT

Trustless Computing Association and its spin-off startup TRUSTLESS.AI are primarily the fruit of 17 years of the single-minded quest by Rufo Guerreschi to realize the potential of ICT to radically improve individual civil freedoms and democratic participation, by founding multiple NGOs and startups in the areas of e-participation, free software, and bleeding-edge privacy-enhancing technologies and standards. In 2013, he crossed path with Roberto Gallo, on a similar quest with similar determination – and highly complementary skills – creating a steel bond that lasts to this day. Since 2015, it has accrued top governance, technical and end-user partners.

Read more

 
 

Our Vision: Where we Stand. Where we should go

Through advances in AI and IT security technologies and certification governance models, we could soon easily realize a durable and unprecedented increase in humanity wellbeing: eliminate poverty, scarcity and unpleasant work; radically improve our health and safety; and greatly advance freedom and democracy. 

Yet, we are currently heading straight towards dystopia and catastrophic risks. The incredible insecurity of even the most critical IT systems has caused World economic and political power to increasingly accrue to entities with the most informational and hacking superiority, while the geopolitics and economy are increasingly dominated by a reckless winner-take-all-race for AI capability dominance irrespective of huge medium and long-term safety concerns. 

The causes of such cyberinsecurity are a lack of adequate and enforceable international standards to ensure limits hyper-complexity, increase independent oversight, and eliminate up-front unverified trust. But, after all, we resolved those issues in civil aviation (with FAA) and nuclear safety (with IAEA). Why not for IT?! Because the ultimate cause is the unresolved dichotomy between digital freedoms and cyber-investigation capabilities which has led powerful nations since the 90s to break all IT and standards to preserve their ability to intercept suspects of grave crimes. 

Fortunately, as we discovered, it is not an “either or” or zero-sum-game. We discovered It is instead a “both or neither” challenge, that can be largely resolved by applying the same uncompromising zero-trust safeguards – down to CPU design and fabrication oversight – and re-conceptualizing IT security as the by-product of the governance of human organizations critically involved in the entire lifecycle.

 

Our Vision for the Humanity & AI

By wresting control over AI capability explosion and IT secuirty innovations, we could soon easily realize previously unimaginable wellbeing of humanity, such as eradicate poverty, scarcity and unpleasant work; radically improve our health and safety; and greatly advance freedom and democracy; even have Artificial Wisdom.

How does TCA contribute to such?

The governance models of our Trustless Computing Certification Body and its initial computing base, will provide for a radically more trustworthy and accountable root-of-trust of critical AIs systems. 

 
bg.jpg

SCIENTIFIC COMMITTEE

 
 
 

ADVISORY BOARD

 
 
 
 

PARTNERS