Trustless Computing Association is an Italian non-profit “associazione non riconosciuta”  established in 2011, with hedquarter in Via Francesco Vettoru 39, 00164, Rome, italy.

The governance of the Trustless Computing Association (TCA) and Trustless Computing Certification Body (the new name of Association its initialsizeable funding), is most fundamental  concept of Trustless Computing.

It is “where the buck stops”: the ultimate point of failure and the source of all present and future trustwothiness of such body. Trustless Computing re-conceptualizes the cybersecurity of any given critical IT system/experience as the by-product of the intrinsic resilience, accountability, and competency of organizational and cyber-social processes.

The current statute has been carefully conceived to be able to maximize – in the long-term and under great pressures – its chance to sustainably remain extremely user-accountable, citizen-accountable, ethical and technically-proficient. Here is what it prescribes:

Phase 1: Currently, until the 1st fundraising,  all TCA resides in “members assembly” consisting of Rufo Guerreschi, Vera Simsic, and Roberto Gallo.  However, the statute of the Association  – prescribes the mandatory transfer of such power to a governance that achieve the above mentioned goals:

Phase 2. Within six months after $600k are raised by the Association:

Current members of the Assembly resign, and the Assembly will be made up of 35 or more individuals – compensated at generous market rates proportional to the expertise and profile – in the following percentages:

20% Ethical & Scientific Advisory Board, initially composed our the current Association scientific advisory board.

20% Active Users of TC-compliant client devices (“one person, one vote”, applies to institutional and enterprise users as well)

15% Security or Defense agencies of 2 or more “reasonably democratic” nations. Offered initially to current Association governance partners: Italy and Austria, and our new hosting country Switzerland.

15% Data Protection Agencies of 2 or more democratic nations(Offered initially to current TCA governance partners: DPA of German State of Schleswig; and then to EDPS, and DPAs of  Italy, German, Austria)

15% A group of 15 random-sampled citizens, selected and self-managed according to the deliberative polling method, by which random-sampled citizens are given an opportunity to self-educate about a matter and then deliberate. They will rotate every 3 months in alternate batches of 5.

15% Trustless Computing Association Board of Directors, where no delegated or shared board voting rights are to be allowed.

A Board of Directors, of 5 or more people, lead by the Association Exec. Dir. and the other 4 members elected by the Assembly will be fully delegated by the Assembly until Phase 3 below.

Phase 3. Three months after real-life scenario continuous deployment (or go-to-market) of at least 1000 Trustless Computing compliant client devices:

-All Association decision-making power reverts back from the Board of Directors to the Assembly.
-All voting must be performed via TC-compliant IT services or adequately certified in person voting.
-Voting will be public to radically decrease the risk of becoming compromised.
-A new Ethics & scientific Board is elected, half by existing members and half by the Assembly. Maximum term is 3 years.
-Random-sampled citizens and Pod users’ share of governance is proportionately increased on a quarterly basis by up to 50% as the number of users increases to 20.000. The decision-making power of the -other entities is decreased accordingly.

Funding to date: The Association has been funded to date by Rufo Guerreschi, sweat equity by many many persons, and by about 45k€ of funding by EIT Digital and ECSEL JU to organize Free and Safe in Cyberspace event series.



For more info, and details, see the Governance chapter in our Position Paper or Business Plan.