Trustless Computing Certification Body & the SeeVik Net Service
Since 2013, the Trustless Computing Association (“TCA“) has been promoting the creation and wide adoption of new IT security (high-level) standard setting and certification body, Trustless Computing Certification Body (TCCB) and a compliant open computing base, ecosystem and human computing systems, Seevik Net Service, that aim to radically-exceeds the state-of-the-art in trustworthiness of sensitive digital human computing, while concurrently solidly enabling legitimate lawful access.
TCCB claim for substantially or radically superior levels of IT trustworthiness are rooted on (1) extreme levels of ethical security-review in relation to complexity of all critical components and processes, (2) the wide utilization of citizen-witness and citizen-jury oversight processes throughout the service life-cycle, and, most critically, (3) a governance model ensuring with extreme levels of altruistic echnical proficiency, citizen accountability, independence and resilience to pressures.
Initially targeting human transactions and communications with ultra-high requirements of confidentiality, integrity and non-reputability – for high-profile and ordinary persons alike – TCCB will first evolve from a high-level binding certification framework towards a thoroughly detailed certification scheme, and the will expand to use cases requiring also high and ultra-high availability, including critical governmental communications, AI and cyber-physical systems.
CONTEXT & POSITIONING
Our Trustless Computing standards will be from the start downward compatible with eIDAS High, positioning itself as a sort of eIDAS High++ certification, whereby it satisfies the highest standards for e-transactions and e-services, but also offer levels levels of confidentiality and integrity of human computing radically beyond state-of-the-art. While free-standing as a voluntary public-private initiative, TCCB will be complementary, synergistic and inspirational for existing and upcoming EU and UN promoted cybersecurity certifications, aiming to eventually be adopted as their highest assurance level at some point in the future. To that end, it will also be proposed as a “schema” within the EU Cybersecurity Certification Framework and as a new initiative under UN International Telecommunication Union (ITU-T) processes. It will also promotes future downward compatibility in respect to EU Secret and Common Criteria EAL4-6 for future use in advanced governamental sectors.
INITIAL COMPLIANT IT SERVICE & ECOSYSTEM
In parallel, the Association and some of its technical Partners, together with its spin-off startup TRUSTLESS.AI are building the Seevik Pod Service an initial Trustless-Computing-compliant low-royalty open target architecture, HW+SW computing base (Seevik Base) and initial complaint IT services, which will include endpoint computing devices in the form of 2mm-thin touch-screen handheld devices (Seevik Pods) and anonymization and network nodes (Seevik Nodes). All sensitive data and services – of the provider and users – will be hosted in dedicated hosting rooms (Seevik Rooms) whose access at any time requires 5+ randomly-selected citizen-jurors and only utilize dedicated compliant servers (Seevik Servers) and locks. A Seevik Store will offer enable all to submit client and server apps for approval by TCCB.
UNIQUE FABRICATION OVERSIGHT
Fabrication and design of all critical hardware components will be subject to oversight processes, Seevik Fab, that will substantially exceed in end-user trustworthiness the NSA Trusted Foundry Program at substantially lower costs; by adding to state-of-the-art process the exclusive use of compliant monitoring equipment and the presence of 5 trained citizen-witnesses, during the 6-8 critical phases of the chip fabrication process. All Seevik Devices are assembled, verified, flashed and shipped to their users by a compliant electronics manufacturing plant/service (SeevikEMS), applying monitoring processes similar to the Seevik Fab.