Profile photo of Rufo Guerreschi

About Rufo Guerreschi

This author has not yet filled in any details.
So far Rufo Guerreschi has created 17 blog entries.

France and Germany ask EU Commission directive mandating compliance to lawful access for IT communication providers

Last week, France and Germany have proposed to the EU Commission to issue an update of of a current EU directive, that would mandate providers of IT communication services to be able to respond to lawful access requests. There are signs that these may be more political posturing and knee jerk reaction to th recent terror attacks, rather

By | August 25th, 2016|

Towards solutions to Challenge A and B: the “Trustless Computing Certification Body”

Some speakers of the Free and Safe in Cyberspace (FSC) event series and advisors to the Trustless Computing Initiative, lead by Rufo Guerreschi, have joined together to research and propose a comprehensive solution to Challenges A and B posed by FSC: The Trustless Computing Certification Body: a new standard and certification body for wide-market ultra-high assurance IT systems, with

By | August 25th, 2016|

In New York City, on July 21st 2016, the Free and Safe in Cyberspace workshop brings e-privacy and public safety one step closer (Report)

WORKSHOP REPORT: "Free and Safe in Cyberspace" workshop on July 21st 2016 in New York City continues to strive for meanigful e-privacy and increased public safety A small workshop was held on 21 July 2016 in New York City, as part of the “Free and Safe in Cyberspace” International event series, was focused on discussing and planning possible solutions

By | August 3rd, 2016|

EVENT: After Snowden, new int’l certifications for digital privacy (NYC, 7/21)

After Snowden, new int'l certifications for digital privacy (NYC, 7/21) Free and Safe in Cyberspace is an international series of events that brings together institutions and experts across the atlantic to create an international wide-consensus on new non-governmental international ICT security and privacy standards and certifications for ICT system providers and lawful access schemes, that

By | July 11th, 2016|

How to prevent malevolent and dangerous AI through standards and legislations, and in turn promote AI-driven economic development

Roman Yampolskiy and Federico Pistono recently wrote a paper entitled Unethical Research: How to Create a Malevolent Artificial Intelligence, which poses the questions of powerful actors intentionally creating malevolent AI and/or stealing and deploying.  This is a crucial problem to be reckoned with, in addition to the main problem occupying the AI safety community, the runaway AI problem, or the

By | June 27th, 2016|

What is the current market demand for certifications of narrow AI systems with direct influence on human physical environments?!

The creation of radically competent, enforceable and accountable standardization and certification processes for those narrow AI systems that direct influence on human physical environments - such as robots, autonomous drone and vehicles - may have a huge impact on the growth rate and sustainability of the market for such systems, as well as reduce risk of arm to humans. Even more importantly,

By | March 3rd, 2016|

A new “Free and Safe in Cyberspace – Aims and Backgrounder” is published

We have been updating extensively our event series Backgrounders for each of the FSC Challenges: A, B, C and D. For your convenience, their full content has been made available, although in a older version of February 23rd 2016, in a single 20-pager Free and Safe in Cyberspace – Aims and Backgrounders (PDF), authored by Rufo Guerreschi and Jovan Golic (which updated

By | February 26th, 2016|

FBI and Apple finally agree on starting a debate on how to reconcile privacy and safety. Shouldn’t the EU and NGOs be part of it?!

Over the last 2 days both Apple and FBI have called for a "commission" of representative stakeholders to finally discuss constructively on how we can reconcile two crucial rights of citizens, the right of privacy and the right to safety. It has been clear that some kind of structured systematic deliberative discourse and debate is useful to both

By | February 23rd, 2016|

New ultra-high assurance IT certifications, the Safe Harbour issue and eIDAS

Thanks to the recent ruling by the EU Court of Justice on Safe Harbour, there may now be a large demand, need and opportunity for the aims of our Free and Safe in Cyberspace creation of new international socio-technical standards and certification bodies for IT systems and lawful access schemes that deliver ultra-high and constitutionally– meaningful

By | February 6th, 2016|

Towards a TRUSTLESS Computing Certification Proposal v. 2.0

Today, we've invited selected speakers of the Free and Safe in Cyberspace event series, or a selected advisors of the TRUSTLESS Computing Initiative to join a tight-knit group of 5-9 people to devote 4-10 hours of your time, over the next 4 weeks, to jointly define - with equal decision making power! - the final text of a TRUSTLESS Computing Certification Proposal v. 2.0 (gdoc), a proposal for

By | January 16th, 2016|
Skip to toolbar