{"id":2172,"date":"2016-11-14T00:36:47","date_gmt":"2016-11-13T23:36:47","guid":{"rendered":"https:\/\/www.free-and-safe.org\/?page_id=2172"},"modified":"2020-08-18T16:49:44","modified_gmt":"2020-08-18T14:49:44","slug":"eu-edition-2016","status":"publish","type":"page","link":"https:\/\/www.free-and-safe.org\/eu-edition-2016\/","title":{"rendered":"EU Edition 2016"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Photo by Giorgio Galeotti<\/a> – Own work<\/span>, CC BY 4.0<\/a>, Link<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

EVENT<\/span> \n\nSUMMARY<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Free and Safe in Cyberspace – EU Edition 2016<\/strong> was held in Brussels on September 22nd-23rd 2016 to\u00a0catalyse a constructive dialogue and a wide informed\u00a0consensus on new international standards and certification governance bodies\u00a0for\u00a0ultra-high assurance end-2-end IT systems\u00a0– for\u00a0communications, constitutional lawful access and autonomous systems\u00a0– to\u00a0deliver access to unprecedented and\u00a0constitutionally meaningful<\/em>\u00a0e-privacy and\u00a0e-security\u00a0to all,\u00a0while increasing\u00a0public safety and\u00a0cyber-investigation capabilities.Conceived by the\u00a0Open Media Cluster (now called\u00a0Trustless Computing\u00a0Association<\/a>), lead by Rufo Guerreschi, and co-organized by the<\/em>\u00a0EU EIT Digital Privacy, Security and Trust Action Line<\/a>, lead by Jovan Golic.<\/em><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Recent evidence suggests\u00a0that\u00a0nearly all\u00a0IT devices and services\u00a0are\u00a0remotely, undetectably and\u00a0scalably\u00a0hackable\u00a0by several actors, through state-sanctioned or state-mandated back-doors.<\/p>

As a consequence,\u00a0EU and US IT companies are struggling\u00a0to seek ways to offer the levels of trustworthiness that both customers and constitutions require, by differentiating themselves\u00a0sustainably\u00a0on the basis of provable\u00a0and meaningfully higher\u00a0levels of trustworthiness.<\/p>

We are told daily by\u00a0nearly all privacy experts and government officials that we must\u00a0to choose between\u00a0meaningful personal privacy\u00a0and\u00a0enabling lawfully authorized cyber-investigations.\u00a0But both are essential to democracy and freedom.\u00a0What\u00a0if it was not\u00a0a choice of\u00a0\u201ceither or\u201d, a zero-sum game, but instead primarily a\u00a0\u201cboth or neither\u201d challenge, yet to be proven unfeasible?
Are\u00a0key assets and capabilities of nations\u2019 law enforcement, defense and intelligence\u00a0themselves highly vulnerable to attackers\u00a0\u2013\u00a0foreign,\u00a0domestic and internal \u2013 due to the lack of sufficiently comprehensive,\u00a0translucent\u00a0and accountable socio-technical standards, such as in IT\u00a0
facility access<\/a>, device\u00a0 \u00a0fabrication<\/a>\u00a0or\u00a0assembly<\/a>? How vulnerable are AI-driven autonomous IT systems, movable and not, to attacks via their critical socio-technical low-level subsystems?<\/p>

Can the paradigm \u201cTrust but verify\u201d still be\u00a0a sufficient when the\u00a0bribery, threatening or identity theft of a single person (rarely 2), in key role in the life-cycle of a single\u00a0critical\u00a0component or process, can enable concurrent compromise of\u00a0every instance\u00a0of a\u00a0given\u00a0critical IT system, including communication,state surveillance, or autonomous movable devices? \u00a0Should the paradigm rather be\u00a0\u201cTrust or verify\u201d, by deepening and extending oversight\u00a0all the way to CPU designs and fabrication oversight? But how can that be made economical for wide spread adoption and compatible with feature and performance needs?<\/p>

For more details on the context, see and contribute to our\u00a0Challenges Backgrounder<\/a>.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t<\/i>\t\t\t\t\t\t\tPlay Video<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t