SlideShare a Scribd company logo
1 of 14
Download to read offline
Rufo Guerreschi | CEO โ€“ rufo@trustless.ai
Seamlessly delivering unimagined freedoms to your digital life.
.AI
TRUSTLESS.AI	is	building	a	2mm-thin	touch-screen	device	-
attachable	through	a	case	to	the	back	of	any	phone	and	to	your	desktop	monitor	โ€“
that	seamlessly delivers	top	enterprises,	top	banks,	and	mission-critical	NGOs	
unimagined levels	of	confidentiality	and	integrity	
of	their	lawful	communications	and	financial	transactions,	
both	e-banking	and	cryptocurrency.
Once	market-proven	as	the	endpoint	security	leader,	weโ€™ll	scale-up	as	
the	1st	ultra-secure	enterprise	applications	platform,	and	
root	of	trust	of	wide-market	safety-critical	autonomous	systems.
1983: IT PROMISES
2013: IT REALITY
No	matter	what	price	a	bank,	enterprise or	person	
is	willing	to	pay, no	device	is	available	today	that	
offers	meaningful	protection	of	confidentiality	&	
integrity,	beyond	mid-high	level	threats.
The Problem
Confidentiality	and	integrity
of	communications	and	transactions.	
A	problem	for	many,	but	critical for	top	staff	of:
โ€ข Large	Enterprises
โ€ข Large	Financial	Institutions
โ€ข Mission-critical	NGOs
data	theft
unwanted	travel
missed	opportunities
A	desktop	dock	stand
which	embeds:
1. a	micro-USB	port,	for	charging
2. a	Wi-Fi	hardware-secured	
anonymization	chip,	for	metadata
privacy.
3. an	HDMI-switch,	for	long- form	
text	editing	on	the	userโ€™s	desktop	
LCD.
A	2mm-thin	touch-screen	device,	
that	provide	basic	features	but	with	
radically	unprecedented levels	of	
integrity	and	confidentiality:
1. Rich-text	synchronous	and	
asynchronous	messaging	
2. Rich-text	collaborative	editing	(i.e.	
contracting,	negotiations)
3. E-banking
4. Cryptocurrency	client	and	wallet
5. Password	management,	multiple	
persona
Userโ€™s	
Smartphone
CivicCase (for	top	smartphones)
CivicPod
CivicPod CivicDock
The Solution
CivicKeyboard
Play our 2-minute
product video at:
www.TRUSTLESS.AI
1. assumes that extremely-skilled attackers are willing to devote even tens of millions of Euros to
compromise the supply chain or lifecycle, through legal and illegal subversion of all kinds,
including economic pressures.
2. provides extremely user-accountable and technically-proficient oversight of all hardware,
software and organizational processes critically involved in the entire lifecycle and supply chains;
3. provides extreme levels of security review intensity relative to system complexity, for all critical
components; and includes only publicly verifiable components, and strongly minimizes use of
non-Free/Open-source software and firmware.
4. includes only open innovations with clear and low long-term royalties (<15% of end-user cost)
from patent and licensing fees, to prevent undue intellectual property right holdersโ€™ pressures,
lock-ins, patent vetoes and ensure low-costs affordable to ordinary citizens;
5. includes only highly-redundant hardware and/or software cryptosystems, whose protocols,
algorithms and implementations are open, long-standing, extensively-verified and endorsed, and
with significant and scalable post-quantum resistance levels.
6. is continuously certified by an extremely technically-proficient and user-accountable
independent standard/certification body.
Trustless Computing Paradigms
Rufo Guerreschi
CEO & Founder
The Team
12	years	of	single-minded	pursuit	of	meaningful	
enactment	of	civil	rights	in	cyberspace.	Lead	open	
source	e-voting/e-democracy	startup,	that	sold	in	3	
continents.	Brought	valuation	of	a	planned	EU	2nd	
largest	IT/media	tech	park	from	3โ‚ฌ	to	21Mโ‚ฌ	
Lead	EU	sales	of	J2ME	provisioning	system	till	a	10Mโ‚ฌ+	
2001	sale	to	Telefonica	Aggregated	unique	global	R&D	
partners	on	the	4-15Mโ‚ฌ	Trustless	Computing	Initiative.
Artur Pylak
CFO
Experienced acting CFO in several startups.
Senior	research	analyst	at	SSR	LLC,	covering	the	
TMT	space	with	expertise	in	cybersecurity	&AI.	
Co-authored	leading	valuations	forecast	of	
stock-quoted	firms	in	hot	IT	verticals,	including	
cybersecurity,	self-driving	cars,	and	digital	
assistants.
Roberto Gallo
CTO
Designed	and	deployed	since	2014	the	World's	1st
CPU	fully	inspectable	without	NDA	in	its	HW	&	
SW	source	designs,	and	the	the	first	secure	CPU	
of	the	Southern	Hemisphere.
Designed	the	security	architecture	of	the	400.000	
Brazilian	voting	machines;	the	ASI-HSM,	the	HSM	
of	the	Brazilian	PKI-root	CA;	and	fighter-to-fighter	
communication	systems.
Director	of	Marketing.	branding,	positioning,	art	direction	of	website,	slides,	video,
Toby	Scholtz.	For	2	years,	Germany	country	manager	and	marketing	head	of	Apple-
owned	Beats,	the	leader	in	hi-fi	wireless	headsets.	Formerly	marketing	for	mobile	
operators.	Location:	Berlin/Rome.	(linkedin)
Director	of	Supply	Chain	&	Manufacturability:	manufacturability,	HW	prototype.
Joonyoung Park. Has	lead	in	the	Valley	the	global	R&D	for	a	EU-based	global	leader	
in	IPTV,	CAS	and	cybersecurity;	Managing	Director	of	a	200M$/yr 7-sigma	
electronics	manufacturing	plant	in	South	Korea.	Location:	Seoul.	(Linkedin)	
Director	of	Business	Development - Baltic	Region	banks	&	enterprise,	Military	and	
Government:	pilot/product	sales,	tech	consulting.	Maris	Kohen.	CTO	of	Cybersecurity	
at	ATOS	Baltics;	former	CSO	of	Telecom	Luxembourg.	Location:	Luxembourg/Rome.	
(Linkedin)
Director	of	Business	Development	- Mission-critical	NGOs:	pilot/product	sales,	prj
management,	operations.	Alexander	Elkin.	Former	Head	of	Strategy	&	Internet	
Projects	at	Transparency	International	Russia	(Linkedin)	
Director	of	Business	Development - DACH	Region	banks	and	enterprises.	
pilot/product	sales,	fundraising.	Matteo	Butussi.	Formerly	director	of	business	
development	at	Kudelski	Cybersecurity.	Location:	Zurich.	(Linkedin)
The Team: Trustless Computing Consortium
Worldโ€™s	largest	Artificial	Intelligence	R&D	center,	a	partner	in	our	
CivicFab	FOUNDRY	OVERSIGHT	process.	(Germany)	
Maker	of	Worldโ€™s	1st general-purpose	CPU with	publicly	reviewable	
HW/SW	designs.	(Brazil)	
Makers	of	the	smallest	high	assurance	OS with	3000	lines	of	source	
code.	One	of	two	with	formal	proof	of	correctness.	(Germany)	
EU	leading	CRYPTO	R&D	center,	lead	by	the	most	renowned	EU	
cryptologist	and	IT	security	expert,	Bart	Preneel (Belgium)	
*A	200mm	110nm	EU-based	FOUNDRY,	fully	validated	our	CivicFab	
oversight	processes.	(Italy)	
*exploring alternative following 6/2016 non-EU acquisition.
Globally-unique	suppliers	that	agreed	to	detailed	IP/non-compete	
to	build	our	security-critical	supply-chain	and	computing	base
TRUSTLESS.AI is primarily the fruit of 15 years of single-
minded quest of our CEO Rufo Guerreschi to realize
the potential of ICT to radically improve individual civil
freedoms and democratic participation.
Since 1983, the realization of such potential was
promised by Richard Stallmanโ€˜s with the Free Software
Movement, on one side; and by Steve Jobsโ€™ Apple,
with its famous โ€œ1984โ€ Apple video ad, on the other.
Such promises have not only utterly failed, but the
freedom and security of citizens and businesses
have dramatically worsened.
Whatever the price a user is willing to pay, there are still
no devices in the market today that provide even
remotely comprehensive evidence about their level of
resistance against scalable, pervasive, undetectable
compromisation by large numbers of state and non-state
actors.
Thirty three years later, TRUSTLESS.AI has a rock solid
plan to fully and sustainably deliver on such promises,
initially to premium users, and then to most citizens,
through (1) a unique team and supply-chain consortium,
and (2) revolutionary and unprecedented IT security
paradigms centered on ensuring complete transparency,
and extreme oversight and security-review relative to
complexity, of all techs and processes critically involved in
the life-cycle.
Since 2013, TRUSTLESS.AI has been โ€œincubatedโ€ in
the Trustless Computing Inititative by partners and
members of the Trustless Computing Consortium with
globally-rare or unique expertise in open high-assurance IT.
Since 2015, plans for a Trustless Computing Certification
Body have been discussed with the top world experts and EU
officials at events in Brussels, New York, Brazil, and next in
SF, through our Free and Safe in Cyberspace event series.
In July 2016, TRUSTLESS graduated from the Berlin-
based Hardware.co Pre-Acceleration Program, sponsored by
Siemens, Bosch and Deutsche Bahn. On Oct 22nd, we moved
to Menlo Park, CA, to consolidate the team, get investor
traction and advance our prototype.
Our Story
Unique Competitive Advantages
Our	Trustless	Computing	Consortium	aggregates	globally-
unique	high-assurance	ICT	suppliers with	a	binding	MoU	for	
IP,	non-compete	and	resilience;	
Our	Trustless	Computing	Paradigms	and	its	proposed	
Certification	Body	has	been	widely	shared	through	our	Free	
and	Safe	in	Cyberspace	events	in	Brussels,	New	York,	Brazil,	
Brussels	again,	with	the	participation	of	unique	speakers	
Next	in	Berlin	and	again	Brussels.	
Key	speakers,	sponsors	and	advisors	- including	Bart	Preneel,	
CapGemini Netherlands,	EIT	Digital,	and	Tecnalia - have	
started	since	early	2016	working	on	a	10-pager	summary	
Manifesto	of	Trustless	Computing	(PDF)	and	a	full	50-pager	
draft	full	Proposal.
ALL	software,	hardware	and	organization	processes	
critically	involved	in	the	lifecycle	and	supply	chain	will	
uniquely	be:
(A)	Publicly	inspectable	in	their	source	HW	&	SW	
designs	without	NDA;
(B)	Subject	to	extreme	security-review	relative	to	
complexity,	by	paid	highly-proficient	and	โ€œethicalโ€	hackers;
(C)	Subject	to	extremely	resilient	oversight,	based	on	
offline	citizen-witness	or	citizen-jury	processes,	in	
addition	to	state-of-the-art	IT	security	safeguards.
Security-critical	Ecosystem
Security	Paradigms
Form	Factor
Thought	Leadership
US Defense Science Board (2015): โ€œTrust cannot be added to integrated circuits after fabricationโ€
Bruce Schneier (2014): โ€œFrom what weโ€™ve learned, we should assume all mainstream CPUs to be compromisedโ€
Michael Sieber, Head of Information Superiority of the European Defence Agency stated at our 1st Free and Safe in
Cyberspace: โ€œAmong EU member states, itโ€™s hilarious: they claim digital sovereignty but they rely mostly on Chinese hardware, on
US American software, and they need a famous Russian to reveal the vulnerabilities"
CivicFab (1): The Problem
Our CivicFab processes will deploy general concepts reportedly applied by NSA Trusted
Access/Foundry Program today in cases in which they require the highest-level chip
fabrication oversight assurance. They reportedly choose a foundry that fits the
equipment and general oversight process specifications โ€“ located, if not in the US, in a
country that overall provide more assurance than others โ€“ which will agree to:
โ— (1) Make sure that the requested hardware is all produced in one continuous
batch in a short time span (a few weeks), as is typical anyway;
โ— (2) Allow, for each batch, to setup and configure an extensive sensing and
monitoring IT infrastructure โ€“ often produces by specialized proprietary
companies โ€“ and allow about 3 (or more) competent, trained, redundant and
trusted technicians, per shift, to verify thoroughly the entire process, 24/7 and
on-site, from a monitoring room and inside the "cleanroom".
CivicFab (2): Matching state-of-the art
In excess of the NSA Trusted Foundry Program, described in previous slide, the CivicFab will:
A. Add at minimum number โ€œcitizen witnessesโ€, through mix of citizen jury and deliberative polling
methods made up of 5 (or more) randomly-sampled citizens and CivicPod users, in a role of active
oversight witnesses 24/7 in the critical phases. They would be well paid to take that time off, would be
extensively trained and โ€œself trainedโ€ through open participatory processes;
B. Choose to produce all critical ICs at EU-based 200-300mm EAL5+ foundries with older technologies,
simpler processes, and less third-party IP obstacles than todayโ€™sโ€™ Asian megafabs, such that they allow
the technicians and witnesses to publicly and completely document the process with videos, photos
and more.
C. Equipment and sensors, to be applied to the chosen foundries, should as much as possible not require
direct interventions or disruption of the foundry equipment and facilities, but just rely on setting up an
additional overlay of sensing equipment, and on getting copy of the existing quality control sensor
feeds. This would also increase the โ€œportabilityโ€ of the CivicSite processes to other foundries, and in
part the resiliency of the solution.
D. Sensing and oversight equipment would run Trustless transparent ultra-high assurance HW/SW will
as much as possible be air gapped, make use of high assurance verifiable systems, and as much as
possible based on TRUSTLESS SW & HW.
CivicFab (3): Radically exceeding state-of-the-art
At the service level.
TRUSTLESS.AI will provide key recovery service to all its
customers, in case of user death or loss of password, as well as
a way to comply to legal AND constitutional lawful access
requests. Although the architecture is pure P2P, partial
temporary encryption keys are mandatorily saved daily to a
redundant set of CivicRooms, whose physical access is under
the direct management, certification and oversight of an
international Trustless Computing Certification Body (TCCB).
The validity of civilian court orders AND absence of blatant
unconstitutionality will be evaluated on-site by trained
citizen-jury-like body assisted by legal counsels. Its radically
unprecedented technical and organizational safeguards will
guarantee both users' rights and the crucial needs of the
public security agencies.
At the fabrication level.
The public availability of all TRUSTLESS.AI critical SW & HW
source designs could enable criminal actors to produce their
own CivicDevices for malevolent use. Such threat will be
extremely and sufficiently reduced by a combination of: (A) IP
cores tied to specific, capital intensive fabrication processes,
naturally not available on mini scale prototyping fabrication
facilities and foundries; (B) current inability of malevolent
states or groups to fully and truly control a suitable
semiconductor foundry. (C) In the rare case in which terrorist
groups may attempt to enter in agreements with suitable
foundries, current Allied intelligence capabilities can make
sure to either forcefully prevent it or, better, insert
vulnerabilities in their fabrication processes to acquire in the
future extremely valuable intelligence.
But, how do we prevent grave abuse by criminals?!

More Related Content

What's hot

Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015Alex G. Lee, Ph.D. Esq. CLP
ย 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies servicesBruno Zysman
ย 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7Chin Wan Lim
ย 
AI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from PatentsAI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
ย 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyAlex G. Lee, Ph.D. Esq. CLP
ย 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTRedit
ย 
MIFA Newsletter - November 2021 Edition
MIFA Newsletter  - November 2021 EditionMIFA Newsletter  - November 2021 Edition
MIFA Newsletter - November 2021 EditionDr. Mazlan Abbas
ย 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
ย 
Identive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer KitsIdentive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer KitsIdentive
ย 
Creative Engineering Breakthroughs
Creative Engineering BreakthroughsCreative Engineering Breakthroughs
Creative Engineering BreakthroughsNestor Michael Tiglao
ย 
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterNFC Forum
ย 
Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...Identive
ย 
Digital Co 1
Digital Co 1Digital Co 1
Digital Co 1jmansourian
ย 
I wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessoriesI wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessoriesiwalletusa
ย 
Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...changeableradiu23
ย 
Moving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainMoving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainDr. Mazlan Abbas
ย 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
ย 
The Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer NationThe Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer NationDr. Mazlan Abbas
ย 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanNFC Forum
ย 

What's hot (20)

Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
ย 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies services
ย 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
ย 
AI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from PatentsAI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from Patents
ย 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
ย 
Extreme Digital Ventures
Extreme Digital VenturesExtreme Digital Ventures
Extreme Digital Ventures
ย 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICT
ย 
MIFA Newsletter - November 2021 Edition
MIFA Newsletter  - November 2021 EditionMIFA Newsletter  - November 2021 Edition
MIFA Newsletter - November 2021 Edition
ย 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
ย 
Identive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer KitsIdentive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer Kits
ย 
Creative Engineering Breakthroughs
Creative Engineering BreakthroughsCreative Engineering Breakthroughs
Creative Engineering Breakthroughs
ย 
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
ย 
Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecureยฎ OpenAccess Wall M...
ย 
Digital Co 1
Digital Co 1Digital Co 1
Digital Co 1
ย 
I wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessoriesI wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessories
ย 
Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...
ย 
Moving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainMoving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value Chain
ย 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
ย 
The Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer NationThe Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer Nation
ย 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in Japan
ย 

Viewers also liked

PrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw CopyPrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw CopyAmber Hollingsworth
ย 
Goed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin PauwelsGoed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin PauwelsThierry Debels
ย 
Los Desafรญos de la educaciรณn a distancia
Los Desafรญos de la educaciรณn a distanciaLos Desafรญos de la educaciรณn a distancia
Los Desafรญos de la educaciรณn a distanciaClaudio Rama
ย 
PostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practicePostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practiceJano Suchal
ย 
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...ROER4D
ย 
Game Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do ItGame Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do ItJesse Schell
ย 
MOOC Aspects juridiques de la crรฉation d'entreprises innovantes - attestation
MOOC Aspects juridiques de la crรฉation d'entreprises innovantes -  attestationMOOC Aspects juridiques de la crรฉation d'entreprises innovantes -  attestation
MOOC Aspects juridiques de la crรฉation d'entreprises innovantes - attestationAudrey Jacob
ย 
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HEChoosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HECatherine Cronin
ย 
Marketing Week Live 2017
Marketing Week Live 2017Marketing Week Live 2017
Marketing Week Live 2017Jeremy Waite
ย 
ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~
ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~
ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~Kamiya Toshihiro
ย 
ใฏใ˜ใ‚ใฆใฎ CircleCI
ใฏใ˜ใ‚ใฆใฎ CircleCIใฏใ˜ใ‚ใฆใฎ CircleCI
ใฏใ˜ใ‚ใฆใฎ CircleCIYosuke Mizutani
ย 
Python ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack bot
Python ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack botPython ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack bot
Python ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack botdcubeio
ย 
WindowsใงPython
WindowsใงPythonWindowsใงPython
WindowsใงPythondrillan
ย 
Profile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv BhavnaniProfile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv BhavnaniSanjiv Bhavnani
ย 
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker imagesRootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker imagesDaniel Garcia (a.k.a cr0hn)
ย 
Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...Danny Kingsley
ย 
We invented management, we can re invent it!
We invented management, we can re invent it!We invented management, we can re invent it!
We invented management, we can re invent it!JESry
ย 
Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...Ricardo Fernรกndez
ย 

Viewers also liked (20)

PrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw CopyPrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw Copy
ย 
Goed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin PauwelsGoed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin Pauwels
ย 
Mesa job _fair_flyer
Mesa job _fair_flyerMesa job _fair_flyer
Mesa job _fair_flyer
ย 
Los Desafรญos de la educaciรณn a distancia
Los Desafรญos de la educaciรณn a distanciaLos Desafรญos de la educaciรณn a distancia
Los Desafรญos de la educaciรณn a distancia
ย 
PostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practicePostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practice
ย 
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
ย 
Game Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do ItGame Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do It
ย 
MOOC Aspects juridiques de la crรฉation d'entreprises innovantes - attestation
MOOC Aspects juridiques de la crรฉation d'entreprises innovantes -  attestationMOOC Aspects juridiques de la crรฉation d'entreprises innovantes -  attestation
MOOC Aspects juridiques de la crรฉation d'entreprises innovantes - attestation
ย 
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HEChoosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
ย 
Marketing Week Live 2017
Marketing Week Live 2017Marketing Week Live 2017
Marketing Week Live 2017
ย 
ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~
ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~
ใ‚ณใƒผใƒ‰ใ‚ฏใƒญใƒผใƒณ็ ”็ฉถ ใตใ‚Šใ‹ใˆใ‚Š ~ใ‚นใƒˆใƒญใƒณใ‚ฐใƒปใ‚นใ‚ฟใ‚คใƒซใง่กŒใ“ใ†~
ย 
ใฏใ˜ใ‚ใฆใฎ CircleCI
ใฏใ˜ใ‚ใฆใฎ CircleCIใฏใ˜ใ‚ใฆใฎ CircleCI
ใฏใ˜ใ‚ใฆใฎ CircleCI
ย 
Python ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack bot
Python ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack botPython ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack bot
Python ร— Herokuใงไฝœใ‚‹ ้›‘่ซ‡slack bot
ย 
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
ย 
WindowsใงPython
WindowsใงPythonWindowsใงPython
WindowsใงPython
ย 
Profile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv BhavnaniProfile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv Bhavnani
ย 
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker imagesRootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
ย 
Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...
ย 
We invented management, we can re invent it!
We invented management, we can re invent it!We invented management, we can re invent it!
We invented management, we can re invent it!
ย 
Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovaciรณn educativa XVI Jornadas Regional...
ย 

Similar to TRUSTLESS.AI and Trustless Computing Consortium

Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing InitiativeTRUSTLESS.AI
ย 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
ย 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalSorin Ciornei
ย 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review
ย 
Telefรณnica security io_t_final
Telefรณnica security io_t_finalTelefรณnica security io_t_final
Telefรณnica security io_t_finalChristopher Wang
ย 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 LondonNOAH Advisors
ย 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
ย 
HASH-box - Business Plan Presentation
HASH-box - Business Plan PresentationHASH-box - Business Plan Presentation
HASH-box - Business Plan PresentationPROBOTEK
ย 
Y20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซ
Y20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซY20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซ
Y20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซm12016changTIIMP
ย 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview PresentationBlock Armour
ย 
IoT Middleware Market
IoT Middleware MarketIoT Middleware Market
IoT Middleware MarketHarshalBamble
ย 
Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!Debut Infotech
ย 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015Roberto Siagri
ย 
์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)
์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)
์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)GE์ฝ”๋ฆฌ์•„
ย 
Buckle Up
Buckle UpBuckle Up
Buckle UpDMIMarketing
ย 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Ersin KARA
ย 
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdfThe 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdfInsightsSuccess4
ย 
Accenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology
ย 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01Crissa Toledo
ย 

Similar to TRUSTLESS.AI and Trustless Computing Consortium (20)

Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing Initiative
ย 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
ย 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
ย 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020
ย 
Telefรณnica security io_t_final
Telefรณnica security io_t_finalTelefรณnica security io_t_final
Telefรณnica security io_t_final
ย 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
ย 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
ย 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
ย 
HASH-box - Business Plan Presentation
HASH-box - Business Plan PresentationHASH-box - Business Plan Presentation
HASH-box - Business Plan Presentation
ย 
Y20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซ
Y20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซY20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซ
Y20151003 IoT ่ณ‡่จŠๅฎ‰ๅ…จ_่ถจๅ‹ข็ง‘ๆŠ€ๅˆ†ไบซ
ย 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
ย 
IoT Middleware Market
IoT Middleware MarketIoT Middleware Market
IoT Middleware Market
ย 
Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!
ย 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015
ย 
์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)
์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)
์šด์˜๊ธฐ์ˆ ์šฉ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํ•ต์‹ฌ ๊ฐ€์ด๋“œ | ์›”๋“œํ…Œํฌ(Wurldtech)
ย 
Buckle Up
Buckle UpBuckle Up
Buckle Up
ย 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019
ย 
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdfThe 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
ย 
Accenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business Era
ย 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
ย 

More from TRUSTLESS.AI

TRUSTLESS
TRUSTLESSTRUSTLESS
TRUSTLESSTRUSTLESS.AI
ย 
TRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS.AI
ย 
Trustless slides dual-use R&D Proposal
Trustless slides dual-use R&D ProposalTrustless slides dual-use R&D Proposal
Trustless slides dual-use R&D ProposalTRUSTLESS.AI
ย 
Open media district slide intro pa
Open media district   slide intro paOpen media district   slide intro pa
Open media district slide intro paTRUSTLESS.AI
ย 
SAE Group Studio301 Qantm
SAE Group Studio301 QantmSAE Group Studio301 Qantm
SAE Group Studio301 QantmTRUSTLESS.AI
ย 
Kit Digital
Kit DigitalKit Digital
Kit DigitalTRUSTLESS.AI
ย 
Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02TRUSTLESS.AI
ย 

More from TRUSTLESS.AI (7)

TRUSTLESS
TRUSTLESSTRUSTLESS
TRUSTLESS
ย 
TRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide Deck
ย 
Trustless slides dual-use R&D Proposal
Trustless slides dual-use R&D ProposalTrustless slides dual-use R&D Proposal
Trustless slides dual-use R&D Proposal
ย 
Open media district slide intro pa
Open media district   slide intro paOpen media district   slide intro pa
Open media district slide intro pa
ย 
SAE Group Studio301 Qantm
SAE Group Studio301 QantmSAE Group Studio301 Qantm
SAE Group Studio301 Qantm
ย 
Kit Digital
Kit DigitalKit Digital
Kit Digital
ย 
Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02
ย 

Recently uploaded

Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445ruhi
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹nirzagarg
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
ย 

Recently uploaded (20)

Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 

TRUSTLESS.AI and Trustless Computing Consortium

  • 1. Rufo Guerreschi | CEO โ€“ rufo@trustless.ai Seamlessly delivering unimagined freedoms to your digital life. .AI
  • 3. 1983: IT PROMISES 2013: IT REALITY No matter what price a bank, enterprise or person is willing to pay, no device is available today that offers meaningful protection of confidentiality & integrity, beyond mid-high level threats.
  • 4. The Problem Confidentiality and integrity of communications and transactions. A problem for many, but critical for top staff of: โ€ข Large Enterprises โ€ข Large Financial Institutions โ€ข Mission-critical NGOs data theft unwanted travel missed opportunities
  • 5. A desktop dock stand which embeds: 1. a micro-USB port, for charging 2. a Wi-Fi hardware-secured anonymization chip, for metadata privacy. 3. an HDMI-switch, for long- form text editing on the userโ€™s desktop LCD. A 2mm-thin touch-screen device, that provide basic features but with radically unprecedented levels of integrity and confidentiality: 1. Rich-text synchronous and asynchronous messaging 2. Rich-text collaborative editing (i.e. contracting, negotiations) 3. E-banking 4. Cryptocurrency client and wallet 5. Password management, multiple persona Userโ€™s Smartphone CivicCase (for top smartphones) CivicPod CivicPod CivicDock The Solution CivicKeyboard Play our 2-minute product video at: www.TRUSTLESS.AI
  • 6. 1. assumes that extremely-skilled attackers are willing to devote even tens of millions of Euros to compromise the supply chain or lifecycle, through legal and illegal subversion of all kinds, including economic pressures. 2. provides extremely user-accountable and technically-proficient oversight of all hardware, software and organizational processes critically involved in the entire lifecycle and supply chains; 3. provides extreme levels of security review intensity relative to system complexity, for all critical components; and includes only publicly verifiable components, and strongly minimizes use of non-Free/Open-source software and firmware. 4. includes only open innovations with clear and low long-term royalties (<15% of end-user cost) from patent and licensing fees, to prevent undue intellectual property right holdersโ€™ pressures, lock-ins, patent vetoes and ensure low-costs affordable to ordinary citizens; 5. includes only highly-redundant hardware and/or software cryptosystems, whose protocols, algorithms and implementations are open, long-standing, extensively-verified and endorsed, and with significant and scalable post-quantum resistance levels. 6. is continuously certified by an extremely technically-proficient and user-accountable independent standard/certification body. Trustless Computing Paradigms
  • 7. Rufo Guerreschi CEO & Founder The Team 12 years of single-minded pursuit of meaningful enactment of civil rights in cyberspace. Lead open source e-voting/e-democracy startup, that sold in 3 continents. Brought valuation of a planned EU 2nd largest IT/media tech park from 3โ‚ฌ to 21Mโ‚ฌ Lead EU sales of J2ME provisioning system till a 10Mโ‚ฌ+ 2001 sale to Telefonica Aggregated unique global R&D partners on the 4-15Mโ‚ฌ Trustless Computing Initiative. Artur Pylak CFO Experienced acting CFO in several startups. Senior research analyst at SSR LLC, covering the TMT space with expertise in cybersecurity &AI. Co-authored leading valuations forecast of stock-quoted firms in hot IT verticals, including cybersecurity, self-driving cars, and digital assistants. Roberto Gallo CTO Designed and deployed since 2014 the World's 1st CPU fully inspectable without NDA in its HW & SW source designs, and the the first secure CPU of the Southern Hemisphere. Designed the security architecture of the 400.000 Brazilian voting machines; the ASI-HSM, the HSM of the Brazilian PKI-root CA; and fighter-to-fighter communication systems. Director of Marketing. branding, positioning, art direction of website, slides, video, Toby Scholtz. For 2 years, Germany country manager and marketing head of Apple- owned Beats, the leader in hi-fi wireless headsets. Formerly marketing for mobile operators. Location: Berlin/Rome. (linkedin) Director of Supply Chain & Manufacturability: manufacturability, HW prototype. Joonyoung Park. Has lead in the Valley the global R&D for a EU-based global leader in IPTV, CAS and cybersecurity; Managing Director of a 200M$/yr 7-sigma electronics manufacturing plant in South Korea. Location: Seoul. (Linkedin) Director of Business Development - Baltic Region banks & enterprise, Military and Government: pilot/product sales, tech consulting. Maris Kohen. CTO of Cybersecurity at ATOS Baltics; former CSO of Telecom Luxembourg. Location: Luxembourg/Rome. (Linkedin) Director of Business Development - Mission-critical NGOs: pilot/product sales, prj management, operations. Alexander Elkin. Former Head of Strategy & Internet Projects at Transparency International Russia (Linkedin) Director of Business Development - DACH Region banks and enterprises. pilot/product sales, fundraising. Matteo Butussi. Formerly director of business development at Kudelski Cybersecurity. Location: Zurich. (Linkedin)
  • 8. The Team: Trustless Computing Consortium Worldโ€™s largest Artificial Intelligence R&D center, a partner in our CivicFab FOUNDRY OVERSIGHT process. (Germany) Maker of Worldโ€™s 1st general-purpose CPU with publicly reviewable HW/SW designs. (Brazil) Makers of the smallest high assurance OS with 3000 lines of source code. One of two with formal proof of correctness. (Germany) EU leading CRYPTO R&D center, lead by the most renowned EU cryptologist and IT security expert, Bart Preneel (Belgium) *A 200mm 110nm EU-based FOUNDRY, fully validated our CivicFab oversight processes. (Italy) *exploring alternative following 6/2016 non-EU acquisition. Globally-unique suppliers that agreed to detailed IP/non-compete to build our security-critical supply-chain and computing base
  • 9. TRUSTLESS.AI is primarily the fruit of 15 years of single- minded quest of our CEO Rufo Guerreschi to realize the potential of ICT to radically improve individual civil freedoms and democratic participation. Since 1983, the realization of such potential was promised by Richard Stallmanโ€˜s with the Free Software Movement, on one side; and by Steve Jobsโ€™ Apple, with its famous โ€œ1984โ€ Apple video ad, on the other. Such promises have not only utterly failed, but the freedom and security of citizens and businesses have dramatically worsened. Whatever the price a user is willing to pay, there are still no devices in the market today that provide even remotely comprehensive evidence about their level of resistance against scalable, pervasive, undetectable compromisation by large numbers of state and non-state actors. Thirty three years later, TRUSTLESS.AI has a rock solid plan to fully and sustainably deliver on such promises, initially to premium users, and then to most citizens, through (1) a unique team and supply-chain consortium, and (2) revolutionary and unprecedented IT security paradigms centered on ensuring complete transparency, and extreme oversight and security-review relative to complexity, of all techs and processes critically involved in the life-cycle. Since 2013, TRUSTLESS.AI has been โ€œincubatedโ€ in the Trustless Computing Inititative by partners and members of the Trustless Computing Consortium with globally-rare or unique expertise in open high-assurance IT. Since 2015, plans for a Trustless Computing Certification Body have been discussed with the top world experts and EU officials at events in Brussels, New York, Brazil, and next in SF, through our Free and Safe in Cyberspace event series. In July 2016, TRUSTLESS graduated from the Berlin- based Hardware.co Pre-Acceleration Program, sponsored by Siemens, Bosch and Deutsche Bahn. On Oct 22nd, we moved to Menlo Park, CA, to consolidate the team, get investor traction and advance our prototype. Our Story
  • 10. Unique Competitive Advantages Our Trustless Computing Consortium aggregates globally- unique high-assurance ICT suppliers with a binding MoU for IP, non-compete and resilience; Our Trustless Computing Paradigms and its proposed Certification Body has been widely shared through our Free and Safe in Cyberspace events in Brussels, New York, Brazil, Brussels again, with the participation of unique speakers Next in Berlin and again Brussels. Key speakers, sponsors and advisors - including Bart Preneel, CapGemini Netherlands, EIT Digital, and Tecnalia - have started since early 2016 working on a 10-pager summary Manifesto of Trustless Computing (PDF) and a full 50-pager draft full Proposal. ALL software, hardware and organization processes critically involved in the lifecycle and supply chain will uniquely be: (A) Publicly inspectable in their source HW & SW designs without NDA; (B) Subject to extreme security-review relative to complexity, by paid highly-proficient and โ€œethicalโ€ hackers; (C) Subject to extremely resilient oversight, based on offline citizen-witness or citizen-jury processes, in addition to state-of-the-art IT security safeguards. Security-critical Ecosystem Security Paradigms Form Factor Thought Leadership
  • 11. US Defense Science Board (2015): โ€œTrust cannot be added to integrated circuits after fabricationโ€ Bruce Schneier (2014): โ€œFrom what weโ€™ve learned, we should assume all mainstream CPUs to be compromisedโ€ Michael Sieber, Head of Information Superiority of the European Defence Agency stated at our 1st Free and Safe in Cyberspace: โ€œAmong EU member states, itโ€™s hilarious: they claim digital sovereignty but they rely mostly on Chinese hardware, on US American software, and they need a famous Russian to reveal the vulnerabilities" CivicFab (1): The Problem
  • 12. Our CivicFab processes will deploy general concepts reportedly applied by NSA Trusted Access/Foundry Program today in cases in which they require the highest-level chip fabrication oversight assurance. They reportedly choose a foundry that fits the equipment and general oversight process specifications โ€“ located, if not in the US, in a country that overall provide more assurance than others โ€“ which will agree to: โ— (1) Make sure that the requested hardware is all produced in one continuous batch in a short time span (a few weeks), as is typical anyway; โ— (2) Allow, for each batch, to setup and configure an extensive sensing and monitoring IT infrastructure โ€“ often produces by specialized proprietary companies โ€“ and allow about 3 (or more) competent, trained, redundant and trusted technicians, per shift, to verify thoroughly the entire process, 24/7 and on-site, from a monitoring room and inside the "cleanroom". CivicFab (2): Matching state-of-the art
  • 13. In excess of the NSA Trusted Foundry Program, described in previous slide, the CivicFab will: A. Add at minimum number โ€œcitizen witnessesโ€, through mix of citizen jury and deliberative polling methods made up of 5 (or more) randomly-sampled citizens and CivicPod users, in a role of active oversight witnesses 24/7 in the critical phases. They would be well paid to take that time off, would be extensively trained and โ€œself trainedโ€ through open participatory processes; B. Choose to produce all critical ICs at EU-based 200-300mm EAL5+ foundries with older technologies, simpler processes, and less third-party IP obstacles than todayโ€™sโ€™ Asian megafabs, such that they allow the technicians and witnesses to publicly and completely document the process with videos, photos and more. C. Equipment and sensors, to be applied to the chosen foundries, should as much as possible not require direct interventions or disruption of the foundry equipment and facilities, but just rely on setting up an additional overlay of sensing equipment, and on getting copy of the existing quality control sensor feeds. This would also increase the โ€œportabilityโ€ of the CivicSite processes to other foundries, and in part the resiliency of the solution. D. Sensing and oversight equipment would run Trustless transparent ultra-high assurance HW/SW will as much as possible be air gapped, make use of high assurance verifiable systems, and as much as possible based on TRUSTLESS SW & HW. CivicFab (3): Radically exceeding state-of-the-art
  • 14. At the service level. TRUSTLESS.AI will provide key recovery service to all its customers, in case of user death or loss of password, as well as a way to comply to legal AND constitutional lawful access requests. Although the architecture is pure P2P, partial temporary encryption keys are mandatorily saved daily to a redundant set of CivicRooms, whose physical access is under the direct management, certification and oversight of an international Trustless Computing Certification Body (TCCB). The validity of civilian court orders AND absence of blatant unconstitutionality will be evaluated on-site by trained citizen-jury-like body assisted by legal counsels. Its radically unprecedented technical and organizational safeguards will guarantee both users' rights and the crucial needs of the public security agencies. At the fabrication level. The public availability of all TRUSTLESS.AI critical SW & HW source designs could enable criminal actors to produce their own CivicDevices for malevolent use. Such threat will be extremely and sufficiently reduced by a combination of: (A) IP cores tied to specific, capital intensive fabrication processes, naturally not available on mini scale prototyping fabrication facilities and foundries; (B) current inability of malevolent states or groups to fully and truly control a suitable semiconductor foundry. (C) In the rare case in which terrorist groups may attempt to enter in agreements with suitable foundries, current Allied intelligence capabilities can make sure to either forcefully prevent it or, better, insert vulnerabilities in their fabrication processes to acquire in the future extremely valuable intelligence. But, how do we prevent grave abuse by criminals?!