Print This Page

User Verified Social Telematics

UVSTUser Verified Social Telematics is a disruptive international project, developed through 3 parallel initiatives/phases, aimed at the development of a profitable ecosystem, permanent facilities and an international standard around the creation of the world’s most user-trustworthy general purpose computing platform, which has power consumption and form-factor that make it suitable for a thin handheld end-user device integrated or “attached” to any user’s ordinary smartphone, as well as for server, routing and other IoT/M2M equipment, albeit with very basic features and performance. 

Here’s a 25-pager UVST Executive Summary (PDF).

HOW: Extreme minimisation of hardware and software will allow extreme verification relative to complexity of ALL software, firmware, hardware and processes (including hw design and manufacturing, and datacenter management processes) involved end-to-end in the UVST telematics services, which in turn will enable to achieve unprecedented assurance levels at a low per unit cost, and economic sustainability within an initial 4-12M€ UVST R&D Project budget. All its critical hardware components, will be manufactured in one or more partnering low-capacity 2-300mm semiconductor mini foundry which will reliably and sustainably allow complete oversight of any critical manufacturing processes; location in participating countries is preferred but not required. It will developed starting from the most minimal, verified and hardened free/open-source (or at least publicly verifiable) software and hardware components available. Most of all, it will develop highly-accountable constituent socio-technical organizational processes to manage all any critical processes potentially affecting the assurance of the computing experience. 

UVST R&D PROJECT: Core to the UVST is a 4-12M€ R&D project, to develop a mobile&desktop ultra-private user-friendly end-to-end communications service, at 1-200€/user/year, that provides minimalistic yet truly-trustworthy voice, email/text/chat and Web, social and business communications, through dedicated server-side equipment, datacenter, processes (CivicRoom and CivicLab), and dedicated 2.5-3mm-thin touch-screen e-ink screen handheld device (CivicPod) which is available either attached to any user’s mobile phone via a dedicated external case, or “inserted” inside the internal case of a custom-built smartphone’s (CivicPhone), sharing its battery. CivicFab processes will exceed in assurance those of DoD Trusted Foundry Program and DARPA Trust in Integrated Circuit, but at a fraction of the costs. It will intrinsically guarantee access for constitutional - no more and no less - court-mandated lawful intercept and search & seizure orders in democratic countries, through innovative citizen-jury datacenter access management processes.

UVST PROJECTS: UVST develops through 3 projects, part sequential and part concurrent: (1) a 4-12M€ UVST R&D Project participated by 15 Italian, EU and Brazilian leading private and public partners and world class prospects, (2) A 5-20M€ UVST Virtual Foundry, a joint venture for the development – concurrently and in addition to the UVST R&D project – of world-class design facilities and cluster for UVST-compliant solutions and equipment, and permanent setup of compliant 2-300mm low-capacity partnering foundries; (3) a UVST(-like) International Standardization proposal. 

NEXT STEPS: We are actively pursuing H2020 EU public R&D fundraising opportunities, but also interested in seed or angel funding options. By Nov 2014, we plan to submit a 4M€ UVST proposal to H2020 FET-Open RIA (deadline by March 2015), with world-class partners and advisors. We have developed a late draft with much details and deliverables, but there is still space for very high value added partners or advisors to join in. We are actively planning and networking to participate to other H2020 Calls.

SCOPE: UVST will give its end-users unprecedented levels of actual (and perceived) assurance in relation to the fact that, all computing components that are critically involved in their computing experience beyond point of encryption, will “perform as advertised” at all times, and be resistant to attempts to remotely exploit vulnerabilities, even through the most powerful and rare targeted surveillance methods, including automated and semi-automated targeted methods (such as NSA Turbine and Italian Hacking Team), as well as from undetected physical tampering. Does not protect from environmental interception, including that from the end-user’s other connected devices, and other continuous surveillance techniques whose cost and detectability exceed that of environmental interception.

PARTNERS & ADVISORS: For a list of our world-class partners and advisors follow this link.