Trustless Computing Consortium

Launched in 2013, the Trustless Computing Consortium is an initiative by the Open Media Cluster and world-class partners and advisors which is building (1) a highly citizen-accountable and technically-proficient standard setting and certification body(2) an open low-level general-purpose HW&SW computing platform and target architecture, and ultimately (3) a profitable ecosystem of independent certified providers, that verifiably achieve radically-unprecedented levels of IT and AI security; while preventing risks of malevolent use, and obstruction to constitutional and lawful cyber-investigations.

KEY CONCEPTS

Uniquely, all and every software, hardware and processes that are critically involved in the IT service provisioning or  lifecycle – from CPU design to fabrication, to hosting room access – are subject to extreme verification relative to complexity, or to extremely resilient socio-technical oversight, based on offline citizen-witness or citizen-jury processes. In fact,  IT Security is not a product – nor a process or service – but the by-product of the intrinsic resilience, accountability and proficiency of all organizational processes that are critically-involved in the entire life-cycle and supply-chain.
By “trustless” computing, we mean computing without the need or assumption of unverified trust in anything or anyone, except in the intrinsic resistance of the organizational processes critically involved, as recognizable by moderately informed and educated citizens. By “radically-unprecedented” IT security, we mean resistant to sustained attacks of tens of millions of euros to the life-cycle or supply-chain, subvertive and economic, by actors with very low liability and high plausible deniability.
For more details see, the Trustless Computing Paradigms.

ACTION LINES

  1. Campaign for a Trustless Computing Certification Body campaign, and its draft Manifesto of Trustless Computing and the Proposal for Trustless Computing Certification Body – outcomes of the R&D proposals and event series – with world class experts: Bart Preneel, CapGemini Netherlands, Jovan Golic.
  2. Ongoing Free and Safe in Cyberspace, a global event series, held in Brussels, New York and Brazil, with amazing world class speakers, building a wide consensus on the Trustless Computing Certification Body.
  3. Ongoing TRUSTLESS.AI, our Luxembourg-based startup spin-off, which is raising 3.5M€, aimed initially at ultra-secure enterprise communication, negotiations and transactions; via a 2mm-thin handheld computing device and related supply chains.
  4. Ongoing Public R&D funding proposals, such as our last 1M€ and 4M€ proposals to EU H2020 program.
  5. Proposal for a Trustless Computing Campus and Cluster on Cybersecurity and Artificial Intelligence, to public-private initiative involving a new dedicated technology park, stringent AI and cybersecurity regulations and public incentives, to turning cybersecurity and narrow AI safety, from a overhead and social cost, to the core economic development strategy for a region within a EU member state.
  6. Ongoing Partnership for Trustless Computing, to promote a new form for the Consortium to extend its reach and participation, to achieve its goals.

 

INITIAL SOCIO-TECHNICAL TARGET ARCHITECTURE

The initial socio-technical architecture will be initially aimed at ultra-high confidentiality and integrity of critical IT communications and transactions, as a go-to-market beach-head, it will then extend to ultra-high availability to become the dominant govenrnance and endpoint  root-of-trust of security-critical AI systems.
Through 3-4M€ raised by our startup spin-off or by publicly funded R&D projects, we’ll build a production-ready prototype, and dedicated certification body. The main output will be a dedicated 2mm-thin touch-screen e-ink screen handheld device, or CivicPod, which is available either attached to the back of any user’s mobile phone via a dedicated CivicCase.CivicPod_section
Each CivicPod user will also optionally receive a dock (CivicDock), with HDMI switch to connect to the user desktop monitor, and an ultra-secure Tor node, for metadata privacy. CivicPods are assembled, verified, flashed, and transferred to their users in dedicated custom-built street-facing lab (CivicLab), that contains a server room, where all privacy-sensitive services, if offered, must be hosted in dedicated hosting room (or CivicRoom), whose access requires 5 randomly-selected citizen-jurors and dedicated servers (CivicServers). Fabrication and design of all critical hardware components will be subject to oversight processes (or CivicFab) that will substantially exceed in end-user-trustworthiness those of NSA Trusted Foundry Program, at substantially lower costs. After an initial exclusivity for a Post-R&D TRUSTLESS Consortium, TRUSTLESS services can be managed, distributed and commercialized by any willing service provider (or CivicProviders). CivicProvider service is regularly and continuously verified and certified by a to-be-established dedicated certification organization/committee (or Trustless Computing Certification Body), made up mostly of world leading global digital civil rights organizations, also responsible for the updating of the certification specifications, the final formal Paradigms (or Trustless Computing Paradigms) and derived certification requirements (or TRUSTLESS Specifications). The same base HW&SW base will run CivicDevices (Pod, Server, Dongle) and CivicRoom locks.

Trustless_RIA_diagram_05

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search