SlideShare a Scribd company logo
1 of 14
Download to read offline
Rufo Guerreschi | CEO – rufo@trustless.ai
Seamlessly delivering unimagined freedoms to your digital life.
.AI
TRUSTLESS.AI	is	building	a	2mm-thin	touch-screen	device	-
attachable	through	a	case	to	the	back	of	any	phone	and	to	your	desktop	monitor	–
that	seamlessly delivers	top	enterprises,	top	banks,	and	mission-critical	NGOs	
unimagined levels	of	confidentiality	and	integrity	
of	their	lawful	communications	and	financial	transactions,	
both	e-banking	and	cryptocurrency.
Once	market-proven	as	the	endpoint	security	leader,	we’ll	scale-up	as	
the	1st	ultra-secure	enterprise	applications	platform,	and	
root	of	trust	of	wide-market	safety-critical	autonomous	systems.
1983: IT PROMISES
2013: IT REALITY
No	matter	what	price	a	bank,	enterprise or	person	
is	willing	to	pay, no	device	is	available	today	that	
offers	meaningful	protection	of	confidentiality	&	
integrity,	beyond	mid-high	level	threats.
The Problem
Confidentiality	and	integrity
of	communications	and	transactions.	
A	problem	for	many,	but	critical for	top	staff	of:
• Large	Enterprises
• Large	Financial	Institutions
• Mission-critical	NGOs
data	theft
unwanted	travel
missed	opportunities
A	desktop	dock	stand
which	embeds:
1. a	micro-USB	port,	for	charging
2. a	Wi-Fi	hardware-secured	
anonymization	chip,	for	metadata
privacy.
3. an	HDMI-switch,	for	long- form	
text	editing	on	the	user’s	desktop	
LCD.
A	2mm-thin	touch-screen	device,	
that	provide	basic	features	but	with	
radically	unprecedented levels	of	
integrity	and	confidentiality:
1. Rich-text	synchronous	and	
asynchronous	messaging	
2. Rich-text	collaborative	editing	(i.e.	
contracting,	negotiations)
3. E-banking
4. Cryptocurrency	client	and	wallet
5. Password	management,	multiple	
persona
User’s	
Smartphone
CivicCase (for	top	smartphones)
CivicPod
CivicPod CivicDock
The Solution
CivicKeyboard
Play our 2-minute
product video at:
www.TRUSTLESS.AI
1. assumes that extremely-skilled attackers are willing to devote even tens of millions of Euros to
compromise the supply chain or lifecycle, through legal and illegal subversion of all kinds,
including economic pressures.
2. provides extremely user-accountable and technically-proficient oversight of all hardware,
software and organizational processes critically involved in the entire lifecycle and supply chains;
3. provides extreme levels of security review intensity relative to system complexity, for all critical
components; and includes only publicly verifiable components, and strongly minimizes use of
non-Free/Open-source software and firmware.
4. includes only open innovations with clear and low long-term royalties (<15% of end-user cost)
from patent and licensing fees, to prevent undue intellectual property right holders’ pressures,
lock-ins, patent vetoes and ensure low-costs affordable to ordinary citizens;
5. includes only highly-redundant hardware and/or software cryptosystems, whose protocols,
algorithms and implementations are open, long-standing, extensively-verified and endorsed, and
with significant and scalable post-quantum resistance levels.
6. is continuously certified by an extremely technically-proficient and user-accountable
independent standard/certification body.
Trustless Computing Paradigms
Rufo Guerreschi
CEO & Founder
The Team
12	years	of	single-minded	pursuit	of	meaningful	
enactment	of	civil	rights	in	cyberspace.	Lead	open	
source	e-voting/e-democracy	startup,	that	sold	in	3	
continents.	Brought	valuation	of	a	planned	EU	2nd	
largest	IT/media	tech	park	from	3€	to	21M€	
Lead	EU	sales	of	J2ME	provisioning	system	till	a	10M€+	
2001	sale	to	Telefonica	Aggregated	unique	global	R&D	
partners	on	the	4-15M€	Trustless	Computing	Initiative.
Artur Pylak
CFO
Experienced acting CFO in several startups.
Senior	research	analyst	at	SSR	LLC,	covering	the	
TMT	space	with	expertise	in	cybersecurity	&AI.	
Co-authored	leading	valuations	forecast	of	
stock-quoted	firms	in	hot	IT	verticals,	including	
cybersecurity,	self-driving	cars,	and	digital	
assistants.
Roberto Gallo
CTO
Designed	and	deployed	since	2014	the	World's	1st
CPU	fully	inspectable	without	NDA	in	its	HW	&	
SW	source	designs,	and	the	the	first	secure	CPU	
of	the	Southern	Hemisphere.
Designed	the	security	architecture	of	the	400.000	
Brazilian	voting	machines;	the	ASI-HSM,	the	HSM	
of	the	Brazilian	PKI-root	CA;	and	fighter-to-fighter	
communication	systems.
Director	of	Marketing.	branding,	positioning,	art	direction	of	website,	slides,	video,
Toby	Scholtz.	For	2	years,	Germany	country	manager	and	marketing	head	of	Apple-
owned	Beats,	the	leader	in	hi-fi	wireless	headsets.	Formerly	marketing	for	mobile	
operators.	Location:	Berlin/Rome.	(linkedin)
Director	of	Supply	Chain	&	Manufacturability:	manufacturability,	HW	prototype.
Joonyoung Park. Has	lead	in	the	Valley	the	global	R&D	for	a	EU-based	global	leader	
in	IPTV,	CAS	and	cybersecurity;	Managing	Director	of	a	200M$/yr 7-sigma	
electronics	manufacturing	plant	in	South	Korea.	Location:	Seoul.	(Linkedin)	
Director	of	Business	Development - Baltic	Region	banks	&	enterprise,	Military	and	
Government:	pilot/product	sales,	tech	consulting.	Maris	Kohen.	CTO	of	Cybersecurity	
at	ATOS	Baltics;	former	CSO	of	Telecom	Luxembourg.	Location:	Luxembourg/Rome.	
(Linkedin)
Director	of	Business	Development	- Mission-critical	NGOs:	pilot/product	sales,	prj
management,	operations.	Alexander	Elkin.	Former	Head	of	Strategy	&	Internet	
Projects	at	Transparency	International	Russia	(Linkedin)	
Director	of	Business	Development - DACH	Region	banks	and	enterprises.	
pilot/product	sales,	fundraising.	Matteo	Butussi.	Formerly	director	of	business	
development	at	Kudelski	Cybersecurity.	Location:	Zurich.	(Linkedin)
The Team: Trustless Computing Consortium
World’s	largest	Artificial	Intelligence	R&D	center,	a	partner	in	our	
CivicFab	FOUNDRY	OVERSIGHT	process.	(Germany)	
Maker	of	World’s	1st general-purpose	CPU with	publicly	reviewable	
HW/SW	designs.	(Brazil)	
Makers	of	the	smallest	high	assurance	OS with	3000	lines	of	source	
code.	One	of	two	with	formal	proof	of	correctness.	(Germany)	
EU	leading	CRYPTO	R&D	center,	lead	by	the	most	renowned	EU	
cryptologist	and	IT	security	expert,	Bart	Preneel (Belgium)	
*A	200mm	110nm	EU-based	FOUNDRY,	fully	validated	our	CivicFab	
oversight	processes.	(Italy)	
*exploring alternative following 6/2016 non-EU acquisition.
Globally-unique	suppliers	that	agreed	to	detailed	IP/non-compete	
to	build	our	security-critical	supply-chain	and	computing	base
TRUSTLESS.AI is primarily the fruit of 15 years of single-
minded quest of our CEO Rufo Guerreschi to realize
the potential of ICT to radically improve individual civil
freedoms and democratic participation.
Since 1983, the realization of such potential was
promised by Richard Stallman‘s with the Free Software
Movement, on one side; and by Steve Jobs’ Apple,
with its famous “1984” Apple video ad, on the other.
Such promises have not only utterly failed, but the
freedom and security of citizens and businesses
have dramatically worsened.
Whatever the price a user is willing to pay, there are still
no devices in the market today that provide even
remotely comprehensive evidence about their level of
resistance against scalable, pervasive, undetectable
compromisation by large numbers of state and non-state
actors.
Thirty three years later, TRUSTLESS.AI has a rock solid
plan to fully and sustainably deliver on such promises,
initially to premium users, and then to most citizens,
through (1) a unique team and supply-chain consortium,
and (2) revolutionary and unprecedented IT security
paradigms centered on ensuring complete transparency,
and extreme oversight and security-review relative to
complexity, of all techs and processes critically involved in
the life-cycle.
Since 2013, TRUSTLESS.AI has been “incubated” in
the Trustless Computing Inititative by partners and
members of the Trustless Computing Consortium with
globally-rare or unique expertise in open high-assurance IT.
Since 2015, plans for a Trustless Computing Certification
Body have been discussed with the top world experts and EU
officials at events in Brussels, New York, Brazil, and next in
SF, through our Free and Safe in Cyberspace event series.
In July 2016, TRUSTLESS graduated from the Berlin-
based Hardware.co Pre-Acceleration Program, sponsored by
Siemens, Bosch and Deutsche Bahn. On Oct 22nd, we moved
to Menlo Park, CA, to consolidate the team, get investor
traction and advance our prototype.
Our Story
Unique Competitive Advantages
Our	Trustless	Computing	Consortium	aggregates	globally-
unique	high-assurance	ICT	suppliers with	a	binding	MoU	for	
IP,	non-compete	and	resilience;	
Our	Trustless	Computing	Paradigms	and	its	proposed	
Certification	Body	has	been	widely	shared	through	our	Free	
and	Safe	in	Cyberspace	events	in	Brussels,	New	York,	Brazil,	
Brussels	again,	with	the	participation	of	unique	speakers	
Next	in	Berlin	and	again	Brussels.	
Key	speakers,	sponsors	and	advisors	- including	Bart	Preneel,	
CapGemini Netherlands,	EIT	Digital,	and	Tecnalia - have	
started	since	early	2016	working	on	a	10-pager	summary	
Manifesto	of	Trustless	Computing	(PDF)	and	a	full	50-pager	
draft	full	Proposal.
ALL	software,	hardware	and	organization	processes	
critically	involved	in	the	lifecycle	and	supply	chain	will	
uniquely	be:
(A)	Publicly	inspectable	in	their	source	HW	&	SW	
designs	without	NDA;
(B)	Subject	to	extreme	security-review	relative	to	
complexity,	by	paid	highly-proficient	and	“ethical”	hackers;
(C)	Subject	to	extremely	resilient	oversight,	based	on	
offline	citizen-witness	or	citizen-jury	processes,	in	
addition	to	state-of-the-art	IT	security	safeguards.
Security-critical	Ecosystem
Security	Paradigms
Form	Factor
Thought	Leadership
US Defense Science Board (2015): “Trust cannot be added to integrated circuits after fabrication”
Bruce Schneier (2014): “From what we’ve learned, we should assume all mainstream CPUs to be compromised”
Michael Sieber, Head of Information Superiority of the European Defence Agency stated at our 1st Free and Safe in
Cyberspace: “Among EU member states, it’s hilarious: they claim digital sovereignty but they rely mostly on Chinese hardware, on
US American software, and they need a famous Russian to reveal the vulnerabilities"
CivicFab (1): The Problem
Our CivicFab processes will deploy general concepts reportedly applied by NSA Trusted
Access/Foundry Program today in cases in which they require the highest-level chip
fabrication oversight assurance. They reportedly choose a foundry that fits the
equipment and general oversight process specifications – located, if not in the US, in a
country that overall provide more assurance than others – which will agree to:
● (1) Make sure that the requested hardware is all produced in one continuous
batch in a short time span (a few weeks), as is typical anyway;
● (2) Allow, for each batch, to setup and configure an extensive sensing and
monitoring IT infrastructure – often produces by specialized proprietary
companies – and allow about 3 (or more) competent, trained, redundant and
trusted technicians, per shift, to verify thoroughly the entire process, 24/7 and
on-site, from a monitoring room and inside the "cleanroom".
CivicFab (2): Matching state-of-the art
In excess of the NSA Trusted Foundry Program, described in previous slide, the CivicFab will:
A. Add at minimum number “citizen witnesses”, through mix of citizen jury and deliberative polling
methods made up of 5 (or more) randomly-sampled citizens and CivicPod users, in a role of active
oversight witnesses 24/7 in the critical phases. They would be well paid to take that time off, would be
extensively trained and “self trained” through open participatory processes;
B. Choose to produce all critical ICs at EU-based 200-300mm EAL5+ foundries with older technologies,
simpler processes, and less third-party IP obstacles than today’s’ Asian megafabs, such that they allow
the technicians and witnesses to publicly and completely document the process with videos, photos
and more.
C. Equipment and sensors, to be applied to the chosen foundries, should as much as possible not require
direct interventions or disruption of the foundry equipment and facilities, but just rely on setting up an
additional overlay of sensing equipment, and on getting copy of the existing quality control sensor
feeds. This would also increase the “portability” of the CivicSite processes to other foundries, and in
part the resiliency of the solution.
D. Sensing and oversight equipment would run Trustless transparent ultra-high assurance HW/SW will
as much as possible be air gapped, make use of high assurance verifiable systems, and as much as
possible based on TRUSTLESS SW & HW.
CivicFab (3): Radically exceeding state-of-the-art
At the service level.
TRUSTLESS.AI will provide key recovery service to all its
customers, in case of user death or loss of password, as well as
a way to comply to legal AND constitutional lawful access
requests. Although the architecture is pure P2P, partial
temporary encryption keys are mandatorily saved daily to a
redundant set of CivicRooms, whose physical access is under
the direct management, certification and oversight of an
international Trustless Computing Certification Body (TCCB).
The validity of civilian court orders AND absence of blatant
unconstitutionality will be evaluated on-site by trained
citizen-jury-like body assisted by legal counsels. Its radically
unprecedented technical and organizational safeguards will
guarantee both users' rights and the crucial needs of the
public security agencies.
At the fabrication level.
The public availability of all TRUSTLESS.AI critical SW & HW
source designs could enable criminal actors to produce their
own CivicDevices for malevolent use. Such threat will be
extremely and sufficiently reduced by a combination of: (A) IP
cores tied to specific, capital intensive fabrication processes,
naturally not available on mini scale prototyping fabrication
facilities and foundries; (B) current inability of malevolent
states or groups to fully and truly control a suitable
semiconductor foundry. (C) In the rare case in which terrorist
groups may attempt to enter in agreements with suitable
foundries, current Allied intelligence capabilities can make
sure to either forcefully prevent it or, better, insert
vulnerabilities in their fabrication processes to acquire in the
future extremely valuable intelligence.
But, how do we prevent grave abuse by criminals?!

More Related Content

What's hot

Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015Alex G. Lee, Ph.D. Esq. CLP
 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies servicesBruno Zysman
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7Chin Wan Lim
 
AI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from PatentsAI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyAlex G. Lee, Ph.D. Esq. CLP
 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTRedit
 
MIFA Newsletter - November 2021 Edition
MIFA Newsletter  - November 2021 EditionMIFA Newsletter  - November 2021 Edition
MIFA Newsletter - November 2021 EditionDr. Mazlan Abbas
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
Identive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer KitsIdentive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer KitsIdentive
 
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterNFC Forum
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive
 
I wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessoriesI wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessoriesiwalletusa
 
Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...changeableradiu23
 
Moving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainMoving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainDr. Mazlan Abbas
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
The Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer NationThe Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer NationDr. Mazlan Abbas
 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanNFC Forum
 

What's hot (20)

Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies services
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
AI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from PatentsAI, Blockchain, IoT Convergence Insights from Patents
AI, Blockchain, IoT Convergence Insights from Patents
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
 
Extreme Digital Ventures
Extreme Digital VenturesExtreme Digital Ventures
Extreme Digital Ventures
 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICT
 
MIFA Newsletter - November 2021 Edition
MIFA Newsletter  - November 2021 EditionMIFA Newsletter  - November 2021 Edition
MIFA Newsletter - November 2021 Edition
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
Identive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer KitsIdentive Group | Press Release | Identive Launches New NFC Developer Kits
Identive Group | Press Release | Identive Launches New NFC Developer Kits
 
Creative Engineering Breakthroughs
Creative Engineering BreakthroughsCreative Engineering Breakthroughs
Creative Engineering Breakthroughs
 
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
 
Digital Co 1
Digital Co 1Digital Co 1
Digital Co 1
 
I wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessoriesI wallet corporation puts portfolio of secure techcessories
I wallet corporation puts portfolio of secure techcessories
 
Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...
 
Moving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainMoving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value Chain
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
The Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer NationThe Need for IoT Ecosystem to become a Producer Nation
The Need for IoT Ecosystem to become a Producer Nation
 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in Japan
 

Viewers also liked

PrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw CopyPrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw CopyAmber Hollingsworth
 
Goed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin PauwelsGoed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin PauwelsThierry Debels
 
Los Desafíos de la educación a distancia
Los Desafíos de la educación a distanciaLos Desafíos de la educación a distancia
Los Desafíos de la educación a distanciaClaudio Rama
 
PostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practicePostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practiceJano Suchal
 
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...ROER4D
 
Game Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do ItGame Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do ItJesse Schell
 
MOOC Aspects juridiques de la création d'entreprises innovantes - attestation
MOOC Aspects juridiques de la création d'entreprises innovantes -  attestationMOOC Aspects juridiques de la création d'entreprises innovantes -  attestation
MOOC Aspects juridiques de la création d'entreprises innovantes - attestationAudrey Jacob
 
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HEChoosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HECatherine Cronin
 
Marketing Week Live 2017
Marketing Week Live 2017Marketing Week Live 2017
Marketing Week Live 2017Jeremy Waite
 
コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~
コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~
コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~Kamiya Toshihiro
 
はじめての CircleCI
はじめての CircleCIはじめての CircleCI
はじめての CircleCIYosuke Mizutani
 
Python × Herokuで作る 雑談slack bot
Python × Herokuで作る 雑談slack botPython × Herokuで作る 雑談slack bot
Python × Herokuで作る 雑談slack botdcubeio
 
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...Yahoo!デベロッパーネットワーク
 
WindowsでPython
WindowsでPythonWindowsでPython
WindowsでPythondrillan
 
Profile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv BhavnaniProfile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv BhavnaniSanjiv Bhavnani
 
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker imagesRootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker imagesDaniel Garcia (a.k.a cr0hn)
 
Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...Danny Kingsley
 
We invented management, we can re invent it!
We invented management, we can re invent it!We invented management, we can re invent it!
We invented management, we can re invent it!JESry
 
Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...Ricardo Fernández
 

Viewers also liked (20)

PrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw CopyPrescriptionPillsToHeroine_hw Copy
PrescriptionPillsToHeroine_hw Copy
 
Goed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin PauwelsGoed jaar voor firma Kevin Pauwels
Goed jaar voor firma Kevin Pauwels
 
Mesa job _fair_flyer
Mesa job _fair_flyerMesa job _fair_flyer
Mesa job _fair_flyer
 
Los Desafíos de la educación a distancia
Los Desafíos de la educación a distanciaLos Desafíos de la educación a distancia
Los Desafíos de la educación a distancia
 
PostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practicePostgreSQL: Advanced features in practice
PostgreSQL: Advanced features in practice
 
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
The adoption and impact of OEP and OER in the Global South: Theoretical, conc...
 
Game Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do ItGame Studio Leadership: You Can Do It
Game Studio Leadership: You Can Do It
 
MOOC Aspects juridiques de la création d'entreprises innovantes - attestation
MOOC Aspects juridiques de la création d'entreprises innovantes -  attestationMOOC Aspects juridiques de la création d'entreprises innovantes -  attestation
MOOC Aspects juridiques de la création d'entreprises innovantes - attestation
 
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HEChoosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
Choosing Open (#OEGlobal) - Openness and praxis: Using OEP in HE
 
Marketing Week Live 2017
Marketing Week Live 2017Marketing Week Live 2017
Marketing Week Live 2017
 
コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~
コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~
コードクローン研究 ふりかえり ~ストロング・スタイルで行こう~
 
はじめての CircleCI
はじめての CircleCIはじめての CircleCI
はじめての CircleCI
 
Python × Herokuで作る 雑談slack bot
Python × Herokuで作る 雑談slack botPython × Herokuで作る 雑談slack bot
Python × Herokuで作る 雑談slack bot
 
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
Automation of Rolling Upgrade of Hadoop Cluster without Data Lost and Job Fai...
 
WindowsでPython
WindowsでPythonWindowsでPython
WindowsでPython
 
Profile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv BhavnaniProfile of a Mentor: Sanjiv Bhavnani
Profile of a Mentor: Sanjiv Bhavnani
 
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker imagesRootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
 
Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...Watch out, it's behind you: publishers' tactics and the challenge they pose f...
Watch out, it's behind you: publishers' tactics and the challenge they pose f...
 
We invented management, we can re invent it!
We invented management, we can re invent it!We invented management, we can re invent it!
We invented management, we can re invent it!
 
Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...
Programa II EDUInnova: Jornadas de innovación educativa XVI Jornadas Regional...
 

Similar to TRUSTLESS.AI and Trustless Computing Consortium

Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing InitiativeTRUSTLESS.AI
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalSorin Ciornei
 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 LondonNOAH Advisors
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
HASH-box - Business Plan Presentation
HASH-box - Business Plan PresentationHASH-box - Business Plan Presentation
HASH-box - Business Plan PresentationPROBOTEK
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview PresentationBlock Armour
 
IoT Middleware Market
IoT Middleware MarketIoT Middleware Market
IoT Middleware MarketHarshalBamble
 
Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!Debut Infotech
 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015Roberto Siagri
 
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)GE코리아
 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Ersin KARA
 
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdfThe 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdfInsightsSuccess4
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01Crissa Toledo
 
Accenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology
 

Similar to TRUSTLESS.AI and Trustless Computing Consortium (20)

Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing Initiative
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
HASH-box - Business Plan Presentation
HASH-box - Business Plan PresentationHASH-box - Business Plan Presentation
HASH-box - Business Plan Presentation
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
IoT Middleware Market
IoT Middleware MarketIoT Middleware Market
IoT Middleware Market
 
Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!Top 10 Crypto Wallet Development Companies!
Top 10 Crypto Wallet Development Companies!
 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015
 
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019
 
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdfThe 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
The 10 Most Trusted Wireless Technology Service Providers, 2023.pdf
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
 
Accenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business Era
 

More from TRUSTLESS.AI

TRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS.AI
 
Trustless slides dual-use R&D Proposal
Trustless slides dual-use R&D ProposalTrustless slides dual-use R&D Proposal
Trustless slides dual-use R&D ProposalTRUSTLESS.AI
 
Open media district slide intro pa
Open media district   slide intro paOpen media district   slide intro pa
Open media district slide intro paTRUSTLESS.AI
 
SAE Group Studio301 Qantm
SAE Group Studio301 QantmSAE Group Studio301 Qantm
SAE Group Studio301 QantmTRUSTLESS.AI
 
Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02TRUSTLESS.AI
 

More from TRUSTLESS.AI (7)

TRUSTLESS
TRUSTLESSTRUSTLESS
TRUSTLESS
 
TRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide Deck
 
Trustless slides dual-use R&D Proposal
Trustless slides dual-use R&D ProposalTrustless slides dual-use R&D Proposal
Trustless slides dual-use R&D Proposal
 
Open media district slide intro pa
Open media district   slide intro paOpen media district   slide intro pa
Open media district slide intro pa
 
SAE Group Studio301 Qantm
SAE Group Studio301 QantmSAE Group Studio301 Qantm
SAE Group Studio301 Qantm
 
Kit Digital
Kit DigitalKit Digital
Kit Digital
 
Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02Nasce pta 2010.06.30 02
Nasce pta 2010.06.30 02
 

Recently uploaded

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 

Recently uploaded (20)

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 

TRUSTLESS.AI and Trustless Computing Consortium

  • 1. Rufo Guerreschi | CEO – rufo@trustless.ai Seamlessly delivering unimagined freedoms to your digital life. .AI
  • 3. 1983: IT PROMISES 2013: IT REALITY No matter what price a bank, enterprise or person is willing to pay, no device is available today that offers meaningful protection of confidentiality & integrity, beyond mid-high level threats.
  • 4. The Problem Confidentiality and integrity of communications and transactions. A problem for many, but critical for top staff of: • Large Enterprises • Large Financial Institutions • Mission-critical NGOs data theft unwanted travel missed opportunities
  • 5. A desktop dock stand which embeds: 1. a micro-USB port, for charging 2. a Wi-Fi hardware-secured anonymization chip, for metadata privacy. 3. an HDMI-switch, for long- form text editing on the user’s desktop LCD. A 2mm-thin touch-screen device, that provide basic features but with radically unprecedented levels of integrity and confidentiality: 1. Rich-text synchronous and asynchronous messaging 2. Rich-text collaborative editing (i.e. contracting, negotiations) 3. E-banking 4. Cryptocurrency client and wallet 5. Password management, multiple persona User’s Smartphone CivicCase (for top smartphones) CivicPod CivicPod CivicDock The Solution CivicKeyboard Play our 2-minute product video at: www.TRUSTLESS.AI
  • 6. 1. assumes that extremely-skilled attackers are willing to devote even tens of millions of Euros to compromise the supply chain or lifecycle, through legal and illegal subversion of all kinds, including economic pressures. 2. provides extremely user-accountable and technically-proficient oversight of all hardware, software and organizational processes critically involved in the entire lifecycle and supply chains; 3. provides extreme levels of security review intensity relative to system complexity, for all critical components; and includes only publicly verifiable components, and strongly minimizes use of non-Free/Open-source software and firmware. 4. includes only open innovations with clear and low long-term royalties (<15% of end-user cost) from patent and licensing fees, to prevent undue intellectual property right holders’ pressures, lock-ins, patent vetoes and ensure low-costs affordable to ordinary citizens; 5. includes only highly-redundant hardware and/or software cryptosystems, whose protocols, algorithms and implementations are open, long-standing, extensively-verified and endorsed, and with significant and scalable post-quantum resistance levels. 6. is continuously certified by an extremely technically-proficient and user-accountable independent standard/certification body. Trustless Computing Paradigms
  • 7. Rufo Guerreschi CEO & Founder The Team 12 years of single-minded pursuit of meaningful enactment of civil rights in cyberspace. Lead open source e-voting/e-democracy startup, that sold in 3 continents. Brought valuation of a planned EU 2nd largest IT/media tech park from 3€ to 21M€ Lead EU sales of J2ME provisioning system till a 10M€+ 2001 sale to Telefonica Aggregated unique global R&D partners on the 4-15M€ Trustless Computing Initiative. Artur Pylak CFO Experienced acting CFO in several startups. Senior research analyst at SSR LLC, covering the TMT space with expertise in cybersecurity &AI. Co-authored leading valuations forecast of stock-quoted firms in hot IT verticals, including cybersecurity, self-driving cars, and digital assistants. Roberto Gallo CTO Designed and deployed since 2014 the World's 1st CPU fully inspectable without NDA in its HW & SW source designs, and the the first secure CPU of the Southern Hemisphere. Designed the security architecture of the 400.000 Brazilian voting machines; the ASI-HSM, the HSM of the Brazilian PKI-root CA; and fighter-to-fighter communication systems. Director of Marketing. branding, positioning, art direction of website, slides, video, Toby Scholtz. For 2 years, Germany country manager and marketing head of Apple- owned Beats, the leader in hi-fi wireless headsets. Formerly marketing for mobile operators. Location: Berlin/Rome. (linkedin) Director of Supply Chain & Manufacturability: manufacturability, HW prototype. Joonyoung Park. Has lead in the Valley the global R&D for a EU-based global leader in IPTV, CAS and cybersecurity; Managing Director of a 200M$/yr 7-sigma electronics manufacturing plant in South Korea. Location: Seoul. (Linkedin) Director of Business Development - Baltic Region banks & enterprise, Military and Government: pilot/product sales, tech consulting. Maris Kohen. CTO of Cybersecurity at ATOS Baltics; former CSO of Telecom Luxembourg. Location: Luxembourg/Rome. (Linkedin) Director of Business Development - Mission-critical NGOs: pilot/product sales, prj management, operations. Alexander Elkin. Former Head of Strategy & Internet Projects at Transparency International Russia (Linkedin) Director of Business Development - DACH Region banks and enterprises. pilot/product sales, fundraising. Matteo Butussi. Formerly director of business development at Kudelski Cybersecurity. Location: Zurich. (Linkedin)
  • 8. The Team: Trustless Computing Consortium World’s largest Artificial Intelligence R&D center, a partner in our CivicFab FOUNDRY OVERSIGHT process. (Germany) Maker of World’s 1st general-purpose CPU with publicly reviewable HW/SW designs. (Brazil) Makers of the smallest high assurance OS with 3000 lines of source code. One of two with formal proof of correctness. (Germany) EU leading CRYPTO R&D center, lead by the most renowned EU cryptologist and IT security expert, Bart Preneel (Belgium) *A 200mm 110nm EU-based FOUNDRY, fully validated our CivicFab oversight processes. (Italy) *exploring alternative following 6/2016 non-EU acquisition. Globally-unique suppliers that agreed to detailed IP/non-compete to build our security-critical supply-chain and computing base
  • 9. TRUSTLESS.AI is primarily the fruit of 15 years of single- minded quest of our CEO Rufo Guerreschi to realize the potential of ICT to radically improve individual civil freedoms and democratic participation. Since 1983, the realization of such potential was promised by Richard Stallman‘s with the Free Software Movement, on one side; and by Steve Jobs’ Apple, with its famous “1984” Apple video ad, on the other. Such promises have not only utterly failed, but the freedom and security of citizens and businesses have dramatically worsened. Whatever the price a user is willing to pay, there are still no devices in the market today that provide even remotely comprehensive evidence about their level of resistance against scalable, pervasive, undetectable compromisation by large numbers of state and non-state actors. Thirty three years later, TRUSTLESS.AI has a rock solid plan to fully and sustainably deliver on such promises, initially to premium users, and then to most citizens, through (1) a unique team and supply-chain consortium, and (2) revolutionary and unprecedented IT security paradigms centered on ensuring complete transparency, and extreme oversight and security-review relative to complexity, of all techs and processes critically involved in the life-cycle. Since 2013, TRUSTLESS.AI has been “incubated” in the Trustless Computing Inititative by partners and members of the Trustless Computing Consortium with globally-rare or unique expertise in open high-assurance IT. Since 2015, plans for a Trustless Computing Certification Body have been discussed with the top world experts and EU officials at events in Brussels, New York, Brazil, and next in SF, through our Free and Safe in Cyberspace event series. In July 2016, TRUSTLESS graduated from the Berlin- based Hardware.co Pre-Acceleration Program, sponsored by Siemens, Bosch and Deutsche Bahn. On Oct 22nd, we moved to Menlo Park, CA, to consolidate the team, get investor traction and advance our prototype. Our Story
  • 10. Unique Competitive Advantages Our Trustless Computing Consortium aggregates globally- unique high-assurance ICT suppliers with a binding MoU for IP, non-compete and resilience; Our Trustless Computing Paradigms and its proposed Certification Body has been widely shared through our Free and Safe in Cyberspace events in Brussels, New York, Brazil, Brussels again, with the participation of unique speakers Next in Berlin and again Brussels. Key speakers, sponsors and advisors - including Bart Preneel, CapGemini Netherlands, EIT Digital, and Tecnalia - have started since early 2016 working on a 10-pager summary Manifesto of Trustless Computing (PDF) and a full 50-pager draft full Proposal. ALL software, hardware and organization processes critically involved in the lifecycle and supply chain will uniquely be: (A) Publicly inspectable in their source HW & SW designs without NDA; (B) Subject to extreme security-review relative to complexity, by paid highly-proficient and “ethical” hackers; (C) Subject to extremely resilient oversight, based on offline citizen-witness or citizen-jury processes, in addition to state-of-the-art IT security safeguards. Security-critical Ecosystem Security Paradigms Form Factor Thought Leadership
  • 11. US Defense Science Board (2015): “Trust cannot be added to integrated circuits after fabrication” Bruce Schneier (2014): “From what we’ve learned, we should assume all mainstream CPUs to be compromised” Michael Sieber, Head of Information Superiority of the European Defence Agency stated at our 1st Free and Safe in Cyberspace: “Among EU member states, it’s hilarious: they claim digital sovereignty but they rely mostly on Chinese hardware, on US American software, and they need a famous Russian to reveal the vulnerabilities" CivicFab (1): The Problem
  • 12. Our CivicFab processes will deploy general concepts reportedly applied by NSA Trusted Access/Foundry Program today in cases in which they require the highest-level chip fabrication oversight assurance. They reportedly choose a foundry that fits the equipment and general oversight process specifications – located, if not in the US, in a country that overall provide more assurance than others – which will agree to: ● (1) Make sure that the requested hardware is all produced in one continuous batch in a short time span (a few weeks), as is typical anyway; ● (2) Allow, for each batch, to setup and configure an extensive sensing and monitoring IT infrastructure – often produces by specialized proprietary companies – and allow about 3 (or more) competent, trained, redundant and trusted technicians, per shift, to verify thoroughly the entire process, 24/7 and on-site, from a monitoring room and inside the "cleanroom". CivicFab (2): Matching state-of-the art
  • 13. In excess of the NSA Trusted Foundry Program, described in previous slide, the CivicFab will: A. Add at minimum number “citizen witnesses”, through mix of citizen jury and deliberative polling methods made up of 5 (or more) randomly-sampled citizens and CivicPod users, in a role of active oversight witnesses 24/7 in the critical phases. They would be well paid to take that time off, would be extensively trained and “self trained” through open participatory processes; B. Choose to produce all critical ICs at EU-based 200-300mm EAL5+ foundries with older technologies, simpler processes, and less third-party IP obstacles than today’s’ Asian megafabs, such that they allow the technicians and witnesses to publicly and completely document the process with videos, photos and more. C. Equipment and sensors, to be applied to the chosen foundries, should as much as possible not require direct interventions or disruption of the foundry equipment and facilities, but just rely on setting up an additional overlay of sensing equipment, and on getting copy of the existing quality control sensor feeds. This would also increase the “portability” of the CivicSite processes to other foundries, and in part the resiliency of the solution. D. Sensing and oversight equipment would run Trustless transparent ultra-high assurance HW/SW will as much as possible be air gapped, make use of high assurance verifiable systems, and as much as possible based on TRUSTLESS SW & HW. CivicFab (3): Radically exceeding state-of-the-art
  • 14. At the service level. TRUSTLESS.AI will provide key recovery service to all its customers, in case of user death or loss of password, as well as a way to comply to legal AND constitutional lawful access requests. Although the architecture is pure P2P, partial temporary encryption keys are mandatorily saved daily to a redundant set of CivicRooms, whose physical access is under the direct management, certification and oversight of an international Trustless Computing Certification Body (TCCB). The validity of civilian court orders AND absence of blatant unconstitutionality will be evaluated on-site by trained citizen-jury-like body assisted by legal counsels. Its radically unprecedented technical and organizational safeguards will guarantee both users' rights and the crucial needs of the public security agencies. At the fabrication level. The public availability of all TRUSTLESS.AI critical SW & HW source designs could enable criminal actors to produce their own CivicDevices for malevolent use. Such threat will be extremely and sufficiently reduced by a combination of: (A) IP cores tied to specific, capital intensive fabrication processes, naturally not available on mini scale prototyping fabrication facilities and foundries; (B) current inability of malevolent states or groups to fully and truly control a suitable semiconductor foundry. (C) In the rare case in which terrorist groups may attempt to enter in agreements with suitable foundries, current Allied intelligence capabilities can make sure to either forcefully prevent it or, better, insert vulnerabilities in their fabrication processes to acquire in the future extremely valuable intelligence. But, how do we prevent grave abuse by criminals?!