On the 18th of November 2025 two conferences in two European capitals
simultaneously discussed issues pertaining to the buzzword of digital
sovereignty: the DINAcon in Bern, Switzerland and the European Digital
Sovereignty Summit in Berlin, Germany. Despite addressing similar topics, the
conferences could not have been more different in content, however: While Swiss
administrators used the DINAcon to present their implementation efforts with
respect to the free and open-source software and interoperability requirements
outlined in articles 9 and 14 of the EMBAG law, respectively, the European
governments represented in the European Council pitched a very different vision
of digital sovereignty in Berlin: One which emphasizes the competitiveness of
and investment into proprietary European software solutions, most likely at the
expense of consumer protections.
We, as the Switzerland Chapter of the Internet Society (ISOC-CH), are very
concerned about the commercial re-interpretation of the term digital
sovereignty. While supporting local businesses to develop and administer digital
solutions is an essential part of the equation to achieve digital sovereignty,
it must not come at the cost of jeopardizing the ability of states to act
independently now and in the future. The reaction to an outsized dependency on
(state-sponsored) American and Chinese Big Tech firms cannot possibly be an
outsized dependency on (state-sponsored) European or Swiss Big Tech companies.
Apart from ignoring the fact that companies can change domiciles, be bought by
foreign investors or go bankrupt, the “buy European” approach also showcases a
lack of creativity and imaginative power on the part of European politicians who
cannot fathom an alternative to emulating other global powers and reveals a
fundamental misunderstanding about the nature of technological dependencies: The
fact that a software vendor or cloud computing provider is domestic does nothing
to reduce the vendor lock-in effects, the restrictiveness of proprietary
software licenses, and the resulting stifling of competition and innovation.
Simply procuring digital services domestically falls massively short of
achieving digital sovereignty as defined by either the Swiss (with a narrow
focus on the state) or European (with a wider perspective including non-state
actors) regulators:
> “Digital sovereignty requires the necessary control over and ability to act in
> the digital realm to ensure the delivery of state services.” – own translation
> of the Swiss government’s definition of digital sovereignty
> “Digital sovereignty is the ability of Member States to be able to regulate
> their digital infrastructure, data and technologies. It encompasses the
> ability of individuals, businesses and institutions in Europe to act
> independently in the digital world, allowing for autonomous decisions about
> the use, governance, and development of digital systems without undue reliance
> on external actors […].” – taken from the Declaration for European Digital
> Sovereignty
A more encompassing answer as to how ensure digital sovereignty is needed. Any
entity which wants to have control over the digital services it uses and aims to
be able to change them to serve its specific needs should strive to
operationalize the following principles:
* local infrastructure: Having access to geographically local computing
resources, network infrastructure, and electricity is a prerequisite for
being able to exert control over one’s digital services.
* local expertise: Without a motivated, experienced and educated local work
force who can develop, debug and deploy digital services one cannot truly
operate in a self-sovereign manner.
* interoperability: Open standards and open data formats allow for connectivity
between services and reduced switching costs, thereby preventing vendor
lock-ins and increasing one’s agency.
* free and open-source software: The four freedoms of free and open-source
software (use, change, share and improve) give a legal and technical
guarantee to the user to be a self-determined actor rather than a
disenfranchised consumer. Instead of paying lip service to free and
open-source software like the European Declaration for Digital Sovereignty
does by making it optional and conditional,
> “Open-source solutions can play an important role enhancing digital
> sovereignty,
> provided they meet high cybersecurity standards and are complemented by
> reliable proprietary technologies where appropriate.”
policy makers should recognize that actual digital sovereignty cannot be
achieved without a firm commitment to free and open-source software.
Operationalizing these criteria is obviously harder than simply procuring
domestic digital products. It requires new capabilities, organizational
structures and cultural changes. But unlike the simplistic “buy domestic”
strategy – whose political appeal in times of economic and geopolitical turmoil
is obvious – they actually provide a path to achieve what the Declaration for
European Digital Sovereignty sets out as a goal: ensuring “the ability of
individuals, businesses and institutions in Europe to act independently in the
digital world”.
As an NGI-0 consortium member, ISOC-CH will continue highlighting the advantages
of free and open-source software, open standards, and open data formats for
attaining digital sovereignty to policy makers, administrators, educators, and
the wider public. We are happy to support Swiss decision makers on municipal,
cantonal and federal levels with our expertise and network to take steps towards
true digital sovereignty together.
The post The state of discussions on digital sovereignty in Switzerland and
Europe appeared first on ISOC Switzerland Chapter.
Il 4-5-6 febbraio partecipiamo alla quarta edizione del festival sulle arti
inclusive #InclusiveArts2026 che investiga le pratiche di #MachineLearning nel
campo dell’inclusive design e dell’accessibilità delle piattaforme digitali.
In occasione dell'evento iNCLUSIVE aRTS 2026 organizzato dal Prof. Enrico
Bisenzi presso l'Accademia di Belle Arti di Roma, siamo state invitate a
partecipare in modo trasversale nelle tre giornate per contribuire con uno
sguardo critico ad analizzare l'impatto dell'Intelligenza Artificiale nel campo
dell'Inclusive Design. Inoltre, nella prima giornata, condurremo un laboratorio
di S/gamificazione dal titolo Automazione industriale VS Intelligenza
Artigianale in collaborazione con Betterpress Lab
AUTOMAZIONE INDUSTRIALE VS INTELLIGENZA ARTIGIANALE: “GIOCARE O ESSERE GIOCATE”
(A CURA DI AGNESE TROCCHI E BETTERPRESS LAB)
Analisi d’interfaccia: un percorso a ritroso dal digitale all’analogico
Ogni giorno nelle nostre attività personali, di studio o di lavoro, siamo
costantemente esposte a piattaforme digitali che influenzano il nostro modo di
comunicare e di vivere le relazioni. Attraverso l’analisi emotiva d’interfaccia
comprendiamo i meccanismi che influenzano il modo in cui viviamo le interazioni
digitali, in particolare con i chatbot conversazionali. Senza accorgercene
automatizziamo i nostri comportamenti per interagire con le intelligenze
artificiali su cui proiettiamo caratteristiche umane.
Esplorando la “zona della macchina” in cui siamo quotidianamente immerse,
realizzeremo due tipi di intervento: la mattina analizzeremo le interfacce
digitali di videogiochi, social media, app di messaggistica e chatbot per
comprendere cosa è la gamificazione utilizzando il metodo della Pedagogia
Hacker; il pomeriggio ricostruiremo in modo analogico le interfacce che più sono
presenti nelle nostre vite utilizzando gli strumenti della stampa a caratteri
mobili.
MATTINA: LABORATORIO PRATICO/TEORICO “GIOCARE O ESSERE GIOCATE”
Ogni giorno siamo chiamate a partecipare e a contribuire instancabilmente alle
“comunità” digitali, costruite seguendo tecniche di gamificazione.
Veniamo spronate a interagire con chatbot conversazionali pronti a rispondere a
ogni nostra domanda. Ogni esperienza di interazione si trasforma in una
complicata gara, con un sacco di punti e classifiche, livelli e campioni.
Conosciamo per esperienza diretta le regole di questi “giochi”: se ci
comportiamo bene, otteniamo molti “like”, strike, notifiche, cioè caramelle
sintetiche per i nostri cervelli (sotto forma di dopamina); se siamo scarse
rimaniamo a bocca asciutta. Analizzeremo testi di chatbot e testi digitali di
esseri umani. Osserveremo gli spazi e gli strumenti di cui si avvalgono e, nel
corso di un viaggio a ritroso tra gli strati e nel tempo, arriveremo ad
esplorare come il mezzo modifica il messaggio e compromette i fini.
POMERIGGIO: LABORATORIO PRATICO/CREATIVO
“Stampa a caratteri mobili – pensare con le mani”
Siamo in un mondo dove le piattaforme social, le app di messaggistica e le
conversazioni con i chatbot ci travolgono in un flusso incessante di emozioni e
informazioni. Con curiosità hacker solleveremo gli strati delle tecnologie per
osservare cosa cambia se a scrivere è una IA, un essere umano su un supporto
digitale o su carta con un torchio tipografico.
Come cambiano la composizione e l’impatto emotivo della comunicazione al
cambiare dei supporti tecnologici che utilizziamo?
Comporremo con caratteri mobili e stamperemo con tirabozze tipografici,
inchiostrando la forma manualmente con i rulli. Utilizzeremo questi strumenti
per ricostruire un’interfaccia digitale con la tecnologia analogica.
Attraverso l’osservazione dei nostri comportamenti sperimenteremo un percorso
catartico che ci permetterà di acquisire una maggiore consapevolezza dei
processi nascosti nei rituali digitali quotidiani e di costruire ricette utili a
colmare l’alienazione dalle tecnologie che fanno parte delle nostre vite.
SEDE DELL’EVENTO
Come per le altre edizioni il ‘festival’ #InclusiveArts si terrà presso la sede
di Campo Boario dell’Accademia di Belle Arti di Roma – Largo Dino Frisullo,
s.n.c., Testaccio, 00153 Roma https://maps.app.goo.gl/KCVhAaR8rTsy4kEQ6 (
41.873922, 12.472511 ).
Iscrizioni per ottenimento credito
Per saperne di più sul programma e sulle modalità d'iscrizione visitate il sito
del Prof. Enrico Bisenzi
On Friday 18 September a small group of people gathered at L200 (and online) to
analyze certain important risks associated with the new law on the Swiss E-ID.
The discussion was very lively and productive and the main outcomes relevant for
keeping a critical attitude with the fast digital transformation that is
happening everywhere.
We identified 3 major “risk areas” that need to be better understood especially
now that the outcome of the referendum was positive, and the Swiss E-ID will be
eventually implemented:
1) Unnecessary dependence on technology in everyday life.
2) Extended exposure of one’s private data.
3) Increased potential damage by identity theft, device hacking or failure.
Some of these risks could be better addressed by the current law, most notably
the lack of clear measures that ensure its optional character. And others, like
the increased exposure to surveillance and various forms of attacks or
accidents, are questioning the necessity of a Swiss E-ID in the first place.
The main goal of our discussion was not to repeat the main arguments that
prioritize those risks in comparison to the respective benefits mostly related
to convenience and law enforcement. The goal was to discuss the most effective
ways of communicating those risks to raise the awareness and engagement levels
toward a wise digital transformation.
1) The optional character of the Swiss E-ID is an empty promise
This is a key point to communicate properly:
A digital E-ID stops to be “optional” when it is obligatory for an activity that
is really important for someone.
If the E-ID is required for me to have an operation for a serious disease it
stops being optional for me. It is obligatory.
And if for people that have an ID, the compromise to have also an E-ID to access
vital services might not seem such a disaster, it becomes one for those without
an ID in the first place. If you are not one of those that believe that such
people should be exterminated, you should make sure that the E-ID stays truly
optional. The law does not guarantee this, but the people can still fight for
it.
Related to this topic, you can read a recent publication by the Computer
magazine titled “How much technology is needed to build a smart community
space?“, by Panayotis Antoniadis, which explains why it is important to maintain
a wide set of more or less technological options for addressing social problems
and why FLOSS software is a key ingredient for enabling local communities to
make the right choices.
2) Stronger identity means more powerful surveillance
Simple narratives around surveillance capitalism like the “age verification with
restricted data” case study, as promoted of the “pro” campaign for the Swiss
E-ID, can be dangerous.
The threats to privacy caused by the avalanche of digitization cannot be
addressed only through protection measures. It is a complex issue that requires
complex thinking, not an easy task for communication specialists.
The intention of the Swiss E-ID law has a positive dimension. It aims to
minimize the amount of personal data shared with private companies when they
need to verify certain aspects of our identity, most notably our age. This is a
good design, but it underestimates the power of big corporations to extract more
than necessary information in the same way that nudge people into accepting
their cookies.
Moreover, it adds one more actor that has full access of one’s digital life, the
government. Big companies still collect the same amount of personal data they
did before and in addition have access also to our official identification
information. And the government that was not aware of our online activities, it
will now has also access to a significant part of it.
Of course, we trust more our government than Facebook. This is clear. But even a
benign state can fail sometimes, can become the victim of attacks, or change in
light of a big crisis.
Finally, even if we do our best to protect our privacy online, this success can
cause important side-effects. A more trustworthy digital world can increase our
addiction and dependence on digital services and the power of those having
access to this information for producing knowledge on human behavior.
3) Increased digitization increases vulnerability to attacks or failures
Accidents or failures happen always, with the examples of blackout in Spain and
the airport ransomware still present in our memory, we can only hope that we
will not be among the victims of the next natural disaster, malicious attack, or
internal failure.
Moreover, the danger of identity theft is another reason why the optional
character is highly compromised.
Here, the Swiss E-ID law cannot do much. It is a matter of implementation and
the advantage is always to those that wait in the back instead of leading the
process. The fact that the proposed solution is not fully open source can only
make us worry.
The more we depend on digital devices for our everyday life the more vulnerable
we depend on potential failures and accidents. If we get used to our Swiss E-ID
and we leave its physical counterpart always at home, the more harmful it will
become if we fall from the bicycle and break our phone or if we lose it before
going to an important event or trip that requires it.
Final note: the critical role of Free/Libre and Open Source Software
The result of the referendum was remarkably close despite the fact that the
majority of political parties were in favor. This means that the Swiss people
are really concerned by the risks of digitization and thus it is really
important to discuss and debate about specific details of its implementation.
For this, the role of Free/Libre and Open Source Software is critical, and
ISOC-CH is a communication partner of the more ambitious funding programmes for
supporting FLOSS software worldwide, the NGI0 Commons Fund.
Our forthcoming “what does digital sovereignty mean for … ” series, will include
this key dimension in the overall debate taking the perspective of different
actors and focusing on what can be actually done, now.
Just waiting the European industry to fight the American Big Tech on its own
field is not very productive. There is a lot we can all do to protect ourselves
from actors that abuse their power and from technologies that do not serve our
real needs.
Become an ISOC-CH member and/or join our announcements list by sending a message
to contact@isoc.ch to stay tuned!
The post What could possibly go wrong with the Swiss E-ID? (a short summary)
appeared first on ISOC Switzerland Chapter.
Sono aperte le iscrizioni all'edizione 2026 del Master Studi e Politiche di
Genere dell'Università di Roma Tre. Quest'anno il Master prevede due percorsi:
uno esclusivamente in presenza e uno esclusivamente online su strumenti liberi.
La domanda di ammissione va inviata entro il 7 gennaio 2026. È possibile anche
partecipare come uditrici a uno o più moduli.
Nato nel 2001 all’Università Roma Tre, il Master Studi e Politiche di Genere è
lo spazio dove trovare strumenti teorici per l’introduzione e l’aggiornamento
sulle tendenze e i dibattiti più recenti, sostanziati da un approccio
genealogico, che restituisce la ricchezza dei percorsi precedenti, intrapresi da
singole, gruppi e movimenti.
Agnese Trocchi e Lavinia Marziale curano il modulo Tecnologia Critica e da
quest'anno si occupano anche degli spazi digitali per il percorso online.
Il master in Studi e Politiche di Genere a distanza per il suo svolgimento ha
adottato Nextcloud e Discourse, software liberi e open-source per archiviazione
cloud, discussioni e condivisione di spazi e materiali digitali, e molto altro.
Siamo partite dall’osservare tanto gli strumenti digitali che accompagnano le
nostre attività di studio, svago o lavoro, quanto le nostre relazioni con questi
strumenti. Comprendere il funzionamento di reti, hardware e interfacce digitali,
la loro progettazione e le interazioni di potere geopolitico che le rendono
possibili, ci dà la possibilità di situarci nel mondo digitale e fare delle
scelte consapevoli.
Le tecnologie digitali non sono infatti né neutre né eteree, ma incarnano e
modellano a loro volta le nostre relazioni e comunicazioni.
Per questo le nostre istanze di Nextcloud e Discourse sono ospitate sui server
gestiti da Maadix, società catalana che offre servizi informatici promuovendo i
valori della privacy delle comunicazioni, sicurezza digitale e libertà di
informazione.
Tutto il programma del percorso online è consultabile qui
Il programma del percorso in presenza è qui
Per informazioni sulle modalità di iscrizione invece seguire questo link.
Martedì 16 novembre si è tenuto a Torino e, contemporaneamente, in streaming il
lancio della campagna “I.A., basta!” pensato dai sindacati di base, in
collaborazione con l’associazione “Agorà 33 – La nostra scuola”, per «resistere
all'adozione frettolosa e acritica delle intelligenze artificiali centralizzate
imposte da Big Tech, come ChatGpt e Gemini», in risposta all’appello di alcuni
docenti.
Lo scopo principale della campagna è far partire un dibattito che latita
dall’inizio della “transizione digitale”, incentivata dai vari round di
finanziamenti Pnrr Scuola. Fino a ora, infatti, si è sempre sentito parlare di
“intelligenza artificiale”, strettamente al singolare, sottintendendo con questo
che l’unica opzione per la scuola sia accettare “a scatola chiusa” le soluzioni
delle Big Tech, oppure rigettare in toto la tecnologia alla maniera degli Amish.
Non esiste una sola intelligenza artificiale
Fin dalla prima sperimentazione, lanciata all’inizio dello scorso anno
scolastico, il ministero dell’Istruzione e del Merito sembra muoversi in accordo
al grido di battaglia che fu di Margaret Thatcher: «Non ci sono alternative»! La
sperimentazione, partita in 15 su 8254 scuole del paese utilizzando
esclusivamente prodotti Google e Microsoft, non è ancora terminata e già il
Ministero ha fatto un altro possente balzo in avanti: a settembre ha presentato
le “Linee guida per l’introduzione dell’I.A. nella scuola”.
A partire dal titolo del documento, emerge in maniera chiara una visione
rigidamente determinista: l’intelligenza artificiale è una, quella venduta da
Big Tech (OpenAi, Google, Meta, Microsoft, Anthropic), non ci sono discussioni.
Articolo completo qui
A small group of experts from ISOC-CH, the pEp (pretty Easy privacy) project,
former Planck Security AG/SA, Cisco and Google gathered on Thursday, Oct 29 at
L200 to discuss the last developments in the email encryption space, securing
email, beyond the body to header protection. The cozy Happy Hour approach gave
the base for a longer discussion which started by two input talks on the topic.
INPUT 1: THE MOTIVATION (WHY WE SHOULD CARE ABOUT EMAIL ENCRYPTION)
by Hernâni Marques (ISOC-CH)
The first talk by Hernâni Marques (ISOC-CH, formerly pEp) gave some motivational
arguments for why it still matters to care about email encryption, given, e.g.,
the fact that email is still the most widely distributed identity system for
services on the Internet, with virtually no service allowing a proper sign up
without an email address which also has the advantage that pseudonyms can be
used avoiding to (directly) reveal one’s identity. There was also emphasis put
on the existing Mass Surveillance practices — over 10 years ago, former national
security contractor Edward Snowden showed the pervasive nature of US-led Mass
Surveillance. It can be assumed the existing practice got even reinforced in the
meantime. Also Switzerland engages in practices of Mass Surveillance — a
respective secret service law was approved with majority vote by the Swiss
population, making the also mentioned cypherpunk movement’s core point real
privacy for citizens, enterprises or even the very own government, can only be
achieved by technical means, that is, using cryptography.
INPUT 2: TECHNICAL DEVELOPMENTS (THE RFC 9788 STANDARD)
by Bernie Höneisen (Ucom.ch / ISOC-CH)
On the second input talk, Bernie Höneisen (Ucom.ch / ISOC-CH) showed ongoing
developments from the IETF space which aim at making email encryption more
accessible and useful. Main focus was put on the latter part. Using S/MIME or
PGP/MIME, emails can be protected body-wise. However, the protection of current
email systems typically does not include the header section. But the latter may
contain sensitive information; e.g. the Subject header field might give enough
clues on what a communication is about (without even knowing the messages’
content). To also protect sensitive information contained in the header section
of an email, the IETF recently published a new standard (RFC 9788). In addition
to protecting header fields, the document provides means to protect against a
few other attacks as well as mechanisms to avoid protected information
inadvertently leaking to unprotected (parts of) reply or forwarded emails. As
Bernie pointed out and as it can be seen in his slide deck, tests in the past
showed that existing header protection attempts showed different kind weaknesses
in rendering emails. This included artifacts like having to click on attachments
to open an email or even getting nuisance warnings regarding security. Using RFC
9788, also legacy email clients can render the received message without major
issues. RFC 9788 describes in details how emails with header protection are
created, rendered and replied to in a secure and private manner. Furthermore it
includes test vectors and a lot of other useful information. Along with RFC
9788, the IETF also published RFC 9787 providing guidance on End-to-End Email
Security for implementers of email systems.
OPEN DISCUSSION
The discussion following the above was vivid with every person present playing
an active role able to talk at length, leading to a few non-obvious take-aways:
* People don’t seem to care a lot about email encryption, while the government
even has legislation in place targeting that channel (in CH: BÜPF and NDG)
* The email system is a legacy system and (because of interoperability)
difficult to fix
* end-to-end encryption (E2EE) in email is an exception, while most
organizations, which use encryption, use S/MIME internally
* Other (popular) messaging systems failed at replacing email, and its letter
rather than chat / office room character; in that sense subject protection,
for setting a topic, is very helpful
* Encryption between email servers, which got momentum after Snowden
revelations, like widespread HTTPS use, might be enough to solve “80% of the
issue with 20% of the effort”, as one participant put; even though this not
being a true E2EE solution.
* Companies hesitant to E2E email encryption due to legal requirement or
preserving information after a employee moves on
ABOUT THE EVENT FORMAT
The Happy Hour format proved to be a nice way to discuss a topic in an easy
atmosphere, with the social aspect playing a bigger role than normally, this by
the soon break of the line between presenters and (interested). Happy Hours are
a suitable format for events where ISOC-CH members want have to a topic
discussed and elaborate on a topic with an expert group, and not just to present
a piece of content without the expectation of much engagement.
The post EVENT SNAPSHOT: ISOC-CH Happy Hour on email encryption appeared first
on ISOC Switzerland Chapter.
From 21–23 November 2025, the Miljenko Dereta Center in Belgrade hosted DESCON
9.0. Organized by the Internet Society – Serbia Chapter, this year’s conference
carried the theme “Trust and Power: AI is a Harsh Mistress.”Participants from
diverse fields—developers, researchers, activists, artists, and
technologists—gathered to explore how today’s technological infrastructure is
reshaping society.
The event once again distinguished itself through its interdisciplinary reach
across ecology, open hardware, digital rights, citizen science, and artificial
intelligence.
Opening the conference, Desiree Miloshevic, DESCON’s founder, reminded the
community that DESCON is where hands-on experimentation meets policy. What began
as a small IoT and security meetup has grown into a platform for sustainable
connectivity, civic innovation, and climate technology. She called on
participants to question assumptions, collaborate across sectors, and build
technology that protects dignity and the public good.
The keynote by Marianthe Stavridou, Vice-Chair of the Internet Society –
Switzerland Chapter, traced a line from Plato’s Cave to the algorithmic systems
shaping our perception today. She warned of a drift toward “technofeudalism”,
where data becomes the ultimate commodity in the hands of a few. The message is
clear: AI is not the fate of humanity but its mirror—ethics, transparency, and
openness must guide its developments.
The Finnish researcher Jari Arkko spoke remotely, examining AI’s massive and
growing environmental footprint, from energy-hungry data centers to costly
hardware. Yet he emphasized that AI can still be a net-positive force when used
judiciously to optimize energy systems in transport, buildings, and industry.
Sometimes, he noted, the best solution is not AI.
Later, Urs Gehrig demonstrated how AI is transforming reliability engineering
across sectors, from automated train inspections to integrated data systems. His
takeaway: AI succeeds when organizations collaborate, understand their
processes, and move beyond proofs-of-concept toward practical deployment.
Andrijana Gavrilović of the Diplo Foundation unpacked why global AI governance
remains slow and fragmented. Drawing on the work of the UN High-Level Advisory
Body on AI, she highlighted recommendations for a scientific panel, regulatory
interoperability, global data frameworks, and a smaller but focused UN AI
office. With forums like the Global Digital Compact taking shape, she stressed
that AI is global—and its governance must urgently catch up.
From the UNDP, Slobodan Marković reflected on Serbia’s early AI leadership
through its 2019 strategy and institutions like the National AI Institute and
the national data center. But momentum is fading: political backing has
weakened, pilots have stalled, and the upcoming AI strategy lacks a funded
action plan. Serbia’s future AI progress, he argued, depends entirely on renewed
political will and sustained investment.
The Share Foundation team—Andrijana Ristić, Tijana Stevanović, and Filip
Milošević—offered a clear-eyed analysis into global spyware operations and
Serbia’s own NoviSpy case. They warned that spyware is now an expanding industry
threatening not just individuals but democratic systems. Encryption is
meaningless if the device is compromised, they stressed, and “I have nothing to
hide” is not a defense but a dangerous surrender of rights.
The workshop “AI Is a Harsh Mistress” tackled the promises and risks of
autonomous decision-making. One group highlighted the strain data centers place
on power grids, the erosion of coding competence due to AI assistance, and
conflicts between commercial and human-centered AI models. Another group
emphasized existing EU protections—such as GDPR Article 22—while noting that
enforcement lags behind technological reality. Both agreed on the need for human
oversight, stronger legal safeguards, and attention to how AI disproportionately
affects vulnerable communities.
The DESCON 9.0 Hackathon launched with high energy, challenging teams to
upgrade KLIMERKO, the citizen-science air-quality network born at DESCON 7.0.
Teams explored new sensors, solar-powered prototypes, LoRaWAN connectivity,
indoor TFT displays, and predictive models combining Klimerko data with weather
forecasts.
Across three days, DESCON 9.0 showed how bottom-up initiatives can bring
together people from different disciplines to confront the defining challenges
of the algorithmic age. The event underscored a shared belief: technology is not
an inevitable force but a human choice. The systems we design must elevate
dignity, strengthen trust, and distribute power fairly.
The labyrinth of the digital future may be complex—but navigating it is a
collective effort.
Many thanks to Desiree Miloshevic Evans, Ivan Jelić, Milena Milivojev, Jan
Krasni, Božidar Tanasković, Vanja Stanić, the team and the Internet Society –
Serbia Chapter for an inspiring and unforgettable event.
The post DESCON 9.0: Navigating Trust and Power in the Algorithmic Age appeared
first on ISOC Switzerland Chapter.
Due presentazioni di Prompt di Fine Mondo! Sabato 6 dicembre a Perugia in una
casa leggendaria e domenica 14 dicembre a Roma presso la Sala da Tè
InTHErferenze del Forte Prenestino.
Due presentazioni da non perdere se volete accaparrarvi Prompt di Fine Mondo.
PROMPT DI FINE MONDO - SABATO 6 DICEMBRE A PERUGIA DALLE 18
Un nuovo imperdibilissimo appuntamento a Casa!
se comunicate la vostra preziosa presenza con almeno un giorno d'anticipo -
magari due - ci regoliamo meglio con gli approvvigionamenti di sorta per fare in
modo che le varie bocche non rimangano asciutte e le varie sedie/panche siano
sufficienti ad accogliervi comodamente.
PROMPT DI FINE MONDO - DOMENICA 14 DICEMBRE A ROMA DALLE 17.30
CSOA Forte Prenestino
domenica 14/12/2025
dalle 17:30
Forte Infoshop & Sala da tè InTHErferenze
presentano
PROMPT DI FINE MONDO
di Agnese Trocchi (Circe 2025)
romanzo presentato, letto e chiacchierato da
Av.A.Na. con l’autrice
…
Cosa successe veramente nell’attentato multiplo del 2 marzo 2027 che vide la
distruzione dei principali data center statunitensi?
Reti generative, DeepTV, zombiesquatter... Scopritelo leggendo Prompt di Fine
Mondo, ma fate attenzione perché è un romanzo ricorsivo! Una spirale
mitopoietica!
Una gestazione di sei anni, un romanzo di fantascienza ucronica, un viaggio
attraverso le capitali d’Europa e del Sud America, vite che si intersecano ad
alta quota, un archivio digitale in cui distinguere racconti artefatti da
memorie vissute… fino a vedere oltre tutti gli strati.
https://forteprenestino.net/attivita/infoshop/3487-prompt-di-fine-mondo
Due presentazioni di Prompt di Fine Mondo! Sabato 6 dicembre a Perugia in una
casa leggendaria e domenica 14 dicembre a Roma presso la Sala da Tè
InTHErferenze del Forte Prenestino.
Due presentazioni da non perdere se volete accaparrarvi Prompt di Fine Mondo.
PROMPT DI FINE MONDO - SABATO 6 DICEMBRE A PERUGIA DALLE 18
Un nuovo imperdibilissimo appuntamento a Casa!
se comunicate la vostra preziosa presenza con almeno un giorno d'anticipo -
magari due - ci regoliamo meglio con gli approvvigionamenti di sorta per fare in
modo che le varie bocche non rimangano asciutte e le varie sedie/panche siano
sufficienti ad accogliervi comodamente.
PROMPT DI FINE MONDO - DOMENICA 14 DICEMBRE A ROMA DALLE 17.30
CSOA Forte Prenestino
domenica 14/12/2025
dalle 17:30
Forte Infoshop & Sala da tè InTHErferenze
presentano
PROMPT DI FINE MONDO
di Agnese Trocchi (Circe 2025)
romanzo presentato, letto e chiacchierato da
Av.A.Na. con l’autrice
…
Cosa successe veramente nell’attentato multiplo del 2 marzo 2027 che vide la
distruzione dei principali data center statunitensi?
Reti generative, DeepTV, zombiesquatter... Scopritelo leggendo Prompt di Fine
Mondo, ma fate attenzione perché è un romanzo ricorsivo! Una spirale
mitopoietica!
Una gestazione di sei anni, un romanzo di fantascienza ucronica, un viaggio
attraverso le capitali d’Europa e del Sud America, vite che si intersecano ad
alta quota, un archivio digitale in cui distinguere racconti artefatti da
memorie vissute… fino a vedere oltre tutti gli strati.
https://forteprenestino.net/attivita/infoshop/3487-prompt-di-fine-mondo