14
Rufo Guerreschi | CEO – [email protected] Seamlessly delivering unimagined freedoms to your digital life. . A I

TRUSTLESS.AI and Trustless Computing Consortium

Embed Size (px)

Citation preview

Rufo Guerreschi | CEO – [email protected]

Seamlessly delivering unimagined freedoms to your digital life.

. A I

TRUSTLESS.AIisbuildinga2mm-thintouch-screendevice-attachablethroughacasetothebackofanyphoneandtoyourdesktopmonitor–thatseamlessly deliverstopenterprises,topbanks,andmission-criticalNGOs

unimagined levelsofconfidentialityandintegrityoftheirlawfulcommunicationsandfinancialtransactions,

bothe-bankingandcryptocurrency.

Oncemarket-provenastheendpointsecurityleader,we’llscale-upasthe1stultra-secureenterpriseapplicationsplatform,and

rootoftrustofwide-marketsafety-criticalautonomoussystems.

1983: IT PROMISES

2013: IT REALITY

Nomatterwhatpriceabank,enterprise orpersoniswillingtopay, nodeviceisavailabletodaythatoffersmeaningfulprotectionofconfidentiality&

integrity,beyondmid-highlevelthreats.

The ProblemConfidentialityandintegrityofcommunicationsandtransactions.Aproblemformany,butcritical fortopstaffof:• LargeEnterprises• LargeFinancialInstitutions• Mission-criticalNGOs

datatheft

unwantedtravel

missedopportunities

Adesktopdockstandwhichembeds:

1. amicro-USBport,forcharging2. aWi-Fihardware-secured

anonymizationchip,formetadataprivacy.

3. anHDMI-switch,forlong- formtexteditingontheuser’sdesktopLCD.

A2mm-thintouch-screendevice,thatprovidebasicfeaturesbutwithradicallyunprecedented levelsofintegrityandconfidentiality:1. Rich-textsynchronousand

asynchronousmessaging2. Rich-textcollaborativeediting(i.e.

contracting,negotiations)3. E-banking4. Cryptocurrencyclientandwallet5. Passwordmanagement,multiple

personaUser’s

Smartphone

CivicCase (fortopsmartphones)

CivicPod

CivicPod CivicDockThe Solution

CivicKeyboard

Play our 2-minute product video at:

www.TRUSTLESS.AI

1. assumes that extremely-skilled attackers are willing to devote even tens of millions of Euros to compromise the supply chain or lifecycle, through legal and illegal subversion of all kinds, including economic pressures.

2. provides extremely user-accountable and technically-proficient oversight of all hardware, software and organizational processes critically involved in the entire lifecycle and supply chains;

3. provides extreme levels of security review intensity relative to system complexity, for all criticalcomponents; and includes only publicly verifiable components, and strongly minimizes use of non-Free/Open-source software and firmware.

4. includes only open innovations with clear and low long-term royalties (<15% of end-user cost) from patent and licensing fees, to prevent undue intellectual property right holders’ pressures, lock-ins, patent vetoes and ensure low-costs affordable to ordinary citizens;

5. includes only highly-redundant hardware and/or software cryptosystems, whose protocols, algorithms and implementations are open, long-standing, extensively-verified and endorsed, and with significant and scalable post-quantum resistance levels.

6. is continuously certified by an extremely technically-proficient and user-accountable independent standard/certification body.

Trustless Computing Paradigms

Rufo Guerreschi

CEO & Founder

The Team

12yearsofsingle-mindedpursuitofmeaningfulenactmentofcivilrightsincyberspace.Leadopensourcee-voting/e-democracystartup,thatsoldin3continents.BroughtvaluationofaplannedEU2ndlargestIT/mediatechparkfrom3€to21M€LeadEUsalesofJ2MEprovisioningsystemtilla10M€+2001saletoTelefonicaAggregateduniqueglobalR&Dpartnersonthe4-15M€TrustlessComputingInitiative.

Artur Pylak

CFOExperienced acting CFO in several startups. SeniorresearchanalystatSSRLLC,coveringtheTMTspacewithexpertiseincybersecurity&AI.Co-authoredleadingvaluationsforecastofstock-quotedfirmsinhotITverticals,includingcybersecurity,self-drivingcars,anddigitalassistants.

Roberto Gallo

CTODesignedanddeployedsince2014theWorld's1stCPUfullyinspectablewithoutNDAinitsHW&SWsourcedesigns,andthethefirstsecureCPUoftheSouthernHemisphere.Designedthesecurityarchitectureofthe400.000Brazilianvotingmachines;theASI-HSM,theHSMoftheBrazilianPKI-rootCA;andfighter-to-fightercommunicationsystems.

DirectorofMarketing.branding,positioning,artdirectionofwebsite,slides,video,TobyScholtz.For2years,GermanycountrymanagerandmarketingheadofApple-ownedBeats,theleaderinhi-fiwirelessheadsets.Formerlymarketingformobileoperators.Location:Berlin/Rome.(linkedin)

DirectorofSupplyChain&Manufacturability:manufacturability,HWprototype.Joonyoung Park. HasleadintheValleytheglobalR&DforaEU-basedgloballeaderinIPTV,CASandcybersecurity;ManagingDirectorofa200M$/yr 7-sigmaelectronicsmanufacturingplantinSouthKorea.Location:Seoul.(Linkedin)

DirectorofBusinessDevelopment - BalticRegionbanks&enterprise,MilitaryandGovernment:pilot/productsales,techconsulting.MarisKohen.CTOofCybersecurityatATOSBaltics;formerCSOofTelecomLuxembourg.Location:Luxembourg/Rome.(Linkedin)DirectorofBusinessDevelopment- Mission-criticalNGOs:pilot/productsales,prjmanagement,operations.AlexanderElkin.FormerHeadofStrategy&InternetProjectsatTransparencyInternationalRussia(Linkedin)DirectorofBusinessDevelopment - DACHRegionbanksandenterprises.pilot/productsales,fundraising.MatteoButussi.FormerlydirectorofbusinessdevelopmentatKudelskiCybersecurity.Location:Zurich.(Linkedin)

The Team: Trustless Computing Consortium

World’slargestArtificialIntelligenceR&Dcenter,apartnerinourCivicFabFOUNDRYOVERSIGHTprocess.(Germany)

MakerofWorld’s1st general-purposeCPU withpubliclyreviewableHW/SWdesigns.(Brazil)

MakersofthesmallesthighassuranceOS with3000linesofsourcecode.Oneoftwowithformalproofofcorrectness.(Germany)

EUleadingCRYPTOR&Dcenter,leadbythemostrenownedEUcryptologistandITsecurityexpert,BartPreneel (Belgium)

*A200mm110nmEU-basedFOUNDRY,fullyvalidatedourCivicFaboversightprocesses.(Italy)

*exploring alternative following 6/2016 non-EU acquisition.

Globally-uniquesuppliersthatagreedtodetailedIP/non-competetobuildoursecurity-criticalsupply-chainandcomputingbase

TRUSTLESS.AI is primarily the fruit of 15 years of single-minded quest of our CEO Rufo Guerreschi to realizethe potential of ICT to radically improve individual civilfreedoms and democratic participation.

Since 1983, the realization of such potential waspromised by Richard Stallman‘s with the Free SoftwareMovement, on one side; and by Steve Jobs’ Apple,with its famous “1984” Apple video ad, on the other.Such promises have not only utterly failed, but thefreedom and security of citizens and businesseshave dramatically worsened.

Whatever the price a user is willing to pay, there are stillno devices in the market today that provide evenremotely comprehensive evidence about their level ofresistance against scalable, pervasive, undetectablecompromisation by large numbers of state and non-stateactors.

Thirty three years later, TRUSTLESS.AI has a rock solidplan to fully and sustainably deliver on such promises,initially to premium users, and then to most citizens,

through (1) a unique team and supply-chain consortium,and (2) revolutionary and unprecedented IT securityparadigms centered on ensuring complete transparency,and extreme oversight and security-review relative tocomplexity, of all techs and processes critically involved inthe life-cycle.

Since 2013, TRUSTLESS.AI has been “incubated” inthe Trustless Computing Inititative by partners andmembers of the Trustless Computing Consortium withglobally-rare or unique expertise in open high-assurance IT.

Since 2015, plans for a Trustless Computing CertificationBody have been discussed with the top world experts and EUofficials at events in Brussels, New York, Brazil, and next inSF, through our Free and Safe in Cyberspace event series.

In July 2016, TRUSTLESS graduated from the Berlin-based Hardware.co Pre-Acceleration Program, sponsored bySiemens, Bosch and Deutsche Bahn. On Oct 22nd, we movedto Menlo Park, CA, to consolidate the team, get investortraction and advance our prototype.

Our Story

Unique Competitive Advantages

OurTrustlessComputingConsortiumaggregatesglobally-uniquehigh-assuranceICTsuppliers withabindingMoUforIP,non-competeandresilience;

OurTrustlessComputingParadigmsanditsproposedCertificationBodyhasbeenwidelysharedthroughourFreeandSafeinCyberspaceeventsinBrussels,NewYork,Brazil,Brusselsagain,withtheparticipationofuniquespeakersNextinBerlinandagainBrussels.Keyspeakers,sponsorsandadvisors- includingBartPreneel,CapGemini Netherlands,EITDigital,andTecnalia - havestartedsinceearly2016workingona10-pagersummaryManifestoofTrustlessComputing(PDF)andafull50-pagerdraftfullProposal.

ALLsoftware,hardwareandorganizationprocessescriticallyinvolvedinthelifecycleandsupplychainwilluniquelybe:(A)PubliclyinspectableintheirsourceHW&SWdesignswithoutNDA;(B)Subjecttoextremesecurity-reviewrelativetocomplexity,bypaidhighly-proficientand“ethical”hackers;(C)Subjecttoextremelyresilientoversight,basedonofflinecitizen-witnessorcitizen-juryprocesses,inadditiontostate-of-the-artITsecuritysafeguards.

Security-criticalEcosystem

SecurityParadigms

FormFactor

ThoughtLeadership

US Defense Science Board (2015): “Trust cannot be added to integrated circuits after fabrication”

Bruce Schneier (2014): “From what we’ve learned, we should assume all mainstream CPUs to be compromised”

Michael Sieber, Head of Information Superiority of the European Defence Agency stated at our 1st Free and Safe in Cyberspace: “Among EU member states, it’s hilarious: they claim digital sovereignty but they rely mostly on Chinese hardware, on

US American software, and they need a famous Russian to reveal the vulnerabilities"

CivicFab (1): The Problem

Our CivicFab processes will deploy general concepts reportedly applied by NSA Trusted Access/Foundry Program today in cases in which they require the highest-level chip fabrication oversight assurance. They reportedly choose a foundry that fits the equipment and general oversight process specifications – located, if not in the US, in a country that overall provide more assurance than others – which will agree to:

● (1) Make sure that the requested hardware is all produced in one continuous batch in a short time span (a few weeks), as is typical anyway;

● (2) Allow, for each batch, to setup and configure an extensive sensing and monitoring IT infrastructure – often produces by specialized proprietary companies – and allow about 3 (or more) competent, trained, redundant and trusted technicians, per shift, to verify thoroughly the entire process, 24/7 and on-site, from a monitoring room and inside the "cleanroom".

CivicFab (2): Matching state-of-the art

In excess of the NSA Trusted Foundry Program, described in previous slide, the CivicFab will:

A. Add at minimum number “citizen witnesses”, through mix of citizen jury and deliberative polling methods made up of 5 (or more) randomly-sampled citizens and CivicPod users, in a role of active oversight witnesses 24/7 in the critical phases. They would be well paid to take that time off, would be extensively trained and “self trained” through open participatory processes;

B. Choose to produce all critical ICs at EU-based 200-300mm EAL5+ foundries with older technologies, simpler processes, and less third-party IP obstacles than today’s’ Asian megafabs, such that they allow the technicians and witnesses to publicly and completely document the process with videos, photos and more.

C. Equipment and sensors, to be applied to the chosen foundries, should as much as possible not require direct interventions or disruption of the foundry equipment and facilities, but just rely on setting up an additional overlay of sensing equipment, and on getting copy of the existing quality control sensor feeds. This would also increase the “portability” of the CivicSite processes to other foundries, and in part the resiliency of the solution.

D. Sensing and oversight equipment would run Trustless transparent ultra-high assurance HW/SW will as much as possible be air gapped, make use of high assurance verifiable systems, and as much as possible based on TRUSTLESS SW & HW.

CivicFab (3): Radically exceeding state-of-the-art

At the service level. TRUSTLESS.AI will provide key recovery service to all its customers, in case of user death or loss of password, as well as a way to comply to legal AND constitutional lawful access requests. Although the architecture is pure P2P, partial temporary encryption keys are mandatorily saved daily to a redundant set of CivicRooms, whose physical access is under the direct management, certification and oversight of an international Trustless Computing Certification Body (TCCB). The validity of civilian court orders AND absence of blatant unconstitutionality will be evaluated on-site by trained citizen-jury-like body assisted by legal counsels. Its radically unprecedented technical and organizational safeguards will guarantee both users' rights and the crucial needs of the public security agencies.

At the fabrication level.The public availability of all TRUSTLESS.AI critical SW & HW source designs could enable criminal actors to produce their own CivicDevices for malevolent use. Such threat will be extremely and sufficiently reduced by a combination of: (A) IP cores tied to specific, capital intensive fabrication processes, naturally not available on mini scale prototyping fabrication facilities and foundries; (B) current inability of malevolent states or groups to fully and truly control a suitable semiconductor foundry. (C) In the rare case in which terrorist groups may attempt to enter in agreements with suitable foundries, current Allied intelligence capabilities can make sure to either forcefully prevent it or, better, insert vulnerabilities in their fabrication processes to acquire in the future extremely valuable intelligence.

But, how do we prevent grave abuse by criminals?!