SlideShare a Scribd company logo
Problem
self-censorship
data theft
unwanted travel
Confidentiality and integrity
of communications and
transactions
A problem for many, but critical for:
• Executives of large corporations
• Mission critical NGOs and media orgs
• Very high-net-worth individuals
A 2mm-thin touch-screen device,
attachable to the back of your phone
via a CivicCase, that ultra-securely
features:
1. rich-text & voice with other Pods
2. personal & business personas
3. password manager
4. cryptocurrency client and wallet
5. e-banking & one-time-passoword
(via partner bank)
User’s
Smartphone
Dedicated bluetooth
earphones
Charges both phone and
CivicPod
Custom CivicCase for
top smart-phone models
CivicPod CivicEarpiece CivicKeyboard
A desktop dock stand
which embeds:
1. a microUSB port, for charging
2. an anonymization chip, for
metadata privacy.
3. an HDMI-switch, for long-
form text editing on the user’s
desktop LCD.
CivicPod & CivicDockSolution
Unique Competitive Advantages
Co-founders and Trustless Computing Consortium members
have globally-unique high-assurance ICT expertises and
open assets, with a binding MoU in place covering all IP
issues, non-compete and providing extreme safeguards for
ecosystem resiliency.
The value, need and character of our proposed Trustless
Computing Certification Body have been very widely shared with
top world IT experts and top EU officials, through our Free and
Safe in Cyberspace events (Brussels, New York, Brazil, next in San
Francesco on Feb 15th 2017).
All SW, HW and processes critically involved in the lifecycle - from
CPU design, to fabrication, to hosting room access, to standard
setting governance - will be publicly verifiable and subject to (a)
extreme security review relative to complexity, by paid highly-
proficient and “ethical” hackers and (b) extremely resilient
oversight, centered on enhanced offline citizen-witness and
citizen-jury processes, in addition to state-of-the-art socio-
technical IT security systems.
Unique Supply-chain & EcosystemUnique Ideas
Rufo Guerreschi
CEO & Co-founder
The Team (1/2)
Fabrication* (Italy) The only economically-viable EU-based chip
foundry, within the 60nm and 160nm capabilities.
Fabrication Oversight (Germany) World’s largest Artificial
Intelligence R&D center, by number of staff and external funds.
Owned by Airbus, Daimler, BMW, Google, Intel, Microsoft.
CPU/SoC (Brazil) Maker of World’s only general-purpose CPU
with publicly reviewable HW/SW designs, the 100-300Mhz
Leon3/Sparc-based SCuP. (www.kryptus-int.com/cps)
OS (Germany) Makers of the leading high-assurance open source
hypervisor/kernel with 3000 lines of source code which achieved
formal proof of correctness in Nov 2016.
(sample code: https://github.com/hessophanes/schism)
Crypto (Belgium) The EU leading academic R&D centered in
crypto, quantum crypto and anonymization technologies. Lead by
Bart Preneel, EU most peer-recognized IT security expert and
cryptographer.
The Trustless Computing Consortium
• For 12 of the last 15 years, he has pursued single
mindedly the creation of IT suitable for exercise and
protection of civil rights in cyberspace.
• As exec. Dir. Open Media Cluster, he aggregated since
2013 unique global R&D partners around the 4-15M€
Trustless Computing Initiative.
• As CEO of Open Media Park he brought the valuation
of its planned EU 2nd largest IT/media tech park, from
3€ to 21M€.
• Founded and lead an open source e-voting/e-
democracy startup for social orgs, that sold in 3
continents.
• Lead EU sales of J2ME provisioning system till a
10M€+ 2001 sale to Telefonica
• (linkedin.com/in/rufoguerreschi)
*exploring replacement following 6/2016 non-EU acquisition
The Team (2/2)
Artur Pylak
CFO & Co-founder
• Research analyst at SSR LLC,
covering the TMT space with
expertise in cybersecurity &AI
• Co-authored market projection
reports on stock-quoted firms in
hot IT verticals including:
cybersecurity, self-driving cars,
and digital assistants
(https://dl.dropboxusercontent.co
m/u/10826821/PTA/artur-
pdfs.zip)
• Acting CFO and advisor to several
startups, including OneGo and
Oval.
(linkedin.com/in/arturpylak)
Roberto Gallo
CTO of Consortium (30%)
Jean-Pierre Seifert
Chief Architect of
Consortium (20%)
• Ceo, Co-Founder of Kryptus.
• He was responsible for systems and
lifecycle architecture of: (1) the first
Secure Microprocessor of the
southern hemisphere, the SCuP; (2)
the 400.000 Brazilian voting
machines (T-DRE, Urna Eletrônica);
(3) the ASI-HSM, the HSM of the
Brazilian PKI-root CA (certified NSF2-
NSH3, FIPS 140-2 Level 4); (4)
LinkBR2, a secure airborne datalink
solution.
(linkedin.com/in/robertogallo)
• Head, Security in
Telecommunications Dept. of
Technical University of Berlin &
Deutsche Telekom Lab
• Over 10 years of experience in
design and spin-off of microkernel
and hypervisors of high levels of
assurance
• Creator of a ultra-high assurance
hypervisor with formal proof of
correctness of only 3000 line of
code, which will be released
open-source for the startup, .
(linkedin.com/in/jean-pierre-
seifert-987423)
[Redacted]
CTO & Co-Founder
• Head of R&D and UX in the global
R&D HQs of a EU electronics giant,
located in the Bay Area. He leads
new products R&D from concept,
design, engineering, supply-chain,
UX, manufacturing and testing.
• He is also Managing Director of a
150M$+ /year electronics
manufacturing plant, owned by
his family, located in South Korea,
which produces electronics at the
highest quality standards.
(1) Software, hardware and services for
enterprise communications and transactions
security.
• Secure corporate-grade client devices, such as iPhone,
Blackberry, Samsung Knox, that are selected by top corporations
CIO/CISO, based primarily on their security.
Size: Worth tens of billions $ globally.
• Mobile Device Management (MDM), such as Good
Technologies, MobileIron, Airwatch, Xen Mobile.
Size: MDM market will be 5BN$ in 2021; Mobile security market,
worth 5.7M$ in 2019).
• Secure corporate communications and data services,
such as IBM, Accenture, CapGemini.
Size: Global cyber security market to grow from USD 122.45 billion
in 2016 to USD 202.36 billion by 2021. (Research and Markets)
• Pure-play Corporate & financial cybersecurity providers,
that offer hardware, software and services running on top of existing
corporate IT infrastructure: Check Point, Symantec, Palo Alto
Networks, FireEye, Verisign, Cyberark.
Addressable Market: 50-100BN$
(2) Cybersecurity spending
in the financial sector.
• Financial services is the largest
cybersecurity vertical worth $9.5 billion
and growing at a 23% CAGR
• The top 4 US banks (J.P. Morgan Chase,
Bank of America, Citigroup, and Wells
Fargo) will collectively spend $1.5 billion
on cybersecurity in 2016
• JP Morgan doubled its cybersecurity
budget to 500M$ in 2016.
• Lloyd’s estimates cyberattacks cost
businesses $400B annually as data
breach incidents and their complexity
increase – businesses will spend more
on effective and proven tools to
prevent losses

More Related Content

PPTX
Smartphone Component Trends and Outlook (Sept 2013)
PDF
NFC Patents Data for Standards & Applications 4Q 2011
PPTX
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
PDF
New Opportunities for Industry Growth (NXP)
PDF
The contactless mobile_report_2013_-_mwc13-slide_share
PPTX
5G Edge Computing IoT Presentation
PPTX
IoT and 5G convergence
PDF
NXP presentation at Secure Identifications 2016
Smartphone Component Trends and Outlook (Sept 2013)
NFC Patents Data for Standards & Applications 4Q 2011
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
New Opportunities for Industry Growth (NXP)
The contactless mobile_report_2013_-_mwc13-slide_share
5G Edge Computing IoT Presentation
IoT and 5G convergence
NXP presentation at Secure Identifications 2016

What's hot (20)

PDF
State of the Technology
PDF
Enterprise Europe Network - SIM card designed for Muslim users (11 GR 49Q1 3L9B)
PDF
Embedded systems security news mar 2011
PPTX
NFC: Connect, Transact, and Charge
PPT
Architecture and Development of NFC Applications
PDF
Embedded Systems Security News 2011/01
PDF
IoT with 5G-Network
PDF
TRUSTLESS
PDF
Embedded SIM New opportunities for security sensitive IoT applications
PPTX
Next Generation NFC Solutions and Contactless Infrastructure
PDF
Mobile Payment - Will NFC finally unlock a new value chain?
PDF
Embedded systems security news 2011/04
PDF
TRUSTLESS Pitch Slide Deck
PDF
SDP Global Summit 2009
PDF
2014 IoT_Forum_NXP
PDF
Israel's First Internet of Things Conference
PDF
NFC Mobile Payments 2016 What’s Next?
PDF
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
PDF
NFC Industry Update
PDF
industrial IoT can monitor critical machinery
State of the Technology
Enterprise Europe Network - SIM card designed for Muslim users (11 GR 49Q1 3L9B)
Embedded systems security news mar 2011
NFC: Connect, Transact, and Charge
Architecture and Development of NFC Applications
Embedded Systems Security News 2011/01
IoT with 5G-Network
TRUSTLESS
Embedded SIM New opportunities for security sensitive IoT applications
Next Generation NFC Solutions and Contactless Infrastructure
Mobile Payment - Will NFC finally unlock a new value chain?
Embedded systems security news 2011/04
TRUSTLESS Pitch Slide Deck
SDP Global Summit 2009
2014 IoT_Forum_NXP
Israel's First Internet of Things Conference
NFC Mobile Payments 2016 What’s Next?
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
NFC Industry Update
industrial IoT can monitor critical machinery
Ad

Similar to Latest slide intro for TRUSTLESS.AI (20)

PDF
Trustless Computing Initiative
PDF
TRUSTLESS Inc Long Term View
PDF
TRUSTLESS.AI and Trustless Computing Consortium
PPTX
Automotive security (cvta)
PDF
IoT Security and Privacy Considerations
PDF
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PPTX
Product security by Blockchain, AI and Security Certs
PDF
RisingStarsOfCybersecurity
PDF
Trustable Technology Mark (3 August 2018)
PDF
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
PDF
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
PPTX
Antonio Rojas, PREMO
PDF
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
PDF
WISekey presentation
PDF
The Trustable Technology Mark
PPTX
The Insecurity of Industrial Things
PPTX
Analytical Driven Security - Chip Copper
PDF
Track 5 session 2 - st dev con 2016 - security iot best practices
PDF
Reinventing Cybersecurity in the Internet of Things
Trustless Computing Initiative
TRUSTLESS Inc Long Term View
TRUSTLESS.AI and Trustless Computing Consortium
Automotive security (cvta)
IoT Security and Privacy Considerations
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
Track 5 session 1 - st dev con 2016 - need for security for iot
Product security by Blockchain, AI and Security Certs
RisingStarsOfCybersecurity
Trustable Technology Mark (3 August 2018)
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
Antonio Rojas, PREMO
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
WISekey presentation
The Trustable Technology Mark
The Insecurity of Industrial Things
Analytical Driven Security - Chip Copper
Track 5 session 2 - st dev con 2016 - security iot best practices
Reinventing Cybersecurity in the Internet of Things
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Latest slide intro for TRUSTLESS.AI

  • 1. Problem self-censorship data theft unwanted travel Confidentiality and integrity of communications and transactions A problem for many, but critical for: • Executives of large corporations • Mission critical NGOs and media orgs • Very high-net-worth individuals
  • 2. A 2mm-thin touch-screen device, attachable to the back of your phone via a CivicCase, that ultra-securely features: 1. rich-text & voice with other Pods 2. personal & business personas 3. password manager 4. cryptocurrency client and wallet 5. e-banking & one-time-passoword (via partner bank) User’s Smartphone Dedicated bluetooth earphones Charges both phone and CivicPod Custom CivicCase for top smart-phone models CivicPod CivicEarpiece CivicKeyboard A desktop dock stand which embeds: 1. a microUSB port, for charging 2. an anonymization chip, for metadata privacy. 3. an HDMI-switch, for long- form text editing on the user’s desktop LCD. CivicPod & CivicDockSolution
  • 3. Unique Competitive Advantages Co-founders and Trustless Computing Consortium members have globally-unique high-assurance ICT expertises and open assets, with a binding MoU in place covering all IP issues, non-compete and providing extreme safeguards for ecosystem resiliency. The value, need and character of our proposed Trustless Computing Certification Body have been very widely shared with top world IT experts and top EU officials, through our Free and Safe in Cyberspace events (Brussels, New York, Brazil, next in San Francesco on Feb 15th 2017). All SW, HW and processes critically involved in the lifecycle - from CPU design, to fabrication, to hosting room access, to standard setting governance - will be publicly verifiable and subject to (a) extreme security review relative to complexity, by paid highly- proficient and “ethical” hackers and (b) extremely resilient oversight, centered on enhanced offline citizen-witness and citizen-jury processes, in addition to state-of-the-art socio- technical IT security systems. Unique Supply-chain & EcosystemUnique Ideas
  • 4. Rufo Guerreschi CEO & Co-founder The Team (1/2) Fabrication* (Italy) The only economically-viable EU-based chip foundry, within the 60nm and 160nm capabilities. Fabrication Oversight (Germany) World’s largest Artificial Intelligence R&D center, by number of staff and external funds. Owned by Airbus, Daimler, BMW, Google, Intel, Microsoft. CPU/SoC (Brazil) Maker of World’s only general-purpose CPU with publicly reviewable HW/SW designs, the 100-300Mhz Leon3/Sparc-based SCuP. (www.kryptus-int.com/cps) OS (Germany) Makers of the leading high-assurance open source hypervisor/kernel with 3000 lines of source code which achieved formal proof of correctness in Nov 2016. (sample code: https://github.com/hessophanes/schism) Crypto (Belgium) The EU leading academic R&D centered in crypto, quantum crypto and anonymization technologies. Lead by Bart Preneel, EU most peer-recognized IT security expert and cryptographer. The Trustless Computing Consortium • For 12 of the last 15 years, he has pursued single mindedly the creation of IT suitable for exercise and protection of civil rights in cyberspace. • As exec. Dir. Open Media Cluster, he aggregated since 2013 unique global R&D partners around the 4-15M€ Trustless Computing Initiative. • As CEO of Open Media Park he brought the valuation of its planned EU 2nd largest IT/media tech park, from 3€ to 21M€. • Founded and lead an open source e-voting/e- democracy startup for social orgs, that sold in 3 continents. • Lead EU sales of J2ME provisioning system till a 10M€+ 2001 sale to Telefonica • (linkedin.com/in/rufoguerreschi) *exploring replacement following 6/2016 non-EU acquisition
  • 5. The Team (2/2) Artur Pylak CFO & Co-founder • Research analyst at SSR LLC, covering the TMT space with expertise in cybersecurity &AI • Co-authored market projection reports on stock-quoted firms in hot IT verticals including: cybersecurity, self-driving cars, and digital assistants (https://dl.dropboxusercontent.co m/u/10826821/PTA/artur- pdfs.zip) • Acting CFO and advisor to several startups, including OneGo and Oval. (linkedin.com/in/arturpylak) Roberto Gallo CTO of Consortium (30%) Jean-Pierre Seifert Chief Architect of Consortium (20%) • Ceo, Co-Founder of Kryptus. • He was responsible for systems and lifecycle architecture of: (1) the first Secure Microprocessor of the southern hemisphere, the SCuP; (2) the 400.000 Brazilian voting machines (T-DRE, Urna Eletrônica); (3) the ASI-HSM, the HSM of the Brazilian PKI-root CA (certified NSF2- NSH3, FIPS 140-2 Level 4); (4) LinkBR2, a secure airborne datalink solution. (linkedin.com/in/robertogallo) • Head, Security in Telecommunications Dept. of Technical University of Berlin & Deutsche Telekom Lab • Over 10 years of experience in design and spin-off of microkernel and hypervisors of high levels of assurance • Creator of a ultra-high assurance hypervisor with formal proof of correctness of only 3000 line of code, which will be released open-source for the startup, . (linkedin.com/in/jean-pierre- seifert-987423) [Redacted] CTO & Co-Founder • Head of R&D and UX in the global R&D HQs of a EU electronics giant, located in the Bay Area. He leads new products R&D from concept, design, engineering, supply-chain, UX, manufacturing and testing. • He is also Managing Director of a 150M$+ /year electronics manufacturing plant, owned by his family, located in South Korea, which produces electronics at the highest quality standards.
  • 6. (1) Software, hardware and services for enterprise communications and transactions security. • Secure corporate-grade client devices, such as iPhone, Blackberry, Samsung Knox, that are selected by top corporations CIO/CISO, based primarily on their security. Size: Worth tens of billions $ globally. • Mobile Device Management (MDM), such as Good Technologies, MobileIron, Airwatch, Xen Mobile. Size: MDM market will be 5BN$ in 2021; Mobile security market, worth 5.7M$ in 2019). • Secure corporate communications and data services, such as IBM, Accenture, CapGemini. Size: Global cyber security market to grow from USD 122.45 billion in 2016 to USD 202.36 billion by 2021. (Research and Markets) • Pure-play Corporate & financial cybersecurity providers, that offer hardware, software and services running on top of existing corporate IT infrastructure: Check Point, Symantec, Palo Alto Networks, FireEye, Verisign, Cyberark. Addressable Market: 50-100BN$ (2) Cybersecurity spending in the financial sector. • Financial services is the largest cybersecurity vertical worth $9.5 billion and growing at a 23% CAGR • The top 4 US banks (J.P. Morgan Chase, Bank of America, Citigroup, and Wells Fargo) will collectively spend $1.5 billion on cybersecurity in 2016 • JP Morgan doubled its cybersecurity budget to 500M$ in 2016. • Lloyd’s estimates cyberattacks cost businesses $400B annually as data breach incidents and their complexity increase – businesses will spend more on effective and proven tools to prevent losses