Professional Documents
Culture Documents
Resumen Cyberlaw
Resumen Cyberlaw
What is cyberlaw?
Cyberlaw represents the evolutionary path that the law—as a discipline and as normative
enterprise—has underwent since the emergence of Internet.
Co – Regulation
When the states and private sectors cooperate in the regulatory endeavor, for a
commitment to a common goal, and for threats in the cybersecurity (internet). Example:
o Convention on Cybercrime (Budapest Convention, 2004). Adopted by
countries, except China and Rusia.
- Quite often its an ultimatum: either the sector self – regulates or the state comes
in.
- The advantage is that there is no territorial problem, that the legislation usually
has. But the disadvantage is that it doesn’t have the normative power of law and
represent only the sector’s interest (not those of the whole society).
- Example: ICANN, condes of conduct of social network.
Soft Law
Are norms and informal rules – quite often expectations - that if adopted by people, have
effect even though they do not have legal power. Should involve some sort of incentives,
otherwise, why bother? Examples:
o Codes of conduct, principles, guidelines, recommendations, reports,
memos.
- Soft law is much more usual in the economically powerful countries and less
frequent in economically unstable countries.
- Soft law is more flexible and easier to interpret and apply. Therefore, easier to
create and find consensus. Also, thanks to soft law, the industry discovers the
potential for the future legal norms, to see what actually works and what doesn’t.
- Soft law is the best for emerging technologies:
o But, problems with transparency, accountability and obligatory nature.
o Usually developed not only by private sector, but also by state agencies and
other private and public bodies.
o A secondary objective is to generate trust to citizens and privates in this
new sector. If there is trust, citizens will use technology and companies will
invest in technology.
o Indeed, many technologies—3D printing, virtual reality, etc—have never
been regulated. This is because soft law still needs to be created, and
technologies are getting quicker into our homes: It took 30 years for the
25% of US population to have a phone at home, and only 7 to have
Internet.
- Code of conduct of Facebook: Comitment to freedom of expression, which could
be limited in case the following values need to be protected:
o Authenticity: if someone is pretending to be (s)he is not and tries to cheat
others
o Security: if the content is threatening or silencing the others
o Privacy: if the content threatens privacy and intimacy of other people
o Dignity: if the content humiliates or bullies other people
Deregulation
State is less participatory to increase the competition and innovation.
Regulatory Sandbox
- We need a space to investigate how certain technology—company model, etc.—
would affect the existing economic, polítical and legal structures
- Quite often regulatory sandbox is a meeting space for the private and public
sectors. Particularity: limited period in time.
- Examples:
o The use of digital ID in financial transactions
o Voice and facial recognition
o Predictive medicine
o Autonomous cars
Principles of regulation
Internet
Historical Context
- 1963: The birth of the idea of Intergalactic Computer Network presented at
Defense Advanced Research Project (DARPA), US Department of Defense
“globally interconnected set of computers through which everyone could quickly
access data and programs from any site”
- 1983: TCP/IP protocol adopted: Internet starts.
- 1990: Internet grows into widespread phenomenon:
Paradigm shift: from one-to-many model of communication to many-to-
many model of communication
TCP/IP protocols: Enable the functioning of Internet and they specify how the data is being
transfered, received, what are the requirements for addresses, etc. Protocols are the rules
of traffic. These protocol has many specific protocols:
SMTP (email protocol)
HTTP (protocol for hypertexts)
TELNET (protocol that permits us to acces to the computes at a distance)
Etc.
The sharing and circulation of knowledge, as it was explained above, means that new
forms of nonmarket, non-proprietary, and cooperation forms of production will emerge,
together with communities whose members foster democratic participation. This will
stand for a networked or sharing economy, where exchange is based not on price but on
social relations. Examples:
- Wikipedia
- Open source movement
- Crowfunding
The network effect: Increase and no decrease the value of certain goods as more people
use them. Thus forming a network of users: basis of open source software.
- It’s a non profit organization, origin in USA. Until 2016 under the oversight of the
US Department of Commerce. So, not even 10 years of complete independence.
- Their function (among many) are to manage technical part of domain names, in
particular first level generic domains names, such as .org, .com, .info.
- Their goals are the stability of the internet and equal representation of everyone
(internet as a network of networks belongs to everyone).
- Its organized in 112 state representatives, with a boad of 16 directors, and
observators from different institutions: World Bank, international organizations,
etc.
IETF (Internet Engineering Task Force)
- Organization: No membership is needed, anyone can participate by signing up for
a working group or registering for a IETF meeting:
• Around 7000 people a year participate one way or another
• Ombudsteam to solve problems among participants
• English only
- The mission is to produce high quality, relevant technical and engineering
documents that influence the way people design, use, and manage the Internet in
such a way as to make the Internet work better. These documents include protocol
standards, best current practices, and informational documents of various kinds.
- There is commitment to openess and fairness: decentralization, user-
empowerment, sharing, etc.
- They work on internet’s technical standards:
• i.e. IP v4 transition to IP v6
• Technical documentation published as Requests for Comments (RFCs), which
have two sub-series:
o • STDs: Internet Standards
o • BCPs: Best Current Practice
- The work is done in working groups and is organized in different areas.
- The decisions are made by a rough consensus, no voting.
- Founded in 1992
- Area of work: “Supports and promotes the development of Internet as global
technical infrastructure” including technologies and open standards, protocols.
- Created Public Interest Registry to manage .org, ngo, and .ong top- level domains:
• Internet Registry was supposed to be sold to a private body, which meant
that the price caps for .org and similar top-level domains would be removed:
ICANN stepped into stop the sale.
- Representatives in every country: Spain has three – Madrid, Zaragoza, and
Barcelona
Non of these rights is established in any international law treaty (non mandatory
resolution of UN Human Rights Council 2016).
- The state must ensure the access, but the access is managed by private parties.
- Yet the state has not only to ensure the access, but also that the access has a
accessible price (Spain).
- Internet as common good: public/private versus public/private/common. Universal
access.
In 2019, trump intent to pass the “protecting cyberspace as a national asset act”, the goal
was to abolish net neutrality that it’s the basis of the internet: it cannot slow down,
discriminate, or otherwise block contents, webpages or aplications.
The idea of Trump was to stop that neutrality and ask the providers for payment to access
different websites, apps, etc.
Situation in China
Situation in Turkey
- In 2017 Turkish government blocks access to Wikipedia in all the languages (not
only Turkish) with no explanations or reason-giving. In 2019 The Constitutional
Court of Turkey sentences this block as a violation of human rights. Since 2020
Wikipedia is accessible again.
- Between 2014 to 2018 more than 200 000 websites were blocked (Facebook,
Wikipedia included).
- Whenever there is a political unrest, social networks, blogs, websites of human
rights organizations experience blocks.
- Obliges social networks with more than million users to have a local representative
to enforce court orders to remove contents. Solution: VPN
Artificial Intelligence
Definitions that changed over time: Our understanding about what we think the AI is, has
expanded, moved away from the original ideas, and turned into something completely
different.
Timeline
- 1940s-50s: birth and first attempts to make computers copy human behavior.
- 1960s: General Problem Solver, Fuzziness and ELIZA
- 1970s: Dark Ages: too high expectations – limited computer power – philosophers
attack (Searle)
- 1980s-90s: Rennaisance: expert systems -- technicians ignore philosophers --
robotics.
- Last decades: take off with new applications in finance, military, medical and other
domains where AI outperform the humans.
- XXI century: no limits, acceleration of (belief in) AI. ChatGPT.
History of AI
- 1943: Walter Pitts and Warren McCullock show how artificial neural networks can
process information.
- 1950: Alan Turing publishes "Computing Machinery and Intelligence"
- 1956: At the Dartmouth computer conference, John McCarthy coins the term
"Artificial Intelligence”. Statement: "Every aspect of learning or any other feature
of intelligence can in principle be so precisely described that a machine can be
made to simulate it."
- 1956: First working AI systems are shown.
- 1958: John McCarthy invents Lisp language.
- Early ’70s: invention of Prolog
- Late ’70s: first commercial expert systems
- ’80s: many experts systems are developed
- Late ’80s: growing awareness of limitations of current expert systems, and new
studies on neural networks
- ’90s: AI Applications in many domains: machine learning, case-based reasoning,
multi-agent planning, uncertain reasoning, data mining, translation, vision, virtual
reality, and games.
- 1997: Deep Blue defeats Garry Kasparov, world chess champion
- Late ’90s: Software agents, Web crawlers, Spiders and other AI systems are
developed for the web.
- In the 2000s: Commercial success of systems for the automated execution of legal
rules (such as Ruleburst/Oracle Policy Automation)
- 2010 to date: Drones, Autonomous Cars, Robots, internet of things, etc.
Expert systems before AI, answer based on knowledge and it has no Natural Language
Processing: write to the system.
The AI expert system, answer based on different kinds of data and what it has learned by
analysing it (new patterns establishes, new links earlier unseen). The Natural Language
Processing talks to the system.
Recommendation system: Netflix.
- John Searle: the idea of a non- biological machine being intelligent is incoherent.
- Hubert Dreyfus: AI is impossible.
- Joseph Weizenbaum: the idea is obscene, anti-human and immoral.
- Various: since AI hasn’t reached human level by now, it must be impossible
AI is not about creating a human mind but about creating something that could think like
humans.
Evolution of AI: from narrow to super intelligence
- Narrow AI: specific tasks, specific abilities (aka weak AI). Example: autonomous car.
- General AI: human kind of intelligence: we learn, we abstract, we create, we solve
problems. Example: chatGPT, Google Bard, etc.
- Super AI: beyond human intelligence: learning, abstracting, thinking, creating,
solving problems BETTER than humans. Example: none. It is one of the themes for
existential risk scholars.
Machine learning (ML) is the ability of machines to receive a set of data and learn for
themselves, changing algorithms as they learn more about the information they are
processing: machine learns by itself.
Deep learning is one of methods of ML, that mimics the way our brain works: software
learns, similarly to the way we do, to recognize patterns, sounds, images, and their
combinations, thanks to enormous quantities of data. Differently from ML, in this case the
software can spot and correct its own errors: machine not only learns, but also teaches
itself.
Neural Networks
Biological brain and its functioning as object of study and inspiration: functioning of brain
is reproduced by simulation.
- Brain is build of neurons (nerve cells, that permit us to do everything), which are
connected: each neuron is connected to 10 000 other neurons.
- Neurons are not all the same: some are bigger, some are connected to more
neurons, or to bigger neurons, etc.
- There are sensory neurons (deal with signals from sight, touch, ...), motor neurons
(to move muscles), etc.
- Billions of neurons act together in complex way: BRAIN
Artificial Neuron can be input (external or from another neurons) or output (external or to
other neurons)
The Artificial Neural Networks (ANNs) has the same underlying idea: inputs to the neurons
(image of a lion) produce outputs transmitted to other neurons (classification of a lion
among the animals of Africa) to get to a final output (recognition of a lion as a lion)
Works similarly as real neurons: inputs need to reach a threshold value to make the
artificial neuron to fire.
Robotics
*Faltan definiciones*
First, there is an effort to imitate and copy the human physical intelligence: the parallel
with humans is the strongest.
Features of robots
Another example: xian’er - robot budhist (entertainment, spiritual). Sings mantras and
explains the basics of budhism (has a screen with on it which helps it to answer 20
questions). The goal of its creation: disseminate budhism in China. It has only 7
movements.
The problem is foreseeability or a possibility to predict at any moment what a robot can or
will do.
An additional problem is “Intelligent deviation” (Kahana 2020): some AI can deviate from
their objective if the deviation is optimal:
- Leave some space open for AI to find the best, quickest, most cost efficient
solution.
- Might raise serious problems: how to establish the limits of deviation and whether
the range of deviations is predictable?
- Predictability guaranteed in case of autonomous cars: What the car can do is a
limited set of options.
When a robot is created using the memories and knowledge from human mind the result
is new, spontaneous, and original combinations of those ideas which in turn lead to
original thoughts.
This idea of cyberconsciousness has not progressed beyond a few enthusiasts, and yet it is
still on the table
Based on software (MINDWARE) which will activate a digital file with person’s thoughts,
memories, feelings, and opinions (MINDFILE) to be uploaded on our technology-powered
twin or robot (MINDCLONE)
Negative human reaction to humanoid robot: this reaction is reached at a certain point at
which human-like robot looks too much like human and provokes revulsion, rejection,
repugnance, and horror.
Until this point is not yet reached, more human-like robot is, more we identify with it in a
positive sense but once this point is reached, we reject it. “We” here are western societies,
that is not the case in Asia: the more the robot looks like human, the better (Different
theories about why).
1. Robots to help and support elderly or ill: dehumanization versus effective and less
expensive services? Is it about loosing employment or about giving people more
freedom to do other—more creative, less burdensome—activities?
2. Sex robots: yes, as a solution to the prostitution problem, to deal with deviations?
But do they solve anything?
3. Animal robots: separate research agenda on their mistreatment and psychological
effects on humans: Animal ethics are extensible to robotic animals?
IV. Personhood
One of the goals is creating a specific legal status for robots in the long run, so that at
least the most sophisticated autonomous robots could be established as having the status
of electronic persons responsible for making good any damage they may cause, and
possibly applying electronic personality to cases where robots make autonomous decisions
or otherwise interact with third parties independently.
Something is a person if it has states whose interactions appropriately mimic our rational
architecture (Pollock 1989).
History of personhood is a story about who got or lost what rights when and why:
- Rights are social constructs, human inventions and not something that objectively
exists in the world.
- No humans, no rights
- Rights ensured by governments
Legal fictions
- Slave a thing, corporation a person.
- State, political party, European Union, NGO, UN.
Personhood in law
What is the difference between the juridical (artificial) person and an entity without legal
personhood? The members of the former do not respond with their property, while they
do in case of the later.
- The origins are humans “social likings”: we moral recognize those around us
(community) all races, handicapped, animals, etc. These comes before legal
recognition.
- From a legal perspective, we recognize rights and duties of social liking.
- Example: in ancient Rome children consider things that pater familias could sell,
marry, divorce, give to adopt, imprison, force to work, and, in general, exercise a
jus vitae necique the children belonged to pater familias till their death.
- Justic or legal person: An answer to the socioeconomic consequences of industrial
revolution.
• Great Britain was the first country in Europe to recognize the corporations
as legal persons through a Limited Liability Act of 1855.
• The first US case law sources are of 1819 when Chief Justice John Marshall
argued in Trustees of Dartmouth College v. Woodward (1819) that “from
the nature of things, the artificial person called a corporation, must be
created, before it can be capable of taking anything. When, therefore, a
charter is granted, and it brings the corporation into existence, ..., the law
deems the corporation to be first brought into existence, and then clothes it
with the granted liberties and property”
A fully autonomous robot = A robot which is aware of its actions = A robot which is liable
for its actions = A robot with rights and duties = A robot is a legal person?
But, any of these problems could possibly matter in case of AI legal Personhood?
(destacado en rojo).
The main difference of a Robot (AI) as a legal person, is the ficticious autonomy versus
(almost) real autonomy.
1. Transaction: you must buy something or push the button “buy now”, “pay now”,
2. Verification of transaction by a network of computers, which checks your transaction:
date, price, parties.
3. Storage of transaction: once it is verified, it is stored in the block, together with other
transactions, and then,
4. HASH: Block is given a unique code (the information is encrypted with the help of
algorithm) that functions as signature.
5. Block is added to blockchain and from that moment on it is available for everyone to
see.
1. Hash is generated in accordance to the strict requirements: only hashes that meet
such requirements are accepted by the blockchain. i.e. only hashes that have a
certain number of zeroes are accepted, or only hashes that have 10 zeroes, etc. A
unique string: i.e.
761A7DD9CAFE34C7CDE6C1270E17F773025A61E511A56F700D415F0D3E199868
Hash generator: SHA 256. Check it at:
https://emn178.github.io/online-tools/sha256.html
2. Hash generation is a kind of solving of a puzzle. The computer continues
generating hash options until it finds the right one:
o With the right number of zeroes, or whatever other requirements it has to
meet
o Related to the previous hash (in case it is not the first hash for the first
block of blockchain)
3. Once the solution is found—we have the right hash—it is broadcasted and checked
by other nodes of the network through a relatively simple operation.
4. If all is correct, hash is applied to a particular block and block is added to the
blockchain.
What is mining?
The search for the right kind of hash (that is, hash that meets the requirements) is called
mining and the people who do this job are called miners:
- They provide with the computational power to find the right kind of hash
- There are specific mining software for this purpose
- Economic incentive to keep mining is payment for the effort (and computational
power)
- Comes in cryptocurrencies
Future of Blockchain
- Makes it possible to coordinate interactions between people
o Machines that can sell, buy, ... and do other things that we do
o New non-human players in the economic transactions on blockchain
- Use of blockchain for IP management (IP agreements, DRM, proof of authorship
record, royalties ...)
- Bernstein is simple web app that allows anyone to create a digital trail of records
of their innovation and creation processes using the bitcoin blockchain and
national timestamping authorities. Any digital asset of any size can be quickly
registered online to prove existence, ownership, and development over time, in
real time. Most importantly, al notarized data will remain perfectly private, thanks
to a unique cryptographic layer.
Smart Contracts
Definitions:
1. “Smart contract is a set of promises, specified in digital form, including protocols
within which the parties perform on these promise” (Nick Szabo 1996)
2. “Digital computable contracts where the performance and enforcement of
contractual conditions occur automatically without the need for human
intervention” (Wright and de Filippi)
3. “Agreement in digital form that is self-executing and self- enforcing” (Werbach and
Cornell 2017)
Characteristics:
1. It is not a contract, it is a code, inserted into blockchain to negotiate a contract.
The code and the conditions of the contract are publicly available on the ledger.
2. This code becomes active and contract comes into force, once a set of conditions is
met (i.e. certain event triggers the execution of code: IF A – THEN B)
3. No intermediaries necessary (banks, investors, notaries, ...)
4. Example: I rent you my flat by using a smart contract:
you get the PIN to enter it as soon as I get the rent fee in my bank account,
if I do not give you PIN then smart contract refunds you your rent fee
5. Smart property: control over a thing through smart contract (flat).
Examples:
- A song: The Smart contract triggers every time someone buys my song (pays 50
cents and gets the song). Once 50 cents are paid, the Smart contract divides the
payment between me (91%, that is 45,5 cents) and 3 collaborators who
contributed in creating the song (9% in total, 3% each, that is 1,5 cent each)
Instantaneously!
No author rights organization, no music label (Sony, etc.)
- The program that connects to my bank account so that when your payment
arrives, it triggers the execution of Smart contract.
- It can also be contacted to update Smart contract because of change in
circumstances, etc.
- Oracle problem: how to make sure that the information supplied by Oracle has not
been altered and is up to date?
Legal obstacles to introduce these contracts into legal circulation: Limitations of smart
contracts within the realm of contractual arrangements:
This is why we cannot say that the smart contract is a (form of) electronic contract ,
because
although we could argue that it represent the declarations of wills (as a normal contract),
but —differently from traditional contracts—it executes itself automatically, without
direct human participation.
¿What is DAO?
A non-hierarchical organization that perform on a peer-to-peer, cryptographically secure,
public network, and rely on the voluntary contributions of their internal stakeholders to
operate, manage, and evolve the organization through a democratic consultation process
(van Valkenburg 2015)
Or, an organization that relies on blockchain and smart contracts as its primary source of
governance.
Rules of DAO
- It might be for profit or not-for-profit
- No need for managers, CEOs, ... who cost a lot and are subject to human failure
- Based on open source code
- No clear link to any national legal system and no registration: legal uncertainty,
which sometimes plays against the DAO itself:
o Clarity of legal status of DAO (legal person, entity without legal
personhood, etc.) makes it more attractive for the investors.
o Clarity on liability: although there is no specific legal system, the DAO
produces legal effects and therefore the clarity of applicable legal rules
could also make DAO more attractive and acceptable.
Alternative solution: insurance fund/pool - small fees for each
transaction to cover any kind of damage caused by the DAO.
o Threat of “legal system shopping”.
Etherium DAO
At the beginning of 2016 anyone could buy DAO tokens, that the company sold to raise
the money to finance different projects (crowfunding):
- Token is similar to share in the company or can also be alternative to currency.
- Result: 12.7 million of Ethers (currency of Etherium) or 150 millions of dollars
Example: when you go to cinema, you buy a ticket which includes not only the
right to see the movie, but also free coke and popcorns: once inside you show your
ticket to get the drink and popcorn. In this case, money to buy ticket is ether,
whereas the ticket is a token.
- Functioning: Anyone could present his/her project to the community and get it
funded by DAO
Anyone who has bought tokens, has a right to vote a project and receive a
reward in case the supported project earned money. 11 000 investors.
But, hackers appeared:
Stolen tokens.
Hacker asked DAO smart contract to give him money back many times, before
the smart contract could update its balance: So the contract did not “know” that it
gave money back already and that it was repeatedly executing the same operation.
It was possible because of two problems:
o Possibility of someone adopting this method of hacking was not foreseen in
the code of the smart contract.
o Failure-oriented design of smart contract: first money, then update of its
balance.
Solution: Forks or change to blockchain’s protocol
o Soft fork: is an upgrade to the blockchain which is still compatible with the
previous blokchain.
o Hard fork: radical upgrade which can invalidate all the previous transactions
and blocks
1. It can, but not necessarily has to do it
2. It requires everyone within the blockchain to upgrade to the newest
version
3. It separates the new blockchain from the older one.
Etherium DAO decision: hard fork. That is, rewriting blockchain protocol
to get the money back which lead to the existential problem:
• Split of the community between those who accepted the fork (Etherium)
and those who didn’t (Etherium Classic)
• Why there were those who did not accept the fork solution?
Because fork solution is against the idea of blockchain as imutable: The
errors in code should be assumed and corrected, but if the Smart contract
had flaws and the community was late to correct these flaws and someone
used these flaws, then the community must take it on board but cannot
prevent the third party from getting the Benefit. Hacker ethics.
Metaverse
What is metaverse?
Some concepts:
Virtual (VR): physical interface (headset) leads the person to interactive virtual
environment, which the user can experience as if it was real.
Augmented (AR): interface (glasses, smart phone) that enriches what a person sees
naturally with digital content, so there is no new environment, but a digitally upgraded
version of the one the person is in physically: Remember a PokemonGo?
Mixed (MR): mixture of VR and AR where digital objects of augmented reality would
interact with the objects of virtual reality. In case of AR, the digital objects cannot interact
with the objects of the physical world.
Extended (XR): physical reality, VR, AR and MR all mixed together, which the goal of
making the user unable to distinguish between them, which would make the user
experience them all together and all at the same time: right now not yet feasible.
Inmersive technology
Turns the person from passive observer into an active participant. But to do that, it must
monitor him/her.
Metaverse problems
Built on the old ones: online plataforms, AI, and virtual realities. We should have learnt
that if we leave technology in the hands of a private sector, sooner or later the public
good is no longer a priority.
Now we have time to prepare for metaverse and experience with online plataforms. i.e.
What can we do so that the metaverse would not be in the hands of the selected few
companies?
Avatars
Person’s chosen representative in metaverse or online persona. Is the users virtual
representation: grants a level of anonymity.
Privacy threats
Biometric Psychographic
For the first time we can discover sensitive personal data based on how a person engages
with technology, how he/she looks at it, reacts to it, even when these reactions are out of
a person’s control.
This raises serious problems of:
• Consent
• Threats of manipulation and abuse
• Personal data infringements
•...
- Eye tracking and pupil response that reveal to whom a person is sexually attracted,
what we look at, how we feel by looking at something.
- Facial scans that can identify 7 emotions: anger, surprise, joy, contempt, disgust,
sadness, fear.
- Galvanic skin response: changes in the sweat gland activity that responds to the
emotional state or stress.
- Electromyography (EMG): electric activity of muscles and nerves: how tense your
muscles are when you see X?
- Electrocardiography (ECG): electric activity of the heart (measured through
electrodes that inform about heartbeat).
- Electroencephalography (EEG): electric activity of the brain which shows brain
waves that can reveal the state of mind and show one’s cognitive load.
Virtual reality games: Produce certain effects on the user, such as: increased heart
beat, moisture of skin, dilated pupils of eyes. All these bodily reactions are recorded by
headsets, glasses, gloves, or other interfaces that connect a person to the virtual reality.
Immersive technologies: understand its users based on at what the user looks, for how
long and how his/her body reacts to what he/she sees. These actions we do not control.
Virtual reality devices can also track where a user is looking at and what attracts his or her
attention, identifies what kind of reaction that something has on a user: scared,
enthusiastic, curious, discovers what stimulates the user to react.
:::> These means that All this information can be sold to other companies so as to push a
person to consume more of something that is identified as belonging to the spectrum of
user’s likings:
o What has made his/her heart beat faster, skin moisture, pupils dilatate?
o What could make his/her heart beat faster, ...?
These characteristics can also reveal much more than consumer
preferences. This data can reveal person’s sexual orientation, mental
health, drug use, physical problems, and generally speaking, psychological
profiles.
AIA (Parliament’s version) on new biometric data, which shows EP awareness of the issue:
*The German researchers have proved the link between a person’s performance in the VR
game with the risk of developing Alzheimer’s desease: Playing games then sometimes
might reveal to game provider with some very sensitive data about a player*
Neurorights
Electroencephalography (EEG): electric activity of the brain which shows brain waves that
can reveal the state of mind and show one’s cognitive load.
- Focus on the least explored place of the universe, or at least one of the least
understood places of the universe.
- It is also about our freedom, self- determination, self-governance.
- Human brain/mind: our bodies can be controlled by others, our minds not. To
which we access with the help of neuroscience combined with all that the
emerging technologies have to offer
- Activities:
o Register brain activity.
o Intervene, modify, change brain activity.
- Discoveries and (invasive or not invasive) explorations of the brain/mind
o Brain-Computer interfaces
o Brain-prothesis interfaces
o Neural implants
o Nootropics: drugs, suplements, etc.. that improve cognitive functions
(attention, memory, creativity, motivation in healthy individuals)
VS.
o With how little we know about the brain and how long it takes to discover,
develop, and test these advancements, and how dangerous it is.
What is that a person wants? The expectations are to think faster, be more inventive,
creative, resourceful, perceptive, be better. With respect to his/her previous self and/or
with respect to others. Able to do things that normally are not posible or that others
cannot do, enjoy new experiences in the alternative realities.
Neuralink: Elon Musk’s experiments
- Goal: to connect brain to computers (broadly understood) “to sync our brain with
AI”
- Means: implants (chips) in the cortex
- Methodology: intention-decoding algorithms
- Able to turn intention (to move a hand, talk, ...) into command for a
computer/prothesis/mobile devices/...
- Results: work in progress.
If Elon Musk achieves what he is aiming at, the experience of Metaverse would be:
Instant, accessible from anytime and anywhere, without any boundaries, consents;
completely immersive, with no difference to the experiences in the real life.
Digital ID Online
Digital ID as a trace of what we have done and do online (web search, purchases,
downloads, likes on FB, photos, tweets, etc). We leave information about ourselves on
each app, e-commerce website, social network, so we loose control over this information.
We already started to loggin in in different websites with our Google, FB, Apple or other
IDs: Yet it still does not mean that we control it, it is still under control of Google, FB,
Apple, etc.
What happens then, is that nothing really happens to you in immersive world, but
it does feel real: Your feelings can have physical consequences though: you can get
scared that much in the virtual world that you will get a heart attack in the real
one.
2. The already well known yet insufficiently dealt with legal problems: Harassment
and new versions of: Physical harassment, Verbal harassment, and Sexual
harassment.
Further threats
- Digital divide: we broaden it rather than close it.
- Terrorism and radicalization
- Child abuse: new space for predators and insufficient controls to protect under-age
minors from entering the Metaverse.
- Frauds related to consumer protection, but also other kinds of frauds related to
manipulation, vulnerabilities, or lack of knowledge.
Quantum Computing
Quantum theory
Is based on (OJO, lo va a preguntar):
1. Superposition: atoms can be in a different states at the same time.
Put differently: there is a range of states a particular system can be in (A, B, C, …X),
and when a system is in one state (A), there is such a relationship between the
states, that the system can be considered also to be—at least partially—in any
other given state.
2. Entanglement: the distance does not matter, the particles keep being connected:
o Particles’ behavior is correlated to each other regardless the distance
o Correlation without communication: particles are correlated but do no
communicate with each other.
3. Tunnelling: particle can overcome an energy barrier—pass through it— even
though the energy barrier is superior to its own:
Particles as waves are not disrupted nor stopped by the barrier. Put differently:
tunneling represents a probability to find the particle on the other side of the
barrier.
Classical Physics:
- In a macroscopic level (chair, aircraft, needle)
- Based on certainty– momentum and position of an object are measurable and
related. Momentum is a measurement of mass in motion.
- Particles—such as electrons—are particles (based on energy and vectors), waves—
such as light—are waves (based on amplitude, length, travelling direction, …).
On a macro level, there is an explanation for everything, yet on a micro level the questions
were emerging that classical physics could not explain. Hence the laws that govern macro-
level could not explain micro-level.
Quantum Physics:
- Focus: nature
- Level: micro (atomic/subatomic). Applies to and explains: atoms, particles,
molecules.
- Based on inherent uncertainty: momentum and position of particle are not related
and you cannot know neither momentum nor position with precision at any given
time (this is superposition).
Only probabilities apply. That is to say, the result is a probability calculated
based on the combination of different states.
- Particles can have wave-like features (act like waves), and waves can have particle-
like features (act like particles): particles are not only and just particles, and waves
are not only and just waves.
- Einstein in 1905 quantized the light: light is not a wave only, but also is made of
particles that he called photons (that is to say, it comes in units).
Quantum computing
Remember Internet: standards set by the US. for a long time standard Internet protocols
were available only in English and US set the decision making related to many other
aspects of Internet to.
Results: Quantum calculations are based on probabilities: probabilities also mean
mistakes. What is the degree of probability that we could/should choose to accept as a
correct answer? Who decides?
- Degrees of certainties different for different calculations?
- Probabilities of correctness in traffic management are not the same as in
healthcare.
Shor’s algorithm can do that—that is to say, it can discover which prime numbers were
used to get that final result—which means that it can decrypt anything you have
encrypted with RSA. That is to say, digital signatures, secure communications, financial
transactions, e-voting.
Shor’s algorithm it is not a threat as for today: we still lack sufficiently powerful quantum
Computers. Yet, we could collect encrypted data now and decrypt it later on, once we
have these computers “Bad people could do that too”.
Quantum Imperative:
Legal principles that could guide the regulation of quantum computing: Jeutner, V.
Quantum Imperative: Addressing the Legal Dimension of Quantum Computing (2021).
Three Rules: The regulators must ensure that the development of quantum computers:
1. Does not create or exacerbate inequalities: Haves (access to) quantum computers
and have nots (access to) quantum computers:
o From micro (individual) to macro (State) level: Global North versus Global
South
o Between private and public sectors
o Between private sector stakeholders: Powerful are even more powerful
(Frightful five are even more frightful)
Should we rethink technology patents (IP Protection).
Suggestion: access to some of the quantum computing capabilities to
companies, individuals, states.
2. Does not undermine individual autonomy: One of the most important values of
our societies.
Quantum computing—and in particular its promises in terms of cybersecurity
threats—might threaten it through the easier access to privacy and personal data
protection:
o New possibilities for the States to control the citizens, build barriers for
communication, fragment Internet and create national networks which
would not allow free communication and access to information.
o New possibilities for the high-tech to control consumers
Solution: if we put limitations on arms export, should we also put limitations to
quantum algorithm exportation?
First steps: The Wassenaar Arrangement on Export Controls for Conventional Arms
and Dual-Use Goods and Technologies:
o Not legally binding agreement that pushes forward transparency on
exportations of arms and technologies (only exportations!)
o Part 5: cryptographic information security technologies includethe systems
that are designed or modified to use or perform quantum cryptography”
3. Does not occur without consulting those whose interests they affect.
Standard setting in quantum computing is still in the hands of a few
Diversity and inclusiveness: Yet to build technology for everyone, we need to
involve as many stakeholders as possible.
Democratic oversight and control as basis for quantum development:
o We have learnt some hard lessons with Internet, online platforms
o Currently dealing with AI and blockchain
o What’s forthcoming: metaverse and quantum computing