Advancements at the Intersection of AI and Cybersecurity

In recent times, the fusion of Artificial Intelligence (AI) and cybersecurity has emerged as a significant frontier in tech innovation. This merger offers a potent arsenal against an ever-growing variety of cyber threats. The dynamism of AI, coupled with the meticulousness of cybersecurity protocols, presents a novel way to bolster digital defenses.

 

One of the notable advancements is the use of machine learning for anomaly detection. By employing algorithms that learn and evolve, systems can now autonomously identify unusual patterns within network traffic. This proactive approach enables the early detection of potential threats, a leap forward from traditional, reactive measures.

 

Phishing attacks, a pervasive threat in the digital landscape, have also met a formidable adversary in AI. Utilizing machine learning, systems can now sift through vast troves of email data, identifying and flagging potential phishing attempts with a higher degree of accuracy. This ability to discern malicious intent from seemingly benign communications is a testament to the evolving prowess of AI in cybersecurity.

 

The two sides of the coin

On the other side, the nefarious use of AI by malicious actors is a rising concern. The creation of AI-driven malware, which can adapt and evolve to bypass security measures, signifies a new breed of cyber threats. These malicious software variants can alter their code to evade detection, presenting a significant challenge to existing security infrastructures.

 

Ransomware attacks have also seen the infusion of AI by malicious actors, resulting in more sophisticated and targeted attacks. Conversely, cybersecurity firms are employing AI to develop predictive models to identify and thwart ransomware attacks before they can cause havoc. This continuous back-and-forth signifies an ongoing battle where both sides are leveraging AI to outsmart the other.

 

The application of AI extends to combating more sophisticated threats like Advanced Persistent Threats (APTs). By utilizing AI to analyze vast datasets, security systems can now uncover the subtle, stealthy maneuvers of APTs, which traditionally go unnoticed until it’s too late.

 

Tangibly here

In the first half of 2023, the surge of generative AI tools was palpable in scams like virtual kidnapping and tools used by cybercriminals such as WormGPT and FraudGPT. These tools have propelled the adversaries to launch more complex attacks, presenting a fresh set of challenges for cybersecurity experts​.

 

In the arena of defense against rising threats, in June 2023, OpenAI initiated a grant of one million dollars to foster innovative cyber defense solutions harnessing generative AI. This endeavor underscores the pivotal role of AI in crafting robust defense mechanisms against evolving cyber threats​​.

 

The illustration of AI’s dual role is quite evident in the ransomware attacks witnessed in the first months of 2023. Among the victims were San Francisco’s Bay Area Rapid Transit (BART) attacked by the Vice Society group, Reddit falling prey to the BlackCat Ransomware group, and the United States Marshals Service (USMS) experiencing a major incident due to a ransomware attack. These incidents exhibit the relentless evolution of cyber threats, and how they continue to pose substantial challenges across various sectors​​.

 

Furthermore, a significant cyber attack was reported in March 2023, where outsourcing giant Capita became a target, indicating the extensive ramifications these attacks have across both public and private sectors​.

 

The unfolding narrative of AI in cybersecurity is a tale of continuous adaptation and innovation. It’s a journey laden with both promise and peril as AI becomes an instrumental ally and a potential foe in the digital domain.

 

The melding of AI and cybersecurity is a testament to the innovative strides being made to secure digital assets. While the escalation of AI-driven threats is a stark reminder of the perpetual nature of cybersecurity challenges, the advancements in AI-powered security solutions keep the situation balanced. As this field continues to evolve, the entwined paths of AI and cybersecurity promise to offer a robust shield against the dark underbelly of the digital world.



What does it mean to be a start-up today?

Basic Elements

What it means to be a start-up today is certainly a simple question, but one that needs a very articulate answer. 

It certainly does not mean having a lot of free time and sleeping soundly, and it certainly does not mean being relegated to unpleasant, underpaid work.

Doing start-ups today has undoubtedly become easier than yesterday, if by start-ups we mean that circle of entrepreneurial activities in their initial phase, whose social object is linked to the sphere of innovation; and, today, doing innovation is easier thanks to the proliferation of public funds, VCs and business angels. Unfortunately, in Italy, we are still a long way from solving the problem of access to credit for this type of entrepreneurship, partly due to the malpractice of some investors in asking little and expecting much (too much) from founders.

In addition to significantly improved access to credit, there has also been a small improvement in the supply of services for start-ups. This is due to the joint action of several incubators and private companies whose services have been improved and tailored to the specific needs of innovative entrepreneurship in its early years.

Beyond the ecosystem that only partly qualifies what it means to be a start-up today, these few lines are meant to give an answer to what are the basic elements needed to create the alchemy of a start-up, postponing in-depth studies on specific subjects related to this topic to other posts on this blog.

The idea

Certainly, in order to even remotely think about a start-up, it is necessary to have an idea. Having an idea does not mean having an intuition. An intuition is “a simple, instantaneous, synoptic cognitive act; it therefore designates a form of immediate knowledge, as opposed to any knowledge of a discursive nature”; whereas an idea is a much more complex term that must be declined within the sector it falls into and, in its broadest and most generic meaning, constitutes the representation of an object in the mind: the notion that the mind receives of a real or imaginary thing, the fruit of its own consciousness.

An idea is something more complex than intuition, it develops from it but constitutes a more evolved state where the intuition is filtered and elaborated on the basis of one’s knowledge and skills, coming out modified and, therefore, improved from its initial state.

Sometimes it is necessary to wait months before an intuition is transformed into an idea, as the elaboration process is repeated cyclically, sometimes enriching it with the contribution of the first embryonic elements of the ‘team’ that we will see later.

Skills

Needless to say, in order for the process of transforming an intuition into an idea to bear fruit, it is necessary to have the necessary skills for the sector one wishes to approach. It will almost certainly be necessary to go into the technical aspects of the chosen sector in greater depth, by virtue of any protocols specific to the topic one wishes to address, in order to prevent them from constituting an obstacle to the development of the business model.

Studying and working on the subject are certainly preliminaries to setting up a start-up, however, it is practically impossible to cover all the specific skills needed for each element related to the business model, and it is here that the need for the next fundamental element, the ‘team’, emerges.

The team

The team sees its value manifesting itself already in the very early stages of a start-up’s development but, in reality, it has only begun its relationship with the start-up because it will be instrumental in every single stage of its development.

Choosing team members is very difficult and there are various schools that more or less agree on the subject; we will therefore avoid going into too much detail by pausing only for a moment to mention one element without which, apart from schools, it is certainly not possible to form a team: trust.

Between team members, it is necessary to go beyond mere respect, there must be trust so that everyone is able to express their value to the fullest, individually and as a team member.

The team is the flywheel of the idea, it amplifies the scope of knowledge and expertise from which the idea is filtered, which emerges from this process greatly enriched and ready to be timetabled in its various stages of design and development, the roadmap.

The Roadmap

Fundamental from the very first moments following the definition of an idea is the creation of a checklist of actions necessary for the progression in the design and development of the idea and the scheduling of each action. 

The roadmap plays a pivotal role in relation to the distribution of the various actions, as it also constitutes a connecting element in the event that an action requires the intervention of different actors than originally planned or, in the event that several actions converge for a subsequent joint phase. Needless to say, it is necessary to respect the timeframes set in the roadmap and their eventual re-scheduling in the event of unforeseen and/or unexpected events.

It is easy to see how the roadmap is not a rigid document but, rather, an extremely fluid one that must be able to adapt to unforeseen events, slowdowns and pivots, right down to the various branches that the idea might take and that might not converge on a single business model.

Advisors

The last basic element in the creation of a start-up is the Advisors. Advisors have the function of guiding the action of the founders and that of the team in general; they differ from the latter in that their competences are fundamental but at the margins of the development of the core business; they constitute a conditio sine qua non for its setup but are extraneous to the process of providing the service or selling the good.

The rationale for the need for their presence is obvious, as are the immediate benefits that start-ups reap when they are able to include professional advisors in their network for each of the basic needs of a start-up: legal, fiscal, financial, project, technical.

Making start-ups today

To be able to do start-ups today, these elements are extremely crucial: The idea, The skills, The team, The roadmap and The advisors. Without these essential elements, it is difficult if not impossible under normal market conditions to make it through the initial stages that characterise the life of a start-up.

Once these elements have been aggregated, after taking the first steps in the development of the core business, it will be possible to proceed with a financing round of the start-up, i.e. its pre-seed. This eventuality is excluded in the event that the start-up plans to pursue the initial stages of design and development of the core business with its own economic means or through possible financiers who have entered at the only previous moment, i.e., those of validation of the idea.

Digital Twin Technology: An Innovation Game-changer and Its Synergy with Blockchain

In the technologically driven landscape of the 21st century, a unique concept is carving out its niche – digital twins. This technology, far from the realms of virtual reality or gaming, is a potent tool that is fundamentally altering the operational dynamics of a myriad of sectors.

Delving into the specifics, a digital twin is a virtual replica of a physical entity, be it a process, product, or service. This model, serving as a conduit between the tangible and digital worlds, facilitates data analysis and system monitoring, leading to anticipatory problem-solving, downtime prevention, opportunity recognition, and future planning through simulations.

Yet, a digital twin is more than a static digital representation. It is a dynamic model reflecting every detail, modification, and condition that its physical counterpart undergoes. This functionality ranges from simple objects to complex systems, or even intricate processes.

To illustrate, consider the manufacturing industry. A digital twin of a production line machine could be a precise 3D model that evolves in real time as its physical equivalent operates. This real-time reflection includes any modifications, malfunctions, or operational successes, enabling timely troubleshooting and predictive maintenance.

An analogous instance is the energy sector, where digital twins of power plants or grids could simulate different scenarios, predict outcomes, and optimize operations. This could lead to improved reliability, energy efficiency, and cost-effectiveness – demonstrating the far-reaching impacts of this technology.

Complementing this picture of transformation is another trailblazing innovation – blockchain. When married with digital twins, blockchain technology can unlock an era of amplified transparency, security, and efficiency.

Blockchain’s decentralised and immutable character can handle the comprehensive data produced by digital twins in a secure fashion. By leveraging blockchain, each digital twin can obtain a unique, encrypted identity, heightening security and reliability. 

Additionally, blockchain’s decentralised nature facilitates the secure sharing of a digital twin among diverse stakeholders. Each stakeholder can interact with and update the digital twin in real time, bringing an unprecedented level of transparency and traceability to multifaceted processes.

Imagine the possibilities in a supply chain context. Every product could have a digital twin, with its lifecycle recorded on a blockchain. This enhanced traceability could drastically mitigate fraud, streamline recall processes, and optimise logistics.

The merging of digital twins and blockchain isn’t a speculative future projection. It’s being realised in today’s world. Take the example of a project by Maersk and IBM. They developed a blockchain-based shipping solution that integrates IoT and sensor data for real-time tracking, effectively creating digital twins of shipping containers and enhancing supply chain transparency.

While digital twins and blockchain offer unique benefits individually, their integration opens the door to new possibilities. This synergy fosters trust and collaboration, streamlines processes, reduces fraud, and instigates the development of ground-breaking business models.

However, this dynamic duo also presents challenges. For instance, the data magnitude generated by digital twins could strain existing IT infrastructures. Moreover, complex legal and regulatory considerations around data ownership and privacy must be navigated.

In conclusion, the combined power of digital twin technology and blockchain is poised to redefine innovation’s boundaries. This blend offers a unique concoction of transparency, security, and efficiency. As industries strive to remain competitive and future-ready, the symbiosis of these two technologies could be the guiding compass leading the way.

The ethical and privacy issues of data augmentation in the medical field

The ethical issues arising from the use of data augmentation, or synthetic data generation, in the field of medicine are increasingly evident. This technique, which is also called synthetic data generation, is a process in which artificial data are created in order to enrich a starting data set or to overcome certain limitations. This type of technology is particularly used when AI models have to be trained for the recognition of rare diseases, on which there is little data available for training. By means of data augmentation, further data can be artificially added, while still remaining representative of the starting sample.  

From a technical point of view, data augmentation is performed using algorithms that modify existing data or generate new data based on existing data. For example, in the context of image processing, original images can be modified by rotating them, blurring them, adding noise or changing the contrast. In this way, different variants of an original image are obtained that can be used to train artificial intelligence models. The use of this technology makes it increasingly effective to use AI to recognise diseases, such as certain types of rare cancers.

However, there are several ethical issues that arise from the use of data augmentation in medicine. One of the main concerns relates to the quality of the data generated. If the source data are not representative of the population or if they contain errors or biases, the application of data augmentation could amplify these issues. For example, if the original dataset concerns only Caucasian white males, there is a risk that the data augmentation result will have a bias towards these individuals, transferring the inequalities present in the original data to the generated data.

Replication bias is certainly the most critical issue with regard to data augmentation. If the artificial intelligence model is trained on unrepresentatively generated data or data with inherent biases, the model itself may perpetuate these biases during the decision-making process. For this reason, in synthetic data generation, the quality of the source dataset is an even more critical issue than in artificial intelligence in general.

Data privacy is another issue to consider. The use of data augmentation requires access to sensitive patient data, which might include personal or confidential information. It is crucial to ensure that this data is adequately protected and only used for specific purposes. To address these concerns, solutions such as federated learning and multiparty computation have been proposed. These approaches make it possible to train artificial intelligence models without having to transfer sensitive data to a single location, thus protecting patients’ privacy.

Federated learning is an innovative approach to training artificial intelligence models that addresses data privacy issues. Instead of transferring sensitive data from individual users or devices to a central server, federated learning allows models to be trained directly on users’ devices.

The federated learning process works as follows: initially, a global model is created and distributed to all participating users’ devices. Subsequently, these devices train the model using their own local data without sharing it with the central server. During local training, the models on the devices are constantly updated and improved.

Then, instead of sending the raw data to the central server, only the updated model parameters are sent and aggregated into a new global model. This aggregation takes place in a secure and private manner, ensuring that personal data is not exposed or compromised.

Finally, it is important to note that there are many other ethical issues related to the use of data augmentation in medicine. For instance, there is a risk that synthetic data generation may lead to oversimplification of complex medical problems, ignoring the complexity of real-life situations. In the context of the future AI Act, and the European Commission’s ‘Ethics Guidelines for Trustworthy AI’, the analysis of technologies as complex, and with such a broad impact, as AI systems in support of medical decision-making is becoming increasingly crucial.

Navigating the AI Pause Debate: A Call for Reflection or a Hurdle to Progress?

In the ever-evolving landscape of technology, a seismic debate is stirring up the tech industry: the call for an “AI Pause”. This discussion was ignited by an open letter advocating for a six-month hiatus on the progression of advanced artificial intelligence (AI) development. The letter was signed by an array of tech luminaries, including Elon Musk and Apple co-founder Steve Wozniak. The underlying concern driving this plea is the rapid and potentially perilous evolution of AI technology.

The open letter was orchestrated by the Future of Life Institute, a nonprofit dedicated to mitigating the risks associated with transformative technologies. The group’s proposal was specific: AI labs should immediately cease training AI systems more powerful than GPT-4, the latest version of OpenAI’s large language model, for at least half a year. This suggestion came on the heels of the release of GPT-4, underscoring the concern about the breakneck speed at which AI technology is advancing.

This move is a manifestation of the apprehensions held by a group of AI critics who can be categorized as “longtermists”. This group, which includes renowned figures like Musk and philosopher Nick Bostrom, advocates for a cautious and reflective approach to AI development. They express worries about the potential for AI to cause significant harm if it goes astray due to human malice or engineering error. The warnings of these longtermists go beyond minor mishaps to highlight the possible existential risks posed by an unchecked progression of AI.

However, the call for an AI pause has been met with a gamut of reactions, revealing deep divides not only between AI enthusiasts and skeptics but also within the community of AI critics. Some believe that the concerns about AI, particularly large language models like GPT-4, are overstated. They argue that the current AI systems are a far cry from the kind of “artificial general intelligence” (AGI) that might pose a genuine threat to humanity. These critics caution against being preoccupied with potential future disasters and emphasize that it distracts from addressing the pressing harms that are already manifesting due to AI systems in use today. These immediate concerns encompass issues such as biased recommendations, misinformation, and the unregulated exploitation of personal data.

On the other side of the debate, there are those who view the call for an AI pause as fundamentally at odds with the tech industry’s entrepreneurial spirit and relentless drive to innovate. They contend that halting progress in AI could stifle potential economic and social benefits that these technologies promise. Furthermore, skeptics question the feasibility of implementing a moratorium on AI progress without government intervention, raising concerns about the repercussions of such intervention for innovation policy, arguing that having governments halt emerging technologies they don’t fully understand sets a troubling precedent and could be detrimental to innovation.

OpenAI, the organization behind the creation of GPT-4, has not shied away from acknowledging the potential risks of AI. Its CEO, Sam Altman, has publicly stated that while some individuals in the AI field might regard the risks associated with AGI as imaginary, OpenAI chooses to operate under the assumption that these risks are existential.

Altman’s stance on this matter was further solidified during his recent testimony before a Senate subcommittee. He reiterated his concerns about AI, emphasizing the potential for it to cause significant harm if things go awry. He underscored the need for regulatory intervention to mitigate the risks posed by increasingly powerful models. Altman also delved into the potential socio-economic impacts of AI, including its potential effects on the jobmarket. While acknowledging that AI might lead to job losses, he expressed optimism that it would also create new types of jobs, which will require a strong partnership between the industry and government to navigate.

Additionally, Altman highlighted the potential misuse of generative AI in the context of misinformation and election meddling. He expressed serious concerns about the potential for AI to be used to manipulate voters and spread disinformation, especially with the upcoming elections on the horizon. However, he assured that OpenAI has put measures in place to mitigate these risks, such as restricting the use of ChatGPT for generating high volumes of campaign materials.

In summary, the call for an AI pause has ignited a complex and multifaceted debate that reflects the wide range of views on the future of AI. Some see this as a necessary step to ensure we are moving forward in a way that is safe and beneficial for all of society. Others view it as a hindrance to progress, potentially stifling innovation and putting the United States at a disadvantage on the global stage. While there is no consensus on the way forward, what is clear is that this debate underscores the profound implications and transformative potential of AI technology. As we continue to navigate this complex terrain, it is crucial to maintain a balanced dialogue that takes into account both the opportunities and challenges posed by AI.

How Minecraft almost destroyed the Internet

The Log4j Vulnerability and its Impact on Minecraft

Minecraft, the wildly popular sandbox video game created by Mojang Studios, has captivated millions of players worldwide with its limitless creativity and expansive virtual worlds. However, in late 2021, a vulnerability in a widely used logging library called Log4j threatened the game’s stability and, more alarmingly, the safety of the entire Internet. In this blog post, we’ll dive into the details of the Log4j vulnerability, explore how it affected Minecraft, and discuss the lessons learned from this cybersecurity crisis.

The Log4j Vulnerability: A Brief Overview

Log4j is an open-source Java-based logging utility developed by the Apache Software Foundation. It is widely used by developers to record system events and monitor software applications. In December 2021, a critical vulnerability known as Log4Shell (CVE-2021-44228) was discovered in Log4j. 

This vulnerability allowed attackers to remotely execute arbitrary code on the affected systems by merely sending a specially crafted string to the vulnerable application.

The severity of the Log4j vulnerability stemmed from its widespread use and the ease with which it could be exploited. Within days of its discovery, the vulnerability had been weaponized by malicious actors, leading to widespread attacks on various organizations, including government agencies and private businesses.

Minecraft and the Log4j Vulnerability

Minecraft, which runs on Java and utilizes Log4j for logging purposes, was one of the most high-profile targets of the Log4Shell vulnerability. As soon as the vulnerability was made public, hackers started targeting Minecraft servers, exploiting the Log4j flaw to execute malicious code, steal sensitive data, and disrupt server operations.

The situation was further complicated by the massive scale of Minecraft’s player base and the sheer number of community-hosted servers, many of which were run by hobbyists with limited cybersecurity knowledge. This made it challenging for Mojang Studios and the broader Minecraft community to respond quickly and effectively to the threat.

How Minecraft Responded to the Threat

Mojang Studios, the game’s developer, and Microsoft, its parent company, took immediate action to address the Log4j vulnerability. They released a series of patches for both the official game servers and the client-side software to mitigate the risk of exploitation. Additionally, they provided clear guidance to the community on how to update their servers and protect their users.

However, the response was not without its challenges. Due to the decentralized nature of Minecraft servers, many community-hosted servers were slow to apply patches, leaving them exposed to ongoing attacks. In some cases, attackers took advantage of this lag by creating fake patches laced with malware, further compounding the problem.

The Fallout and Lessons Learned

The Log4j vulnerability in Minecraft serves as a stark reminder of the potential consequences of a single software vulnerability in our interconnected digital world. Although there were no reports of widespread destruction resulting from the Log4j exploit in Minecraft, the incident highlighted the importance of robust cybersecurity practices in gaming and beyond.

Here are some key lessons we can take away from the Minecraft Log4j crisis:

  1. Regularly update software and apply security patches: Ensuring that software is up to date with the latest security patches is critical in preventing vulnerabilities from being exploited. In the case of Minecraft, applying the official patches released by Mojang Studios would have prevented many of the issues faced by community-hosted servers.
  2. Increase awareness of cybersecurity best practices: Many server administrators and users may not have been aware of the importance of applying patches or the potential dangers of downloading unofficial patches. Raising awareness of cybersecurity best practices can help mitigate the risks associated with incidents like the Log4j vulnerability.
  3. Strengthen collaboration between developers and the community: The Minecraft Log4j incident underscored the need for better communication and collaboration between software developers, like Mojang Studios, and the broader user community. By fostering a strong relationship with users and encouraging feedback, developers can more effectively address security issues and provide timely support during crises.
  4. Emphasize the importance of layered security: While addressing the Log4j vulnerability in Minecraft was crucial, it’s essential to remember that no single security measure is foolproof. Adopting a layered security approach, which combines various defensive measures, can help protect digital assets and systems against potential attacks.
  5. Encourage open-source software audits: The Log4j vulnerability remained undetected for years, despite the library’s widespread use. Encouraging and funding regular audits of open-source software can help identify and remediate vulnerabilities before they can be exploited by malicious actors.
  6. Foster a culture of responsible vulnerability disclosure: The timely public disclosure of the Log4j vulnerability by its discoverers allowed developers and organizations to take swift action in addressing the issue. Encouraging a culture of responsible vulnerability disclosure, where security researchers and organizations work together to remediate vulnerabilities before publicizing them, can help prevent the weaponization of such flaws.

Conclusion

The Log4j vulnerability in Minecraft demonstrated the profound impact that a single software flaw can have on the digital world. While the incident did not lead to the destruction of the Internet as we know it, it highlighted the importance of robust cybersecurity practices and the need for collaboration between developers, users, and the cybersecurity community. By learning from this experience and taking proactive steps to secure our digital assets, we can hope to mitigate the risks associated with future cybersecurity threats.

AI in the legal world

Understanding the potential of the fusion between legal and artificial intelligence

The legal industry is constantly evolving, and AI is transforming the landscape at an unprecedented pace. Law firms are increasingly embracing AI-powered tools and technologies to provide better legal services to their clients, and one of the best examples of this is a mock case study of a mid-sized law firm called ABC Law.

ABC Law specializes in employment law and has clients across various industries. To remain competitive and provide better legal services, ABC Law decided to adopt AI-powered tools and technologies. They began by using an AI-powered legal research tool that allowed them to analyze vast databases of legal cases quickly. This helped them identify relevant precedents and case law, saving them time and allowing them to provide more comprehensive legal services to their clients.

ABC Law also used AI-powered contract analysis tools to review their clients’ employment contracts. These tools could identify problematic clauses and flag issues, which helped ABC Law identify potential risks and prevent legal disputes down the road. AI-powered contract analysis tools are becoming increasingly popular in the legal industry because they help law firms save time and provide more comprehensive legal services.

Another significant area where AI proved invaluable for ABC Law was predictive analytics. They used machine learning algorithms to analyze trends and predict potential legal issues before they arose. For example, the platform could predict which companies were most likely to face lawsuits based on past litigation history. This allowed ABC Law to focus on high-risk clients and provide them with more proactive legal services.

To streamline their document creation process, ABC Law started using AI-powered document automation tools. These tools could quickly create employee contracts and handbooks, saving time and reducing errors. By using AI-powered tools, ABC Law could provide their clients with faster and more accurate legal services.

Finally, ABC Law started using an AI-powered virtual assistant to automate administrative tasks. This helped save lawyers’ time and allowed them to focus on more critical tasks, such as providing their clients with high-quality legal services. The virtual assistant could schedule meetings, manage emails, and provide legal research support.

In conclusion, AI is revolutionizing the legal industry, and ABC Law is a great example of how law firms can benefit from AI-powered tools and technologies. By leveraging AI, law firms can become more efficient and provide better legal services to their clients. AI-powered tools can help law firms save time, reduce errors, and provide more comprehensive legal services. As AI continues to evolve, we can expect to see even more exciting developments that will help law firms keep up with the demands of the modern business landscape.

Consumer Law within the Web3 space

Legislative interventions in consumer protection lag far behind the reality of events that increasingly see web3 shopping, especially given the expansion of NFT purchasing.

The information obligations under the Consumer Code and European law require professionals providing goods or services to consumers to provide information to consumers in clear and comprehensible language, prior to the conclusion of the contract.

Fulfilling this obligation can be complex due to the innovative nature of these goods, and understanding for the consumer what he or she is really buying, without adequate prior information, could lead to an increasing number of disputes.

The European legislator adopted specific rules applicable to contracts for the supply of digital content with Directive (EU) 2019/771, which was transposed into Italian law by Legislative Decree No. 170/21 amending the Consumer Code.

The new discipline expressly deals with ‘goods with digital elements‘, i.e., those goods with a digital component without which they cannot function. The digital component may be internal to the good, incorporated, or external, interconnected, but in both cases it must be essential for the good itself, meaning that without this characteristic it would not be able to perform its functions.

In the specific context of the sale of digital goods, the new subjective and objective conformity requirements dictate that the characteristics of the digital content must correspond, respectively, to what is stipulated in the contract and to what can reasonably and objectively be expected from the digital content itself.

The European Directive also states that the seller must ensure that the consumer is provided with the updates, including security updates, necessary to keep these goods in conformity for the period of time that the consumer can reasonably expect, taking into account the type and purpose of the goods and digital elements, and the circumstances and nature of the contract.

The seller must therefore fulfil a strict obligation to provide information about available updates so as to be exempt from liability for lack of conformity in the event that the consumer, despite receiving information, does not provide the necessary updates or installations.

In the specific case of the purchase of NFT, non-conformity of the goods can be recognised when the content is not available or is altered.

On the other hand, doubts as to the non-conformity of the goods arise when the NFT does not exhibit the promised rarity characteristics; the scarcity of the NFT is in fact fundamental for the quantification of its value, and a degree of rarity significantly lower than that expected by the consumer could render the goods unfit for use and therefore not conforming according to the subjective requirements. 

The contractual terms and conditions of sale of the NFT should therefore set out precisely what degree of rarity is to be guaranteed in the future for the NFT sold, and comply with the requirement of good faith and contractual transparency with regard to multiple other, often underestimated issues, such as, but not limited to, the possible consequences in the event of failure of the blockchain and the action for damages.

Another issue that will be decisive for the application of the protections provided by consumer protection legislation is to resolve, in NFT purchases, the status of consumer.

Article 3 of the Consumer Code defines a consumer or user as ‘a natural person acting for purposes which are outside his or her trade, business, craft or profession’.

In practice, however, we see an increasing use of NFT for advertising or marketing purposes, and the category of buyers is divided into occasional and ‘speculative’ or ‘collector’ buyers, who might not be considered consumers but rather ‘professionals’.

This first distinction will be the basis for the interpreters of the law for the application of many other issues that currently do not find practical application because the European consumer protection rules were designed for the conclusion of “traditional” contracts, not through smart contracts: think of the issue of the so-called unfair clauses and the impossibility of double signature of clauses required by Art. 1341 of the Italian Civil Code; or the so-called consumer forum, today it is difficult to establish the domicile of the consumer.so-called unfair clauses and the impossibility of the double signing of clauses required by Art. 1341 of the Civil Code; or the so-called consumer forum, to date it is difficult to establish the domicile of the buyer/consumer in the crypto world, precisely because of the anonymity that characterises blockchain environments.

The EU’s new Markets in Crypto-Assets Regulation (MiCA) may partly provide a solution, as it prohibits the anonymity of crypto-asset holders for admission to trading platforms, but NFTs will be excluded from the scope unless they fall under existing crypto-asset categories. 

The European Commission will be tasked with preparing a comprehensive assessment and, if deemed necessary, a specific, proportionate and horizontal legislative proposal to create an NFT regime and address the emerging risks of this new market.

Purchase of NFT and right of withdrawal

Another crucial issue for consumer protection and web3 shopping concerns the right of withdrawal.

According to Directive 2011/83/EU on consumer rights, the consumer must be informed about the possibility and how to exercise the right of withdrawal, i.e. the right to withdraw from a distance contract within fourteen days, without having to provide any justification. 

The smart contract under which an NFT is usually sold does not allow for the exercise of the right of withdrawal, as it is not possible to stop the execution for non-performance or in case of a change of heart.

The smart contract in fact uses the formula “if this/then that”, by virtue of which, upon the occurrence of a given event (this), certain effects are produced (that), which are predetermined by the parties themselves, based on strict instructions.

In application practice we therefore see numerous transactions with general contractual terms and conditions that explicitly exclude the right of withdrawal.

This exclusion is justified by making the NFT purchase hypothesis fall within the exceptions provided for in Article 59, letters a), b) i), m) and o) of Legislative Decree No. 206/2005 (Consumer Code). 

In this respect, it is recalled that the right of withdrawal is excluded (sub-para. a) in service contracts after the service has been fully performed if performance has begun with the consumer’s express agreement and acceptance of the loss of the right of withdrawal following the full performance of the contract by the trader and (sub-para. b) where the price is linked to fluctuations in the financial market which the trader is unable to control and which may occur during the withdrawal period.

Furthermore, the right of withdrawal is excluded (sub-para. i) with respect to the supply of sealed audio or video recordings or sealed computer software which have been opened after delivery, or (sub-para. m) with respect to contracts concluded at a public auction.

Another exception (sub-para. o) is for the supply of digital content (such as NFT) by means of a non-material medium (such as a private key for an NFT or other NFT redemption code) if performance has begun and, if the contract imposes an obligation on the consumer to pay, if three cumulative conditions are fulfilled: 

  • the consumer has given his prior express consent to commence the performance during the right of withdrawal period;
  • the consumer recognised that he thus lost his right of withdrawal;
  • the trader has provided confirmation of the conclusion of the contract in accordance with the terms of Directive 2011/83/EU for distance contracts.

A possible solution to allow consumers to exercise their right of cooling-off could be found in the new NFT standard, which would guarantee their purchases against scams (better known as ‘rug-pulls’) as well as the possibility to ask for a refund in case of withdrawal before the deadline.

The term ‘rug-pull’ refers to a type of scam that generally occurs when the developers of a project, after creating the cryptographic token, increase its value in order to attract as many investors as possible, and then withdraw all funds and abandon the fraudulent project.

When speaking of a standard for NFT instead, one is reminded that it refers to the unique identification of a token with respect to others of the same smart contract, called ‘ERC-721’, introduced, as is well known, in 2017, by Ethereum, as the first protocol for the creation of NFTs and to date the most widely used, representing a unique and infungible asset.

The publication of a new anti rug-pull standard, ERC-721R, officially released on 11 April 2022 and aimed, among other things, at countering fraudulent NFT projects, could give the user a right to reconsider their purchase and, thus, be refunded the price paid for the minted NFT.

In particular, this mechanism takes place through a lien on the deposit of the sums placed as collateral by the smart contract. These funds can only be withdrawn, by the creators, after the lapse of a period of time (such as the 14 days for the right of withdrawal in off-premises purchases) that allows buyers to return their NFT and receive a refund from the signed smart contract.

This new standard represents a possibility both in terms of openness towards innovative solutions concerning the user’s right to rethink and the consequent exercise of the right of withdrawal, and in terms of a guarantee against certain fraudulent practices: although the purchase of NFT is irreversible, if during this period the creators decide to rug-pull, buyers will be able to request a refund of their funds by the end of the waiting period, losing only the gas fees incurred for transaction costs.

The use of such a new protocol for the generation of NFTs, besides being more advantageous for buyers, as it would limit possible losses to only the fees for processing and validating transactions on the blockchain, presents a real opportunity for commercial service providers to promote their businesses also in the cryptocurrency world, creating trust in the market and attracting more investors.

RIGHT OF WITHDRAWAL AND SALE OF NFT

The Case

Porsche’s recent NFT collection made a lot of noise. In the ToS at the time of minting there was a point that allowed users to obtain the right of withdrawal within 14 days of the release of the collection, whatever the new ‘floor price’ after minting.

What is the right of withdrawal? 

The right of withdrawal, commonly referred to as the ‘right to a rethink’, is one of the most important rights given to the consumer by the Consumer Code. 

The right of withdrawal allows the consumer to change his mind about the purchase made outside the seller’s business premises, freeing himself from the contract concluded without giving any reason within 14 days after the purchase. In this case, the consumer may return the goods and obtain a refund of the amount paid.

What is the reference legislation for the right of withdrawal applicable to the sale of NFT?

In Europe, the matter is regulated by the Consumer Rights Directive 2011/83/EU. Directive 2011/83/EU replaces the Distance Selling Directive (97/7/EC) and the Doorstep Selling Directive (85/577/EEC) by harmonising the rules on contracts between consumers and sellers.

Updated with Directive (EU) 2019/2161, it is a regime applicable to a wide range of contracts concluded between professionals and consumers, in particular sales contracts, service contracts, contracts for online digital content and contracts for the supply of water, gas, electricity and district heating; it covers both contracts concluded in shops and those concluded off-premises (e.g. at the consumer’s home) or at a distance (e.g. online).

The update made by Directive (EU) 2019/2161 extended the scope to contracts under which the professional provides or undertakes to provide digital services or digital content to the consumer, and the consumer provides or undertakes to provide personal data. The legislation establishes, inter alia, a number of information obligations for professionals. In particular, they must, before concluding a contract, provide consumers, in plain and intelligible language, with information such as:

  • the identity and contact details of the professional
  • the main characteristics of the product; and
  • the applicable terms and conditions, including payment terms, delivery times, the
  • performance, duration of the contract and conditions of withdrawal.

Finally, online sellers are required to inform consumers whether they are a professional or a non-professional, advising them that EU consumer protection rules do not apply to contracts concluded with non-professionals. 

Directive 2011/83/EU includes a comprehensive set of provisions on withdrawal, under which, inter alia, consumers may withdraw from distance selling contracts within 14 days of the delivery of the goods or the conclusion of the service contract, with certain exceptions, without any explanation or cost; if the consumer is not made aware of his or her rights, the withdrawal period is extended to 12 months.

Europe is not the only community that has adopted strongly protective rules for the weaker contracting party, many countries such as the United Kingdom, for example, have adopted legislation that provides the same or very similar protection.

Which companies are obliged to apply the right of withdrawal?

Article 3(4) of Directive 2011/83/EU defines the objective scope of the regulation by referring to ‘any contract’ concluded between a professional and a consumer.

Therefore, even projects that are based outside the European Union as well as other countries (e.g. the United Kingdom) may still be subject to the consumer laws (of the United Kingdom) and of the European Union and states with similar regulations when selling goods or services to consumers in these states. This is because the scope of these laws includes any company that offers goods or services to consumers in states that offer this protection, regardless of where the company is located.

This means that international companies selling to consumers, e.g. from the UK and EU, must comply with UK and EU consumer laws. Failure to comply with these laws can result in penalties for the company, including fines and legal action.

Can the right of withdrawal be excluded?

There is a casuistry which, in certain specific cases, allows the exclusion of the right of withdrawal. For example, for the matter identified here, Article 16 of Directive 2011/83/EU letter M), tells us that “Member States shall not provide for a right of withdrawal in respect of distance and off-premises contracts relating to […] the supply of digital content on a non-material medium if the performance has begun with the consumer’s prior express consent and his acknowledgement that he would lose his right of withdrawal. This is a very specific provision that, if interpreted correctly, would allow the professional to avoid heavily negative consequences for the economy of the project by remaining within a perimeter of legal compliance.

Deep dive into cybersec: exploits

In general terms, an exploit is a series of actions executed to derive the most benefit from a pre existing resource.

In computer security we could interpret it as a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware. This can include data leakage, privilege escalation, arbitrary code execution (often used as part of a zero-day attack), denial-of-service attacks and viruses.

Going even deeper, this term is used to describe the use of low-level software instructions that exceed the intended function or design of a computer program.

Hackers are always on the lookout for vulnerabilities. They use exploits in order to gain personal data, such as credit card numbers, bank account access, social security numbers and all kind of sensitive information.

The most common vectors for an exploit is injection:

  • A SQL injection, where a bad actor (or someone posing as is) injects malicious code into an entry field in order to extract data from a database.
  • An XSS attacks, where a bad actor injects malicious bits into a website’s source code in order to extract data from the website’s database or server.


Famous exploits

There are many famous exploits and hacks but some of the ones that are most prominent in the public eye are Heartbleed, Sony PlayStation Network Hack, Target Security Breach, Eternalblue (that started the Ransomware trend).

Heartbleed is a vulnerability in OpenSSL that was discovered on April 7, 2014: it was a bug in the protocol that allowed attackers to steal information from servers without being detected. This exploit affected over 66% of all web servers globally, including sites like Yahoo!, Facebook, Google, and Amazon.

The Sony’s PSN (PlayStation Network) one happened even before: In 2011 a group of hackers stole personal information from 77 million accounts. The hackers were able to do this because they had obtained PSN usernames and passwords from an outside party who had hacked into Sony’s network earlier that year.

Target‘s security breach occurred in the 2013 holiday shopping season and saw 40 million credit cards stolen from their systems: in that case the hackers used malware sent to Target’s point-of-sale terminals to steal card data while it was being entered into the system.

Another famous example has been the WannaCry exploit, carried through Eternalblue, a vulnerability discovered by the NSA and kept secret until leaked by a group called Shadow Brokers. It is a security exploit that affects Microsoft Windows and was unpatched at the time of public disclosure. The Eternalblue exploit has been one of the most dangerous exploits in the world, and it has been used to create some of the most devastating ransomware attacks. The Eternalblue exploit has been used to spread WannaCry, NotPetya, and BadRabbit ransomware attacks.

Ransomware is a type of virus that locks up data in the victim’s computer and demands payment in order to release it. It usually spreads through email attachments, downloads from untrusted sources, or in general through a vulnerability in the system.

Stay safe out there!

As the number of people and devices connected to the internet has increased, so have the number of cyber attacks: cyber criminals are always on the lookout for new ways to exploit vulnerabilities in your system.

To prevent it, it’s important to take measures to make sure you are not vulnerable:

  • always update your software and hardware regularly
  • use strong passwords and change them regularly
  • use two-factor authentication whenever possible
  • have a security suite installed that includes antivirus protection and firewall settings that block suspicious or malicious programs from accessing your system.

The latter is especially important for Windows users, but this doesn’t mean that Linux and macOS users should feel safe: as the usage and distribution of Unix based system increase and gain popularity, so are the researches on possible attack vectors.

Updates are a crucial part of keeping your device protected. These updates not only stop exploits, but they improve the security of the device and protect it from known vectors of attack: the biggest part of the most devastating exploitations have been carried out due to unpatched systems (even after the patches have been distributed).

The internet is a digital world that is both beneficial and harmful. It was created to connect people from all over the world, but it has also created a space for hackers to exploit vulnerabilities, posing a risk to everyone without proper knowledge of the problem. That’s why It is fundamental to learn how to protect your privacy and your data, and to gain consciousness about online security and online threats.

Knowledge is power, the power of defending your data from malicious attacks in this case.