NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019

Page created by Mike Guzman
 
CONTINUE READING
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
NGI Zero: year 0
                     Come work for the internet
             on privacy, trust, search & discovery
                             Powered by the
    European Commission Directorate-General
               for Communications Networks
                     Content and Technology
                                 825322 / 825310

                                         FOSDEM 2019

1                                          2019-02-03
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
“From utopia to dystopia in just 29 short years”
     “We demonstrated that the Web had
     failed instead of served humanity, as
       it was supposed to have done, and
     failed in many places. The increasing
       centralization of the Web ended up
    producing—with no deliberate action
           of the people who designed the
         platform—a large-scale emergent
      phenomenon which is anti-human.”
                                             Tim Berners-Lee

3                 FOSDEM 2019                                  2019-02-03
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
An engineering race with high stakes

    Wernher von Braun                         Robert Oppenheimer

4                FOSDEM 2019                             2019-02-03
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
NGI is a moonshot ++ effort
    ●
        The internet is the largest and most pervasive
        technical construct ever made by humans
    ●
        And we need to change it with 3.8+ billion people ‘on
        board’.
    ●
        High political stakes. High economic stakes.
        Highly critical users users. Overloaded with
        expectations. From everybody.
    ●
        Work consistent and forward-thinking. No time to lose.

5                  FOSDEM 2019                                   2019-02-03
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
Next Generation
                      Internet

7   FOSDEM 2019                     2019-02-03
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
Next Generation
                                                                                                                                                  Internet

                            ectrum
                     ned sp
             unassig ain in 5G                                                                                             m failu
                                                                                                                                  re
      Retain      c dom                                                                                          e of syste
         for publi                                                                                         Cascad

                    nage
            al espio       internet                                                                                                                 ocurem
                                                                                                                                                          ent
    Industri
              "G  reening"                                                                                Pervasive surv
                                                                                                                                         culturePublic Pr
                            logy                                                                                                 eillance
                                                                                                                             m mono
                      techno                                                          Redesign inseSteer away fro                                                     Open (user-de
                                                                               Cyber warfare/c cure standards                                    Background
                                                                                                                                                                process
                                                                                                                                                                                      fined and
                                                                                                                                                                        controlled) secu
                                                                           eg rat ion and           onflicts                                         transparency                          rity
                                                                     n int           ndling
                                                                                           Engineering
                                                             Solutio        ive   bu                                                                                                                           Abuse handling
                                                               Sensor  petit firewalling
                                                                       data             Trustworthiness                    Solving scalability issues
                                                               precom Tran    spor  t layer security
                                                                          Lack of isol  ation
                                                                                                                                                                                             Numbering
                                                                                                                                                       and               Domain isola
                                                 Partitioning/scope isolation                    invasive                                      stness                                   tion
                            Confidentiality          NAT                              ise over-                                      for robu
                                                                           Modern                   ow                   Deysign           Decentra
                                                                                                                                                  y lised inte
                                      shaping                                             ht to all        ngemergenc                  autonom                     rnet-wide
                              Traffic                                            copyrig            sh arise                                    identity mecNam       ing system alte
                                                                                       m  me rcial
                                                                                                 Inc rea           Alternative
                                                                                                                      ne  ss
                                                                                                                           ren  cy                             han   isms              rnatives
                                                                             non-co                       poyns     nspa
                                                                                                               traive                                                                                                                                                                                           profiles
                                    Packet   interference                                             res
                                                                                                      cu rit
                                                                                                   Se infrastructure elements                                                                                                                                                                           content
               s big da
                         ta                                                                                                                                                                                                                                                                     assive)
                                                                                                                                                                                                                                                                                         Safe (p
      Maliciou                                                                                                                                   ms
                                                                                                                                 nm    echaornis                                                End to end conf
                                       /scrip tingMan-made                                                          tra ns  itio
                                                                                                                               ua l  su pp t                                                                       iden  tialit
                                                                                                             istic                                                                                                             y  of
                             software              g                                                   Realing   mu   ltilingiality
                                                                                                                   nfident
                                                                                                                                                                 High availabil                        traffic metadat                                                           Real-time measurement data
                     Secure              updatin                                                        ov er co                                                                  ity                                     a                                                     Lack of transparency of
                 utrality       ion and Distributed reputation                                   Imprlay
                                                                                            Routing
                                                                                                        Open    (user-defined  abilityand                       Protecting users
                                                                                                                                                               fsital spillover
                                                                                                                                                                                in during                                                .
        Net Ne        distribut                                                             Verifiability   of routing  Scalpaths                           oonomadic
                                                                                                                                                     rity prdig            access (e.g. wifi)Secu                             nce w.r.t          Improve limited upgrade
                                                mechanism(s)                                               controlled) security                 Secu                                                                neglige                                                       environmental cost
                                                                                        Legislative Pr     asp                      cies
                                                                                                                                                   Contain ical world                               rinaligng
                                                                                                                                                                                                            Indu
                                                                                                                                                                                                              wi th
                                                                                                                                                                                                              Legacy
                                                                                                                                                                                                                 strial hardware
                                                                                                                                                                                                                         sabo
                                                                                                                                                                                                                           threa  t to the               capabilities
                                                                                                             ogrects
                                                                                                                   ade      nd  en                        ph  ys                                    De      th e     as  a      tage
                                     Mana
                                           gem                                                                 rty mm   pees Improving low-level discovery                                      envmairointenanuser ystem onment
                                                                                                                                                                                                                  ce
                                                ent o                St                              3rd pa whi                exposproof                                                                nmwh    oleBrec os envir
                                           up         f higcapabilitiesrenghten Stric ter                            stleTam
                                                                                                                           b
                                                                                                                                per ed b
                                                                                                                                            y                          Right to be IoT offline Follow   Firew ealls
                                                                                                                                                                                                           best n t
                                                                                                                                                                                                                 prac  owser
                                                            h                             mai  ntaining of exist              lo                                                                                      tices
                       discov
                              ery                  esown volume
                                               datkn                               encr                                         w
                                                                                                                      ing of ers r                        cy) (including environment) overall syst                           w.r.t.
             ch and             opennessUn / changes Unlocking                           yptio(Hardware)                                        ic (lega
                                                                                             5G
           Safeguarding                                                of      verticals
                                                                                      laws                     Isolation Addressing      onistthreat                                                               em impact
       Sear                                                                              anism
                                                                                            andnM regu                                 gve
                                                                                                                                    illo
                                                                                                sta
                                                                                                    andlatio
                                                                              st mech prot cryptographic       ns material
                                                                                                                       ontalAn  spta                                               Declarative interaction                                                         Lead by example
                                                                                                                                                        e Disaster
                                                                                                    nd
                                                                                                         at oryhohriz
                 to new entrants                                  mbuted tru                  ectin
                                                                                               embve      ing                    categories   dlewar
                                                                                                       a
                                   e                          trutri                           Pre gednt deds ard switch mid
                                                                                                        user                                                                                                                                                                                        Asset distribution
                                                                                      rdis
                          table siz                        ecDis                                                                                                                                                    Passive obse
                      ingTraffic loss           Open sp                                                                                                                                                              ility           rvation                                           Data retention
                                                                           atio
        Globa  l ro ut                                                                     Lega         Re
                                                                                                 cy harddware  ca  m                es                                    Right to encryption g depl          oy ab
                                                                                                            unda eras an                for Lack of isol                                                                                                            Need to improve efficiency
                                                                               n is
                                                                                                                                                           ation                              ov in                     y                    End-user service deployability
                                                                                                              devinc             d                                                    Impr                       bilit
                                                                    su
                                                                      es
                                                                                                                     cesy          other                                                                      na
                                                                                                                                                                                                        nt ai
                                                      o big                                                                                                                                and mai

8
                                            sight int
                                   have in
                          Right to         thering                                                                  ms                                                   Natural                                                          Best practises and bundled
                                   data ga                                                             ing syste
                                                                                              operat                                              ndatory
                                                                                     Mobile                                            date/ma                                                                                                     expertise
                                                                                                                       Duty to up                   EO L
                                                                                                                                 en   sou rcing at
                                                                                                                             op

    FOSDEM 2019                                                                                                                                                                                                                                                                                                            2019-02-03
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
The larger ecosystem

9   FOSDEM 2019                     2019-02-03
NGI Zero: year 0 Powered by the European Commission Directorate-General for Communications Networks Content and Technology - FOSDEM 2019
NGI Vision
     “The overall mission of the Next Generation
        Internet initiative is to re-imagine and re-
                 engineer the Internet for the third
      millennium and beyond. We envision the
           information age will be an era that
     brings out the best in all of us. We want
     to enable human potential and creativity at
              the largest possible scale. In order to
      preserve and expand the European way of
       life, we shape a value-centric, human and
                           inclusive Internet for all.”

                      Read full text at https://ngi.eu/vision

10                   FOSDEM 2019                                2019-02-03
Facilitate incremental innovation as tech commons
                          'R&I Actions' should encourage,
                          when relevant, open source
                          software and open hardware
                          design, access to data,
                          standardisation activities, access
                          to testing and operational
                          infrastructure as well as an IPR
                          regime ensuring lasting impact
                          and reusability of results.

11       FOSDEM 2019                                     2019-02-03
One year ago in a room rather close to this one...

12           FOSDEM 2019                             2019-02-03
Fast-forward...

13   FOSDEM 2019                     2019-02-03
Project-centric

17   FOSDEM 2019                     2019-02-03
Our approach
 Design a light-weight and confidential application
         procedure providing adequate insight into
       technical capabilities as well as the urgency,
    relevance and relative cost effectiveness of the
                                  projects proposed
                   at a low cost to the applicants.
            Weight   Criterion
             30%     Technical excellence/feasibility
             40%     Relevance/Impact/Strategic potential
             30%     Cost effectiveness/Value for money

18              FOSDEM 2019                                 2019-02-03
Improve ideas where needed
                        .. we use a staged approach which
                        identifies and amends missing or
                        inadequate aspects of the proposals prior
                        (and conditional) to the start of a project.
                        … and guide and support projects with
                        essential QA and strategic aspects that
                        require additional expertise

19        FOSDEM 2019                                          2019-02-03
Be consistent in requirements and best practices
               Make sure every project       Support with dealing with
              delivers on accessibility      standards setting organisations
             Make sure projects can be       Provide a responsible
           localised/internationalised       disclosure procedure
     Make sure licensing is compatible       Provide documentation for
           and all legal stuff is in order   users/developers

20                FOSDEM 2019                                          2019-02-03
(continued)
 Mentor with applying best practices    Perform an early stage
  in secure software development        independent security scan of
                  across all projects   the project plan
        Create a reproducible build     Make software available early
       environment and help design      to allow for ‘many eyeballs’
                   automated tests      Independent security scan of
                                        the actual outcomes

21            FOSDEM 2019                                         2019-02-03
(continued)
          Liaise and mentor projects with interacting with ecosystem and
         target groups, e.g. technical and operational community, digital
     rights organisations, free software community, businesses, consumer
                                                  organisations, end users
     Manage and support diversity and gender bias in the design phase

22           FOSDEM 2019                                             2019-02-03
Privacy & Trust Enhancing Technologies

23      FOSDEM 2019                           2019-02-03
Privacy & Trust Enhancing Technologies
        Privacy isn't dead, but we     Reliability, confidentiality, integrity
     lack the right tools to protect   and security should be the 'new
                      our intimacy     normal' of the internet, something
                                       ordinary users should not have to
                                       worry about.
                                       Trust is one of the key drivers for the
                                       Next Generation Internet, and an
                                       adequate level of privacy is a non-
                                       negotiable requirement for that.

24            FOSDEM 2019                                                2019-02-03
Next Generation Search & Discovery

25    FOSDEM 2019                         2019-02-03
Next Generation Search & Discovery
     The pen may be mightier      Search should not be a gatekeeper, a black
                                  box or a privacy nightmare. If the internet is
     than the sword, but how      the equivalent of a global brain, we need
       does it fare against the   creativity and diversity in the pathways
                search button?    across that brain to unlock its true potential.
                                  Search and discovery are basic human
                                  needs for humans of all ages, and we would
                                  like to put powerful new technology in the
                                  hands of future generations as building
                                  blocks for a fair and democratic society and
                                  an open economy that benefits all.

26        FOSDEM 2019                                                     2019-02-03
Key characteristics
                            Competitive calls every
                             two months until the
                              budget is allocated.
                            Projects between 5k-50k
                                 Walk the talk:
      5.6 million euro
                                   Inclusion           5.6 million euro
       in small grants              Security            in small grants
     between now and                                  between now and
            2021                  Localisation               2021

                                Open Standards
                              Free & Open Source
                               Deliver to deploy

27      FOSDEM 2019                                                       2019-02-03
For other calls and more info
                            NGI Trust
                            LEDGER

                              Go to
                          https://ngi.eu
      5.6 million euro
     in grants between
                         and navigate to    5.6 million euro
                                           in grants between
       now and 2021
                           Open Calls        now and 2021

28      FOSDEM 2019                                            2019-02-03
The Team

     Accessibility.nl

                                  Everything we ever learned about grant management and maturing technology
                                                                                     comes together in NGI0.
                                   The idea of great grant making is after all simple: it is not about the funder, but
                                                                                                   about the fundees.

29                FOSDEM 2019                                                                                            2019-02-03
CC BY 2.0, created by Jérôme Decq https://www.flickr.com/photos/lesphotosdejerome/5958094770
You can also read