The Ethics of Computation

  • We publish new technological protocols, software, and high-level analysis from technical founders of cyber security protocols and post-quantum cryptography. We study the externalities and concrete technological trade offs, coming from the development of open source cryptography protocols for ensuring the privacy of the individual, under today’s global regime of pervasive surveillance.

  • This program examines the effect of turning our best scientific models into computational ones.

    Our goal with “Church-Turing-Spinoza” is to study, inside of a computational paradigm, the value of this kind of model reduction in the sciences.

    The technical research program, studies the process and the empirical effects of trade and coordination with systems [i.e. institutions or individuals] considered as computational agents.

    We examine the complexity involved in making broad decisions under uncertainty, between agents/systems using universal grammar and those which do not.

These two visionary programs solicit the theory and practice of some of the most forward-thinking pioneers in open source encryption software/cryptography and in the foundations of theoretical computer science. Second Foundation works together in collaboration with the Center for Socially Responsible Computation at MIT.