[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:10.00,0:00:14.00,Default,,0000,0000,0000,,Thank you. Congratulations to the students \N[of the Digital Freedoms association] Dialogue: 0,0:00:14.10,0:00:16.00,Default,,0000,0000,0000,,who organized this meeting. Dialogue: 0,0:00:16.10,0:00:19.90,Default,,0000,0000,0000,,They are right, not only\Nbecause Richard is famous Dialogue: 0,0:00:20.00,0:00:22.20,Default,,0000,0000,0000,,but also because the subject\Nis very interesting to us. Dialogue: 0,0:00:22.30,0:00:25.00,Default,,0000,0000,0000,,They are especially interesting\Nhere at Sciences Po Dialogue: 0,0:00:25.10,0:00:29.20,Default,,0000,0000,0000,,since first, we try to study\Ncontroversies; Dialogue: 0,0:00:29.30,0:00:31.20,Default,,0000,0000,0000,,some of you here have studied\Ncontroversies Dialogue: 0,0:00:31.30,0:00:34.10,Default,,0000,0000,0000,,and Richard himself\Nis a controversial character. Dialogue: 0,0:00:34.20,0:00:37.00,Default,,0000,0000,0000,,I have not found anything on the Web\Nthat allows to find consensus Dialogue: 0,0:00:37.10,0:00:45.10,Default,,0000,0000,0000,,nor about what he does, nor what he says, nor\Nthe words he uses, so he's an ideal case study Dialogue: 0,0:00:45.20,0:00:48.70,Default,,0000,0000,0000,,for us who study cartographies of\Ncontroversies in this institution. Dialogue: 0,0:00:48.80,0:00:51.70,Default,,0000,0000,0000,,Somehow we have a controversial character Dialogue: 0,0:00:51.80,0:00:53.70,Default,,0000,0000,0000,,on subjects that are important to us. Dialogue: 0,0:00:53.80,0:00:56.80,Default,,0000,0000,0000,,Second, obviously, is the subject itself Dialogue: 0,0:00:56.90,0:01:01.00,Default,,0000,0000,0000,,and the question of how much\Nfreedom and control Dialogue: 0,0:01:04.65,0:01:08.20,Default,,0000,0000,0000,,that are at the core of all these\Ndigital innovations Dialogue: 0,0:01:08.30,0:01:11.00,Default,,0000,0000,0000,,are directly interesting, for political science Dialogue: 0,0:01:11.10,0:01:14.30,Default,,0000,0000,0000,,sociology, also law. Dialogue: 0,0:01:14.40,0:01:18.00,Default,,0000,0000,0000,,All questions that interest us\Nin this institution. Dialogue: 0,0:01:18.10,0:01:21.80,Default,,0000,0000,0000,,It's by the way interesting that\NRichard comes here Dialogue: 0,0:01:21.90,0:01:28.10,Default,,0000,0000,0000,,a few days after Steve Jobs died, a death that \Nhe celebrated in his own way if I dare to say Dialogue: 0,0:01:28.20,0:01:32.20,Default,,0000,0000,0000,,explaining that his loss was not\Na huge disaster Dialogue: 0,0:01:32.30,0:01:36.10,Default,,0000,0000,0000,,for all those questions of\Ndigital freedoms Dialogue: 0,0:01:36.20,0:01:40.00,Default,,0000,0000,0000,,because - even though Steve Jobs\Ncould be esteemed Dialogue: 0,0:01:40.10,0:01:42.80,Default,,0000,0000,0000,,the control he had on software Dialogue: 0,0:01:42.90,0:01:47.00,Default,,0000,0000,0000,,and its domination make us\Nin some way free Dialogue: 0,0:01:47.10,0:01:51.00,Default,,0000,0000,0000,,but under the form, as he says it\Nin several opinions, Dialogue: 0,0:01:51.10,0:01:54.20,Default,,0000,0000,0000,,of a "jail made cool" --\Na jail that I like myself Dialogue: 0,0:01:54.30,0:01:56.60,Default,,0000,0000,0000,,since I am myself an adept\Nof the Macintosh Dialogue: 0,0:01:56.70,0:01:59.00,Default,,0000,0000,0000,,but this is obviously not\Nthe kind of character Dialogue: 0,0:01:59.10,0:02:01.60,Default,,0000,0000,0000,,or the kind of freedom that Richard\Nis thinking about. Dialogue: 0,0:02:01.70,0:02:04.00,Default,,0000,0000,0000,,The third reason is that, obviously Dialogue: 0,0:02:04.10,0:02:06.70,Default,,0000,0000,0000,,for a lot of questions\Nthat are directly interesting to us Dialogue: 0,0:02:06.80,0:02:09.00,Default,,0000,0000,0000,,in this institution about\Nscientific humanities Dialogue: 0,0:02:09.10,0:02:11.70,Default,,0000,0000,0000,,is the link between technical innovation Dialogue: 0,0:02:11.80,0:02:14.70,Default,,0000,0000,0000,,and political devices\Nthat interests us directly. Dialogue: 0,0:02:14.80,0:02:17.70,Default,,0000,0000,0000,,So we have at least, anyway myself\Nat the scientific direction Dialogue: 0,0:02:17.80,0:02:23.00,Default,,0000,0000,0000,,three reasons to enjoy\Nthe initiative of the students group Dialogue: 0,0:02:23.10,0:02:25.00,Default,,0000,0000,0000,,which organized this meeting Dialogue: 0,0:02:25.10,0:02:28.00,Default,,0000,0000,0000,,and I am happy to let\NRichard Stallman speak Dialogue: 0,0:02:28.10,0:02:31.10,Default,,0000,0000,0000,,and please applause him before. Dialogue: 0,0:02:37.70,0:02:43.10,Default,,0000,0000,0000,,Projects with the goal of digital\Ninclusion are making a big assumption. Dialogue: 0,0:02:43.20,0:02:48.60,Default,,0000,0000,0000,,They are assuming that participating\Nin a digital society is good; Dialogue: 0,0:02:48.70,0:02:51.00,Default,,0000,0000,0000,,but that’s not necessarily true. Dialogue: 0,0:02:51.10,0:02:54.80,Default,,0000,0000,0000,,Being in a digital society can be good or bad Dialogue: 0,0:02:54.90,0:03:00.80,Default,,0000,0000,0000,,depending on whether that\Ndigital society is just or unjust. Dialogue: 0,0:03:02.00,0:03:09.00,Default,,0000,0000,0000,,There are many ways in which our freedom\Nis being attacked by digital technology. Dialogue: 0,0:03:09.10,0:03:17.10,Default,,0000,0000,0000,,Digital technology can make things worse,\Nand it will, unless we fight to prevent it. Dialogue: 0,0:03:20.90,0:03:26.00,Default,,0000,0000,0000,,Therefore, if we have an unjust digital society Dialogue: 0,0:03:26.10,0:03:30.00,Default,,0000,0000,0000,,we should cancel these projects\Nfor digital inclusion Dialogue: 0,0:03:30.10,0:03:34.00,Default,,0000,0000,0000,,and launch projects for digital extraction. Dialogue: 0,0:03:34.50,0:03:41.40,Default,,0000,0000,0000,,We have to extract people from digital society\Nif it doesn’t respect their freedom; Dialogue: 0,0:03:41.50,0:03:44.80,Default,,0000,0000,0000,,or we have to make it respect their freedom. Dialogue: 0,0:03:45.10,0:03:50.00,Default,,0000,0000,0000,,So, what are the threats? First, surveillance. Dialogue: 0,0:03:50.10,0:03:54.00,Default,,0000,0000,0000,,Computers are Stalin’s dream. Dialogue: 0,0:03:54.10,0:03:57.60,Default,,0000,0000,0000,,They are ideal tools for surveillance Dialogue: 0,0:03:57.70,0:04:03.00,Default,,0000,0000,0000,,because anything we do with computers,\Nthe computers can record. Dialogue: 0,0:04:03.10,0:04:05.00,Default,,0000,0000,0000,,They can record the information Dialogue: 0,0:04:05.10,0:04:10.90,Default,,0000,0000,0000,,in a perfectly indexed\Nsearchable form in a central database Dialogue: 0,0:04:11.00,0:04:17.10,Default,,0000,0000,0000,,ideal for any tyrant\Nwho wants to crush opposition. Dialogue: 0,0:04:19.80,0:04:24.10,Default,,0000,0000,0000,,Surveillance is sometimes done\Nwith our own computers. Dialogue: 0,0:04:24.70,0:04:30.00,Default,,0000,0000,0000,,For instance, if you have a computer\Nthat’s running Microsoft Windows Dialogue: 0,0:04:30.10,0:04:33.00,Default,,0000,0000,0000,,that system is doing surveillance. Dialogue: 0,0:04:33.10,0:04:38.30,Default,,0000,0000,0000,,There are features in Windows\Nthat send data to some server. Dialogue: 0,0:04:38.40,0:04:41.00,Default,,0000,0000,0000,,Data about the use of the computer. Dialogue: 0,0:04:41.10,0:04:45.70,Default,,0000,0000,0000,,A surveillance feature was discovered\Nin the iPhone a few months ago Dialogue: 0,0:04:45.80,0:04:48.80,Default,,0000,0000,0000,,and people started calling it\Nthe “spy-phone”. Dialogue: 0,0:04:51.00,0:04:54.60,Default,,0000,0000,0000,,Flash player has a surveillance feature too Dialogue: 0,0:04:54.80,0:04:58.20,Default,,0000,0000,0000,,and so does the Amazon “Swindle”. Dialogue: 0,0:04:58.70,0:05:04.00,Default,,0000,0000,0000,,They call it the Kindle,\Nbut I call it the Swindle, l’escroc Dialogue: 0,0:05:04.50,0:05:08.20,Default,,0000,0000,0000,,because it’s meant to swindle\Nusers out of their freedom. Dialogue: 0,0:05:08.80,0:05:14.00,Default,,0000,0000,0000,,It makes people identify themselves\Nwhenever they buy a book Dialogue: 0,0:05:14.20,0:05:21.00,Default,,0000,0000,0000,,and that means Amazon has a giant list\Nof all the books each user has read. Dialogue: 0,0:05:21.40,0:05:25.10,Default,,0000,0000,0000,,And such a list must not exist anywhere. Dialogue: 0,0:05:27.10,0:05:32.00,Default,,0000,0000,0000,,Most portable phones\Nwill transmit their location Dialogue: 0,0:05:32.10,0:05:38.10,Default,,0000,0000,0000,,computed using GPS, on remote command. Dialogue: 0,0:05:38.90,0:05:45.90,Default,,0000,0000,0000,,And the phone company is accumulating\Na giant list of places that the user has been. Dialogue: 0,0:05:46.10,0:05:51.10,Default,,0000,0000,0000,,A German from the Green Party\Nasked the phone company Dialogue: 0,0:05:51.20,0:05:56.00,Default,,0000,0000,0000,,to give him the data it had\Nabout where he was. Dialogue: 0,0:05:56.50,0:05:59.80,Default,,0000,0000,0000,,He had to sue, he had to go\Nto court to get this information. Dialogue: 0,0:05:59.90,0:06:06.00,Default,,0000,0000,0000,,And when he got it, he received\Nforty-four thousand location points Dialogue: 0,0:06:06.10,0:06:08.10,Default,,0000,0000,0000,,for a period of six months. Dialogue: 0,0:06:08.20,0:06:12.40,Default,,0000,0000,0000,,That’s more than two hundred per day. Dialogue: 0,0:06:12.80,0:06:20.00,Default,,0000,0000,0000,,So what that means is someone could form\Na very good picture of his activities Dialogue: 0,0:06:20.10,0:06:24.00,Default,,0000,0000,0000,,just by looking at that data. Dialogue: 0,0:06:28.00,0:06:32.80,Default,,0000,0000,0000,,We can stop our own computers\Nfrom doing surveillance on us Dialogue: 0,0:06:32.90,0:06:37.10,Default,,0000,0000,0000,,if we have control\Nof the software that they run. Dialogue: 0,0:06:38.00,0:06:43.00,Default,,0000,0000,0000,,But the software these people are running,\Nthey don’t have control over. Dialogue: 0,0:06:43.10,0:06:49.10,Default,,0000,0000,0000,,It’s non-free software and that’s why\Nit has malicious features, such as surveillance. Dialogue: 0,0:06:49.70,0:06:54.60,Default,,0000,0000,0000,,However, the surveillance is not\Nalways done with our own computers Dialogue: 0,0:06:54.70,0:06:57.70,Default,,0000,0000,0000,,it’s also done at one remove. Dialogue: 0,0:06:57.80,0:07:02.10,Default,,0000,0000,0000,,For instance ISPs in Europe are required Dialogue: 0,0:07:02.20,0:07:09.00,Default,,0000,0000,0000,,to keep data about the user’s\Ninternet communications for a long time Dialogue: 0,0:07:09.10,0:07:16.10,Default,,0000,0000,0000,,in case the State decides to investigate\Nthat person later Dialogue: 0,0:07:16.20,0:07:19.10,Default,,0000,0000,0000,,for whatever imaginable reason. Dialogue: 0,0:07:22.00,0:07:26.90,Default,,0000,0000,0000,,And with a portable phone,\Neven if you can stop the phone Dialogue: 0,0:07:27.00,0:07:30.00,Default,,0000,0000,0000,,from transmitting your GPS location Dialogue: 0,0:07:30.10,0:07:34.10,Default,,0000,0000,0000,,the system can determine\Nthe phone’s location approximately Dialogue: 0,0:07:34.20,0:07:40.70,Default,,0000,0000,0000,,by comparing the time when\Nthe signals arrive at different towers. Dialogue: 0,0:07:41.00,0:07:45.00,Default,,0000,0000,0000,,So the phone system can do surveillance Dialogue: 0,0:07:45.10,0:07:49.40,Default,,0000,0000,0000,,even without special cooperation\Nfrom the phone itself. Dialogue: 0,0:07:54.00,0:07:59.70,Default,,0000,0000,0000,,Likewise, the bicycles\Nthat people rent in Paris. Dialogue: 0,0:07:59.80,0:08:02.90,Default,,0000,0000,0000,,Of course the system knows\Nwhere you get the bicycle Dialogue: 0,0:08:03.00,0:08:06.00,Default,,0000,0000,0000,,and it knows where you return the bicycle Dialogue: 0,0:08:06.00,0:08:10.00,Default,,0000,0000,0000,,and I’ve heard reports\Nthat it tracks the bicycles Dialogue: 0,0:08:10.60,0:08:14.00,Default,,0000,0000,0000,,as they are moving around as well. Dialogue: 0,0:08:15.10,0:08:23.00,Default,,0000,0000,0000,,So they are not something we can really trust. Dialogue: 0,0:08:23.30,0:08:30.90,Default,,0000,0000,0000,,But there are also systems that have nothing\Nto do with us that exist only for tracking. Dialogue: 0,0:08:31.00,0:08:37.80,Default,,0000,0000,0000,,For instance, in the UK\Nall car travel is monitored. Dialogue: 0,0:08:37.90,0:08:43.50,Default,,0000,0000,0000,,Every car’s movements\Nare being recorded in real time Dialogue: 0,0:08:43.60,0:08:47.20,Default,,0000,0000,0000,,and can be tracked by the State in real time. Dialogue: 0,0:08:47.30,0:08:52.00,Default,,0000,0000,0000,,This is done with cameras on the side of the road. Dialogue: 0,0:08:52.40,0:08:57.10,Default,,0000,0000,0000,,Now, the only way we can prevent surveillance Dialogue: 0,0:08:57.20,0:09:01.00,Default,,0000,0000,0000,,that’s done at one remove\Nor by unrelated systems Dialogue: 0,0:09:01.10,0:09:07.10,Default,,0000,0000,0000,,is through political action\Nagainst increased government power Dialogue: 0,0:09:07.20,0:09:11.10,Default,,0000,0000,0000,,to track and monitor everyone. Dialogue: 0,0:09:11.50,0:09:17.00,Default,,0000,0000,0000,,Which means of course we have to reject\Nwhatever excuse they come up with. Dialogue: 0,0:09:18.00,0:09:25.00,Default,,0000,0000,0000,,For doing such systems, no excuse\Nis valid to monitor everyone. Dialogue: 0,0:09:25.60,0:09:31.80,Default,,0000,0000,0000,,In a free society, when you go out\Nin public you are not guaranteed anonymity. Dialogue: 0,0:09:31.90,0:09:36.50,Default,,0000,0000,0000,,It’s possible for someone\Nto recognize you and remember. Dialogue: 0,0:09:36.60,0:09:41.80,Default,,0000,0000,0000,,And later that person could say\Nthat he saw you at a certain place. Dialogue: 0,0:09:42.00,0:09:45.00,Default,,0000,0000,0000,,But that information is diffuse. Dialogue: 0,0:09:45.10,0:09:52.00,Default,,0000,0000,0000,,It’s not conveniently assembled to track\Neverybody and investigate what they did. Dialogue: 0,0:09:52.10,0:09:55.70,Default,,0000,0000,0000,,To collect that information is a lot of work Dialogue: 0,0:09:55.80,0:10:01.00,Default,,0000,0000,0000,,so it’s only done in special cases\Nwhen it’s necessary. Dialogue: 0,0:10:02.80,0:10:06.00,Default,,0000,0000,0000,,But computerized surveillance\Nmakes it possible Dialogue: 0,0:10:06.10,0:10:09.80,Default,,0000,0000,0000,,to centralize and index all this information Dialogue: 0,0:10:09.90,0:10:16.90,Default,,0000,0000,0000,,so that an unjust regime can find it all\Nand find out all about everyone. Dialogue: 0,0:10:17.00,0:10:21.00,Default,,0000,0000,0000,,If a dictator takes power,\Nwhich could happen anywhere Dialogue: 0,0:10:21.40,0:10:25.50,Default,,0000,0000,0000,,people realize this and they recognize Dialogue: 0,0:10:25.60,0:10:31.50,Default,,0000,0000,0000,,that they should not\Ncommunicate with other dissidents Dialogue: 0,0:10:31.60,0:10:36.00,Default,,0000,0000,0000,,in a way that the State could find out about. Dialogue: 0,0:10:36.10,0:10:40.40,Default,,0000,0000,0000,,But if the dictator\Nhas several years of stored records Dialogue: 0,0:10:40.50,0:10:46.00,Default,,0000,0000,0000,,of who talks with whom, it’s too late\Nto take any precautions then. Dialogue: 0,0:10:46.30,0:10:51.00,Default,,0000,0000,0000,,Because he already has\Neverything he needs to realize Dialogue: 0,0:10:51.10,0:10:56.00,Default,,0000,0000,0000,,“OK this guy is a dissident and he spoke\Nwith him. Maybe he is a dissident too.” Dialogue: 0,0:10:56.10,0:11:00.10,Default,,0000,0000,0000,,“Maybe we should grab him and torture him.” Dialogue: 0,0:11:02.00,0:11:11.80,Default,,0000,0000,0000,,So we need to campaign to put\Nan end to digital surveillance now. Dialogue: 0,0:11:12.00,0:11:17.30,Default,,0000,0000,0000,,You can’t wait until there is a dictator\Nand it would really matter. Dialogue: 0,0:11:17.60,0:11:26.00,Default,,0000,0000,0000,,And besides, it doesn’t take an outright\Ndictatorship to start attacking human rights. Dialogue: 0,0:11:27.00,0:11:31.60,Default,,0000,0000,0000,,I wouldn’t quite call\Nthe government of the UK a dictatorship. Dialogue: 0,0:11:31.70,0:11:39.00,Default,,0000,0000,0000,,It’s not very democratic and one way\Nit crushes democracy is using surveillance. Dialogue: 0,0:11:39.10,0:11:45.00,Default,,0000,0000,0000,,A few years ago, people believed to be\Non their way to a protest Dialogue: 0,0:11:45.10,0:11:47.00,Default,,0000,0000,0000,,they were going to protest. Dialogue: 0,0:11:47.10,0:11:50.00,Default,,0000,0000,0000,,They were arrested before\Nthey could get there Dialogue: 0,0:11:50.10,0:11:58.00,Default,,0000,0000,0000,,because their car was tracked through\Nthis universal car tracking system. Dialogue: 0,0:12:03.90,0:12:07.00,Default,,0000,0000,0000,,The second threat is censorship. Dialogue: 0,0:12:07.10,0:12:11.70,Default,,0000,0000,0000,,Censorship is not new,\Nit existed long before computers. Dialogue: 0,0:12:11.80,0:12:17.70,Default,,0000,0000,0000,,But 15 years ago, we thought that\Nthe Internet would protect us from censorship Dialogue: 0,0:12:17.80,0:12:20.70,Default,,0000,0000,0000,,that it would defeat censorship. Dialogue: 0,0:12:20.80,0:12:25.00,Default,,0000,0000,0000,,Then, China and some other obvious tyrannies Dialogue: 0,0:12:25.10,0:12:30.80,Default,,0000,0000,0000,,went to great lengths to impose\Ncensorship on the Internet, and we said: Dialogue: 0,0:12:30.90,0:12:34.80,Default,,0000,0000,0000,,“well that’s not surprising, what else\Nwould governments like that do?” Dialogue: 0,0:12:34.90,0:12:39.00,Default,,0000,0000,0000,,But today we see censorship\Nimposed in countries Dialogue: 0,0:12:39.10,0:12:44.90,Default,,0000,0000,0000,,that are not normally\Nthought of as dictatorships Dialogue: 0,0:12:45.00,0:12:53.30,Default,,0000,0000,0000,,such as for instance the UK, France,\NSpain, Italy, Denmark… Dialogue: 0,0:12:54.40,0:13:00.70,Default,,0000,0000,0000,,They all have systems of\Nblocking access to some websites. Dialogue: 0,0:13:00.90,0:13:04.00,Default,,0000,0000,0000,,Denmark established a system Dialogue: 0,0:13:04.10,0:13:10.90,Default,,0000,0000,0000,,that blocks access to a long list\Nof webpages, which was secret. Dialogue: 0,0:13:11.00,0:13:15.80,Default,,0000,0000,0000,,The citizens were not supposed to know\Nhow the government was censoring them Dialogue: 0,0:13:15.90,0:13:19.80,Default,,0000,0000,0000,,but the list was leaked,\Nand posted on WikiLeaks. Dialogue: 0,0:13:19.90,0:13:26.00,Default,,0000,0000,0000,,At that point, Denmark added\Nthe WikiLeaks page to its censorship list. Dialogue: 0,0:13:27.50,0:13:30.00,Default,,0000,0000,0000,,So, the whole rest of the world can find out Dialogue: 0,0:13:30.10,0:13:35.00,Default,,0000,0000,0000,,how Danes are being censored,\Nbut Danes are not supposed to know. Dialogue: 0,0:13:35.90,0:13:43.80,Default,,0000,0000,0000,,A few months ago, Turkey,\Nwhich claims to respect some human rights Dialogue: 0,0:13:43.90,0:13:47.00,Default,,0000,0000,0000,,announced that every Internet user Dialogue: 0,0:13:47.10,0:13:51.00,Default,,0000,0000,0000,,would have to choose between\Ncensorship and more censorship. Dialogue: 0,0:13:51.50,0:13:54.90,Default,,0000,0000,0000,,Four different levels of censorship\Nthey get to choose! Dialogue: 0,0:13:55.00,0:14:02.00,Default,,0000,0000,0000,,But freedom is not one of the options. Dialogue: 0,0:14:04.40,0:14:09.10,Default,,0000,0000,0000,,Australia wanted to impose filtering\Non the Internet but that was blocked. Dialogue: 0,0:14:09.20,0:14:13.00,Default,,0000,0000,0000,,However Australia has a\Ndifferent kind of censorship. Dialogue: 0,0:14:13.10,0:14:15.90,Default,,0000,0000,0000,,It has censorship of links. Dialogue: 0,0:14:16.00,0:14:20.50,Default,,0000,0000,0000,,That is, if a website in Australia has a link Dialogue: 0,0:14:20.60,0:14:23.90,Default,,0000,0000,0000,,to some censored site outside Australia Dialogue: 0,0:14:24.00,0:14:27.00,Default,,0000,0000,0000,,the one in Australia can be punished. Dialogue: 0,0:14:27.10,0:14:29.00,Default,,0000,0000,0000,,Electronic Frontier Australia Dialogue: 0,0:14:29.10,0:14:32.90,Default,,0000,0000,0000,,which is an organization\Nthat defends human rights Dialogue: 0,0:14:33.00,0:14:36.70,Default,,0000,0000,0000,,in the digital domain in Australia Dialogue: 0,0:14:36.80,0:14:41.20,Default,,0000,0000,0000,,posted a link to\Na foreign political website. Dialogue: 0,0:14:41.90,0:14:49.00,Default,,0000,0000,0000,,It was ordered to delete the link\Nor face a penalty of $11,000 a day. Dialogue: 0,0:14:49.50,0:14:52.00,Default,,0000,0000,0000,,So they deleted it,\Nwhat else could they do? Dialogue: 0,0:14:52.10,0:14:55.80,Default,,0000,0000,0000,,This is a very harsh system of censorship. Dialogue: 0,0:14:55.90,0:15:01.80,Default,,0000,0000,0000,,In Spain, the censorship\Nthat was adopted earlier this year Dialogue: 0,0:15:02.00,0:15:12.70,Default,,0000,0000,0000,,allows officials to arbitrarily\Nshut down an Internet site in Spain Dialogue: 0,0:15:12.80,0:15:17.40,Default,,0000,0000,0000,,or impose filtering to block access\Nto a site outside of Spain. Dialogue: 0,0:15:17.50,0:15:22.00,Default,,0000,0000,0000,,And they can do this\Nwithout any kind of trial. Dialogue: 0,0:15:22.10,0:15:27.00,Default,,0000,0000,0000,,This was one of the motivations\Nfor the Indignados Dialogue: 0,0:15:29.40,0:15:33.00,Default,,0000,0000,0000,,who have been protesting in the street. Dialogue: 0,0:15:34.30,0:15:38.80,Default,,0000,0000,0000,,There were protests in the street\Nin Turkey as well after that announcement Dialogue: 0,0:15:38.90,0:15:42.80,Default,,0000,0000,0000,,but the government refused to change its policy. Dialogue: 0,0:15:42.90,0:15:46.60,Default,,0000,0000,0000,,We must recognize that a country Dialogue: 0,0:15:46.70,0:15:50.80,Default,,0000,0000,0000,,that imposes censorship on the Internet\Nis not a free country. Dialogue: 0,0:15:51.00,0:15:57.00,Default,,0000,0000,0000,,And is not a legitimate government either. Dialogue: 0,0:16:05.80,0:16:13.30,Default,,0000,0000,0000,,The next threat to our freedom comes\Nfrom data formats that restrict the users. Dialogue: 0,0:16:13.90,0:16:17.00,Default,,0000,0000,0000,,Sometimes it’s because the format is secret. Dialogue: 0,0:16:17.10,0:16:20.00,Default,,0000,0000,0000,,There are many application programs Dialogue: 0,0:16:20.10,0:16:25.00,Default,,0000,0000,0000,,that save the user’s data in a secret format Dialogue: 0,0:16:25.90,0:16:28.80,Default,,0000,0000,0000,,which is meant to prevent the user Dialogue: 0,0:16:28.90,0:16:33.00,Default,,0000,0000,0000,,from taking that data and using it\Nwith some other program. Dialogue: 0,0:16:33.10,0:16:38.00,Default,,0000,0000,0000,,The goal is to prevent interoperability. Dialogue: 0,0:16:38.70,0:16:45.00,Default,,0000,0000,0000,,Now evidently, if the program\Nimplements a secret format Dialogue: 0,0:16:45.10,0:16:48.80,Default,,0000,0000,0000,,that’s because the program\Nis not free software. Dialogue: 0,0:16:48.90,0:16:51.90,Default,,0000,0000,0000,,So this is another kind of malicious feature. Dialogue: 0,0:16:52.00,0:16:55.10,Default,,0000,0000,0000,,Surveillance is one kind of malicious feature Dialogue: 0,0:16:55.20,0:16:58.90,Default,,0000,0000,0000,,that you find in some non-free programs; Dialogue: 0,0:16:59.00,0:17:01.90,Default,,0000,0000,0000,,using secret formats to restrict the users Dialogue: 0,0:17:02.00,0:17:04.90,Default,,0000,0000,0000,,is another kind of malicious feature Dialogue: 0,0:17:05.00,0:17:09.00,Default,,0000,0000,0000,,that you also find in some non-free programs. Dialogue: 0,0:17:10.00,0:17:15.00,Default,,0000,0000,0000,,But if you have a free program\Nthat handles a certain format Dialogue: 0,0:17:15.90,0:17:19.00,Default,,0000,0000,0000,,ipso facto that format is not secret. Dialogue: 0,0:17:19.10,0:17:26.00,Default,,0000,0000,0000,,This kind of malicious feature\Ncan only exist in a non-free program. Dialogue: 0,0:17:26.30,0:17:31.10,Default,,0000,0000,0000,,Surveillance features could theoretically\Nexist in a free program Dialogue: 0,0:17:31.20,0:17:35.00,Default,,0000,0000,0000,,but you don’t find them happening. Dialogue: 0,0:17:35.50,0:17:37.90,Default,,0000,0000,0000,,Because the users would fix it. Dialogue: 0,0:17:38.00,0:17:42.00,Default,,0000,0000,0000,,The users wouldn’t like this,\Nso they would fix it. Dialogue: 0,0:17:45.00,0:17:53.70,Default,,0000,0000,0000,,In any case, we also find secret data\Nformats in use for publication of works. Dialogue: 0,0:17:53.90,0:17:58.70,Default,,0000,0000,0000,,You find secret data formats\Nin use for audio Dialogue: 0,0:17:58.80,0:18:02.80,Default,,0000,0000,0000,,such as music, for video, for books… Dialogue: 0,0:18:03.00,0:18:11.00,Default,,0000,0000,0000,,And these secret formats are known as\NDigital Restrictions Management, or DRM Dialogue: 0,0:18:11.50,0:18:16.40,Default,,0000,0000,0000,,or digital handcuffs (les menottes numériques). Dialogue: 0,0:18:19.00,0:18:23.20,Default,,0000,0000,0000,,So, the works are published in secret formats Dialogue: 0,0:18:23.30,0:18:27.90,Default,,0000,0000,0000,,so that only proprietary\Nprograms can play them Dialogue: 0,0:18:28.00,0:18:35.70,Default,,0000,0000,0000,,so that these proprietary programs can have\Nthe malicious feature of restricting the users Dialogue: 0,0:18:35.80,0:18:40.00,Default,,0000,0000,0000,,stopping them from doing something\Nthat would be natural to do. Dialogue: 0,0:18:44.60,0:18:49.90,Default,,0000,0000,0000,,And this is used even by public entities\Nto communicate with the people. Dialogue: 0,0:18:50.00,0:18:56.40,Default,,0000,0000,0000,,For instance Italian public television\Nmakes its programs available on the net Dialogue: 0,0:18:56.50,0:18:59.00,Default,,0000,0000,0000,,in a format called VC-1 Dialogue: 0,0:18:59.10,0:19:05.00,Default,,0000,0000,0000,,which is a standard supposedly,\Nbut it’s a secret standard. Dialogue: 0,0:19:06.50,0:19:12.00,Default,,0000,0000,0000,,Now I can’t imagine how any\Npublicly supported entity Dialogue: 0,0:19:12.10,0:19:17.80,Default,,0000,0000,0000,,could justify using a secret format\Nto communicate with the public. Dialogue: 0,0:19:17.90,0:19:20.80,Default,,0000,0000,0000,,This should be illegal. Dialogue: 0,0:19:20.90,0:19:25.10,Default,,0000,0000,0000,,In fact I think all use of Digital\NRestrictions Management should be illegal. Dialogue: 0,0:19:25.20,0:19:29.00,Default,,0000,0000,0000,,No company should be allowed to do this. Dialogue: 0,0:19:31.60,0:19:35.70,Default,,0000,0000,0000,,There are also formats that are not secret Dialogue: 0,0:19:35.80,0:19:41.00,Default,,0000,0000,0000,,but almost might as well be\Nsecret, for instance Flash. Dialogue: 0,0:19:42.50,0:19:49.30,Default,,0000,0000,0000,,Flash is not actually secret but Adobe keeps\Nmaking new versions, which are different Dialogue: 0,0:19:49.40,0:19:57.00,Default,,0000,0000,0000,,faster than anyone can keep up\Nand make free software to play those files. Dialogue: 0,0:19:57.10,0:20:01.00,Default,,0000,0000,0000,,So it has almost the same effect as being secret. Dialogue: 0,0:20:02.80,0:20:11.10,Default,,0000,0000,0000,,Then there are the patented formats,\Nsuch as MP3 for audio. Dialogue: 0,0:20:11.20,0:20:16.10,Default,,0000,0000,0000,,It’s bad to distribute audio in MP3 format! Dialogue: 0,0:20:16.60,0:20:21.90,Default,,0000,0000,0000,,There is free software to handle MP3 format,\Nto play it and to generate it Dialogue: 0,0:20:22.00,0:20:25.60,Default,,0000,0000,0000,,but because it’s patented in many countries Dialogue: 0,0:20:25.70,0:20:31.90,Default,,0000,0000,0000,,many distributors of free software\Ndon’t dare include those programs. Dialogue: 0,0:20:32.00,0:20:35.80,Default,,0000,0000,0000,,So if they distribute the GNU+Linux system Dialogue: 0,0:20:35.90,0:20:39.80,Default,,0000,0000,0000,,their system doesn’t include a player for MP3. Dialogue: 0,0:20:39.90,0:20:48.00,Default,,0000,0000,0000,,As a result if anyone\Ndistributes some music in MP3 Dialogue: 0,0:20:48.10,0:20:54.70,Default,,0000,0000,0000,,that’s putting pressure on people\Nnot to use GNU/Linux. Dialogue: 0,0:20:54.80,0:20:58.50,Default,,0000,0000,0000,,Sure, if you’re an expert you can find\Na free software and install it Dialogue: 0,0:20:58.60,0:21:00.80,Default,,0000,0000,0000,,but there are lots of non experts Dialogue: 0,0:21:00.90,0:21:04.80,Default,,0000,0000,0000,,and they might see that\Nthey installed a version of GNU/Linux Dialogue: 0,0:21:04.90,0:21:09.80,Default,,0000,0000,0000,,which doesn’t have that software\Nand it won’t play MP3 files Dialogue: 0,0:21:09.90,0:21:12.50,Default,,0000,0000,0000,,and they think it’s the system’s fault. Dialogue: 0,0:21:12.60,0:21:18.80,Default,,0000,0000,0000,,They don’t realize it’s MP3′s fault.\NBut this is the fact. Dialogue: 0,0:21:18.90,0:21:25.30,Default,,0000,0000,0000,,Therefore, if you want to support freedom,\Ndon’t distribute MP3 files. Dialogue: 0,0:21:25.40,0:21:29.90,Default,,0000,0000,0000,,That’s why I say if you’re recording my speech\Nand you want to distribute copies Dialogue: 0,0:21:30.00,0:21:38.80,Default,,0000,0000,0000,,don’t do it in a patented format\Nsuch as MPEG-2, or MPEG-4, or MP3. Dialogue: 0,0:21:38.90,0:21:49.00,Default,,0000,0000,0000,,Use a format friendly to free software,\Nsuch as the Ogg format or WebM. Dialogue: 0,0:21:50.50,0:21:54.00,Default,,0000,0000,0000,,And by the way, if you are going\Nto distribute copies of the recording Dialogue: 0,0:21:54.10,0:22:01.00,Default,,0000,0000,0000,,please put on it the\NCreative Commons-No derivatives license. Dialogue: 0,0:22:01.10,0:22:04.00,Default,,0000,0000,0000,,This is a statement of my personal views. Dialogue: 0,0:22:04.10,0:22:09.00,Default,,0000,0000,0000,,If it were a lecture for a course,\Nif it were didactic Dialogue: 0,0:22:09.10,0:22:14.00,Default,,0000,0000,0000,,then it ought to be free,\Nbut statements of opinion are different. Dialogue: 0,0:22:23.90,0:22:26.80,Default,,0000,0000,0000,,Now this leads me to the next threat Dialogue: 0,0:22:26.90,0:22:32.20,Default,,0000,0000,0000,,which comes from software\Nthat the users don’t have control over. Dialogue: 0,0:22:32.90,0:22:37.80,Default,,0000,0000,0000,,In other words: software\Nthat isn’t free, that is not “libre”. Dialogue: 0,0:22:37.90,0:22:42.00,Default,,0000,0000,0000,,In this particular point\NFrench is clearer than English. Dialogue: 0,0:22:42.10,0:22:46.00,Default,,0000,0000,0000,,The English word free\Nmeans ‘libre’ and ‘gratuit’ Dialogue: 0,0:22:46.10,0:22:52.80,Default,,0000,0000,0000,,but what I mean when I say free software\Nis ‘logiciel libre‘. I don’t mean ‘gratuit’. Dialogue: 0,0:22:52.90,0:22:54.90,Default,,0000,0000,0000,,I’m not talking about price. Dialogue: 0,0:22:55.00,0:23:01.00,Default,,0000,0000,0000,,Price is a side issue, just a detail,\Nbecause it doesn't matter ethically. Dialogue: 0,0:23:01.10,0:23:04.00,Default,,0000,0000,0000,,You know if I have a copy of a program Dialogue: 0,0:23:04.10,0:23:10.10,Default,,0000,0000,0000,,and I sell it to you for one euro\Nor a hundred euros, who cares? Dialogue: 0,0:23:10.20,0:23:14.00,Default,,0000,0000,0000,,Why should anyone think\Nthat that’s good or bad? Dialogue: 0,0:23:14.10,0:23:20.90,Default,,0000,0000,0000,,Or suppose I gave it to you ‘gratuitement’…\Nstill, who cares? Dialogue: 0,0:23:21.00,0:23:26.80,Default,,0000,0000,0000,,But whether this program respects\Nyour freedom, that’s important! Dialogue: 0,0:23:26.90,0:23:31.50,Default,,0000,0000,0000,,So free software is software\Nthat respects users’ freedom. Dialogue: 0,0:23:31.90,0:23:34.00,Default,,0000,0000,0000,,What does this mean? Dialogue: 0,0:23:34.10,0:23:37.80,Default,,0000,0000,0000,,Ultimately there are just\Ntwo possibilities with software: Dialogue: 0,0:23:37.90,0:23:44.00,Default,,0000,0000,0000,,either the users control the program\Nor the program controls the users. Dialogue: 0,0:23:44.10,0:23:48.00,Default,,0000,0000,0000,,If the users have certain essential freedoms Dialogue: 0,0:23:48.10,0:23:51.30,Default,,0000,0000,0000,,then they control the program Dialogue: 0,0:23:51.40,0:23:57.00,Default,,0000,0000,0000,,and those freedoms are\Nthe criterion for free software. Dialogue: 0,0:23:57.90,0:24:01.80,Default,,0000,0000,0000,,But if the users don’t fully\Nhave the essential freedoms Dialogue: 0,0:24:01.90,0:24:04.90,Default,,0000,0000,0000,,then the program controls the users. Dialogue: 0,0:24:05.00,0:24:12.00,Default,,0000,0000,0000,,But somebody controls that program\Nand, through it, has power over the users. Dialogue: 0,0:24:12.10,0:24:16.80,Default,,0000,0000,0000,,So, a non-free program is an instrument Dialogue: 0,0:24:16.90,0:24:21.70,Default,,0000,0000,0000,,to give somebody power\Nover a lot of other people Dialogue: 0,0:24:21.80,0:24:26.30,Default,,0000,0000,0000,,and this is unjust power\Nthat nobody should ever have. Dialogue: 0,0:24:26.40,0:24:36.60,Default,,0000,0000,0000,,This is why non-free software, les logiciels\Nprivateurs, qui privent de la liberté Dialogue: 0,0:24:37.00,0:24:42.00,Default,,0000,0000,0000,,why proprietary software is\Nan injustice and should not exist? Dialogue: 0,0:24:43.00,0:24:46.90,Default,,0000,0000,0000,,Because it leaves the users without freedom. Dialogue: 0,0:24:47.00,0:24:51.80,Default,,0000,0000,0000,,Now, the developer who has\Ncontrol of the program Dialogue: 0,0:24:51.90,0:24:56.90,Default,,0000,0000,0000,,often feels tempted\Nto introduce malicious features Dialogue: 0,0:24:57.00,0:25:01.60,Default,,0000,0000,0000,,to further exploit or abuse those users. Dialogue: 0,0:25:01.70,0:25:05.40,Default,,0000,0000,0000,,He feels a temptation because\Nhe knows he can get away with it: Dialogue: 0,0:25:05.50,0:25:08.80,Default,,0000,0000,0000,,because his program controls the users Dialogue: 0,0:25:08.90,0:25:11.70,Default,,0000,0000,0000,,and the users do not have\Ncontrol of the program. Dialogue: 0,0:25:11.80,0:25:16.60,Default,,0000,0000,0000,,If he puts in a malicious feature,\Nthe users can’t fix it; Dialogue: 0,0:25:16.70,0:25:19.60,Default,,0000,0000,0000,,they can’t remove the malicious feature. Dialogue: 0,0:25:19.70,0:25:22.80,Default,,0000,0000,0000,,I’ve already told you about\Ntwo kinds of malicious features: Dialogue: 0,0:25:22.90,0:25:26.80,Default,,0000,0000,0000,,surveillance features,\Nsuch as are found in Windows Dialogue: 0,0:25:26.90,0:25:32.10,Default,,0000,0000,0000,,and the iPhone and Flash player\Nand the “Swindle”. Dialogue: 0,0:25:35.00,0:25:40.00,Default,,0000,0000,0000,,And there are also\Nfeatures to restrict users Dialogue: 0,0:25:40.20,0:25:42.80,Default,,0000,0000,0000,,which work with secret data formats Dialogue: 0,0:25:42.90,0:25:49.80,Default,,0000,0000,0000,,and those are found in Windows,\NMacintosh, the iPhone, Flash player Dialogue: 0,0:25:49.90,0:25:58.00,Default,,0000,0000,0000,,the Amazon “Swindle”, the Playstation 3\Nand lots and lots of other programs. Dialogue: 0,0:26:00.00,0:26:04.00,Default,,0000,0000,0000,,The other kind of malicious\Nfeature is the backdoor. Dialogue: 0,0:26:04.10,0:26:07.00,Default,,0000,0000,0000,,That means something in that program Dialogue: 0,0:26:07.10,0:26:11.60,Default,,0000,0000,0000,,is listening for remote\Ncommands and obeying them Dialogue: 0,0:26:11.70,0:26:16.00,Default,,0000,0000,0000,,and those commands can mistreat the user. Dialogue: 0,0:26:16.10,0:26:26.00,Default,,0000,0000,0000,,We know of backdoors in Windows,\Nin the iPhone, in the Amazon “Swindle”. Dialogue: 0,0:26:26.70,0:26:33.80,Default,,0000,0000,0000,,The Amazon “Swindle” has a backdoor\Nthat can remotely delete books. Dialogue: 0,0:26:33.90,0:26:38.90,Default,,0000,0000,0000,,We know this by observation,\Nbecause Amazon did it: Dialogue: 0,0:26:39.00,0:26:46.90,Default,,0000,0000,0000,,in 2009 Amazon remotely deleted\Nthousands of copies of a particular book. Dialogue: 0,0:26:47.00,0:26:52.90,Default,,0000,0000,0000,,Those were authorized copies, people\Nhad obtain them directly from Amazon Dialogue: 0,0:26:53.00,0:26:58.20,Default,,0000,0000,0000,,and thus Amazon knew exactly where they were. Dialogue: 0,0:26:58.80,0:27:03.70,Default,,0000,0000,0000,,Which is how Amazon knew where\Nto send the commands to delete those books. Dialogue: 0,0:27:03.80,0:27:11.80,Default,,0000,0000,0000,,You know which book Amazon deleted? Dialogue: 0,0:27:12.00,0:27:18.00,Default,,0000,0000,0000,,It’s a book everyone should read\Nbecause it discusses a totalitarian state Dialogue: 0,0:27:18.10,0:27:22.10,Default,,0000,0000,0000,,that did things like\Ndelete books it didn’t like. Dialogue: 0,0:27:22.70,0:27:28.00,Default,,0000,0000,0000,,Everybody should read it,\Nbut not on the Amazon “Swindle”. Dialogue: 0,0:27:31.00,0:27:39.90,Default,,0000,0000,0000,,Anyway, malicious features are present\Nin the most widely used non-free programs Dialogue: 0,0:27:40.00,0:27:46.80,Default,,0000,0000,0000,,but they are rare in free software, because\Nwith free software the users have control: Dialogue: 0,0:27:47.00,0:27:50.00,Default,,0000,0000,0000,,they can read the source code\Nand they can change it. Dialogue: 0,0:27:50.10,0:27:53.90,Default,,0000,0000,0000,,So, if there were a malicious feature Dialogue: 0,0:27:54.00,0:27:58.00,Default,,0000,0000,0000,,somebody would sooner or later\Nspot it and fix it. Dialogue: 0,0:27:58.10,0:28:01.80,Default,,0000,0000,0000,,This means that somebody who is considering Dialogue: 0,0:28:01.90,0:28:06.30,Default,,0000,0000,0000,,introducing a malicious feature\Ndoes not find it so tempting Dialogue: 0,0:28:06.40,0:28:09.80,Default,,0000,0000,0000,,because he knows he might\Nget away with it for a while Dialogue: 0,0:28:09.90,0:28:12.90,Default,,0000,0000,0000,,but somebody will spot it, will fix it Dialogue: 0,0:28:13.00,0:28:18.20,Default,,0000,0000,0000,,and everybody will loose\Ntrust in the perpetrator. Dialogue: 0,0:28:18.90,0:28:23.40,Default,,0000,0000,0000,,It’s not so tempting when\Nyou know you’re going to fail. Dialogue: 0,0:28:23.80,0:28:29.00,Default,,0000,0000,0000,,And that’s why we find that malicious\Nfeatures are rare in free software Dialogue: 0,0:28:29.00,0:28:34.00,Default,,0000,0000,0000,,and common in proprietary software. Dialogue: 0,0:28:35.00,0:28:39.60,Default,,0000,0000,0000,,Now the essential freedoms are four. Dialogue: 0,0:28:39.70,0:28:44.00,Default,,0000,0000,0000,,Freedom 0 is the freedom\Nto run the program as you wish. Dialogue: 0,0:28:44.10,0:28:49.80,Default,,0000,0000,0000,,Freedom 1 is the freedom to study\Nthe source code and change it Dialogue: 0,0:28:49.90,0:28:54.00,Default,,0000,0000,0000,,so the program does\Nyour computing the way you wish. Dialogue: 0,0:28:54.80,0:28:58.00,Default,,0000,0000,0000,,Freedom 2 is the freedom to help others. Dialogue: 0,0:28:58.10,0:29:03.60,Default,,0000,0000,0000,,That’s the freedom to make exact copies\Nand redistribute them when you wish. Dialogue: 0,0:29:03.70,0:29:09.00,Default,,0000,0000,0000,,Freedom 3 is the freedom\Nto contribute to your community. Dialogue: 0,0:29:09.10,0:29:13.70,Default,,0000,0000,0000,,That’s the freedom to make copies\Nof your modified versions Dialogue: 0,0:29:13.80,0:29:20.80,Default,,0000,0000,0000,,if you have made any, and then\Ndistribute them to others when you wish. Dialogue: 0,0:29:21.00,0:29:27.70,Default,,0000,0000,0000,,These freedoms, in order to be adequate,\Nmust apply to all activities of life. Dialogue: 0,0:29:27.80,0:29:34.00,Default,,0000,0000,0000,,For instance if it says: “This is free\Nfor academic use”, it’s not free. Dialogue: 0,0:29:34.10,0:29:38.40,Default,,0000,0000,0000,,Because that’s too limited.\NIt doesn’t apply to all areas of life. Dialogue: 0,0:29:38.50,0:29:42.00,Default,,0000,0000,0000,,In particular, if a program is free Dialogue: 0,0:29:42.10,0:29:47.90,Default,,0000,0000,0000,,that means it can be modified\Nand distributed commercially Dialogue: 0,0:29:48.00,0:29:53.00,Default,,0000,0000,0000,,because commerce is an area of life,\Nan activity in life. Dialogue: 0,0:29:53.10,0:29:56.90,Default,,0000,0000,0000,,And this freedom has to apply to all activities. Dialogue: 0,0:29:57.00,0:30:03.70,Default,,0000,0000,0000,,Now however, it’s not obligatory\Nto do any of these things. Dialogue: 0,0:30:03.80,0:30:07.90,Default,,0000,0000,0000,,The point is you’re free to do them\Nif you wish, when you wish. Dialogue: 0,0:30:08.00,0:30:12.60,Default,,0000,0000,0000,,But you never have to do them.\NYou don’t have to do any of them. Dialogue: 0,0:30:12.70,0:30:14.60,Default,,0000,0000,0000,,You don’t have to run the program. Dialogue: 0,0:30:14.70,0:30:17.00,Default,,0000,0000,0000,,You don’t have to study\Nor change the source code. Dialogue: 0,0:30:17.10,0:30:20.00,Default,,0000,0000,0000,,You don’t have to make any copies. Dialogue: 0,0:30:20.10,0:30:22.80,Default,,0000,0000,0000,,You don’t have to distribute\Nyour modified versions. Dialogue: 0,0:30:22.90,0:30:28.00,Default,,0000,0000,0000,,The point is you should be free\Nto do those things if you wish. Dialogue: 0,0:30:29.00,0:30:34.00,Default,,0000,0000,0000,,Now, freedom number 1, the freedom to study\Nand change the source code Dialogue: 0,0:30:34.10,0:30:37.90,Default,,0000,0000,0000,,to make the program do\Nyour computing as you wish Dialogue: 0,0:30:38.00,0:30:41.90,Default,,0000,0000,0000,,includes something\Nthat might not be obvious at first. Dialogue: 0,0:30:42.00,0:30:46.20,Default,,0000,0000,0000,,If the program comes in a product Dialogue: 0,0:30:47.00,0:30:51.90,Default,,0000,0000,0000,,and a developer can provide\Nan upgrade that will run Dialogue: 0,0:30:52.00,0:30:56.80,Default,,0000,0000,0000,,then you have to be able to make\Nyour version run in that product. Dialogue: 0,0:30:56.90,0:31:00.90,Default,,0000,0000,0000,,If the product would only run\Nthe developer’s versions Dialogue: 0,0:31:01.00,0:31:07.00,Default,,0000,0000,0000,,and refuses to run yours, the executable\Nin that product is not free software. Dialogue: 0,0:31:07.30,0:31:10.80,Default,,0000,0000,0000,,Even if it was compiled from free source code Dialogue: 0,0:31:10.90,0:31:13.80,Default,,0000,0000,0000,,it’s not free because\Nyou don’t have the freedom Dialogue: 0,0:31:13.90,0:31:18.00,Default,,0000,0000,0000,,to make the program do your computing\Nthe way you wish. Dialogue: 0,0:31:18.50,0:31:23.00,Default,,0000,0000,0000,,So, freedom 1 has to be real,\Nnot just theoretical. Dialogue: 0,0:31:23.10,0:31:27.00,Default,,0000,0000,0000,,It has to include the freedom\Nto use your version Dialogue: 0,0:31:27.10,0:31:31.80,Default,,0000,0000,0000,,not just the freedom to make\Nsome source code that won’t run. Dialogue: 0,0:31:33.00,0:31:37.00,Default,,0000,0000,0000,,I launched the free software movement in 1983 Dialogue: 0,0:31:37.50,0:31:40.00,Default,,0000,0000,0000,,when I announced the plan to develop Dialogue: 0,0:31:40.10,0:31:44.40,Default,,0000,0000,0000,,a free software operating system\Nwhose name is GNU. Dialogue: 0,0:31:45.40,0:31:50.00,Default,,0000,0000,0000,,Now GNU, the name GNU, is a joke. Dialogue: 0,0:31:51.50,0:31:54.00,Default,,0000,0000,0000,,Because part of the hacker’s spirit Dialogue: 0,0:31:54.10,0:31:58.80,Default,,0000,0000,0000,,is to have fun even when\Nyou’re doing something very serious. Dialogue: 0,0:31:58.90,0:32:06.80,Default,,0000,0000,0000,,Now I can’t think of anything more seriously\Nimportant than defending freedom. Dialogue: 0,0:32:11.80,0:32:16.00,Default,,0000,0000,0000,,But that didn’t mean I couldn’t give\Nmy system a name that’s a joke. Dialogue: 0,0:32:20.00,0:32:24.00,Default,,0000,0000,0000,,So GNU is a joke because\Nit’s a recursive acronym Dialogue: 0,0:32:24.10,0:32:31.00,Default,,0000,0000,0000,,it stands for “GNU is Not Unix”,\Nso G.N.U.: GNU’s Not Unix. Dialogue: 0,0:32:31.10,0:32:35.00,Default,,0000,0000,0000,,So the G in GNU stands for GNU. Dialogue: 0,0:32:36.00,0:32:39.00,Default,,0000,0000,0000,,Now in fact this was\Na tradition at the time. Dialogue: 0,0:32:39.10,0:32:43.90,Default,,0000,0000,0000,,The tradition was:\Nif there was an existing program Dialogue: 0,0:32:44.00,0:32:48.50,Default,,0000,0000,0000,,and you wrote something\Nsimilar to it, inspired by it Dialogue: 0,0:32:48.60,0:32:52.50,Default,,0000,0000,0000,,you could give credit\Nby giving your program a name Dialogue: 0,0:32:52.60,0:32:57.20,Default,,0000,0000,0000,,that’s a recursive acronym\Nsaying it’s not the other one. Dialogue: 0,0:32:58.00,0:33:03.00,Default,,0000,0000,0000,,So I gave credit to Unix for\Nthe technical ideas of Unix Dialogue: 0,0:33:03.30,0:33:09.70,Default,,0000,0000,0000,,but with the name GNU, because I decided\Nto make GNU a Unix-like system Dialogue: 0,0:33:09.80,0:33:15.70,Default,,0000,0000,0000,,with the same commands, the same system calls\Nso that it would be compatible Dialogue: 0,0:33:15.80,0:33:19.80,Default,,0000,0000,0000,,so that people who used Unix\Ncan switch over easily. Dialogue: 0,0:33:19.90,0:33:23.80,Default,,0000,0000,0000,,But the reason for developing GNU,\Nthat was unique. Dialogue: 0,0:33:23.90,0:33:28.60,Default,,0000,0000,0000,,GNU is the only operating system,\Nas far as I know Dialogue: 0,0:33:28.70,0:33:33.30,Default,,0000,0000,0000,,ever developed for the purpose of freedom. Dialogue: 0,0:33:33.40,0:33:37.70,Default,,0000,0000,0000,,Not for technical motivations,\Nnot for commercial motivations. Dialogue: 0,0:33:37.80,0:33:41.00,Default,,0000,0000,0000,,GNU was written for your freedom. Dialogue: 0,0:33:41.10,0:33:44.80,Default,,0000,0000,0000,,Because without a free operating system Dialogue: 0,0:33:44.90,0:33:49.30,Default,,0000,0000,0000,,it’s impossible to have\Nfreedom and use a computer. Dialogue: 0,0:33:49.90,0:33:54.00,Default,,0000,0000,0000,,And there were none, and\NI wanted people to have freedom Dialogue: 0,0:33:54.10,0:33:57.00,Default,,0000,0000,0000,,so it was up to me to write one. Dialogue: 0,0:33:57.10,0:34:00.90,Default,,0000,0000,0000,,Nowadays there are millions of users\Nof the GNU operating system Dialogue: 0,0:34:01.00,0:34:05.80,Default,,0000,0000,0000,,and most of them don’t know\Nthey are using the GNU operating system Dialogue: 0,0:34:05.90,0:34:10.00,Default,,0000,0000,0000,,because there is a widespread\Npractice which is not nice. Dialogue: 0,0:34:10.10,0:34:13.60,Default,,0000,0000,0000,,People call the system “Linux”. Dialogue: 0,0:34:13.70,0:34:18.80,Default,,0000,0000,0000,,Many do, but some people don’t\Nand I hope you’ll be one of them. Dialogue: 0,0:34:18.90,0:34:22.40,Default,,0000,0000,0000,,Please, since we started this Dialogue: 0,0:34:22.50,0:34:25.30,Default,,0000,0000,0000,,since we wrote the biggest piece of the code Dialogue: 0,0:34:25.40,0:34:28.00,Default,,0000,0000,0000,,please give us equal mention Dialogue: 0,0:34:28.10,0:34:36.80,Default,,0000,0000,0000,,please call the system GNU+Linux\Nor GNU/Linux. It’s not much to ask! Dialogue: 0,0:34:37.30,0:34:40.00,Default,,0000,0000,0000,,But there is another reason to do this. Dialogue: 0,0:34:40.10,0:34:44.60,Default,,0000,0000,0000,,It turns out that the person who wrote Linux Dialogue: 0,0:34:44.70,0:34:48.70,Default,,0000,0000,0000,,which is one component of the\Nsystem as we use it today Dialogue: 0,0:34:48.90,0:34:52.00,Default,,0000,0000,0000,,he doesn’t agree with\Nthe free software movement. Dialogue: 0,0:34:52.90,0:34:56.80,Default,,0000,0000,0000,,And so if you call the whole system Linux Dialogue: 0,0:34:56.90,0:35:03.50,Default,,0000,0000,0000,,in effect you’re steering people towards\Nhis ideas and away from our ideas. Dialogue: 0,0:35:03.60,0:35:07.80,Default,,0000,0000,0000,,Because he’s not gonna say to them\Nthat they deserve freedom. Dialogue: 0,0:35:07.90,0:35:15.00,Default,,0000,0000,0000,,He’s going to say to them that he likes\Nconvenient, reliable, powerful software. Dialogue: 0,0:35:15.10,0:35:19.00,Default,,0000,0000,0000,,He’s going to tell people that\Nthose are the important values. Dialogue: 0,0:35:19.10,0:35:26.70,Default,,0000,0000,0000,,But if you tell them the system is GNU+Linux,\Nthe GNU operating system plus Linux the kernel Dialogue: 0,0:35:26.80,0:35:32.30,Default,,0000,0000,0000,,then they’ll know about us\Nand then they might listen to what we say. Dialogue: 0,0:35:33.00,0:35:41.80,Default,,0000,0000,0000,,You deserve freedom, and since freedom\Nwill be lost if we don’t defend it — Dialogue: 0,0:35:41.90,0:35:46.20,Default,,0000,0000,0000,,there’s always going to be\Na Sarkozy to take it away — Dialogue: 0,0:35:47.90,0:35:52.80,Default,,0000,0000,0000,,we need above all to teach\Npeople to demand freedom Dialogue: 0,0:35:52.90,0:35:56.00,Default,,0000,0000,0000,,to be ready to stand up for their freedom Dialogue: 0,0:35:56.80,0:36:03.00,Default,,0000,0000,0000,,the next time someone threatens to take it away. Dialogue: 0,0:36:10.00,0:36:15.90,Default,,0000,0000,0000,,Nowadays, you can tell who doesn't want\Nto discuss these ideas of freedom Dialogue: 0,0:36:16.00,0:36:19.00,Default,,0000,0000,0000,,because they don’t say “logiciel libre”. Dialogue: 0,0:36:19.10,0:36:22.90,Default,,0000,0000,0000,,They don’t say “libre”,\Nthey say “open source”. Dialogue: 0,0:36:23.00,0:36:26.90,Default,,0000,0000,0000,,That term was coined by\Nthe people like Mr Torvalds Dialogue: 0,0:36:27.00,0:36:31.80,Default,,0000,0000,0000,,who would prefer that these\Nethical issues don’t get raised. Dialogue: 0,0:36:31.90,0:36:36.90,Default,,0000,0000,0000,,And so the way you can help us\Nraise them is by saying libre. Dialogue: 0,0:36:37.00,0:36:41.80,Default,,0000,0000,0000,,You know, it’s up to you where you stand\Nyou’re free to say what you think. Dialogue: 0,0:36:41.90,0:36:45.00,Default,,0000,0000,0000,,If you agree with them,\Nyou can say open source. Dialogue: 0,0:36:45.00,0:36:49.00,Default,,0000,0000,0000,,If you agree with us, show it: say libre! Dialogue: 0,0:36:51.90,0:36:55.90,Default,,0000,0000,0000,,Now the most important\Npoint about free software Dialogue: 0,0:36:56.00,0:37:02.00,Default,,0000,0000,0000,,is that schools must teach\Nexclusively free software. Dialogue: 0,0:37:02.10,0:37:05.90,Default,,0000,0000,0000,,All levels of schools from\Nkindergarten to university Dialogue: 0,0:37:06.00,0:37:13.90,Default,,0000,0000,0000,,it’s their moral responsibility to teach\Nonly free software in their education Dialogue: 0,0:37:14.00,0:37:17.00,Default,,0000,0000,0000,,and all other educational activities as well Dialogue: 0,0:37:17.10,0:37:23.00,Default,,0000,0000,0000,,including those that say that\Nthey’re spreading digital literacy. Dialogue: 0,0:37:23.10,0:37:30.00,Default,,0000,0000,0000,,A lot of those activities teach Windows,\Nwhich means they’re teaching dependence. Dialogue: 0,0:37:30.10,0:37:35.00,Default,,0000,0000,0000,,To teach people the use of proprietary\Nsoftware is to teach dependence Dialogue: 0,0:37:36.00,0:37:43.00,Default,,0000,0000,0000,,and educational activities must never do that\Nbecause it’s the opposite of their mission. Dialogue: 0,0:37:43.60,0:37:49.50,Default,,0000,0000,0000,,Educational activities have\Na social mission to educate good citizens Dialogue: 0,0:37:49.60,0:37:57.50,Default,,0000,0000,0000,,of a strong, capable, cooperating,\Nindependent and free society. Dialogue: 0,0:37:57.90,0:38:03.30,Default,,0000,0000,0000,,And in the area of computing,\Nthat means: teach free software. Dialogue: 0,0:38:04.00,0:38:11.00,Default,,0000,0000,0000,,Never teach a proprietary program\Nbecause that’s inculcating dependence. Dialogue: 0,0:38:11.20,0:38:17.90,Default,,0000,0000,0000,,Why do you think some proprietary developers\Noffer gratis copies to schools? Dialogue: 0,0:38:18.00,0:38:23.00,Default,,0000,0000,0000,,They want the schools\Nto make the children dependent. Dialogue: 0,0:38:23.20,0:38:28.00,Default,,0000,0000,0000,,And then, when they graduate,\Nthey’re still dependent Dialogue: 0,0:38:28.10,0:38:32.50,Default,,0000,0000,0000,,and you know the company is not going\Nto offer them gratis copies. Dialogue: 0,0:38:33.00,0:38:37.90,Default,,0000,0000,0000,,And some of them get jobs\Nand go to work for companies. Dialogue: 0,0:38:38.00,0:38:42.00,Default,,0000,0000,0000,,Not many of them anymore,\Nbut some of them. Dialogue: 0,0:38:42.10,0:38:46.80,Default,,0000,0000,0000,,And those companies are not going\Nto be offered gratis copies. Dialogue: 0,0:38:46.90,0:38:50.80,Default,,0000,0000,0000,,Oh no! The idea is if the school\Ndirects the students Dialogue: 0,0:38:50.90,0:38:53.50,Default,,0000,0000,0000,,down the path of permanent dependence Dialogue: 0,0:38:53.60,0:38:57.90,Default,,0000,0000,0000,,they can drag the rest of society\Nwith them into dependence. Dialogue: 0,0:38:58.00,0:39:03.50,Default,,0000,0000,0000,,That’s the plan! It’s just like\Ngiving the school gratis needles Dialogue: 0,0:39:03.60,0:39:06.90,Default,,0000,0000,0000,,full of addicting drugs, saying Dialogue: 0,0:39:07.00,0:39:11.10,Default,,0000,0000,0000,,“inject this into your students,\Nthe first dose is gratis.” Dialogue: 0,0:39:11.90,0:39:15.00,Default,,0000,0000,0000,,Once you’re dependent,\Nthen you have to pay. Dialogue: 0,0:39:15.10,0:39:18.00,Default,,0000,0000,0000,,Well, the school would reject the drugs Dialogue: 0,0:39:18.00,0:39:21.80,Default,,0000,0000,0000,,because it isn’t right to teach\Nthe students to use addictive drugs Dialogue: 0,0:39:21.90,0:39:26.90,Default,,0000,0000,0000,,and it’s got to reject\Nthe proprietary software also. Dialogue: 0,0:39:27.00,0:39:34.00,Default,,0000,0000,0000,,Some people say “let’s have the school teach\Nboth proprietary software and free software” Dialogue: 0,0:39:34.40,0:39:37.80,Default,,0000,0000,0000,,“so the students become familiar with both.” Dialogue: 0,0:39:37.90,0:39:44.40,Default,,0000,0000,0000,,That’s like saying “for lunch\Nlets give the kids spinach and tobacco” Dialogue: 0,0:39:44.50,0:39:47.80,Default,,0000,0000,0000,,“so that they become accustomed to both.” Dialogue: 0,0:39:47.90,0:39:54.40,Default,,0000,0000,0000,,No! The schools are only supposed\Nto teach good habits, not bad ones! Dialogue: 0,0:39:55.00,0:39:59.70,Default,,0000,0000,0000,,So there should be no Windows in a school Dialogue: 0,0:39:59.80,0:40:05.40,Default,,0000,0000,0000,,no Macintosh, nothing\Nproprietary in the education. Dialogue: 0,0:40:05.80,0:40:10.00,Default,,0000,0000,0000,,But also, for the sake\Nof educating good programmers. Dialogue: 0,0:40:10.10,0:40:14.80,Default,,0000,0000,0000,,You see, some people have\Na talent for programming. Dialogue: 0,0:40:14.90,0:40:19.80,Default,,0000,0000,0000,,At ten to thirteen years old,\Ntypically, they’re fascinated Dialogue: 0,0:40:19.90,0:40:24.00,Default,,0000,0000,0000,,and if they use a program, they want\Nto know “how does it do this?” Dialogue: 0,0:40:24.10,0:40:28.80,Default,,0000,0000,0000,,But when they ask the teacher,\Nif it’s proprietary, the teacher has to say Dialogue: 0,0:40:28.90,0:40:31.80,Default,,0000,0000,0000,,“I’m sorry, it’s a secret, we can’t find out.” Dialogue: 0,0:40:31.90,0:40:35.10,Default,,0000,0000,0000,,Which means education is forbidden. Dialogue: 0,0:40:35.50,0:40:40.40,Default,,0000,0000,0000,,A proprietary program is\Nthe enemy of the spirit of education. Dialogue: 0,0:40:40.50,0:40:45.90,Default,,0000,0000,0000,,It’s knowledge withheld, so\Nit should not be tolerated in a school Dialogue: 0,0:40:46.00,0:40:49.60,Default,,0000,0000,0000,,even though there may be\Nplenty of people in the school Dialogue: 0,0:40:49.70,0:40:53.30,Default,,0000,0000,0000,,who don’t care about programming,\Ndon’t want to learn this. Dialogue: 0,0:40:53.40,0:40:57.80,Default,,0000,0000,0000,,Still, because it’s the enemy\Nof the spirit of education Dialogue: 0,0:40:57.90,0:41:00.80,Default,,0000,0000,0000,,it shouldn’t be there in the school. Dialogue: 0,0:41:00.90,0:41:04.80,Default,,0000,0000,0000,,But if the program is free,\Nthe teacher can explain what he knows Dialogue: 0,0:41:04.90,0:41:07.80,Default,,0000,0000,0000,,and then give out copies\Nof the source code, saying: Dialogue: 0,0:41:07.90,0:41:10.60,Default,,0000,0000,0000,,“read it and you’ll understand everything.” Dialogue: 0,0:41:10.70,0:41:13.80,Default,,0000,0000,0000,,And those who are really\Nfascinated, they will read it! Dialogue: 0,0:41:13.90,0:41:19.70,Default,,0000,0000,0000,,And this gives them an opportunity\Nto start to learn how to be good programmers. Dialogue: 0,0:41:19.80,0:41:24.00,Default,,0000,0000,0000,,To learn to be a good programmer,\Nyou’ll need to recognize Dialogue: 0,0:41:24.10,0:41:30.30,Default,,0000,0000,0000,,that certain ways of writing code, even if\Nthey make sense to you and they are correct Dialogue: 0,0:41:30.40,0:41:35.00,Default,,0000,0000,0000,,they’re not good because other people\Nwill have trouble understanding them. Dialogue: 0,0:41:35.10,0:41:40.00,Default,,0000,0000,0000,,Good code is clear code that others\Nwill have an easy time working on Dialogue: 0,0:41:40.10,0:41:43.00,Default,,0000,0000,0000,,when they need to make further changes. Dialogue: 0,0:41:43.10,0:41:46.00,Default,,0000,0000,0000,,How do you learn to write good clear code? Dialogue: 0,0:41:46.10,0:41:49.70,Default,,0000,0000,0000,,You do it by reading lots of code,\Nand writing lots of code. Dialogue: 0,0:41:49.80,0:41:53.00,Default,,0000,0000,0000,,And only free software offers the chance Dialogue: 0,0:41:53.10,0:41:58.50,Default,,0000,0000,0000,,to read the code of large\Nprograms that we really use. Dialogue: 0,0:41:58.60,0:42:02.60,Default,,0000,0000,0000,,And then you have to write lots of code Dialogue: 0,0:42:02.70,0:42:06.00,Default,,0000,0000,0000,,which means you have\Nto write changes in large programs. Dialogue: 0,0:42:06.00,0:42:09.90,Default,,0000,0000,0000,,How do you learn to write\Ngood code for large programs? Dialogue: 0,0:42:10.00,0:42:15.80,Default,,0000,0000,0000,,You have to start small, which\Ndoes not mean small programs, oh no! Dialogue: 0,0:42:15.90,0:42:22.80,Default,,0000,0000,0000,,The challenges of the code for large programs\Ndon’t even begin to appear in small programs. Dialogue: 0,0:42:22.90,0:42:26.80,Default,,0000,0000,0000,,So the way you start small at\Nwriting code for large programs Dialogue: 0,0:42:26.90,0:42:31.30,Default,,0000,0000,0000,,is by writing small\Nchanges in large programs. Dialogue: 0,0:42:31.60,0:42:35.00,Default,,0000,0000,0000,,And only free software\Ngives you the chance to do that! Dialogue: 0,0:42:35.10,0:42:43.80,Default,,0000,0000,0000,,So, if a school wants to offer the possibility\Nof learning to be a good programmer Dialogue: 0,0:42:43.90,0:42:46.80,Default,,0000,0000,0000,,it needs to be a free software school. Dialogue: 0,0:42:46.90,0:42:49.10,Default,,0000,0000,0000,,But there is an even deeper reason Dialogue: 0,0:42:49.20,0:42:52.80,Default,,0000,0000,0000,,and that is for the sake of moral education Dialogue: 0,0:42:52.90,0:42:55.70,Default,,0000,0000,0000,,education in citizenship. Dialogue: 0,0:42:55.80,0:42:59.80,Default,,0000,0000,0000,,It’s not enough for a school\Nto teach facts and skills Dialogue: 0,0:42:59.90,0:43:07.00,Default,,0000,0000,0000,,it has to teach the spirit of goodwill,\Nthe habit of helping others. Dialogue: 0,0:43:07.10,0:43:10.00,Default,,0000,0000,0000,,Therefore, every class should have this rule: Dialogue: 0,0:43:10.10,0:43:15.00,Default,,0000,0000,0000,,“Students, if you bring software to class,\Nyou may not keep it for yourself” Dialogue: 0,0:43:15.10,0:43:18.90,Default,,0000,0000,0000,,”you must share copies\Nwith the rest of the class” Dialogue: 0,0:43:19.00,0:43:24.40,Default,,0000,0000,0000,,”including the source code\Nin case anyone here wants to learn!” Dialogue: 0,0:43:24.60,0:43:28.00,Default,,0000,0000,0000,,”Because this class is a place\Nwhere we share our knowledge.” Dialogue: 0,0:43:28.10,0:43:34.50,Default,,0000,0000,0000,,”Therefore, bringing a proprietary program\Nto class is not permitted.” Dialogue: 0,0:43:34.90,0:43:39.80,Default,,0000,0000,0000,,The school must follow\Nits own rule to set a good example. Dialogue: 0,0:43:39.90,0:43:43.70,Default,,0000,0000,0000,,Therefore, the school must bring\Nonly free software to class Dialogue: 0,0:43:43.80,0:43:49.60,Default,,0000,0000,0000,,and share copies, including the source code\Nwith anyone in the class that wants copies. Dialogue: 0,0:43:50.40,0:43:53.80,Default,,0000,0000,0000,,Those of you who have\Na connection with a school Dialogue: 0,0:43:53.90,0:44:01.40,Default,,0000,0000,0000,,it’s your duty to campaign and pressure\Nthat school to move to free software. Dialogue: 0,0:44:01.90,0:44:04.00,Default,,0000,0000,0000,,And you have to be firm. Dialogue: 0,0:44:04.10,0:44:10.70,Default,,0000,0000,0000,,It may take years, but you can succeed\Nas long as you never give up. Dialogue: 0,0:44:10.80,0:44:18.00,Default,,0000,0000,0000,,Keep seeking more allies among the students,\Nthe faculty, the staff, the parents, anyone! Dialogue: 0,0:44:18.60,0:44:22.90,Default,,0000,0000,0000,,And always bring it up as an ethical issue. Dialogue: 0,0:44:23.00,0:44:26.00,Default,,0000,0000,0000,,If someone else wants\Nto sidetrack the discussion Dialogue: 0,0:44:26.10,0:44:30.80,Default,,0000,0000,0000,,into this practical advantage\Nand this practical disadvantage Dialogue: 0,0:44:30.90,0:44:35.90,Default,,0000,0000,0000,,which means they’re ignoring the most\Nimportant question, then you have to say: Dialogue: 0,0:44:36.00,0:44:41.80,Default,,0000,0000,0000,,“this is not about how to do\Nthe best job of educating“ Dialogue: 0,0:44:41.90,0:44:48.00,Default,,0000,0000,0000,,“this is about how to do a good\Neducation instead of an evil one.“ Dialogue: 0,0:44:48.20,0:44:53.80,Default,,0000,0000,0000,,“It’s how to do education right\Ninstead of wrong“ Dialogue: 0,0:44:53.90,0:44:58.80,Default,,0000,0000,0000,,“not just how to make it\Na little more effective or less.” Dialogue: 0,0:44:59.00,0:45:06.00,Default,,0000,0000,0000,,So don’t get distracted with those secondary\Nissues and ignore what really matters! Dialogue: 0,0:45:07.00,0:45:12.00,Default,,0000,0000,0000,,So, moving on to the next menace. Dialogue: 0,0:45:12.50,0:45:20.60,Default,,0000,0000,0000,,There are two issues that arise\Nfrom the use of internet services. Dialogue: 0,0:45:20.70,0:45:26.90,Default,,0000,0000,0000,,One of them is that the server\Ncould abuse your data Dialogue: 0,0:45:27.00,0:45:31.80,Default,,0000,0000,0000,,and another is that\Nit could take control of your computing. Dialogue: 0,0:45:31.90,0:45:35.80,Default,,0000,0000,0000,,The first issue, people already know about. Dialogue: 0,0:45:35.90,0:45:41.80,Default,,0000,0000,0000,,They are aware that, if you\Nupload data to an internet service Dialogue: 0,0:45:41.90,0:45:44.90,Default,,0000,0000,0000,,there is a question of what\Nit will do with that data. Dialogue: 0,0:45:45.00,0:45:48.00,Default,,0000,0000,0000,,It might do things that mistreat you. Dialogue: 0,0:45:48.10,0:45:53.80,Default,,0000,0000,0000,,What could it do? It could lose the data,\Nit could change the data Dialogue: 0,0:45:53.90,0:45:57.90,Default,,0000,0000,0000,,it could refuse to let you get the data back. Dialogue: 0,0:45:58.00,0:46:04.00,Default,,0000,0000,0000,,And it could also show the data to\Nsomeone else you don’t want to show it to. Dialogue: 0,0:46:04.20,0:46:07.00,Default,,0000,0000,0000,,Four different possible things. Dialogue: 0,0:46:07.10,0:46:13.00,Default,,0000,0000,0000,,Now, here, I’m talking about the data\Nthat you knowingly gave to that site. Dialogue: 0,0:46:13.10,0:46:19.00,Default,,0000,0000,0000,,Of course, many of those\Nservices do surveillance as well. Dialogue: 0,0:46:19.30,0:46:22.00,Default,,0000,0000,0000,,For instance, consider Facebook. Dialogue: 0,0:46:22.10,0:46:28.00,Default,,0000,0000,0000,,Users send lots of data to Facebook,\Nand one of the bad things about Facebook Dialogue: 0,0:46:28.10,0:46:33.00,Default,,0000,0000,0000,,is that it shows a lot of\Nthat data to lots of other people Dialogue: 0,0:46:33.10,0:46:40.80,Default,,0000,0000,0000,,and even if it offers them a setting\Nto say “no!”, that may not really work. Dialogue: 0,0:46:40.90,0:46:45.90,Default,,0000,0000,0000,,After all, if you say “some other people\Ncan see this piece of information,” Dialogue: 0,0:46:46.00,0:46:48.40,Default,,0000,0000,0000,,one of them might publish it. Dialogue: 0,0:46:48.50,0:46:50.40,Default,,0000,0000,0000,,Now, that’s not Facebook’s fault Dialogue: 0,0:46:50.50,0:46:54.20,Default,,0000,0000,0000,,there is nothing they could do to\Nprevent that but it ought to warn people. Dialogue: 0,0:46:54.30,0:46:59.80,Default,,0000,0000,0000,,Instead of saying “mark this as only\Nto your so-called friends” Dialogue: 0,0:46:59.90,0:47:05.90,Default,,0000,0000,0000,,“it should say “keep in mind that your\Nso-called friends are not really your friends” Dialogue: 0,0:47:06.00,0:47:10.80,Default,,0000,0000,0000,,“and if they want to make trouble\Nfor you, they could publish this.” Dialogue: 0,0:47:10.90,0:47:17.00,Default,,0000,0000,0000,,Every time, it should say that, if\Nthey want to deal with people ethically. Dialogue: 0,0:47:21.50,0:47:26.00,Default,,0000,0000,0000,,As well as all the data users of Facebook\Nvoluntarily give to Facebook Dialogue: 0,0:47:26.00,0:47:32.70,Default,,0000,0000,0000,,Facebook is collecting through data\Nabout people’s activities on the net Dialogue: 0,0:47:32.80,0:47:38.60,Default,,0000,0000,0000,,through various methods of surveillance.\NBut that was the first menace. Dialogue: 0,0:47:38.70,0:47:45.00,Default,,0000,0000,0000,,For now I am talking about the data\Nthat people know they are giving to these sites. Dialogue: 0,0:47:47.00,0:47:54.20,Default,,0000,0000,0000,,Losing data is something that\Ncould always happen by accident. Dialogue: 0,0:47:54.40,0:47:59.00,Default,,0000,0000,0000,,That possibility is always there,\Nno matter how careful someone is. Dialogue: 0,0:47:59.10,0:48:04.00,Default,,0000,0000,0000,,Therefore, you need to keep\Nmultiple copies of data that matters. Dialogue: 0,0:48:04.10,0:48:12.00,Default,,0000,0000,0000,,If you do that, then, even if someone\Ndecided to delete your data intentionally Dialogue: 0,0:48:12.10,0:48:16.00,Default,,0000,0000,0000,,it wouldn’t hurt you that much,\Nbecause you’d have other copies of it. Dialogue: 0,0:48:16.10,0:48:19.80,Default,,0000,0000,0000,,So, as long as you are\Nmaintaining multiple copies Dialogue: 0,0:48:19.90,0:48:25.00,Default,,0000,0000,0000,,you don’t have to worry too much\Nabout someone’s losing your data. Dialogue: 0,0:48:25.60,0:48:29.60,Default,,0000,0000,0000,,What about whether you can get it back. Dialogue: 0,0:48:29.70,0:48:35.70,Default,,0000,0000,0000,,Well, some services make it possible to get\Nback all the data that you sent, and some don’t. Dialogue: 0,0:48:35.80,0:48:41.80,Default,,0000,0000,0000,,Google services will let the user\Nget back the data the user has put into them. Dialogue: 0,0:48:41.90,0:48:45.20,Default,,0000,0000,0000,,Facebook, famously, does not. Dialogue: 0,0:48:45.60,0:48:51.90,Default,,0000,0000,0000,,Of course in the case of Google, this only\Napplies to the data the user knows Google has. Dialogue: 0,0:48:52.00,0:48:57.00,Default,,0000,0000,0000,,Google does lots of surveillance, too\Nand that data is not included. Dialogue: 0,0:48:58.80,0:49:02.60,Default,,0000,0000,0000,,But in any case, if you\Ncan get the data back Dialogue: 0,0:49:02.70,0:49:07.50,Default,,0000,0000,0000,,then you could track\Nwhether they have altered it. Dialogue: 0,0:49:07.60,0:49:13.00,Default,,0000,0000,0000,,And they are not very likely to start\Naltering people’s data if the people can tell. Dialogue: 0,0:49:13.10,0:49:18.90,Default,,0000,0000,0000,,So maybe we can keep a track\Non that particular kind of abuse. Dialogue: 0,0:49:19.00,0:49:24.40,Default,,0000,0000,0000,,But the abuse of showing the data to someone\Nyou don’t want it to be shown to Dialogue: 0,0:49:24.50,0:49:29.00,Default,,0000,0000,0000,,is very common and almost\Nimpossible for you to prevent Dialogue: 0,0:49:29.60,0:49:33.10,Default,,0000,0000,0000,,especially if it’s a US company. Dialogue: 0,0:49:33.30,0:49:40.00,Default,,0000,0000,0000,,You see, the most hypocritically\Nnamed law in US history Dialogue: 0,0:49:40.10,0:49:49.90,Default,,0000,0000,0000,,the so-called USA Patriot Act,\Nsays that Big Brother’s police Dialogue: 0,0:49:50.00,0:49:56.00,Default,,0000,0000,0000,,can collect just about all the data\Nthat companies maintain about individuals. Dialogue: 0,0:49:56.10,0:50:01.70,Default,,0000,0000,0000,,Not just companies, but other\Norganizations too, like public libraries. Dialogue: 0,0:50:01.80,0:50:07.70,Default,,0000,0000,0000,,The police can get this massively,\Nwithout even going to court. Dialogue: 0,0:50:07.90,0:50:13.00,Default,,0000,0000,0000,,Now, in a country that was\Nfounded on an idea of freedom Dialogue: 0,0:50:13.10,0:50:19.00,Default,,0000,0000,0000,,there is nothing more unpatriotic\Nthan this. But this is what they did. Dialogue: 0,0:50:19.10,0:50:24.80,Default,,0000,0000,0000,,So you mustn’t ever trust any\Nof your data to a US company. Dialogue: 0,0:50:24.90,0:50:32.00,Default,,0000,0000,0000,,And they say that foreign subsidiaries\Nof US companies are subject to this as well Dialogue: 0,0:50:32.10,0:50:36.00,Default,,0000,0000,0000,,so the company you are directly\Ndealing with may be in Europe Dialogue: 0,0:50:36.00,0:50:43.00,Default,,0000,0000,0000,,but if it’s owned by a US company,\Nyou got the same problem to deal with. Dialogue: 0,0:50:48.80,0:50:52.80,Default,,0000,0000,0000,,However, this is mainly a concern Dialogue: 0,0:50:52.90,0:50:59.70,Default,,0000,0000,0000,,when the data you are sending\Nto the service is not for publication. Dialogue: 0,0:50:59.70,0:51:03.00,Default,,0000,0000,0000,,There are some services\Nwhere you publish things. Dialogue: 0,0:51:03.10,0:51:07.80,Default,,0000,0000,0000,,Of course, if you publish something,\Nyou know everybody is gonna be able to see it. Dialogue: 0,0:51:07.90,0:51:10.30,Default,,0000,0000,0000,,So, there is no way they can hurt you Dialogue: 0,0:51:10.40,0:51:13.10,Default,,0000,0000,0000,,by showing it to somebody\Nwho wasn’t supposed to see it. Dialogue: 0,0:51:13.20,0:51:17.70,Default,,0000,0000,0000,,There is nobody who wasn’t supposed\Nto see it if you published it. Dialogue: 0,0:51:17.80,0:51:22.00,Default,,0000,0000,0000,,So in that case the problem doesn’t exist. Dialogue: 0,0:51:23.50,0:51:32.00,Default,,0000,0000,0000,,So these are four sub-issues\Nof this one threat of abusing our data. Dialogue: 0,0:51:32.10,0:51:38.80,Default,,0000,0000,0000,,The idea of the Freedom Box project is\Nyou have your own server in your own home Dialogue: 0,0:51:38.90,0:51:43.00,Default,,0000,0000,0000,,and when you want to do something remotely\Nyou do it with your own server Dialogue: 0,0:51:43.10,0:51:48.80,Default,,0000,0000,0000,,and the police have to get a court order\Nin order to search your server. Dialogue: 0,0:51:48.90,0:51:56.00,Default,,0000,0000,0000,,So you have the same rights this way that you\Nwould have traditionally in the physical world. Dialogue: 0,0:51:56.30,0:52:02.00,Default,,0000,0000,0000,,The point here and in\Nso many other issues is: Dialogue: 0,0:52:02.10,0:52:06.40,Default,,0000,0000,0000,,as we start doing things\Ndigitally instead of physically Dialogue: 0,0:52:06.50,0:52:15.00,Default,,0000,0000,0000,,we shouldn’t lose any of our rights, because\Nthe general tendency is that we do lose rights. Dialogue: 0,0:52:18.20,0:52:25.00,Default,,0000,0000,0000,,Basically, Stallman’s law says Dialogue: 0,0:52:25.10,0:52:31.70,Default,,0000,0000,0000,,that in an epoch when governments\Nwork for the mega-corporations Dialogue: 0,0:52:31.80,0:52:36.00,Default,,0000,0000,0000,,instead of reporting to their citizens Dialogue: 0,0:52:36.10,0:52:45.00,Default,,0000,0000,0000,,every technological change can be taken\Nadvantage of to reduce our freedom. Dialogue: 0,0:52:47.00,0:52:51.20,Default,,0000,0000,0000,,Because reducing our freedom is what\Nthese governments want to do. Dialogue: 0,0:52:52.00,0:52:55.00,Default,,0000,0000,0000,,So the question is: when\Ndo they get an opportunity? Dialogue: 0,0:52:55.10,0:53:01.60,Default,,0000,0000,0000,,Well, any change that happens for some\Nother reason is a possible opportunity Dialogue: 0,0:53:01.70,0:53:07.00,Default,,0000,0000,0000,,and they will take advantage of it\Nif that’s their general desire. Dialogue: 0,0:53:09.50,0:53:12.40,Default,,0000,0000,0000,,But the other issue\Nwith internet services Dialogue: 0,0:53:12.50,0:53:16.00,Default,,0000,0000,0000,,is that they can take\Ncontrol of your computing Dialogue: 0,0:53:16.10,0:53:22.00,Default,,0000,0000,0000,,and that’s not so commonly known.\NBut It’s becoming more common. Dialogue: 0,0:53:22.10,0:53:29.70,Default,,0000,0000,0000,,There are services that offer to do\Ncomputing for you on data supplied by you Dialogue: 0,0:53:30.00,0:53:34.80,Default,,0000,0000,0000,,things that you should do\Nin your own computer Dialogue: 0,0:53:34.90,0:53:41.00,Default,,0000,0000,0000,,but they invite you to let somebody else’s\Ncomputer do that computing work for you. Dialogue: 0,0:53:41.30,0:53:49.20,Default,,0000,0000,0000,,And the result is you lose control over it.\NIt’s just as if you used a non-free program. Dialogue: 0,0:53:49.70,0:53:55.80,Default,,0000,0000,0000,,Two different scenarios\Nbut they lead to the same problem. Dialogue: 0,0:53:55.90,0:54:01.00,Default,,0000,0000,0000,,If you do your computing\Nwith a non-free program Dialogue: 0,0:54:01.10,0:54:05.00,Default,,0000,0000,0000,,well, the users don’t control\Nthe non-free program Dialogue: 0,0:54:05.10,0:54:08.00,Default,,0000,0000,0000,,it controls the users,\Nwhich would include you. Dialogue: 0,0:54:08.10,0:54:12.00,Default,,0000,0000,0000,,So you’ve lost control of\Nthe computing that’s being done. Dialogue: 0,0:54:12.10,0:54:17.00,Default,,0000,0000,0000,,But if you do your computing in his server Dialogue: 0,0:54:17.10,0:54:22.80,Default,,0000,0000,0000,,well, the programs that are doing it\Nare the ones he chose. Dialogue: 0,0:54:22.90,0:54:27.80,Default,,0000,0000,0000,,You can’t touch them or see them,\Nso you have no control over them. Dialogue: 0,0:54:27.90,0:54:31.00,Default,,0000,0000,0000,,He has control over them, maybe. Dialogue: 0,0:54:31.10,0:54:36.00,Default,,0000,0000,0000,,If they are free software and he installs\Nthem then he has control over them. Dialogue: 0,0:54:36.10,0:54:38.80,Default,,0000,0000,0000,,But even he might not have control. Dialogue: 0,0:54:38.90,0:54:42.20,Default,,0000,0000,0000,,He might be running a proprietary\Nprogram in his server Dialogue: 0,0:54:42.30,0:54:49.40,Default,,0000,0000,0000,,in which case it’s somebody else who has control\Nof the computing being done in his server. Dialogue: 0,0:54:49.50,0:54:52.00,Default,,0000,0000,0000,,He doesn’t control it and you don’t. Dialogue: 0,0:54:52.30,0:54:55.50,Default,,0000,0000,0000,,But suppose he installs a free program Dialogue: 0,0:54:55.60,0:55:02.00,Default,,0000,0000,0000,,then he has control over the computing\Nbeing done in his computer, but you don’t. Dialogue: 0,0:55:02.10,0:55:05.00,Default,,0000,0000,0000,,So, either way, you don’t! Dialogue: 0,0:55:05.10,0:55:08.00,Default,,0000,0000,0000,,So the only way to have\Ncontrol over your computing Dialogue: 0,0:55:08.10,0:55:14.80,Default,,0000,0000,0000,,is to do it with\Nyour copy of a free program. Dialogue: 0,0:55:15.80,0:55:20.00,Default,,0000,0000,0000,,This practice is called\N“Software as a Service”. Dialogue: 0,0:55:20.40,0:55:28.20,Default,,0000,0000,0000,,It means doing your computing with\Nyour data in somebody else’s server. Dialogue: 0,0:55:28.30,0:55:32.20,Default,,0000,0000,0000,,And I don’t know of anything\Nthat can make this acceptable. Dialogue: 0,0:55:32.30,0:55:37.00,Default,,0000,0000,0000,,It’s always something\Nthat takes away your freedom Dialogue: 0,0:55:37.10,0:55:41.40,Default,,0000,0000,0000,,and the only solution\NI know of is to refuse. Dialogue: 0,0:55:41.80,0:55:47.80,Default,,0000,0000,0000,,For instance, there are servers that\Nwill do translation or voice recognition Dialogue: 0,0:55:47.90,0:55:53.80,Default,,0000,0000,0000,,and you are letting them have\Ncontrol over this computing activity Dialogue: 0,0:55:53.90,0:55:56.00,Default,,0000,0000,0000,,which we shouldn’t ever do. Dialogue: 0,0:55:56.10,0:55:59.00,Default,,0000,0000,0000,,Of course, we are also\Ngiving them data about ourselves Dialogue: 0,0:55:59.10,0:56:02.00,Default,,0000,0000,0000,,which they shouldn’t have. Dialogue: 0,0:56:02.10,0:56:06.40,Default,,0000,0000,0000,,Imagine if you had\Na conversation with somebody Dialogue: 0,0:56:06.50,0:56:13.10,Default,,0000,0000,0000,,through a voice-recognition translation\Nsystem that was Software as as Service Dialogue: 0,0:56:13.20,0:56:18.00,Default,,0000,0000,0000,,and it’s really running\Non a server belonging to some company. Dialogue: 0,0:56:18.10,0:56:24.00,Default,,0000,0000,0000,,That company also gets to know what\Nwas said in the conversation Dialogue: 0,0:56:24.10,0:56:32.00,Default,,0000,0000,0000,,and if it’s a US company that means\NBig Brother also gets to know. This is no good. Dialogue: 0,0:56:35.70,0:56:44.00,Default,,0000,0000,0000,,The next threat to our freedom in a digital\Nsociety is using computers for voting. Dialogue: 0,0:56:46.00,0:56:50.70,Default,,0000,0000,0000,,You can’t trust computers for voting. Dialogue: 0,0:56:50.80,0:56:54.00,Default,,0000,0000,0000,,Whoever controls the software\Nin those computers Dialogue: 0,0:56:54.10,0:57:00.00,Default,,0000,0000,0000,,has the power to commit\Nundetectable fraud. Dialogue: 0,0:57:02.00,0:57:10.70,Default,,0000,0000,0000,,Elections are special. Because there’s\Nnobody involved that we dare trust fully. Dialogue: 0,0:57:10.90,0:57:15.00,Default,,0000,0000,0000,,Everybody has to be checked,\Ncrosschecked by others Dialogue: 0,0:57:15.10,0:57:21.70,Default,,0000,0000,0000,,so that nobody is in the position\Nto falsify the results by himself. Dialogue: 0,0:57:21.80,0:57:26.30,Default,,0000,0000,0000,,Because if anybody is in a position\Nto do that he might do it! Dialogue: 0,0:57:26.40,0:57:31.00,Default,,0000,0000,0000,,So our traditional systems\Nfor voting were designed Dialogue: 0,0:57:31.10,0:57:37.20,Default,,0000,0000,0000,,so that nobody was fully trusted,\Neverybody was being checked by others. Dialogue: 0,0:57:37.30,0:57:42.00,Default,,0000,0000,0000,,So that nobody could easily commit fraud. Dialogue: 0,0:57:42.00,0:57:48.30,Default,,0000,0000,0000,,But once you introduce a program,\Nthis is impossible! Dialogue: 0,0:57:48.40,0:57:53.70,Default,,0000,0000,0000,,How can you tell if a voting machine\Nwould honestly count the votes? Dialogue: 0,0:57:53.80,0:57:59.00,Default,,0000,0000,0000,,You’d have to study the program that’s\Nrunning in it during the election Dialogue: 0,0:57:59.20,0:58:05.80,Default,,0000,0000,0000,,which of course nobody can do, and most\Npeople wouldn’t even know how to do. Dialogue: 0,0:58:05.90,0:58:10.80,Default,,0000,0000,0000,,But even the experts who might theoretically\Nbe capable of studying the program Dialogue: 0,0:58:10.90,0:58:15.40,Default,,0000,0000,0000,,they can’t do it while people are voting. Dialogue: 0,0:58:15.50,0:58:18.00,Default,,0000,0000,0000,,They’d have to do it in advance Dialogue: 0,0:58:18.10,0:58:21.70,Default,,0000,0000,0000,,and then how do they know\Nthat the program they studied Dialogue: 0,0:58:21.80,0:58:26.90,Default,,0000,0000,0000,,is the one that’s running while\Npeople vote? Maybe it’s been changed. Dialogue: 0,0:58:27.00,0:58:34.00,Default,,0000,0000,0000,,Now, if this program is proprietary,\Nthat means some company controls it. Dialogue: 0,0:58:34.10,0:58:38.00,Default,,0000,0000,0000,,The election authority can’t even\Ntell what that program is doing. Dialogue: 0,0:58:38.10,0:58:41.70,Default,,0000,0000,0000,,Well, this company then\Ncould rig the election. Dialogue: 0,0:58:41.80,0:58:47.00,Default,,0000,0000,0000,,There are accusations that this was done\Nin the US within the past ten years Dialogue: 0,0:58:47.10,0:58:51.00,Default,,0000,0000,0000,,that election results were falsified this way. Dialogue: 0,0:58:51.10,0:58:54.00,Default,,0000,0000,0000,,But what if the program is free software? Dialogue: 0,0:58:54.10,0:58:57.00,Default,,0000,0000,0000,,That means the election authority Dialogue: 0,0:58:57.10,0:59:01.40,Default,,0000,0000,0000,,who owns this voting machine\Nhas control over the software in it Dialogue: 0,0:59:01.50,0:59:04.00,Default,,0000,0000,0000,,so the election authority\Ncould rig the election. Dialogue: 0,0:59:04.10,0:59:07.00,Default,,0000,0000,0000,,You can’t trust them either. Dialogue: 0,0:59:07.00,0:59:11.00,Default,,0000,0000,0000,,You don’t dare trust anybody in voting Dialogue: 0,0:59:11.10,0:59:17.00,Default,,0000,0000,0000,,and the reason is, there’s no way\Nthat the voters can verify for themselves Dialogue: 0,0:59:17.10,0:59:24.70,Default,,0000,0000,0000,,that their votes were correctly counted,\Nnor that false votes were not added. Dialogue: 0,0:59:25.00,0:59:33.00,Default,,0000,0000,0000,,In other activities of life, you can usually\Ntell if somebody is trying to cheat you. Dialogue: 0,0:59:33.10,0:59:36.80,Default,,0000,0000,0000,,Consider for instance buying\Nsomething from a store. Dialogue: 0,0:59:36.90,0:59:40.00,Default,,0000,0000,0000,,You order something, maybe\Nyou give a credit card number. Dialogue: 0,0:59:40.10,0:59:46.00,Default,,0000,0000,0000,,If the product doesn’t come,\Nyou can complain Dialogue: 0,0:59:46.10,0:59:48.40,Default,,0000,0000,0000,,and you can, of course if you got\Na good enough memory, Dialogue: 0,0:59:48.50,0:59:51.20,Default,,0000,0000,0000,,you will notice if that product doesn’t come. Dialogue: 0,0:59:51.70,0:59:59.00,Default,,0000,0000,0000,,You’re not just giving total blind trust\Nto the store, because you can check. Dialogue: 0,0:59:59.10,1:00:02.20,Default,,0000,0000,0000,,But in elections you can’t check. Dialogue: 0,1:00:02.90,1:00:06.00,Default,,0000,0000,0000,,I saw once a paper where someone described Dialogue: 0,1:00:06.10,1:00:10.20,Default,,0000,0000,0000,,a theoretical system for voting Dialogue: 0,1:00:10.80,1:00:15.20,Default,,0000,0000,0000,,which uses some sophisticated mathematics Dialogue: 0,1:00:15.30,1:00:20.00,Default,,0000,0000,0000,,so that people could check\Nthat their votes had been counted Dialogue: 0,1:00:20.10,1:00:23.00,Default,,0000,0000,0000,,even though everybody’s vote was secret Dialogue: 0,1:00:23.10,1:00:27.00,Default,,0000,0000,0000,,and they could also verify\Nthat false votes hadn’t been added. Dialogue: 0,1:00:27.10,1:00:30.80,Default,,0000,0000,0000,,It was very exciting, powerful mathematics; Dialogue: 0,1:00:30.90,1:00:34.00,Default,,0000,0000,0000,,but even if that mathematics is correct Dialogue: 0,1:00:34.10,1:00:38.00,Default,,0000,0000,0000,,that doesn’t mean the system\Nwould be acceptable to use in practice Dialogue: 0,1:00:38.10,1:00:45.70,Default,,0000,0000,0000,,because the vulnerabilities of a real\Nsystem might be outside of that mathematics. Dialogue: 0,1:00:45.90,1:00:50.30,Default,,0000,0000,0000,,For instance, suppose you’re\Nvoting over the Internet Dialogue: 0,1:00:50.40,1:00:54.20,Default,,0000,0000,0000,,and suppose you’re using\Na machine that’s a zombie. Dialogue: 0,1:00:54.80,1:00:59.00,Default,,0000,0000,0000,,It might tell you that\Nthe vote was sent for A Dialogue: 0,1:00:59.10,1:01:05.00,Default,,0000,0000,0000,,while actually sending a vote for B.\NWho knows whether you’d ever find out? Dialogue: 0,1:01:05.10,1:01:11.80,Default,,0000,0000,0000,,In practice, the only way to see\Nif these systems work and are honest Dialogue: 0,1:01:11.90,1:01:23.00,Default,,0000,0000,0000,,is through years, in fact decades, of trying\Nthem and checking in other ways what happened. Dialogue: 0,1:01:26.40,1:01:33.00,Default,,0000,0000,0000,,I wouldn’t want my country\Nto be the pioneer in this. Dialogue: 0,1:01:34.00,1:01:43.00,Default,,0000,0000,0000,,So, use paper for voting. Make sure\Nthere are ballots that can be recounted. Dialogue: 0,1:01:46.00,1:01:54.50,Default,,0000,0000,0000,,The next threat to our freedom in a digital\Nsociety comes from the war on sharing. Dialogue: 0,1:01:55.00,1:01:59.50,Default,,0000,0000,0000,,One of the tremendous benefits\Nof digital technology Dialogue: 0,1:01:59.80,1:02:08.00,Default,,0000,0000,0000,,is that it is easy to copy published works\Nand share these copies with others. Dialogue: 0,1:02:09.00,1:02:15.30,Default,,0000,0000,0000,,Sharing is good, and with\Ndigital technology, sharing is easy. Dialogue: 0,1:02:15.50,1:02:18.70,Default,,0000,0000,0000,,So, millions of people share. Dialogue: 0,1:02:18.80,1:02:23.00,Default,,0000,0000,0000,,Those who profit by having power Dialogue: 0,1:02:23.10,1:02:28.00,Default,,0000,0000,0000,,over the distribution of these\Nworks don’t want us to share. Dialogue: 0,1:02:28.80,1:02:35.00,Default,,0000,0000,0000,,And since they are businesses,\Ngovernments which have betrayed their people Dialogue: 0,1:02:35.10,1:02:40.80,Default,,0000,0000,0000,,and work for the empire of mega-corporations\Ntry to serve those businesses Dialogue: 0,1:02:40.90,1:02:46.00,Default,,0000,0000,0000,,they are against their own people, they are\Nfor the businesses, for the publishers. Dialogue: 0,1:02:46.20,1:02:52.80,Default,,0000,0000,0000,,Well, that’s not good.\NAnd with the help of these governments Dialogue: 0,1:02:52.90,1:02:58.00,Default,,0000,0000,0000,,the companies have been waging war on sharing Dialogue: 0,1:02:58.10,1:03:05.70,Default,,0000,0000,0000,,and they’ve proposed a series\Nof cruel draconian measures. Dialogue: 0,1:03:05.80,1:03:08.80,Default,,0000,0000,0000,,Why do they propose cruel draconian measures? Dialogue: 0,1:03:08.90,1:03:13.80,Default,,0000,0000,0000,,Because nothing less has a chance of success: Dialogue: 0,1:03:13.90,1:03:19.00,Default,,0000,0000,0000,,when something is good\Nand easy, people do it. Dialogue: 0,1:03:20.00,1:03:24.80,Default,,0000,0000,0000,,And the only way to stop them\Nis by being very nasty. Dialogue: 0,1:03:24.90,1:03:31.00,Default,,0000,0000,0000,,So of course, what they propose is nasty,\Nnasty, and the next one is nastier. Dialogue: 0,1:03:33.00,1:03:41.00,Default,,0000,0000,0000,,So they tried suing teenagers for hundreds\Nof thousands of dollars — that was pretty nasty. Dialogue: 0,1:03:41.60,1:03:46.00,Default,,0000,0000,0000,,And they tried turning\Nour technology against us Dialogue: 0,1:03:46.10,1:03:51.90,Default,,0000,0000,0000,,Digital Restrictions Management\Nthat means, digital handcuffs. Dialogue: 0,1:03:52.00,1:03:57.60,Default,,0000,0000,0000,,But among the people\Nthere were clever programmers too Dialogue: 0,1:03:57.70,1:04:01.00,Default,,0000,0000,0000,,and they found ways to break the handcuffs. Dialogue: 0,1:04:01.10,1:04:08.60,Default,,0000,0000,0000,,For instance, DVDs were designed to have\Nencrypted movies in a secret encryption format Dialogue: 0,1:04:08.70,1:04:14.60,Default,,0000,0000,0000,,and the idea was that all\Nthe programs to decrypt the video Dialogue: 0,1:04:14.70,1:04:18.70,Default,,0000,0000,0000,,would be proprietary with digital handcuffs. Dialogue: 0,1:04:18.80,1:04:22.00,Default,,0000,0000,0000,,They would all be designed\Nto restrict the users. Dialogue: 0,1:04:22.10,1:04:25.00,Default,,0000,0000,0000,,And their scheme worked okay for a while. Dialogue: 0,1:04:25.10,1:04:29.00,Default,,0000,0000,0000,,But some people in Europe\Nfigured out the encryption Dialogue: 0,1:04:29.10,1:04:37.00,Default,,0000,0000,0000,,and they released a free program that\Ncould actually play the video on a DVD. Dialogue: 0,1:04:40.30,1:04:44.00,Default,,0000,0000,0000,,Well, the movie companies\Ndidn’t leave it there. Dialogue: 0,1:04:44.10,1:04:51.70,Default,,0000,0000,0000,,They went to the US congress and bought\Na law making that software illegal. Dialogue: 0,1:04:51.80,1:04:58.60,Default,,0000,0000,0000,,The United States invented\Ncensorship of software in 1998 Dialogue: 0,1:04:58.70,1:05:02.00,Default,,0000,0000,0000,,with the Digital Millennium\NCopyright Act [DMCA]. Dialogue: 0,1:05:02.10,1:05:08.00,Default,,0000,0000,0000,,So the distribution of that free program\Nwas forbidden in the United States. Dialogue: 0,1:05:08.10,1:05:11.80,Default,,0000,0000,0000,,Unfortunately it didn’t stop\Nwith the United States. Dialogue: 0,1:05:11.90,1:05:21.00,Default,,0000,0000,0000,,The European Union adopted a directive\Nin 2003 I believe, requiring such laws. Dialogue: 0,1:05:21.30,1:05:27.90,Default,,0000,0000,0000,,The directive only says that\Ncommercial distribution has to be banned Dialogue: 0,1:05:28.00,1:05:34.00,Default,,0000,0000,0000,,but just about every country in\Nthe European Union has adopted a nastier law. Dialogue: 0,1:05:34.70,1:05:40.40,Default,,0000,0000,0000,,In France, the mere possession\Nof a copy of that program Dialogue: 0,1:05:40.50,1:05:46.00,Default,,0000,0000,0000,,is an offense punished by\Nimprisonment, thanks to Sarkozy. Dialogue: 0,1:05:47.90,1:05:52.40,Default,,0000,0000,0000,,I believe that was done by the law DADVSI. Dialogue: 0,1:05:53.00,1:05:56.30,Default,,0000,0000,0000,,I guess he hoped that with\Nan unpronounceable name Dialogue: 0,1:05:56.40,1:06:00.00,Default,,0000,0000,0000,,people wouldn’t be able to criticize it. Dialogue: 0,1:06:02.00,1:06:08.00,Default,,0000,0000,0000,,So, elections are coming.\NAsk the candidates in the parties: Dialogue: 0,1:06:08.10,1:06:14.40,Default,,0000,0000,0000,,will you repeal the DADVSI?\NAnd if not, don’t support them. Dialogue: 0,1:06:14.80,1:06:22.40,Default,,0000,0000,0000,,You mustn’t give up lost\Nmoral territory forever. Dialogue: 0,1:06:22.50,1:06:26.00,Default,,0000,0000,0000,,You’ve got to fight to win it back. Dialogue: 0,1:06:26.10,1:06:31.60,Default,,0000,0000,0000,,So, we still are fighting\Nagainst digital handcuffs. Dialogue: 0,1:06:31.80,1:06:36.00,Default,,0000,0000,0000,,The Amazon “Swindle” has digital handcuffs Dialogue: 0,1:06:36.10,1:06:41.30,Default,,0000,0000,0000,,to take away the traditional freedoms\Nof readers to do things such as: Dialogue: 0,1:06:41.40,1:06:46.00,Default,,0000,0000,0000,,give a book to someone else,\Nor lend a book to someone else. Dialogue: 0,1:06:46.10,1:06:49.00,Default,,0000,0000,0000,,That’s a vitally important social act. Dialogue: 0,1:06:49.10,1:06:55.40,Default,,0000,0000,0000,,That is what builds society\Namong people who read: lending books. Dialogue: 0,1:06:55.50,1:06:59.00,Default,,0000,0000,0000,,Amazon doesn’t want to let\Npeople lend books freely. Dialogue: 0,1:06:59.10,1:07:08.00,Default,,0000,0000,0000,,And then there is also selling a book, perhaps\Nto a used bookstore. You can’t do that either. Dialogue: 0,1:07:12.00,1:07:18.00,Default,,0000,0000,0000,,It looked for a while as if\NDRM had disappeared on music Dialogue: 0,1:07:18.10,1:07:25.90,Default,,0000,0000,0000,,but now they’re bringing it back\Nwith streaming services such as Spotify. Dialogue: 0,1:07:26.00,1:07:31.00,Default,,0000,0000,0000,,These services all require\Nproprietary client software Dialogue: 0,1:07:31.10,1:07:37.00,Default,,0000,0000,0000,,and the reason is so they can put\Ndigital handcuffs on the users. Dialogue: 0,1:07:37.70,1:07:44.60,Default,,0000,0000,0000,,So, reject them! They already\Nshowed quite openly Dialogue: 0,1:07:44.70,1:07:48.00,Default,,0000,0000,0000,,that you can’t trust them,\Nbecause first they said: Dialogue: 0,1:07:48.10,1:07:51.00,Default,,0000,0000,0000,,“you can listen as much as you like”,\Nand then they said: Dialogue: 0,1:07:51.10,1:07:55.00,Default,,0000,0000,0000,,“Oh, no! You can only listen\Na certain number of hours a month.” Dialogue: 0,1:07:57.90,1:08:06.80,Default,,0000,0000,0000,,The issue is not whether that particular\Nchange was good or bad, just or unjust; Dialogue: 0,1:08:06.90,1:08:11.30,Default,,0000,0000,0000,,the point is, they have the power\Nto impose any change in policies. Dialogue: 0,1:08:11.40,1:08:14.50,Default,,0000,0000,0000,,So don’t let them have that power. Dialogue: 0,1:08:14.60,1:08:21.00,Default,,0000,0000,0000,,You should have your own copy\Nof any music you want to listen to. Dialogue: 0,1:08:22.10,1:08:34.50,Default,,0000,0000,0000,,And then came the next assault on our freedom:\NHADOPI, basically punishment on accusation. Dialogue: 0,1:08:34.60,1:08:41.40,Default,,0000,0000,0000,,It was started in France but it’s been\Nexported to many other countries. Dialogue: 0,1:08:41.80,1:08:50.00,Default,,0000,0000,0000,,The United States now demand such unjust\Npolicies in its free exploitation treaties. Dialogue: 0,1:08:50.10,1:09:00.00,Default,,0000,0000,0000,,A few months ago, Columbia adopted such a law\Nunder orders from its masters in Washington. Dialogue: 0,1:09:01.00,1:09:05.00,Default,,0000,0000,0000,,Of course, the ones in Washington\Nare not the real masters Dialogue: 0,1:09:05.10,1:09:10.50,Default,,0000,0000,0000,,they’re just the ones who control the\NUnited States on behalf of the Empire. Dialogue: 0,1:09:11.00,1:09:19.00,Default,,0000,0000,0000,,But they’re the ones who also dictate\Nto Columbia on behalf of the Empire. Dialogue: 0,1:09:21.90,1:09:27.80,Default,,0000,0000,0000,,In France, since the\NConstitutional Council Dialogue: 0,1:09:27.90,1:09:33.00,Default,,0000,0000,0000,,objected to explicitly giving\Npeople punishment without trial Dialogue: 0,1:09:33.10,1:09:36.80,Default,,0000,0000,0000,,they invented a kind of trial\Nwhich is not a real trial Dialogue: 0,1:09:36.90,1:09:39.00,Default,,0000,0000,0000,,which is just a form of a trial Dialogue: 0,1:09:39.10,1:09:44.30,Default,,0000,0000,0000,,so they can pretend that people\Nhave a trial before they’re punished. Dialogue: 0,1:09:44.40,1:09:47.00,Default,,0000,0000,0000,,But in other countries\Nthey don’t bother with that Dialogue: 0,1:09:47.10,1:09:52.00,Default,,0000,0000,0000,,it’s explicit punishment on accusation only. Dialogue: 0,1:09:53.00,1:09:57.00,Default,,0000,0000,0000,,Which means that for the sake\Nof their war on sharing Dialogue: 0,1:09:57.10,1:10:01.40,Default,,0000,0000,0000,,they’re prepared to abolish\Nthe basic principles of justice. Dialogue: 0,1:10:01.50,1:10:08.70,Default,,0000,0000,0000,,It shows how thoroughly\Nanti-freedom, anti-justice they are. Dialogue: 0,1:10:08.80,1:10:12.00,Default,,0000,0000,0000,,These are not legitimate governments. Dialogue: 0,1:10:15.50,1:10:19.00,Default,,0000,0000,0000,,And I’m sure they’ll\Ncome up with more nasty ideas Dialogue: 0,1:10:19.10,1:10:27.00,Default,,0000,0000,0000,,because they’re paid to defeat\Nthe people no matter what it takes. Dialogue: 0,1:10:28.70,1:10:36.00,Default,,0000,0000,0000,,Now, when they do this, they always say\Nthat it’s for the sake of the artists Dialogue: 0,1:10:36.10,1:10:42.00,Default,,0000,0000,0000,,that they have “protect” the “creators”. Dialogue: 0,1:10:42.10,1:10:45.00,Default,,0000,0000,0000,,Now those are both propaganda terms. Dialogue: 0,1:10:45.10,1:10:48.20,Default,,0000,0000,0000,,I‘m convinced that the reason\Nthey love the word “creators“ Dialogue: 0,1:10:48.30,1:10:53.40,Default,,0000,0000,0000,,is because it is a comparison with a deity. Dialogue: 0,1:10:53.50,1:10:57.00,Default,,0000,0000,0000,,They want us to think of artists as super-human Dialogue: 0,1:10:57.10,1:11:03.00,Default,,0000,0000,0000,,and thus deserving special\Nprivileges and power over us Dialogue: 0,1:11:03.60,1:11:06.80,Default,,0000,0000,0000,,which is something I disagree with. Dialogue: 0,1:11:06.90,1:11:15.00,Default,,0000,0000,0000,,In fact though, the only artists that benefit\Nvery much from this system are the big stars. Dialogue: 0,1:11:15.30,1:11:20.30,Default,,0000,0000,0000,,The other artists are getting\Ncrushed into the ground Dialogue: 0,1:11:20.40,1:11:24.40,Default,,0000,0000,0000,,by the heels of these same companies. Dialogue: 0,1:11:25.60,1:11:30.30,Default,,0000,0000,0000,,But they treat the stars very well,\Nbecause the stars have a lot of clout. Dialogue: 0,1:11:30.40,1:11:34.00,Default,,0000,0000,0000,,If a star threatens to move to\Nanother company, the company says: Dialogue: 0,1:11:34.10,1:11:36.50,Default,,0000,0000,0000,,“oh, we’ll give you what you want.” Dialogue: 0,1:11:36.60,1:11:44.00,Default,,0000,0000,0000,,But for any other artist they say: “you don’t\Nmatter, we can treat you any way we like.” Dialogue: 0,1:11:46.60,1:11:54.20,Default,,0000,0000,0000,,So the superstars have been corrupted by the\Nmillions of dollars or euros that they get Dialogue: 0,1:11:54.30,1:12:01.30,Default,,0000,0000,0000,,to the point where they’ll do\Nalmost anything for more money. Dialogue: 0,1:12:01.90,1:12:06.20,Default,,0000,0000,0000,,For instance, J. K. Rowling is a good example. Dialogue: 0,1:12:07.80,1:12:12.80,Default,,0000,0000,0000,,J. K. Rowling, a few years ago,\Nwent to court in Canada Dialogue: 0,1:12:12.90,1:12:21.20,Default,,0000,0000,0000,,and obtained an order that people who\Nhad bought her books must not read them. Dialogue: 0,1:12:21.80,1:12:27.00,Default,,0000,0000,0000,,She got an order telling\Npeople not to read her books. Dialogue: 0,1:12:27.50,1:12:34.90,Default,,0000,0000,0000,,Here’s what happened. A bookstore put\Nthe books on display for sale too early Dialogue: 0,1:12:35.00,1:12:38.60,Default,,0000,0000,0000,,before the day they\Nwere supposed to go on sale. Dialogue: 0,1:12:38.70,1:12:40.70,Default,,0000,0000,0000,,And people came into the store and said: Dialogue: 0,1:12:40.80,1:12:44.60,Default,,0000,0000,0000,,“oh, I want that!” and they bought it\Nand took away their copies. Dialogue: 0,1:12:44.70,1:12:50.80,Default,,0000,0000,0000,,Then, they discovered the mistake\Nso they took the copies off of display. Dialogue: 0,1:12:52.20,1:13:01.70,Default,,0000,0000,0000,,But Rowling wanted to crush any circulation\Nof any information from those books Dialogue: 0,1:13:01.80,1:13:04.90,Default,,0000,0000,0000,,so she went to court, and the court ordered Dialogue: 0,1:13:05.00,1:13:10.00,Default,,0000,0000,0000,,those people not to read\Nthe books that they now owned. Dialogue: 0,1:13:11.90,1:13:19.00,Default,,0000,0000,0000,,In response, I call for a total\Nboycott of Harry Potter. Dialogue: 0,1:13:20.20,1:13:25.00,Default,,0000,0000,0000,,But I don’t say you shouldn’t read\Nthose books or watch the movies Dialogue: 0,1:13:25.10,1:13:30.00,Default,,0000,0000,0000,,I only say you shouldn’t buy\Nthe books or pay for the movies. Dialogue: 0,1:13:30.30,1:13:36.30,Default,,0000,0000,0000,,I leave it to Rowling to tell\Npeople not to read the books. Dialogue: 0,1:13:37.80,1:13:44.00,Default,,0000,0000,0000,,As far as I’m concerned, if you borrow\Nthe book and read it, that’s okay. Dialogue: 0,1:13:44.80,1:13:52.90,Default,,0000,0000,0000,,Just don’t give her any money!\NBut this happened with paper books. Dialogue: 0,1:13:53.00,1:13:57.00,Default,,0000,0000,0000,,The court could make this order\Nbut it couldn’t get the books back Dialogue: 0,1:13:57.10,1:13:59.90,Default,,0000,0000,0000,,from the people who had bought them. Dialogue: 0,1:14:00.00,1:14:06.40,Default,,0000,0000,0000,,Imagine if they were ebooks. Imagine if\Nthey were ebooks on the “Swindle”. Dialogue: 0,1:14:06.50,1:14:12.00,Default,,0000,0000,0000,,Amazon could send commands to erase them. Dialogue: 0,1:14:16.00,1:14:25.40,Default,,0000,0000,0000,,So, I don’t have much respect for stars\Nwho will go to such lengths for more money. Dialogue: 0,1:14:25.50,1:14:31.30,Default,,0000,0000,0000,,But most artists aren’t like that, they\Nnever got enough money to be corrupted. Dialogue: 0,1:14:31.80,1:14:39.00,Default,,0000,0000,0000,,Because the current system of copyright\Nsupports most artists very badly. Dialogue: 0,1:14:39.10,1:14:47.00,Default,,0000,0000,0000,,And so, when these companies demand\Nto expand the war on sharing Dialogue: 0,1:14:47.10,1:14:50.00,Default,,0000,0000,0000,,supposedly for the sake of the artists Dialogue: 0,1:14:50.10,1:14:54.40,Default,,0000,0000,0000,,I’m against what they want but I would\Nlike to support the artists better. Dialogue: 0,1:14:54.50,1:15:01.00,Default,,0000,0000,0000,,I appreciate their work and I realize if we\Nwant them to do more work we should support them. Dialogue: 0,1:15:01.10,1:15:05.00,Default,,0000,0000,0000,,I have two proposals\Nfor how to support artists Dialogue: 0,1:15:05.10,1:15:09.00,Default,,0000,0000,0000,,methods that are compatible with sharing. Dialogue: 0,1:15:09.10,1:15:15.00,Default,,0000,0000,0000,,That would allow us to end the war\Non sharing and still support artists. Dialogue: 0,1:15:15.10,1:15:18.00,Default,,0000,0000,0000,,One method uses tax money. Dialogue: 0,1:15:18.10,1:15:24.80,Default,,0000,0000,0000,,We get a certain amount of public\Nfunds to distribute among artists. Dialogue: 0,1:15:25.70,1:15:32.40,Default,,0000,0000,0000,,But, how much should each artist get?\NWe have to measure popularity. Dialogue: 0,1:15:32.50,1:15:38.10,Default,,0000,0000,0000,,The current system supposedly supports\Nartists based on their popularity. Dialogue: 0,1:15:38.20,1:15:44.80,Default,,0000,0000,0000,,So I’m saying let’s keep that, let’s\Ncontinue on this system based on popularity. Dialogue: 0,1:15:44.90,1:15:48.00,Default,,0000,0000,0000,,We can measure the popularity\Nof all the artists Dialogue: 0,1:15:48.10,1:15:54.10,Default,,0000,0000,0000,,with some kind of polling or sampling,\Nso that we don’t have to do surveillance. Dialogue: 0,1:15:54.20,1:15:57.00,Default,,0000,0000,0000,,We can respect people’s anonymity. Dialogue: 0,1:15:57.10,1:16:01.00,Default,,0000,0000,0000,,We get a raw popularity figure for each artist. Dialogue: 0,1:16:01.10,1:16:05.00,Default,,0000,0000,0000,,How do we convert that into an amount of money? Dialogue: 0,1:16:05.10,1:16:12.00,Default,,0000,0000,0000,,The obvious way is: distribute\Nthe money in proportion to popularity. Dialogue: 0,1:16:12.60,1:16:21.00,Default,,0000,0000,0000,,So if A is a thousand times as popular as B\NA will get a thousand times as much money as B. Dialogue: 0,1:16:21.30,1:16:25.00,Default,,0000,0000,0000,,That’s not efficient distribution of the money. Dialogue: 0,1:16:25.10,1:16:28.00,Default,,0000,0000,0000,,It’s not putting the money to good use. Dialogue: 0,1:16:28.10,1:16:36.00,Default,,0000,0000,0000,,It’s easy for a star A to be a thousand times\Nas popular as a fairly successful artist B. Dialogue: 0,1:16:36.10,1:16:44.00,Default,,0000,0000,0000,,If we use linear proportion, we’ll give A\Na thousand times as much money as we give B. Dialogue: 0,1:16:44.10,1:16:50.00,Default,,0000,0000,0000,,And that means that, either we have\Nto make A tremendously rich Dialogue: 0,1:16:50.10,1:16:54.50,Default,,0000,0000,0000,,or we are not supporting B enough. Dialogue: 0,1:16:55.00,1:16:59.00,Default,,0000,0000,0000,,The money we use to make\NA tremendously rich Dialogue: 0,1:16:59.10,1:17:06.20,Default,,0000,0000,0000,,is failing to do an effective job of\Nsupporting the arts; so, it’s inefficient. Dialogue: 0,1:17:06.30,1:17:12.00,Default,,0000,0000,0000,,Therefore I say: let’s use the cube root.\NCube root looks sort of like this. Dialogue: 0,1:17:12.10,1:17:17.70,Default,,0000,0000,0000,,The point is: if A is a thousand\Ntimes as popular as B Dialogue: 0,1:17:17.80,1:17:22.20,Default,,0000,0000,0000,,with the cube root A\Nwill get ten times as much as B Dialogue: 0,1:17:22.80,1:17:25.80,Default,,0000,0000,0000,,not a thousand times as much,\Njust ten times as much. Dialogue: 0,1:17:25.90,1:17:30.00,Default,,0000,0000,0000,,The use of the cube root\Nshifts a lot of the money Dialogue: 0,1:17:30.10,1:17:36.00,Default,,0000,0000,0000,,from the stars to the artists\Nof moderate popularity. Dialogue: 0,1:17:36.60,1:17:44.00,Default,,0000,0000,0000,,And that means, with less money we can adequately\Nsupport a much larger number of artists. Dialogue: 0,1:17:44.10,1:17:49.00,Default,,0000,0000,0000,,There are two reasons why this system\Nwould use less money than we pay now. Dialogue: 0,1:17:49.10,1:17:53.00,Default,,0000,0000,0000,,First of all because it would be\Nsupporting artists but not companies. Dialogue: 0,1:17:53.10,1:18:01.60,Default,,0000,0000,0000,,Second because it would shift the money from\Nthe stars to the artists of moderate popularity. Dialogue: 0,1:18:02.00,1:18:09.30,Default,,0000,0000,0000,,Now, it would remain the case that the more\Npopular you are, the more money you get. Dialogue: 0,1:18:09.70,1:18:17.00,Default,,0000,0000,0000,,So the star A would still get more\Nthan B, but not astronomically more. Dialogue: 0,1:18:19.80,1:18:24.00,Default,,0000,0000,0000,,That’s one method, and because\Nit won’t be so much money Dialogue: 0,1:18:24.10,1:18:27.10,Default,,0000,0000,0000,,it doesn’t matter so much\Nhow we get the money. Dialogue: 0,1:18:27.20,1:18:31.00,Default,,0000,0000,0000,,It could be from a special tax\Non Internet connectivity Dialogue: 0,1:18:31.10,1:18:36.00,Default,,0000,0000,0000,,it could just be some of the general budget\Nthat gets allocated to this purpose. Dialogue: 0,1:18:36.10,1:18:39.90,Default,,0000,0000,0000,,We won’t care because\Nit won’t be so much money; Dialogue: 0,1:18:40.00,1:18:43.30,Default,,0000,0000,0000,,much less than we’re paying now. Dialogue: 0,1:18:43.90,1:18:47.80,Default,,0000,0000,0000,,The other method I’ve proposed\Nis voluntary payments. Dialogue: 0,1:18:47.90,1:18:55.00,Default,,0000,0000,0000,,Suppose each player had a button\Nyou could use to send one euro. Dialogue: 0,1:18:55.90,1:19:01.00,Default,,0000,0000,0000,,A lot of people would send it,\Nafter all it’s not that much money. Dialogue: 0,1:19:01.10,1:19:06.40,Default,,0000,0000,0000,,I think a lot of you might\Npush that button every day Dialogue: 0,1:19:06.50,1:19:12.30,Default,,0000,0000,0000,,to give one euro to some artist\Nwho had made a work that you liked. Dialogue: 0,1:19:12.70,1:19:15.00,Default,,0000,0000,0000,,But nothing would demand this Dialogue: 0,1:19:15.10,1:19:19.20,Default,,0000,0000,0000,,you wouldn’t be required or ordered\Nor pressured to send the money; Dialogue: 0,1:19:19.30,1:19:21.80,Default,,0000,0000,0000,,you would do it because you felt like it. Dialogue: 0,1:19:21.90,1:19:25.00,Default,,0000,0000,0000,,But there are some people\Nwho wouldn’t do it Dialogue: 0,1:19:25.10,1:19:29.00,Default,,0000,0000,0000,,because they’re poor and they\Ncan’t afford to give one euro. Dialogue: 0,1:19:29.10,1:19:32.00,Default,,0000,0000,0000,,And it’s good that they won’t give it. Dialogue: 0,1:19:32.10,1:19:36.00,Default,,0000,0000,0000,,We don’t have to squeeze money\Nout of poor people to support the artists. Dialogue: 0,1:19:36.10,1:19:41.00,Default,,0000,0000,0000,,There are enough non poor people\Nwho’ll be happy to do it. Dialogue: 0,1:19:41.10,1:19:48.00,Default,,0000,0000,0000,,Why wouldn’t you give one euro to some\Nartists today, if you appreciated their work? Dialogue: 0,1:19:48.10,1:19:56.40,Default,,0000,0000,0000,,It’s too inconvenient to give it to them.\NSo my proposal is to remove the inconvenience. Dialogue: 0,1:19:56.50,1:20:02.00,Default,,0000,0000,0000,,If the only reason not to give that euro is\Nyou would have one euro less Dialogue: 0,1:20:02.10,1:20:06.00,Default,,0000,0000,0000,,you would do it fairly often. Dialogue: 0,1:20:07.80,1:20:13.00,Default,,0000,0000,0000,,So these are my two proposals\Nfor how to support artists Dialogue: 0,1:20:13.10,1:20:19.00,Default,,0000,0000,0000,,while encouraging sharing\Nbecause sharing is good. Dialogue: 0,1:20:19.10,1:20:25.00,Default,,0000,0000,0000,,Let’s put an end to the war on sharing,\Nlaws like DADVSI and HADOPI. Dialogue: 0,1:20:25.20,1:20:29.00,Default,,0000,0000,0000,,It’s not just the methods\Nthat they propose that are evil Dialogue: 0,1:20:29.10,1:20:31.00,Default,,0000,0000,0000,,their purpose is evil. Dialogue: 0,1:20:31.10,1:20:36.00,Default,,0000,0000,0000,,That’s why they propose\Ncruel and draconian measures. Dialogue: 0,1:20:36.10,1:20:41.00,Default,,0000,0000,0000,,They’re trying to do something\Nthat’s nasty by nature. Dialogue: 0,1:20:41.10,1:20:45.30,Default,,0000,0000,0000,,So let’s support artists in other ways. Dialogue: 0,1:20:45.90,1:20:52.00,Default,,0000,0000,0000,,The last threat to our freedom\Nin digital society is the fact Dialogue: 0,1:20:52.10,1:21:01.00,Default,,0000,0000,0000,,that we don’t have a firm right\Nto do the things we do, in cyberspace. Dialogue: 0,1:21:02.00,1:21:05.80,Default,,0000,0000,0000,,In the physical world,\Nif you have certain views Dialogue: 0,1:21:05.90,1:21:11.40,Default,,0000,0000,0000,,and you want to give people copies\Nof a text that defends those views Dialogue: 0,1:21:11.50,1:21:16.00,Default,,0000,0000,0000,,you’re free to do so. You could\Neven buy a printer to print them Dialogue: 0,1:21:16.10,1:21:20.90,Default,,0000,0000,0000,,and you’re free to hand them out on the street Dialogue: 0,1:21:21.00,1:21:25.00,Default,,0000,0000,0000,,or you’re free to rent\Na store and hand them out there. Dialogue: 0,1:21:25.10,1:21:29.00,Default,,0000,0000,0000,,If you want to collect\Nmoney to support your cause Dialogue: 0,1:21:29.10,1:21:33.80,Default,,0000,0000,0000,,you can just have a can and people\Ncould put money into the can. Dialogue: 0,1:21:33.90,1:21:42.00,Default,,0000,0000,0000,,You don’t need to get somebody else’s\Napproval or cooperation to do these things. Dialogue: 0,1:21:42.10,1:21:47.20,Default,,0000,0000,0000,,But, in the Internet, you do need that. Dialogue: 0,1:21:47.30,1:21:51.00,Default,,0000,0000,0000,,For instance if you want\Nto distribute a text on the Internet Dialogue: 0,1:21:51.10,1:21:58.00,Default,,0000,0000,0000,,you need companies to help you do it.\NYou can’t do it by yourself. Dialogue: 0,1:21:58.10,1:22:06.00,Default,,0000,0000,0000,,So if you want to have a website, you need\Nthe support of an ISP or a hosting company Dialogue: 0,1:22:06.10,1:22:09.00,Default,,0000,0000,0000,,and you need a domain name registrar. Dialogue: 0,1:22:09.10,1:22:14.40,Default,,0000,0000,0000,,You need them to continue\Nto let you do what you’re doing. Dialogue: 0,1:22:14.50,1:22:20.70,Default,,0000,0000,0000,,So you’re doing it effectively\Non sufferance, not by right. Dialogue: 0,1:22:20.90,1:22:25.80,Default,,0000,0000,0000,,And if you want to receive money,\Nyou can’t just hold out a can. Dialogue: 0,1:22:25.90,1:22:33.00,Default,,0000,0000,0000,,You need the cooperation\Nof a payment company. Dialogue: 0,1:22:37.70,1:22:45.80,Default,,0000,0000,0000,,And we saw that this makes all of our\Ndigital activities vulnerable to suppression. Dialogue: 0,1:22:45.90,1:22:49.00,Default,,0000,0000,0000,,We learned this when the United States government Dialogue: 0,1:22:49.10,1:22:54.00,Default,,0000,0000,0000,,launched a distributed denial of service\Nattack [DDoS] against WikiLeaks. Dialogue: 0,1:22:54.10,1:23:00.90,Default,,0000,0000,0000,,Now I’m making a bit of a joke because\Nthe words “distributed denial of service attack” Dialogue: 0,1:23:01.00,1:23:05.00,Default,,0000,0000,0000,,usually refer to a different kind of attack. Dialogue: 0,1:23:05.10,1:23:09.00,Default,,0000,0000,0000,,But they fit perfectly with\Nwhat the United States did. Dialogue: 0,1:23:09.00,1:23:16.00,Default,,0000,0000,0000,,The United States went to the various kinds\Nof network services that WikiLeaks depended on Dialogue: 0,1:23:16.10,1:23:22.40,Default,,0000,0000,0000,,and told them to cut off\Nservice to WikiLeaks. And they did. Dialogue: 0,1:23:22.50,1:23:27.30,Default,,0000,0000,0000,,For instance, WikiLeaks had rented\Na virtual Amazon server Dialogue: 0,1:23:27.80,1:23:35.00,Default,,0000,0000,0000,,and the US government told Amazon: “cut off\Nservice for WikiLeaks.” And it did, arbitrarily. Dialogue: 0,1:23:36.00,1:23:41.40,Default,,0000,0000,0000,,And then, Amazon had certain domain names\Nsuch as wikileaks.org Dialogue: 0,1:23:41.70,1:23:47.00,Default,,0000,0000,0000,,the US government tried to get\Nall those domains shut off. Dialogue: 0,1:23:47.10,1:23:53.00,Default,,0000,0000,0000,,But it didn’t succeed, some of them were\Noutside its control and were not shut off. Dialogue: 0,1:23:55.00,1:24:02.50,Default,,0000,0000,0000,,Then, there were the payment companies.\NThe US went to PayPal and said: Dialogue: 0,1:24:02.60,1:24:07.30,Default,,0000,0000,0000,,“Stop transferring money to WikiLeaks\Nor we’ll make life difficult for you.” Dialogue: 0,1:24:07.40,1:24:11.00,Default,,0000,0000,0000,,And PayPal shut off payments to WikiLeaks. Dialogue: 0,1:24:11.10,1:24:18.00,Default,,0000,0000,0000,,And then it went to Visa and Mastercard and\Ngot them to shut off payments to WikiLeaks. Dialogue: 0,1:24:18.10,1:24:27.00,Default,,0000,0000,0000,,Others started collecting money on WikiLeaks\Nbehalf and their accounts were shut off too. Dialogue: 0,1:24:27.10,1:24:31.30,Default,,0000,0000,0000,,But in this case, maybe something can be done. Dialogue: 0,1:24:31.60,1:24:38.00,Default,,0000,0000,0000,,There’s a company in Iceland which began\Ncollecting money on behalf of WikiLeaks Dialogue: 0,1:24:38.10,1:24:41.70,Default,,0000,0000,0000,,and so Visa and Mastercard shut off its account; Dialogue: 0,1:24:41.80,1:24:46.00,Default,,0000,0000,0000,,it couldn’t receive money\Nfrom its customers either. Dialogue: 0,1:24:46.10,1:24:51.70,Default,,0000,0000,0000,,Now, that business is suing Visa and\NMastercard apparently under European Union law Dialogue: 0,1:24:51.80,1:24:56.60,Default,,0000,0000,0000,,because Visa and Mastercard\Ntogether have a near-monopoly. Dialogue: 0,1:24:56.70,1:25:01.50,Default,,0000,0000,0000,,They’re not allowed to arbitrarily\Ndeny service to anyone. Dialogue: 0,1:25:01.60,1:25:05.00,Default,,0000,0000,0000,,Well, this is an example\Nof how things need to be Dialogue: 0,1:25:05.10,1:25:10.50,Default,,0000,0000,0000,,for all kinds of services\Nthat we use in the Internet. Dialogue: 0,1:25:10.70,1:25:17.00,Default,,0000,0000,0000,,If you rented a store to hand out\Nstatements of what you think Dialogue: 0,1:25:17.10,1:25:22.40,Default,,0000,0000,0000,,or any other kind of information\Nthat you can lawfully distribute Dialogue: 0,1:25:22.50,1:25:27.80,Default,,0000,0000,0000,,the landlord couldn’t kick you out just\Nbecause he didn’t like what you were saying. Dialogue: 0,1:25:27.90,1:25:32.80,Default,,0000,0000,0000,,As long as you keep paying the rent,\Nyou have the right to continue in that store Dialogue: 0,1:25:32.90,1:25:37.00,Default,,0000,0000,0000,,for a certain agreed-on period\Nof time that you signed. Dialogue: 0,1:25:37.10,1:25:41.00,Default,,0000,0000,0000,,So you have some rights\Nthat you can enforce. Dialogue: 0,1:25:41.10,1:25:44.30,Default,,0000,0000,0000,,And they couldn’t shut off\Nyour telephone line Dialogue: 0,1:25:44.40,1:25:48.50,Default,,0000,0000,0000,,because the phone company\Ndoesn’t like what you said Dialogue: 0,1:25:48.60,1:25:55.00,Default,,0000,0000,0000,,or because some powerful entity didn’t like\Nwhat you said and threatened the phone company. Dialogue: 0,1:25:55.10,1:26:03.30,Default,,0000,0000,0000,,No! As long as you pay the bills\Nand obey certain basic rules Dialogue: 0,1:26:03.40,1:26:11.00,Default,,0000,0000,0000,,they can’t shut off your phone line.\NThis is what it’s like to have some rights! Dialogue: 0,1:26:11.10,1:26:18.30,Default,,0000,0000,0000,,Well, if we move our activities from\Nthe physical world to the virtual world Dialogue: 0,1:26:18.70,1:26:27.00,Default,,0000,0000,0000,,then either we have the same rights in the\Nvirtual world, or we have been harmed. Dialogue: 0,1:26:28.00,1:26:37.00,Default,,0000,0000,0000,,So, the precarity of all our Internet activities\Nis the last of the menaces I wanted to mention. Dialogue: 0,1:26:37.10,1:26:46.00,Default,,0000,0000,0000,,Now I’d like to say that for more information\Nabout free software, look at GNU.org. Dialogue: 0,1:26:46.10,1:26:52.40,Default,,0000,0000,0000,,Also look at fsf.org, which is the website\Nof the Free Software Foundation. Dialogue: 0,1:26:52.50,1:26:58.40,Default,,0000,0000,0000,,You can go there and find many ways\Nyou can help us, for instance. Dialogue: 0,1:26:58.50,1:27:03.50,Default,,0000,0000,0000,,You can also become a member of the Free\NSoftware Foundation through that site Dialogue: 0,1:27:03.60,1:27:11.10,Default,,0000,0000,0000,,if you're going to do e-commerce.\NIf you'd like to join and pay cash Dialogue: 0,1:27:11.20,1:27:14.10,Default,,0000,0000,0000,,right here you can do that too.\NI've got cards you can fill out. Dialogue: 0,1:27:14.20,1:27:24.00,Default,,0000,0000,0000,,There is also the Free Software Foundation\Nof Europe fsfe.org. You can join FSFE also. Dialogue: 0,1:27:24.50,1:27:28.00,Default,,0000,0000,0000,,Can you accept membership in cash? Dialogue: 0,1:27:28.10,1:27:31.00,Default,,0000,0000,0000,,Is there someone who wants to join right now? Dialogue: 0,1:27:31.10,1:27:37.00,Default,,0000,0000,0000,,Ok, so you can join FSFE also\Npaying with cash. Dialogue: 0,1:27:39.00,1:27:42.00,Default,,0000,0000,0000,,Now it's time and, by the way Dialogue: 0,1:27:42.10,1:27:47.70,Default,,0000,0000,0000,,I know the case of the FSF\Nwe get most of our funds from members Dialogue: 0,1:27:47.80,1:27:53.00,Default,,0000,0000,0000,,so joining is really important\Nand probably for FSFE as well. Dialogue: 0,1:27:53.10,1:27:57.00,Default,,0000,0000,0000,,Now it's time for me to raise funds\Nin another way. Dialogue: 0,1:27:57.10,1:28:04.00,Default,,0000,0000,0000,,This is an adorable gnu\Nthat needs a home. Dialogue: 0,1:28:05.00,1:28:11.40,Default,,0000,0000,0000,,And I'm going to auction it on behalf\Nof the Free Software Foundation. Dialogue: 0,1:28:11.80,1:28:17.00,Default,,0000,0000,0000,,If you buy the gnu, I'll sign\Na card for you, if you like Dialogue: 0,1:28:17.60,1:28:22.00,Default,,0000,0000,0000,,and if you have a penguin\Nyou need to get a gnu Dialogue: 0,1:28:22.10,1:28:28.00,Default,,0000,0000,0000,,because as we all know a penguin\Ncan hardly function without a gnu. Dialogue: 0,1:28:31.00,1:28:38.00,Default,,0000,0000,0000,,When you bid, please wave your arm\Nand shout the quantity you are bidding Dialogue: 0,1:28:38.10,1:28:40.60,Default,,0000,0000,0000,,so that I notice you. Dialogue: 0,1:28:40.70,1:28:44.00,Default,,0000,0000,0000,,If you are bidding, I think you\Nwant me to notice that you're bidding. Dialogue: 0,1:28:46.00,1:28:51.00,Default,,0000,0000,0000,,The FSF can accept payments\Neither in cash or with a credit card. Dialogue: 0,1:28:51.10,1:28:56.00,Default,,0000,0000,0000,,If the credit card works for ordering\Nby telephone then it won't work with us. Dialogue: 0,1:28:57.00,1:29:03.00,Default,,0000,0000,0000,,So, I'm going to start with 20 euros.\NDo I get 20 euros? Dialogue: 0,1:29:03.60,1:29:07.00,Default,,0000,0000,0000,,I've got 20 euros, do I have 25? Dialogue: 0,1:29:09.10,1:29:12.00,Default,,0000,0000,0000,,How much? Dialogue: 0,1:29:16.00,1:29:20.00,Default,,0000,0000,0000,,Trente?\NOk, I've got 30 euros, do I have 35? Dialogue: 0,1:29:21.10,1:29:24.80,Default,,0000,0000,0000,,How much?\NI've got 35, do I get 40? Dialogue: 0,1:29:25.00,1:29:28.20,Default,,0000,0000,0000,,I have 42 Dialogue: 0,1:29:32.00,1:29:36.00,Default,,0000,0000,0000,,I have 42 euros, do I have 50? Dialogue: 0,1:29:36.80,1:29:40.40,Default,,0000,0000,0000,,How much?\NI've got 50, do I get 60? Dialogue: 0,1:29:46.00,1:29:49.00,Default,,0000,0000,0000,,I've got 60, do I get 70? Dialogue: 0,1:29:52.10,1:29:56.00,Default,,0000,0000,0000,,How much?\NI've got 70, do I get 80? Dialogue: 0,1:30:02.00,1:30:05.00,Default,,0000,0000,0000,,I've got 80, do I get 90? Dialogue: 0,1:30:05.10,1:30:11.00,Default,,0000,0000,0000,,I've got 80 euros, do I get 90\Nfor this adorable gnu? Dialogue: 0,1:30:14.40,1:30:20.00,Default,,0000,0000,0000,,How much?\NI've got 100 euros, do I get 110? Dialogue: 0,1:30:25.00,1:30:29.00,Default,,0000,0000,0000,,I've got 110, do I get 120? Dialogue: 0,1:30:30.00,1:30:34.00,Default,,0000,0000,0000,,I've got 120, do I get 130? Dialogue: 0,1:30:39.00,1:30:46.00,Default,,0000,0000,0000,,I've got 130, do I get 140? Dialogue: 0,1:30:46.10,1:30:51.00,Default,,0000,0000,0000,,How much?\NI've got 140, do I get 150? Dialogue: 0,1:30:54.70,1:30:58.00,Default,,0000,0000,0000,,I've got 150, do I get 160? Dialogue: 0,1:30:58.50,1:31:02.00,Default,,0000,0000,0000,,I've got 160, do I get 170? Dialogue: 0,1:31:05.00,1:31:10.00,Default,,0000,0000,0000,,How much?\NI've got 170, do I get 180? Dialogue: 0,1:31:14.10,1:31:18.20,Default,,0000,0000,0000,,Do you bid?\NI've got 200 Dialogue: 0,1:31:25.00,1:31:29.00,Default,,0000,0000,0000,,I've got 200, do I get 210? Dialogue: 0,1:31:32.60,1:31:36.00,Default,,0000,0000,0000,,I've got 210, do I get 220? Dialogue: 0,1:31:44.00,1:31:49.80,Default,,0000,0000,0000,,I've got 220, do I get 230? Dialogue: 0,1:31:49.90,1:31:54.60,Default,,0000,0000,0000,,Do I get 230 for this adorable gnu\Nthat needs a home? Dialogue: 0,1:31:54.70,1:32:00.00,Default,,0000,0000,0000,,Do I get 230 to the Free Software\NFoundation to defend freedom? Dialogue: 0,1:32:01.70,1:32:05.00,Default,,0000,0000,0000,,Last chance to bid. How much? Dialogue: 0,1:32:06.20,1:32:10.00,Default,,0000,0000,0000,,I've got 230, do I get 240? Dialogue: 0,1:32:14.00,1:32:17.10,Default,,0000,0000,0000,,I've got 240, do I get 250? Dialogue: 0,1:32:20.00,1:32:23.50,Default,,0000,0000,0000,,For this adorable gnu\Nto defend freedom? Dialogue: 0,1:32:23.60,1:32:28.00,Default,,0000,0000,0000,,How much?\NI've got 300 Dialogue: 0,1:32:32.00,1:32:44.00,Default,,0000,0000,0000,,I've got 300, do I get 320 for this\Nadorable gnu to defend freedom? Dialogue: 0,1:32:46.50,1:32:53.00,Default,,0000,0000,0000,,I've got 320, do I get 340? Dialogue: 0,1:32:55.60,1:33:00.00,Default,,0000,0000,0000,,How much? 340?\NI've got 340, do I get 360? Dialogue: 0,1:33:04.00,1:33:08.00,Default,,0000,0000,0000,,What? I've got 340. Dialogue: 0,1:33:09.00,1:33:14.10,Default,,0000,0000,0000,,No, no I don't want to go up by such\Nsmall increments, we'll be here all night Dialogue: 0,1:33:14.20,1:33:18.00,Default,,0000,0000,0000,,I've got 340, do I get 360? Dialogue: 0,1:33:19.60,1:33:23.00,Default,,0000,0000,0000,,I've got 360, do I get 380? Dialogue: 0,1:33:23.10,1:33:30.00,Default,,0000,0000,0000,,I've got 380, do I get 400? Dialogue: 0,1:33:30.10,1:33:34.50,Default,,0000,0000,0000,,to defend freedom?\Nfor this adorable gnu, do I get 400? Dialogue: 0,1:33:34.70,1:33:41.00,Default,,0000,0000,0000,,I've got 380, do I get 400?\NLast chance to bid, 400 or more. Dialogue: 0,1:33:41.10,1:33:46.00,Default,,0000,0000,0000,,Last chance, going... Dialogue: 0,1:33:46.50,1:33:54.20,Default,,0000,0000,0000,,I've got 400, do I get 420? Dialogue: 0,1:33:57.10,1:34:07.00,Default,,0000,0000,0000,,How much?\NI've got 420, do I get 440? Dialogue: 0,1:34:07.80,1:34:13.00,Default,,0000,0000,0000,,Last chance to bid 440 or more\Nfor this adorable gnu. Dialogue: 0,1:34:13.70,1:34:20.60,Default,,0000,0000,0000,,Do I get 440?\NLast chance, going, going Dialogue: 0,1:34:21.00,1:34:25.00,Default,,0000,0000,0000,,sold for 420. Dialogue: 0,1:34:29.20,1:34:37.70,Default,,0000,0000,0000,,Please note that there are stickers\Nwhich are gratuit to take. Dialogue: 0,1:34:37.80,1:34:40.30,Default,,0000,0000,0000,,Please take as many as you can\Nand make good use of. Dialogue: 0,1:34:40.40,1:34:48.70,Default,,0000,0000,0000,,There are also various small things\Nto sell, like badges and elegant pins Dialogue: 0,1:34:48.90,1:34:51.60,Default,,0000,0000,0000,,and the money supports\Nthe Free Software Foundation. Dialogue: 0,1:34:51.70,1:34:53.00,Default,,0000,0000,0000,,Anyway now it's time for me\Nto answer questions.