WEBVTT 00:00:10.000 --> 00:00:14.000 Thank you. Congratulations to the students [of the Digital Freedoms association] 00:00:14.100 --> 00:00:16.000 who organized this meeting. 00:00:16.100 --> 00:00:19.900 They are right, not only because Richard is famous 00:00:20.000 --> 00:00:22.200 but also because the subject is very interesting to us. 00:00:22.300 --> 00:00:25.000 They are especially interesting here at Sciences Po 00:00:25.100 --> 00:00:29.200 since first, we try to study controversies; 00:00:29.300 --> 00:00:31.200 some of you here have studied controversies 00:00:31.300 --> 00:00:34.100 and Richard himself is a controversial character. 00:00:34.200 --> 00:00:37.000 I have not found anything on the Web that allows to find consensus 00:00:37.100 --> 00:00:45.100 nor about what he does, nor what he says, nor the words he uses, so he's an ideal case study 00:00:45.200 --> 00:00:48.700 for us who study cartographies of controversies in this institution. 00:00:48.800 --> 00:00:51.700 Somehow we have a controversial character 00:00:51.800 --> 00:00:53.700 on subjects that are important to us. 00:00:53.800 --> 00:00:56.800 Second, obviously, is the subject itself 00:00:56.900 --> 00:01:01.000 and the question of how much freedom and control 00:01:04.650 --> 00:01:08.200 that are at the core of all these digital innovations 00:01:08.300 --> 00:01:11.000 are directly interesting, for political science 00:01:11.100 --> 00:01:14.300 sociology, also law. 00:01:14.400 --> 00:01:18.000 All questions that interest us in this institution. 00:01:18.100 --> 00:01:21.800 It's by the way interesting that Richard comes here 00:01:21.900 --> 00:01:28.100 a few days after Steve Jobs died, a death that he celebrated in his own way if I dare to say 00:01:28.200 --> 00:01:32.200 explaining that his loss was not a huge disaster 00:01:32.300 --> 00:01:36.100 for all those questions of digital freedoms 00:01:36.200 --> 00:01:40.000 because - even though Steve Jobs could be esteemed 00:01:40.100 --> 00:01:42.800 the control he had on software 00:01:42.900 --> 00:01:47.000 and its domination make us in some way free 00:01:47.100 --> 00:01:51.000 but under the form, as he says it in several opinions, 00:01:51.100 --> 00:01:54.200 of a "jail made cool" -- a jail that I like myself 00:01:54.300 --> 00:01:56.600 since I am myself an adept of the Macintosh 00:01:56.700 --> 00:01:59.000 but this is obviously not the kind of character 00:01:59.100 --> 00:02:01.600 or the kind of freedom that Richard is thinking about. 00:02:01.700 --> 00:02:04.000 The third reason is that, obviously 00:02:04.100 --> 00:02:06.700 for a lot of questions that are directly interesting to us 00:02:06.800 --> 00:02:09.000 in this institution about scientific humanities 00:02:09.100 --> 00:02:11.700 is the link between technical innovation 00:02:11.800 --> 00:02:14.700 and political devices that interests us directly. 00:02:14.800 --> 00:02:17.700 So we have at least, anyway myself at the scientific direction 00:02:17.800 --> 00:02:23.000 three reasons to enjoy the initiative of the students group 00:02:23.100 --> 00:02:25.000 which organized this meeting 00:02:25.100 --> 00:02:28.000 and I am happy to let Richard Stallman speak 00:02:28.100 --> 00:02:31.100 and please applause him before. 00:02:37.700 --> 00:02:43.100 Projects with the goal of digital inclusion are making a big assumption. 00:02:43.200 --> 00:02:48.600 They are assuming that participating in a digital society is good; 00:02:48.700 --> 00:02:51.000 but that’s not necessarily true. 00:02:51.100 --> 00:02:54.800 Being in a digital society can be good or bad 00:02:54.900 --> 00:03:00.800 depending on whether that digital society is just or unjust. 00:03:02.000 --> 00:03:09.000 There are many ways in which our freedom is being attacked by digital technology. 00:03:09.100 --> 00:03:17.100 Digital technology can make things worse, and it will, unless we fight to prevent it. 00:03:20.900 --> 00:03:26.000 Therefore, if we have an unjust digital society 00:03:26.100 --> 00:03:30.000 we should cancel these projects for digital inclusion 00:03:30.100 --> 00:03:34.000 and launch projects for digital extraction. 00:03:34.500 --> 00:03:41.400 We have to extract people from digital society if it doesn’t respect their freedom; 00:03:41.500 --> 00:03:44.800 or we have to make it respect their freedom. 00:03:45.100 --> 00:03:50.000 So, what are the threats? First, surveillance. 00:03:50.100 --> 00:03:54.000 Computers are Stalin’s dream. 00:03:54.100 --> 00:03:57.600 They are ideal tools for surveillance 00:03:57.700 --> 00:04:03.000 because anything we do with computers, the computers can record. 00:04:03.100 --> 00:04:05.000 They can record the information 00:04:05.100 --> 00:04:10.900 in a perfectly indexed searchable form in a central database 00:04:11.000 --> 00:04:17.100 ideal for any tyrant who wants to crush opposition. 00:04:19.800 --> 00:04:24.100 Surveillance is sometimes done with our own computers. 00:04:24.700 --> 00:04:30.000 For instance, if you have a computer that’s running Microsoft Windows 00:04:30.100 --> 00:04:33.000 that system is doing surveillance. 00:04:33.100 --> 00:04:38.300 There are features in Windows that send data to some server. 00:04:38.400 --> 00:04:41.000 Data about the use of the computer. 00:04:41.100 --> 00:04:45.700 A surveillance feature was discovered in the iPhone a few months ago 00:04:45.800 --> 00:04:48.800 and people started calling it the “spy-phone”. 00:04:51.000 --> 00:04:54.600 Flash player has a surveillance feature too 00:04:54.800 --> 00:04:58.200 and so does the Amazon “Swindle”. 00:04:58.700 --> 00:05:04.000 They call it the Kindle, but I call it the Swindle, l’escroc 00:05:04.500 --> 00:05:08.200 because it’s meant to swindle users out of their freedom. 00:05:08.800 --> 00:05:14.000 It makes people identify themselves whenever they buy a book 00:05:14.200 --> 00:05:21.000 and that means Amazon has a giant list of all the books each user has read. 00:05:21.400 --> 00:05:25.100 And such a list must not exist anywhere. 00:05:27.100 --> 00:05:32.000 Most portable phones will transmit their location 00:05:32.100 --> 00:05:38.100 computed using GPS, on remote command. 00:05:38.900 --> 00:05:45.900 And the phone company is accumulating a giant list of places that the user has been. 00:05:46.100 --> 00:05:51.100 A German from the Green Party asked the phone company 00:05:51.200 --> 00:05:56.000 to give him the data it had about where he was. 00:05:56.500 --> 00:05:59.800 He had to sue, he had to go to court to get this information. 00:05:59.900 --> 00:06:06.000 And when he got it, he received forty-four thousand location points 00:06:06.100 --> 00:06:08.100 for a period of six months. 00:06:08.200 --> 00:06:12.400 That’s more than two hundred per day. 00:06:12.800 --> 00:06:20.000 So what that means is someone could form a very good picture of his activities 00:06:20.100 --> 00:06:24.000 just by looking at that data. 00:06:28.000 --> 00:06:32.800 We can stop our own computers from doing surveillance on us 00:06:32.900 --> 00:06:37.100 if we have control of the software that they run. 00:06:38.000 --> 00:06:43.000 But the software these people are running, they don’t have control over. 00:06:43.100 --> 00:06:49.100 It’s non-free software and that’s why it has malicious features, such as surveillance. 00:06:49.700 --> 00:06:54.600 However, the surveillance is not always done with our own computers 00:06:54.700 --> 00:06:57.700 it’s also done at one remove. 00:06:57.800 --> 00:07:02.100 For instance ISPs in Europe are required 00:07:02.200 --> 00:07:09.000 to keep data about the user’s internet communications for a long time 00:07:09.100 --> 00:07:16.100 in case the State decides to investigate that person later 00:07:16.200 --> 00:07:19.100 for whatever imaginable reason. 00:07:22.000 --> 00:07:26.900 And with a portable phone, even if you can stop the phone 00:07:27.000 --> 00:07:30.000 from transmitting your GPS location 00:07:30.100 --> 00:07:34.100 the system can determine the phone’s location approximately 00:07:34.200 --> 00:07:40.700 by comparing the time when the signals arrive at different towers. 00:07:41.000 --> 00:07:45.000 So the phone system can do surveillance 00:07:45.100 --> 00:07:49.400 even without special cooperation from the phone itself. 00:07:54.000 --> 00:07:59.700 Likewise, the bicycles that people rent in Paris. 00:07:59.800 --> 00:08:02.900 Of course the system knows where you get the bicycle 00:08:03.000 --> 00:08:06.000 and it knows where you return the bicycle 00:08:06.000 --> 00:08:10.000 and I’ve heard reports that it tracks the bicycles 00:08:10.600 --> 00:08:14.000 as they are moving around as well. 00:08:15.100 --> 00:08:23.000 So they are not something we can really trust. 00:08:23.300 --> 00:08:30.900 But there are also systems that have nothing to do with us that exist only for tracking. 00:08:31.000 --> 00:08:37.800 For instance, in the UK all car travel is monitored. 00:08:37.900 --> 00:08:43.500 Every car’s movements are being recorded in real time 00:08:43.600 --> 00:08:47.200 and can be tracked by the State in real time. 00:08:47.300 --> 00:08:52.000 This is done with cameras on the side of the road. 00:08:52.400 --> 00:08:57.100 Now, the only way we can prevent surveillance 00:08:57.200 --> 00:09:01.000 that’s done at one remove or by unrelated systems 00:09:01.100 --> 00:09:07.100 is through political action against increased government power 00:09:07.200 --> 00:09:11.100 to track and monitor everyone. 00:09:11.500 --> 00:09:17.000 Which means of course we have to reject whatever excuse they come up with. 00:09:18.000 --> 00:09:25.000 For doing such systems, no excuse is valid to monitor everyone. 00:09:25.600 --> 00:09:31.800 In a free society, when you go out in public you are not guaranteed anonymity. 00:09:31.900 --> 00:09:36.500 It’s possible for someone to recognize you and remember. 00:09:36.600 --> 00:09:41.800 And later that person could say that he saw you at a certain place. 00:09:42.000 --> 00:09:45.000 But that information is diffuse. 00:09:45.100 --> 00:09:52.000 It’s not conveniently assembled to track everybody and investigate what they did. 00:09:52.100 --> 00:09:55.700 To collect that information is a lot of work 00:09:55.800 --> 00:10:01.000 so it’s only done in special cases when it’s necessary. 00:10:02.800 --> 00:10:06.000 But computerized surveillance makes it possible 00:10:06.100 --> 00:10:09.800 to centralize and index all this information 00:10:09.900 --> 00:10:16.900 so that an unjust regime can find it all and find out all about everyone. 00:10:17.000 --> 00:10:21.000 If a dictator takes power, which could happen anywhere 00:10:21.400 --> 00:10:25.500 people realize this and they recognize 00:10:25.600 --> 00:10:31.500 that they should not communicate with other dissidents 00:10:31.600 --> 00:10:36.000 in a way that the State could find out about. 00:10:36.100 --> 00:10:40.400 But if the dictator has several years of stored records 00:10:40.500 --> 00:10:46.000 of who talks with whom, it’s too late to take any precautions then. 00:10:46.300 --> 00:10:51.000 Because he already has everything he needs to realize 00:10:51.100 --> 00:10:56.000 “OK this guy is a dissident and he spoke with him. Maybe he is a dissident too.” 00:10:56.100 --> 00:11:00.100 “Maybe we should grab him and torture him.” 00:11:02.000 --> 00:11:11.800 So we need to campaign to put an end to digital surveillance now. 00:11:12.000 --> 00:11:17.300 You can’t wait until there is a dictator and it would really matter. 00:11:17.600 --> 00:11:26.000 And besides, it doesn’t take an outright dictatorship to start attacking human rights. 00:11:27.000 --> 00:11:31.600 I wouldn’t quite call the government of the UK a dictatorship. 00:11:31.700 --> 00:11:39.000 It’s not very democratic and one way it crushes democracy is using surveillance. 00:11:39.100 --> 00:11:45.000 A few years ago, people believed to be on their way to a protest 00:11:45.100 --> 00:11:47.000 they were going to protest. 00:11:47.100 --> 00:11:50.000 They were arrested before they could get there 00:11:50.100 --> 00:11:58.000 because their car was tracked through this universal car tracking system. 00:12:03.900 --> 00:12:07.000 The second threat is censorship. 00:12:07.100 --> 00:12:11.700 Censorship is not new, it existed long before computers. 00:12:11.800 --> 00:12:17.700 But 15 years ago, we thought that the Internet would protect us from censorship 00:12:17.800 --> 00:12:20.700 that it would defeat censorship. 00:12:20.800 --> 00:12:25.000 Then, China and some other obvious tyrannies 00:12:25.100 --> 00:12:30.800 went to great lengths to impose censorship on the Internet, and we said: 00:12:30.900 --> 00:12:34.800 “well that’s not surprising, what else would governments like that do?” 00:12:34.900 --> 00:12:39.000 But today we see censorship imposed in countries 00:12:39.100 --> 00:12:44.900 that are not normally thought of as dictatorships 00:12:45.000 --> 00:12:53.300 such as for instance the UK, France, Spain, Italy, Denmark… 00:12:54.400 --> 00:13:00.700 They all have systems of blocking access to some websites. 00:13:00.900 --> 00:13:04.000 Denmark established a system 00:13:04.100 --> 00:13:10.900 that blocks access to a long list of webpages, which was secret. 00:13:11.000 --> 00:13:15.800 The citizens were not supposed to know how the government was censoring them 00:13:15.900 --> 00:13:19.800 but the list was leaked, and posted on WikiLeaks. 00:13:19.900 --> 00:13:26.000 At that point, Denmark added the WikiLeaks page to its censorship list. 00:13:27.500 --> 00:13:30.000 So, the whole rest of the world can find out 00:13:30.100 --> 00:13:35.000 how Danes are being censored, but Danes are not supposed to know. 00:13:35.900 --> 00:13:43.800 A few months ago, Turkey, which claims to respect some human rights 00:13:43.900 --> 00:13:47.000 announced that every Internet user 00:13:47.100 --> 00:13:51.000 would have to choose between censorship and more censorship. 00:13:51.500 --> 00:13:54.900 Four different levels of censorship they get to choose! 00:13:55.000 --> 00:14:02.000 But freedom is not one of the options. 00:14:04.400 --> 00:14:09.100 Australia wanted to impose filtering on the Internet but that was blocked. 00:14:09.200 --> 00:14:13.000 However Australia has a different kind of censorship. 00:14:13.100 --> 00:14:15.900 It has censorship of links. 00:14:16.000 --> 00:14:20.500 That is, if a website in Australia has a link 00:14:20.600 --> 00:14:23.900 to some censored site outside Australia 00:14:24.000 --> 00:14:27.000 the one in Australia can be punished. 00:14:27.100 --> 00:14:29.000 Electronic Frontier Australia 00:14:29.100 --> 00:14:32.900 which is an organization that defends human rights 00:14:33.000 --> 00:14:36.700 in the digital domain in Australia 00:14:36.800 --> 00:14:41.200 posted a link to a foreign political website. 00:14:41.900 --> 00:14:49.000 It was ordered to delete the link or face a penalty of $11,000 a day. 00:14:49.500 --> 00:14:52.000 So they deleted it, what else could they do? 00:14:52.100 --> 00:14:55.800 This is a very harsh system of censorship. 00:14:55.900 --> 00:15:01.800 In Spain, the censorship that was adopted earlier this year 00:15:02.000 --> 00:15:12.700 allows officials to arbitrarily shut down an Internet site in Spain 00:15:12.800 --> 00:15:17.400 or impose filtering to block access to a site outside of Spain. 00:15:17.500 --> 00:15:22.000 And they can do this without any kind of trial. 00:15:22.100 --> 00:15:27.000 This was one of the motivations for the Indignados 00:15:29.400 --> 00:15:33.000 who have been protesting in the street. 00:15:34.300 --> 00:15:38.800 There were protests in the street in Turkey as well after that announcement 00:15:38.900 --> 00:15:42.800 but the government refused to change its policy. 00:15:42.900 --> 00:15:46.600 We must recognize that a country 00:15:46.700 --> 00:15:50.800 that imposes censorship on the Internet is not a free country. 00:15:51.000 --> 00:15:57.000 And is not a legitimate government either. 00:16:05.800 --> 00:16:13.300 The next threat to our freedom comes from data formats that restrict the users. 00:16:13.900 --> 00:16:17.000 Sometimes it’s because the format is secret. 00:16:17.100 --> 00:16:20.000 There are many application programs 00:16:20.100 --> 00:16:25.000 that save the user’s data in a secret format 00:16:25.900 --> 00:16:28.800 which is meant to prevent the user 00:16:28.900 --> 00:16:33.000 from taking that data and using it with some other program. 00:16:33.100 --> 00:16:38.000 The goal is to prevent interoperability. 00:16:38.700 --> 00:16:45.000 Now evidently, if the program implements a secret format 00:16:45.100 --> 00:16:48.800 that’s because the program is not free software. 00:16:48.900 --> 00:16:51.900 So this is another kind of malicious feature. 00:16:52.000 --> 00:16:55.100 Surveillance is one kind of malicious feature 00:16:55.200 --> 00:16:58.900 that you find in some non-free programs; 00:16:59.000 --> 00:17:01.900 using secret formats to restrict the users 00:17:02.000 --> 00:17:04.900 is another kind of malicious feature 00:17:05.000 --> 00:17:09.000 that you also find in some non-free programs. 00:17:10.000 --> 00:17:15.000 But if you have a free program that handles a certain format 00:17:15.900 --> 00:17:19.000 ipso facto that format is not secret. 00:17:19.100 --> 00:17:26.000 This kind of malicious feature can only exist in a non-free program. 00:17:26.300 --> 00:17:31.100 Surveillance features could theoretically exist in a free program 00:17:31.200 --> 00:17:35.000 but you don’t find them happening. 00:17:35.500 --> 00:17:37.900 Because the users would fix it. 00:17:38.000 --> 00:17:42.000 The users wouldn’t like this, so they would fix it. 00:17:45.000 --> 00:17:53.700 In any case, we also find secret data formats in use for publication of works. 00:17:53.900 --> 00:17:58.700 You find secret data formats in use for audio 00:17:58.800 --> 00:18:02.800 such as music, for video, for books… 00:18:03.000 --> 00:18:11.000 And these secret formats are known as Digital Restrictions Management, or DRM 00:18:11.500 --> 00:18:16.400 or digital handcuffs (les menottes numériques). 00:18:19.000 --> 00:18:23.200 So, the works are published in secret formats 00:18:23.300 --> 00:18:27.900 so that only proprietary programs can play them 00:18:28.000 --> 00:18:35.700 so that these proprietary programs can have the malicious feature of restricting the users 00:18:35.800 --> 00:18:40.000 stopping them from doing something that would be natural to do. 00:18:44.600 --> 00:18:49.900 And this is used even by public entities to communicate with the people. 00:18:50.000 --> 00:18:56.400 For instance Italian public television makes its programs available on the net 00:18:56.500 --> 00:18:59.000 in a format called VC-1 00:18:59.100 --> 00:19:05.000 which is a standard supposedly, but it’s a secret standard. 00:19:06.500 --> 00:19:12.000 Now I can’t imagine how any publicly supported entity 00:19:12.100 --> 00:19:17.800 could justify using a secret format to communicate with the public. 00:19:17.900 --> 00:19:20.800 This should be illegal. 00:19:20.900 --> 00:19:25.100 In fact I think all use of Digital Restrictions Management should be illegal. 00:19:25.200 --> 00:19:29.000 No company should be allowed to do this. 00:19:31.600 --> 00:19:35.700 There are also formats that are not secret 00:19:35.800 --> 00:19:41.000 but almost might as well be secret, for instance Flash. 00:19:42.500 --> 00:19:49.300 Flash is not actually secret but Adobe keeps making new versions, which are different 00:19:49.400 --> 00:19:57.000 faster than anyone can keep up and make free software to play those files. 00:19:57.100 --> 00:20:01.000 So it has almost the same effect as being secret. 00:20:02.800 --> 00:20:11.100 Then there are the patented formats, such as MP3 for audio. 00:20:11.200 --> 00:20:16.100 It’s bad to distribute audio in MP3 format! 00:20:16.600 --> 00:20:21.900 There is free software to handle MP3 format, to play it and to generate it 00:20:22.000 --> 00:20:25.600 but because it’s patented in many countries 00:20:25.700 --> 00:20:31.900 many distributors of free software don’t dare include those programs. 00:20:32.000 --> 00:20:35.800 So if they distribute the GNU+Linux system 00:20:35.900 --> 00:20:39.800 their system doesn’t include a player for MP3. 00:20:39.900 --> 00:20:48.000 As a result if anyone distributes some music in MP3 00:20:48.100 --> 00:20:54.700 that’s putting pressure on people not to use GNU/Linux. 00:20:54.800 --> 00:20:58.500 Sure, if you’re an expert you can find a free software and install it 00:20:58.600 --> 00:21:00.800 but there are lots of non experts 00:21:00.900 --> 00:21:04.800 and they might see that they installed a version of GNU/Linux 00:21:04.900 --> 00:21:09.800 which doesn’t have that software and it won’t play MP3 files 00:21:09.900 --> 00:21:12.500 and they think it’s the system’s fault. 00:21:12.600 --> 00:21:18.800 They don’t realize it’s MP3′s fault. But this is the fact. 00:21:18.900 --> 00:21:25.300 Therefore, if you want to support freedom, don’t distribute MP3 files. 00:21:25.400 --> 00:21:29.900 That’s why I say if you’re recording my speech and you want to distribute copies 00:21:30.000 --> 00:21:38.800 don’t do it in a patented format such as MPEG-2, or MPEG-4, or MP3. 00:21:38.900 --> 00:21:49.000 Use a format friendly to free software, such as the Ogg format or WebM. 00:21:50.500 --> 00:21:54.000 And by the way, if you are going to distribute copies of the recording 00:21:54.100 --> 00:22:01.000 please put on it the Creative Commons-No derivatives license. 00:22:01.100 --> 00:22:04.000 This is a statement of my personal views. 00:22:04.100 --> 00:22:09.000 If it were a lecture for a course, if it were didactic 00:22:09.100 --> 00:22:14.000 then it ought to be free, but statements of opinion are different. 00:22:23.900 --> 00:22:26.800 Now this leads me to the next threat 00:22:26.900 --> 00:22:32.200 which comes from software that the users don’t have control over. 00:22:32.900 --> 00:22:37.800 In other words: software that isn’t free, that is not “libre”. 00:22:37.900 --> 00:22:42.000 In this particular point French is clearer than English. 00:22:42.100 --> 00:22:46.000 The English word free means ‘libre’ and ‘gratuit’ 00:22:46.100 --> 00:22:52.800 but what I mean when I say free software is ‘logiciel libre‘. I don’t mean ‘gratuit’. 00:22:52.900 --> 00:22:54.900 I’m not talking about price. 00:22:55.000 --> 00:23:01.000 Price is a side issue, just a detail, because it doesn't matter ethically. 00:23:01.100 --> 00:23:04.000 You know if I have a copy of a program 00:23:04.100 --> 00:23:10.100 and I sell it to you for one euro or a hundred euros, who cares? 00:23:10.200 --> 00:23:14.000 Why should anyone think that that’s good or bad? 00:23:14.100 --> 00:23:20.900 Or suppose I gave it to you ‘gratuitement’… still, who cares? 00:23:21.000 --> 00:23:26.800 But whether this program respects your freedom, that’s important! 00:23:26.900 --> 00:23:31.500 So free software is software that respects users’ freedom. 00:23:31.900 --> 00:23:34.000 What does this mean? 00:23:34.100 --> 00:23:37.800 Ultimately there are just two possibilities with software: 00:23:37.900 --> 00:23:44.000 either the users control the program or the program controls the users. 00:23:44.100 --> 00:23:48.000 If the users have certain essential freedoms 00:23:48.100 --> 00:23:51.300 then they control the program 00:23:51.400 --> 00:23:57.000 and those freedoms are the criterion for free software. 00:23:57.900 --> 00:24:01.800 But if the users don’t fully have the essential freedoms 00:24:01.900 --> 00:24:04.900 then the program controls the users. 00:24:05.000 --> 00:24:12.000 But somebody controls that program and, through it, has power over the users. 00:24:12.100 --> 00:24:16.800 So, a non-free program is an instrument 00:24:16.900 --> 00:24:21.700 to give somebody power over a lot of other people 00:24:21.800 --> 00:24:26.300 and this is unjust power that nobody should ever have. 00:24:26.400 --> 00:24:36.600 This is why non-free software, les logiciels privateurs, qui privent de la liberté 00:24:37.000 --> 00:24:42.000 why proprietary software is an injustice and should not exist? 00:24:43.000 --> 00:24:46.900 Because it leaves the users without freedom. 00:24:47.000 --> 00:24:51.800 Now, the developer who has control of the program 00:24:51.900 --> 00:24:56.900 often feels tempted to introduce malicious features 00:24:57.000 --> 00:25:01.600 to further exploit or abuse those users. 00:25:01.700 --> 00:25:05.400 He feels a temptation because he knows he can get away with it: 00:25:05.500 --> 00:25:08.800 because his program controls the users 00:25:08.900 --> 00:25:11.700 and the users do not have control of the program. 00:25:11.800 --> 00:25:16.600 If he puts in a malicious feature, the users can’t fix it; 00:25:16.700 --> 00:25:19.600 they can’t remove the malicious feature. 00:25:19.700 --> 00:25:22.800 I’ve already told you about two kinds of malicious features: 00:25:22.900 --> 00:25:26.800 surveillance features, such as are found in Windows 00:25:26.900 --> 00:25:32.100 and the iPhone and Flash player and the “Swindle”. 00:25:35.000 --> 00:25:40.000 And there are also features to restrict users 00:25:40.200 --> 00:25:42.800 which work with secret data formats 00:25:42.900 --> 00:25:49.800 and those are found in Windows, Macintosh, the iPhone, Flash player 00:25:49.900 --> 00:25:58.000 the Amazon “Swindle”, the Playstation 3 and lots and lots of other programs. 00:26:00.000 --> 00:26:04.000 The other kind of malicious feature is the backdoor. 00:26:04.100 --> 00:26:07.000 That means something in that program 00:26:07.100 --> 00:26:11.600 is listening for remote commands and obeying them 00:26:11.700 --> 00:26:16.000 and those commands can mistreat the user. 00:26:16.100 --> 00:26:26.000 We know of backdoors in Windows, in the iPhone, in the Amazon “Swindle”. 00:26:26.700 --> 00:26:33.800 The Amazon “Swindle” has a backdoor that can remotely delete books. 00:26:33.900 --> 00:26:38.900 We know this by observation, because Amazon did it: 00:26:39.000 --> 00:26:46.900 in 2009 Amazon remotely deleted thousands of copies of a particular book. 00:26:47.000 --> 00:26:52.900 Those were authorized copies, people had obtain them directly from Amazon 00:26:53.000 --> 00:26:58.200 and thus Amazon knew exactly where they were. 00:26:58.800 --> 00:27:03.700 Which is how Amazon knew where to send the commands to delete those books. 00:27:03.800 --> 00:27:11.800 You know which book Amazon deleted? 00:27:12.000 --> 00:27:18.000 It’s a book everyone should read because it discusses a totalitarian state 00:27:18.100 --> 00:27:22.100 that did things like delete books it didn’t like. 00:27:22.700 --> 00:27:28.000 Everybody should read it, but not on the Amazon “Swindle”. 00:27:31.000 --> 00:27:39.900 Anyway, malicious features are present in the most widely used non-free programs 00:27:40.000 --> 00:27:46.800 but they are rare in free software, because with free software the users have control: 00:27:47.000 --> 00:27:50.000 they can read the source code and they can change it. 00:27:50.100 --> 00:27:53.900 So, if there were a malicious feature 00:27:54.000 --> 00:27:58.000 somebody would sooner or later spot it and fix it. 00:27:58.100 --> 00:28:01.800 This means that somebody who is considering 00:28:01.900 --> 00:28:06.300 introducing a malicious feature does not find it so tempting 00:28:06.400 --> 00:28:09.800 because he knows he might get away with it for a while 00:28:09.900 --> 00:28:12.900 but somebody will spot it, will fix it 00:28:13.000 --> 00:28:18.200 and everybody will loose trust in the perpetrator. 00:28:18.900 --> 00:28:23.400 It’s not so tempting when you know you’re going to fail. 00:28:23.800 --> 00:28:29.000 And that’s why we find that malicious features are rare in free software 00:28:29.000 --> 00:28:34.000 and common in proprietary software. 00:28:35.000 --> 00:28:39.600 Now the essential freedoms are four. 00:28:39.700 --> 00:28:44.000 Freedom 0 is the freedom to run the program as you wish. 00:28:44.100 --> 00:28:49.800 Freedom 1 is the freedom to study the source code and change it 00:28:49.900 --> 00:28:54.000 so the program does your computing the way you wish. 00:28:54.800 --> 00:28:58.000 Freedom 2 is the freedom to help others. 00:28:58.100 --> 00:29:03.600 That’s the freedom to make exact copies and redistribute them when you wish. 00:29:03.700 --> 00:29:09.000 Freedom 3 is the freedom to contribute to your community. 00:29:09.100 --> 00:29:13.700 That’s the freedom to make copies of your modified versions 00:29:13.800 --> 00:29:20.800 if you have made any, and then distribute them to others when you wish. 00:29:21.000 --> 00:29:27.700 These freedoms, in order to be adequate, must apply to all activities of life. 00:29:27.800 --> 00:29:34.000 For instance if it says: “This is free for academic use”, it’s not free. 00:29:34.100 --> 00:29:38.400 Because that’s too limited. It doesn’t apply to all areas of life. 00:29:38.500 --> 00:29:42.000 In particular, if a program is free 00:29:42.100 --> 00:29:47.900 that means it can be modified and distributed commercially 00:29:48.000 --> 00:29:53.000 because commerce is an area of life, an activity in life. 00:29:53.100 --> 00:29:56.900 And this freedom has to apply to all activities. 00:29:57.000 --> 00:30:03.700 Now however, it’s not obligatory to do any of these things. 00:30:03.800 --> 00:30:07.900 The point is you’re free to do them if you wish, when you wish. 00:30:08.000 --> 00:30:12.600 But you never have to do them. You don’t have to do any of them. 00:30:12.700 --> 00:30:14.600 You don’t have to run the program. 00:30:14.700 --> 00:30:17.000 You don’t have to study or change the source code. 00:30:17.100 --> 00:30:20.000 You don’t have to make any copies. 00:30:20.100 --> 00:30:22.800 You don’t have to distribute your modified versions. 00:30:22.900 --> 00:30:28.000 The point is you should be free to do those things if you wish. 00:30:29.000 --> 00:30:34.000 Now, freedom number 1, the freedom to study and change the source code 00:30:34.100 --> 00:30:37.900 to make the program do your computing as you wish 00:30:38.000 --> 00:30:41.900 includes something that might not be obvious at first. 00:30:42.000 --> 00:30:46.200 If the program comes in a product 00:30:47.000 --> 00:30:51.900 and a developer can provide an upgrade that will run 00:30:52.000 --> 00:30:56.800 then you have to be able to make your version run in that product. 00:30:56.900 --> 00:31:00.900 If the product would only run the developer’s versions 00:31:01.000 --> 00:31:07.000 and refuses to run yours, the executable in that product is not free software. 00:31:07.300 --> 00:31:10.800 Even if it was compiled from free source code 00:31:10.900 --> 00:31:13.800 it’s not free because you don’t have the freedom 00:31:13.900 --> 00:31:18.000 to make the program do your computing the way you wish. 00:31:18.500 --> 00:31:23.000 So, freedom 1 has to be real, not just theoretical. 00:31:23.100 --> 00:31:27.000 It has to include the freedom to use your version 00:31:27.100 --> 00:31:31.800 not just the freedom to make some source code that won’t run. 00:31:33.000 --> 00:31:37.000 I launched the free software movement in 1983 00:31:37.500 --> 00:31:40.000 when I announced the plan to develop 00:31:40.100 --> 00:31:44.400 a free software operating system whose name is GNU. 00:31:45.400 --> 00:31:50.000 Now GNU, the name GNU, is a joke. 00:31:51.500 --> 00:31:54.000 Because part of the hacker’s spirit 00:31:54.100 --> 00:31:58.800 is to have fun even when you’re doing something very serious. 00:31:58.900 --> 00:32:06.800 Now I can’t think of anything more seriously important than defending freedom. 00:32:11.800 --> 00:32:16.000 But that didn’t mean I couldn’t give my system a name that’s a joke. 00:32:20.000 --> 00:32:24.000 So GNU is a joke because it’s a recursive acronym 00:32:24.100 --> 00:32:31.000 it stands for “GNU is Not Unix”, so G.N.U.: GNU’s Not Unix. 00:32:31.100 --> 00:32:35.000 So the G in GNU stands for GNU. 00:32:36.000 --> 00:32:39.000 Now in fact this was a tradition at the time. 00:32:39.100 --> 00:32:43.900 The tradition was: if there was an existing program 00:32:44.000 --> 00:32:48.500 and you wrote something similar to it, inspired by it 00:32:48.600 --> 00:32:52.500 you could give credit by giving your program a name 00:32:52.600 --> 00:32:57.200 that’s a recursive acronym saying it’s not the other one. 00:32:58.000 --> 00:33:03.000 So I gave credit to Unix for the technical ideas of Unix 00:33:03.300 --> 00:33:09.700 but with the name GNU, because I decided to make GNU a Unix-like system 00:33:09.800 --> 00:33:15.700 with the same commands, the same system calls so that it would be compatible 00:33:15.800 --> 00:33:19.800 so that people who used Unix can switch over easily. 00:33:19.900 --> 00:33:23.800 But the reason for developing GNU, that was unique. 00:33:23.900 --> 00:33:28.600 GNU is the only operating system, as far as I know 00:33:28.700 --> 00:33:33.300 ever developed for the purpose of freedom. 00:33:33.400 --> 00:33:37.700 Not for technical motivations, not for commercial motivations. 00:33:37.800 --> 00:33:41.000 GNU was written for your freedom. 00:33:41.100 --> 00:33:44.800 Because without a free operating system 00:33:44.900 --> 00:33:49.300 it’s impossible to have freedom and use a computer. 00:33:49.900 --> 00:33:54.000 And there were none, and I wanted people to have freedom 00:33:54.100 --> 00:33:57.000 so it was up to me to write one. 00:33:57.100 --> 00:34:00.900 Nowadays there are millions of users of the GNU operating system 00:34:01.000 --> 00:34:05.800 and most of them don’t know they are using the GNU operating system 00:34:05.900 --> 00:34:10.000 because there is a widespread practice which is not nice. 00:34:10.100 --> 00:34:13.600 People call the system “Linux”. 00:34:13.700 --> 00:34:18.800 Many do, but some people don’t and I hope you’ll be one of them. 00:34:18.900 --> 00:34:22.400 Please, since we started this 00:34:22.500 --> 00:34:25.300 since we wrote the biggest piece of the code 00:34:25.400 --> 00:34:28.000 please give us equal mention 00:34:28.100 --> 00:34:36.800 please call the system GNU+Linux or GNU/Linux. It’s not much to ask! 00:34:37.300 --> 00:34:40.000 But there is another reason to do this. 00:34:40.100 --> 00:34:44.600 It turns out that the person who wrote Linux 00:34:44.700 --> 00:34:48.700 which is one component of the system as we use it today 00:34:48.900 --> 00:34:52.000 he doesn’t agree with the free software movement. 00:34:52.900 --> 00:34:56.800 And so if you call the whole system Linux 00:34:56.900 --> 00:35:03.500 in effect you’re steering people towards his ideas and away from our ideas. 00:35:03.600 --> 00:35:07.800 Because he’s not gonna say to them that they deserve freedom. 00:35:07.900 --> 00:35:15.000 He’s going to say to them that he likes convenient, reliable, powerful software. 00:35:15.100 --> 00:35:19.000 He’s going to tell people that those are the important values. 00:35:19.100 --> 00:35:26.700 But if you tell them the system is GNU+Linux, the GNU operating system plus Linux the kernel 00:35:26.800 --> 00:35:32.300 then they’ll know about us and then they might listen to what we say. 00:35:33.000 --> 00:35:41.800 You deserve freedom, and since freedom will be lost if we don’t defend it — 00:35:41.900 --> 00:35:46.200 there’s always going to be a Sarkozy to take it away — 00:35:47.900 --> 00:35:52.800 we need above all to teach people to demand freedom 00:35:52.900 --> 00:35:56.000 to be ready to stand up for their freedom 00:35:56.800 --> 00:36:03.000 the next time someone threatens to take it away. 00:36:10.000 --> 00:36:15.900 Nowadays, you can tell who doesn't want to discuss these ideas of freedom 00:36:16.000 --> 00:36:19.000 because they don’t say “logiciel libre”. 00:36:19.100 --> 00:36:22.900 They don’t say “libre”, they say “open source”. 00:36:23.000 --> 00:36:26.900 That term was coined by the people like Mr Torvalds 00:36:27.000 --> 00:36:31.800 who would prefer that these ethical issues don’t get raised. 00:36:31.900 --> 00:36:36.900 And so the way you can help us raise them is by saying libre. 00:36:37.000 --> 00:36:41.800 You know, it’s up to you where you stand you’re free to say what you think. 00:36:41.900 --> 00:36:45.000 If you agree with them, you can say open source. 00:36:45.000 --> 00:36:49.000 If you agree with us, show it: say libre! 00:36:51.900 --> 00:36:55.900 Now the most important point about free software 00:36:56.000 --> 00:37:02.000 is that schools must teach exclusively free software. 00:37:02.100 --> 00:37:05.900 All levels of schools from kindergarten to university 00:37:06.000 --> 00:37:13.900 it’s their moral responsibility to teach only free software in their education 00:37:14.000 --> 00:37:17.000 and all other educational activities as well 00:37:17.100 --> 00:37:23.000 including those that say that they’re spreading digital literacy. 00:37:23.100 --> 00:37:30.000 A lot of those activities teach Windows, which means they’re teaching dependence. 00:37:30.100 --> 00:37:35.000 To teach people the use of proprietary software is to teach dependence 00:37:36.000 --> 00:37:43.000 and educational activities must never do that because it’s the opposite of their mission. 00:37:43.600 --> 00:37:49.500 Educational activities have a social mission to educate good citizens 00:37:49.600 --> 00:37:57.500 of a strong, capable, cooperating, independent and free society. 00:37:57.900 --> 00:38:03.300 And in the area of computing, that means: teach free software. 00:38:04.000 --> 00:38:11.000 Never teach a proprietary program because that’s inculcating dependence. 00:38:11.200 --> 00:38:17.900 Why do you think some proprietary developers offer gratis copies to schools? 00:38:18.000 --> 00:38:23.000 They want the schools to make the children dependent. 00:38:23.200 --> 00:38:28.000 And then, when they graduate, they’re still dependent 00:38:28.100 --> 00:38:32.500 and you know the company is not going to offer them gratis copies. 00:38:33.000 --> 00:38:37.900 And some of them get jobs and go to work for companies. 00:38:38.000 --> 00:38:42.000 Not many of them anymore, but some of them. 00:38:42.100 --> 00:38:46.800 And those companies are not going to be offered gratis copies. 00:38:46.900 --> 00:38:50.800 Oh no! The idea is if the school directs the students 00:38:50.900 --> 00:38:53.500 down the path of permanent dependence 00:38:53.600 --> 00:38:57.900 they can drag the rest of society with them into dependence. 00:38:58.000 --> 00:39:03.500 That’s the plan! It’s just like giving the school gratis needles 00:39:03.600 --> 00:39:06.900 full of addicting drugs, saying 00:39:07.000 --> 00:39:11.100 “inject this into your students, the first dose is gratis.” 00:39:11.900 --> 00:39:15.000 Once you’re dependent, then you have to pay. 00:39:15.100 --> 00:39:18.000 Well, the school would reject the drugs 00:39:18.000 --> 00:39:21.800 because it isn’t right to teach the students to use addictive drugs 00:39:21.900 --> 00:39:26.900 and it’s got to reject the proprietary software also. 00:39:27.000 --> 00:39:34.000 Some people say “let’s have the school teach both proprietary software and free software” 00:39:34.400 --> 00:39:37.800 “so the students become familiar with both.” 00:39:37.900 --> 00:39:44.400 That’s like saying “for lunch lets give the kids spinach and tobacco” 00:39:44.500 --> 00:39:47.800 “so that they become accustomed to both.” 00:39:47.900 --> 00:39:54.400 No! The schools are only supposed to teach good habits, not bad ones! 00:39:55.000 --> 00:39:59.700 So there should be no Windows in a school 00:39:59.800 --> 00:40:05.400 no Macintosh, nothing proprietary in the education. 00:40:05.800 --> 00:40:10.000 But also, for the sake of educating good programmers. 00:40:10.100 --> 00:40:14.800 You see, some people have a talent for programming. 00:40:14.900 --> 00:40:19.800 At ten to thirteen years old, typically, they’re fascinated 00:40:19.900 --> 00:40:24.000 and if they use a program, they want to know “how does it do this?” 00:40:24.100 --> 00:40:28.800 But when they ask the teacher, if it’s proprietary, the teacher has to say 00:40:28.900 --> 00:40:31.800 “I’m sorry, it’s a secret, we can’t find out.” 00:40:31.900 --> 00:40:35.100 Which means education is forbidden. 00:40:35.500 --> 00:40:40.400 A proprietary program is the enemy of the spirit of education. 00:40:40.500 --> 00:40:45.900 It’s knowledge withheld, so it should not be tolerated in a school 00:40:46.000 --> 00:40:49.600 even though there may be plenty of people in the school 00:40:49.700 --> 00:40:53.300 who don’t care about programming, don’t want to learn this. 00:40:53.400 --> 00:40:57.800 Still, because it’s the enemy of the spirit of education 00:40:57.900 --> 00:41:00.800 it shouldn’t be there in the school. 00:41:00.900 --> 00:41:04.800 But if the program is free, the teacher can explain what he knows 00:41:04.900 --> 00:41:07.800 and then give out copies of the source code, saying: 00:41:07.900 --> 00:41:10.600 “read it and you’ll understand everything.” 00:41:10.700 --> 00:41:13.800 And those who are really fascinated, they will read it! 00:41:13.900 --> 00:41:19.700 And this gives them an opportunity to start to learn how to be good programmers. 00:41:19.800 --> 00:41:24.000 To learn to be a good programmer, you’ll need to recognize 00:41:24.100 --> 00:41:30.300 that certain ways of writing code, even if they make sense to you and they are correct 00:41:30.400 --> 00:41:35.000 they’re not good because other people will have trouble understanding them. 00:41:35.100 --> 00:41:40.000 Good code is clear code that others will have an easy time working on 00:41:40.100 --> 00:41:43.000 when they need to make further changes. 00:41:43.100 --> 00:41:46.000 How do you learn to write good clear code? 00:41:46.100 --> 00:41:49.700 You do it by reading lots of code, and writing lots of code. 00:41:49.800 --> 00:41:53.000 And only free software offers the chance 00:41:53.100 --> 00:41:58.500 to read the code of large programs that we really use. 00:41:58.600 --> 00:42:02.600 And then you have to write lots of code 00:42:02.700 --> 00:42:06.000 which means you have to write changes in large programs. 00:42:06.000 --> 00:42:09.900 How do you learn to write good code for large programs? 00:42:10.000 --> 00:42:15.800 You have to start small, which does not mean small programs, oh no! 00:42:15.900 --> 00:42:22.800 The challenges of the code for large programs don’t even begin to appear in small programs. 00:42:22.900 --> 00:42:26.800 So the way you start small at writing code for large programs 00:42:26.900 --> 00:42:31.300 is by writing small changes in large programs. 00:42:31.600 --> 00:42:35.000 And only free software gives you the chance to do that! 00:42:35.100 --> 00:42:43.800 So, if a school wants to offer the possibility of learning to be a good programmer 00:42:43.900 --> 00:42:46.800 it needs to be a free software school. 00:42:46.900 --> 00:42:49.100 But there is an even deeper reason 00:42:49.200 --> 00:42:52.800 and that is for the sake of moral education 00:42:52.900 --> 00:42:55.700 education in citizenship. 00:42:55.800 --> 00:42:59.800 It’s not enough for a school to teach facts and skills 00:42:59.900 --> 00:43:07.000 it has to teach the spirit of goodwill, the habit of helping others. 00:43:07.100 --> 00:43:10.000 Therefore, every class should have this rule: 00:43:10.100 --> 00:43:15.000 “Students, if you bring software to class, you may not keep it for yourself” 00:43:15.100 --> 00:43:18.900 ”you must share copies with the rest of the class” 00:43:19.000 --> 00:43:24.400 ”including the source code in case anyone here wants to learn!” 00:43:24.600 --> 00:43:28.000 ”Because this class is a place where we share our knowledge.” 00:43:28.100 --> 00:43:34.500 ”Therefore, bringing a proprietary program to class is not permitted.” 00:43:34.900 --> 00:43:39.800 The school must follow its own rule to set a good example. 00:43:39.900 --> 00:43:43.700 Therefore, the school must bring only free software to class 00:43:43.800 --> 00:43:49.600 and share copies, including the source code with anyone in the class that wants copies. 00:43:50.400 --> 00:43:53.800 Those of you who have a connection with a school 00:43:53.900 --> 00:44:01.400 it’s your duty to campaign and pressure that school to move to free software. 00:44:01.900 --> 00:44:04.000 And you have to be firm. 00:44:04.100 --> 00:44:10.700 It may take years, but you can succeed as long as you never give up. 00:44:10.800 --> 00:44:18.000 Keep seeking more allies among the students, the faculty, the staff, the parents, anyone! 00:44:18.600 --> 00:44:22.900 And always bring it up as an ethical issue. 00:44:23.000 --> 00:44:26.000 If someone else wants to sidetrack the discussion 00:44:26.100 --> 00:44:30.800 into this practical advantage and this practical disadvantage 00:44:30.900 --> 00:44:35.900 which means they’re ignoring the most important question, then you have to say: 00:44:36.000 --> 00:44:41.800 “this is not about how to do the best job of educating“ 00:44:41.900 --> 00:44:48.000 “this is about how to do a good education instead of an evil one.“ 00:44:48.200 --> 00:44:53.800 “It’s how to do education right instead of wrong“ 00:44:53.900 --> 00:44:58.800 “not just how to make it a little more effective or less.” 00:44:59.000 --> 00:45:06.000 So don’t get distracted with those secondary issues and ignore what really matters! 00:45:07.000 --> 00:45:12.000 So, moving on to the next menace. 00:45:12.500 --> 00:45:20.600 There are two issues that arise from the use of internet services. 00:45:20.700 --> 00:45:26.900 One of them is that the server could abuse your data 00:45:27.000 --> 00:45:31.800 and another is that it could take control of your computing. 00:45:31.900 --> 00:45:35.800 The first issue, people already know about. 00:45:35.900 --> 00:45:41.800 They are aware that, if you upload data to an internet service 00:45:41.900 --> 00:45:44.900 there is a question of what it will do with that data. 00:45:45.000 --> 00:45:48.000 It might do things that mistreat you. 00:45:48.100 --> 00:45:53.800 What could it do? It could lose the data, it could change the data 00:45:53.900 --> 00:45:57.900 it could refuse to let you get the data back. 00:45:58.000 --> 00:46:04.000 And it could also show the data to someone else you don’t want to show it to. 00:46:04.200 --> 00:46:07.000 Four different possible things. 00:46:07.100 --> 00:46:13.000 Now, here, I’m talking about the data that you knowingly gave to that site. 00:46:13.100 --> 00:46:19.000 Of course, many of those services do surveillance as well. 00:46:19.300 --> 00:46:22.000 For instance, consider Facebook. 00:46:22.100 --> 00:46:28.000 Users send lots of data to Facebook, and one of the bad things about Facebook 00:46:28.100 --> 00:46:33.000 is that it shows a lot of that data to lots of other people 00:46:33.100 --> 00:46:40.800 and even if it offers them a setting to say “no!”, that may not really work. 00:46:40.900 --> 00:46:45.900 After all, if you say “some other people can see this piece of information,” 00:46:46.000 --> 00:46:48.400 one of them might publish it. 00:46:48.500 --> 00:46:50.400 Now, that’s not Facebook’s fault 00:46:50.500 --> 00:46:54.200 there is nothing they could do to prevent that but it ought to warn people. 00:46:54.300 --> 00:46:59.800 Instead of saying “mark this as only to your so-called friends” 00:46:59.900 --> 00:47:05.900 “it should say “keep in mind that your so-called friends are not really your friends” 00:47:06.000 --> 00:47:10.800 “and if they want to make trouble for you, they could publish this.” 00:47:10.900 --> 00:47:17.000 Every time, it should say that, if they want to deal with people ethically. 00:47:21.500 --> 00:47:26.000 As well as all the data users of Facebook voluntarily give to Facebook 00:47:26.000 --> 00:47:32.700 Facebook is collecting through data about people’s activities on the net 00:47:32.800 --> 00:47:38.600 through various methods of surveillance. But that was the first menace. 00:47:38.700 --> 00:47:45.000 For now I am talking about the data that people know they are giving to these sites. 00:47:47.000 --> 00:47:54.200 Losing data is something that could always happen by accident. 00:47:54.400 --> 00:47:59.000 That possibility is always there, no matter how careful someone is. 00:47:59.100 --> 00:48:04.000 Therefore, you need to keep multiple copies of data that matters. 00:48:04.100 --> 00:48:12.000 If you do that, then, even if someone decided to delete your data intentionally 00:48:12.100 --> 00:48:16.000 it wouldn’t hurt you that much, because you’d have other copies of it. 00:48:16.100 --> 00:48:19.800 So, as long as you are maintaining multiple copies 00:48:19.900 --> 00:48:25.000 you don’t have to worry too much about someone’s losing your data. 00:48:25.600 --> 00:48:29.600 What about whether you can get it back. 00:48:29.700 --> 00:48:35.700 Well, some services make it possible to get back all the data that you sent, and some don’t. 00:48:35.800 --> 00:48:41.800 Google services will let the user get back the data the user has put into them. 00:48:41.900 --> 00:48:45.200 Facebook, famously, does not. 00:48:45.600 --> 00:48:51.900 Of course in the case of Google, this only applies to the data the user knows Google has. 00:48:52.000 --> 00:48:57.000 Google does lots of surveillance, too and that data is not included. 00:48:58.800 --> 00:49:02.600 But in any case, if you can get the data back 00:49:02.700 --> 00:49:07.500 then you could track whether they have altered it. 00:49:07.600 --> 00:49:13.000 And they are not very likely to start altering people’s data if the people can tell. 00:49:13.100 --> 00:49:18.900 So maybe we can keep a track on that particular kind of abuse. 00:49:19.000 --> 00:49:24.400 But the abuse of showing the data to someone you don’t want it to be shown to 00:49:24.500 --> 00:49:29.000 is very common and almost impossible for you to prevent 00:49:29.600 --> 00:49:33.100 especially if it’s a US company. 00:49:33.300 --> 00:49:40.000 You see, the most hypocritically named law in US history 00:49:40.100 --> 00:49:49.900 the so-called USA Patriot Act, says that Big Brother’s police 00:49:50.000 --> 00:49:56.000 can collect just about all the data that companies maintain about individuals. 00:49:56.100 --> 00:50:01.700 Not just companies, but other organizations too, like public libraries. 00:50:01.800 --> 00:50:07.700 The police can get this massively, without even going to court. 00:50:07.900 --> 00:50:13.000 Now, in a country that was founded on an idea of freedom 00:50:13.100 --> 00:50:19.000 there is nothing more unpatriotic than this. But this is what they did. 00:50:19.100 --> 00:50:24.800 So you mustn’t ever trust any of your data to a US company. 00:50:24.900 --> 00:50:32.000 And they say that foreign subsidiaries of US companies are subject to this as well 00:50:32.100 --> 00:50:36.000 so the company you are directly dealing with may be in Europe 00:50:36.000 --> 00:50:43.000 but if it’s owned by a US company, you got the same problem to deal with. 00:50:48.800 --> 00:50:52.800 However, this is mainly a concern 00:50:52.900 --> 00:50:59.700 when the data you are sending to the service is not for publication. 00:50:59.700 --> 00:51:03.000 There are some services where you publish things. 00:51:03.100 --> 00:51:07.800 Of course, if you publish something, you know everybody is gonna be able to see it. 00:51:07.900 --> 00:51:10.300 So, there is no way they can hurt you 00:51:10.400 --> 00:51:13.100 by showing it to somebody who wasn’t supposed to see it. 00:51:13.200 --> 00:51:17.700 There is nobody who wasn’t supposed to see it if you published it. 00:51:17.800 --> 00:51:22.000 So in that case the problem doesn’t exist. 00:51:23.500 --> 00:51:32.000 So these are four sub-issues of this one threat of abusing our data. 00:51:32.100 --> 00:51:38.800 The idea of the Freedom Box project is you have your own server in your own home 00:51:38.900 --> 00:51:43.000 and when you want to do something remotely you do it with your own server 00:51:43.100 --> 00:51:48.800 and the police have to get a court order in order to search your server. 00:51:48.900 --> 00:51:56.000 So you have the same rights this way that you would have traditionally in the physical world. 00:51:56.300 --> 00:52:02.000 The point here and in so many other issues is: 00:52:02.100 --> 00:52:06.400 as we start doing things digitally instead of physically 00:52:06.500 --> 00:52:15.000 we shouldn’t lose any of our rights, because the general tendency is that we do lose rights. 00:52:18.200 --> 00:52:25.000 Basically, Stallman’s law says 00:52:25.100 --> 00:52:31.700 that in an epoch when governments work for the mega-corporations 00:52:31.800 --> 00:52:36.000 instead of reporting to their citizens 00:52:36.100 --> 00:52:45.000 every technological change can be taken advantage of to reduce our freedom. 00:52:47.000 --> 00:52:51.200 Because reducing our freedom is what these governments want to do. 00:52:52.000 --> 00:52:55.000 So the question is: when do they get an opportunity? 00:52:55.100 --> 00:53:01.600 Well, any change that happens for some other reason is a possible opportunity 00:53:01.700 --> 00:53:07.000 and they will take advantage of it if that’s their general desire. 00:53:09.500 --> 00:53:12.400 But the other issue with internet services 00:53:12.500 --> 00:53:16.000 is that they can take control of your computing 00:53:16.100 --> 00:53:22.000 and that’s not so commonly known. But It’s becoming more common. 00:53:22.100 --> 00:53:29.700 There are services that offer to do computing for you on data supplied by you 00:53:30.000 --> 00:53:34.800 things that you should do in your own computer 00:53:34.900 --> 00:53:41.000 but they invite you to let somebody else’s computer do that computing work for you. 00:53:41.300 --> 00:53:49.200 And the result is you lose control over it. It’s just as if you used a non-free program. 00:53:49.700 --> 00:53:55.800 Two different scenarios but they lead to the same problem. 00:53:55.900 --> 00:54:01.000 If you do your computing with a non-free program 00:54:01.100 --> 00:54:05.000 well, the users don’t control the non-free program 00:54:05.100 --> 00:54:08.000 it controls the users, which would include you. 00:54:08.100 --> 00:54:12.000 So you’ve lost control of the computing that’s being done. 00:54:12.100 --> 00:54:17.000 But if you do your computing in his server 00:54:17.100 --> 00:54:22.800 well, the programs that are doing it are the ones he chose. 00:54:22.900 --> 00:54:27.800 You can’t touch them or see them, so you have no control over them. 00:54:27.900 --> 00:54:31.000 He has control over them, maybe. 00:54:31.100 --> 00:54:36.000 If they are free software and he installs them then he has control over them. 00:54:36.100 --> 00:54:38.800 But even he might not have control. 00:54:38.900 --> 00:54:42.200 He might be running a proprietary program in his server 00:54:42.300 --> 00:54:49.400 in which case it’s somebody else who has control of the computing being done in his server. 00:54:49.500 --> 00:54:52.000 He doesn’t control it and you don’t. 00:54:52.300 --> 00:54:55.500 But suppose he installs a free program 00:54:55.600 --> 00:55:02.000 then he has control over the computing being done in his computer, but you don’t. 00:55:02.100 --> 00:55:05.000 So, either way, you don’t! 00:55:05.100 --> 00:55:08.000 So the only way to have control over your computing 00:55:08.100 --> 00:55:14.800 is to do it with your copy of a free program. 00:55:15.800 --> 00:55:20.000 This practice is called “Software as a Service”. 00:55:20.400 --> 00:55:28.200 It means doing your computing with your data in somebody else’s server. 00:55:28.300 --> 00:55:32.200 And I don’t know of anything that can make this acceptable. 00:55:32.300 --> 00:55:37.000 It’s always something that takes away your freedom 00:55:37.100 --> 00:55:41.400 and the only solution I know of is to refuse. 00:55:41.800 --> 00:55:47.800 For instance, there are servers that will do translation or voice recognition 00:55:47.900 --> 00:55:53.800 and you are letting them have control over this computing activity 00:55:53.900 --> 00:55:56.000 which we shouldn’t ever do. 00:55:56.100 --> 00:55:59.000 Of course, we are also giving them data about ourselves 00:55:59.100 --> 00:56:02.000 which they shouldn’t have. 00:56:02.100 --> 00:56:06.400 Imagine if you had a conversation with somebody 00:56:06.500 --> 00:56:13.100 through a voice-recognition translation system that was Software as as Service 00:56:13.200 --> 00:56:18.000 and it’s really running on a server belonging to some company. 00:56:18.100 --> 00:56:24.000 That company also gets to know what was said in the conversation 00:56:24.100 --> 00:56:32.000 and if it’s a US company that means Big Brother also gets to know. This is no good. 00:56:35.700 --> 00:56:44.000 The next threat to our freedom in a digital society is using computers for voting. 00:56:46.000 --> 00:56:50.700 You can’t trust computers for voting. 00:56:50.800 --> 00:56:54.000 Whoever controls the software in those computers 00:56:54.100 --> 00:57:00.000 has the power to commit undetectable fraud. 00:57:02.000 --> 00:57:10.700 Elections are special. Because there’s nobody involved that we dare trust fully. 00:57:10.900 --> 00:57:15.000 Everybody has to be checked, crosschecked by others 00:57:15.100 --> 00:57:21.700 so that nobody is in the position to falsify the results by himself. 00:57:21.800 --> 00:57:26.300 Because if anybody is in a position to do that he might do it! 00:57:26.400 --> 00:57:31.000 So our traditional systems for voting were designed 00:57:31.100 --> 00:57:37.200 so that nobody was fully trusted, everybody was being checked by others. 00:57:37.300 --> 00:57:42.000 So that nobody could easily commit fraud. 00:57:42.000 --> 00:57:48.300 But once you introduce a program, this is impossible! 00:57:48.400 --> 00:57:53.700 How can you tell if a voting machine would honestly count the votes? 00:57:53.800 --> 00:57:59.000 You’d have to study the program that’s running in it during the election 00:57:59.200 --> 00:58:05.800 which of course nobody can do, and most people wouldn’t even know how to do. 00:58:05.900 --> 00:58:10.800 But even the experts who might theoretically be capable of studying the program 00:58:10.900 --> 00:58:15.400 they can’t do it while people are voting. 00:58:15.500 --> 00:58:18.000 They’d have to do it in advance 00:58:18.100 --> 00:58:21.700 and then how do they know that the program they studied 00:58:21.800 --> 00:58:26.900 is the one that’s running while people vote? Maybe it’s been changed. 00:58:27.000 --> 00:58:34.000 Now, if this program is proprietary, that means some company controls it. 00:58:34.100 --> 00:58:38.000 The election authority can’t even tell what that program is doing. 00:58:38.100 --> 00:58:41.700 Well, this company then could rig the election. 00:58:41.800 --> 00:58:47.000 There are accusations that this was done in the US within the past ten years 00:58:47.100 --> 00:58:51.000 that election results were falsified this way. 00:58:51.100 --> 00:58:54.000 But what if the program is free software? 00:58:54.100 --> 00:58:57.000 That means the election authority 00:58:57.100 --> 00:59:01.400 who owns this voting machine has control over the software in it 00:59:01.500 --> 00:59:04.000 so the election authority could rig the election. 00:59:04.100 --> 00:59:07.000 You can’t trust them either. 00:59:07.000 --> 00:59:11.000 You don’t dare trust anybody in voting 00:59:11.100 --> 00:59:17.000 and the reason is, there’s no way that the voters can verify for themselves 00:59:17.100 --> 00:59:24.700 that their votes were correctly counted, nor that false votes were not added. 00:59:25.000 --> 00:59:33.000 In other activities of life, you can usually tell if somebody is trying to cheat you. 00:59:33.100 --> 00:59:36.800 Consider for instance buying something from a store. 00:59:36.900 --> 00:59:40.000 You order something, maybe you give a credit card number. 00:59:40.100 --> 00:59:46.000 If the product doesn’t come, you can complain 00:59:46.100 --> 00:59:48.400 and you can, of course if you got a good enough memory, 00:59:48.500 --> 00:59:51.200 you will notice if that product doesn’t come. 00:59:51.700 --> 00:59:59.000 You’re not just giving total blind trust to the store, because you can check. 00:59:59.100 --> 01:00:02.200 But in elections you can’t check. 01:00:02.900 --> 01:00:06.000 I saw once a paper where someone described 01:00:06.100 --> 01:00:10.200 a theoretical system for voting 01:00:10.800 --> 01:00:15.200 which uses some sophisticated mathematics 01:00:15.300 --> 01:00:20.000 so that people could check that their votes had been counted 01:00:20.100 --> 01:00:23.000 even though everybody’s vote was secret 01:00:23.100 --> 01:00:27.000 and they could also verify that false votes hadn’t been added. 01:00:27.100 --> 01:00:30.800 It was very exciting, powerful mathematics; 01:00:30.900 --> 01:00:34.000 but even if that mathematics is correct 01:00:34.100 --> 01:00:38.000 that doesn’t mean the system would be acceptable to use in practice 01:00:38.100 --> 01:00:45.700 because the vulnerabilities of a real system might be outside of that mathematics. 01:00:45.900 --> 01:00:50.300 For instance, suppose you’re voting over the Internet 01:00:50.400 --> 01:00:54.200 and suppose you’re using a machine that’s a zombie. 01:00:54.800 --> 01:00:59.000 It might tell you that the vote was sent for A 01:00:59.100 --> 01:01:05.000 while actually sending a vote for B. Who knows whether you’d ever find out? 01:01:05.100 --> 01:01:11.800 In practice, the only way to see if these systems work and are honest 01:01:11.900 --> 01:01:23.000 is through years, in fact decades, of trying them and checking in other ways what happened. 01:01:26.400 --> 01:01:33.000 I wouldn’t want my country to be the pioneer in this. 01:01:34.000 --> 01:01:43.000 So, use paper for voting. Make sure there are ballots that can be recounted. 01:01:46.000 --> 01:01:54.500 The next threat to our freedom in a digital society comes from the war on sharing. 01:01:55.000 --> 01:01:59.500 One of the tremendous benefits of digital technology 01:01:59.800 --> 01:02:08.000 is that it is easy to copy published works and share these copies with others. 01:02:09.000 --> 01:02:15.300 Sharing is good, and with digital technology, sharing is easy. 01:02:15.500 --> 01:02:18.700 So, millions of people share. 01:02:18.800 --> 01:02:23.000 Those who profit by having power 01:02:23.100 --> 01:02:28.000 over the distribution of these works don’t want us to share. 01:02:28.800 --> 01:02:35.000 And since they are businesses, governments which have betrayed their people 01:02:35.100 --> 01:02:40.800 and work for the empire of mega-corporations try to serve those businesses 01:02:40.900 --> 01:02:46.000 they are against their own people, they are for the businesses, for the publishers. 01:02:46.200 --> 01:02:52.800 Well, that’s not good. And with the help of these governments 01:02:52.900 --> 01:02:58.000 the companies have been waging war on sharing 01:02:58.100 --> 01:03:05.700 and they’ve proposed a series of cruel draconian measures. 01:03:05.800 --> 01:03:08.800 Why do they propose cruel draconian measures? 01:03:08.900 --> 01:03:13.800 Because nothing less has a chance of success: 01:03:13.900 --> 01:03:19.000 when something is good and easy, people do it. 01:03:20.000 --> 01:03:24.800 And the only way to stop them is by being very nasty. 01:03:24.900 --> 01:03:31.000 So of course, what they propose is nasty, nasty, and the next one is nastier. 01:03:33.000 --> 01:03:41.000 So they tried suing teenagers for hundreds of thousands of dollars — that was pretty nasty. 01:03:41.600 --> 01:03:46.000 And they tried turning our technology against us 01:03:46.100 --> 01:03:51.900 Digital Restrictions Management that means, digital handcuffs. 01:03:52.000 --> 01:03:57.600 But among the people there were clever programmers too 01:03:57.700 --> 01:04:01.000 and they found ways to break the handcuffs. 01:04:01.100 --> 01:04:08.600 For instance, DVDs were designed to have encrypted movies in a secret encryption format 01:04:08.700 --> 01:04:14.600 and the idea was that all the programs to decrypt the video 01:04:14.700 --> 01:04:18.700 would be proprietary with digital handcuffs. 01:04:18.800 --> 01:04:22.000 They would all be designed to restrict the users. 01:04:22.100 --> 01:04:25.000 And their scheme worked okay for a while. 01:04:25.100 --> 01:04:29.000 But some people in Europe figured out the encryption 01:04:29.100 --> 01:04:37.000 and they released a free program that could actually play the video on a DVD. 01:04:40.300 --> 01:04:44.000 Well, the movie companies didn’t leave it there. 01:04:44.100 --> 01:04:51.700 They went to the US congress and bought a law making that software illegal. 01:04:51.800 --> 01:04:58.600 The United States invented censorship of software in 1998 01:04:58.700 --> 01:05:02.000 with the Digital Millennium Copyright Act [DMCA]. 01:05:02.100 --> 01:05:08.000 So the distribution of that free program was forbidden in the United States. 01:05:08.100 --> 01:05:11.800 Unfortunately it didn’t stop with the United States. 01:05:11.900 --> 01:05:21.000 The European Union adopted a directive in 2003 I believe, requiring such laws. 01:05:21.300 --> 01:05:27.900 The directive only says that commercial distribution has to be banned 01:05:28.000 --> 01:05:34.000 but just about every country in the European Union has adopted a nastier law. 01:05:34.700 --> 01:05:40.400 In France, the mere possession of a copy of that program 01:05:40.500 --> 01:05:46.000 is an offense punished by imprisonment, thanks to Sarkozy. 01:05:47.900 --> 01:05:52.400 I believe that was done by the law DADVSI. 01:05:53.000 --> 01:05:56.300 I guess he hoped that with an unpronounceable name 01:05:56.400 --> 01:06:00.000 people wouldn’t be able to criticize it. 01:06:02.000 --> 01:06:08.000 So, elections are coming. Ask the candidates in the parties: 01:06:08.100 --> 01:06:14.400 will you repeal the DADVSI? And if not, don’t support them. 01:06:14.800 --> 01:06:22.400 You mustn’t give up lost moral territory forever. 01:06:22.500 --> 01:06:26.000 You’ve got to fight to win it back. 01:06:26.100 --> 01:06:31.600 So, we still are fighting against digital handcuffs. 01:06:31.800 --> 01:06:36.000 The Amazon “Swindle” has digital handcuffs 01:06:36.100 --> 01:06:41.300 to take away the traditional freedoms of readers to do things such as: 01:06:41.400 --> 01:06:46.000 give a book to someone else, or lend a book to someone else. 01:06:46.100 --> 01:06:49.000 That’s a vitally important social act. 01:06:49.100 --> 01:06:55.400 That is what builds society among people who read: lending books. 01:06:55.500 --> 01:06:59.000 Amazon doesn’t want to let people lend books freely. 01:06:59.100 --> 01:07:08.000 And then there is also selling a book, perhaps to a used bookstore. You can’t do that either. 01:07:12.000 --> 01:07:18.000 It looked for a while as if DRM had disappeared on music 01:07:18.100 --> 01:07:25.900 but now they’re bringing it back with streaming services such as Spotify. 01:07:26.000 --> 01:07:31.000 These services all require proprietary client software 01:07:31.100 --> 01:07:37.000 and the reason is so they can put digital handcuffs on the users. 01:07:37.700 --> 01:07:44.600 So, reject them! They already showed quite openly 01:07:44.700 --> 01:07:48.000 that you can’t trust them, because first they said: 01:07:48.100 --> 01:07:51.000 “you can listen as much as you like”, and then they said: 01:07:51.100 --> 01:07:55.000 “Oh, no! You can only listen a certain number of hours a month.” 01:07:57.900 --> 01:08:06.800 The issue is not whether that particular change was good or bad, just or unjust; 01:08:06.900 --> 01:08:11.300 the point is, they have the power to impose any change in policies. 01:08:11.400 --> 01:08:14.500 So don’t let them have that power. 01:08:14.600 --> 01:08:21.000 You should have your own copy of any music you want to listen to. 01:08:22.100 --> 01:08:34.500 And then came the next assault on our freedom: HADOPI, basically punishment on accusation. 01:08:34.600 --> 01:08:41.400 It was started in France but it’s been exported to many other countries. 01:08:41.800 --> 01:08:50.000 The United States now demand such unjust policies in its free exploitation treaties. 01:08:50.100 --> 01:09:00.000 A few months ago, Columbia adopted such a law under orders from its masters in Washington. 01:09:01.000 --> 01:09:05.000 Of course, the ones in Washington are not the real masters 01:09:05.100 --> 01:09:10.500 they’re just the ones who control the United States on behalf of the Empire. 01:09:11.000 --> 01:09:19.000 But they’re the ones who also dictate to Columbia on behalf of the Empire. 01:09:21.900 --> 01:09:27.800 In France, since the Constitutional Council 01:09:27.900 --> 01:09:33.000 objected to explicitly giving people punishment without trial 01:09:33.100 --> 01:09:36.800 they invented a kind of trial which is not a real trial 01:09:36.900 --> 01:09:39.000 which is just a form of a trial 01:09:39.100 --> 01:09:44.300 so they can pretend that people have a trial before they’re punished. 01:09:44.400 --> 01:09:47.000 But in other countries they don’t bother with that 01:09:47.100 --> 01:09:52.000 it’s explicit punishment on accusation only. 01:09:53.000 --> 01:09:57.000 Which means that for the sake of their war on sharing 01:09:57.100 --> 01:10:01.400 they’re prepared to abolish the basic principles of justice. 01:10:01.500 --> 01:10:08.700 It shows how thoroughly anti-freedom, anti-justice they are. 01:10:08.800 --> 01:10:12.000 These are not legitimate governments. 01:10:15.500 --> 01:10:19.000 And I’m sure they’ll come up with more nasty ideas 01:10:19.100 --> 01:10:27.000 because they’re paid to defeat the people no matter what it takes. 01:10:28.700 --> 01:10:36.000 Now, when they do this, they always say that it’s for the sake of the artists 01:10:36.100 --> 01:10:42.000 that they have “protect” the “creators”. 01:10:42.100 --> 01:10:45.000 Now those are both propaganda terms. 01:10:45.100 --> 01:10:48.200 I‘m convinced that the reason they love the word “creators“ 01:10:48.300 --> 01:10:53.400 is because it is a comparison with a deity. 01:10:53.500 --> 01:10:57.000 They want us to think of artists as super-human 01:10:57.100 --> 01:11:03.000 and thus deserving special privileges and power over us 01:11:03.600 --> 01:11:06.800 which is something I disagree with. 01:11:06.900 --> 01:11:15.000 In fact though, the only artists that benefit very much from this system are the big stars. 01:11:15.300 --> 01:11:20.300 The other artists are getting crushed into the ground 01:11:20.400 --> 01:11:24.400 by the heels of these same companies. 01:11:25.600 --> 01:11:30.300 But they treat the stars very well, because the stars have a lot of clout. 01:11:30.400 --> 01:11:34.000 If a star threatens to move to another company, the company says: 01:11:34.100 --> 01:11:36.500 “oh, we’ll give you what you want.” 01:11:36.600 --> 01:11:44.000 But for any other artist they say: “you don’t matter, we can treat you any way we like.” 01:11:46.600 --> 01:11:54.200 So the superstars have been corrupted by the millions of dollars or euros that they get 01:11:54.300 --> 01:12:01.300 to the point where they’ll do almost anything for more money. 01:12:01.900 --> 01:12:06.200 For instance, J. K. Rowling is a good example. 01:12:07.800 --> 01:12:12.800 J. K. Rowling, a few years ago, went to court in Canada 01:12:12.900 --> 01:12:21.200 and obtained an order that people who had bought her books must not read them. 01:12:21.800 --> 01:12:27.000 She got an order telling people not to read her books. 01:12:27.500 --> 01:12:34.900 Here’s what happened. A bookstore put the books on display for sale too early 01:12:35.000 --> 01:12:38.600 before the day they were supposed to go on sale. 01:12:38.700 --> 01:12:40.700 And people came into the store and said: 01:12:40.800 --> 01:12:44.600 “oh, I want that!” and they bought it and took away their copies. 01:12:44.700 --> 01:12:50.800 Then, they discovered the mistake so they took the copies off of display. 01:12:52.200 --> 01:13:01.700 But Rowling wanted to crush any circulation of any information from those books 01:13:01.800 --> 01:13:04.900 so she went to court, and the court ordered 01:13:05.000 --> 01:13:10.000 those people not to read the books that they now owned. 01:13:11.900 --> 01:13:19.000 In response, I call for a total boycott of Harry Potter. 01:13:20.200 --> 01:13:25.000 But I don’t say you shouldn’t read those books or watch the movies 01:13:25.100 --> 01:13:30.000 I only say you shouldn’t buy the books or pay for the movies. 01:13:30.300 --> 01:13:36.300 I leave it to Rowling to tell people not to read the books. 01:13:37.800 --> 01:13:44.000 As far as I’m concerned, if you borrow the book and read it, that’s okay. 01:13:44.800 --> 01:13:52.900 Just don’t give her any money! But this happened with paper books. 01:13:53.000 --> 01:13:57.000 The court could make this order but it couldn’t get the books back 01:13:57.100 --> 01:13:59.900 from the people who had bought them. 01:14:00.000 --> 01:14:06.400 Imagine if they were ebooks. Imagine if they were ebooks on the “Swindle”. 01:14:06.500 --> 01:14:12.000 Amazon could send commands to erase them. 01:14:16.000 --> 01:14:25.400 So, I don’t have much respect for stars who will go to such lengths for more money. 01:14:25.500 --> 01:14:31.300 But most artists aren’t like that, they never got enough money to be corrupted. 01:14:31.800 --> 01:14:39.000 Because the current system of copyright supports most artists very badly. 01:14:39.100 --> 01:14:47.000 And so, when these companies demand to expand the war on sharing 01:14:47.100 --> 01:14:50.000 supposedly for the sake of the artists 01:14:50.100 --> 01:14:54.400 I’m against what they want but I would like to support the artists better. 01:14:54.500 --> 01:15:01.000 I appreciate their work and I realize if we want them to do more work we should support them. 01:15:01.100 --> 01:15:05.000 I have two proposals for how to support artists 01:15:05.100 --> 01:15:09.000 methods that are compatible with sharing. 01:15:09.100 --> 01:15:15.000 That would allow us to end the war on sharing and still support artists. 01:15:15.100 --> 01:15:18.000 One method uses tax money. 01:15:18.100 --> 01:15:24.800 We get a certain amount of public funds to distribute among artists. 01:15:25.700 --> 01:15:32.400 But, how much should each artist get? We have to measure popularity. 01:15:32.500 --> 01:15:38.100 The current system supposedly supports artists based on their popularity. 01:15:38.200 --> 01:15:44.800 So I’m saying let’s keep that, let’s continue on this system based on popularity. 01:15:44.900 --> 01:15:48.000 We can measure the popularity of all the artists 01:15:48.100 --> 01:15:54.100 with some kind of polling or sampling, so that we don’t have to do surveillance. 01:15:54.200 --> 01:15:57.000 We can respect people’s anonymity. 01:15:57.100 --> 01:16:01.000 We get a raw popularity figure for each artist. 01:16:01.100 --> 01:16:05.000 How do we convert that into an amount of money? 01:16:05.100 --> 01:16:12.000 The obvious way is: distribute the money in proportion to popularity. 01:16:12.600 --> 01:16:21.000 So if A is a thousand times as popular as B A will get a thousand times as much money as B. 01:16:21.300 --> 01:16:25.000 That’s not efficient distribution of the money. 01:16:25.100 --> 01:16:28.000 It’s not putting the money to good use. 01:16:28.100 --> 01:16:36.000 It’s easy for a star A to be a thousand times as popular as a fairly successful artist B. 01:16:36.100 --> 01:16:44.000 If we use linear proportion, we’ll give A a thousand times as much money as we give B. 01:16:44.100 --> 01:16:50.000 And that means that, either we have to make A tremendously rich 01:16:50.100 --> 01:16:54.500 or we are not supporting B enough. 01:16:55.000 --> 01:16:59.000 The money we use to make A tremendously rich 01:16:59.100 --> 01:17:06.200 is failing to do an effective job of supporting the arts; so, it’s inefficient. 01:17:06.300 --> 01:17:12.000 Therefore I say: let’s use the cube root. Cube root looks sort of like this. 01:17:12.100 --> 01:17:17.700 The point is: if A is a thousand times as popular as B 01:17:17.800 --> 01:17:22.200 with the cube root A will get ten times as much as B 01:17:22.800 --> 01:17:25.800 not a thousand times as much, just ten times as much. 01:17:25.900 --> 01:17:30.000 The use of the cube root shifts a lot of the money 01:17:30.100 --> 01:17:36.000 from the stars to the artists of moderate popularity. 01:17:36.600 --> 01:17:44.000 And that means, with less money we can adequately support a much larger number of artists. 01:17:44.100 --> 01:17:49.000 There are two reasons why this system would use less money than we pay now. 01:17:49.100 --> 01:17:53.000 First of all because it would be supporting artists but not companies. 01:17:53.100 --> 01:18:01.600 Second because it would shift the money from the stars to the artists of moderate popularity. 01:18:02.000 --> 01:18:09.300 Now, it would remain the case that the more popular you are, the more money you get. 01:18:09.700 --> 01:18:17.000 So the star A would still get more than B, but not astronomically more. 01:18:19.800 --> 01:18:24.000 That’s one method, and because it won’t be so much money 01:18:24.100 --> 01:18:27.100 it doesn’t matter so much how we get the money. 01:18:27.200 --> 01:18:31.000 It could be from a special tax on Internet connectivity 01:18:31.100 --> 01:18:36.000 it could just be some of the general budget that gets allocated to this purpose. 01:18:36.100 --> 01:18:39.900 We won’t care because it won’t be so much money; 01:18:40.000 --> 01:18:43.300 much less than we’re paying now. 01:18:43.900 --> 01:18:47.800 The other method I’ve proposed is voluntary payments. 01:18:47.900 --> 01:18:55.000 Suppose each player had a button you could use to send one euro. 01:18:55.900 --> 01:19:01.000 A lot of people would send it, after all it’s not that much money. 01:19:01.100 --> 01:19:06.400 I think a lot of you might push that button every day 01:19:06.500 --> 01:19:12.300 to give one euro to some artist who had made a work that you liked. 01:19:12.700 --> 01:19:15.000 But nothing would demand this 01:19:15.100 --> 01:19:19.200 you wouldn’t be required or ordered or pressured to send the money; 01:19:19.300 --> 01:19:21.800 you would do it because you felt like it. 01:19:21.900 --> 01:19:25.000 But there are some people who wouldn’t do it 01:19:25.100 --> 01:19:29.000 because they’re poor and they can’t afford to give one euro. 01:19:29.100 --> 01:19:32.000 And it’s good that they won’t give it. 01:19:32.100 --> 01:19:36.000 We don’t have to squeeze money out of poor people to support the artists. 01:19:36.100 --> 01:19:41.000 There are enough non poor people who’ll be happy to do it. 01:19:41.100 --> 01:19:48.000 Why wouldn’t you give one euro to some artists today, if you appreciated their work? 01:19:48.100 --> 01:19:56.400 It’s too inconvenient to give it to them. So my proposal is to remove the inconvenience. 01:19:56.500 --> 01:20:02.000 If the only reason not to give that euro is you would have one euro less 01:20:02.100 --> 01:20:06.000 you would do it fairly often. 01:20:07.800 --> 01:20:13.000 So these are my two proposals for how to support artists 01:20:13.100 --> 01:20:19.000 while encouraging sharing because sharing is good. 01:20:19.100 --> 01:20:25.000 Let’s put an end to the war on sharing, laws like DADVSI and HADOPI. 01:20:25.200 --> 01:20:29.000 It’s not just the methods that they propose that are evil 01:20:29.100 --> 01:20:31.000 their purpose is evil. 01:20:31.100 --> 01:20:36.000 That’s why they propose cruel and draconian measures. 01:20:36.100 --> 01:20:41.000 They’re trying to do something that’s nasty by nature. 01:20:41.100 --> 01:20:45.300 So let’s support artists in other ways. 01:20:45.900 --> 01:20:52.000 The last threat to our freedom in digital society is the fact 01:20:52.100 --> 01:21:01.000 that we don’t have a firm right to do the things we do, in cyberspace. 01:21:02.000 --> 01:21:05.800 In the physical world, if you have certain views 01:21:05.900 --> 01:21:11.400 and you want to give people copies of a text that defends those views 01:21:11.500 --> 01:21:16.000 you’re free to do so. You could even buy a printer to print them 01:21:16.100 --> 01:21:20.900 and you’re free to hand them out on the street 01:21:21.000 --> 01:21:25.000 or you’re free to rent a store and hand them out there. 01:21:25.100 --> 01:21:29.000 If you want to collect money to support your cause 01:21:29.100 --> 01:21:33.800 you can just have a can and people could put money into the can. 01:21:33.900 --> 01:21:42.000 You don’t need to get somebody else’s approval or cooperation to do these things. 01:21:42.100 --> 01:21:47.200 But, in the Internet, you do need that. 01:21:47.300 --> 01:21:51.000 For instance if you want to distribute a text on the Internet 01:21:51.100 --> 01:21:58.000 you need companies to help you do it. You can’t do it by yourself. 01:21:58.100 --> 01:22:06.000 So if you want to have a website, you need the support of an ISP or a hosting company 01:22:06.100 --> 01:22:09.000 and you need a domain name registrar. 01:22:09.100 --> 01:22:14.400 You need them to continue to let you do what you’re doing. 01:22:14.500 --> 01:22:20.700 So you’re doing it effectively on sufferance, not by right. 01:22:20.900 --> 01:22:25.800 And if you want to receive money, you can’t just hold out a can. 01:22:25.900 --> 01:22:33.000 You need the cooperation of a payment company. 01:22:37.700 --> 01:22:45.800 And we saw that this makes all of our digital activities vulnerable to suppression. 01:22:45.900 --> 01:22:49.000 We learned this when the United States government 01:22:49.100 --> 01:22:54.000 launched a distributed denial of service attack [DDoS] against WikiLeaks. 01:22:54.100 --> 01:23:00.900 Now I’m making a bit of a joke because the words “distributed denial of service attack” 01:23:01.000 --> 01:23:05.000 usually refer to a different kind of attack. 01:23:05.100 --> 01:23:09.000 But they fit perfectly with what the United States did. 01:23:09.000 --> 01:23:16.000 The United States went to the various kinds of network services that WikiLeaks depended on 01:23:16.100 --> 01:23:22.400 and told them to cut off service to WikiLeaks. And they did. 01:23:22.500 --> 01:23:27.300 For instance, WikiLeaks had rented a virtual Amazon server 01:23:27.800 --> 01:23:35.000 and the US government told Amazon: “cut off service for WikiLeaks.” And it did, arbitrarily. 01:23:36.000 --> 01:23:41.400 And then, Amazon had certain domain names such as wikileaks.org 01:23:41.700 --> 01:23:47.000 the US government tried to get all those domains shut off. 01:23:47.100 --> 01:23:53.000 But it didn’t succeed, some of them were outside its control and were not shut off. 01:23:55.000 --> 01:24:02.500 Then, there were the payment companies. The US went to PayPal and said: 01:24:02.600 --> 01:24:07.300 “Stop transferring money to WikiLeaks or we’ll make life difficult for you.” 01:24:07.400 --> 01:24:11.000 And PayPal shut off payments to WikiLeaks. 01:24:11.100 --> 01:24:18.000 And then it went to Visa and Mastercard and got them to shut off payments to WikiLeaks. 01:24:18.100 --> 01:24:27.000 Others started collecting money on WikiLeaks behalf and their accounts were shut off too. 01:24:27.100 --> 01:24:31.300 But in this case, maybe something can be done. 01:24:31.600 --> 01:24:38.000 There’s a company in Iceland which began collecting money on behalf of WikiLeaks 01:24:38.100 --> 01:24:41.700 and so Visa and Mastercard shut off its account; 01:24:41.800 --> 01:24:46.000 it couldn’t receive money from its customers either. 01:24:46.100 --> 01:24:51.700 Now, that business is suing Visa and Mastercard apparently under European Union law 01:24:51.800 --> 01:24:56.600 because Visa and Mastercard together have a near-monopoly. 01:24:56.700 --> 01:25:01.500 They’re not allowed to arbitrarily deny service to anyone. 01:25:01.600 --> 01:25:05.000 Well, this is an example of how things need to be 01:25:05.100 --> 01:25:10.500 for all kinds of services that we use in the Internet. 01:25:10.700 --> 01:25:17.000 If you rented a store to hand out statements of what you think 01:25:17.100 --> 01:25:22.400 or any other kind of information that you can lawfully distribute 01:25:22.500 --> 01:25:27.800 the landlord couldn’t kick you out just because he didn’t like what you were saying. 01:25:27.900 --> 01:25:32.800 As long as you keep paying the rent, you have the right to continue in that store 01:25:32.900 --> 01:25:37.000 for a certain agreed-on period of time that you signed. 01:25:37.100 --> 01:25:41.000 So you have some rights that you can enforce. 01:25:41.100 --> 01:25:44.300 And they couldn’t shut off your telephone line 01:25:44.400 --> 01:25:48.500 because the phone company doesn’t like what you said 01:25:48.600 --> 01:25:55.000 or because some powerful entity didn’t like what you said and threatened the phone company. 01:25:55.100 --> 01:26:03.300 No! As long as you pay the bills and obey certain basic rules 01:26:03.400 --> 01:26:11.000 they can’t shut off your phone line. This is what it’s like to have some rights! 01:26:11.100 --> 01:26:18.300 Well, if we move our activities from the physical world to the virtual world 01:26:18.700 --> 01:26:27.000 then either we have the same rights in the virtual world, or we have been harmed. 01:26:28.000 --> 01:26:37.000 So, the precarity of all our Internet activities is the last of the menaces I wanted to mention. 01:26:37.100 --> 01:26:46.000 Now I’d like to say that for more information about free software, look at GNU.org. 01:26:46.100 --> 01:26:52.400 Also look at fsf.org, which is the website of the Free Software Foundation. 01:26:52.500 --> 01:26:58.400 You can go there and find many ways you can help us, for instance. 01:26:58.500 --> 01:27:03.500 You can also become a member of the Free Software Foundation through that site 01:27:03.600 --> 01:27:11.100 if you're going to do e-commerce. If you'd like to join and pay cash 01:27:11.200 --> 01:27:14.100 right here you can do that too. I've got cards you can fill out. 01:27:14.200 --> 01:27:24.000 There is also the Free Software Foundation of Europe fsfe.org. You can join FSFE also. 01:27:24.500 --> 01:27:28.000 Can you accept membership in cash? 01:27:28.100 --> 01:27:31.000 Is there someone who wants to join right now? 01:27:31.100 --> 01:27:37.000 Ok, so you can join FSFE also paying with cash. 01:27:39.000 --> 01:27:42.000 Now it's time and, by the way 01:27:42.100 --> 01:27:47.700 I know the case of the FSF we get most of our funds from members 01:27:47.800 --> 01:27:53.000 so joining is really important and probably for FSFE as well. 01:27:53.100 --> 01:27:57.000 Now it's time for me to raise funds in another way. 01:27:57.100 --> 01:28:04.000 This is an adorable gnu that needs a home. 01:28:05.000 --> 01:28:11.400 And I'm going to auction it on behalf of the Free Software Foundation. 01:28:11.800 --> 01:28:17.000 If you buy the gnu, I'll sign a card for you, if you like 01:28:17.600 --> 01:28:22.000 and if you have a penguin you need to get a gnu 01:28:22.100 --> 01:28:28.000 because as we all know a penguin can hardly function without a gnu. 01:28:31.000 --> 01:28:38.000 When you bid, please wave your arm and shout the quantity you are bidding 01:28:38.100 --> 01:28:40.600 so that I notice you. 01:28:40.700 --> 01:28:44.000 If you are bidding, I think you want me to notice that you're bidding. 01:28:46.000 --> 01:28:51.000 The FSF can accept payments either in cash or with a credit card. 01:28:51.100 --> 01:28:56.000 If the credit card works for ordering by telephone then it won't work with us. 01:28:57.000 --> 01:29:03.000 So, I'm going to start with 20 euros. Do I get 20 euros? 01:29:03.600 --> 01:29:07.000 I've got 20 euros, do I have 25? 01:29:09.100 --> 01:29:12.000 How much? 01:29:16.000 --> 01:29:20.000 Trente? Ok, I've got 30 euros, do I have 35? 01:29:21.100 --> 01:29:24.800 How much? I've got 35, do I get 40? 01:29:25.000 --> 01:29:28.200 I have 42 01:29:32.000 --> 01:29:36.000 I have 42 euros, do I have 50? 01:29:36.800 --> 01:29:40.400 How much? I've got 50, do I get 60? 01:29:46.000 --> 01:29:49.000 I've got 60, do I get 70? 01:29:52.100 --> 01:29:56.000 How much? I've got 70, do I get 80? 01:30:02.000 --> 01:30:05.000 I've got 80, do I get 90? 01:30:05.100 --> 01:30:11.000 I've got 80 euros, do I get 90 for this adorable gnu? 01:30:14.400 --> 01:30:20.000 How much? I've got 100 euros, do I get 110? 01:30:25.000 --> 01:30:29.000 I've got 110, do I get 120? 01:30:30.000 --> 01:30:34.000 I've got 120, do I get 130? 01:30:39.000 --> 01:30:46.000 I've got 130, do I get 140? 01:30:46.100 --> 01:30:51.000 How much? I've got 140, do I get 150? 01:30:54.700 --> 01:30:58.000 I've got 150, do I get 160? 01:30:58.500 --> 01:31:02.000 I've got 160, do I get 170? 01:31:05.000 --> 01:31:10.000 How much? I've got 170, do I get 180? 01:31:14.100 --> 01:31:18.200 Do you bid? I've got 200 01:31:25.000 --> 01:31:29.000 I've got 200, do I get 210? 01:31:32.600 --> 01:31:36.000 I've got 210, do I get 220? 01:31:44.000 --> 01:31:49.800 I've got 220, do I get 230? 01:31:49.900 --> 01:31:54.600 Do I get 230 for this adorable gnu that needs a home? 01:31:54.700 --> 01:32:00.000 Do I get 230 to the Free Software Foundation to defend freedom? 01:32:01.700 --> 01:32:05.000 Last chance to bid. How much? 01:32:06.200 --> 01:32:10.000 I've got 230, do I get 240? 01:32:14.000 --> 01:32:17.100 I've got 240, do I get 250? 01:32:20.000 --> 01:32:23.500 For this adorable gnu to defend freedom? 01:32:23.600 --> 01:32:28.000 How much? I've got 300 01:32:32.000 --> 01:32:44.000 I've got 300, do I get 320 for this adorable gnu to defend freedom? 01:32:46.500 --> 01:32:53.000 I've got 320, do I get 340? 01:32:55.600 --> 01:33:00.000 How much? 340? I've got 340, do I get 360? 01:33:04.000 --> 01:33:08.000 What? I've got 340. 01:33:09.000 --> 01:33:14.100 No, no I don't want to go up by such small increments, we'll be here all night 01:33:14.200 --> 01:33:18.000 I've got 340, do I get 360? 01:33:19.600 --> 01:33:23.000 I've got 360, do I get 380? 01:33:23.100 --> 01:33:30.000 I've got 380, do I get 400? 01:33:30.100 --> 01:33:34.500 to defend freedom? for this adorable gnu, do I get 400? 01:33:34.700 --> 01:33:41.000 I've got 380, do I get 400? Last chance to bid, 400 or more. 01:33:41.100 --> 01:33:46.000 Last chance, going... 01:33:46.500 --> 01:33:54.200 I've got 400, do I get 420? 01:33:57.100 --> 01:34:07.000 How much? I've got 420, do I get 440? 01:34:07.800 --> 01:34:13.000 Last chance to bid 440 or more for this adorable gnu. 01:34:13.700 --> 01:34:20.600 Do I get 440? Last chance, going, going 01:34:21.000 --> 01:34:25.000 sold for 420. 01:34:29.200 --> 01:34:37.700 Please note that there are stickers which are gratuit to take. 01:34:37.800 --> 01:34:40.300 Please take as many as you can and make good use of. 01:34:40.400 --> 01:34:48.700 There are also various small things to sell, like badges and elegant pins 01:34:48.900 --> 01:34:51.600 and the money supports the Free Software Foundation. 01:34:51.700 --> 01:34:53.000 Anyway now it's time for me to answer questions.