0:00:10.000,0:00:14.000 Merci. Félicitations aux étudiants[br][de l'association Libertés Numériques -- NdR] 0:00:14.100,0:00:16.000 d’avoir organisé cette réunion. 0:00:16.100,0:00:19.900 Ils ont eu raison, non seulement[br]à cause de la célébrité de Richard 0:00:20.000,0:00:22.200 mais aussi parce que les sujets[br]nous intéressent beaucoup. 0:00:22.300,0:00:25.000 Ils nous intéressent particulièrement[br]ici à Sciences Po 0:00:25.100,0:00:29.200 puisque nous essayons d’abord[br]d’étudier les controverses; 0:00:29.300,0:00:31.200 certains d’entre vous ici[br]étudient les controverses 0:00:31.300,0:00:34.100 et Richard est lui-même[br]un personnage controversé. 0:00:34.200,0:00:37.000 Je n’ai rien trouvé sur le Web[br]qui permette de donner un accord 0:00:37.100,0:00:45.100 ni sur ce qu’il fait, ni sur ce qu’il dit, ni sur[br]les mots qu’il utilise, donc il est un cas d’école 0:00:45.200,0:00:48.700 pour nous qui étudions les cartographies[br]de controverse dans cette maison. 0:00:48.800,0:00:51.700 On a en quelque sorte la présentation[br]d’un personnage controversé 0:00:51.800,0:00:53.700 sur des sujets qui nous importent. 0:00:53.800,0:00:56.800 Le deuxième point évidemment,[br]c’est que le sujet lui-même 0:00:56.900,0:01:01.000 et la question des degrés[br]de liberté et de contrôle 0:01:01.100,0:01:08.200 qui sont au cœur de toutes[br]ces innovations autour du numérique 0:01:08.300,0:01:11.000 nous intéressent directement,[br]pour des raisons de sciences politiques 0:01:11.100,0:01:14.300 pour des raisons de sociologie,[br]pour des raisons également de droit 0:01:14.400,0:01:18.000 toutes questions qui[br]nous intéressent dans cette maison. 0:01:18.100,0:01:21.800 C’est d’ailleurs assez intéressant[br]que Richard vienne chez nous 0:01:21.900,0:01:28.100 quelques jours après la mort de Steve Jobs,[br]mort qu’il a célébrée à sa façon si j’ose dire 0:01:28.200,0:01:32.200 en expliquant que la disparition[br]de Steve Jobs n’était pas un énorme malheur 0:01:32.300,0:01:36.100 pour l’ensemble des questions[br]de liberté numérique 0:01:36.200,0:01:40.000 à cause du fait que — même[br]si on pouvait estimer Steve Jobs 0:01:40.100,0:01:42.800 le contrôle qu’il exerçait sur les logiciels 0:01:42.900,0:01:47.000 et la domination qui nous rend[br]en quelque sorte libres 0:01:47.100,0:01:51.000 mais sous la forme, comme il le dit[br]dans plusieurs de ses propos 0:01:51.100,0:01:54.200 d’une espèce de prison dorée —[br]prison dorée que j’adore 0:01:54.300,0:01:56.600 puisque je suis moi-même[br]un adepte du Macintosh 0:01:56.700,0:01:59.000 mais ce n’est pas évidemment[br]le genre de personnage 0:01:59.100,0:02:01.600 le genre de liberté auxquels pense Richard. 0:02:01.700,0:02:04.000 La troisième raison, c’est évidemment que 0:02:04.100,0:02:06.700 pour des tas de questions[br]qui nous intéressent directement 0:02:06.800,0:02:09.000 dans cette maison autour[br]des humanités scientifiques 0:02:09.100,0:02:11.700 la liaison entre les innovations techniques 0:02:11.800,0:02:14.700 et les dipositifs politiques[br]nous intéresse directement. 0:02:14.800,0:02:17.700 Donc nous avons au moins,[br]en tout cas moi à la direction scientifique 0:02:17.800,0:02:23.000 trois raisons de nous réjouir[br]de l’initiative du groupe d’élèves 0:02:23.100,0:02:25.000 qui a organisé cette réunion 0:02:25.100,0:02:28.000 et je suis heureux de laisser[br]la parole à Richard Stallman 0:02:28.100,0:02:31.100 et je vous prie de l’applaudir avant qu’il ne parle. 0:02:37.700,0:02:43.100 Aidez-nous à continuer les sous titres SVP ! 9:59:59.000,9:59:59.000 il y a de multiples façons par lesquelles notre liberté est attaquée par les technologies numériques 9:59:59.000,9:59:59.000 les technologies numériques peuvent rendre les choses pires et elles le feront tant que nous ne nous batterons pas pour le prévenir 9:59:59.000,9:59:59.000 So, projects with the goal of digital inclusion are making a big aassumption: 9:59:59.000,9:59:59.000 They are assuming that participating in a digital society is good. 9:59:59.000,9:59:59.000 But that's not necessarily true! 9:59:59.000,9:59:59.000 Being in a digital society can be good or bad depending on wether that digiatl society is just or unjust. 9:59:59.000,9:59:59.000 And there are many ways in which our freedom is being attacked by digital technology. 9:59:59.000,9:59:59.000 Digital technology can make things worse and it will unless we fight to prevent it. 9:59:59.000,9:59:59.000 Therefor, if we have an unjust digital society we should cancel these projects for digital inclusion and launch projects for digital extraction. 9:59:59.000,9:59:59.000 We have to be - We have to extract people from digital society if it does not respect their freedom. 9:59:59.000,9:59:59.000 Or we have to make it respect their freedom. 9:59:59.000,9:59:59.000 So, what are the threats? 9:59:59.000,9:59:59.000 First: Surveillance. 9:59:59.000,9:59:59.000 Computers are Stalin's dreams. They are ideal tools for surveillance because everything we do with computers, the computer can record. 9:59:59.000,9:59:59.000 They can record the information in a perfectly indexed and searchable form in a central database. 9:59:59.000,9:59:59.000 Ideal for any tyran who want to crush opposition. 9:59:59.000,9:59:59.000 Surveillance is sometimes done with our own computers. 9:59:59.000,9:59:59.000 For instance, if you have a computer that's running Microsoft Windows, that system is doing surveillance. 9:59:59.000,9:59:59.000 There are features in Windows that send data to some server. 9:59:59.000,9:59:59.000 Data about the use of the computer. 9:59:59.000,9:59:59.000 A surveillance feature was discovered in the iPhone a few month ago and 9:59:59.000,9:59:59.000 people started to call it the SpyPhone. 9:59:59.000,9:59:59.000 FlashPlayer has a surveillance feature too and so does the Amazon "Swindle". 9:59:59.000,9:59:59.000 They call it the Kindle but I call it swindle ????? because it's meant to swindle users out of their freedom. 9:59:59.000,9:59:59.000 It makes people identify themselves whenever they buy a book. 9:59:59.000,9:59:59.000 And that means Amazon has a giant list of all the books each user has read ... 9:59:59.000,9:59:59.000 And such a list must not exist anywhere. 9:59:59.000,9:59:59.000 Most portable phone will transmit their location using - computed using GPS on remote command 9:59:59.000,9:59:59.000 and the phone's company is accumulating a giant list of places that the user has been. 9:59:59.000,9:59:59.000 A German MP in a green party asked the phone company to give him the data it had about where he was. 9:59:59.000,9:59:59.000 He had to sue, to go to court, to get this information. 9:59:59.000,9:59:59.000 When he got it, he received 44000 location points for a period of 6 months. 9:59:59.000,9:59:59.000 That's more than 200 per day. 9:59:59.000,9:59:59.000 So what that means is someone could form a very good picture of his activities just by looking at that data. 9:59:59.000,9:59:59.000 Surveillance is also done - well 9:59:59.000,9:59:59.000 We can stop our own's computers from doing surveillance on us if we have control of the software that they run. 9:59:59.000,9:59:59.000 But the software these people are running, they don't have control over it. 9:59:59.000,9:59:59.000 Non free software ... and that's why it has malicious features such as the surveillance. 9:59:59.000,9:59:59.000 However, the surveillance is not always done with our own computers. 9:59:59.000,9:59:59.000 It's also done at one remove (???). 9:59:59.000,9:59:59.000 For instance, ISPs in Europe are required to keep data about the user's internet communication for a long time 9:59:59.000,9:59:59.000 in case the state decides to investigate that person later for whatever immaginable reason. 9:59:59.000,9:59:59.000 And with a portable phone, even if you can stop the phone from transmitting your GPS location, 9:59:59.000,9:59:59.000 the system can determine the phone's location approximately by comparing when the signals arrive 9:59:59.000,9:59:59.000 at tdifferent towers. So the phone's system can do surveillance even without special cooperation from the phone itself.