WEBVTT 00:00:10.000 --> 00:00:14.000 Merci. Félicitations aux étudiants [de l'association Libertés Numériques -- NdR] 00:00:14.100 --> 00:00:16.000 d’avoir organisé cette réunion. 00:00:16.100 --> 00:00:19.900 Ils ont eu raison, non seulement à cause de la célébrité de Richard 00:00:20.000 --> 00:00:22.200 mais aussi parce que les sujets nous intéressent beaucoup. 00:00:22.300 --> 00:00:25.000 Ils nous intéressent particulièrement ici à Sciences Po 00:00:25.100 --> 00:00:29.200 puisque nous essayons d’abord d’étudier les controverses; 00:00:29.300 --> 00:00:31.200 certains d’entre vous ici étudient les controverses 00:00:31.300 --> 00:00:34.100 et Richard est lui-même un personnage controversé. 00:00:34.200 --> 00:00:37.000 Je n’ai rien trouvé sur le Web qui permette de donner un accord 00:00:37.100 --> 00:00:45.100 ni sur ce qu’il fait, ni sur ce qu’il dit, ni sur les mots qu’il utilise, donc il est un cas d’école 00:00:45.200 --> 00:00:48.700 pour nous qui étudions les cartographies de controverse dans cette maison. 00:00:48.800 --> 00:00:51.700 On a en quelque sorte la présentation d’un personnage controversé 00:00:51.800 --> 00:00:53.700 sur des sujets qui nous importent. 00:00:53.800 --> 00:00:56.800 Le deuxième point évidemment, c’est que le sujet lui-même 00:00:56.900 --> 00:01:01.000 et la question des degrés de liberté et de contrôle 00:01:01.100 --> 00:01:08.200 qui sont au cœur de toutes ces innovations autour du numérique 00:01:08.300 --> 00:01:11.000 nous intéressent directement, pour des raisons de sciences politiques 00:01:11.100 --> 00:01:14.300 pour des raisons de sociologie, pour des raisons également de droit 00:01:14.400 --> 00:01:18.000 toutes questions qui nous intéressent dans cette maison. 00:01:18.100 --> 00:01:21.800 C’est d’ailleurs assez intéressant que Richard vienne chez nous 00:01:21.900 --> 00:01:28.100 quelques jours après la mort de Steve Jobs, mort qu’il a célébrée à sa façon si j’ose dire 00:01:28.200 --> 00:01:32.200 en expliquant que la disparition de Steve Jobs n’était pas un énorme malheur 00:01:32.300 --> 00:01:36.100 pour l’ensemble des questions de liberté numérique 00:01:36.200 --> 00:01:40.000 à cause du fait que — même si on pouvait estimer Steve Jobs 00:01:40.100 --> 00:01:42.800 le contrôle qu’il exerçait sur les logiciels 00:01:42.900 --> 00:01:47.000 et la domination qui nous rend en quelque sorte libres 00:01:47.100 --> 00:01:51.000 mais sous la forme, comme il le dit dans plusieurs de ses propos 00:01:51.100 --> 00:01:54.200 d’une espèce de prison dorée — prison dorée que j’adore 00:01:54.300 --> 00:01:56.600 puisque je suis moi-même un adepte du Macintosh 00:01:56.700 --> 00:01:59.000 mais ce n’est pas évidemment le genre de personnage 00:01:59.100 --> 00:02:01.600 le genre de liberté auxquels pense Richard. 00:02:01.700 --> 00:02:04.000 La troisième raison, c’est évidemment que 00:02:04.100 --> 00:02:06.700 pour des tas de questions qui nous intéressent directement 00:02:06.800 --> 00:02:09.000 dans cette maison autour des humanités scientifiques 00:02:09.100 --> 00:02:11.700 la liaison entre les innovations techniques 00:02:11.800 --> 00:02:14.700 et les dipositifs politiques nous intéresse directement. 00:02:14.800 --> 00:02:17.700 Donc nous avons au moins, en tout cas moi à la direction scientifique 00:02:17.800 --> 00:02:23.000 trois raisons de nous réjouir de l’initiative du groupe d’élèves 00:02:23.100 --> 00:02:25.000 qui a organisé cette réunion 00:02:25.100 --> 00:02:28.000 et je suis heureux de laisser la parole à Richard Stallman 00:02:28.100 --> 00:02:31.100 et je vous prie de l’applaudir avant qu’il ne parle. 00:02:37.700 --> 00:02:43.100 Aidez-nous à continuer les sous titres SVP ! 99:59:59.999 --> 99:59:59.999 il y a de multiples façons par lesquelles notre liberté est attaquée par les technologies numériques 99:59:59.999 --> 99:59:59.999 les technologies numériques peuvent rendre les choses pires et elles le feront tant que nous ne nous batterons pas pour le prévenir 99:59:59.999 --> 99:59:59.999 So, projects with the goal of digital inclusion are making a big aassumption: 99:59:59.999 --> 99:59:59.999 They are assuming that participating in a digital society is good. 99:59:59.999 --> 99:59:59.999 But that's not necessarily true! 99:59:59.999 --> 99:59:59.999 Being in a digital society can be good or bad depending on wether that digiatl society is just or unjust. 99:59:59.999 --> 99:59:59.999 And there are many ways in which our freedom is being attacked by digital technology. 99:59:59.999 --> 99:59:59.999 Digital technology can make things worse and it will unless we fight to prevent it. 99:59:59.999 --> 99:59:59.999 Therefor, if we have an unjust digital society we should cancel these projects for digital inclusion and launch projects for digital extraction. 99:59:59.999 --> 99:59:59.999 We have to be - We have to extract people from digital society if it does not respect their freedom. 99:59:59.999 --> 99:59:59.999 Or we have to make it respect their freedom. 99:59:59.999 --> 99:59:59.999 So, what are the threats? 99:59:59.999 --> 99:59:59.999 First: Surveillance. 99:59:59.999 --> 99:59:59.999 Computers are Stalin's dreams. They are ideal tools for surveillance because everything we do with computers, the computer can record. 99:59:59.999 --> 99:59:59.999 They can record the information in a perfectly indexed and searchable form in a central database. 99:59:59.999 --> 99:59:59.999 Ideal for any tyran who want to crush opposition. 99:59:59.999 --> 99:59:59.999 Surveillance is sometimes done with our own computers. 99:59:59.999 --> 99:59:59.999 For instance, if you have a computer that's running Microsoft Windows, that system is doing surveillance. 99:59:59.999 --> 99:59:59.999 There are features in Windows that send data to some server. 99:59:59.999 --> 99:59:59.999 Data about the use of the computer. 99:59:59.999 --> 99:59:59.999 A surveillance feature was discovered in the iPhone a few month ago and 99:59:59.999 --> 99:59:59.999 people started to call it the SpyPhone. 99:59:59.999 --> 99:59:59.999 FlashPlayer has a surveillance feature too and so does the Amazon "Swindle". 99:59:59.999 --> 99:59:59.999 They call it the Kindle but I call it swindle ????? because it's meant to swindle users out of their freedom. 99:59:59.999 --> 99:59:59.999 It makes people identify themselves whenever they buy a book. 99:59:59.999 --> 99:59:59.999 And that means Amazon has a giant list of all the books each user has read ... 99:59:59.999 --> 99:59:59.999 And such a list must not exist anywhere. 99:59:59.999 --> 99:59:59.999 Most portable phone will transmit their location using - computed using GPS on remote command 99:59:59.999 --> 99:59:59.999 and the phone's company is accumulating a giant list of places that the user has been. 99:59:59.999 --> 99:59:59.999 A German MP in a green party asked the phone company to give him the data it had about where he was. 99:59:59.999 --> 99:59:59.999 He had to sue, to go to court, to get this information. 99:59:59.999 --> 99:59:59.999 When he got it, he received 44000 location points for a period of 6 months. 99:59:59.999 --> 99:59:59.999 That's more than 200 per day. 99:59:59.999 --> 99:59:59.999 So what that means is someone could form a very good picture of his activities just by looking at that data. 99:59:59.999 --> 99:59:59.999 Surveillance is also done - well 99:59:59.999 --> 99:59:59.999 We can stop our own's computers from doing surveillance on us if we have control of the software that they run. 99:59:59.999 --> 99:59:59.999 But the software these people are running, they don't have control over it. 99:59:59.999 --> 99:59:59.999 Non free software ... and that's why it has malicious features such as the surveillance. 99:59:59.999 --> 99:59:59.999 However, the surveillance is not always done with our own computers. 99:59:59.999 --> 99:59:59.999 It's also done at one remove (???). 99:59:59.999 --> 99:59:59.999 For instance, ISPs in Europe are required to keep data about the user's internet communication for a long time 99:59:59.999 --> 99:59:59.999 in case the state decides to investigate that person later for whatever immaginable reason. 99:59:59.999 --> 99:59:59.999 And with a portable phone, even if you can stop the phone from transmitting your GPS location, 99:59:59.999 --> 99:59:59.999 the system can determine the phone's location approximately by comparing when the signals arrive 99:59:59.999 --> 99:59:59.999 at tdifferent towers. So the phone's system can do surveillance even without special cooperation from the phone itself.