1
00:00:08,220 --> 00:00:11,122
I'm very proud to have as a guest here from the United States
2
00:00:11,122 --> 00:00:14,861
coming to Elevate is James Vasile of the Freedom Box Foundation
3
00:00:14,861 --> 00:00:20,619
James Vasile is working on a multitude of projects
4
00:00:20,619 --> 00:00:23,568
like Apache, I think, Joomla and many others. He is also a lawyer,
5
00:00:23,568 --> 00:00:31,347
and he's working also with the Freedom Box Foundation and the Free Software Foundation.
6
00:00:31,347 --> 00:00:37,895
He's going to present one of the, in my opinion, most revolutionary projects I've seen in recent years
7
00:00:37,895 --> 00:00:43,236
as we can see here, a little small box, the Freedom Box.
8
00:00:43,236 --> 00:00:48,042
Yeah, erm, James is going to do a presentation and then we're going to
9
00:00:48,042 --> 00:00:50,294
be open for questions and then sit down for a talk
10
00:00:50,294 --> 00:00:53,731
so James, I give the floor to you.
11
00:00:53,731 --> 00:00:56,564
Thank you, Daniel.
12
00:00:56,564 --> 00:01:03,135
I've been here at the Elevate festival for a few days now
13
00:01:03,135 --> 00:01:10,101
I've been attending the talks and the films and the music
14
00:01:10,101 --> 00:01:15,743
and this has been an amazing place to see all these different ideas coming togethers
15
00:01:15,743 --> 00:01:21,223
I want to say thank you to Daniel for organizing so much
16
00:01:21,223 --> 00:01:23,615
of this. To Joseph as well.
17
00:01:23,615 --> 00:01:30,349
To Daniel especially for making a big effort to get me out here,
18
00:01:30,349 --> 00:01:33,484
making it possible for me to come out here and being such a gracious host.
19
00:01:33,484 --> 00:01:36,316
Thank you Dan, I really appreciate it.
20
00:01:36,316 --> 00:01:42,841
APPLAUSE
21
00:01:42,841 --> 00:01:52,524
A long time ago, in the beginning of the internet
22
00:01:52,524 --> 00:01:56,657
When we first started using the internet as a way to talk to each other
23
00:01:56,657 --> 00:02:00,651
We mostly talked directly to each other, right?
24
00:02:00,651 --> 00:02:05,086
Think about how email works, on a technical level
25
00:02:05,086 --> 00:02:10,009
You take a message, you hand it off to your mail transport agent
26
00:02:10,009 --> 00:02:14,653
It sends it through a network, directly to the recipient.
27
00:02:14,653 --> 00:02:16,905
It hops through some other computers, but funadmentally
28
00:02:16,905 --> 00:02:21,084
you use the network to talk directly to your other computer
29
00:02:21,084 --> 00:02:26,309
the other computer where the recipient gets his or her mail
30
00:02:26,309 --> 00:02:30,489
It was a direct communication medium.
31
00:02:30,489 --> 00:02:33,484
If you're old enough to remember a program called 'talk'
32
00:02:33,484 --> 00:02:37,176
Talk was the first, sort of, interactive you type, they see it, they type, you see it
33
00:02:37,176 --> 00:02:40,403
instant message application.
34
00:02:40,403 --> 00:02:43,074
This again, was direct.
35
00:02:43,074 --> 00:02:48,205
You would put your, put their name, into your program, and address
36
00:02:48,205 --> 00:02:51,363
they would put theirs into yours, and you would just talk directly to each other
37
00:02:51,363 --> 00:02:57,308
You didn't send this message through servers. That centralised technology.
38
00:02:57,308 --> 00:03:02,091
From there, from those beginnings of talking directly to each other
39
00:03:02,091 --> 00:03:07,733
we started to build communities, emailing directly to people.
40
00:03:07,733 --> 00:03:10,705
But that was relatively inefficient.
41
00:03:10,705 --> 00:03:17,254
Talking directly to people, one-to-one, works very good for one-to-one converstions.
42
00:03:17,254 --> 00:03:19,506
But as soon as you want a group conversation
43
00:03:19,506 --> 00:03:21,735
as soon as you want to find people reliably who you haven't
44
00:03:21,735 --> 00:03:26,774
already set up contacts for, exchanged email addresses and such
45
00:03:26,774 --> 00:03:28,724
you run into friction, you run into problems
46
00:03:28,724 --> 00:03:34,018
So the solution to that, was to create more centralised structures
47
00:03:34,018 --> 00:03:37,896
and we did this with IRC
48
00:03:37,896 --> 00:03:41,472
IRC is a place where instead of talking directly to the people we're trying to reach
49
00:03:41,472 --> 00:03:45,210
we take a message, and we send it to an IRC server
50
00:03:45,210 --> 00:03:46,696
a third party
51
00:03:46,696 --> 00:03:48,484
and the IRC server then copies that message
52
00:03:48,484 --> 00:03:51,201
to all the people who we might want to talk to.
53
00:03:51,201 --> 00:03:54,336
We developed mailing lists, listservs
54
00:03:54,336 --> 00:03:58,214
And again, this was a way where we would take our message
55
00:03:58,214 --> 00:03:59,375
and hand it to a third party
56
00:03:59,375 --> 00:04:03,392
A mail server, that is not us and not the person we're trying to talk to
57
00:04:03,392 --> 00:04:05,923
and that mail server would then echo our communication to
58
00:04:05,923 --> 00:04:07,571
all the people we want to talk to
59
00:04:07,571 --> 00:04:10,381
and this was great, because you didn't have to know the
60
00:04:10,381 --> 00:04:12,563
addresses of all the people you wanted to talk to
61
00:04:12,563 --> 00:04:15,373
You could just all 'meet' in a common place
62
00:04:15,373 --> 00:04:19,529
We all meet in an IRC chatroom, we all meet on a listserv
63
00:04:19,529 --> 00:04:23,523
And there were a lot of IRC channels, and a lot of IRC servers
64
00:04:23,523 --> 00:04:25,311
and a lot of mail servers
65
00:04:25,311 --> 00:04:27,285
all across the internet
66
00:04:27,285 --> 00:04:28,887
A lot of places to do this communication.
67
00:04:28,887 --> 00:04:32,463
And if you didn't like the policies or the structures or the technology
68
00:04:32,463 --> 00:04:34,274
of any one of these service providers
69
00:04:34,274 --> 00:04:36,503
these IRC servers, or these list servers
70
00:04:36,503 --> 00:04:38,454
you could just switch, you could choose to run your own.
71
00:04:38,454 --> 00:04:40,102
It was very simple.
72
00:04:40,102 --> 00:04:46,975
This infrastructure is not hard to create, it's not hard to run, it's not hard to install.
73
00:04:46,975 --> 00:04:49,669
And so a lot of people did run, create and install it.
74
00:04:49,669 --> 00:04:53,082
There were a bunch of IRC servers, there were a bunch of different listserv packages
75
00:04:53,082 --> 00:04:57,842
But as we've moved forward in time,
76
00:04:57,842 --> 00:05:01,395
we've started to centralise even more.
77
00:05:01,395 --> 00:05:05,366
And, you can fast-forward to today
78
00:05:05,366 --> 00:05:07,455
where we're channeling our communication
79
00:05:07,455 --> 00:05:10,567
through fewer and fewer places.
80
00:05:10,567 --> 00:05:13,702
And we are making structures that are more and more central
81
00:05:13,702 --> 00:05:15,629
and more and more over-arching
82
00:05:15,629 --> 00:05:20,830
So, from the, the IRC way of talking to each other
83
00:05:20,830 --> 00:05:25,451
we moved to instant messaging applications.
84
00:05:25,451 --> 00:05:28,144
AOL Instant Messenger, ICQ,
85
00:05:28,144 --> 00:05:31,372
those were the early ways to do it
86
00:05:31,372 --> 00:05:33,299
and there were only a few of them
87
00:05:33,299 --> 00:05:36,852
MSN had its messaging system, Yahoo had its messaging system
88
00:05:36,852 --> 00:05:39,383
and when people wanted to talk to each other now,
89
00:05:39,383 --> 00:05:41,333
they were using third-parties again.
90
00:05:41,333 --> 00:05:43,144
But they were only using a few third parties.
91
00:05:43,144 --> 00:05:46,883
And if you wanted to switch providers,
92
00:05:46,883 --> 00:05:49,414
you would leave almost everyone you knew behind,
93
00:05:49,414 --> 00:05:51,364
your entire community behind.
94
00:05:51,364 --> 00:05:53,013
And so it becomes harder to switch.
95
00:05:53,013 --> 00:05:54,662
There are fewer options
96
00:05:54,662 --> 00:05:58,098
and the cost of switching leaves more and more people behind
97
00:05:58,098 --> 00:06:00,768
So you started to have lock-in.
98
00:06:00,768 --> 00:06:05,529
You started to have people who were chained to their methods of communication
99
00:06:05,529 --> 00:06:07,874
because the cost of losing your community is too high.
100
00:06:07,874 --> 00:06:10,126
And so if you don't like the technology, or you don't like the policy
101
00:06:10,126 --> 00:06:12,077
or you don't like the politics
102
00:06:12,077 --> 00:06:13,261
or if they're trying to filter you
103
00:06:13,261 --> 00:06:14,863
or censor you
104
00:06:14,863 --> 00:06:16,070
you don't have a lot of options.
105
00:06:16,070 --> 00:06:18,601
The cost of leaving is so high that you might stay.
106
00:06:18,601 --> 00:06:21,411
People do stay. And they accept it.
107
00:06:21,411 --> 00:06:25,265
And we went from that small basket of providers of this kind
108
00:06:25,265 --> 00:06:27,053
of communication technology
109
00:06:27,053 --> 00:06:29,143
to an even more centralised structure
110
00:06:29,143 --> 00:06:33,625
where there is effectively only one way to reach all our friends,
111
00:06:33,625 --> 00:06:36,040
in each mode of communication,
112
00:06:36,040 --> 00:06:37,502
Facebook.
113
00:06:37,502 --> 00:06:38,687
And Twitter.
114
00:06:38,687 --> 00:06:41,403
These two services rule everything.
115
00:06:41,403 --> 00:06:43,493
And I'm not going to stand here and say Facebook is evil
116
00:06:43,493 --> 00:06:45,142
and that Twitter is evil
117
00:06:45,142 --> 00:06:49,043
What I want to say is that having one place
118
00:06:49,043 --> 00:06:50,645
where we do all our communication
119
00:06:50,645 --> 00:06:53,176
leaves us at the mercy of the policies of the people
120
00:06:53,176 --> 00:06:55,544
that control the infrastructure that we are chained to,
121
00:06:55,544 --> 00:06:57,750
that we are stuck using, that we are locked into.
122
00:06:57,750 --> 00:07:02,232
You can't leave Facebook without leaving everybody you know
123
00:07:02,232 --> 00:07:05,645
because everybody you know is on Facebook.
124
00:07:05,645 --> 00:07:09,523
I was not a Facebook user.
125
00:07:09,523 --> 00:07:11,171
I was against Facebook.
126
00:07:11,171 --> 00:07:14,469
I thought it was bad to centralise all our communication in one place.
127
00:07:14,469 --> 00:07:15,653
I didn't like the privacy implications,
128
00:07:15,653 --> 00:07:18,207
I didn't like Facebook's censorship
129
00:07:18,207 --> 00:07:21,783
of things like pictures of nursing mothers.
130
00:07:21,783 --> 00:07:22,967
I don't think that kind of thing is obscene,
131
00:07:22,967 --> 00:07:25,498
and I don't think Facebook should have the ability to tell us
132
00:07:25,498 --> 00:07:27,565
what we can share with our friends.
133
00:07:27,565 --> 00:07:29,074
So I thought those were bad policies,
134
00:07:29,074 --> 00:07:32,464
and I reacted to that by not joining Facebook. For years.
135
00:07:32,464 --> 00:07:35,576
All my friends were on Facebook.
136
00:07:35,576 --> 00:07:41,682
I joined Facebook late last year. November.
137
00:07:41,682 --> 00:07:48,207
Because in November, a friend of mine passed away.
138
00:07:48,207 --> 00:07:50,018
His name was Chuck. He was a brilliant man.
139
00:07:50,018 --> 00:07:55,243
And he lived a lot of his life online.
140
00:07:55,243 --> 00:07:58,215
He was on Facebook, and he shared things with friends on Facebook.
141
00:07:58,215 --> 00:08:01,071
When he passed away I realised I hadn't communicated with him in a while,
142
00:08:01,071 --> 00:08:02,720
I hadn't really talked to him in a while.
143
00:08:02,720 --> 00:08:05,552
And the reason I hadn't was because I wasn't
144
00:08:05,552 --> 00:08:08,083
communicating with him in the place he communicates.
145
00:08:08,083 --> 00:08:10,034
I wasn't meeting him where he was, I wasn't on Facebook.
146
00:08:10,034 --> 00:08:12,402
I was missing out on something huge.
147
00:08:12,402 --> 00:08:15,653
That's the cost of not being there.
148
00:08:15,653 --> 00:08:17,441
And so I joined.
149
00:08:17,441 --> 00:08:19,368
Because I decided that as strong as my beliefs were,
150
00:08:19,368 --> 00:08:21,296
it was more important to me to be there with my friends and
151
00:08:21,296 --> 00:08:23,084
to talk to my friends.
152
00:08:23,084 --> 00:08:24,570
That's the power of lock-in.
153
00:08:24,570 --> 00:08:27,240
Me, a person who cares, as much as I do,
154
00:08:27,240 --> 00:08:31,048
who cares enough about these issues that I do something like this
155
00:08:31,048 --> 00:08:32,975
I got locked into Facebook. I'm there now.
156
00:08:32,975 --> 00:08:35,344
That's how I talk to a lot of my friends, whether I like it or not
157
00:08:35,344 --> 00:08:38,734
I am locked into Facebook.
158
00:08:38,734 --> 00:08:42,774
You know, I'm also on Diaspora. But my friends aren't on Diaspora.
159
00:08:42,774 --> 00:08:46,814
This sort of lock-in creates a sort of situation where
160
00:08:46,814 --> 00:08:51,133
we have one arbiter of what is acceptable speech,
161
00:08:51,133 --> 00:08:53,223
whether we like it or not.
162
00:08:53,223 --> 00:08:55,034
If they're free, we're free to the extent,
163
00:08:55,034 --> 00:08:56,218
only to the extent,
164
00:08:56,218 --> 00:08:57,263
that they give us freedom.
165
00:08:57,263 --> 00:08:59,051
And that to me isn't freedom.
166
00:08:59,051 --> 00:09:01,443
That to me is accepting what you're given.
167
00:09:01,443 --> 00:09:04,136
It's the exact opposite of making your own choices.
168
00:09:04,136 --> 00:09:08,641
The exact opposite of self-determination.
169
00:09:08,641 --> 00:09:13,564
All of our problems in communication can be traced
170
00:09:13,564 --> 00:09:16,977
to centralized communications infrastructure.
171
00:09:16,977 --> 00:09:22,620
Now, I've sort of told this story at the social level,
172
00:09:22,620 --> 00:09:25,870
in the way that we're talking about how to talk to your peers
173
00:09:25,870 --> 00:09:28,703
and your friends on the internet.
174
00:09:28,703 --> 00:09:33,765
But this story also exists when we think about relying on the pipes,
175
00:09:33,765 --> 00:09:38,247
relying on the hardware, the technical infrastructure behind the software.
176
00:09:38,247 --> 00:09:43,471
We rely on internet backbones,
177
00:09:43,471 --> 00:09:45,700
we rely on centralized cellphone networks,
178
00:09:45,700 --> 00:09:47,952
we rely on centralized telephone networks.
179
00:09:47,952 --> 00:09:52,434
The people that control these networks have the ability
180
00:09:52,434 --> 00:09:54,802
to tell us what we're allowed to say,
181
00:09:54,802 --> 00:09:56,614
when we're allowed to say it.
182
00:09:56,614 --> 00:09:59,748
They have the ability to filter us, to censor us, to influence us.
183
00:09:59,748 --> 00:10:02,581
Sometimes they use that ability, and sometimes they don't,
184
00:10:02,581 --> 00:10:04,671
and sometimes by law they're not allowed to.
185
00:10:04,671 --> 00:10:06,482
But at the end of the day
186
00:10:06,482 --> 00:10:09,268
the power doesn't rest in our hands.
187
00:10:09,268 --> 00:10:11,521
The power, from a technological perspective,
188
00:10:11,521 --> 00:10:13,587
rests in the hands of the people that operate the
189
00:10:13,587 --> 00:10:15,654
networks.
190
00:10:15,654 --> 00:10:20,414
Centralization doesn't just allow this sort of filtering and censorship.
191
00:10:20,414 --> 00:10:23,525
There's another big problem with centralization.
192
00:10:23,525 --> 00:10:26,056
The other big problem with centralization is that by
193
00:10:26,056 --> 00:10:30,050
gathering all of our data in one place
194
00:10:30,050 --> 00:10:33,510
it becomes easy
195
00:10:33,510 --> 00:10:36,645
to spy on us.
196
00:10:36,645 --> 00:10:39,338
So every time you go to a website
197
00:10:39,338 --> 00:10:41,428
pretty much
198
00:10:41,428 --> 00:10:45,445
the website includes, at the bottom of the page
199
00:10:45,445 --> 00:10:49,927
a little graphic or invisible Javascript thing
200
00:10:49,927 --> 00:10:53,061
that tells Google that you came to visit the page.
201
00:10:53,061 --> 00:10:56,173
Eva goes to a website, and the website says
202
00:10:56,173 --> 00:10:59,284
"Hey Google! Eva just came to my website!"
203
00:10:59,284 --> 00:11:01,490
Every time she goes to a website, that happens.
204
00:11:01,490 --> 00:11:04,764
And so Google effectively sits next to her and watches,
205
00:11:04,764 --> 00:11:06,552
while she uses the internet.
206
00:11:06,552 --> 00:11:07,899
Watches everything she does,
207
00:11:07,899 --> 00:11:09,083
and everything she enters,
208
00:11:09,083 --> 00:11:11,637
everything she looks at and knows.
209
00:11:11,637 --> 00:11:15,236
It's not just her search data, it's not just her Gmail.
210
00:11:15,236 --> 00:11:19,253
It's the entire picture of her digital life.
211
00:11:19,253 --> 00:11:22,086
In one place.
212
00:11:22,086 --> 00:11:23,735
That's a pretty complete profile.
213
00:11:23,735 --> 00:11:24,780
If you were able...
214
00:11:24,780 --> 00:11:27,613
...imagine if somebody could sit next to you and watch
215
00:11:27,613 --> 00:11:29,261
everything you did online,
216
00:11:29,261 --> 00:11:31,351
imagine how much they would know about you.
217
00:11:31,351 --> 00:11:33,278
That's how much Google knows about you.
218
00:11:33,278 --> 00:11:36,250
Google knows more about you than you know about yourself,
219
00:11:36,250 --> 00:11:39,942
because Google never forgets.
220
00:11:39,942 --> 00:11:42,914
Google knows more about you than your parents,
221
00:11:42,914 --> 00:11:43,959
than your partner,
222
00:11:43,959 --> 00:11:46,885
Google knows your secrets, your worst secrets,
223
00:11:46,885 --> 00:11:48,673
Google knows if you're cheating on your spouse
224
00:11:48,673 --> 00:11:49,857
because they saw you do the Google search for the
225
00:11:49,857 --> 00:11:54,641
sexually-transmitted disease.
226
00:11:54,641 --> 00:11:56,707
Google knows your hopes and your dreams.
227
00:11:56,707 --> 00:11:58,170
Because the things we hope and dream about,
228
00:11:58,170 --> 00:11:59,354
we look for more information about.
229
00:11:59,354 --> 00:12:00,701
We're natural information seekers.
230
00:12:00,701 --> 00:12:02,489
We think about something, it fascinates us,
231
00:12:02,489 --> 00:12:05,182
we go and look it up online. We search around.
232
00:12:05,182 --> 00:12:06,970
We look around the internet, and we think about it.
233
00:12:06,970 --> 00:12:11,011
And Google is right there. Following our thought process,
234
00:12:11,011 --> 00:12:15,028
the thought process in our click trail.
235
00:12:15,028 --> 00:12:19,347
That is an intimate relationship.
236
00:12:19,347 --> 00:12:21,297
Right? Do you want an intimate relationship with Google?
237
00:12:21,297 --> 00:12:21,901
Maybe you do.
238
00:12:21,901 --> 00:12:25,500
I personally, don't.
239
00:12:25,500 --> 00:12:28,774
But that's it, Google sits next to us and watches us use
240
00:12:28,774 --> 00:12:30,121
our computers.
241
00:12:30,121 --> 00:12:34,741
And if anyone actually did... if you had a friend who wanted
242
00:12:34,741 --> 00:12:37,272
to sit next to you, or a stranger said I want to sit next to you
243
00:12:37,272 --> 00:12:39,060
and just watch you use your computer all day,
244
00:12:39,060 --> 00:12:41,406
you would use that computer very differently to the way you do now.
245
00:12:41,406 --> 00:12:44,378
But because Google doesn't physically sit next to you,
246
00:12:44,378 --> 00:12:49,068
Google sits invisibly in the box, you don't know Google is there.
247
00:12:49,068 --> 00:12:51,158
But you do know, right?
248
00:12:51,158 --> 00:12:52,644
We're all aware of this. I'm not saying any of you don't know,
249
00:12:52,644 --> 00:12:55,755
especially in a room like this.
250
00:12:55,755 --> 00:12:57,102
But we don't think about it.
251
00:12:57,102 --> 00:12:58,751
We try not to think about it.
252
00:12:58,751 --> 00:13:01,584
We are locked in, to the internet.
253
00:13:01,584 --> 00:13:03,650
We can't stop using it.
254
00:13:03,650 --> 00:13:05,299
And the structures that exist,
255
00:13:05,299 --> 00:13:06,506
the infrastructure that exists,
256
00:13:06,506 --> 00:13:09,014
that has been slowly turned from
257
00:13:09,014 --> 00:13:12,729
a means to allow us to communicate with each other
258
00:13:12,729 --> 00:13:16,119
to a means of allowing us to access web services
259
00:13:16,119 --> 00:13:19,811
in return for all our personal information so we can be bought and sold
260
00:13:19,811 --> 00:13:21,599
like products.
261
00:13:21,599 --> 00:13:24,966
That is the problem. That is the problem of centralization, of having one structure.
262
00:13:24,966 --> 00:13:27,381
As soon as we put all that information in one place
263
00:13:27,381 --> 00:13:32,025
we get complete profiles of us, you get complete pictures of you.
264
00:13:32,025 --> 00:13:33,488
And that is a lot of information.
265
00:13:33,488 --> 00:13:34,556
It's valuable information.
266
00:13:34,556 --> 00:13:39,455
It's information that is used, right now, mostly to sell you things.
267
00:13:39,455 --> 00:13:42,288
And that, you might find objectionable.
268
00:13:42,288 --> 00:13:43,171
Maybe you don't.
269
00:13:43,171 --> 00:13:46,909
Maybe you don't believe the studies that say you can't ignore advertising.
270
00:13:46,909 --> 00:13:51,669
Maybe you think that you are smart and special, and advertising doesn't affect you.
271
00:13:51,669 --> 00:13:53,457
You're wrong.
272
00:13:53,457 --> 00:13:56,267
But maybe you believe that.
273
00:13:56,267 --> 00:14:02,025
But that information, that same infrastructure, that same technology that allows them
274
00:14:02,025 --> 00:14:05,973
to know you well enough to sell you soap
275
00:14:05,973 --> 00:14:12,219
allows them to know you well enough to decide how much of a credit risk you are,
276
00:14:12,219 --> 00:14:14,146
how much of a health risk you are,
277
00:14:14,146 --> 00:14:16,956
and what your insurance premiums should look like.
278
00:14:16,956 --> 00:14:18,906
In America we have a big problem right now.
279
00:14:18,906 --> 00:14:23,225
Insurance costs are out of control. Health insurance. We're having a lot of difficulty paying for it.
280
00:14:23,225 --> 00:14:28,728
Insurance companies would like to respond to this problem
281
00:14:28,728 --> 00:14:31,747
by knowing better who's a good risk and who's a bad risk
282
00:14:31,747 --> 00:14:35,624
so they can lower prices for the good risk and raise prices for the bad risk.
283
00:14:35,624 --> 00:14:41,290
Essentially they want to make people who are going to get sick, uninsurable.
284
00:14:41,290 --> 00:14:45,330
And if you could know enough about a person to know what their risk factors are based on
285
00:14:45,330 --> 00:14:49,347
what they're digital life is, if you can get just a little bit of information about them,
286
00:14:49,347 --> 00:14:53,365
maybe you can figure out who their parents are and what hereditary diseases they might be subject to,
287
00:14:53,365 --> 00:14:55,872
you can start to understand these things.
288
00:14:55,872 --> 00:14:58,844
You can start to figure out who's a good risk and who's a bad risk.
289
00:14:58,844 --> 00:15:04,487
You can use this information for ends that seem reasonable if you're a health insurance
290
00:15:04,487 --> 00:15:07,041
company, but probably don't seem reasonable if you're
291
00:15:07,041 --> 00:15:10,315
the kind of person sitting in this room, the kind of person that I talk to.
292
00:15:10,315 --> 00:15:17,467
And that's the problem. The innocuous use. The use that seems kind of icky, but not truly evil,
293
00:15:17,467 --> 00:15:19,696
which is advertising.
294
00:15:19,696 --> 00:15:25,246
It's the same mechanism, the same data, that then gets used for other purposes.
295
00:15:25,246 --> 00:15:32,838
It's the same data that then gets turned over to a government who wants to oppress you
296
00:15:32,838 --> 00:15:36,577
because you are supporting wikileaks.
297
00:15:36,577 --> 00:15:39,828
And that's not a fantasy, that's what happened.
298
00:15:39,828 --> 00:15:49,325
It's the same information that anybody who wants to know something about you for an evil end would use.
299
00:15:49,325 --> 00:15:56,616
We have a saying in the world of information, that if the data exists, you can't decide what it gets
300
00:15:56,616 --> 00:15:58,148
used for.
301
00:15:58,148 --> 00:16:03,048
Once data exists, especially data in the hands of the government, of officials,
302
00:16:03,048 --> 00:16:05,811
once that data exists, it's a resource.
303
00:16:05,811 --> 00:16:10,153
And the use of that resource it its own energy, its own logic.
304
00:16:10,153 --> 00:16:15,401
Once a resource is there begging to be used, it's very hard to stop it from being used.
305
00:16:15,401 --> 00:16:22,645
Because it's so attractive, it's so efficient, it would solve so many problems to use the data.
306
00:16:22,645 --> 00:16:28,590
And so once you collect the data, once the data exists in one centralized place,
307
00:16:28,590 --> 00:16:35,439
for anybody to come and get it with a warrant, or maybe no warrant, or maybe some money...
308
00:16:35,439 --> 00:16:41,059
somebody is going to come with a warrant, or no warrant, and they are going to get that data.
309
00:16:41,059 --> 00:16:42,847
And they will use it for whatever they want to use it.
310
00:16:42,847 --> 00:16:47,189
Once it's out of the hands of the first person who collected it, who maybe you trust,
311
00:16:47,189 --> 00:16:52,692
who maybe has good privacy policies, who maybe has no intention to do anything with your data
312
00:16:52,692 --> 00:16:58,613
other than use it for diagnostic purposes, once it's out of that person's hands it's gone.
313
00:16:58,613 --> 00:17:00,981
You never know where it goes after that.
314
00:17:00,981 --> 00:17:02,909
It is completely uncontrolled and unchecked
315
00:17:02,909 --> 00:17:05,904
and there is no ability to restrain what happens to that data.
316
00:17:05,904 --> 00:17:14,379
So all of this is my attempt to convince you that privacy is a real value in our society,
317
00:17:14,379 --> 00:17:18,095
and that the danger of losing privacy is a real problem.
318
00:17:18,095 --> 00:17:20,788
It's not just the censorship, it's not just the filtering,
319
00:17:20,788 --> 00:17:26,918
it's not just the propaganda, the influencing of opinion, that's one aspect of it,
320
00:17:26,918 --> 00:17:35,417
it's not just the free speech. It's also the privacy, because privacy goes to the heart of our autonomy.
321
00:17:35,417 --> 00:17:43,451
About a year and a half ago to two years ago at the Software Freedom Law Center
322
00:17:43,451 --> 00:17:47,607
a man named Ian Sullivan who's a co-worker of mine,
323
00:17:47,607 --> 00:17:49,697
he bought a bunch of plug servers,
324
00:17:49,697 --> 00:17:54,480
because he was really excited at the thought of using them as print servers, and media servers,
325
00:17:54,480 --> 00:17:59,240
and he started tinkering with them in our office.
326
00:17:59,240 --> 00:18:02,932
My boss Eben Moglen who is a long-time activist in the Free Software movement,
327
00:18:02,932 --> 00:18:15,030
fought very hard for Phil Zimmerman and PGP when that was a big issue,
328
00:18:15,030 --> 00:18:23,552
he looked at this technology and he immediately realised that several streams had come together in one
329
00:18:23,552 --> 00:18:24,596
place.
330
00:18:24,596 --> 00:18:27,987
There's a lot of really good technology to protect your privacy right now.
331
00:18:27,987 --> 00:18:31,144
In fact that's the stuff we're putting on the Freedom Box.
332
00:18:31,144 --> 00:18:33,095
We're not writing new software.
333
00:18:33,095 --> 00:18:36,740
We are gathering stuff, and putting it in one place.
334
00:18:36,740 --> 00:18:40,920
Stuff that other people did because there are people who are better at writing software, and security,
335
00:18:40,920 --> 00:18:43,265
than we are. We're software integrators.
336
00:18:43,265 --> 00:18:46,679
And he realised there was all this software out there, and suddenly there was a box to put it on.
337
00:18:46,679 --> 00:18:53,111
You could put all that software in one place, make it easy, and give it to people in one neat package.
338
00:18:53,111 --> 00:18:56,710
Pre-installed, pre-configured, or as close to it as we can get.
339
00:18:56,710 --> 00:19:02,654
And that, was the vision for the FreedomBox.
340
00:19:02,654 --> 00:19:08,180
The FreedomBox is a tiny computer. Look at this.
341
00:19:08,180 --> 00:19:10,874
That's small, it's unobtrusive.
342
00:19:10,874 --> 00:19:11,779
So it's a small computer.
343
00:19:11,779 --> 00:19:16,238
And we don't just mean small in size... it doesn't take a lot of energy.
344
00:19:16,238 --> 00:19:22,670
I could be running this box on a couple of AA batteries for the life of this presentation.
345
00:19:22,670 --> 00:19:24,620
You could run it on a solar panel.
346
00:19:24,620 --> 00:19:27,778
It's very lightweight infrastructure.
347
00:19:27,778 --> 00:19:33,304
You plug it into your home network, and when I say home network,
348
00:19:33,304 --> 00:19:35,092
(I'm going to pass this around)
349
00:19:35,092 --> 00:19:38,343
When I say home network, I mean home network.
350
00:19:38,343 --> 00:19:42,824
This is technology we are designing for individuals to use to talk to their friends.
351
00:19:42,824 --> 00:19:47,910
Our use-case, the thing we're trying to protect is you guys, as individuals in your communities.
352
00:19:47,910 --> 00:19:51,927
This isn't a small-business appliance, it's not a large corporate applicance, this is a thing
353
00:19:51,927 --> 00:19:58,939
that we are truly aiming at the home market, and people who care about privacy on an individual level.
354
00:19:58,939 --> 00:20:05,975
You plug it into your home network to protect your privacy, your freedom, your anonymity and your security.
355
00:20:05,975 --> 00:20:09,690
That is our mission statement, I guess. Unofficially.
356
00:20:09,690 --> 00:20:17,004
That is what we believe we are trying to do with this device.
357
00:20:17,004 --> 00:20:22,089
So, what privacy means in this context, the way we're going to go about trying to protect your privacy
358
00:20:22,089 --> 00:20:27,616
is to connect you directly with other people and take everything you do and try to encrypt it
359
00:20:27,616 --> 00:20:31,331
so that only you and the person you are talking to can see it. This is not a new idea.
360
00:20:31,331 --> 00:20:35,696
We can do encrypted messaging, and we can do encrypted browsing.
361
00:20:35,696 --> 00:20:43,986
Now there are problems with encrypted browsing. Right now if you want to have secure browsing you generally
362
00:20:43,986 --> 00:20:45,890
use something called SSL.
363
00:20:45,890 --> 00:20:57,523
SSL is a system of certificates that allow a web server to say to you "we can talk privately".
364
00:20:57,523 --> 00:21:01,981
That's the first guarantee, a secure cryptographic connection (A).
365
00:21:01,981 --> 00:21:05,673
and (B) I can authenticate to you that I am who I say I am.
366
00:21:05,673 --> 00:21:11,362
So not only can nobody listen, but you know who you're talking to.
367
00:21:11,362 --> 00:21:18,328
You're not secretly talking to the government, when really you're talking to me.
368
00:21:18,328 --> 00:21:23,878
The problem with SSL, the big problem with SSL, is that the system for signing certificates relies
369
00:21:23,878 --> 00:21:28,266
on a trust hierachy that goes back to a cartel of companies who have the server certificates,
370
00:21:28,266 --> 00:21:35,581
who have the ability to do this "guarantee". So when the website says to you "I guarantee I am who I
371
00:21:35,581 --> 00:21:42,639
am", you say "I don't know you, I don't trust you". And they say "Oh, but this other company, I paid
372
00:21:42,639 --> 00:21:47,098
them money, and so they'll guarantee that I am me."
373
00:21:47,098 --> 00:21:52,624
Which is a really interesting idea - because I also don't know this company, why would I trust that company?
374
00:21:52,624 --> 00:21:57,059
I mean, the company is just old enough and influential enough that they could actually get their
375
00:21:57,059 --> 00:22:03,630
authority into my browser. So really my browser is willing to accept at face-value that this website
376
00:22:03,630 --> 00:22:07,345
is who it says it is, but I don't necessarily accept that.
377
00:22:07,345 --> 00:22:13,150
And then, we have the problem of self-signed certificate. Where if they say, none of those authorities
378
00:22:13,150 --> 00:22:17,771
in your browser trust me, I trust myself and look, I've signed a piece of paper -
379
00:22:17,771 --> 00:22:20,581
I swear I am who I say I am.
380
00:22:20,581 --> 00:22:24,017
And that, is not trustworthy at all, right?
381
00:22:24,017 --> 00:22:27,895
That's just him saying again "No, really! I'm me!".
382
00:22:27,895 --> 00:22:33,584
So this is a problem, because the FreedomBoxes are not going to trust the SSL cartel,
383
00:22:33,584 --> 00:22:36,696
and they are not going to trust each other, so they can't just sort of swear to each other that
384
00:22:36,696 --> 00:22:39,528
they are who they are.
385
00:22:39,528 --> 00:22:45,124
So we think we've solved this. I'm not going to say we've solved it, because we're just starting to tell
386
00:22:45,124 --> 00:22:52,137
people about this idea, and I'm sure people will have reasons why the idea can be improved.
387
00:22:52,137 --> 00:22:58,406
But there is a technology called MonkeySphere, that allows you to take an SSH key and wrap it around a
388
00:22:58,406 --> 00:23:03,329
PGP key, and use a PGP key to authenticate SSH connections.
389
00:23:03,329 --> 00:23:10,341
It's really neat technology that allows you to replace SSH trust with PGP trust.
390
00:23:10,341 --> 00:23:14,498
And we looked at that, and we thought, why can't we do that with SSL?
391
00:23:14,498 --> 00:23:21,371
So one thing we're going do with browsing is take an SSL certificate, an X.509 certificate,
392
00:23:21,371 --> 00:23:25,248
and wrap it around a PGP key and send it through the normal SSL layer mechanisms
393
00:23:25,248 --> 00:23:32,284
but when it gets to the other end, smart servers and smart browsers will open it up and use PGP mechanisms
394
00:23:32,284 --> 00:23:39,575
to figure out how to trust people, to verify the connections, to sign the authentication of the identity
395
00:23:39,575 --> 00:23:42,687
of the browser, of the server.
396
00:23:42,687 --> 00:23:48,492
This allows us to replace the SSL cartel with the web of trust, the keyservers.
397
00:23:48,492 --> 00:23:57,292
We're replacing a tiny group of companies that control everything with keyservers, community infrastructure.
398
00:23:57,292 --> 00:24:01,170
Anyone can set up a keyserver, and you can decide which one you want to trust.
399
00:24:01,170 --> 00:24:02,772
They share information.
400
00:24:02,772 --> 00:24:06,232
The web of trust is built on people, telling each other that they trust each other.
401
00:24:06,232 --> 00:24:09,947
Again, you can decide who to trust and how much you want to trust them.
402
00:24:09,947 --> 00:24:16,193
This is emblematic of our approach. We've identified structures that are unreliable because
403
00:24:16,193 --> 00:24:20,373
they are centralized, because they are controlled by interests that are not the same interests
404
00:24:20,373 --> 00:24:22,625
as our interests.
405
00:24:22,625 --> 00:24:29,777
And we've decided to replace them wherever we can with structures that rely on people,
406
00:24:29,777 --> 00:24:37,532
that rely on human relationships, that rely less on the notion that you can buy trust, and more on the
407
00:24:37,532 --> 00:24:42,292
notion that you earn trust, by being trustworthy, by having people vouch for you over time.
408
00:24:42,292 --> 00:24:50,303
So that's our approach to encrypted browsing. It's also our approach to encrypted messaging.
409
00:24:50,303 --> 00:24:58,221
We're doing Jabber for a lot of message passing, XMPP, and we're securing that again with PGP.
410
00:24:58,221 --> 00:25:02,076
Everywhere we can we're going to try to use the PGP network, because it already exists...
411
00:25:02,076 --> 00:25:04,351
as I said, we're not trying to invent anything new.
412
00:25:04,351 --> 00:25:10,621
PGP already exists and it does a really good job. So we're taking the PGP trust system and we're
413
00:25:10,621 --> 00:25:16,611
going to apply it to things like XMPP and make sure that we can do message passing in a way
414
00:25:16,611 --> 00:25:18,539
that we can trust.
415
00:25:18,539 --> 00:25:26,015
Once we have XMPP we have a way to send text, a way to send audio, sure...
416
00:25:26,015 --> 00:25:28,709
but also you can send structured data.
417
00:25:28,709 --> 00:25:33,144
Through that same channel. And you can send that data to buddy lists.
418
00:25:33,144 --> 00:25:39,344
So the system starts to look like a way to pass data in a social way. And we think this is the
419
00:25:39,344 --> 00:25:42,432
beginning of the social layer of the box.
420
00:25:42,432 --> 00:25:46,890
At the bottom of the box we have a belief that the technology should be social
421
00:25:46,890 --> 00:25:48,376
from the ground up.
422
00:25:48,376 --> 00:25:50,629
And so we're building structures that allow it to be social,
423
00:25:50,629 --> 00:25:55,505
that assume you want to connect with friends in a network of freedom,
424
00:25:55,505 --> 00:26:01,310
perhaps FreedomBoxes, perhaps other kinds of software, other kinds of technology.
425
00:26:01,310 --> 00:26:04,259
And we're designing with that in mind.
426
00:26:04,259 --> 00:26:08,740
With that in mind, we think we get certain benefits technologically which I'll get into later.
427
00:26:08,740 --> 00:26:13,384
We think we can simply things like key management, through methods like this.
428
00:26:13,384 --> 00:26:19,189
By privacy I also mean that we can install a proxy server, privoxy,
429
00:26:19,189 --> 00:26:21,209
we think the answer is privoxy here,
430
00:26:21,209 --> 00:26:26,852
privoxy on the box, so you can point your browser at the box, surf the web on the box,
431
00:26:26,852 --> 00:26:33,632
and strip ads, strip cookies, stop Google from tracking you from website to website to website,
432
00:26:33,632 --> 00:26:43,338
to remove, the constant person sitting at your side, spying, recording, listening to everything you do.
433
00:26:43,338 --> 00:26:46,914
In that vein, we don't just want to block ads and reject cookies,
434
00:26:46,914 --> 00:26:50,327
we want to do something new, relatively new.
435
00:26:50,327 --> 00:27:02,750
We think we want to munge your browser fingerprint, that unique pattern of data that is captured by your
436
00:27:02,750 --> 00:27:03,632
user-agent string and what plugins you have, and all that stuff
437
00:27:03,632 --> 00:27:07,812
that forms a unique profile of you that allows people to track your browser, companies to track your
438
00:27:07,812 --> 00:27:09,878
browser as you hop along the web, even if they don't know anything about you.
439
00:27:09,878 --> 00:27:13,338
It can sort of tie you to the browser, make profiles about your browser.
440
00:27:13,338 --> 00:27:16,473
And that turns out to be a very effective way of figuring out who you are.
441
00:27:16,473 --> 00:27:23,578
So even without a cookie, even without serving you with an ad, once they're talking to you they can
442
00:27:23,578 --> 00:27:26,388
uniquely identify you, or relatively uniquely.
443
00:27:26,388 --> 00:27:32,750
But it's relatively early in the browser fingerprint arms race.
444
00:27:32,750 --> 00:27:37,649
We think that with a very little bit of changing, we can foil the recording.
445
00:27:37,649 --> 00:27:40,505
and win this round at least.
446
00:27:40,505 --> 00:27:46,937
And instead of having one profile where they gather all of your data, you will present to services
447
00:27:46,937 --> 00:27:51,279
as a different person every time you use the service. So they cannot build profiles of you over time.
448
00:27:51,579 --> 00:27:53,157
That's what privacy looks like in our context. We're looking for cheap ways to foil the tracking.
449
00:27:55,057 --> 00:28:02,054
We're looking for easy things we can do, because we believe there's a lot of low-hanging fruit.
450
00:28:02,054 --> 00:28:05,931
And we'll talk about that more in a minute.
451
00:28:05,931 --> 00:28:09,832
Freedom is our value, freedom is the thing we are aiming for,
452
00:28:09,832 --> 00:28:13,431
freedom from centralized structures like the pipes.
453
00:28:13,431 --> 00:28:19,213
Now mesh networking, I have mesh networking in my slides. That is a lie.
454
00:28:19,213 --> 00:28:21,465
We are not doing mesh networking.
455
00:28:21,465 --> 00:28:26,992
The reason we are not doing mesh networking is because I do not know anything about mesh networking
456
00:28:26,992 --> 00:28:31,705
and one of the reaons I came here was to meet people who know a lot about mesh networking
457
00:28:31,705 --> 00:28:34,492
and I see people in this audience who know a lot about mesh networking.
458
00:28:34,492 --> 00:28:41,295
If you want to turn that lie into the truth, the way you do that
459
00:28:41,295 --> 00:28:43,548
is by continuing on your projects, making mesh networking awesome,
460
00:28:43,548 --> 00:28:46,195
to the point where I can say yes, we're going to put that in this box.
461
00:28:46,195 --> 00:28:49,190
Then eventually, by the time this box is ready to do real
462
00:28:49,190 --> 00:28:52,766
things for real people, we're really hoping that the mesh story
463
00:28:52,766 --> 00:28:56,504
coheres, where we've identified the protocol and the technology and the people who are going to help
464
00:28:56,504 --> 00:29:00,243
us. If you think you might be one of those people, we want to talk to you.
465
00:29:00,243 --> 00:29:02,774
So yes, we are going to do mesh networking,
466
00:29:02,774 --> 00:29:05,746
and that might be a lie
467
00:29:05,746 --> 00:29:08,277
but I hope not.
468
00:29:08,277 --> 00:29:10,668
We want you to have the freedom to own your data
469
00:29:10,668 --> 00:29:16,775
that means data portability, that means that your data sits on your box and never goes to a third party.
470
00:29:16,775 --> 00:29:18,586
It only goes to the people you want it to go to.
471
00:29:18,586 --> 00:29:23,625
Fine-grained access control. Your data, your structures, you decide where it goes.
472
00:29:23,625 --> 00:29:25,390
That's a user-interface problem,
473
00:29:25,390 --> 00:29:27,155
that's a user permission problem,
474
00:29:27,155 --> 00:29:29,105
an access control problem.
475
00:29:29,105 --> 00:29:33,261
Access control is a solved problem.
476
00:29:33,261 --> 00:29:37,882
Doing it through a convenient user-interface, that's not solved... so that's work to be done.
477
00:29:37,882 --> 00:29:42,039
That's a big chunk of our todo list.
478
00:29:42,039 --> 00:29:43,710
We want you to own your social network
479
00:29:43,710 --> 00:29:50,119
Before Facebook there was a thing called MySpace, which was... I'm not even sure it exists anymore.
480
00:29:50,119 --> 00:29:54,136
Before MySpace there was Tribe.
481
00:29:54,136 --> 00:29:56,551
Before Tribe there was Friendster.
482
00:29:56,551 --> 00:29:59,825
Friendster is now like a... "gaming network".
483
00:29:59,825 --> 00:30:02,820
I don't know what it is but they still send me email
484
00:30:02,820 --> 00:30:06,234
Which is the only reason I know they're still alive.
485
00:30:06,234 --> 00:30:11,017
Before Friendster was the original social network.
486
00:30:11,017 --> 00:30:15,522
We called this social network "the internet".
487
00:30:15,522 --> 00:30:17,008
We talked directly to each other,
488
00:30:17,008 --> 00:30:21,420
we used email, an instant messenger and IRC.
489
00:30:21,420 --> 00:30:23,951
We talked to people using the structures that were out there.
490
00:30:23,951 --> 00:30:27,828
It wasn't centralized in one service, we had a lot of ways of meeting each other
491
00:30:27,828 --> 00:30:29,152
and passing messages.
492
00:30:29,152 --> 00:30:31,706
What we lacked was a centralized interface.
493
00:30:31,706 --> 00:30:35,584
So when we say "own your social network" we mean use the services of the internet,
494
00:30:35,584 --> 00:30:37,650
own the pieces that talk to each other.
495
00:30:37,650 --> 00:30:41,110
Hopefully we'll provide you with a convenient interface to do that.
496
00:30:41,110 --> 00:30:44,106
But the actual structures, the places where your data live,
497
00:30:44,106 --> 00:30:48,401
that is just the same pieces that we know how to use already.
498
00:30:48,401 --> 00:30:51,234
We are not going to try to reinvent how you talk to people,
499
00:30:51,234 --> 00:30:56,459
we're just going to make it so that the pipes are secure.
500
00:30:56,459 --> 00:30:59,454
A big part of freedom, a big part of privacy,
501
00:30:59,454 --> 00:31:02,426
is anonymity.
502
00:31:02,426 --> 00:31:06,443
Tor can provide anonymity.
503
00:31:06,443 --> 00:31:08,812
But we don't have to go all the way to Tor.
504
00:31:08,812 --> 00:31:12,248
Tor is expensive, in terms of latency.
505
00:31:12,248 --> 00:31:16,822
Tor is difficult to manage...
506
00:31:16,822 --> 00:31:21,397
I don't know how many people have tried to use Tor, to run all their traffic through Tor.
507
00:31:21,397 --> 00:31:23,649
It's hard. For two reasons.
508
00:31:23,649 --> 00:31:26,575
For one, the latency... it takes a very long time to load a web page.
509
00:31:26,575 --> 00:31:32,380
And two, you look like a criminal. To every website that you go to.
510
00:31:32,380 --> 00:31:38,649
My bank shut down my account when I used Tor.
511
00:31:38,649 --> 00:31:44,942
Because suddenly, I was coming from an IP address in Germany that they had detected in the past
512
00:31:44,942 --> 00:31:48,518
efforts to hack them on.
513
00:31:48,518 --> 00:31:52,256
So they closed my account, well I had to talk to them about it,
514
00:31:52,256 --> 00:31:53,905
it did all get solved in the end.
515
00:31:53,905 --> 00:31:57,782
PayPal as well closed my account down.
516
00:31:57,782 --> 00:31:59,408
So that was the end of my ability to use Tor.
517
00:31:59,408 --> 00:32:01,057
So we can't just run all our traffic through Tor.
518
00:32:01,057 --> 00:32:07,117
It's too slow, and the network has weird properties in terms of how you present to websites,
519
00:32:07,117 --> 00:32:08,951
that frankly, are scary.
520
00:32:08,951 --> 00:32:16,916
Because if I look like a criminal to the bank, I don't want to imagine what I look like to my own government.
521
00:32:16,916 --> 00:32:19,006
But we can do privacy in other ways.
522
00:32:19,006 --> 00:32:25,252
If you are a web user, in China, and you want to surf the internet,
523
00:32:25,252 --> 00:32:30,941
with full access to every website you might go to, and with privacy from your government,
524
00:32:30,941 --> 00:32:34,981
so that you don't get a knock on your door from visiting those websites,
525
00:32:34,981 --> 00:32:36,769
we can do that without Tor.
526
00:32:36,769 --> 00:32:39,021
We don't need Tor to do that. We can do that cheaply.
527
00:32:39,021 --> 00:32:45,592
Because all you need to do in that situation is get your connection out of China.
528
00:32:45,592 --> 00:32:54,393
Send your request for a web page through an encrypted connection to a FreedomBox in...
529
00:32:54,393 --> 00:32:58,410
Austria, America, who knows?
530
00:32:58,410 --> 00:33:05,933
Just get the request away from the people who physically have the power to control you.
531
00:33:05,933 --> 00:33:08,905
And we can do that cheaply, that's just SSH port forwarding.
532
00:33:08,905 --> 00:33:14,130
That's just a little bit of tunneling, that's just a little bit of VPN.
533
00:33:14,130 --> 00:33:16,057
There's a lot of ways to do that sort of thing,
534
00:33:16,057 --> 00:33:20,840
to give you anonymity and privacy in your specific context
535
00:33:20,840 --> 00:33:22,791
without going all the way into something like Tor.
536
00:33:22,791 --> 00:33:25,902
Now there are people who are going to need Tor.
537
00:33:25,902 --> 00:33:27,969
They will need it for their use case.
538
00:33:27,969 --> 00:33:32,891
But not every use case requires that level of attack.
539
00:33:32,891 --> 00:33:37,930
And so one of the things we're trying to do is figure out how much privacy and anonymity you need,
540
00:33:37,930 --> 00:33:40,206
and from whom you need it.
541
00:33:40,206 --> 00:33:43,457
If we can do that effectively we can give people solutions
542
00:33:43,457 --> 00:33:45,546
that actually work for them. Because if we just tell people
543
00:33:45,546 --> 00:33:49,540
to use Tor, we're going to have a problem.
544
00:33:49,540 --> 00:33:52,652
They're not going to use it, and they won't get any privacy at all.
545
00:33:52,652 --> 00:33:55,183
And that's bad.
546
00:33:55,183 --> 00:33:57,249
So we want to allow people to do anonymous publishing,
547
00:33:57,249 --> 00:33:59,710
and file-sharing, and web-browsing and email.
548
00:33:59,710 --> 00:34:01,615
All the communications you want to do.
549
00:34:01,615 --> 00:34:03,867
The technology to do that already exists,
550
00:34:03,867 --> 00:34:05,771
we could do all of that with Tor.
551
00:34:05,771 --> 00:34:09,045
The next piece of our challenge is to figure out how to do it without Tor.
552
00:34:09,045 --> 00:34:12,017
To figure out what pieces we need Tor for, and to figure out
553
00:34:12,017 --> 00:34:17,845
what pieces we can do a little bit more cheaply.
554
00:34:17,845 --> 00:34:19,633
Security.
555
00:34:19,633 --> 00:34:23,975
Without security, you don't have freedom and privacy and anonymity.
556
00:34:23,975 --> 00:34:25,624
If the box isn't secure,
557
00:34:25,624 --> 00:34:27,853
you lose.
558
00:34:27,853 --> 00:34:32,033
We're going to encrypt everything.
559
00:34:32,033 --> 00:34:36,189
We're going to do something that's called social key management, which I'm going to talk about.
560
00:34:36,189 --> 00:34:39,138
I do want to talk about the Debian-based bit.
561
00:34:39,138 --> 00:34:42,853
We are based on a distribution of Linux called Debian,
562
00:34:42,853 --> 00:34:46,290
because it is a community-based distribution.
563
00:34:46,290 --> 00:34:48,380
It is made by people who care a lot about your
564
00:34:48,380 --> 00:34:51,654
freedom, your privacy, and your ability to speak anonymously.
565
00:34:51,654 --> 00:34:55,531
And we really believe that the best way to distribute this
566
00:34:55,531 --> 00:34:58,341
software is to hand it to the Debian mirror network and let
567
00:34:58,341 --> 00:35:00,129
them distribute it. Because they have mechanisms
568
00:35:00,129 --> 00:35:02,219
to make sure that nobody changes it.
569
00:35:02,219 --> 00:35:05,214
If we were to distribute the software to you directly, we
570
00:35:05,214 --> 00:35:09,092
would become a target. People would want to change the
571
00:35:09,092 --> 00:35:11,808
software as we distribute it on our website.
572
00:35:11,808 --> 00:35:13,271
They would want to crack our website and distribute their
573
00:35:13,271 --> 00:35:15,965
version of the package.
574
00:35:15,965 --> 00:35:18,496
We don't want to be a target, so we're not going to give you software.
575
00:35:18,496 --> 00:35:21,630
We're going to give it to Debian, and let them give you the software.
576
00:35:21,630 --> 00:35:26,414
And at the same time you get all of the Debian guarantees about freedom.
577
00:35:26,414 --> 00:35:28,666
The Debian Free Software Guidelines.
578
00:35:28,666 --> 00:35:32,103
They're not going to give you software unless it comes
579
00:35:32,103 --> 00:35:37,025
with all of the social guarantees that are required to participate in the Debian community.
580
00:35:37,025 --> 00:35:39,556
So we're very proud to be using Debian in this manner,
581
00:35:39,556 --> 00:35:41,948
and working with Debian in this manner.
582
00:35:41,948 --> 00:35:44,781
And we think that's the most effective way we can guarantee that we're going to live up to
583
00:35:44,781 --> 00:35:51,747
our promises to you, because it provides a mechanism whereby if we fail to live up to our promises,
584
00:35:51,747 --> 00:35:56,344
we cannot give you something that is broken. Because Debian won't let us,
585
00:35:56,344 --> 00:35:59,618
they just won't distribute it.
586
00:35:59,618 --> 00:36:02,010
There are problems with security.
587
00:36:02,010 --> 00:36:04,100
There are things we can't solve.
588
00:36:04,100 --> 00:36:05,377
One...
589
00:36:05,377 --> 00:36:08,744
Physical security of the box.
590
00:36:08,744 --> 00:36:13,643
We haven't really talked much internally about whether we can encrypt the filesystem on this box.
591
00:36:13,643 --> 00:36:16,615
I don't quite see a way to do it.
592
00:36:16,615 --> 00:36:20,029
It doesn't have an interface for you to enter a password effectively.
593
00:36:20,029 --> 00:36:23,303
By the time you've brought an interface up you'd be running untrusted code.
594
00:36:23,303 --> 00:36:25,230
I don't know a way to do it.
595
00:36:25,230 --> 00:36:29,549
If anyone can think of a way that we can effectively encrypt the filesystem, I'd love to hear it.
596
00:36:29,549 --> 00:36:35,029
But, on top of that, if we do encrypt the filesystem,
597
00:36:35,029 --> 00:36:38,605
then the thing cannot be rebooted remotely, which is a downside.
598
00:36:38,605 --> 00:36:40,694
So there are trade-offs at every step of the way.
599
00:36:40,694 --> 00:36:45,013
If we can figure out some of these security issues, then we can be ahead of the game.
600
00:36:45,013 --> 00:36:50,261
But I think the encrypting the filesystem is the only way to guarantee the box is secure, even if it's
601
00:36:50,261 --> 00:36:52,351
not physically secure.
602
00:36:52,351 --> 00:36:53,698
So I think that's a big one.
603
00:36:53,698 --> 00:36:58,040
If you have ideas about that, please come and talk to me after the talk.
604
00:36:58,040 --> 00:37:01,291
I promised I would talk about social key management, and here it is.
605
00:37:01,291 --> 00:37:06,376
So we're building the idea of knowing who your friends are
606
00:37:06,376 --> 00:37:08,024
into the box at a somewhat low level.
607
00:37:08,024 --> 00:37:12,947
To the point where things that are on the box can assume it is there,
608
00:37:12,947 --> 00:37:17,544
or ask you if it's there, or rely on it as a matter of course in some cases.
609
00:37:17,544 --> 00:37:21,887
So we can do things with keys that make your keys unlosable.
610
00:37:21,887 --> 00:37:25,207
Right now a PGP key is a hard thing to manage.
611
00:37:25,207 --> 00:37:26,670
Key management is terrible.
612
00:37:26,670 --> 00:37:30,432
Do you guys like PGP? PGP is good.
613
00:37:30,432 --> 00:37:34,727
Does anyone here like key management?
614
00:37:34,727 --> 00:37:36,213
We have one guy who likes key management.
615
00:37:36,213 --> 00:37:39,487
LAUGHTER
616
00:37:39,487 --> 00:37:41,252
He's going to do it for all of you!
617
00:37:41,252 --> 00:37:43,504
So, none of us like key management.
618
00:37:43,504 --> 00:37:46,151
Key management doesn't work, especially if your use-case is home users, naive end-users.
619
00:37:46,151 --> 00:37:48,102
Nobody wants to do key management.
620
00:37:48,102 --> 00:37:51,701
Writing their key down and putting it in a safety deposit box is ludicrous.
621
00:37:51,701 --> 00:37:54,371
It's a very difficult thing to actually convince people to do.
622
00:37:54,371 --> 00:38:00,316
Sticking it on a USB key, putting it in a zip-lock back and burying it in your backyard is paranoid.
623
00:38:00,316 --> 00:38:03,311
I can't believe I just told you what I do with my key.
624
00:38:03,311 --> 00:38:04,820
LAUGHTER
625
00:38:04,820 --> 00:38:06,748
No, you can't ask people to do that.
626
00:38:06,748 --> 00:38:08,071
They won't do it.
627
00:38:08,071 --> 00:38:09,882
You can't protect keys in this manner.
628
00:38:09,882 --> 00:38:13,342
You have to have a system that allows them to sort of, not ever know they have a key.
629
00:38:13,342 --> 00:38:16,012
To not think about their key unless they really want to.
630
00:38:16,012 --> 00:38:19,008
We think we've come up with something that might work.
631
00:38:19,008 --> 00:38:20,772
You take the key,
632
00:38:20,772 --> 00:38:22,282
or a subkey,
633
00:38:22,282 --> 00:38:24,511
you chop it into little bits
634
00:38:24,511 --> 00:38:25,416
and you give that key...
635
00:38:25,416 --> 00:38:31,245
and we're talking about a key of a very long length, so there's a giant attack space
636
00:38:31,245 --> 00:38:36,307
and you can chop it into bits and hand it to people without reducing the search space for a key.
637
00:38:36,307 --> 00:38:39,000
You chop it into bits and hand all the bits to your friends.
638
00:38:39,000 --> 00:38:42,437
Now all your friends have your key, as a group.
639
00:38:42,437 --> 00:38:44,271
Individually, none of them can attack you.
640
00:38:44,271 --> 00:38:47,708
Indicidually, none of them has the power to come root your box,
641
00:38:47,708 --> 00:38:50,378
to access your services and pretend to be you.
642
00:38:50,378 --> 00:38:53,791
As a group, they can do this.
643
00:38:53,791 --> 00:39:04,217
We trust our friends, as a group, more than we trust them as individuals.
644
00:39:04,217 --> 00:39:08,698
Any single one of your friends, if you gave them the key to your financial data and your private online
645
00:39:08,698 --> 00:39:10,811
life that would make you very nervous.
646
00:39:10,811 --> 00:39:14,387
You would worry that they would succumb to temptation to peek,
647
00:39:14,387 --> 00:39:17,220
fall on hard times and want to attack you in some way,
648
00:39:17,220 --> 00:39:19,612
fall out with you, get mad at you.
649
00:39:19,612 --> 00:39:23,350
As an individual, people are sort of fallible in this sense.
650
00:39:23,350 --> 00:39:25,579
But as a group of friends who would have to get together
651
00:39:25,579 --> 00:39:30,038
and affirmatively make a decision to attack you,
652
00:39:30,038 --> 00:39:32,592
we think that's extremely unlikely.
653
00:39:32,592 --> 00:39:38,072
It's so unlikely that there are only a few scenarios where we think it might happen.
654
00:39:38,072 --> 00:39:39,535
One...
655
00:39:39,535 --> 00:39:42,669
if you are ill, and unable to access your box
656
00:39:42,669 --> 00:39:44,202
or you're in jail
657
00:39:44,202 --> 00:39:45,548
or you've passed away
658
00:39:45,548 --> 00:39:49,008
or you've disappeared.
659
00:39:49,008 --> 00:39:52,305
Or... you've gone crazy.
660
00:39:52,305 --> 00:39:57,646
We call this type of event, where all your friends get together and help you,
661
00:39:57,646 --> 00:39:59,898
even if you don't ask them for help,
662
00:39:59,898 --> 00:40:02,871
we call that an intervention.
663
00:40:02,871 --> 00:40:05,564
When your friends sit you down and say,
664
00:40:05,564 --> 00:40:09,302
"you need our help, you can't ask us for it because you're not in a position to ask us for it",
665
00:40:09,302 --> 00:40:10,951
that's an intervention.
666
00:40:10,951 --> 00:40:16,733
If you have a moment in your life, a crisis in your life that is an intervention level event,
667
00:40:16,733 --> 00:40:18,544
that's when you can go to your friends.
668
00:40:18,544 --> 00:40:22,120
If your house burns down, you lose your key and all your data
669
00:40:22,120 --> 00:40:25,533
You go to your friends, and you say "can I have part of my key back?"
670
00:40:25,533 --> 00:40:29,829
"Oh, and give me that data that you have in a cryptographically-sealed box that you can't read."
671
00:40:29,829 --> 00:40:31,013
To all your friends...
672
00:40:31,013 --> 00:40:32,035
"My data please, my key please, ..."
673
00:40:32,035 --> 00:40:32,778
"My data please, my key please, ..."
674
00:40:32,778 --> 00:40:34,148
"My data please, my key please, ..."
675
00:40:34,148 --> 00:40:39,697
You take all those pieces, you get a new box,
676
00:40:39,697 --> 00:40:42,089
you load it all onto your box.
677
00:40:42,089 --> 00:40:47,151
You have the key, you have your entire key, and now you can read your data.
678
00:40:47,151 --> 00:40:49,241
And you haven't lost your digital life.
679
00:40:49,241 --> 00:40:54,001
You have a key that is now unlosable.
680
00:40:54,001 --> 00:40:58,761
Even if you never wrote it down, even if you never buried it in the backyard.
681
00:40:58,761 --> 00:41:00,502
This is a hard problem in key management.
682
00:41:00,502 --> 00:41:04,241
People lose their keys and their passwords to services all the time.
683
00:41:04,241 --> 00:41:09,024
The only way we can think of to make that impossible, is this mechanism.
684
00:41:09,024 --> 00:41:10,371
And of course it's optional.
685
00:41:10,371 --> 00:41:13,808
If you're a person who doesn't trust your friends, even as a group,
686
00:41:13,808 --> 00:41:17,244
or if you're a person who just doesn't have a lot of friends
687
00:41:17,244 --> 00:41:20,518
(let me finish!)
688
00:41:20,518 --> 00:41:25,116
...who doesn't have a lot of friends with FreedomBoxes who can be the backend for this,
689
00:41:25,116 --> 00:41:27,229
you don't have to trust this mechanism.
690
00:41:27,229 --> 00:41:30,015
You can do something else to make your key unforgettable.
691
00:41:30,015 --> 00:41:32,430
But for a lot of naive end-users,
692
00:41:32,430 --> 00:41:34,520
this is the mechanism.
693
00:41:34,520 --> 00:41:36,749
This is the way they are going to never
694
00:41:36,749 --> 00:41:37,956
lose their keys
695
00:41:37,956 --> 00:41:41,695
Because the first time a user gets irretrievably locked out of his FreedomBox,
696
00:41:41,695 --> 00:41:43,784
we lose that user forever.
697
00:41:43,784 --> 00:41:45,572
And we lose all his friends forever.
698
00:41:45,572 --> 00:41:52,306
Because it would scare you to lose such an important group of information.
699
00:41:52,306 --> 00:41:53,932
Social key management.
700
00:41:53,932 --> 00:41:58,692
This is the benefit of building social, of building knowledge
701
00:41:58,692 --> 00:42:03,614
of who your friends are, into the box, at a deep level.
702
00:42:03,614 --> 00:42:05,820
We have never done that before, with a technology
703
00:42:05,820 --> 00:42:08,026
as a community project.
704
00:42:08,026 --> 00:42:11,021
And it opens up new possibilities. This is just one.
705
00:42:11,021 --> 00:42:13,088
There are others.
706
00:42:13,088 --> 00:42:15,317
But it's a field we haven't really thought a lot about.
707
00:42:15,317 --> 00:42:19,636
I think once we get out there and we start doing this kind of
708
00:42:19,636 --> 00:42:25,441
construction, a lot of new uses are going to be found for this architecture.
709
00:42:25,441 --> 00:42:28,576
I encourage you all to think about what changes,
710
00:42:28,576 --> 00:42:34,938
when you can assume that the box has people you can trust, just a little bit,
711
00:42:34,938 --> 00:42:38,212
because right now we live in a world where we are asked
712
00:42:38,212 --> 00:42:42,694
to trust third party services like Facebook with all our photos,
713
00:42:42,694 --> 00:42:46,409
or Flickr with all our photos, or Gmail with all our email.
714
00:42:46,409 --> 00:42:47,755
We are asked to trust them.
715
00:42:47,755 --> 00:42:50,101
We have no reason to trust them.
716
00:42:50,101 --> 00:42:54,861
I mean, we expect that they'll act all right, because they have no reason to destroy us.
717
00:42:54,861 --> 00:42:56,927
But we don't know what's going to happen.
718
00:42:56,927 --> 00:43:01,664
We're effectively giving all our information to people we don't trust at all right now.
719
00:43:01,664 --> 00:43:04,613
How does a network of people we trust, just a little bit,
720
00:43:04,613 --> 00:43:06,982
change the landscape?
721
00:43:06,982 --> 00:43:09,071
I think that's a really interesting question.
722
00:43:09,071 --> 00:43:10,418
This box explores that question,
723
00:43:10,418 --> 00:43:16,061
this box creates new solutions to old problems that previously seemed intractable.
724
00:43:16,061 --> 00:43:19,660
So, I encourage everybody to think about how that might
725
00:43:19,660 --> 00:43:27,137
change the solution to a problem they have with a technological architecture as it exists today.
726
00:43:27,137 --> 00:43:31,595
Here's another problem...
727
00:43:31,595 --> 00:43:34,567
Boxes that know who you are, and know who your friends are,
728
00:43:34,567 --> 00:43:37,562
and know how your friends normally act,
729
00:43:37,562 --> 00:43:41,881
can also know when your friends are acting weird.
730
00:43:41,881 --> 00:43:49,613
If you have a friend who sends you one email a year, who suddenly sends you ten emails in a day,
731
00:43:49,613 --> 00:43:51,680
that look like spam,
732
00:43:51,680 --> 00:43:53,445
you know that box is rooted.
733
00:43:53,445 --> 00:43:55,372
You know that box is weird.
734
00:43:55,372 --> 00:43:59,412
Or if you are using the FreedomBox as your gateway to the internet,
735
00:43:59,412 --> 00:44:05,357
and a box it is serving downstream, starts sending a bunch of spam through it, it knows.
736
00:44:05,357 --> 00:44:08,793
It can say "Oh no! You're acting like a zombie."
737
00:44:08,793 --> 00:44:10,442
"You should get a check-up."
738
00:44:10,442 --> 00:44:15,527
It can shut off mail service to that box, and not let the messages out.
739
00:44:15,527 --> 00:44:21,611
It can make that decision to protect the wider internet to make you a better citizen in the world.
740
00:44:21,611 --> 00:44:27,996
If suddenly your computer starts saying "Hey, I'm in Scotland and I need $5000"...
741
00:44:27,996 --> 00:44:30,179
but we know you're not in Scotland
742
00:44:30,179 --> 00:44:33,035
Maybe this box, because it has contact information,
743
00:44:33,035 --> 00:44:35,705
maybe this box sends you an SMS.
744
00:44:35,705 --> 00:44:40,930
And says "Dude, you've been hacked, go do something about your box."
745
00:44:40,930 --> 00:44:43,762
So the types of things we can do once we assume we have
746
00:44:43,762 --> 00:44:49,010
close relations as opposed to arms-length relations,
747
00:44:49,010 --> 00:44:51,100
the types of things we can do when we trust each other a little bit
748
00:44:51,100 --> 00:44:54,374
and we trust our boxes a little bit, goes way up.
749
00:44:54,374 --> 00:44:55,860
Way up.
750
00:44:55,860 --> 00:44:58,786
And by bringing that infrastructure closer to us,
751
00:44:58,786 --> 00:45:03,360
I mean Gmail is too far away to play that role from a network perspective.
752
00:45:03,360 --> 00:45:08,840
But if the box is in our land, we can do that.
753
00:45:08,840 --> 00:45:11,812
These boxes will only work if they are convenient.
754
00:45:11,812 --> 00:45:14,784
There's an old punk-rock slogan, from the Dead Kennedys,
755
00:45:14,784 --> 00:45:18,523
"Give me convenience, or give me death."
756
00:45:18,523 --> 00:45:24,676
We laugh at that, but that's a belief users have,
757
00:45:24,676 --> 00:45:26,580
and I deduce that based on their behaviour,
758
00:45:26,580 --> 00:45:29,738
because every time there is a convenient web service,
759
00:45:29,738 --> 00:45:31,201
people use it.
760
00:45:31,201 --> 00:45:34,777
Even if it's not very good with privacy, a lot of people are going to use it.
761
00:45:34,777 --> 00:45:41,325
And conversely, whenever we have web services that are very good at privacy, but aren't very convenient,
762
00:45:41,325 --> 00:45:44,018
comparatively fewer people use them.
763
00:45:44,018 --> 00:45:47,733
We don't think this box works without convenience.
764
00:45:47,733 --> 00:45:51,286
If we don't get the user-interface right then this project
765
00:45:51,286 --> 00:45:53,376
will probably fall over.
766
00:45:53,376 --> 00:45:56,023
It will never gain any sort of critical mass.
767
00:45:56,023 --> 00:45:57,811
So we need a simple interface,
768
00:45:57,811 --> 00:46:00,945
we need a way for users to interact with this box in a minimal way.
769
00:46:00,945 --> 00:46:03,476
They should think about it as little as possible.
770
00:46:03,476 --> 00:46:06,007
That's the hardest problem we face.
771
00:46:06,007 --> 00:46:07,494
Quite frankly.
772
00:46:07,494 --> 00:46:10,489
The technology to do private communication, that exists.
773
00:46:10,489 --> 00:46:14,367
A lot of the people in this room helped to build that infrastructure and technology.
774
00:46:14,367 --> 00:46:16,619
We can put it on the box.
775
00:46:16,619 --> 00:46:21,100
Making it easy and accessible for users, that's hard.
776
00:46:21,100 --> 00:46:23,353
And right now we're trying to figure out what that looks like,
777
00:46:23,353 --> 00:46:25,141
who the designers are going to be.
778
00:46:25,141 --> 00:46:30,783
If you have user interface or user experience design that you want to bring to a project like this,
779
00:46:30,783 --> 00:46:33,918
please, please, come find me.
780
00:46:33,918 --> 00:46:38,980
In order to have convenience, we need to have the thing provide services that are not just
781
00:46:38,980 --> 00:46:44,924
freedom-oriented, we need to use its position in your network as a trusted device
782
00:46:44,924 --> 00:46:48,500
to do things for you that aren't just about privacy.
783
00:46:48,500 --> 00:46:50,543
It needs to do backups.
784
00:46:50,543 --> 00:46:52,006
This is important.
785
00:46:52,006 --> 00:46:56,627
Right now the way people back up their photos is by giving them to Flickr.
786
00:46:56,627 --> 00:47:00,180
The way they back up their email is by giving it to Gmail.
787
00:47:00,180 --> 00:47:06,031
If we don't provide backups, we can never be an effective replacement
788
00:47:06,031 --> 00:47:09,142
for the services that store your data somewhere else.
789
00:47:09,142 --> 00:47:14,831
Even though they're storing it out there in the cloud for their purposes, you get a benefit from it.
790
00:47:14,831 --> 00:47:16,619
We have to replicate that benefit.
791
00:47:16,619 --> 00:47:19,893
So things that we don't think of as privacy features have to
792
00:47:19,893 --> 00:47:21,658
be in the box.
793
00:47:21,658 --> 00:47:25,513
The backups, the passwords, and the keys, you can't forget them.
794
00:47:25,513 --> 00:47:29,112
We would like it to be a music, a video, a photo server,
795
00:47:29,112 --> 00:47:33,709
all the kinds of things you might expect from a convenient box on your network.
796
00:47:33,709 --> 00:47:37,703
All the things that you want to share with other people, this box has to do those things.
797
00:47:37,703 --> 00:47:44,994
And these aren't privacy features, but without them we won't be able to give people privacy.
798
00:47:44,994 --> 00:47:49,150
Our first feature, the thing we are working towards
799
00:47:49,150 --> 00:47:50,474
is Jabber.
800
00:47:50,474 --> 00:47:53,144
It's secure encrypted chat, point-to-point.
801
00:47:53,144 --> 00:47:57,719
That will be the thing we are working on right now.
802
00:47:57,719 --> 00:48:02,223
But in order to do that we need to solve this monkey-spherish SSL problem that I described.
803
00:48:02,223 --> 00:48:06,705
We have code, it needs to get packaged and all that.
804
00:48:06,705 --> 00:48:10,234
Our development strategy, the way we are going to do all the things we said,
805
00:48:10,234 --> 00:48:15,180
because the list of things I have said we're going to do...
806
00:48:15,180 --> 00:48:19,360
I can't believe you're not throwing things at me.
807
00:48:19,360 --> 00:48:21,566
Because it's ludicrous to believe that we can actually do all these things by ourselves.
808
00:48:21,566 --> 00:48:23,516
And we're not.
809
00:48:23,516 --> 00:48:25,908
We're going to let other people make the software.
810
00:48:25,908 --> 00:48:28,160
As much as possible we're going to encourage other people
811
00:48:28,160 --> 00:48:31,713
to build stuff. We're going to use stuff that already exists.
812
00:48:31,713 --> 00:48:35,010
We're going to use Privoxy, we're going to use Prosody, we're going to use Apache.
813
00:48:35,010 --> 00:48:38,563
We're not going to reinvent the web server, we're not going to reinvent protocols.
814
00:48:38,563 --> 00:48:45,621
I really hope that by the time this project is mature, we haven't invented any new protocols.
815
00:48:45,621 --> 00:48:48,617
Maybe we'll use new protocols, but I don't want to be
816
00:48:48,617 --> 00:48:53,238
generating new things that haven't been tested, and then putting them in FreedomBox.
817
00:48:53,238 --> 00:48:58,462
I want to see things in the real world, tested, gain credibility and take them.
818
00:48:58,462 --> 00:49:01,736
The less we invent, the better.
819
00:49:01,736 --> 00:49:07,541
As far as timelines go, by the time we have it ready, you'll know why you need it.
820
00:49:07,541 --> 00:49:10,676
People right now are figuring out that privacy is important.
821
00:49:10,676 --> 00:49:12,975
They're seeing it over and over again.
822
00:49:12,975 --> 00:49:18,106
In Egypt, the at the start of the Arab spring, one of the things the government did to try to
823
00:49:18,106 --> 00:49:22,982
tamp down the organisation was to convince companies to shut off cell networks,
824
00:49:22,982 --> 00:49:25,165
to prevent people from talking to each other.
825
00:49:25,165 --> 00:49:28,300
In America they did the same thing in San Francisco I hear.
826
00:49:28,300 --> 00:49:36,334
Turned off the cell towers to prevent people from organising to meet for a protest.
827
00:49:36,334 --> 00:49:42,255
With Occupy Wall Street, you're starting to see infiltration,
828
00:49:42,255 --> 00:49:45,970
you're starting to see people going and getting information
829
00:49:45,970 --> 00:49:48,501
that Occupy Wall Street is talking about and turning it over
830
00:49:48,501 --> 00:49:51,938
to the authorities, the police, the FBI.
831
00:49:51,938 --> 00:49:59,089
So the need for privacy as we enter a new age of increased activism, we hope,
832
00:49:59,089 --> 00:50:01,783
of increased activity, of social activity,
833
00:50:01,783 --> 00:50:06,241
I think the need for a lot of this privacy stuff is going to become clear.
834
00:50:06,241 --> 00:50:11,001
As the technology for invading your privacy improves,
835
00:50:11,001 --> 00:50:18,083
the need for technology to protect your privacy will become stark and clear.
836
00:50:18,083 --> 00:50:22,541
Our two big challenges as I said are user experience,
837
00:50:22,541 --> 00:50:27,557
and the one I didn't say was paying for developers, paying for designers.
838
00:50:27,557 --> 00:50:31,713
Those are the hard parts that we're working on.
839
00:50:31,713 --> 00:50:35,870
And if we fail, we think that's where we fail.
840
00:50:35,870 --> 00:50:40,212
Software isn't on that list, as I said software is already out there.
841
00:50:40,212 --> 00:50:42,441
So you can have a FreedomBox.
842
00:50:42,441 --> 00:50:46,760
If you like that box that we've been passing around the audience, you can buy one from Globalscale.
843
00:50:46,760 --> 00:50:51,241
If you don't want the box, it's just Debian, it's just Linux, it's just packages.
844
00:50:51,241 --> 00:50:56,466
Throw Debian on a box, we will have packages available through the normal Debian mechanisms.
845
00:50:56,466 --> 00:50:58,277
You don't even have to use our repository.
846
00:50:58,277 --> 00:51:01,551
In fact, I don't think we're going to have a repository.
847
00:51:01,551 --> 00:51:06,149
You're just going to download it and install it the same way you normally do it if you're technologically
848
00:51:06,149 --> 00:51:08,517
capable of doing that.
849
00:51:08,517 --> 00:51:10,259
I grabbed a bunch of photos from Flickr,
850
00:51:10,259 --> 00:51:14,415
my colleague Ian Sullivan took that awesome picture of the FreedomBox.
851
00:51:14,415 --> 00:51:17,238
And that's how you reach me.
852
00:51:18,992 --> 00:51:31,307
APPLAUSE
853
00:51:39,030 --> 00:51:44,787
Thanks James, please sit down.
854
00:51:44,787 --> 00:51:49,105
We are up for questions from the audience for James.
855
00:51:49,105 --> 00:52:03,525
Please raise your hand if you have any questions about the FreedomBox.
856
00:52:03,525 --> 00:52:05,754
Hello, thanks that was a very interesting presentation.
857
00:52:05,754 --> 00:52:06,660
Thank you.
858
00:52:06,660 --> 00:52:10,491
Your boss Eben Moglen, he has given a speech at a committee of the US congress
859
00:52:10,491 --> 00:52:13,486
I believe, which has received a lot of attention
860
00:52:13,486 --> 00:52:18,572
and in Iran during the green movement the US state department
861
00:52:18,572 --> 00:52:24,075
I believe has told Twitter to reschedule maintainence so that
862
00:52:24,075 --> 00:52:29,160
the opposition could keep using Twitter during the attempted revolution
863
00:52:29,160 --> 00:52:33,038
and Hilary Clinton has given a very popular speech about
864
00:52:33,038 --> 00:52:36,915
how America would support the promotion of internet freedom
865
00:52:36,915 --> 00:52:40,793
and I think things such as the New America Foundation are
866
00:52:40,793 --> 00:52:46,412
funding and supporting projects such as the Commotion mesh networking project
867
00:52:46,412 --> 00:52:49,222
that we've already heard about before.
868
00:52:49,222 --> 00:52:52,635
So in other words there's a link between politics and technology sometimes,
869
00:52:52,635 --> 00:52:57,860
and in the past I believe certain influential Americans such
870
00:52:57,860 --> 00:53:03,967
Rupert Murdoch or George W. Bush have viewed modern communication technologies as a way to
871
00:53:03,967 --> 00:53:09,052
promote U.S. foreign policy and to spread democracy and freedom in the world.
872
00:53:09,052 --> 00:53:14,137
So my question is, what is your relationship with your government?
873
00:53:14,137 --> 00:53:16,087
That's a really good question.
874
00:53:16,087 --> 00:53:21,335
So one of the things that we sort of figured out from the beginning was that
875
00:53:21,335 --> 00:53:25,770
if we had close relationships with the U.S. government,
876
00:53:25,770 --> 00:53:29,787
people outside of the U.S. might have difficulty trusting us,
877
00:53:29,787 --> 00:53:34,547
because nobody wants to tell all their secrets to the American government.
878
00:53:34,547 --> 00:53:42,674
So we were thinking about what that really looks like in the context of a box that could be used globally.
879
00:53:42,674 --> 00:53:48,642
We are working very hard to engineer a device that does not require you to trust us.
880
00:53:48,642 --> 00:53:50,569
I'm not asking for your trust.
881
00:53:50,569 --> 00:53:55,051
I'm not asking for your trust, I'm asking for your help.
882
00:53:55,051 --> 00:53:59,091
All the code we write you'll be able to see it, you'll be able to
883
00:53:59,091 --> 00:54:02,086
audit it, you'll be able to make your own decisions about what it does,
884
00:54:02,086 --> 00:54:05,383
you'll be able to test it if it trustworthy or not,
885
00:54:05,383 --> 00:54:10,887
and if you decide that it is not, you can tell everyone,
886
00:54:10,887 --> 00:54:11,931
and they won't use it.
887
00:54:11,931 --> 00:54:16,808
So from a trust perspective, it doesn't matter what our relationship is with anybody.
888
00:54:16,808 --> 00:54:18,433
So that's the first thing.
889
00:54:18,433 --> 00:54:23,797
The second thing is that right now we don't have much of a relationship with the U.S. government.
890
00:54:23,797 --> 00:54:33,456
Jacob Applebaum is somewhat famous for his work with Julian Assange on Wikileaks,
891
00:54:33,456 --> 00:54:36,568
and his work on Tor, and security in general,
892
00:54:36,568 --> 00:54:39,726
his efforts to provide you with freedom and privacy.
893
00:54:39,726 --> 00:54:45,856
He is a guy who was recently revealed in the Wall Street Journal that the U.S. government has been spying
894
00:54:45,856 --> 00:54:51,545
on. And he is on our team, he's on our technical advisory committee.
895
00:54:51,545 --> 00:54:56,026
He's one of the people we go to for help when we need to understand security on the box.
896
00:54:56,026 --> 00:55:02,690
So right now our position with the American government is that we're not really related except in
897
00:55:02,690 --> 00:55:05,662
so much that we are a bunch of people who really care about these issues,
898
00:55:05,662 --> 00:55:12,768
which maybe occasionally makes us targets. Which gives us a reason to use a box like this.
899
00:55:12,768 --> 00:55:21,266
Coupled with that, there is a program in America - you were talking about Hilary Clinton saying
900
00:55:21,266 --> 00:55:26,026
she was going to encourage technologies that will spread democracy.
901
00:55:26,026 --> 00:55:30,206
So the way America encourages things is by spending money on it.
902
00:55:30,206 --> 00:55:34,687
That's our typical way to support programs. We fund different things.
903
00:55:34,687 --> 00:55:40,678
We don't generally have feel-good campaigns, we just pay people to make good work, or try to.
904
00:55:40,678 --> 00:55:46,924
So the U.S. state department has a program to provide funding for projects like the FreedomBox.
905
00:55:46,924 --> 00:55:48,526
We have not applied for that funding.
906
00:55:48,526 --> 00:55:50,198
I don't know if we will.
907
00:55:50,198 --> 00:55:56,143
However I do know that they have given funding to some very good and genuine projects that are
908
00:55:56,143 --> 00:56:00,276
run by people I trust, so I try not to be cynical about that.
909
00:56:00,276 --> 00:56:06,522
I imagine at some point that through a direct grant or a sub-grant or something,
910
00:56:06,522 --> 00:56:11,143
some state department money might support some aspect of work that is related to us.
911
00:56:11,143 --> 00:56:15,020
I mean, we might take work from a project that is state department funded,
912
00:56:15,020 --> 00:56:17,853
just because it's quick work.
913
00:56:17,853 --> 00:56:20,849
Have I answered your question?
914
00:56:20,849 --> 00:56:21,708
Yes, thanks.
915
00:56:32,200 --> 00:56:37,637
Hi, well you always have tension if you talk about privacy
916
00:56:37,637 --> 00:56:41,073
since 9/11 you know, I heard this in America very often,
917
00:56:41,073 --> 00:56:44,185
"we have to be careful", every body is suspicious and stuff.
918
00:56:44,185 --> 00:56:48,155
So how do you react when people like the government say well,
919
00:56:48,155 --> 00:56:55,446
you are creating a way to support terrorism, whatever.
920
00:56:55,446 --> 00:57:00,230
That's a good question, and it's a common question.
921
00:57:00,230 --> 00:57:04,711
Frankly every time I do this talk, it's one of the first questions that come up.
922
00:57:04,711 --> 00:57:06,940
The answer is really simple.
923
00:57:06,940 --> 00:57:11,747
The fact is, this box doesn't create any new privacy technology.
924
00:57:11,747 --> 00:57:15,137
It just makes it easier to use and easier to access.
925
00:57:15,137 --> 00:57:21,429
People who are committed to terrorism or criminal activity, they have sufficient motivation that they
926
00:57:21,429 --> 00:57:23,612
can use the technology that exists. Terrorists are already using PGP.
927
00:57:23,612 --> 00:57:27,165
They're already using Tor.
928
00:57:27,165 --> 00:57:30,253
They're already using stuff to hide their data.
929
00:57:30,253 --> 00:57:33,341
At best we are helping stupid terrorists.
930
00:57:33,341 --> 00:57:35,710
LAUGHTER
931
00:57:35,710 --> 00:57:42,861
Granted, I'm not excited about that, but I don't that's a sufficient reason to deny common people
932
00:57:42,861 --> 00:57:44,510
access to these technologies.
933
00:57:44,510 --> 00:57:49,131
And more importantly than the fact that terrorists and criminals have access to this technology,
934
00:57:49,131 --> 00:57:52,405
governments have access to this technology.
935
00:57:52,405 --> 00:57:54,657
The largest corporations have access to this technology.
936
00:57:54,657 --> 00:58:00,787
Every bank, the same encryption methods that we are using is the stuff that protects trillions of dollars
937
00:58:00,787 --> 00:58:05,106
in value that banks trade every day.
938
00:58:05,106 --> 00:58:12,583
This is technology that is currently being used by everyone except us.
939
00:58:12,583 --> 00:58:15,114
All we're doing is levelling the playing field.
940
00:58:15,114 --> 00:58:22,243
The same technology that hides data from us, that causes a complete lack of transparency in a downward
941
00:58:22,243 --> 00:58:27,908
direction, we can have to level the playing field a little bit.
942
00:58:27,908 --> 00:58:39,727
More questions?
943
00:58:39,727 --> 00:58:43,884
Thank you for your presentation.
944
00:58:43,884 --> 00:58:51,337
Could we add to challenges, maybe we could produce it in a non-communist dictatorship?
945
00:58:51,337 --> 00:58:54,333
Because I saw the label "Made in China", so I think it is just
946
00:58:54,333 --> 00:59:00,927
paradox to produce something like the FreedomBox in this country, and I would also like to be independent
947
00:59:00,927 --> 00:59:07,173
from producing in China. So that's just something for a challenge I think.
948
00:59:07,173 --> 00:59:10,610
That's a really good question and important point.
949
00:59:10,610 --> 00:59:16,229
So, we're not a hardware project. Hardware is really really hard to do right and do well.
950
00:59:16,229 --> 00:59:19,340
We have some hardware hackers on our project.
951
00:59:19,340 --> 00:59:25,261
Our tech lead Bdale Garbee does amazing work with satellites and model rockets and altimeters,
952
00:59:25,261 --> 00:59:28,837
and he's brilliant. But this is not a hardware project.
953
00:59:28,837 --> 00:59:31,972
All we can do is use hardware that already exists.
954
00:59:31,972 --> 00:59:37,638
When the world makes hardware in places other than China, we will use that hardware.
955
00:59:37,638 --> 00:59:41,098
Right now, we don't have a lot of options.
956
00:59:41,098 --> 00:59:46,624
And we're not going to deny everybody privacy because we don't have a lot of hardware options.
957
00:59:46,624 --> 00:59:48,110
When we have those options we'll take them.
958
00:59:48,110 --> 00:59:51,941
In the meantime, if you are a person who really cares about this issue,
959
00:59:51,941 --> 00:59:55,656
don't buy a FreedomBox.
960
00:59:55,656 --> 00:59:58,954
Take the software, go find a computer that isn't made in China,
961
00:59:58,954 --> 01:00:02,228
LAUGHTER
962
01:00:02,228 --> 01:00:05,014
and go put the software on that box.
963
01:00:05,014 --> 01:00:11,748
If you want a solution that is run on computers that don't exist, I can't help you with that.
964
01:00:11,748 --> 01:00:15,951
If you want a solution that runs, I might be able to help you with that.
965
01:00:15,951 --> 01:00:20,270
But yes, I agree that that is a real issue, and we are thinking about that.
966
01:00:20,270 --> 01:00:25,471
We believe that there is an open hardware project story here.
967
01:00:25,471 --> 01:00:28,884
And one thing we've been doing is working with the manufacturer of the box,
968
01:00:28,884 --> 01:00:32,948
to get the code free, to make sure we know what's in it,
969
01:00:32,948 --> 01:00:35,316
so that there are no binary blobs in the box,
970
01:00:35,316 --> 01:00:38,149
so we have some assurances that we actually do have freedom.
971
01:00:38,149 --> 01:00:45,672
At some point though, we do believe that somebody will solve the open hardware problem for us.
972
01:00:45,672 --> 01:00:50,548
We're not going to be the hardware project, but there are people trying to do this in an open way.
973
01:00:50,548 --> 01:00:54,426
RaspberryPi for example. They're not quite right for our use-case, but those kinds of projects
974
01:00:54,426 --> 01:00:58,582
are starting to exist, and they're starting to be really good.
975
01:00:58,582 --> 01:01:01,415
In a few years, maybe that will be the thing we move onto.
976
01:01:01,415 --> 01:01:09,937
Now, I'm guessing that even an open hardware project like RaspberryPi does their manufacturing in
977
01:01:09,937 --> 01:01:14,860
a place like China. And that's a big problem.
978
01:01:14,860 --> 01:01:19,480
When the world is ready with a solution to that, we will be ready to accept that solution and adopt it
979
01:01:19,480 --> 01:01:22,615
of course.
980
01:01:22,615 --> 01:01:30,533
Any more questions for James? or statements?
981
01:01:33,056 --> 01:01:37,012
This is more of a statement than a question I guess,
982
01:01:37,012 --> 01:01:42,979
but should the FreedomBox start being made in China there will be a lot more of them coming out of
983
01:01:42,979 --> 01:01:46,253
the back door and enabling privacy for people that don't get
984
01:01:46,253 --> 01:01:51,919
it, but also as soon as it starts getting manufactured I'd imagine you may,
985
01:01:51,919 --> 01:01:54,914
because you're not in it for the money as you told me last night,
986
01:01:54,914 --> 01:01:59,558
you may be looking forward to how easy it will be to copy,
987
01:01:59,558 --> 01:02:05,990
and with things like MakerBot, making a case, making a bot is easy,
988
01:02:05,990 --> 01:02:08,823
you can do it in your bedroom now with 3D printers.
989
01:02:08,823 --> 01:02:15,998
So there will be a bag of components, a board, made by some online place that is really into this,
990
01:02:15,998 --> 01:02:18,227
and you can assemble these at home.
991
01:02:18,227 --> 01:02:22,987
So you've just got to get it out there first I think, and lead the way.
992
01:02:22,987 --> 01:02:29,628
Yeah, I think that's quite right in that we are not the only place to get a box like this.
993
01:02:29,628 --> 01:02:34,551
I mean, we're putting it on a specific box to make it easy, but there will be lots of places that make
994
01:02:34,551 --> 01:02:40,657
boxes, and hopefully there will be places where working conditions are acceptable to everybody.
995
01:02:40,657 --> 01:02:43,931
And at that point you can make your own boxes,
996
01:02:43,931 --> 01:02:44,431
you can put them on any box you can find.
997
01:02:44,431 --> 01:02:46,137
The point of Free Software is not to lock you into a service,
998
01:02:46,137 --> 01:02:53,196
a technology, a software, a structure or a box.
999
01:02:53,196 --> 01:02:53,696
We're not going to lock you into anything, that's one thing we're extremely clear about.
1000
01:02:53,696 --> 01:03:00,928
If you manage to make a box like this at home, I would really love to hear about it.
1001
01:03:00,928 --> 01:03:06,455
If you can spin up a MakerBot to make a case,
1002
01:03:06,455 --> 01:03:08,939
and you have a friend who can etch boards,
1003
01:03:08,939 --> 01:03:10,565
and you make a box like this at home,
1004
01:03:10,565 --> 01:03:14,141
that would be big news and a lot of people would want to know about it.
1005
01:03:14,141 --> 01:03:22,662
More statements or questions? Yes...
1006
01:03:22,662 --> 01:03:31,463
So, if you lose your box and get a new one, how is it going to reauthenticate to the boxes of your friends?
1007
01:03:31,463 --> 01:03:34,296
I think I didn't get that one.
1008
01:03:34,296 --> 01:03:39,381
Yeah, so, the good thing about friends is that they don't actually know you by your PGP key.
1009
01:03:39,381 --> 01:03:48,251
Sorry, I didn't specify it, if you want a grand security and you want distribution to more than 12 friends,
1010
01:03:48,251 --> 01:03:54,009
so let's say a hundred, and they're like, all over the world.
1011
01:03:54,009 --> 01:03:59,536
You are probably going to reach them through the internet to get your key parts back,
1012
01:03:59,536 --> 01:04:05,178
and you are probably not going to be able to use the FreedomBox to get a new one because
1013
01:04:05,178 --> 01:04:06,478
it has to be authenticated.
1014
01:04:06,478 --> 01:04:09,311
So how do you do?
1015
01:04:09,311 --> 01:04:10,960
Well, you at that point...
1016
01:04:10,960 --> 01:04:14,536
if you don't have a FreedomBox, the FreedomBox can't provide you with a solution to that problem.
1017
01:04:14,536 --> 01:04:16,811
What you're going to have to do,
1018
01:04:16,811 --> 01:04:19,017
is perhaps call your friends.
1019
01:04:19,017 --> 01:04:20,991
Have a conversation with them,
1020
01:04:20,991 --> 01:04:23,499
convince them that you are the person you say you are.
1021
01:04:23,499 --> 01:04:27,400
Reference your shared experiences, maybe they know your voice,
1022
01:04:27,400 --> 01:04:33,506
maybe they just know who you are by the way that you act and the way that you talk.
1023
01:04:33,506 --> 01:04:37,059
There's not going to be any one way that we get our keys back.
1024
01:04:37,059 --> 01:04:41,076
If you lose your key, yeah, we're not saying that's never going to be a problem.
1025
01:04:41,076 --> 01:04:43,909
And I wouldn't recommend splitting your key up among a hundred people,
1026
01:04:43,909 --> 01:04:48,530
because that's a lot of people to ask for your key back.
1027
01:04:48,530 --> 01:04:53,568
The mechanism I have in mind is not that you get a little bit of your key from
1028
01:04:53,568 --> 01:04:56,424
everyone you know, it's that you spread out the key among
1029
01:04:56,424 --> 01:05:00,000
a lot of people, and you need a certain number of those people.
1030
01:05:00,000 --> 01:05:02,694
So maybe it's five of seven of your friends.
1031
01:05:02,694 --> 01:05:06,734
So you give seven people the key, but any five of them could give you a whole key.
1032
01:05:06,734 --> 01:05:09,730
So in case you can't reach somebody you can still manage to do it.
1033
01:05:09,730 --> 01:05:12,887
And we can make that access control as fine-grained as we want,
1034
01:05:12,887 --> 01:05:15,860
but a hundred would be overwhelming.
1035
01:05:15,860 --> 01:05:20,504
We wouldn't do that. Sure, you could do it if you wanted,
1036
01:05:20,504 --> 01:05:23,476
but I don't think you'll have a hundred friends you could trust that much.
1037
01:05:23,476 --> 01:05:26,750
Maybe you do, I don't.
1038
01:05:26,750 --> 01:05:33,878
More questions, statements?
1039
01:05:33,878 --> 01:05:39,498
Yes?
1040
01:05:39,498 --> 01:05:47,253
Erm, it's just a wish... but have you thought about the idea of using the FreedomBox to create
1041
01:05:47,253 --> 01:05:51,897
a community where you can exchange not only data but like
1042
01:05:51,897 --> 01:05:58,770
products or services, so that would maybe like, change the system?
1043
01:05:58,770 --> 01:06:04,738
One of the things we want to do with the FreedomBox is
1044
01:06:04,738 --> 01:06:10,380
create a thing that looks a lot like your current social networking,
1045
01:06:10,380 --> 01:06:12,911
minus the advertising and the spying.
1046
01:06:12,911 --> 01:06:16,417
A way to talk to all your friends at once.
1047
01:06:16,417 --> 01:06:20,295
Once you have a place, a platform, where you can communicate
1048
01:06:20,295 --> 01:06:23,128
with your friends, you can build on that platform
1049
01:06:23,128 --> 01:06:25,055
and you can create structures like that.
1050
01:06:25,055 --> 01:06:29,072
If we make a thing that has programmable interfaces, so
1051
01:06:29,072 --> 01:06:32,671
you can make apps for it, you can make an app like that,
1052
01:06:32,671 --> 01:06:34,436
if that's important to you.
1053
01:06:34,436 --> 01:06:38,174
What people do with the communication once they have it,
1054
01:06:38,174 --> 01:06:40,403
we don't have any opinions about.
1055
01:06:40,403 --> 01:06:43,236
We want them to do everything that's important to them.
1056
01:06:43,236 --> 01:06:45,930
And I think something like that could be important,
1057
01:06:45,930 --> 01:07:03,414
and yeah, that would be amazing if that were to emerge.
1058
01:07:03,414 --> 01:07:08,337
Some things I believe are easier to do in a centralized architecture than a decentralized one,
1059
01:07:08,337 --> 01:07:12,819
for example search, or services that require a lot of bandwidth.
1060
01:07:12,819 --> 01:07:16,093
I don't see how you can run something like YouTube on the FreedomBox.
1061
01:07:16,093 --> 01:07:18,461
So is your utopian vision one where everything is decentralized,
1062
01:07:18,461 --> 01:07:23,918
or is it ok to have some centralized pieces in a future network?
1063
01:07:23,918 --> 01:07:28,840
Look, if you're going to grant me my utopia then of course everything is decentralized.
1064
01:07:28,840 --> 01:07:31,812
But we don't live in a utopia, I don't have magic.
1065
01:07:31,812 --> 01:07:38,546
We actually have in our flowchart a box labeled "magic routing",
1066
01:07:38,546 --> 01:07:41,217
because routing is hard to do in a decentralized way...
1067
01:07:41,217 --> 01:07:44,049
You need someone to tell you where the IPs are.
1068
01:07:44,049 --> 01:07:47,347
And that's hard to do in a decentralized way.
1069
01:07:47,347 --> 01:07:52,107
We haven't solved it, and we don't think we're going to fully solve it.
1070
01:07:52,107 --> 01:07:54,731
We hope someone else solves it first of all.
1071
01:07:54,731 --> 01:07:56,844
But second of all, we don't know where the compromises are.
1072
01:07:56,844 --> 01:07:59,212
Some things are not possible to decentralize.
1073
01:07:59,212 --> 01:08:01,859
We're going to decentralize as much as we can,
1074
01:08:01,859 --> 01:08:04,227
but we're not committing to doing anything impossible.
1075
01:08:04,227 --> 01:08:06,155
If you can't run YouTube off this box,
1076
01:08:06,155 --> 01:08:08,407
which I disagree with by the way,
1077
01:08:08,407 --> 01:08:10,009
then you won't, because it's impossible.
1078
01:08:10,009 --> 01:08:12,262
If you want to run YouTube on this box you turn all your
1079
01:08:12,262 --> 01:08:14,491
friends into your content delivery network,
1080
01:08:14,491 --> 01:08:16,743
and all your friends parallelize the distribution of the box,
1081
01:08:16,743 --> 01:08:18,368
you share the bandwidth.
1082
01:08:18,368 --> 01:08:20,621
It's ad-hoc, BitTorrent-like functionality.
1083
01:08:20,621 --> 01:08:24,220
Yes, that technology doesn't exist yet, I just made all that up,
1084
01:08:24,220 --> 01:08:27,192
but we can do it.
1085
01:08:27,192 --> 01:08:32,556
The parts that are hard though, the things like the routing,
1086
01:08:32,556 --> 01:08:35,064
there will be real compromises.
1087
01:08:35,064 --> 01:08:36,410
There will be real trade-offs.
1088
01:08:36,410 --> 01:08:39,986
There will be places where we'll say, you know what, we have
1089
01:08:39,986 --> 01:08:41,612
to rely on the DNS system.
1090
01:08:41,612 --> 01:08:44,955
Everybody in this room knows that the DNS system has some
1091
01:08:44,955 --> 01:08:48,090
security problems, some architectural problems that make it
1092
01:08:48,090 --> 01:08:51,689
a thing we would ideally not have to rely on.
1093
01:08:51,689 --> 01:08:55,869
But you know what? This project is not going to be able to replace DNS.
1094
01:08:55,869 --> 01:08:59,305
There are plenty of alternate DNS proposals out there, but we are not going to
1095
01:08:59,305 --> 01:09:02,579
just chuck the old DNS system, because we want people
1096
01:09:02,579 --> 01:09:05,551
to be able to get to the box, even if they don't have a box.
1097
01:09:05,551 --> 01:09:09,290
We want you to be able to serve services to the public.
1098
01:09:09,290 --> 01:09:13,911
We are going to use a lot of structures that are less than ideal.
1099
01:09:13,911 --> 01:09:16,302
We're assuming that TCP/IP is there...
1100
01:09:16,302 --> 01:09:19,414
in the normal use case you're using the internet backbone
1101
01:09:19,414 --> 01:09:22,664
to do your communication.
1102
01:09:22,664 --> 01:09:25,637
The mesh routing story we talked about is not how you do
1103
01:09:25,637 --> 01:09:30,490
your normal use. That's an emergency mode if there's a crisis, a political instability, a tsunami,
1104
01:09:30,490 --> 01:09:35,110
if you can't get to your regular internet because it has failed you in some way because
1105
01:09:35,110 --> 01:09:38,222
it has become oppressive or inaccessible.
1106
01:09:38,222 --> 01:09:40,614
Then you would use something like the mesh network.
1107
01:09:40,614 --> 01:09:44,050
But in the normal course of business, you are using
1108
01:09:44,050 --> 01:09:47,324
a thing that is less than ideal, and that's a trade-off.
1109
01:09:47,324 --> 01:09:49,530
We can't as a project protect you from everything.
1110
01:09:49,530 --> 01:09:51,318
We are going to look for the places where we can make
1111
01:09:51,318 --> 01:09:54,476
effective protection. We are going to try and make it clear
1112
01:09:54,476 --> 01:09:57,750
the limits of that protection. And we're going to give you
1113
01:09:57,750 --> 01:09:59,097
everything we can.
1114
01:09:59,097 --> 01:10:05,389
And then, as we move forward, when opportunities to solve new problems present themselves,
1115
01:10:05,389 --> 01:10:08,501
we'll take them.
1116
01:10:08,501 --> 01:10:16,303
Well I have to add before when we had the talk, unfortunately German you couldn't
1117
01:10:16,303 --> 01:10:19,275
understand a lot.
1118
01:10:19,275 --> 01:10:22,572
I didn't understand it but I could tell that it was occurring at a very high level of technical competence
1119
01:10:22,572 --> 01:10:25,730
and that there was a lot of good information there.
1120
01:10:25,730 --> 01:10:28,702
And I'm really hoping that you'll take the video of it and put it up on universalsubtitles.org, or some
1121
01:10:28,702 --> 01:10:33,183
other service where people can subtitle it. And hopefully there'll be an English version and I'll get
1122
01:10:33,183 --> 01:10:35,877
to see it. I think there was a lot of really good information in there.
1123
01:10:35,877 --> 01:10:38,269
What's universalsubtitles.org?
1124
01:10:38,269 --> 01:10:46,349
Universalsubtitles.org is a great website. It's kind of like, you put a video up, and anyone can
1125
01:10:46,349 --> 01:10:49,020
add subtitles to as much or as little as they want.
1126
01:10:49,020 --> 01:10:53,780
And then other people can change the subtitles, and you can do it in as many languages as you want.
1127
01:10:53,780 --> 01:10:59,213
So you don't have to ask someone for a favour, "hey, will you subtitle my video?"
1128
01:10:59,213 --> 01:11:03,068
that's 20 minutes long or an hour long. You tell a community of people "we need help subtitling",
1129
01:11:03,068 --> 01:11:08,547
and everyone goes and subtitles 3 minutes in their favourite languages.
1130
01:11:08,547 --> 01:11:15,421
It's a very effective way to crowdsouce subtitling, and it's a very effective way to just share information.
1131
01:11:15,421 --> 01:11:20,947
We have a lot of videos with good information that are locked into languages that not everyone speaks.
1132
01:11:20,947 --> 01:11:22,712
So this is a way to get around that.
1133
01:11:22,712 --> 01:11:25,428
As FreedomBox, we use that project.
1134
01:11:25,428 --> 01:11:28,099
And I believe, if I'm not mistaken, I haven't looked in a while,
1135
01:11:28,099 --> 01:11:33,021
that it's all Free software that they are using. So you can download it and start your own if you want.
1136
01:11:33,021 --> 01:11:41,752
So back to my previous question - in the talk in the afternoon we heard about mesh networking
1137
01:11:41,752 --> 01:11:44,863
we talked about that, and it's actually not just being used in
1138
01:11:44,863 --> 01:11:46,814
emergency situations but people are really using it.
1139
01:11:46,814 --> 01:11:52,851
And especially, the philosophy that everyone becomes part of the net as not just a consumer
1140
01:11:52,851 --> 01:11:58,633
but providing part of the net, it certainly is like that that they
1141
01:11:58,633 --> 01:12:01,187
can share data among each other, they don't necessarily need
1142
01:12:01,187 --> 01:12:03,416
to go into the internet.
1143
01:12:03,416 --> 01:12:07,155
So, I would imagine the FreedomBox, with mesh networking,
1144
01:12:07,155 --> 01:12:10,591
we could essentially create a large network of many many
1145
01:12:10,591 --> 01:12:12,379
people using it.
1146
01:12:12,379 --> 01:12:17,464
We also talked about the mesh networking like FunkFeuer in Graz or Vienna
1147
01:12:17,464 --> 01:12:21,156
but it would be interesting to get them on mobile devices,
1148
01:12:21,156 --> 01:12:23,269
so that you could walk through the street,
1149
01:12:23,269 --> 01:12:30,375
theoretically people have these devices, and you could walk
1150
01:12:30,375 --> 01:12:32,023
through and it would automatically mesh and connect you.
1151
01:12:32,023 --> 01:12:37,828
So FreedomBox if applied to that, you told me this interesting example, you could screw them to
1152
01:12:37,828 --> 01:12:41,660
light posts on the street, so maybe elaborate on that,
1153
01:12:41,660 --> 01:12:44,492
maybe it could have an effect and give a lot of coverage.
1154
01:12:44,492 --> 01:12:48,974
The reason why we currently envision mesh,
1155
01:12:48,974 --> 01:12:50,622
and no decisions have been made, right,
1156
01:12:50,622 --> 01:12:54,198
but just in the way we think about it when we talk to each other,
1157
01:12:54,198 --> 01:12:58,215
and the reason why we think mesh networking is not your daily
1158
01:12:58,215 --> 01:13:03,300
mode of use is that the performance degradation is not acceptable to most end-users.
1159
01:13:03,300 --> 01:13:06,296
If mesh networking reaches the point where it is acceptable
1160
01:13:06,296 --> 01:13:09,732
if you're in a place where there's enough nodes, and you
1161
01:13:09,732 --> 01:13:13,030
have a density that you can move around then sure, that
1162
01:13:13,030 --> 01:13:15,839
can make a lot of sense. But for a lot of people who
1163
01:13:15,839 --> 01:13:19,253
exist as a person not near a lot of FreedomBoxes, they're
1164
01:13:19,253 --> 01:13:21,667
going to need the regular internet.
1165
01:13:21,667 --> 01:13:26,102
So yeah, we think mesh will be great where you have that
1166
01:13:26,102 --> 01:13:29,098
density, when the mesh technology is mature.
1167
01:13:29,098 --> 01:13:33,835
When that happens, we could have the most easy access
1168
01:13:33,835 --> 01:13:38,456
to municipal wifi by using the power in all the street
1169
01:13:38,456 --> 01:13:43,378
lights. Put a FreedomBox up in the top of every street lamp.
1170
01:13:43,378 --> 01:13:47,860
Unscrew the light bulb, screw in the FreedomBox, and screw the light bulb back on top.
1171
01:13:47,860 --> 01:13:51,134
So you still get light, we're not going to plunge you into darkness.
1172
01:13:51,134 --> 01:13:56,358
You still get light, but then you have a mesh node. Right there.
1173
01:13:56,358 --> 01:14:00,700
And you could do every 3rd or 4th street light down town, and you could cover
1174
01:14:00,700 --> 01:14:02,790
an area rather effectively.
1175
01:14:02,790 --> 01:14:07,109
It is a way to get simple municipal wifi without running
1176
01:14:07,109 --> 01:14:10,220
any fibre. And every time you have fibre you can link to it.
1177
01:14:10,220 --> 01:14:13,796
Like any time you're near fibre you can link to it and you'll
1178
01:14:13,796 --> 01:14:18,858
get your information out of that little mesh and into the regular network.
1179
01:14:18,858 --> 01:14:23,943
We could have municipal wifi with much lower infrastructure costs than most people currently think of
1180
01:14:23,943 --> 01:14:28,866
when they think of municipal wifi. And we can do it through mesh nodes.
1181
01:14:28,866 --> 01:14:33,951
And if we did it through mesh nodes we would be providing that service not only to people who have
1182
01:14:33,951 --> 01:14:38,572
FreedomBoxes, that just looks like wifi, it just looks like a regular connection.
1183
01:14:38,572 --> 01:14:45,584
You might need to do some fancy hopping, but it's not...
1184
01:14:45,584 --> 01:14:51,111
the mesh boxes themselves will do the fancy hopping, your phone itself won't have to do it.
1185
01:14:51,111 --> 01:14:54,083
While we are talking about phones,
1186
01:14:54,083 --> 01:14:59,006
I want to say that I'm not sure how phones fit into the FreedomBox.
1187
01:14:59,006 --> 01:15:02,419
I'm pretty sure there is a way that phones fit into FreedomBoxes,
1188
01:15:02,419 --> 01:15:05,855
but you can't trust your phone.
1189
01:15:05,855 --> 01:15:09,455
With the so-called smartphones it's not a phone actually but a little computer, no?
1190
01:15:09,455 --> 01:15:12,450
Yes, your phone, a smartphone is a little computer but
1191
01:15:12,450 --> 01:15:16,467
it's not a computer that you can trust, because
1192
01:15:16,467 --> 01:15:20,623
even if you replace the software on your phone,
1193
01:15:20,623 --> 01:15:26,893
with Free software, it's almost impossible to actually replace all the binary drivers,
1194
01:15:26,893 --> 01:15:29,726
it's almost impossible to go all the way down to the metal.
1195
01:15:29,726 --> 01:15:31,815
It's very hard to get a phone that is completely trustworthy
1196
01:15:31,815 --> 01:15:35,089
all the way down to the bottom of the stack.
1197
01:15:35,089 --> 01:15:37,202
So that's a problem we haven't quite figured out how to solve.
1198
01:15:37,202 --> 01:15:42,380
And pretty soon it's going to be impossible to put Free software on phones.
1199
01:15:42,380 --> 01:15:47,698
The days of jailbreaking your iPhone and rooting your Android phone might
1200
01:15:47,698 --> 01:15:55,012
very well come to an end. There is a proposal right now called UEFI.
1201
01:15:55,012 --> 01:16:01,026
It's a standard. We currently use EFI, this would be UEFI.
1202
01:16:01,026 --> 01:16:03,534
I don't know what it stands for, it's a new thing.
1203
01:16:03,534 --> 01:16:08,247
And what this proposal is, is that before your computer,
1204
01:16:08,247 --> 01:16:14,308
before the BIOS will load a bootloader on your computer
1205
01:16:14,308 --> 01:16:17,860
that BIOS has to authenticate, sorry, that bootloader has
1206
01:16:17,860 --> 01:16:20,113
to authenticate to the BIOS. It has to be signed by someone
1207
01:16:20,113 --> 01:16:23,108
the BIOS trusts, someone the BIOS manufacturer trusts.
1208
01:16:23,108 --> 01:16:25,779
And the person who puts the BIOS in your phone can decide who it trusts,
1209
01:16:25,779 --> 01:16:29,494
and they can decide they don't trust anyone except themselves.
1210
01:16:29,494 --> 01:16:36,622
If Apple sells you an iPhone with a BIOS that requires a
1211
01:16:36,622 --> 01:16:39,734
signed operating system, it might be very hard for you to
1212
01:16:39,734 --> 01:16:43,170
get another version of the operating system on there.
1213
01:16:43,170 --> 01:16:49,997
The proposals for this stuff are really in the realm of laptops and computers, that's where it's starting,
1214
01:16:49,997 --> 01:16:53,155
but believe me, technology spreads.
1215
01:16:53,155 --> 01:16:58,983
And if you want to be able to put Linux on a computer that you buy, on a laptop you buy,
1216
01:16:58,983 --> 01:17:03,464
very soon you might have a very difficult time doing that.
1217
01:17:03,464 --> 01:17:05,252
The standard is there, the companies paying attention to it
1218
01:17:05,252 --> 01:17:08,387
are not paying attention to it for our purposes.
1219
01:17:08,387 --> 01:17:12,567
They want to make sure that they can control what is on your computer.
1220
01:17:12,567 --> 01:17:17,605
So this is, you know, another political fight that we're going to engage in,
1221
01:17:17,605 --> 01:17:20,136
not the FreedomBox, but the community.
1222
01:17:20,136 --> 01:17:25,523
We're going to have to have this fight. UEFI. Look it up.
1223
01:17:25,523 --> 01:17:32,536
Start thinking about it. This is going to be a big piece of the puzzle for freedom in computing over
1224
01:17:32,536 --> 01:17:34,184
the next few years.
1225
01:17:34,184 --> 01:17:38,945
We're going to have some problems and we're going to have to find some solutions.
1226
01:17:38,945 --> 01:17:44,750
But wouldn't such an initiative, wouldn't that create a good market for companies who actually
1227
01:17:44,750 --> 01:17:49,603
would supply Linux on such devices, on the phone and on the laptop market.
1228
01:17:49,603 --> 01:17:53,155
I'm sure there are companies supplying that.
1229
01:17:53,155 --> 01:17:54,664
Absolutely.
1230
01:17:54,664 --> 01:17:58,217
And if the market in freedom were good enough to support
1231
01:17:58,217 --> 01:18:02,699
large-scale manufacturing and all that other stuff then we might get that.
1232
01:18:02,699 --> 01:18:05,322
And we might get that anyway.
1233
01:18:05,322 --> 01:18:07,134
I mean, the standard will include as many keys as you want,
1234
01:18:07,134 --> 01:18:08,643
so we might get the freedom.
1235
01:18:08,643 --> 01:18:12,660
But the manufacturers will have a really convenient way to turn the freedom off.
1236
01:18:12,660 --> 01:18:16,700
I think there will be a lot of boxes where you will have freedom.
1237
01:18:16,700 --> 01:18:21,623
But there will also be a lot where right now we think we can get Free software onto it,
1238
01:18:21,623 --> 01:18:24,015
where we won't be able to anymore.
1239
01:18:24,015 --> 01:18:25,965
It's going to be a narrowing of the market.
1240
01:18:25,965 --> 01:18:28,937
I don't think our freedom is going to completely disappear from devices.
1241
01:18:28,937 --> 01:18:33,117
But a lot of devices, if you buy the device without thinking about freedom, assuming you can have it,
1242
01:18:33,117 --> 01:18:37,575
you might get it home and discover that you can't.
1243
01:18:37,575 --> 01:18:45,261
Ok, we want to give the floor again to the audience for more questions or statements.
1244
01:18:45,261 --> 01:18:52,087
Ok, there in the back, one more.
1245
01:18:52,087 --> 01:18:54,781
Yeah, one more time, so...
1246
01:18:54,781 --> 01:19:01,492
Nowadays, where you can hardly really save your PC, laptop, whatever, against malware...
1247
01:19:01,492 --> 01:19:16,283
Isn't it really, a red carpet for hackers to, if you have social networks and circles of friends,
1248
01:19:16,283 --> 01:19:21,925
one gets some malware on his PC, mobile device, whatever,
1249
01:19:21,925 --> 01:19:26,685
has a FreedomBox, authenticates to his friends, the state is secure
1250
01:19:26,685 --> 01:19:32,467
wouldn't that open doors?
1251
01:19:32,467 --> 01:19:37,204
Sure, well, the human error is not one we can control for.
1252
01:19:37,204 --> 01:19:45,122
But someone who has a key that you trust is not necessarily someone who you let run arbitrary code
1253
01:19:45,122 --> 01:19:48,071
on your FreedomBox.
1254
01:19:48,071 --> 01:19:52,715
You might trust them to the point of having message passing with them, and trusting who they are
1255
01:19:52,715 --> 01:19:56,244
and what they say, but you don't necessarily trust the technology that they have and the
1256
01:19:56,244 --> 01:19:58,961
code that they have to be free of malware.
1257
01:19:58,961 --> 01:20:00,865
You'll still have to do all the things you currently do.
1258
01:20:00,865 --> 01:20:04,139
Right now if somebody sends you a file, it could have malware in it.
1259
01:20:04,139 --> 01:20:08,017
We're not making that easier, or better, or more likely to happen.
1260
01:20:08,017 --> 01:20:15,006
I think what we are doing is completely orthogonal to that problem.
1261
01:20:15,006 --> 01:20:19,441
At the same time, if we were to have email services on the box,
1262
01:20:19,441 --> 01:20:23,156
and you know we're not quite sure what the email story of a box like this looks like,
1263
01:20:23,156 --> 01:20:26,732
we probably would want to include some sort of virus scanning or spam catching,
1264
01:20:26,732 --> 01:20:31,747
all the usual filtering tools to give you whatever measure of protection might currently exist.
1265
01:20:31,747 --> 01:20:35,045
But the fact someone has a key and you know who they are
1266
01:20:35,045 --> 01:20:39,085
I don't think that will ever be the security hole.
1267
01:20:39,085 --> 01:20:42,220
Or at least we really hope we can make it so it's not.
1268
01:20:42,220 --> 01:20:48,930
If we fail in that then we've missed a trick.
1269
01:20:48,930 --> 01:20:53,690
Ok, any more statements or questions?
1270
01:20:53,690 --> 01:20:56,964
Ok, so, James, my last question would be...
1271
01:20:56,964 --> 01:20:59,240
You can actually buy the box right now?
1272
01:20:59,240 --> 01:21:00,424
Yes.
1273
01:21:00,424 --> 01:21:01,608
From a company?
1274
01:21:01,608 --> 01:21:02,955
Yes.
1275
01:21:02,955 --> 01:21:05,950
Maybe you can supply that information. But the software is being developed?
1276
01:21:05,950 --> 01:21:07,297
Yes.
1277
01:21:07,297 --> 01:21:11,895
Can you give an estimation about the timeline of your project, or the next milestones?
1278
01:21:11,895 --> 01:21:13,102
Sure.
1279
01:21:13,102 --> 01:21:16,957
So, the boxes are manufactures by a company called Globalscale,
1280
01:21:16,957 --> 01:21:18,582
they're about $140 US dollars.
1281
01:21:18,582 --> 01:21:24,225
There is a slightly older model called the SheevaPlug that is about $90.
1282
01:21:24,225 --> 01:21:28,102
It does just pretty much everything the Dreamplug does.
1283
01:21:28,102 --> 01:21:31,818
It has some heat sinking issues, but it's a pretty good box as well,
1284
01:21:31,818 --> 01:21:38,969
so if the price point matters to you you can get last year's model and it'll serve you just fine.
1285
01:21:38,969 --> 01:21:43,010
The software, right now we have a bare Linux distribution.
1286
01:21:43,010 --> 01:21:45,842
We spent a lot of time getting the binary blobs out of the kernel
1287
01:21:45,842 --> 01:21:50,324
and making it installable onto this hardware target.
1288
01:21:50,324 --> 01:21:54,805
We have a Jabber server, Prosody, that we are modifying to suit our needs.
1289
01:21:54,805 --> 01:22:00,796
And that should be ready, time-frame, weeks.
1290
01:22:00,796 --> 01:22:03,745
Some short number of weeks.
1291
01:22:03,745 --> 01:22:09,643
The Privoxy server, the SSH forwarding, some short number of months.
1292
01:22:09,643 --> 01:22:16,864
But those are our roadmap for the short-term future, is Jabber, SSH forwarding, browser proxying.
1293
01:22:16,864 --> 01:22:22,785
We also are working on the interface, so we're going to have an interface that you can actually
1294
01:22:22,785 --> 01:22:24,736
control some of these services with.
1295
01:22:24,736 --> 01:22:28,172
And the first thing we're doing with that interface is probably allowing you to
1296
01:22:28,172 --> 01:22:30,843
configure this box as a wireless router.
1297
01:22:30,843 --> 01:22:35,626
So it can become your wireless access point if you want it to be.
1298
01:22:35,626 --> 01:22:38,180
And your gateway of course.
1299
01:22:38,180 --> 01:22:39,945
So user interface in one vertical,
1300
01:22:39,945 --> 01:22:44,148
SSH forwarding, browser proxying a little bit out there,
1301
01:22:44,148 --> 01:22:47,584
a little bit closer: Jabber, XMPP secure chat.
1302
01:22:47,584 --> 01:22:52,646
And once we have that stack, we believe that we're going to build upwards from XMPP towards
1303
01:22:52,646 --> 01:22:55,665
perhaps something like BuddyCloud.
1304
01:22:55,665 --> 01:22:58,776
We're seriously looking at BuddyCloud and seeing what problems it solves for us
1305
01:22:58,776 --> 01:23:05,580
in terms of actually letting users group themselves in ways that they can then do access control
1306
01:23:05,580 --> 01:23:08,691
and channels and things of that nature.
1307
01:23:08,691 --> 01:23:13,892
And are you actually in contact with the hardware company producing the servers?
1308
01:23:13,892 --> 01:23:19,419
Yeah, we've had a number of conversations with them.
1309
01:23:19,419 --> 01:23:22,089
They've agreed that when our code is ready this is something
1310
01:23:22,089 --> 01:23:24,504
they are very interested in distributing.
1311
01:23:24,504 --> 01:23:26,733
More importantly we've had a lot of conversations with
1312
01:23:26,733 --> 01:23:28,823
them about freedom.
1313
01:23:28,823 --> 01:23:31,215
About why we do what we do, they way we do.
1314
01:23:31,215 --> 01:23:35,417
And how they need to act if they want to distribute code for
1315
01:23:35,417 --> 01:23:37,484
us and work with our community.
1316
01:23:37,484 --> 01:23:39,156
And what that means is we're teaching them how to comply
1317
01:23:39,156 --> 01:23:41,826
with the GPL, and we're teaching them how to remove the binary drivers,
1318
01:23:41,826 --> 01:23:45,704
and in fact we're doing some of that for them.
1319
01:23:45,704 --> 01:23:47,492
But they're Chinese, right?
1320
01:23:47,492 --> 01:23:49,140
No. No, Globalscale is not a Chinese company.
1321
01:23:49,140 --> 01:23:53,622
Their manufacturing is in China, but they're not a Chinese company.
1322
01:23:53,622 --> 01:23:58,219
And we're also talking to Marvel. Marvel makes the system-on-a-chip that goes onto the boards
1323
01:23:58,219 --> 01:24:00,843
that Globalscale is integrating into their boxes.
1324
01:24:00,843 --> 01:24:05,905
But we're also talking to Marvel about what they can do to better serve the needs of our community.
1325
01:24:05,905 --> 01:24:13,010
So a large part of our efforts is to try to convince manufacturers to make
1326
01:24:13,010 --> 01:24:14,961
hardware that suits our needs.
1327
01:24:14,961 --> 01:24:16,888
This box is a thing that they developed, they invented,
1328
01:24:16,888 --> 01:24:18,537
before they ever met us, before they ever heard of us.
1329
01:24:18,537 --> 01:24:23,622
And if we can get them enough business,
1330
01:24:23,622 --> 01:24:27,360
if by making FreedomBoxes and by putting our software on the box,
1331
01:24:27,360 --> 01:24:30,774
that enables them to sell more boxes they will be very happy
1332
01:24:30,774 --> 01:24:34,489
and when they design the next generation,
1333
01:24:34,489 --> 01:24:39,412
not the next generation of the DreamPlug, but the next generation after whatever they're designing now,
1334
01:24:39,412 --> 01:24:41,617
so we're talking a couple of years from now.
1335
01:24:41,617 --> 01:24:44,706
We can say to them, look, you're selling a lot of boxes
1336
01:24:44,706 --> 01:24:48,723
because you're making a thing that serves the free world very well.
1337
01:24:48,723 --> 01:24:52,275
Remove the 8 inch audio jack because our people don't need it.
1338
01:24:52,275 --> 01:24:55,549
Add a second wifi radio. Put antenna ports on it.
1339
01:24:55,549 --> 01:25:00,286
This box can go from something that looks really good for our purpose to
1340
01:25:00,286 --> 01:25:02,376
being something that looks amazingly good for our purpose.
1341
01:25:02,376 --> 01:25:05,209
And that will require scale.
1342
01:25:05,209 --> 01:25:07,438
And what that means is that the FreedomBox becomes a wedge for
1343
01:25:07,438 --> 01:25:13,382
making better hardware for everyone.
1344
01:25:13,382 --> 01:25:16,331
But it's not just the FreedomBox. The Tor router project is
1345
01:25:16,331 --> 01:25:21,370
also focused on the DreamPlug. They've also decided this is a good box for their purpose.
1346
01:25:21,370 --> 01:25:26,246
If you are making a box that is kind of like a FreedomBox but isn't the FreedomBox because
1347
01:25:26,246 --> 01:25:30,704
it's more specialised to what you want it for, think about
1348
01:25:30,704 --> 01:25:35,906
the DreamPlug as a hardware target. And let us know,
1349
01:25:35,906 --> 01:25:38,599
so that when we go to the company, we can say look,
1350
01:25:38,599 --> 01:25:42,454
look at all the business you are getting by being people that serve the Free world.
1351
01:25:42,454 --> 01:25:52,136
And then, hopefully, we can convince them to make boxes that better serve the Free world.
1352
01:25:52,136 --> 01:25:55,434
And that's not a fantasy. We are having those conversations with them,
1353
01:25:55,434 --> 01:25:57,825
and they are very receptive.
1354
01:25:57,825 --> 01:26:00,171
So I am pretty happy about that aspect we do.
1355
01:26:00,171 --> 01:26:02,864
And my last question would be...
1356
01:26:02,864 --> 01:26:05,395
since we are now, everything is turning mobile,
1357
01:26:05,395 --> 01:26:07,183
it's like we have these computers with an extra phone...
1358
01:26:07,183 --> 01:26:08,646
the phone is a small application on these devices.
1359
01:26:08,646 --> 01:26:13,243
Is there any plan or any idea or any project to say like, have
1360
01:26:13,243 --> 01:26:18,259
a FreedomPhone or Free mobile device?
1361
01:26:18,259 --> 01:26:23,019
So the way you connect to this box is kind of how you connect to your router,
1362
01:26:23,019 --> 01:26:24,644
port 80, browser.
1363
01:26:24,644 --> 01:26:28,545
But another way you could do it would be an app on your cellphone that bluetooths to the box.
1364
01:26:28,545 --> 01:26:33,607
I don't actually think the box has bluetooth, but you know,
1365
01:26:33,607 --> 01:26:36,324
an app on your cellphone that talks to the box over the network, say.
1366
01:26:36,324 --> 01:26:38,228
That's possible, we're thinking about that.
1367
01:26:38,228 --> 01:26:41,223
We're thinking about what that looks like for the large population
1368
01:26:41,223 --> 01:26:43,569
that exists out there that doesn't have computers.
1369
01:26:43,569 --> 01:26:46,843
There's an awful lot of people that only have cellphones, they don't have computers.
1370
01:26:46,843 --> 01:26:49,095
And we want them to have freedom too.
1371
01:26:49,095 --> 01:26:50,883
So figuring out how we can use a cellphone to talk to the box is a future problem.
1372
01:26:50,883 --> 01:26:51,765
We're not working on it right now, but we're certainly talking
1373
01:26:51,765 --> 01:26:57,292
about where it fits into the roadmap.
1374
01:26:57,292 --> 01:27:01,262
And that's why we are concerned about whether or not you
1375
01:27:01,262 --> 01:27:05,233
can trust your phone.
1376
01:27:05,233 --> 01:27:07,299
Because if you can trust your FreedomBox, but not the
1377
01:27:07,299 --> 01:27:09,668
thing you use to access it then you don't really have the privacy you think you have.
1378
01:27:09,668 --> 01:27:12,663
So, figuring out, can you trust your cellphone? Is a big part of the puzzle.
1379
01:27:12,663 --> 01:27:17,725
It's a big thing that we don't know how to do yet.
1380
01:27:17,725 --> 01:27:21,464
So let me make a little advertisement for another interesting project,
1381
01:27:21,464 --> 01:27:24,738
there is a Spanish development, I think it is also produced in China,
1382
01:27:24,738 --> 01:27:26,827
but it's called The Geek's Phone.
1383
01:27:26,827 --> 01:27:30,705
And they have a compatible Android installation by default,
1384
01:27:30,705 --> 01:27:34,142
and they are probably having a similar philosophy to keep the hardware open.
1385
01:27:34,142 --> 01:27:36,673
So maybe there is a new cooperation on the horizon.
1386
01:27:36,673 --> 01:27:40,945
Oh yeah, we love projects like that.
1387
01:27:40,945 --> 01:27:41,445
I don't know a lot about their project, but I have heard of it
1388
01:27:41,445 --> 01:27:44,057
and it is on my list of things to look into.
1389
01:27:44,057 --> 01:27:47,609
I would love to see that succeed, that would be excellent.
1390
01:27:47,609 --> 01:27:50,303
Well James, thank you for your presentation.
1391
01:27:50,303 --> 01:27:54,761
I think it was really interesting. And thank you for coming.
1392
01:27:54,761 --> 01:27:57,849
James will be back on this stage at 7pm when we have our final discussion on the 20 years of
1393
01:27:57,849 --> 01:28:03,492
the world wide web.
1394
01:28:03,492 --> 01:28:05,001
Thank you James for coming.
1395
01:28:05,001 --> 01:28:12,838
APPLAUSE