[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:08.22,0:00:11.12,Default,,0000,0000,0000,,I'm very proud to have as a guest here from the United States Dialogue: 0,0:00:11.12,0:00:14.86,Default,,0000,0000,0000,,coming to Elevate is James Vasile of the Freedom Box Foundation Dialogue: 0,0:00:14.86,0:00:20.62,Default,,0000,0000,0000,,James Vasile is working on a multitude of projects Dialogue: 0,0:00:20.62,0:00:23.57,Default,,0000,0000,0000,,like Apache, I think, Joomla and many others. He is also a lawyer, Dialogue: 0,0:00:23.57,0:00:31.35,Default,,0000,0000,0000,,and he's working also with the Freedom Box Foundation and the Free Software Foundation. Dialogue: 0,0:00:31.35,0:00:37.90,Default,,0000,0000,0000,,He's going to present one of the, in my opinion, most revolutionary projects I've seen in recent years Dialogue: 0,0:00:37.90,0:00:43.24,Default,,0000,0000,0000,,as we can see here, a little small box, the Freedom Box. Dialogue: 0,0:00:43.24,0:00:48.04,Default,,0000,0000,0000,,Yeah, erm, James is going to do a presentation and then we're going to Dialogue: 0,0:00:48.04,0:00:50.29,Default,,0000,0000,0000,,be open for questions and then sit down for a talk Dialogue: 0,0:00:50.29,0:00:53.73,Default,,0000,0000,0000,,so James, I give the floor to you. Dialogue: 0,0:00:53.73,0:00:56.56,Default,,0000,0000,0000,,Thank you, Daniel. Dialogue: 0,0:00:56.56,0:01:03.14,Default,,0000,0000,0000,,I've been here at the Elevate festival for a few days now Dialogue: 0,0:01:03.14,0:01:10.10,Default,,0000,0000,0000,,I've been attending the talks and the films and the music Dialogue: 0,0:01:10.10,0:01:15.74,Default,,0000,0000,0000,,and this has been an amazing place to see all these different ideas coming togethers Dialogue: 0,0:01:15.74,0:01:21.22,Default,,0000,0000,0000,,I want to say thank you to Daniel for organizing so much Dialogue: 0,0:01:21.22,0:01:23.62,Default,,0000,0000,0000,,of this. To Joseph as well. Dialogue: 0,0:01:23.62,0:01:30.35,Default,,0000,0000,0000,,To Daniel especially for making a big effort to get me out here, Dialogue: 0,0:01:30.35,0:01:33.48,Default,,0000,0000,0000,,making it possible for me to come out here and being such a gracious host. Dialogue: 0,0:01:33.48,0:01:36.32,Default,,0000,0000,0000,,Thank you Dan, I really appreciate it. Dialogue: 0,0:01:36.32,0:01:42.84,Default,,0000,0000,0000,,{\i1}APPLAUSE{\i0} Dialogue: 0,0:01:42.84,0:01:52.52,Default,,0000,0000,0000,,A long time ago, in the beginning of the internet Dialogue: 0,0:01:52.52,0:01:56.66,Default,,0000,0000,0000,,When we first started using the internet as a way to talk to each other Dialogue: 0,0:01:56.66,0:02:00.65,Default,,0000,0000,0000,,We mostly talked directly to each other, right? Dialogue: 0,0:02:00.65,0:02:05.09,Default,,0000,0000,0000,,Think about how email works, on a technical level Dialogue: 0,0:02:05.09,0:02:10.01,Default,,0000,0000,0000,,You take a message, you hand it off to your mail transport agent Dialogue: 0,0:02:10.01,0:02:14.65,Default,,0000,0000,0000,,It sends it through a network, directly to the recipient. Dialogue: 0,0:02:14.65,0:02:16.90,Default,,0000,0000,0000,,It hops through some other computers, but funadmentally Dialogue: 0,0:02:16.90,0:02:21.08,Default,,0000,0000,0000,,you use the network to talk directly to your other computer Dialogue: 0,0:02:21.08,0:02:26.31,Default,,0000,0000,0000,,the other computer where the recipient gets his or her mail Dialogue: 0,0:02:26.31,0:02:30.49,Default,,0000,0000,0000,,It was a direct communication medium. Dialogue: 0,0:02:30.49,0:02:33.48,Default,,0000,0000,0000,,If you're old enough to remember a program called 'talk' Dialogue: 0,0:02:33.48,0:02:37.18,Default,,0000,0000,0000,,Talk was the first, sort of, interactive you type, they see it, they type, you see it Dialogue: 0,0:02:37.18,0:02:40.40,Default,,0000,0000,0000,,instant message application. Dialogue: 0,0:02:40.40,0:02:43.07,Default,,0000,0000,0000,,This again, was direct. Dialogue: 0,0:02:43.07,0:02:48.20,Default,,0000,0000,0000,,You would put your, put their name, into your program, and address Dialogue: 0,0:02:48.20,0:02:51.36,Default,,0000,0000,0000,,they would put theirs into yours, and you would just talk directly to each other Dialogue: 0,0:02:51.36,0:02:57.31,Default,,0000,0000,0000,,You didn't send this message through servers. That centralised technology. Dialogue: 0,0:02:57.31,0:03:02.09,Default,,0000,0000,0000,,From there, from those beginnings of talking directly to each other Dialogue: 0,0:03:02.09,0:03:07.73,Default,,0000,0000,0000,,we started to build communities, emailing directly to people. Dialogue: 0,0:03:07.73,0:03:10.70,Default,,0000,0000,0000,,But that was relatively inefficient. Dialogue: 0,0:03:10.70,0:03:17.25,Default,,0000,0000,0000,,Talking directly to people, one-to-one, works very good for one-to-one converstions. Dialogue: 0,0:03:17.25,0:03:19.51,Default,,0000,0000,0000,,But as soon as you want a group conversation Dialogue: 0,0:03:19.51,0:03:21.74,Default,,0000,0000,0000,,as soon as you want to find people reliably who you haven't Dialogue: 0,0:03:21.74,0:03:26.77,Default,,0000,0000,0000,,already set up contacts for, exchanged email addresses and such Dialogue: 0,0:03:26.77,0:03:28.72,Default,,0000,0000,0000,,you run into friction, you run into problems Dialogue: 0,0:03:28.72,0:03:34.02,Default,,0000,0000,0000,,So the solution to that, was to create more centralised structures Dialogue: 0,0:03:34.02,0:03:37.90,Default,,0000,0000,0000,,and we did this with IRC Dialogue: 0,0:03:37.90,0:03:41.47,Default,,0000,0000,0000,,IRC is a place where instead of talking directly to the people we're trying to reach Dialogue: 0,0:03:41.47,0:03:45.21,Default,,0000,0000,0000,,we take a message, and we send it to an IRC server Dialogue: 0,0:03:45.21,0:03:46.70,Default,,0000,0000,0000,,a third party Dialogue: 0,0:03:46.70,0:03:48.48,Default,,0000,0000,0000,,and the IRC server then copies that message Dialogue: 0,0:03:48.48,0:03:51.20,Default,,0000,0000,0000,,to all the people who we might want to talk to. Dialogue: 0,0:03:51.20,0:03:54.34,Default,,0000,0000,0000,,We developed mailing lists, listservs Dialogue: 0,0:03:54.34,0:03:58.21,Default,,0000,0000,0000,,And again, this was a way where we would take our message Dialogue: 0,0:03:58.21,0:03:59.38,Default,,0000,0000,0000,,and hand it to a third party Dialogue: 0,0:03:59.38,0:04:03.39,Default,,0000,0000,0000,,A mail server, that is not us and not the person we're trying to talk to Dialogue: 0,0:04:03.39,0:04:05.92,Default,,0000,0000,0000,,and that mail server would then echo our communication to Dialogue: 0,0:04:05.92,0:04:07.57,Default,,0000,0000,0000,,all the people we want to talk to Dialogue: 0,0:04:07.57,0:04:10.38,Default,,0000,0000,0000,,and this was great, because you didn't have to know the Dialogue: 0,0:04:10.38,0:04:12.56,Default,,0000,0000,0000,,addresses of all the people you wanted to talk to Dialogue: 0,0:04:12.56,0:04:15.37,Default,,0000,0000,0000,,You could just all 'meet' in a common place Dialogue: 0,0:04:15.37,0:04:19.53,Default,,0000,0000,0000,,We all meet in an IRC chatroom, we all meet on a listserv Dialogue: 0,0:04:19.53,0:04:23.52,Default,,0000,0000,0000,,And there were a lot of IRC channels, and a lot of IRC servers Dialogue: 0,0:04:23.52,0:04:25.31,Default,,0000,0000,0000,,and a lot of mail servers Dialogue: 0,0:04:25.31,0:04:27.28,Default,,0000,0000,0000,,all across the internet Dialogue: 0,0:04:27.28,0:04:28.89,Default,,0000,0000,0000,,A lot of places to do this communication. Dialogue: 0,0:04:28.89,0:04:32.46,Default,,0000,0000,0000,,And if you didn't like the policies or the structures or the technology Dialogue: 0,0:04:32.46,0:04:34.27,Default,,0000,0000,0000,,of any one of these service providers Dialogue: 0,0:04:34.27,0:04:36.50,Default,,0000,0000,0000,,these IRC servers, or these list servers Dialogue: 0,0:04:36.50,0:04:38.45,Default,,0000,0000,0000,,you could just switch, you could choose to run your own. Dialogue: 0,0:04:38.45,0:04:40.10,Default,,0000,0000,0000,,It was very simple. Dialogue: 0,0:04:40.10,0:04:46.98,Default,,0000,0000,0000,,This infrastructure is not hard to create, it's not hard to run, it's not hard to install. Dialogue: 0,0:04:46.98,0:04:49.67,Default,,0000,0000,0000,,And so a lot of people did run, create and install it. Dialogue: 0,0:04:49.67,0:04:53.08,Default,,0000,0000,0000,,There were a bunch of IRC servers, there were a bunch of different listserv packages Dialogue: 0,0:04:53.08,0:04:57.84,Default,,0000,0000,0000,,But as we've moved forward in time, Dialogue: 0,0:04:57.84,0:05:01.40,Default,,0000,0000,0000,,we've started to centralise even more. Dialogue: 0,0:05:01.40,0:05:05.37,Default,,0000,0000,0000,,And, you can fast-forward to today Dialogue: 0,0:05:05.37,0:05:07.46,Default,,0000,0000,0000,,where we're channeling our communication Dialogue: 0,0:05:07.46,0:05:10.57,Default,,0000,0000,0000,,through fewer and fewer places. Dialogue: 0,0:05:10.57,0:05:13.70,Default,,0000,0000,0000,,And we are making structures that are more and more central Dialogue: 0,0:05:13.70,0:05:15.63,Default,,0000,0000,0000,,and more and more over-arching Dialogue: 0,0:05:15.63,0:05:20.83,Default,,0000,0000,0000,,So, from the, the IRC way of talking to each other Dialogue: 0,0:05:20.83,0:05:25.45,Default,,0000,0000,0000,,we moved to instant messaging applications. Dialogue: 0,0:05:25.45,0:05:28.14,Default,,0000,0000,0000,,AOL Instant Messenger, ICQ, Dialogue: 0,0:05:28.14,0:05:31.37,Default,,0000,0000,0000,,those were the early ways to do it Dialogue: 0,0:05:31.37,0:05:33.30,Default,,0000,0000,0000,,and there were only a few of them Dialogue: 0,0:05:33.30,0:05:36.85,Default,,0000,0000,0000,,MSN had its messaging system, Yahoo had its messaging system Dialogue: 0,0:05:36.85,0:05:39.38,Default,,0000,0000,0000,,and when people wanted to talk to each other now, Dialogue: 0,0:05:39.38,0:05:41.33,Default,,0000,0000,0000,,they were using third-parties again. Dialogue: 0,0:05:41.33,0:05:43.14,Default,,0000,0000,0000,,But they were only using a few third parties. Dialogue: 0,0:05:43.14,0:05:46.88,Default,,0000,0000,0000,,And if you wanted to switch providers, Dialogue: 0,0:05:46.88,0:05:49.41,Default,,0000,0000,0000,,you would leave almost everyone you knew behind, Dialogue: 0,0:05:49.41,0:05:51.36,Default,,0000,0000,0000,,your entire community behind. Dialogue: 0,0:05:51.36,0:05:53.01,Default,,0000,0000,0000,,And so it becomes harder to switch. Dialogue: 0,0:05:53.01,0:05:54.66,Default,,0000,0000,0000,,There are fewer options Dialogue: 0,0:05:54.66,0:05:58.10,Default,,0000,0000,0000,,and the cost of switching leaves more and more people behind Dialogue: 0,0:05:58.10,0:06:00.77,Default,,0000,0000,0000,,So you started to have lock-in. Dialogue: 0,0:06:00.77,0:06:05.53,Default,,0000,0000,0000,,You started to have people who were chained to their methods of communication Dialogue: 0,0:06:05.53,0:06:07.87,Default,,0000,0000,0000,,because the cost of losing your community is too high. Dialogue: 0,0:06:07.87,0:06:10.13,Default,,0000,0000,0000,,And so if you don't like the technology, or you don't like the policy Dialogue: 0,0:06:10.13,0:06:12.08,Default,,0000,0000,0000,,or you don't like the politics Dialogue: 0,0:06:12.08,0:06:13.26,Default,,0000,0000,0000,,or if they're trying to filter you Dialogue: 0,0:06:13.26,0:06:14.86,Default,,0000,0000,0000,,or censor you Dialogue: 0,0:06:14.86,0:06:16.07,Default,,0000,0000,0000,,you don't have a lot of options. Dialogue: 0,0:06:16.07,0:06:18.60,Default,,0000,0000,0000,,The cost of leaving is so high that you might stay. Dialogue: 0,0:06:18.60,0:06:21.41,Default,,0000,0000,0000,,People do stay. And they accept it. Dialogue: 0,0:06:21.41,0:06:25.26,Default,,0000,0000,0000,,And we went from that small basket of providers of this kind Dialogue: 0,0:06:25.26,0:06:27.05,Default,,0000,0000,0000,,of communication technology Dialogue: 0,0:06:27.05,0:06:29.14,Default,,0000,0000,0000,,to an even more centralised structure Dialogue: 0,0:06:29.14,0:06:33.62,Default,,0000,0000,0000,,where there is effectively only one way to reach all our friends, Dialogue: 0,0:06:33.62,0:06:36.04,Default,,0000,0000,0000,,in each mode of communication, Dialogue: 0,0:06:36.04,0:06:37.50,Default,,0000,0000,0000,,Facebook. Dialogue: 0,0:06:37.50,0:06:38.69,Default,,0000,0000,0000,,And Twitter. Dialogue: 0,0:06:38.69,0:06:41.40,Default,,0000,0000,0000,,These two services rule everything. Dialogue: 0,0:06:41.40,0:06:43.49,Default,,0000,0000,0000,,And I'm not going to stand here and say Facebook is evil Dialogue: 0,0:06:43.49,0:06:45.14,Default,,0000,0000,0000,,and that Twitter is evil Dialogue: 0,0:06:45.14,0:06:49.04,Default,,0000,0000,0000,,What I want to say is that having one place Dialogue: 0,0:06:49.04,0:06:50.64,Default,,0000,0000,0000,,where we do all our communication Dialogue: 0,0:06:50.64,0:06:53.18,Default,,0000,0000,0000,,leaves us at the mercy of the policies of the people Dialogue: 0,0:06:53.18,0:06:55.54,Default,,0000,0000,0000,,that control the infrastructure that we are chained to, Dialogue: 0,0:06:55.54,0:06:57.75,Default,,0000,0000,0000,,that we are stuck using, that we are locked into. Dialogue: 0,0:06:57.75,0:07:02.23,Default,,0000,0000,0000,,You can't leave Facebook without leaving everybody you know Dialogue: 0,0:07:02.23,0:07:05.64,Default,,0000,0000,0000,,because everybody you know is on Facebook. Dialogue: 0,0:07:05.64,0:07:09.52,Default,,0000,0000,0000,,I was not a Facebook user. Dialogue: 0,0:07:09.52,0:07:11.17,Default,,0000,0000,0000,,I was against Facebook. Dialogue: 0,0:07:11.17,0:07:14.47,Default,,0000,0000,0000,,I thought it was bad to centralise all our communication in one place. Dialogue: 0,0:07:14.47,0:07:15.65,Default,,0000,0000,0000,,I didn't like the privacy implications, Dialogue: 0,0:07:15.65,0:07:18.21,Default,,0000,0000,0000,,I didn't like Facebook's censorship Dialogue: 0,0:07:18.21,0:07:21.78,Default,,0000,0000,0000,,of things like pictures of nursing mothers. Dialogue: 0,0:07:21.78,0:07:22.97,Default,,0000,0000,0000,,I don't think that kind of thing is obscene, Dialogue: 0,0:07:22.97,0:07:25.50,Default,,0000,0000,0000,,and I don't think Facebook should have the ability to tell us Dialogue: 0,0:07:25.50,0:07:27.56,Default,,0000,0000,0000,,what we can share with our friends. Dialogue: 0,0:07:27.56,0:07:29.07,Default,,0000,0000,0000,,So I thought those were bad policies, Dialogue: 0,0:07:29.07,0:07:32.46,Default,,0000,0000,0000,,and I reacted to that by not joining Facebook. For years. Dialogue: 0,0:07:32.46,0:07:35.58,Default,,0000,0000,0000,,All my friends were on Facebook. Dialogue: 0,0:07:35.58,0:07:41.68,Default,,0000,0000,0000,,I joined Facebook late last year. November. Dialogue: 0,0:07:41.68,0:07:48.21,Default,,0000,0000,0000,,Because in November, a friend of mine passed away. Dialogue: 0,0:07:48.21,0:07:50.02,Default,,0000,0000,0000,,His name was Chuck. He was a brilliant man. Dialogue: 0,0:07:50.02,0:07:55.24,Default,,0000,0000,0000,,And he lived a lot of his life online. Dialogue: 0,0:07:55.24,0:07:58.22,Default,,0000,0000,0000,,He was on Facebook, and he shared things with friends on Facebook. Dialogue: 0,0:07:58.22,0:08:01.07,Default,,0000,0000,0000,,When he passed away I realised I hadn't communicated with him in a while, Dialogue: 0,0:08:01.07,0:08:02.72,Default,,0000,0000,0000,,I hadn't really talked to him in a while. Dialogue: 0,0:08:02.72,0:08:05.55,Default,,0000,0000,0000,,And the reason I hadn't was because I wasn't Dialogue: 0,0:08:05.55,0:08:08.08,Default,,0000,0000,0000,,communicating with him in the place he communicates. Dialogue: 0,0:08:08.08,0:08:10.03,Default,,0000,0000,0000,,I wasn't meeting him where he was, I wasn't on Facebook. Dialogue: 0,0:08:10.03,0:08:12.40,Default,,0000,0000,0000,,I was missing out on something huge. Dialogue: 0,0:08:12.40,0:08:15.65,Default,,0000,0000,0000,,That's the cost of not being there. Dialogue: 0,0:08:15.65,0:08:17.44,Default,,0000,0000,0000,,And so I joined. Dialogue: 0,0:08:17.44,0:08:19.37,Default,,0000,0000,0000,,Because I decided that as strong as my beliefs were, Dialogue: 0,0:08:19.37,0:08:21.30,Default,,0000,0000,0000,,it was more important to me to be there with my friends and Dialogue: 0,0:08:21.30,0:08:23.08,Default,,0000,0000,0000,,to talk to my friends. Dialogue: 0,0:08:23.08,0:08:24.57,Default,,0000,0000,0000,,That's the power of lock-in. Dialogue: 0,0:08:24.57,0:08:27.24,Default,,0000,0000,0000,,Me, a person who cares, as much as I do, Dialogue: 0,0:08:27.24,0:08:31.05,Default,,0000,0000,0000,,who cares enough about these issues that I do something like this Dialogue: 0,0:08:31.05,0:08:32.98,Default,,0000,0000,0000,,I got locked into Facebook. I'm there now. Dialogue: 0,0:08:32.98,0:08:35.34,Default,,0000,0000,0000,,That's how I talk to a lot of my friends, whether I like it or not Dialogue: 0,0:08:35.34,0:08:38.73,Default,,0000,0000,0000,,I am locked into Facebook. Dialogue: 0,0:08:38.73,0:08:42.77,Default,,0000,0000,0000,,You know, I'm also on Diaspora. But my friends aren't on Diaspora. Dialogue: 0,0:08:42.77,0:08:46.81,Default,,0000,0000,0000,,This sort of lock-in creates a sort of situation where Dialogue: 0,0:08:46.81,0:08:51.13,Default,,0000,0000,0000,,we have one arbiter of what is acceptable speech, Dialogue: 0,0:08:51.13,0:08:53.22,Default,,0000,0000,0000,,whether we like it or not. Dialogue: 0,0:08:53.22,0:08:55.03,Default,,0000,0000,0000,,If they're free, we're free to the extent, Dialogue: 0,0:08:55.03,0:08:56.22,Default,,0000,0000,0000,,only to the extent, Dialogue: 0,0:08:56.22,0:08:57.26,Default,,0000,0000,0000,,that they give us freedom. Dialogue: 0,0:08:57.26,0:08:59.05,Default,,0000,0000,0000,,And that to me isn't freedom. Dialogue: 0,0:08:59.05,0:09:01.44,Default,,0000,0000,0000,,That to me is accepting what you're given. Dialogue: 0,0:09:01.44,0:09:04.14,Default,,0000,0000,0000,,It's the exact opposite of making your own choices. Dialogue: 0,0:09:04.14,0:09:08.64,Default,,0000,0000,0000,,The exact opposite of self-determination. Dialogue: 0,0:09:08.64,0:09:13.56,Default,,0000,0000,0000,,All of our problems in communication can be traced Dialogue: 0,0:09:13.56,0:09:16.98,Default,,0000,0000,0000,,to centralized communications infrastructure. Dialogue: 0,0:09:16.98,0:09:22.62,Default,,0000,0000,0000,,Now, I've sort of told this story at the social level, Dialogue: 0,0:09:22.62,0:09:25.87,Default,,0000,0000,0000,,in the way that we're talking about how to talk to your peers Dialogue: 0,0:09:25.87,0:09:28.70,Default,,0000,0000,0000,,and your friends on the internet. Dialogue: 0,0:09:28.70,0:09:33.76,Default,,0000,0000,0000,,But this story also exists when we think about relying on the pipes, Dialogue: 0,0:09:33.76,0:09:38.25,Default,,0000,0000,0000,,relying on the hardware, the technical infrastructure behind the software. Dialogue: 0,0:09:38.25,0:09:43.47,Default,,0000,0000,0000,,We rely on internet backbones, Dialogue: 0,0:09:43.47,0:09:45.70,Default,,0000,0000,0000,,we rely on centralized cellphone networks, Dialogue: 0,0:09:45.70,0:09:47.95,Default,,0000,0000,0000,,we rely on centralized telephone networks. Dialogue: 0,0:09:47.95,0:09:52.43,Default,,0000,0000,0000,,The people that control these networks have the ability Dialogue: 0,0:09:52.43,0:09:54.80,Default,,0000,0000,0000,,to tell us what we're allowed to say, Dialogue: 0,0:09:54.80,0:09:56.61,Default,,0000,0000,0000,,when we're allowed to say it. Dialogue: 0,0:09:56.61,0:09:59.75,Default,,0000,0000,0000,,They have the ability to filter us, to censor us, to influence us. Dialogue: 0,0:09:59.75,0:10:02.58,Default,,0000,0000,0000,,Sometimes they use that ability, and sometimes they don't, Dialogue: 0,0:10:02.58,0:10:04.67,Default,,0000,0000,0000,,and sometimes by law they're not allowed to. Dialogue: 0,0:10:04.67,0:10:06.48,Default,,0000,0000,0000,,But at the end of the day Dialogue: 0,0:10:06.48,0:10:09.27,Default,,0000,0000,0000,,the power doesn't rest in our hands. Dialogue: 0,0:10:09.27,0:10:11.52,Default,,0000,0000,0000,,The power, from a technological perspective, Dialogue: 0,0:10:11.52,0:10:13.59,Default,,0000,0000,0000,,rests in the hands of the people that operate the Dialogue: 0,0:10:13.59,0:10:15.65,Default,,0000,0000,0000,,networks. Dialogue: 0,0:10:15.65,0:10:20.41,Default,,0000,0000,0000,,Centralization doesn't just allow this sort of filtering and censorship. Dialogue: 0,0:10:20.41,0:10:23.52,Default,,0000,0000,0000,,There's another big problem with centralization. Dialogue: 0,0:10:23.52,0:10:26.06,Default,,0000,0000,0000,,The other big problem with centralization is that by Dialogue: 0,0:10:26.06,0:10:30.05,Default,,0000,0000,0000,,gathering all of our data in one place Dialogue: 0,0:10:30.05,0:10:33.51,Default,,0000,0000,0000,,it becomes easy Dialogue: 0,0:10:33.51,0:10:36.64,Default,,0000,0000,0000,,to spy on us. Dialogue: 0,0:10:36.64,0:10:39.34,Default,,0000,0000,0000,,So every time you go to a website Dialogue: 0,0:10:39.34,0:10:41.43,Default,,0000,0000,0000,,pretty much Dialogue: 0,0:10:41.43,0:10:45.44,Default,,0000,0000,0000,,the website includes, at the bottom of the page Dialogue: 0,0:10:45.44,0:10:49.93,Default,,0000,0000,0000,,a little graphic or invisible Javascript thing Dialogue: 0,0:10:49.93,0:10:53.06,Default,,0000,0000,0000,,that tells Google that you came to visit the page. Dialogue: 0,0:10:53.06,0:10:56.17,Default,,0000,0000,0000,,Eva goes to a website, and the website says Dialogue: 0,0:10:56.17,0:10:59.28,Default,,0000,0000,0000,,"Hey Google! Eva just came to my website!" Dialogue: 0,0:10:59.28,0:11:01.49,Default,,0000,0000,0000,,Every time she goes to a website, that happens. Dialogue: 0,0:11:01.49,0:11:04.76,Default,,0000,0000,0000,,And so Google effectively sits next to her and watches, Dialogue: 0,0:11:04.76,0:11:06.55,Default,,0000,0000,0000,,while she uses the internet. Dialogue: 0,0:11:06.55,0:11:07.90,Default,,0000,0000,0000,,Watches everything she does, Dialogue: 0,0:11:07.90,0:11:09.08,Default,,0000,0000,0000,,and everything she enters, Dialogue: 0,0:11:09.08,0:11:11.64,Default,,0000,0000,0000,,everything she looks at and knows. Dialogue: 0,0:11:11.64,0:11:15.24,Default,,0000,0000,0000,,It's not just her search data, it's not just her Gmail. Dialogue: 0,0:11:15.24,0:11:19.25,Default,,0000,0000,0000,,It's the entire picture of her digital life. Dialogue: 0,0:11:19.25,0:11:22.09,Default,,0000,0000,0000,,In one place. Dialogue: 0,0:11:22.09,0:11:23.74,Default,,0000,0000,0000,,That's a pretty complete profile. Dialogue: 0,0:11:23.74,0:11:24.78,Default,,0000,0000,0000,,If you were able... Dialogue: 0,0:11:24.78,0:11:27.61,Default,,0000,0000,0000,,...imagine if somebody could sit next to you and watch Dialogue: 0,0:11:27.61,0:11:29.26,Default,,0000,0000,0000,,everything you did online, Dialogue: 0,0:11:29.26,0:11:31.35,Default,,0000,0000,0000,,imagine how much they would know about you. Dialogue: 0,0:11:31.35,0:11:33.28,Default,,0000,0000,0000,,That's how much Google knows about you. Dialogue: 0,0:11:33.28,0:11:36.25,Default,,0000,0000,0000,,Google knows more about you than you know about yourself, Dialogue: 0,0:11:36.25,0:11:39.94,Default,,0000,0000,0000,,because Google never forgets. Dialogue: 0,0:11:39.94,0:11:42.91,Default,,0000,0000,0000,,Google knows more about you than your parents, Dialogue: 0,0:11:42.91,0:11:43.96,Default,,0000,0000,0000,,than your partner, Dialogue: 0,0:11:43.96,0:11:46.88,Default,,0000,0000,0000,,Google knows your secrets, your worst secrets, Dialogue: 0,0:11:46.88,0:11:48.67,Default,,0000,0000,0000,,Google knows if you're cheating on your spouse Dialogue: 0,0:11:48.67,0:11:49.86,Default,,0000,0000,0000,,because they saw you do the Google search for the Dialogue: 0,0:11:49.86,0:11:54.64,Default,,0000,0000,0000,,sexually-transmitted disease. Dialogue: 0,0:11:54.64,0:11:56.71,Default,,0000,0000,0000,,Google knows your hopes and your dreams. Dialogue: 0,0:11:56.71,0:11:58.17,Default,,0000,0000,0000,,Because the things we hope and dream about, Dialogue: 0,0:11:58.17,0:11:59.35,Default,,0000,0000,0000,,we look for more information about. Dialogue: 0,0:11:59.35,0:12:00.70,Default,,0000,0000,0000,,We're natural information seekers. Dialogue: 0,0:12:00.70,0:12:02.49,Default,,0000,0000,0000,,We think about something, it fascinates us, Dialogue: 0,0:12:02.49,0:12:05.18,Default,,0000,0000,0000,,we go and look it up online. We search around. Dialogue: 0,0:12:05.18,0:12:06.97,Default,,0000,0000,0000,,We look around the internet, and we think about it. Dialogue: 0,0:12:06.97,0:12:11.01,Default,,0000,0000,0000,,And Google is right there. Following our thought process, Dialogue: 0,0:12:11.01,0:12:15.03,Default,,0000,0000,0000,,the thought process in our click trail. Dialogue: 0,0:12:15.03,0:12:19.35,Default,,0000,0000,0000,,That is an intimate relationship. Dialogue: 0,0:12:19.35,0:12:21.30,Default,,0000,0000,0000,,Right? Do you want an intimate relationship with Google? Dialogue: 0,0:12:21.30,0:12:21.90,Default,,0000,0000,0000,,Maybe you do. Dialogue: 0,0:12:21.90,0:12:25.50,Default,,0000,0000,0000,,I personally, don't. Dialogue: 0,0:12:25.50,0:12:28.77,Default,,0000,0000,0000,,But that's it, Google sits next to us and watches us use Dialogue: 0,0:12:28.77,0:12:30.12,Default,,0000,0000,0000,,our computers. Dialogue: 0,0:12:30.12,0:12:34.74,Default,,0000,0000,0000,,And if anyone actually did... if you had a friend who wanted Dialogue: 0,0:12:34.74,0:12:37.27,Default,,0000,0000,0000,,to sit next to you, or a stranger said I want to sit next to you Dialogue: 0,0:12:37.27,0:12:39.06,Default,,0000,0000,0000,,and just watch you use your computer all day, Dialogue: 0,0:12:39.06,0:12:41.41,Default,,0000,0000,0000,,you would use that computer very differently to the way you do now. Dialogue: 0,0:12:41.41,0:12:44.38,Default,,0000,0000,0000,,But because Google doesn't physically sit next to you, Dialogue: 0,0:12:44.38,0:12:49.07,Default,,0000,0000,0000,,Google sits invisibly in the box, you don't know Google is there. Dialogue: 0,0:12:49.07,0:12:51.16,Default,,0000,0000,0000,,But you do know, right? Dialogue: 0,0:12:51.16,0:12:52.64,Default,,0000,0000,0000,,We're all aware of this. I'm not saying any of you don't know, Dialogue: 0,0:12:52.64,0:12:55.76,Default,,0000,0000,0000,,especially in a room like this. Dialogue: 0,0:12:55.76,0:12:57.10,Default,,0000,0000,0000,,But we don't think about it. Dialogue: 0,0:12:57.10,0:12:58.75,Default,,0000,0000,0000,,We try not to think about it. Dialogue: 0,0:12:58.75,0:13:01.58,Default,,0000,0000,0000,,We are locked in, to the internet. Dialogue: 0,0:13:01.58,0:13:03.65,Default,,0000,0000,0000,,We can't stop using it. Dialogue: 0,0:13:03.65,0:13:05.30,Default,,0000,0000,0000,,And the structures that exist, Dialogue: 0,0:13:05.30,0:13:06.51,Default,,0000,0000,0000,,the infrastructure that exists, Dialogue: 0,0:13:06.51,0:13:09.01,Default,,0000,0000,0000,,that has been slowly turned from Dialogue: 0,0:13:09.01,0:13:12.73,Default,,0000,0000,0000,,a means to allow us to communicate with each other Dialogue: 0,0:13:12.73,0:13:16.12,Default,,0000,0000,0000,,to a means of allowing us to access web services Dialogue: 0,0:13:16.12,0:13:19.81,Default,,0000,0000,0000,,in return for all our personal information so we can be bought and sold Dialogue: 0,0:13:19.81,0:13:21.60,Default,,0000,0000,0000,,like products. Dialogue: 0,0:13:21.60,0:13:24.97,Default,,0000,0000,0000,,That is the problem. That is the problem of centralization, of having one structure. Dialogue: 0,0:13:24.97,0:13:27.38,Default,,0000,0000,0000,,As soon as we put all that information in one place Dialogue: 0,0:13:27.38,0:13:32.02,Default,,0000,0000,0000,,we get complete profiles of us, you get complete pictures of you. Dialogue: 0,0:13:32.02,0:13:33.49,Default,,0000,0000,0000,,And that is a lot of information. Dialogue: 0,0:13:33.49,0:13:34.56,Default,,0000,0000,0000,,It's valuable information. Dialogue: 0,0:13:34.56,0:13:39.46,Default,,0000,0000,0000,,It's information that is used, right now, mostly to sell you things. Dialogue: 0,0:13:39.46,0:13:42.29,Default,,0000,0000,0000,,And that, you might find objectionable. Dialogue: 0,0:13:42.29,0:13:43.17,Default,,0000,0000,0000,,Maybe you don't. Dialogue: 0,0:13:43.17,0:13:46.91,Default,,0000,0000,0000,,Maybe you don't believe the studies that say you can't ignore advertising. Dialogue: 0,0:13:46.91,0:13:51.67,Default,,0000,0000,0000,,Maybe you think that you are smart and special, and advertising doesn't affect you. Dialogue: 0,0:13:51.67,0:13:53.46,Default,,0000,0000,0000,,You're wrong. Dialogue: 0,0:13:53.46,0:13:56.27,Default,,0000,0000,0000,,But maybe you believe that. Dialogue: 0,0:13:56.27,0:14:02.02,Default,,0000,0000,0000,,But that information, that same infrastructure, that same technology that allows them Dialogue: 0,0:14:02.02,0:14:05.97,Default,,0000,0000,0000,,to know you well enough to sell you soap Dialogue: 0,0:14:05.97,0:14:12.22,Default,,0000,0000,0000,,allows them to know you well enough to decide how much of a credit risk you are, Dialogue: 0,0:14:12.22,0:14:14.15,Default,,0000,0000,0000,,how much of a health risk you are, Dialogue: 0,0:14:14.15,0:14:16.96,Default,,0000,0000,0000,,and what your insurance premiums should look like. Dialogue: 0,0:14:16.96,0:14:18.91,Default,,0000,0000,0000,,In America we have a big problem right now. Dialogue: 0,0:14:18.91,0:14:23.22,Default,,0000,0000,0000,,Insurance costs are out of control. Health insurance. We're having a lot of difficulty paying for it. Dialogue: 0,0:14:23.22,0:14:28.73,Default,,0000,0000,0000,,Insurance companies would like to respond to this problem Dialogue: 0,0:14:28.73,0:14:31.75,Default,,0000,0000,0000,,by knowing better who's a good risk and who's a bad risk Dialogue: 0,0:14:31.75,0:14:35.62,Default,,0000,0000,0000,,so they can lower prices for the good risk and raise prices for the bad risk. Dialogue: 0,0:14:35.62,0:14:41.29,Default,,0000,0000,0000,,Essentially they want to make people who are going to get sick, uninsurable. Dialogue: 0,0:14:41.29,0:14:45.33,Default,,0000,0000,0000,,And if you could know enough about a person to know what their risk factors are based on Dialogue: 0,0:14:45.33,0:14:49.35,Default,,0000,0000,0000,,what they're digital life is, if you can get just a little bit of information about them, Dialogue: 0,0:14:49.35,0:14:53.36,Default,,0000,0000,0000,,maybe you can figure out who their parents are and what hereditary diseases they might be subject to, Dialogue: 0,0:14:53.36,0:14:55.87,Default,,0000,0000,0000,,you can start to understand these things. Dialogue: 0,0:14:55.87,0:14:58.84,Default,,0000,0000,0000,,You can start to figure out who's a good risk and who's a bad risk. Dialogue: 0,0:14:58.84,0:15:04.49,Default,,0000,0000,0000,,You can use this information for ends that seem reasonable if you're a health insurance Dialogue: 0,0:15:04.49,0:15:07.04,Default,,0000,0000,0000,,company, but probably don't seem reasonable if you're Dialogue: 0,0:15:07.04,0:15:10.32,Default,,0000,0000,0000,,the kind of person sitting in this room, the kind of person that I talk to. Dialogue: 0,0:15:10.32,0:15:17.47,Default,,0000,0000,0000,,And that's the problem. The innocuous use. The use that seems kind of icky, but not truly evil, Dialogue: 0,0:15:17.47,0:15:19.70,Default,,0000,0000,0000,,which is advertising. Dialogue: 0,0:15:19.70,0:15:25.25,Default,,0000,0000,0000,,It's the same mechanism, the same data, that then gets used for other purposes. Dialogue: 0,0:15:25.25,0:15:32.84,Default,,0000,0000,0000,,It's the same data that then gets turned over to a government who wants to oppress you Dialogue: 0,0:15:32.84,0:15:36.58,Default,,0000,0000,0000,,because you are supporting wikileaks. Dialogue: 0,0:15:36.58,0:15:39.83,Default,,0000,0000,0000,,And that's not a fantasy, that's what happened. Dialogue: 0,0:15:39.83,0:15:49.32,Default,,0000,0000,0000,,It's the same information that anybody who wants to know something about you for an evil end would use. Dialogue: 0,0:15:49.32,0:15:56.62,Default,,0000,0000,0000,,We have a saying in the world of information, that if the data exists, you can't decide what it gets Dialogue: 0,0:15:56.62,0:15:58.15,Default,,0000,0000,0000,,used for. Dialogue: 0,0:15:58.15,0:16:03.05,Default,,0000,0000,0000,,Once data exists, especially data in the hands of the government, of officials, Dialogue: 0,0:16:03.05,0:16:05.81,Default,,0000,0000,0000,,once that data exists, it's a resource. Dialogue: 0,0:16:05.81,0:16:10.15,Default,,0000,0000,0000,,And the use of that resource it its own energy, its own logic. Dialogue: 0,0:16:10.15,0:16:15.40,Default,,0000,0000,0000,,Once a resource is there begging to be used, it's very hard to stop it from being used. Dialogue: 0,0:16:15.40,0:16:22.64,Default,,0000,0000,0000,,Because it's so attractive, it's so efficient, it would solve so many problems to use the data. Dialogue: 0,0:16:22.64,0:16:28.59,Default,,0000,0000,0000,,And so once you collect the data, once the data exists in one centralized place, Dialogue: 0,0:16:28.59,0:16:35.44,Default,,0000,0000,0000,,for anybody to come and get it with a warrant, or maybe no warrant, or maybe some money... Dialogue: 0,0:16:35.44,0:16:41.06,Default,,0000,0000,0000,,somebody is going to come with a warrant, or no warrant, and they are going to get that data. Dialogue: 0,0:16:41.06,0:16:42.85,Default,,0000,0000,0000,,And they will use it for whatever they want to use it. Dialogue: 0,0:16:42.85,0:16:47.19,Default,,0000,0000,0000,,Once it's out of the hands of the first person who collected it, who maybe you trust, Dialogue: 0,0:16:47.19,0:16:52.69,Default,,0000,0000,0000,,who maybe has good privacy policies, who maybe has no intention to do anything with your data Dialogue: 0,0:16:52.69,0:16:58.61,Default,,0000,0000,0000,,other than use it for diagnostic purposes, once it's out of that person's hands it's gone. Dialogue: 0,0:16:58.61,0:17:00.98,Default,,0000,0000,0000,,You never know where it goes after that. Dialogue: 0,0:17:00.98,0:17:02.91,Default,,0000,0000,0000,,It is completely uncontrolled and unchecked Dialogue: 0,0:17:02.91,0:17:05.90,Default,,0000,0000,0000,,and there is no ability to restrain what happens to that data. Dialogue: 0,0:17:05.90,0:17:14.38,Default,,0000,0000,0000,,So all of this is my attempt to convince you that privacy is a real value in our society, Dialogue: 0,0:17:14.38,0:17:18.10,Default,,0000,0000,0000,,and that the danger of losing privacy is a real problem. Dialogue: 0,0:17:18.10,0:17:20.79,Default,,0000,0000,0000,,It's not just the censorship, it's not just the filtering, Dialogue: 0,0:17:20.79,0:17:26.92,Default,,0000,0000,0000,,it's not just the propaganda, the influencing of opinion, that's one aspect of it, Dialogue: 0,0:17:26.92,0:17:35.42,Default,,0000,0000,0000,,it's not just the free speech. It's also the privacy, because privacy goes to the heart of our autonomy. Dialogue: 0,0:17:35.42,0:17:43.45,Default,,0000,0000,0000,,About a year and a half ago to two years ago at the Software Freedom Law Center Dialogue: 0,0:17:43.45,0:17:47.61,Default,,0000,0000,0000,,a man named Ian Sullivan who's a co-worker of mine, Dialogue: 0,0:17:47.61,0:17:49.70,Default,,0000,0000,0000,,he bought a bunch of plug servers, Dialogue: 0,0:17:49.70,0:17:54.48,Default,,0000,0000,0000,,because he was really excited at the thought of using them as print servers, and media servers, Dialogue: 0,0:17:54.48,0:17:59.24,Default,,0000,0000,0000,,and he started tinkering with them in our office. Dialogue: 0,0:17:59.24,0:18:02.93,Default,,0000,0000,0000,,My boss Eben Moglen who is a long-time activist in the Free Software movement, Dialogue: 0,0:18:02.93,0:18:15.03,Default,,0000,0000,0000,,fought very hard for Phil Zimmerman and PGP when that was a big issue, Dialogue: 0,0:18:15.03,0:18:23.55,Default,,0000,0000,0000,,he looked at this technology and he immediately realised that several streams had come together in one Dialogue: 0,0:18:23.55,0:18:24.60,Default,,0000,0000,0000,,place. Dialogue: 0,0:18:24.60,0:18:27.99,Default,,0000,0000,0000,,There's a lot of really good technology to protect your privacy right now. Dialogue: 0,0:18:27.99,0:18:31.14,Default,,0000,0000,0000,,In fact that's the stuff we're putting on the Freedom Box. Dialogue: 0,0:18:31.14,0:18:33.10,Default,,0000,0000,0000,,We're not writing new software. Dialogue: 0,0:18:33.10,0:18:36.74,Default,,0000,0000,0000,,We are gathering stuff, and putting it in one place. Dialogue: 0,0:18:36.74,0:18:40.92,Default,,0000,0000,0000,,Stuff that other people did because there are people who are better at writing software, and security, Dialogue: 0,0:18:40.92,0:18:43.26,Default,,0000,0000,0000,,than we are. We're software integrators. Dialogue: 0,0:18:43.26,0:18:46.68,Default,,0000,0000,0000,,And he realised there was all this software out there, and suddenly there was a box to put it on. Dialogue: 0,0:18:46.68,0:18:53.11,Default,,0000,0000,0000,,You could put all that software in one place, make it easy, and give it to people in one neat package. Dialogue: 0,0:18:53.11,0:18:56.71,Default,,0000,0000,0000,,Pre-installed, pre-configured, or as close to it as we can get. Dialogue: 0,0:18:56.71,0:19:02.65,Default,,0000,0000,0000,,And that, was the vision for the FreedomBox. Dialogue: 0,0:19:02.65,0:19:08.18,Default,,0000,0000,0000,,The FreedomBox is a tiny computer. Look at this. Dialogue: 0,0:19:08.18,0:19:10.87,Default,,0000,0000,0000,,That's small, it's unobtrusive. Dialogue: 0,0:19:10.87,0:19:11.78,Default,,0000,0000,0000,,So it's a small computer. Dialogue: 0,0:19:11.78,0:19:16.24,Default,,0000,0000,0000,,And we don't just mean small in size... it doesn't take a lot of energy. Dialogue: 0,0:19:16.24,0:19:22.67,Default,,0000,0000,0000,,I could be running this box on a couple of AA batteries for the life of this presentation. Dialogue: 0,0:19:22.67,0:19:24.62,Default,,0000,0000,0000,,You could run it on a solar panel. Dialogue: 0,0:19:24.62,0:19:27.78,Default,,0000,0000,0000,,It's very lightweight infrastructure. Dialogue: 0,0:19:27.78,0:19:33.30,Default,,0000,0000,0000,,You plug it into your home network, and when I say home network, Dialogue: 0,0:19:33.30,0:19:35.09,Default,,0000,0000,0000,,(I'm going to pass this around) Dialogue: 0,0:19:35.09,0:19:38.34,Default,,0000,0000,0000,,When I say home network, I mean home network. Dialogue: 0,0:19:38.34,0:19:42.82,Default,,0000,0000,0000,,This is technology we are designing for individuals to use to talk to their friends. Dialogue: 0,0:19:42.82,0:19:47.91,Default,,0000,0000,0000,,Our use-case, the thing we're trying to protect is you guys, as individuals in your communities. Dialogue: 0,0:19:47.91,0:19:51.93,Default,,0000,0000,0000,,This isn't a small-business appliance, it's not a large corporate applicance, this is a thing Dialogue: 0,0:19:51.93,0:19:58.94,Default,,0000,0000,0000,,that we are truly aiming at the home market, and people who care about privacy on an individual level. Dialogue: 0,0:19:58.94,0:20:05.98,Default,,0000,0000,0000,,You plug it into your home network to protect your privacy, your freedom, your anonymity and your security. Dialogue: 0,0:20:05.98,0:20:09.69,Default,,0000,0000,0000,,That is our mission statement, I guess. Unofficially. Dialogue: 0,0:20:09.69,0:20:17.00,Default,,0000,0000,0000,,That is what we believe we are trying to do with this device. Dialogue: 0,0:20:17.00,0:20:22.09,Default,,0000,0000,0000,,So, what privacy means in this context, the way we're going to go about trying to protect your privacy Dialogue: 0,0:20:22.09,0:20:27.62,Default,,0000,0000,0000,,is to connect you directly with other people and take everything you do and try to encrypt it Dialogue: 0,0:20:27.62,0:20:31.33,Default,,0000,0000,0000,,so that only you and the person you are talking to can see it. This is not a new idea. Dialogue: 0,0:20:31.33,0:20:35.70,Default,,0000,0000,0000,,We can do encrypted messaging, and we can do encrypted browsing. Dialogue: 0,0:20:35.70,0:20:43.99,Default,,0000,0000,0000,,Now there are problems with encrypted browsing. Right now if you want to have secure browsing you generally Dialogue: 0,0:20:43.99,0:20:45.89,Default,,0000,0000,0000,,use something called SSL. Dialogue: 0,0:20:45.89,0:20:57.52,Default,,0000,0000,0000,,SSL is a system of certificates that allow a web server to say to you "we can talk privately". Dialogue: 0,0:20:57.52,0:21:01.98,Default,,0000,0000,0000,,That's the first guarantee, a secure cryptographic connection (A). Dialogue: 0,0:21:01.98,0:21:05.67,Default,,0000,0000,0000,,and (B) I can authenticate to you that I am who I say I am. Dialogue: 0,0:21:05.67,0:21:11.36,Default,,0000,0000,0000,,So not only can nobody listen, but you know who you're talking to. Dialogue: 0,0:21:11.36,0:21:18.33,Default,,0000,0000,0000,,You're not secretly talking to the government, when really you're talking to me. Dialogue: 0,0:21:18.33,0:21:23.88,Default,,0000,0000,0000,,The problem with SSL, the big problem with SSL, is that the system for signing certificates relies Dialogue: 0,0:21:23.88,0:21:28.27,Default,,0000,0000,0000,,on a trust hierachy that goes back to a cartel of companies who have the server certificates, Dialogue: 0,0:21:28.27,0:21:35.58,Default,,0000,0000,0000,,who have the ability to do this "guarantee". So when the website says to you "I guarantee I am who I Dialogue: 0,0:21:35.58,0:21:42.64,Default,,0000,0000,0000,,am", you say "I don't know you, I don't trust you". And they say "Oh, but this other company, I paid Dialogue: 0,0:21:42.64,0:21:47.10,Default,,0000,0000,0000,,them money, and so they'll guarantee that I am me." Dialogue: 0,0:21:47.10,0:21:52.62,Default,,0000,0000,0000,,Which is a really interesting idea - because I also don't know this company, why would I trust that company? Dialogue: 0,0:21:52.62,0:21:57.06,Default,,0000,0000,0000,,I mean, the company is just old enough and influential enough that they could actually get their Dialogue: 0,0:21:57.06,0:22:03.63,Default,,0000,0000,0000,,authority into my browser. So really my browser is willing to accept at face-value that this website Dialogue: 0,0:22:03.63,0:22:07.34,Default,,0000,0000,0000,,is who it says it is, but I don't necessarily accept that. Dialogue: 0,0:22:07.34,0:22:13.15,Default,,0000,0000,0000,,And then, we have the problem of self-signed certificate. Where if they say, none of those authorities Dialogue: 0,0:22:13.15,0:22:17.77,Default,,0000,0000,0000,,in your browser trust me, I trust myself and look, I've signed a piece of paper - Dialogue: 0,0:22:17.77,0:22:20.58,Default,,0000,0000,0000,,I swear I am who I say I am. Dialogue: 0,0:22:20.58,0:22:24.02,Default,,0000,0000,0000,,And that, is not trustworthy at all, right? Dialogue: 0,0:22:24.02,0:22:27.90,Default,,0000,0000,0000,,That's just him saying again "No, really! I'm me!". Dialogue: 0,0:22:27.90,0:22:33.58,Default,,0000,0000,0000,,So this is a problem, because the FreedomBoxes are not going to trust the SSL cartel, Dialogue: 0,0:22:33.58,0:22:36.70,Default,,0000,0000,0000,,and they are not going to trust each other, so they can't just sort of swear to each other that Dialogue: 0,0:22:36.70,0:22:39.53,Default,,0000,0000,0000,,they are who they are. Dialogue: 0,0:22:39.53,0:22:45.12,Default,,0000,0000,0000,,So we think we've solved this. I'm not going to say we've solved it, because we're just starting to tell Dialogue: 0,0:22:45.12,0:22:52.14,Default,,0000,0000,0000,,people about this idea, and I'm sure people will have reasons why the idea can be improved. Dialogue: 0,0:22:52.14,0:22:58.41,Default,,0000,0000,0000,,But there is a technology called MonkeySphere, that allows you to take an SSH key and wrap it around a Dialogue: 0,0:22:58.41,0:23:03.33,Default,,0000,0000,0000,,PGP key, and use a PGP key to authenticate SSH connections. Dialogue: 0,0:23:03.33,0:23:10.34,Default,,0000,0000,0000,,It's really neat technology that allows you to replace SSH trust with PGP trust. Dialogue: 0,0:23:10.34,0:23:14.50,Default,,0000,0000,0000,,And we looked at that, and we thought, why can't we do that with SSL? Dialogue: 0,0:23:14.50,0:23:21.37,Default,,0000,0000,0000,,So one thing we're going do with browsing is take an SSL certificate, an X.509 certificate, Dialogue: 0,0:23:21.37,0:23:25.25,Default,,0000,0000,0000,,and wrap it around a PGP key and send it through the normal SSL layer mechanisms Dialogue: 0,0:23:25.25,0:23:32.28,Default,,0000,0000,0000,,but when it gets to the other end, smart servers and smart browsers will open it up and use PGP mechanisms Dialogue: 0,0:23:32.28,0:23:39.58,Default,,0000,0000,0000,,to figure out how to trust people, to verify the connections, to sign the authentication of the identity Dialogue: 0,0:23:39.58,0:23:42.69,Default,,0000,0000,0000,,of the browser, of the server. Dialogue: 0,0:23:42.69,0:23:48.49,Default,,0000,0000,0000,,This allows us to replace the SSL cartel with the web of trust, the keyservers. Dialogue: 0,0:23:48.49,0:23:57.29,Default,,0000,0000,0000,,We're replacing a tiny group of companies that control everything with keyservers, community infrastructure. Dialogue: 0,0:23:57.29,0:24:01.17,Default,,0000,0000,0000,,Anyone can set up a keyserver, and you can decide which one you want to trust. Dialogue: 0,0:24:01.17,0:24:02.77,Default,,0000,0000,0000,,They share information. Dialogue: 0,0:24:02.77,0:24:06.23,Default,,0000,0000,0000,,The web of trust is built on people, telling each other that they trust each other. Dialogue: 0,0:24:06.23,0:24:09.95,Default,,0000,0000,0000,,Again, you can decide who to trust and how much you want to trust them. Dialogue: 0,0:24:09.95,0:24:16.19,Default,,0000,0000,0000,,This is emblematic of our approach. We've identified structures that are unreliable because Dialogue: 0,0:24:16.19,0:24:20.37,Default,,0000,0000,0000,,they are centralized, because they are controlled by interests that are not the same interests Dialogue: 0,0:24:20.37,0:24:22.62,Default,,0000,0000,0000,,as our interests. Dialogue: 0,0:24:22.62,0:24:29.78,Default,,0000,0000,0000,,And we've decided to replace them wherever we can with structures that rely on people, Dialogue: 0,0:24:29.78,0:24:37.53,Default,,0000,0000,0000,,that rely on human relationships, that rely less on the notion that you can buy trust, and more on the Dialogue: 0,0:24:37.53,0:24:42.29,Default,,0000,0000,0000,,notion that you earn trust, by being trustworthy, by having people vouch for you over time. Dialogue: 0,0:24:42.29,0:24:50.30,Default,,0000,0000,0000,,So that's our approach to encrypted browsing. It's also our approach to encrypted messaging. Dialogue: 0,0:24:50.30,0:24:58.22,Default,,0000,0000,0000,,We're doing Jabber for a lot of message passing, XMPP, and we're securing that again with PGP. Dialogue: 0,0:24:58.22,0:25:02.08,Default,,0000,0000,0000,,Everywhere we can we're going to try to use the PGP network, because it already exists... Dialogue: 0,0:25:02.08,0:25:04.35,Default,,0000,0000,0000,,as I said, we're not trying to invent anything new. Dialogue: 0,0:25:04.35,0:25:10.62,Default,,0000,0000,0000,,PGP already exists and it does a really good job. So we're taking the PGP trust system and we're Dialogue: 0,0:25:10.62,0:25:16.61,Default,,0000,0000,0000,,going to apply it to things like XMPP and make sure that we can do message passing in a way Dialogue: 0,0:25:16.61,0:25:18.54,Default,,0000,0000,0000,,that we can trust. Dialogue: 0,0:25:18.54,0:25:26.02,Default,,0000,0000,0000,,Once we have XMPP we have a way to send text, a way to send audio, sure... Dialogue: 0,0:25:26.02,0:25:28.71,Default,,0000,0000,0000,,but also you can send structured data. Dialogue: 0,0:25:28.71,0:25:33.14,Default,,0000,0000,0000,,Through that same channel. And you can send that data to buddy lists. Dialogue: 0,0:25:33.14,0:25:39.34,Default,,0000,0000,0000,,So the system starts to look like a way to pass data in a social way. And we think this is the Dialogue: 0,0:25:39.34,0:25:42.43,Default,,0000,0000,0000,,beginning of the social layer of the box. Dialogue: 0,0:25:42.43,0:25:46.89,Default,,0000,0000,0000,,At the bottom of the box we have a belief that the technology should be social Dialogue: 0,0:25:46.89,0:25:48.38,Default,,0000,0000,0000,,from the ground up. Dialogue: 0,0:25:48.38,0:25:50.63,Default,,0000,0000,0000,,And so we're building structures that allow it to be social, Dialogue: 0,0:25:50.63,0:25:55.50,Default,,0000,0000,0000,,that assume you want to connect with friends in a network of freedom, Dialogue: 0,0:25:55.50,0:26:01.31,Default,,0000,0000,0000,,perhaps FreedomBoxes, perhaps other kinds of software, other kinds of technology. Dialogue: 0,0:26:01.31,0:26:04.26,Default,,0000,0000,0000,,And we're designing with that in mind. Dialogue: 0,0:26:04.26,0:26:08.74,Default,,0000,0000,0000,,With that in mind, we think we get certain benefits technologically which I'll get into later. Dialogue: 0,0:26:08.74,0:26:13.38,Default,,0000,0000,0000,,We think we can simply things like key management, through methods like this. Dialogue: 0,0:26:13.38,0:26:19.19,Default,,0000,0000,0000,,By privacy I also mean that we can install a proxy server, privoxy, Dialogue: 0,0:26:19.19,0:26:21.21,Default,,0000,0000,0000,,we think the answer is privoxy here, Dialogue: 0,0:26:21.21,0:26:26.85,Default,,0000,0000,0000,,privoxy on the box, so you can point your browser at the box, surf the web on the box, Dialogue: 0,0:26:26.85,0:26:33.63,Default,,0000,0000,0000,,and strip ads, strip cookies, stop Google from tracking you from website to website to website, Dialogue: 0,0:26:33.63,0:26:43.34,Default,,0000,0000,0000,,to remove, the constant person sitting at your side, spying, recording, listening to everything you do. Dialogue: 0,0:26:43.34,0:26:46.91,Default,,0000,0000,0000,,In that vein, we don't just want to block ads and reject cookies, Dialogue: 0,0:26:46.91,0:26:50.33,Default,,0000,0000,0000,,we want to do something new, relatively new. Dialogue: 0,0:26:50.33,0:27:02.75,Default,,0000,0000,0000,,We think we want to munge your browser fingerprint, that unique pattern of data that is captured by your Dialogue: 0,0:27:02.75,0:27:03.63,Default,,0000,0000,0000,,user-agent string and what plugins you have, and all that stuff Dialogue: 0,0:27:03.63,0:27:07.81,Default,,0000,0000,0000,,that forms a unique profile of you that allows people to track your browser, companies to track your Dialogue: 0,0:27:07.81,0:27:09.88,Default,,0000,0000,0000,,browser as you hop along the web, even if they don't know anything about you. Dialogue: 0,0:27:09.88,0:27:13.34,Default,,0000,0000,0000,,It can sort of tie you to the browser, make profiles about your browser. Dialogue: 0,0:27:13.34,0:27:16.47,Default,,0000,0000,0000,,And that turns out to be a very effective way of figuring out who you are. Dialogue: 0,0:27:16.47,0:27:23.58,Default,,0000,0000,0000,,So even without a cookie, even without serving you with an ad, once they're talking to you they can Dialogue: 0,0:27:23.58,0:27:26.39,Default,,0000,0000,0000,,uniquely identify you, or relatively uniquely. Dialogue: 0,0:27:26.39,0:27:32.75,Default,,0000,0000,0000,,But it's relatively early in the browser fingerprint arms race. Dialogue: 0,0:27:32.75,0:27:37.65,Default,,0000,0000,0000,,We think that with a very little bit of changing, we can foil the recording. Dialogue: 0,0:27:37.65,0:27:40.50,Default,,0000,0000,0000,,and win this round at least. Dialogue: 0,0:27:40.50,0:27:46.94,Default,,0000,0000,0000,,And instead of having one profile where they gather all of your data, you will present to services Dialogue: 0,0:27:46.94,0:27:51.28,Default,,0000,0000,0000,,as a different person every time you use the service. So they cannot build profiles of you over time. Dialogue: 0,0:27:51.58,0:27:53.16,Default,,0000,0000,0000,,That's what privacy looks like in our context. We're looking for cheap ways to foil the tracking. Dialogue: 0,0:27:55.06,0:28:02.05,Default,,0000,0000,0000,,We're looking for easy things we can do, because we believe there's a lot of low-hanging fruit. Dialogue: 0,0:28:02.05,0:28:05.93,Default,,0000,0000,0000,,And we'll talk about that more in a minute. Dialogue: 0,0:28:05.93,0:28:09.83,Default,,0000,0000,0000,,Freedom is our value, freedom is the thing we are aiming for, Dialogue: 0,0:28:09.83,0:28:13.43,Default,,0000,0000,0000,,freedom from centralized structures like the pipes. Dialogue: 0,0:28:13.43,0:28:19.21,Default,,0000,0000,0000,,Now mesh networking, I have mesh networking in my slides. That is a lie. Dialogue: 0,0:28:19.21,0:28:21.46,Default,,0000,0000,0000,,We are not doing mesh networking. Dialogue: 0,0:28:21.46,0:28:26.99,Default,,0000,0000,0000,,The reason we are not doing mesh networking is because I do not know {\i1}anything{\i0} about mesh networking Dialogue: 0,0:28:26.99,0:28:31.70,Default,,0000,0000,0000,,and one of the reaons I came here was to meet people who know a lot about mesh networking Dialogue: 0,0:28:31.70,0:28:34.49,Default,,0000,0000,0000,,and I see people in this audience who know a lot about mesh networking. Dialogue: 0,0:28:34.49,0:28:41.30,Default,,0000,0000,0000,,If you want to turn that lie into the truth, the way you do that Dialogue: 0,0:28:41.30,0:28:43.55,Default,,0000,0000,0000,,is by continuing on your projects, making mesh networking awesome, Dialogue: 0,0:28:43.55,0:28:46.20,Default,,0000,0000,0000,,to the point where I can say yes, we're going to put that in this box. Dialogue: 0,0:28:46.20,0:28:49.19,Default,,0000,0000,0000,,Then eventually, by the time this box is ready to do real Dialogue: 0,0:28:49.19,0:28:52.77,Default,,0000,0000,0000,,things for real people, we're really hoping that the mesh story Dialogue: 0,0:28:52.77,0:28:56.50,Default,,0000,0000,0000,,coheres, where we've identified the protocol and the technology and the people who are going to help Dialogue: 0,0:28:56.50,0:29:00.24,Default,,0000,0000,0000,,us. If you think you might be one of those people, we want to talk to you. Dialogue: 0,0:29:00.24,0:29:02.77,Default,,0000,0000,0000,,So yes, we are going to do mesh networking, Dialogue: 0,0:29:02.77,0:29:05.75,Default,,0000,0000,0000,,and that might be a lie Dialogue: 0,0:29:05.75,0:29:08.28,Default,,0000,0000,0000,,but I hope not. Dialogue: 0,0:29:08.28,0:29:10.67,Default,,0000,0000,0000,,We want you to have the freedom to own your data Dialogue: 0,0:29:10.67,0:29:16.78,Default,,0000,0000,0000,,that means data portability, that means that your data sits on your box and never goes to a third party. Dialogue: 0,0:29:16.78,0:29:18.59,Default,,0000,0000,0000,,It only goes to the people you want it to go to. Dialogue: 0,0:29:18.59,0:29:23.62,Default,,0000,0000,0000,,Fine-grained access control. Your data, your structures, you decide where it goes. Dialogue: 0,0:29:23.62,0:29:25.39,Default,,0000,0000,0000,,That's a user-interface problem, Dialogue: 0,0:29:25.39,0:29:27.16,Default,,0000,0000,0000,,that's a user permission problem, Dialogue: 0,0:29:27.16,0:29:29.10,Default,,0000,0000,0000,,an access control problem. Dialogue: 0,0:29:29.10,0:29:33.26,Default,,0000,0000,0000,,Access control is a solved problem. Dialogue: 0,0:29:33.26,0:29:37.88,Default,,0000,0000,0000,,Doing it through a convenient user-interface, that's not solved... so that's work to be done. Dialogue: 0,0:29:37.88,0:29:42.04,Default,,0000,0000,0000,,That's a big chunk of our todo list. Dialogue: 0,0:29:42.04,0:29:43.71,Default,,0000,0000,0000,,We want you to own your social network Dialogue: 0,0:29:43.71,0:29:50.12,Default,,0000,0000,0000,,Before Facebook there was a thing called MySpace, which was... I'm not even sure it exists anymore. Dialogue: 0,0:29:50.12,0:29:54.14,Default,,0000,0000,0000,,Before MySpace there was Tribe. Dialogue: 0,0:29:54.14,0:29:56.55,Default,,0000,0000,0000,,Before Tribe there was Friendster. Dialogue: 0,0:29:56.55,0:29:59.82,Default,,0000,0000,0000,,Friendster is now like a... "gaming network". Dialogue: 0,0:29:59.82,0:30:02.82,Default,,0000,0000,0000,,I don't know what it is but they still send me email Dialogue: 0,0:30:02.82,0:30:06.23,Default,,0000,0000,0000,,Which is the only reason I know they're still alive. Dialogue: 0,0:30:06.23,0:30:11.02,Default,,0000,0000,0000,,Before Friendster was the original social network. Dialogue: 0,0:30:11.02,0:30:15.52,Default,,0000,0000,0000,,We called this social network "the internet". Dialogue: 0,0:30:15.52,0:30:17.01,Default,,0000,0000,0000,,We talked directly to each other, Dialogue: 0,0:30:17.01,0:30:21.42,Default,,0000,0000,0000,,we used email, an instant messenger and IRC. Dialogue: 0,0:30:21.42,0:30:23.95,Default,,0000,0000,0000,,We talked to people using the structures that were out there. Dialogue: 0,0:30:23.95,0:30:27.83,Default,,0000,0000,0000,,It wasn't centralized in one service, we had a lot of ways of meeting each other Dialogue: 0,0:30:27.83,0:30:29.15,Default,,0000,0000,0000,,and passing messages. Dialogue: 0,0:30:29.15,0:30:31.71,Default,,0000,0000,0000,,What we lacked was a centralized interface. Dialogue: 0,0:30:31.71,0:30:35.58,Default,,0000,0000,0000,,So when we say "own your social network" we mean use the services of the internet, Dialogue: 0,0:30:35.58,0:30:37.65,Default,,0000,0000,0000,,own the pieces that talk to each other. Dialogue: 0,0:30:37.65,0:30:41.11,Default,,0000,0000,0000,,Hopefully we'll provide you with a convenient interface to do that. Dialogue: 0,0:30:41.11,0:30:44.11,Default,,0000,0000,0000,,But the actual structures, the places where your data live, Dialogue: 0,0:30:44.11,0:30:48.40,Default,,0000,0000,0000,,that is just the same pieces that we know how to use already. Dialogue: 0,0:30:48.40,0:30:51.23,Default,,0000,0000,0000,,We are not going to try to reinvent how you talk to people, Dialogue: 0,0:30:51.23,0:30:56.46,Default,,0000,0000,0000,,we're just going to make it so that the pipes are secure. Dialogue: 0,0:30:56.46,0:30:59.45,Default,,0000,0000,0000,,A big part of freedom, a big part of privacy, Dialogue: 0,0:30:59.45,0:31:02.43,Default,,0000,0000,0000,,is anonymity. Dialogue: 0,0:31:02.43,0:31:06.44,Default,,0000,0000,0000,,Tor can provide anonymity. Dialogue: 0,0:31:06.44,0:31:08.81,Default,,0000,0000,0000,,But we don't have to go all the way to Tor. Dialogue: 0,0:31:08.81,0:31:12.25,Default,,0000,0000,0000,,Tor is expensive, in terms of latency. Dialogue: 0,0:31:12.25,0:31:16.82,Default,,0000,0000,0000,,Tor is difficult to manage... Dialogue: 0,0:31:16.82,0:31:21.40,Default,,0000,0000,0000,,I don't know how many people have tried to use Tor, to run all their traffic through Tor. Dialogue: 0,0:31:21.40,0:31:23.65,Default,,0000,0000,0000,,It's hard. For two reasons. Dialogue: 0,0:31:23.65,0:31:26.58,Default,,0000,0000,0000,,For one, the latency... it takes a very long time to load a web page. Dialogue: 0,0:31:26.58,0:31:32.38,Default,,0000,0000,0000,,And two, you look like a criminal. To every website that you go to. Dialogue: 0,0:31:32.38,0:31:38.65,Default,,0000,0000,0000,,My bank shut down my account when I used Tor. Dialogue: 0,0:31:38.65,0:31:44.94,Default,,0000,0000,0000,,Because suddenly, I was coming from an IP address in Germany that they had detected in the past Dialogue: 0,0:31:44.94,0:31:48.52,Default,,0000,0000,0000,,efforts to hack them on. Dialogue: 0,0:31:48.52,0:31:52.26,Default,,0000,0000,0000,,So they closed my account, well I had to talk to them about it, Dialogue: 0,0:31:52.26,0:31:53.90,Default,,0000,0000,0000,,it did all get solved in the end. Dialogue: 0,0:31:53.90,0:31:57.78,Default,,0000,0000,0000,,PayPal as well closed my account down. Dialogue: 0,0:31:57.78,0:31:59.41,Default,,0000,0000,0000,,So that was the end of my ability to use Tor. Dialogue: 0,0:31:59.41,0:32:01.06,Default,,0000,0000,0000,,So we can't just run all our traffic through Tor. Dialogue: 0,0:32:01.06,0:32:07.12,Default,,0000,0000,0000,,It's too slow, and the network has weird properties in terms of how you present to websites, Dialogue: 0,0:32:07.12,0:32:08.95,Default,,0000,0000,0000,,that frankly, are scary. Dialogue: 0,0:32:08.95,0:32:16.92,Default,,0000,0000,0000,,Because if I look like a criminal to the bank, I don't want to imagine what I look like to my own government. Dialogue: 0,0:32:16.92,0:32:19.01,Default,,0000,0000,0000,,But we can do privacy in other ways. Dialogue: 0,0:32:19.01,0:32:25.25,Default,,0000,0000,0000,,If you are a web user, in China, and you want to surf the internet, Dialogue: 0,0:32:25.25,0:32:30.94,Default,,0000,0000,0000,,with full access to every website you might go to, and with privacy from your government, Dialogue: 0,0:32:30.94,0:32:34.98,Default,,0000,0000,0000,,so that you don't get a knock on your door from visiting those websites, Dialogue: 0,0:32:34.98,0:32:36.77,Default,,0000,0000,0000,,we can do that without Tor. Dialogue: 0,0:32:36.77,0:32:39.02,Default,,0000,0000,0000,,We don't need Tor to do that. We can do that cheaply. Dialogue: 0,0:32:39.02,0:32:45.59,Default,,0000,0000,0000,,Because all you need to do in that situation is get your connection out of China. Dialogue: 0,0:32:45.59,0:32:54.39,Default,,0000,0000,0000,,Send your request for a web page through an encrypted connection to a FreedomBox in... Dialogue: 0,0:32:54.39,0:32:58.41,Default,,0000,0000,0000,,Austria, America, who knows? Dialogue: 0,0:32:58.41,0:33:05.93,Default,,0000,0000,0000,,Just get the request away from the people who physically have the power to control you. Dialogue: 0,0:33:05.93,0:33:08.90,Default,,0000,0000,0000,,And we can do that cheaply, that's just SSH port forwarding. Dialogue: 0,0:33:08.90,0:33:14.13,Default,,0000,0000,0000,,That's just a little bit of tunneling, that's just a little bit of VPN. Dialogue: 0,0:33:14.13,0:33:16.06,Default,,0000,0000,0000,,There's a lot of ways to do that sort of thing, Dialogue: 0,0:33:16.06,0:33:20.84,Default,,0000,0000,0000,,to give you anonymity and privacy in your specific context Dialogue: 0,0:33:20.84,0:33:22.79,Default,,0000,0000,0000,,without going all the way into something like Tor. Dialogue: 0,0:33:22.79,0:33:25.90,Default,,0000,0000,0000,,Now there are people who are going to need Tor. Dialogue: 0,0:33:25.90,0:33:27.97,Default,,0000,0000,0000,,They will need it for their use case. Dialogue: 0,0:33:27.97,0:33:32.89,Default,,0000,0000,0000,,But not every use case requires that level of attack. Dialogue: 0,0:33:32.89,0:33:37.93,Default,,0000,0000,0000,,And so one of the things we're trying to do is figure out how much privacy and anonymity you need, Dialogue: 0,0:33:37.93,0:33:40.21,Default,,0000,0000,0000,,and from whom you need it. Dialogue: 0,0:33:40.21,0:33:43.46,Default,,0000,0000,0000,,If we can do that effectively we can give people solutions Dialogue: 0,0:33:43.46,0:33:45.55,Default,,0000,0000,0000,,that actually work for them. Because if we just tell people Dialogue: 0,0:33:45.55,0:33:49.54,Default,,0000,0000,0000,,to use Tor, we're going to have a problem. Dialogue: 0,0:33:49.54,0:33:52.65,Default,,0000,0000,0000,,They're not going to use it, and they won't get any privacy at all. Dialogue: 0,0:33:52.65,0:33:55.18,Default,,0000,0000,0000,,And that's bad. Dialogue: 0,0:33:55.18,0:33:57.25,Default,,0000,0000,0000,,So we want to allow people to do anonymous publishing, Dialogue: 0,0:33:57.25,0:33:59.71,Default,,0000,0000,0000,,and file-sharing, and web-browsing and email. Dialogue: 0,0:33:59.71,0:34:01.62,Default,,0000,0000,0000,,All the communications you want to do. Dialogue: 0,0:34:01.62,0:34:03.87,Default,,0000,0000,0000,,The technology to do that already exists, Dialogue: 0,0:34:03.87,0:34:05.77,Default,,0000,0000,0000,,we could do all of that with Tor. Dialogue: 0,0:34:05.77,0:34:09.04,Default,,0000,0000,0000,,The next piece of our challenge is to figure out how to do it without Tor. Dialogue: 0,0:34:09.04,0:34:12.02,Default,,0000,0000,0000,,To figure out what pieces we need Tor for, and to figure out Dialogue: 0,0:34:12.02,0:34:17.84,Default,,0000,0000,0000,,what pieces we can do a little bit more cheaply. Dialogue: 0,0:34:17.84,0:34:19.63,Default,,0000,0000,0000,,Security. Dialogue: 0,0:34:19.63,0:34:23.98,Default,,0000,0000,0000,,Without security, you don't have freedom and privacy and anonymity. Dialogue: 0,0:34:23.98,0:34:25.62,Default,,0000,0000,0000,,If the box isn't secure, Dialogue: 0,0:34:25.62,0:34:27.85,Default,,0000,0000,0000,,you lose. Dialogue: 0,0:34:27.85,0:34:32.03,Default,,0000,0000,0000,,We're going to encrypt everything. Dialogue: 0,0:34:32.03,0:34:36.19,Default,,0000,0000,0000,,We're going to do something that's called social key management, which I'm going to talk about. Dialogue: 0,0:34:36.19,0:34:39.14,Default,,0000,0000,0000,,I do want to talk about the Debian-based bit. Dialogue: 0,0:34:39.14,0:34:42.85,Default,,0000,0000,0000,,We are based on a distribution of Linux called Debian, Dialogue: 0,0:34:42.85,0:34:46.29,Default,,0000,0000,0000,,because it is a community-based distribution. Dialogue: 0,0:34:46.29,0:34:48.38,Default,,0000,0000,0000,,It is made by people who care a lot about your Dialogue: 0,0:34:48.38,0:34:51.65,Default,,0000,0000,0000,,freedom, your privacy, and your ability to speak anonymously. Dialogue: 0,0:34:51.65,0:34:55.53,Default,,0000,0000,0000,,And we really believe that the best way to distribute this Dialogue: 0,0:34:55.53,0:34:58.34,Default,,0000,0000,0000,,software is to hand it to the Debian mirror network and let Dialogue: 0,0:34:58.34,0:35:00.13,Default,,0000,0000,0000,,them distribute it. Because they have mechanisms Dialogue: 0,0:35:00.13,0:35:02.22,Default,,0000,0000,0000,,to make sure that nobody changes it. Dialogue: 0,0:35:02.22,0:35:05.21,Default,,0000,0000,0000,,If we were to distribute the software to you directly, we Dialogue: 0,0:35:05.21,0:35:09.09,Default,,0000,0000,0000,,would become a target. People would want to change the Dialogue: 0,0:35:09.09,0:35:11.81,Default,,0000,0000,0000,,software as we distribute it on our website. Dialogue: 0,0:35:11.81,0:35:13.27,Default,,0000,0000,0000,,They would want to crack our website and distribute their Dialogue: 0,0:35:13.27,0:35:15.96,Default,,0000,0000,0000,,version of the package. Dialogue: 0,0:35:15.96,0:35:18.50,Default,,0000,0000,0000,,We don't want to be a target, so we're not going to give you software. Dialogue: 0,0:35:18.50,0:35:21.63,Default,,0000,0000,0000,,We're going to give it to Debian, and let them give you the software. Dialogue: 0,0:35:21.63,0:35:26.41,Default,,0000,0000,0000,,And at the same time you get all of the Debian guarantees about freedom. Dialogue: 0,0:35:26.41,0:35:28.67,Default,,0000,0000,0000,,The Debian Free Software Guidelines. Dialogue: 0,0:35:28.67,0:35:32.10,Default,,0000,0000,0000,,They're not going to give you software unless it comes Dialogue: 0,0:35:32.10,0:35:37.02,Default,,0000,0000,0000,,with all of the social guarantees that are required to participate in the Debian community. Dialogue: 0,0:35:37.02,0:35:39.56,Default,,0000,0000,0000,,So we're very proud to be using Debian in this manner, Dialogue: 0,0:35:39.56,0:35:41.95,Default,,0000,0000,0000,,and working with Debian in this manner. Dialogue: 0,0:35:41.95,0:35:44.78,Default,,0000,0000,0000,,And we think that's the most effective way we can guarantee that we're going to live up to Dialogue: 0,0:35:44.78,0:35:51.75,Default,,0000,0000,0000,,our promises to you, because it provides a mechanism whereby if we fail to live up to our promises, Dialogue: 0,0:35:51.75,0:35:56.34,Default,,0000,0000,0000,,we cannot give you something that is broken. Because Debian won't let us, Dialogue: 0,0:35:56.34,0:35:59.62,Default,,0000,0000,0000,,they just won't distribute it. Dialogue: 0,0:35:59.62,0:36:02.01,Default,,0000,0000,0000,,There are problems with security. Dialogue: 0,0:36:02.01,0:36:04.10,Default,,0000,0000,0000,,There are things we can't solve. Dialogue: 0,0:36:04.10,0:36:05.38,Default,,0000,0000,0000,,One... Dialogue: 0,0:36:05.38,0:36:08.74,Default,,0000,0000,0000,,Physical security of the box. Dialogue: 0,0:36:08.74,0:36:13.64,Default,,0000,0000,0000,,We haven't really talked much internally about whether we can encrypt the filesystem on this box. Dialogue: 0,0:36:13.64,0:36:16.62,Default,,0000,0000,0000,,I don't quite see a way to do it. Dialogue: 0,0:36:16.62,0:36:20.03,Default,,0000,0000,0000,,It doesn't have an interface for you to enter a password effectively. Dialogue: 0,0:36:20.03,0:36:23.30,Default,,0000,0000,0000,,By the time you've brought an interface up you'd be running untrusted code. Dialogue: 0,0:36:23.30,0:36:25.23,Default,,0000,0000,0000,,I don't know a way to do it. Dialogue: 0,0:36:25.23,0:36:29.55,Default,,0000,0000,0000,,If anyone can think of a way that we can effectively encrypt the filesystem, I'd love to hear it. Dialogue: 0,0:36:29.55,0:36:35.03,Default,,0000,0000,0000,,But, on top of that, if we do encrypt the filesystem, Dialogue: 0,0:36:35.03,0:36:38.60,Default,,0000,0000,0000,,then the thing cannot be rebooted remotely, which is a downside. Dialogue: 0,0:36:38.60,0:36:40.69,Default,,0000,0000,0000,,So there are trade-offs at every step of the way. Dialogue: 0,0:36:40.69,0:36:45.01,Default,,0000,0000,0000,,If we can figure out some of these security issues, then we can be ahead of the game. Dialogue: 0,0:36:45.01,0:36:50.26,Default,,0000,0000,0000,,But I think the encrypting the filesystem is the only way to guarantee the box is secure, even if it's Dialogue: 0,0:36:50.26,0:36:52.35,Default,,0000,0000,0000,,not physically secure. Dialogue: 0,0:36:52.35,0:36:53.70,Default,,0000,0000,0000,,So I think that's a big one. Dialogue: 0,0:36:53.70,0:36:58.04,Default,,0000,0000,0000,,If you have ideas about that, please come and talk to me after the talk. Dialogue: 0,0:36:58.04,0:37:01.29,Default,,0000,0000,0000,,I promised I would talk about social key management, and here it is. Dialogue: 0,0:37:01.29,0:37:06.38,Default,,0000,0000,0000,,So we're building the idea of knowing who your friends are Dialogue: 0,0:37:06.38,0:37:08.02,Default,,0000,0000,0000,,into the box at a somewhat low level. Dialogue: 0,0:37:08.02,0:37:12.95,Default,,0000,0000,0000,,To the point where things that are on the box can assume it is there, Dialogue: 0,0:37:12.95,0:37:17.54,Default,,0000,0000,0000,,or ask you if it's there, or rely on it as a matter of course in some cases. Dialogue: 0,0:37:17.54,0:37:21.89,Default,,0000,0000,0000,,So we can do things with keys that make your keys unlosable. Dialogue: 0,0:37:21.89,0:37:25.21,Default,,0000,0000,0000,,Right now a PGP key is a hard thing to manage. Dialogue: 0,0:37:25.21,0:37:26.67,Default,,0000,0000,0000,,Key management is terrible. Dialogue: 0,0:37:26.67,0:37:30.43,Default,,0000,0000,0000,,Do you guys like PGP? PGP is good. Dialogue: 0,0:37:30.43,0:37:34.73,Default,,0000,0000,0000,,Does anyone here like key management? Dialogue: 0,0:37:34.73,0:37:36.21,Default,,0000,0000,0000,,We have one guy who likes key management. Dialogue: 0,0:37:36.21,0:37:39.49,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,0:37:39.49,0:37:41.25,Default,,0000,0000,0000,,He's going to do it for all of you! Dialogue: 0,0:37:41.25,0:37:43.50,Default,,0000,0000,0000,,So, none of us like key management. Dialogue: 0,0:37:43.50,0:37:46.15,Default,,0000,0000,0000,,Key management doesn't work, especially if your use-case is home users, naive end-users. Dialogue: 0,0:37:46.15,0:37:48.10,Default,,0000,0000,0000,,Nobody wants to do key management. Dialogue: 0,0:37:48.10,0:37:51.70,Default,,0000,0000,0000,,Writing their key down and putting it in a safety deposit box is ludicrous. Dialogue: 0,0:37:51.70,0:37:54.37,Default,,0000,0000,0000,,It's a very difficult thing to actually convince people to do. Dialogue: 0,0:37:54.37,0:38:00.32,Default,,0000,0000,0000,,Sticking it on a USB key, putting it in a zip-lock back and burying it in your backyard is paranoid. Dialogue: 0,0:38:00.32,0:38:03.31,Default,,0000,0000,0000,,I can't believe I just told you what I do with my key. Dialogue: 0,0:38:03.31,0:38:04.82,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,0:38:04.82,0:38:06.75,Default,,0000,0000,0000,,No, you can't ask people to do that. Dialogue: 0,0:38:06.75,0:38:08.07,Default,,0000,0000,0000,,They won't do it. Dialogue: 0,0:38:08.07,0:38:09.88,Default,,0000,0000,0000,,You can't protect keys in this manner. Dialogue: 0,0:38:09.88,0:38:13.34,Default,,0000,0000,0000,,You have to have a system that allows them to sort of, not ever know they have a key. Dialogue: 0,0:38:13.34,0:38:16.01,Default,,0000,0000,0000,,To not think about their key unless they really want to. Dialogue: 0,0:38:16.01,0:38:19.01,Default,,0000,0000,0000,,We think we've come up with something that might work. Dialogue: 0,0:38:19.01,0:38:20.77,Default,,0000,0000,0000,,You take the key, Dialogue: 0,0:38:20.77,0:38:22.28,Default,,0000,0000,0000,,or a subkey, Dialogue: 0,0:38:22.28,0:38:24.51,Default,,0000,0000,0000,,you chop it into little bits Dialogue: 0,0:38:24.51,0:38:25.42,Default,,0000,0000,0000,,and you give that key... Dialogue: 0,0:38:25.42,0:38:31.24,Default,,0000,0000,0000,,and we're talking about a key of a very long length, so there's a giant attack space Dialogue: 0,0:38:31.24,0:38:36.31,Default,,0000,0000,0000,,and you can chop it into bits and hand it to people without reducing the search space for a key. Dialogue: 0,0:38:36.31,0:38:39.00,Default,,0000,0000,0000,,You chop it into bits and hand all the bits to your friends. Dialogue: 0,0:38:39.00,0:38:42.44,Default,,0000,0000,0000,,Now all your friends have your key, as a group. Dialogue: 0,0:38:42.44,0:38:44.27,Default,,0000,0000,0000,,Individually, none of them can attack you. Dialogue: 0,0:38:44.27,0:38:47.71,Default,,0000,0000,0000,,Indicidually, none of them has the power to come root your box, Dialogue: 0,0:38:47.71,0:38:50.38,Default,,0000,0000,0000,,to access your services and pretend to be you. Dialogue: 0,0:38:50.38,0:38:53.79,Default,,0000,0000,0000,,As a group, they can do this. Dialogue: 0,0:38:53.79,0:39:04.22,Default,,0000,0000,0000,,We trust our friends, as a group, more than we trust them as individuals. Dialogue: 0,0:39:04.22,0:39:08.70,Default,,0000,0000,0000,,Any single one of your friends, if you gave them the key to your financial data and your private online Dialogue: 0,0:39:08.70,0:39:10.81,Default,,0000,0000,0000,,life that would make you very nervous. Dialogue: 0,0:39:10.81,0:39:14.39,Default,,0000,0000,0000,,You would worry that they would succumb to temptation to peek, Dialogue: 0,0:39:14.39,0:39:17.22,Default,,0000,0000,0000,,fall on hard times and want to attack you in some way, Dialogue: 0,0:39:17.22,0:39:19.61,Default,,0000,0000,0000,,fall out with you, get mad at you. Dialogue: 0,0:39:19.61,0:39:23.35,Default,,0000,0000,0000,,As an individual, people are sort of fallible in this sense. Dialogue: 0,0:39:23.35,0:39:25.58,Default,,0000,0000,0000,,But as a group of friends who would have to get together Dialogue: 0,0:39:25.58,0:39:30.04,Default,,0000,0000,0000,,and affirmatively make a decision to attack you, Dialogue: 0,0:39:30.04,0:39:32.59,Default,,0000,0000,0000,,we think that's extremely unlikely. Dialogue: 0,0:39:32.59,0:39:38.07,Default,,0000,0000,0000,,It's so unlikely that there are only a few scenarios where we think it might happen. Dialogue: 0,0:39:38.07,0:39:39.54,Default,,0000,0000,0000,,One... Dialogue: 0,0:39:39.54,0:39:42.67,Default,,0000,0000,0000,,if you are ill, and unable to access your box Dialogue: 0,0:39:42.67,0:39:44.20,Default,,0000,0000,0000,,or you're in jail Dialogue: 0,0:39:44.20,0:39:45.55,Default,,0000,0000,0000,,or you've passed away Dialogue: 0,0:39:45.55,0:39:49.01,Default,,0000,0000,0000,,or you've disappeared. Dialogue: 0,0:39:49.01,0:39:52.30,Default,,0000,0000,0000,,Or... you've gone crazy. Dialogue: 0,0:39:52.30,0:39:57.65,Default,,0000,0000,0000,,We call this type of event, where all your friends get together and help you, Dialogue: 0,0:39:57.65,0:39:59.90,Default,,0000,0000,0000,,even if you don't ask them for help, Dialogue: 0,0:39:59.90,0:40:02.87,Default,,0000,0000,0000,,we call that an intervention. Dialogue: 0,0:40:02.87,0:40:05.56,Default,,0000,0000,0000,,When your friends sit you down and say, Dialogue: 0,0:40:05.56,0:40:09.30,Default,,0000,0000,0000,,"you need our help, you can't ask us for it because you're not in a position to ask us for it", Dialogue: 0,0:40:09.30,0:40:10.95,Default,,0000,0000,0000,,that's an intervention. Dialogue: 0,0:40:10.95,0:40:16.73,Default,,0000,0000,0000,,If you have a moment in your life, a crisis in your life that is an intervention level event, Dialogue: 0,0:40:16.73,0:40:18.54,Default,,0000,0000,0000,,that's when you can go to your friends. Dialogue: 0,0:40:18.54,0:40:22.12,Default,,0000,0000,0000,,If your house burns down, you lose your key and all your data Dialogue: 0,0:40:22.12,0:40:25.53,Default,,0000,0000,0000,,You go to your friends, and you say "can I have part of my key back?" Dialogue: 0,0:40:25.53,0:40:29.83,Default,,0000,0000,0000,,"Oh, and give me that data that you have in a cryptographically-sealed box that you can't read." Dialogue: 0,0:40:29.83,0:40:31.01,Default,,0000,0000,0000,,To all your friends... Dialogue: 0,0:40:31.01,0:40:32.04,Default,,0000,0000,0000,,"My data please, my key please, ..." Dialogue: 0,0:40:32.04,0:40:32.78,Default,,0000,0000,0000,,"My data please, my key please, ..." Dialogue: 0,0:40:32.78,0:40:34.15,Default,,0000,0000,0000,,"My data please, my key please, ..." Dialogue: 0,0:40:34.15,0:40:39.70,Default,,0000,0000,0000,,You take all those pieces, you get a new box, Dialogue: 0,0:40:39.70,0:40:42.09,Default,,0000,0000,0000,,you load it all onto your box. Dialogue: 0,0:40:42.09,0:40:47.15,Default,,0000,0000,0000,,You have the key, you have your entire key, and now you can read your data. Dialogue: 0,0:40:47.15,0:40:49.24,Default,,0000,0000,0000,,And you haven't lost your digital life. Dialogue: 0,0:40:49.24,0:40:54.00,Default,,0000,0000,0000,,You have a key that is now unlosable. Dialogue: 0,0:40:54.00,0:40:58.76,Default,,0000,0000,0000,,Even if you never wrote it down, even if you never buried it in the backyard. Dialogue: 0,0:40:58.76,0:41:00.50,Default,,0000,0000,0000,,This is a hard problem in key management. Dialogue: 0,0:41:00.50,0:41:04.24,Default,,0000,0000,0000,,People lose their keys and their passwords to services all the time. Dialogue: 0,0:41:04.24,0:41:09.02,Default,,0000,0000,0000,,The only way we can think of to make that impossible, is this mechanism. Dialogue: 0,0:41:09.02,0:41:10.37,Default,,0000,0000,0000,,And of course it's optional. Dialogue: 0,0:41:10.37,0:41:13.81,Default,,0000,0000,0000,,If you're a person who doesn't trust your friends, even as a group, Dialogue: 0,0:41:13.81,0:41:17.24,Default,,0000,0000,0000,,or if you're a person who just doesn't have a lot of friends Dialogue: 0,0:41:17.24,0:41:20.52,Default,,0000,0000,0000,,(let me finish!) Dialogue: 0,0:41:20.52,0:41:25.12,Default,,0000,0000,0000,,...who doesn't have a lot of friends with FreedomBoxes who can be the backend for this, Dialogue: 0,0:41:25.12,0:41:27.23,Default,,0000,0000,0000,,you don't have to trust this mechanism. Dialogue: 0,0:41:27.23,0:41:30.02,Default,,0000,0000,0000,,You can do something else to make your key unforgettable. Dialogue: 0,0:41:30.02,0:41:32.43,Default,,0000,0000,0000,,But for a lot of naive end-users, Dialogue: 0,0:41:32.43,0:41:34.52,Default,,0000,0000,0000,,this is the mechanism. Dialogue: 0,0:41:34.52,0:41:36.75,Default,,0000,0000,0000,,This is the way they are going to never Dialogue: 0,0:41:36.75,0:41:37.96,Default,,0000,0000,0000,,lose their keys Dialogue: 0,0:41:37.96,0:41:41.70,Default,,0000,0000,0000,,Because the first time a user gets irretrievably locked out of his FreedomBox, Dialogue: 0,0:41:41.70,0:41:43.78,Default,,0000,0000,0000,,we lose that user forever. Dialogue: 0,0:41:43.78,0:41:45.57,Default,,0000,0000,0000,,And we lose all his friends forever. Dialogue: 0,0:41:45.57,0:41:52.31,Default,,0000,0000,0000,,Because it would scare you to lose such an important group of information. Dialogue: 0,0:41:52.31,0:41:53.93,Default,,0000,0000,0000,,Social key management. Dialogue: 0,0:41:53.93,0:41:58.69,Default,,0000,0000,0000,,This is the benefit of building social, of building knowledge Dialogue: 0,0:41:58.69,0:42:03.61,Default,,0000,0000,0000,,of who your friends are, into the box, at a deep level. Dialogue: 0,0:42:03.61,0:42:05.82,Default,,0000,0000,0000,,We have never done that before, with a technology Dialogue: 0,0:42:05.82,0:42:08.03,Default,,0000,0000,0000,,as a community project. Dialogue: 0,0:42:08.03,0:42:11.02,Default,,0000,0000,0000,,And it opens up new possibilities. This is just one. Dialogue: 0,0:42:11.02,0:42:13.09,Default,,0000,0000,0000,,There are others. Dialogue: 0,0:42:13.09,0:42:15.32,Default,,0000,0000,0000,,But it's a field we haven't really thought a lot about. Dialogue: 0,0:42:15.32,0:42:19.64,Default,,0000,0000,0000,,I think once we get out there and we start doing this kind of Dialogue: 0,0:42:19.64,0:42:25.44,Default,,0000,0000,0000,,construction, a lot of new uses are going to be found for this architecture. Dialogue: 0,0:42:25.44,0:42:28.58,Default,,0000,0000,0000,,I encourage you all to think about what changes, Dialogue: 0,0:42:28.58,0:42:34.94,Default,,0000,0000,0000,,when you can assume that the box has people you can trust, just a little bit, Dialogue: 0,0:42:34.94,0:42:38.21,Default,,0000,0000,0000,,because right now we live in a world where we are asked Dialogue: 0,0:42:38.21,0:42:42.69,Default,,0000,0000,0000,,to trust third party services like Facebook with all our photos, Dialogue: 0,0:42:42.69,0:42:46.41,Default,,0000,0000,0000,,or Flickr with all our photos, or Gmail with all our email. Dialogue: 0,0:42:46.41,0:42:47.76,Default,,0000,0000,0000,,We are asked to trust them. Dialogue: 0,0:42:47.76,0:42:50.10,Default,,0000,0000,0000,,We have no reason to trust them. Dialogue: 0,0:42:50.10,0:42:54.86,Default,,0000,0000,0000,,I mean, we expect that they'll act all right, because they have no reason to destroy us. Dialogue: 0,0:42:54.86,0:42:56.93,Default,,0000,0000,0000,,But we don't know what's going to happen. Dialogue: 0,0:42:56.93,0:43:01.66,Default,,0000,0000,0000,,We're effectively giving all our information to people we don't trust at all right now. Dialogue: 0,0:43:01.66,0:43:04.61,Default,,0000,0000,0000,,How does a network of people we trust, just a little bit, Dialogue: 0,0:43:04.61,0:43:06.98,Default,,0000,0000,0000,,change the landscape? Dialogue: 0,0:43:06.98,0:43:09.07,Default,,0000,0000,0000,,I think that's a really interesting question. Dialogue: 0,0:43:09.07,0:43:10.42,Default,,0000,0000,0000,,This box explores that question, Dialogue: 0,0:43:10.42,0:43:16.06,Default,,0000,0000,0000,,this box creates new solutions to old problems that previously seemed intractable. Dialogue: 0,0:43:16.06,0:43:19.66,Default,,0000,0000,0000,,So, I encourage everybody to think about how that might Dialogue: 0,0:43:19.66,0:43:27.14,Default,,0000,0000,0000,,change the solution to a problem they have with a technological architecture as it exists today. Dialogue: 0,0:43:27.14,0:43:31.60,Default,,0000,0000,0000,,Here's another problem... Dialogue: 0,0:43:31.60,0:43:34.57,Default,,0000,0000,0000,,Boxes that know who you are, and know who your friends are, Dialogue: 0,0:43:34.57,0:43:37.56,Default,,0000,0000,0000,,and know how your friends normally act, Dialogue: 0,0:43:37.56,0:43:41.88,Default,,0000,0000,0000,,can also know when your friends are acting weird. Dialogue: 0,0:43:41.88,0:43:49.61,Default,,0000,0000,0000,,If you have a friend who sends you one email a year, who suddenly sends you ten emails in a day, Dialogue: 0,0:43:49.61,0:43:51.68,Default,,0000,0000,0000,,that look like spam, Dialogue: 0,0:43:51.68,0:43:53.44,Default,,0000,0000,0000,,you know that box is rooted. Dialogue: 0,0:43:53.44,0:43:55.37,Default,,0000,0000,0000,,You know that box is weird. Dialogue: 0,0:43:55.37,0:43:59.41,Default,,0000,0000,0000,,Or if you are using the FreedomBox as your gateway to the internet, Dialogue: 0,0:43:59.41,0:44:05.36,Default,,0000,0000,0000,,and a box it is serving downstream, starts sending a bunch of spam through it, it knows. Dialogue: 0,0:44:05.36,0:44:08.79,Default,,0000,0000,0000,,It can say "Oh no! You're acting like a zombie." Dialogue: 0,0:44:08.79,0:44:10.44,Default,,0000,0000,0000,,"You should get a check-up." Dialogue: 0,0:44:10.44,0:44:15.53,Default,,0000,0000,0000,,It can shut off mail service to that box, and not let the messages out. Dialogue: 0,0:44:15.53,0:44:21.61,Default,,0000,0000,0000,,It can make that decision to protect the wider internet to make you a better citizen in the world. Dialogue: 0,0:44:21.61,0:44:27.100,Default,,0000,0000,0000,,If suddenly your computer starts saying "Hey, I'm in Scotland and I need $5000"... Dialogue: 0,0:44:27.100,0:44:30.18,Default,,0000,0000,0000,,but we know you're not in Scotland Dialogue: 0,0:44:30.18,0:44:33.04,Default,,0000,0000,0000,,Maybe this box, because it has contact information, Dialogue: 0,0:44:33.04,0:44:35.70,Default,,0000,0000,0000,,maybe this box sends you an SMS. Dialogue: 0,0:44:35.70,0:44:40.93,Default,,0000,0000,0000,,And says "Dude, you've been hacked, go do something about your box." Dialogue: 0,0:44:40.93,0:44:43.76,Default,,0000,0000,0000,,So the types of things we can do once we assume we have Dialogue: 0,0:44:43.76,0:44:49.01,Default,,0000,0000,0000,,close relations as opposed to arms-length relations, Dialogue: 0,0:44:49.01,0:44:51.10,Default,,0000,0000,0000,,the types of things we can do when we trust each other a little bit Dialogue: 0,0:44:51.10,0:44:54.37,Default,,0000,0000,0000,,and we trust our boxes a little bit, goes way up. Dialogue: 0,0:44:54.37,0:44:55.86,Default,,0000,0000,0000,,Way up. Dialogue: 0,0:44:55.86,0:44:58.79,Default,,0000,0000,0000,,And by bringing that infrastructure closer to us, Dialogue: 0,0:44:58.79,0:45:03.36,Default,,0000,0000,0000,,I mean Gmail is too far away to play that role from a network perspective. Dialogue: 0,0:45:03.36,0:45:08.84,Default,,0000,0000,0000,,But if the box is in our land, we can do that. Dialogue: 0,0:45:08.84,0:45:11.81,Default,,0000,0000,0000,,These boxes will only work if they are convenient. Dialogue: 0,0:45:11.81,0:45:14.78,Default,,0000,0000,0000,,There's an old punk-rock slogan, from the Dead Kennedys, Dialogue: 0,0:45:14.78,0:45:18.52,Default,,0000,0000,0000,,"Give me convenience, or give me death." Dialogue: 0,0:45:18.52,0:45:24.68,Default,,0000,0000,0000,,We laugh at that, but that's a belief users have, Dialogue: 0,0:45:24.68,0:45:26.58,Default,,0000,0000,0000,,and I deduce that based on their behaviour, Dialogue: 0,0:45:26.58,0:45:29.74,Default,,0000,0000,0000,,because every time there is a convenient web service, Dialogue: 0,0:45:29.74,0:45:31.20,Default,,0000,0000,0000,,people use it. Dialogue: 0,0:45:31.20,0:45:34.78,Default,,0000,0000,0000,,Even if it's not very good with privacy, a lot of people are going to use it. Dialogue: 0,0:45:34.78,0:45:41.32,Default,,0000,0000,0000,,And conversely, whenever we have web services that are very good at privacy, but aren't very convenient, Dialogue: 0,0:45:41.32,0:45:44.02,Default,,0000,0000,0000,,comparatively fewer people use them. Dialogue: 0,0:45:44.02,0:45:47.73,Default,,0000,0000,0000,,We don't think this box works without convenience. Dialogue: 0,0:45:47.73,0:45:51.29,Default,,0000,0000,0000,,If we don't get the user-interface right then this project Dialogue: 0,0:45:51.29,0:45:53.38,Default,,0000,0000,0000,,will probably fall over. Dialogue: 0,0:45:53.38,0:45:56.02,Default,,0000,0000,0000,,It will never gain any sort of critical mass. Dialogue: 0,0:45:56.02,0:45:57.81,Default,,0000,0000,0000,,So we need a simple interface, Dialogue: 0,0:45:57.81,0:46:00.94,Default,,0000,0000,0000,,we need a way for users to interact with this box in a minimal way. Dialogue: 0,0:46:00.94,0:46:03.48,Default,,0000,0000,0000,,They should think about it as little as possible. Dialogue: 0,0:46:03.48,0:46:06.01,Default,,0000,0000,0000,,That's the hardest problem we face. Dialogue: 0,0:46:06.01,0:46:07.49,Default,,0000,0000,0000,,Quite frankly. Dialogue: 0,0:46:07.49,0:46:10.49,Default,,0000,0000,0000,,The technology to do private communication, that exists. Dialogue: 0,0:46:10.49,0:46:14.37,Default,,0000,0000,0000,,A lot of the people in this room helped to build that infrastructure and technology. Dialogue: 0,0:46:14.37,0:46:16.62,Default,,0000,0000,0000,,We can put it on the box. Dialogue: 0,0:46:16.62,0:46:21.10,Default,,0000,0000,0000,,Making it easy and accessible for users, that's hard. Dialogue: 0,0:46:21.10,0:46:23.35,Default,,0000,0000,0000,,And right now we're trying to figure out what that looks like, Dialogue: 0,0:46:23.35,0:46:25.14,Default,,0000,0000,0000,,who the designers are going to be. Dialogue: 0,0:46:25.14,0:46:30.78,Default,,0000,0000,0000,,If you have user interface or user experience design that you want to bring to a project like this, Dialogue: 0,0:46:30.78,0:46:33.92,Default,,0000,0000,0000,,please, please, come find me. Dialogue: 0,0:46:33.92,0:46:38.98,Default,,0000,0000,0000,,In order to have convenience, we need to have the thing provide services that are not just Dialogue: 0,0:46:38.98,0:46:44.92,Default,,0000,0000,0000,,freedom-oriented, we need to use its position in your network as a trusted device Dialogue: 0,0:46:44.92,0:46:48.50,Default,,0000,0000,0000,,to do things for you that aren't just about privacy. Dialogue: 0,0:46:48.50,0:46:50.54,Default,,0000,0000,0000,,It needs to do backups. Dialogue: 0,0:46:50.54,0:46:52.01,Default,,0000,0000,0000,,This is important. Dialogue: 0,0:46:52.01,0:46:56.63,Default,,0000,0000,0000,,Right now the way people back up their photos is by giving them to Flickr. Dialogue: 0,0:46:56.63,0:47:00.18,Default,,0000,0000,0000,,The way they back up their email is by giving it to Gmail. Dialogue: 0,0:47:00.18,0:47:06.03,Default,,0000,0000,0000,,If we don't provide backups, we can never be an effective replacement Dialogue: 0,0:47:06.03,0:47:09.14,Default,,0000,0000,0000,,for the services that store your data somewhere else. Dialogue: 0,0:47:09.14,0:47:14.83,Default,,0000,0000,0000,,Even though they're storing it out there in the cloud for their purposes, you get a benefit from it. Dialogue: 0,0:47:14.83,0:47:16.62,Default,,0000,0000,0000,,We have to replicate that benefit. Dialogue: 0,0:47:16.62,0:47:19.89,Default,,0000,0000,0000,,So things that we don't think of as privacy features have to Dialogue: 0,0:47:19.89,0:47:21.66,Default,,0000,0000,0000,,be in the box. Dialogue: 0,0:47:21.66,0:47:25.51,Default,,0000,0000,0000,,The backups, the passwords, and the keys, you can't forget them. Dialogue: 0,0:47:25.51,0:47:29.11,Default,,0000,0000,0000,,We would like it to be a music, a video, a photo server, Dialogue: 0,0:47:29.11,0:47:33.71,Default,,0000,0000,0000,,all the kinds of things you might expect from a convenient box on your network. Dialogue: 0,0:47:33.71,0:47:37.70,Default,,0000,0000,0000,,All the things that you want to share with other people, this box has to do those things. Dialogue: 0,0:47:37.70,0:47:44.99,Default,,0000,0000,0000,,And these aren't privacy features, but without them we won't be able to give people privacy. Dialogue: 0,0:47:44.99,0:47:49.15,Default,,0000,0000,0000,,Our first feature, the thing we are working towards Dialogue: 0,0:47:49.15,0:47:50.47,Default,,0000,0000,0000,,is Jabber. Dialogue: 0,0:47:50.47,0:47:53.14,Default,,0000,0000,0000,,It's secure encrypted chat, point-to-point. Dialogue: 0,0:47:53.14,0:47:57.72,Default,,0000,0000,0000,,That will be the thing we are working on right now. Dialogue: 0,0:47:57.72,0:48:02.22,Default,,0000,0000,0000,,But in order to do that we need to solve this monkey-spherish SSL problem that I described. Dialogue: 0,0:48:02.22,0:48:06.70,Default,,0000,0000,0000,,We have code, it needs to get packaged and all that. Dialogue: 0,0:48:06.70,0:48:10.23,Default,,0000,0000,0000,,Our development strategy, the way we are going to do all the things we said, Dialogue: 0,0:48:10.23,0:48:15.18,Default,,0000,0000,0000,,because the list of things I have said we're going to do... Dialogue: 0,0:48:15.18,0:48:19.36,Default,,0000,0000,0000,,I can't believe you're not throwing things at me. Dialogue: 0,0:48:19.36,0:48:21.57,Default,,0000,0000,0000,,Because it's ludicrous to believe that we can actually do all these things by ourselves. Dialogue: 0,0:48:21.57,0:48:23.52,Default,,0000,0000,0000,,And we're not. Dialogue: 0,0:48:23.52,0:48:25.91,Default,,0000,0000,0000,,We're going to let other people make the software. Dialogue: 0,0:48:25.91,0:48:28.16,Default,,0000,0000,0000,,As much as possible we're going to encourage other people Dialogue: 0,0:48:28.16,0:48:31.71,Default,,0000,0000,0000,,to build stuff. We're going to use stuff that already exists. Dialogue: 0,0:48:31.71,0:48:35.01,Default,,0000,0000,0000,,We're going to use Privoxy, we're going to use Prosody, we're going to use Apache. Dialogue: 0,0:48:35.01,0:48:38.56,Default,,0000,0000,0000,,We're not going to reinvent the web server, we're not going to reinvent protocols. Dialogue: 0,0:48:38.56,0:48:45.62,Default,,0000,0000,0000,,I really hope that by the time this project is mature, we haven't invented any new protocols. Dialogue: 0,0:48:45.62,0:48:48.62,Default,,0000,0000,0000,,Maybe we'll use new protocols, but I don't want to be Dialogue: 0,0:48:48.62,0:48:53.24,Default,,0000,0000,0000,,generating new things that haven't been tested, and then putting them in FreedomBox. Dialogue: 0,0:48:53.24,0:48:58.46,Default,,0000,0000,0000,,I want to see things in the real world, tested, gain credibility and take them. Dialogue: 0,0:48:58.46,0:49:01.74,Default,,0000,0000,0000,,The less we invent, the better. Dialogue: 0,0:49:01.74,0:49:07.54,Default,,0000,0000,0000,,As far as timelines go, by the time we have it ready, you'll know why you need it. Dialogue: 0,0:49:07.54,0:49:10.68,Default,,0000,0000,0000,,People right now are figuring out that privacy is important. Dialogue: 0,0:49:10.68,0:49:12.98,Default,,0000,0000,0000,,They're seeing it over and over again. Dialogue: 0,0:49:12.98,0:49:18.11,Default,,0000,0000,0000,,In Egypt, the at the start of the Arab spring, one of the things the government did to try to Dialogue: 0,0:49:18.11,0:49:22.98,Default,,0000,0000,0000,,tamp down the organisation was to convince companies to shut off cell networks, Dialogue: 0,0:49:22.98,0:49:25.16,Default,,0000,0000,0000,,to prevent people from talking to each other. Dialogue: 0,0:49:25.16,0:49:28.30,Default,,0000,0000,0000,,In America they did the same thing in San Francisco I hear. Dialogue: 0,0:49:28.30,0:49:36.33,Default,,0000,0000,0000,,Turned off the cell towers to prevent people from organising to meet for a protest. Dialogue: 0,0:49:36.33,0:49:42.26,Default,,0000,0000,0000,,With Occupy Wall Street, you're starting to see infiltration, Dialogue: 0,0:49:42.26,0:49:45.97,Default,,0000,0000,0000,,you're starting to see people going and getting information Dialogue: 0,0:49:45.97,0:49:48.50,Default,,0000,0000,0000,,that Occupy Wall Street is talking about and turning it over Dialogue: 0,0:49:48.50,0:49:51.94,Default,,0000,0000,0000,,to the authorities, the police, the FBI. Dialogue: 0,0:49:51.94,0:49:59.09,Default,,0000,0000,0000,,So the need for privacy as we enter a new age of increased activism, we hope, Dialogue: 0,0:49:59.09,0:50:01.78,Default,,0000,0000,0000,,of increased activity, of social activity, Dialogue: 0,0:50:01.78,0:50:06.24,Default,,0000,0000,0000,,I think the need for a lot of this privacy stuff is going to become clear. Dialogue: 0,0:50:06.24,0:50:11.00,Default,,0000,0000,0000,,As the technology for invading your privacy improves, Dialogue: 0,0:50:11.00,0:50:18.08,Default,,0000,0000,0000,,the need for technology to protect your privacy will become stark and clear. Dialogue: 0,0:50:18.08,0:50:22.54,Default,,0000,0000,0000,,Our two big challenges as I said are user experience, Dialogue: 0,0:50:22.54,0:50:27.56,Default,,0000,0000,0000,,and the one I didn't say was paying for developers, paying for designers. Dialogue: 0,0:50:27.56,0:50:31.71,Default,,0000,0000,0000,,Those are the hard parts that we're working on. Dialogue: 0,0:50:31.71,0:50:35.87,Default,,0000,0000,0000,,And if we fail, we think that's where we fail. Dialogue: 0,0:50:35.87,0:50:40.21,Default,,0000,0000,0000,,Software isn't on that list, as I said software is already out there. Dialogue: 0,0:50:40.21,0:50:42.44,Default,,0000,0000,0000,,So you can have a FreedomBox. Dialogue: 0,0:50:42.44,0:50:46.76,Default,,0000,0000,0000,,If you like that box that we've been passing around the audience, you can buy one from Globalscale. Dialogue: 0,0:50:46.76,0:50:51.24,Default,,0000,0000,0000,,If you don't want the box, it's just Debian, it's just Linux, it's just packages. Dialogue: 0,0:50:51.24,0:50:56.47,Default,,0000,0000,0000,,Throw Debian on a box, we will have packages available through the normal Debian mechanisms. Dialogue: 0,0:50:56.47,0:50:58.28,Default,,0000,0000,0000,,You don't even have to use our repository. Dialogue: 0,0:50:58.28,0:51:01.55,Default,,0000,0000,0000,,In fact, I don't think we're going to have a repository. Dialogue: 0,0:51:01.55,0:51:06.15,Default,,0000,0000,0000,,You're just going to download it and install it the same way you normally do it if you're technologically Dialogue: 0,0:51:06.15,0:51:08.52,Default,,0000,0000,0000,,capable of doing that. Dialogue: 0,0:51:08.52,0:51:10.26,Default,,0000,0000,0000,,I grabbed a bunch of photos from Flickr, Dialogue: 0,0:51:10.26,0:51:14.42,Default,,0000,0000,0000,,my colleague Ian Sullivan took that awesome picture of the FreedomBox. Dialogue: 0,0:51:14.42,0:51:17.24,Default,,0000,0000,0000,,And that's how you reach me. Dialogue: 0,0:51:18.99,0:51:31.31,Default,,0000,0000,0000,,{\i1}APPLAUSE{\i0} Dialogue: 0,0:51:39.03,0:51:44.79,Default,,0000,0000,0000,,Thanks James, please sit down. Dialogue: 0,0:51:44.79,0:51:49.10,Default,,0000,0000,0000,,We are up for questions from the audience for James. Dialogue: 0,0:51:49.10,0:52:03.52,Default,,0000,0000,0000,,Please raise your hand if you have any questions about the FreedomBox. Dialogue: 0,0:52:03.52,0:52:05.75,Default,,0000,0000,0000,,Hello, thanks that was a very interesting presentation. Dialogue: 0,0:52:05.75,0:52:06.66,Default,,0000,0000,0000,,Thank you. Dialogue: 0,0:52:06.66,0:52:10.49,Default,,0000,0000,0000,,Your boss Eben Moglen, he has given a speech at a committee of the US congress Dialogue: 0,0:52:10.49,0:52:13.49,Default,,0000,0000,0000,,I believe, which has received a lot of attention Dialogue: 0,0:52:13.49,0:52:18.57,Default,,0000,0000,0000,,and in Iran during the green movement the US state department Dialogue: 0,0:52:18.57,0:52:24.08,Default,,0000,0000,0000,,I believe has told Twitter to reschedule maintainence so that Dialogue: 0,0:52:24.08,0:52:29.16,Default,,0000,0000,0000,,the opposition could keep using Twitter during the attempted revolution Dialogue: 0,0:52:29.16,0:52:33.04,Default,,0000,0000,0000,,and Hilary Clinton has given a very popular speech about Dialogue: 0,0:52:33.04,0:52:36.92,Default,,0000,0000,0000,,how America would support the promotion of internet freedom Dialogue: 0,0:52:36.92,0:52:40.79,Default,,0000,0000,0000,,and I think things such as the New America Foundation are Dialogue: 0,0:52:40.79,0:52:46.41,Default,,0000,0000,0000,,funding and supporting projects such as the Commotion mesh networking project Dialogue: 0,0:52:46.41,0:52:49.22,Default,,0000,0000,0000,,that we've already heard about before. Dialogue: 0,0:52:49.22,0:52:52.64,Default,,0000,0000,0000,,So in other words there's a link between politics and technology sometimes, Dialogue: 0,0:52:52.64,0:52:57.86,Default,,0000,0000,0000,,and in the past I believe certain influential Americans such Dialogue: 0,0:52:57.86,0:53:03.97,Default,,0000,0000,0000,,Rupert Murdoch or George W. Bush have viewed modern communication technologies as a way to Dialogue: 0,0:53:03.97,0:53:09.05,Default,,0000,0000,0000,,promote U.S. foreign policy and to spread democracy and freedom in the world. Dialogue: 0,0:53:09.05,0:53:14.14,Default,,0000,0000,0000,,So my question is, what is your relationship with your government? Dialogue: 0,0:53:14.14,0:53:16.09,Default,,0000,0000,0000,,That's a really good question. Dialogue: 0,0:53:16.09,0:53:21.34,Default,,0000,0000,0000,,So one of the things that we sort of figured out from the beginning was that Dialogue: 0,0:53:21.34,0:53:25.77,Default,,0000,0000,0000,,if we had close relationships with the U.S. government, Dialogue: 0,0:53:25.77,0:53:29.79,Default,,0000,0000,0000,,people outside of the U.S. might have difficulty trusting us, Dialogue: 0,0:53:29.79,0:53:34.55,Default,,0000,0000,0000,,because nobody wants to tell all their secrets to the American government. Dialogue: 0,0:53:34.55,0:53:42.67,Default,,0000,0000,0000,,So we were thinking about what that really looks like in the context of a box that could be used globally. Dialogue: 0,0:53:42.67,0:53:48.64,Default,,0000,0000,0000,,We are working very hard to engineer a device that does not require you to trust us. Dialogue: 0,0:53:48.64,0:53:50.57,Default,,0000,0000,0000,,I'm not asking for your trust. Dialogue: 0,0:53:50.57,0:53:55.05,Default,,0000,0000,0000,,I'm not asking for your trust, I'm asking for your help. Dialogue: 0,0:53:55.05,0:53:59.09,Default,,0000,0000,0000,,All the code we write you'll be able to see it, you'll be able to Dialogue: 0,0:53:59.09,0:54:02.09,Default,,0000,0000,0000,,audit it, you'll be able to make your own decisions about what it does, Dialogue: 0,0:54:02.09,0:54:05.38,Default,,0000,0000,0000,,you'll be able to test it if it trustworthy or not, Dialogue: 0,0:54:05.38,0:54:10.89,Default,,0000,0000,0000,,and if you decide that it is not, you can tell everyone, Dialogue: 0,0:54:10.89,0:54:11.93,Default,,0000,0000,0000,,and they won't use it. Dialogue: 0,0:54:11.93,0:54:16.81,Default,,0000,0000,0000,,So from a trust perspective, it doesn't matter what our relationship is with anybody. Dialogue: 0,0:54:16.81,0:54:18.43,Default,,0000,0000,0000,,So that's the first thing. Dialogue: 0,0:54:18.43,0:54:23.80,Default,,0000,0000,0000,,The second thing is that right now we don't have much of a relationship with the U.S. government. Dialogue: 0,0:54:23.80,0:54:33.46,Default,,0000,0000,0000,,Jacob Applebaum is somewhat famous for his work with Julian Assange on Wikileaks, Dialogue: 0,0:54:33.46,0:54:36.57,Default,,0000,0000,0000,,and his work on Tor, and security in general, Dialogue: 0,0:54:36.57,0:54:39.73,Default,,0000,0000,0000,,his efforts to provide you with freedom and privacy. Dialogue: 0,0:54:39.73,0:54:45.86,Default,,0000,0000,0000,,He is a guy who was recently revealed in the Wall Street Journal that the U.S. government has been spying Dialogue: 0,0:54:45.86,0:54:51.54,Default,,0000,0000,0000,,on. And he is on our team, he's on our technical advisory committee. Dialogue: 0,0:54:51.54,0:54:56.03,Default,,0000,0000,0000,,He's one of the people we go to for help when we need to understand security on the box. Dialogue: 0,0:54:56.03,0:55:02.69,Default,,0000,0000,0000,,So right now our position with the American government is that we're not really related except in Dialogue: 0,0:55:02.69,0:55:05.66,Default,,0000,0000,0000,,so much that we are a bunch of people who really care about these issues, Dialogue: 0,0:55:05.66,0:55:12.77,Default,,0000,0000,0000,,which maybe occasionally makes us targets. Which gives us a reason to use a box like this. Dialogue: 0,0:55:12.77,0:55:21.27,Default,,0000,0000,0000,,Coupled with that, there is a program in America - you were talking about Hilary Clinton saying Dialogue: 0,0:55:21.27,0:55:26.03,Default,,0000,0000,0000,,she was going to encourage technologies that will spread democracy. Dialogue: 0,0:55:26.03,0:55:30.21,Default,,0000,0000,0000,,So the way America encourages things is by spending money on it. Dialogue: 0,0:55:30.21,0:55:34.69,Default,,0000,0000,0000,,That's our typical way to support programs. We fund different things. Dialogue: 0,0:55:34.69,0:55:40.68,Default,,0000,0000,0000,,We don't generally have feel-good campaigns, we just pay people to make good work, or try to. Dialogue: 0,0:55:40.68,0:55:46.92,Default,,0000,0000,0000,,So the U.S. state department has a program to provide funding for projects like the FreedomBox. Dialogue: 0,0:55:46.92,0:55:48.53,Default,,0000,0000,0000,,We have not applied for that funding. Dialogue: 0,0:55:48.53,0:55:50.20,Default,,0000,0000,0000,,I don't know if we will. Dialogue: 0,0:55:50.20,0:55:56.14,Default,,0000,0000,0000,,However I do know that they have given funding to some very good and genuine projects that are Dialogue: 0,0:55:56.14,0:56:00.28,Default,,0000,0000,0000,,run by people I trust, so I try not to be cynical about that. Dialogue: 0,0:56:00.28,0:56:06.52,Default,,0000,0000,0000,,I imagine at some point that through a direct grant or a sub-grant or something, Dialogue: 0,0:56:06.52,0:56:11.14,Default,,0000,0000,0000,,some state department money might support some aspect of work that is related to us. Dialogue: 0,0:56:11.14,0:56:15.02,Default,,0000,0000,0000,,I mean, we might take work from a project that is state department funded, Dialogue: 0,0:56:15.02,0:56:17.85,Default,,0000,0000,0000,,just because it's quick work. Dialogue: 0,0:56:17.85,0:56:20.85,Default,,0000,0000,0000,,Have I answered your question? Dialogue: 0,0:56:20.85,0:56:21.71,Default,,0000,0000,0000,,Yes, thanks. Dialogue: 0,0:56:32.20,0:56:37.64,Default,,0000,0000,0000,,Hi, well you always have tension if you talk about privacy Dialogue: 0,0:56:37.64,0:56:41.07,Default,,0000,0000,0000,,since 9/11 you know, I heard this in America very often, Dialogue: 0,0:56:41.07,0:56:44.18,Default,,0000,0000,0000,,"we have to be careful", every body is suspicious and stuff. Dialogue: 0,0:56:44.18,0:56:48.16,Default,,0000,0000,0000,,So how do you react when people like the government say well, Dialogue: 0,0:56:48.16,0:56:55.45,Default,,0000,0000,0000,,you are creating a way to support terrorism, whatever. Dialogue: 0,0:56:55.45,0:57:00.23,Default,,0000,0000,0000,,That's a good question, and it's a common question. Dialogue: 0,0:57:00.23,0:57:04.71,Default,,0000,0000,0000,,Frankly every time I do this talk, it's one of the first questions that come up. Dialogue: 0,0:57:04.71,0:57:06.94,Default,,0000,0000,0000,,The answer is really simple. Dialogue: 0,0:57:06.94,0:57:11.75,Default,,0000,0000,0000,,The fact is, this box doesn't create any new privacy technology. Dialogue: 0,0:57:11.75,0:57:15.14,Default,,0000,0000,0000,,It just makes it easier to use and easier to access. Dialogue: 0,0:57:15.14,0:57:21.43,Default,,0000,0000,0000,,People who are committed to terrorism or criminal activity, they have sufficient motivation that they Dialogue: 0,0:57:21.43,0:57:23.61,Default,,0000,0000,0000,,can use the technology that exists. Terrorists are already using PGP. Dialogue: 0,0:57:23.61,0:57:27.16,Default,,0000,0000,0000,,They're already using Tor. Dialogue: 0,0:57:27.16,0:57:30.25,Default,,0000,0000,0000,,They're already using stuff to hide their data. Dialogue: 0,0:57:30.25,0:57:33.34,Default,,0000,0000,0000,,At best we are helping stupid terrorists. Dialogue: 0,0:57:33.34,0:57:35.71,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,0:57:35.71,0:57:42.86,Default,,0000,0000,0000,,Granted, I'm not excited about that, but I don't that's a sufficient reason to deny common people Dialogue: 0,0:57:42.86,0:57:44.51,Default,,0000,0000,0000,,access to these technologies. Dialogue: 0,0:57:44.51,0:57:49.13,Default,,0000,0000,0000,,And more importantly than the fact that terrorists and criminals have access to this technology, Dialogue: 0,0:57:49.13,0:57:52.40,Default,,0000,0000,0000,,governments have access to this technology. Dialogue: 0,0:57:52.40,0:57:54.66,Default,,0000,0000,0000,,The largest corporations have access to this technology. Dialogue: 0,0:57:54.66,0:58:00.79,Default,,0000,0000,0000,,Every bank, the same encryption methods that we are using is the stuff that protects trillions of dollars Dialogue: 0,0:58:00.79,0:58:05.11,Default,,0000,0000,0000,,in value that banks trade every day. Dialogue: 0,0:58:05.11,0:58:12.58,Default,,0000,0000,0000,,This is technology that is currently being used by everyone except us. Dialogue: 0,0:58:12.58,0:58:15.11,Default,,0000,0000,0000,,All we're doing is levelling the playing field. Dialogue: 0,0:58:15.11,0:58:22.24,Default,,0000,0000,0000,,The same technology that hides data from us, that causes a complete lack of transparency in a downward Dialogue: 0,0:58:22.24,0:58:27.91,Default,,0000,0000,0000,,direction, we can have to level the playing field a little bit. Dialogue: 0,0:58:27.91,0:58:39.73,Default,,0000,0000,0000,,More questions? Dialogue: 0,0:58:39.73,0:58:43.88,Default,,0000,0000,0000,,Thank you for your presentation. Dialogue: 0,0:58:43.88,0:58:51.34,Default,,0000,0000,0000,,Could we add to challenges, maybe we could produce it in a non-communist dictatorship? Dialogue: 0,0:58:51.34,0:58:54.33,Default,,0000,0000,0000,,Because I saw the label "Made in China", so I think it is just Dialogue: 0,0:58:54.33,0:59:00.93,Default,,0000,0000,0000,,paradox to produce something like the FreedomBox in this country, and I would also like to be independent Dialogue: 0,0:59:00.93,0:59:07.17,Default,,0000,0000,0000,,from producing in China. So that's just something for a challenge I think. Dialogue: 0,0:59:07.17,0:59:10.61,Default,,0000,0000,0000,,That's a really good question and important point. Dialogue: 0,0:59:10.61,0:59:16.23,Default,,0000,0000,0000,,So, we're not a hardware project. Hardware is really really hard to do right and do well. Dialogue: 0,0:59:16.23,0:59:19.34,Default,,0000,0000,0000,,We have some hardware hackers on our project. Dialogue: 0,0:59:19.34,0:59:25.26,Default,,0000,0000,0000,,Our tech lead Bdale Garbee does amazing work with satellites and model rockets and altimeters, Dialogue: 0,0:59:25.26,0:59:28.84,Default,,0000,0000,0000,,and he's brilliant. But this is not a hardware project. Dialogue: 0,0:59:28.84,0:59:31.97,Default,,0000,0000,0000,,All we can do is use hardware that already exists. Dialogue: 0,0:59:31.97,0:59:37.64,Default,,0000,0000,0000,,When the world makes hardware in places other than China, we will use that hardware. Dialogue: 0,0:59:37.64,0:59:41.10,Default,,0000,0000,0000,,Right now, we don't have a lot of options. Dialogue: 0,0:59:41.10,0:59:46.62,Default,,0000,0000,0000,,And we're not going to deny everybody privacy because we don't have a lot of hardware options. Dialogue: 0,0:59:46.62,0:59:48.11,Default,,0000,0000,0000,,When we have those options we'll take them. Dialogue: 0,0:59:48.11,0:59:51.94,Default,,0000,0000,0000,,In the meantime, if you are a person who really cares about this issue, Dialogue: 0,0:59:51.94,0:59:55.66,Default,,0000,0000,0000,,don't buy a FreedomBox. Dialogue: 0,0:59:55.66,0:59:58.95,Default,,0000,0000,0000,,Take the software, go find a computer that isn't made in China, Dialogue: 0,0:59:58.95,1:00:02.23,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,1:00:02.23,1:00:05.01,Default,,0000,0000,0000,,and go put the software on that box. Dialogue: 0,1:00:05.01,1:00:11.75,Default,,0000,0000,0000,,If you want a solution that is run on computers that don't exist, I can't help you with that. Dialogue: 0,1:00:11.75,1:00:15.95,Default,,0000,0000,0000,,If you want a solution that runs, I might be able to help you with that. Dialogue: 0,1:00:15.95,1:00:20.27,Default,,0000,0000,0000,,But yes, I agree that that is a real issue, and we are thinking about that. Dialogue: 0,1:00:20.27,1:00:25.47,Default,,0000,0000,0000,,We believe that there is an open hardware project story here. Dialogue: 0,1:00:25.47,1:00:28.88,Default,,0000,0000,0000,,And one thing we've been doing is working with the manufacturer of the box, Dialogue: 0,1:00:28.88,1:00:32.95,Default,,0000,0000,0000,,to get the code free, to make sure we know what's in it, Dialogue: 0,1:00:32.95,1:00:35.32,Default,,0000,0000,0000,,so that there are no binary blobs in the box, Dialogue: 0,1:00:35.32,1:00:38.15,Default,,0000,0000,0000,,so we have some assurances that we actually do have freedom. Dialogue: 0,1:00:38.15,1:00:45.67,Default,,0000,0000,0000,,At some point though, we do believe that somebody will solve the open hardware problem for us. Dialogue: 0,1:00:45.67,1:00:50.55,Default,,0000,0000,0000,,We're not going to be the hardware project, but there are people trying to do this in an open way. Dialogue: 0,1:00:50.55,1:00:54.43,Default,,0000,0000,0000,,RaspberryPi for example. They're not quite right for our use-case, but those kinds of projects Dialogue: 0,1:00:54.43,1:00:58.58,Default,,0000,0000,0000,,are starting to exist, and they're starting to be really good. Dialogue: 0,1:00:58.58,1:01:01.42,Default,,0000,0000,0000,,In a few years, maybe that will be the thing we move onto. Dialogue: 0,1:01:01.42,1:01:09.94,Default,,0000,0000,0000,,Now, I'm guessing that even an open hardware project like RaspberryPi does their manufacturing in Dialogue: 0,1:01:09.94,1:01:14.86,Default,,0000,0000,0000,,a place like China. And that's a big problem. Dialogue: 0,1:01:14.86,1:01:19.48,Default,,0000,0000,0000,,When the world is ready with a solution to that, we will be ready to accept that solution and adopt it Dialogue: 0,1:01:19.48,1:01:22.62,Default,,0000,0000,0000,,of course. Dialogue: 0,1:01:22.62,1:01:30.53,Default,,0000,0000,0000,,Any more questions for James? or statements? Dialogue: 0,1:01:33.06,1:01:37.01,Default,,0000,0000,0000,,This is more of a statement than a question I guess, Dialogue: 0,1:01:37.01,1:01:42.98,Default,,0000,0000,0000,,but should the FreedomBox start being made in China there will be a lot more of them coming out of Dialogue: 0,1:01:42.98,1:01:46.25,Default,,0000,0000,0000,,the back door and enabling privacy for people that don't get Dialogue: 0,1:01:46.25,1:01:51.92,Default,,0000,0000,0000,,it, but also as soon as it starts getting manufactured I'd imagine you may, Dialogue: 0,1:01:51.92,1:01:54.91,Default,,0000,0000,0000,,because you're not in it for the money as you told me last night, Dialogue: 0,1:01:54.91,1:01:59.56,Default,,0000,0000,0000,,you may be looking forward to how easy it will be to copy, Dialogue: 0,1:01:59.56,1:02:05.99,Default,,0000,0000,0000,,and with things like MakerBot, making a case, making a bot is easy, Dialogue: 0,1:02:05.99,1:02:08.82,Default,,0000,0000,0000,,you can do it in your bedroom now with 3D printers. Dialogue: 0,1:02:08.82,1:02:15.100,Default,,0000,0000,0000,,So there will be a bag of components, a board, made by some online place that is really into this, Dialogue: 0,1:02:15.100,1:02:18.23,Default,,0000,0000,0000,,and you can assemble these at home. Dialogue: 0,1:02:18.23,1:02:22.99,Default,,0000,0000,0000,,So you've just got to get it out there first I think, and lead the way. Dialogue: 0,1:02:22.99,1:02:29.63,Default,,0000,0000,0000,,Yeah, I think that's quite right in that we are not the only place to get a box like this. Dialogue: 0,1:02:29.63,1:02:34.55,Default,,0000,0000,0000,,I mean, we're putting it on a specific box to make it easy, but there will be lots of places that make Dialogue: 0,1:02:34.55,1:02:40.66,Default,,0000,0000,0000,,boxes, and hopefully there will be places where working conditions are acceptable to everybody. Dialogue: 0,1:02:40.66,1:02:43.93,Default,,0000,0000,0000,,And at that point you can make your own boxes, Dialogue: 0,1:02:43.93,1:02:44.43,Default,,0000,0000,0000,,you can put them on any box you can find. Dialogue: 0,1:02:44.43,1:02:46.14,Default,,0000,0000,0000,,The point of Free Software is not to lock you into a service, Dialogue: 0,1:02:46.14,1:02:53.20,Default,,0000,0000,0000,,a technology, a software, a structure or a box. Dialogue: 0,1:02:53.20,1:02:53.70,Default,,0000,0000,0000,,We're not going to lock you into anything, that's one thing we're extremely clear about. Dialogue: 0,1:02:53.70,1:03:00.93,Default,,0000,0000,0000,,If you manage to make a box like this at home, I would really love to hear about it. Dialogue: 0,1:03:00.93,1:03:06.46,Default,,0000,0000,0000,,If you can spin up a MakerBot to make a case, Dialogue: 0,1:03:06.46,1:03:08.94,Default,,0000,0000,0000,,and you have a friend who can etch boards, Dialogue: 0,1:03:08.94,1:03:10.56,Default,,0000,0000,0000,,and you make a box like this at home, Dialogue: 0,1:03:10.56,1:03:14.14,Default,,0000,0000,0000,,that would be big news and a lot of people would want to know about it. Dialogue: 0,1:03:14.14,1:03:22.66,Default,,0000,0000,0000,,More statements or questions? Yes... Dialogue: 0,1:03:22.66,1:03:31.46,Default,,0000,0000,0000,,So, if you lose your box and get a new one, how is it going to reauthenticate to the boxes of your friends? Dialogue: 0,1:03:31.46,1:03:34.30,Default,,0000,0000,0000,,I think I didn't get that one. Dialogue: 0,1:03:34.30,1:03:39.38,Default,,0000,0000,0000,,Yeah, so, the good thing about friends is that they don't actually know you by your PGP key. Dialogue: 0,1:03:39.38,1:03:48.25,Default,,0000,0000,0000,,Sorry, I didn't specify it, if you want a grand security and you want distribution to more than 12 friends, Dialogue: 0,1:03:48.25,1:03:54.01,Default,,0000,0000,0000,,so let's say a hundred, and they're like, all over the world. Dialogue: 0,1:03:54.01,1:03:59.54,Default,,0000,0000,0000,,You are probably going to reach them through the internet to get your key parts back, Dialogue: 0,1:03:59.54,1:04:05.18,Default,,0000,0000,0000,,and you are probably not going to be able to use the FreedomBox to get a new one because Dialogue: 0,1:04:05.18,1:04:06.48,Default,,0000,0000,0000,,it has to be authenticated. Dialogue: 0,1:04:06.48,1:04:09.31,Default,,0000,0000,0000,,So how do you do? Dialogue: 0,1:04:09.31,1:04:10.96,Default,,0000,0000,0000,,Well, you at that point... Dialogue: 0,1:04:10.96,1:04:14.54,Default,,0000,0000,0000,,if you don't have a FreedomBox, the FreedomBox can't provide you with a solution to that problem. Dialogue: 0,1:04:14.54,1:04:16.81,Default,,0000,0000,0000,,What you're going to have to do, Dialogue: 0,1:04:16.81,1:04:19.02,Default,,0000,0000,0000,,is perhaps call your friends. Dialogue: 0,1:04:19.02,1:04:20.99,Default,,0000,0000,0000,,Have a conversation with them, Dialogue: 0,1:04:20.99,1:04:23.50,Default,,0000,0000,0000,,convince them that you are the person you say you are. Dialogue: 0,1:04:23.50,1:04:27.40,Default,,0000,0000,0000,,Reference your shared experiences, maybe they know your voice, Dialogue: 0,1:04:27.40,1:04:33.51,Default,,0000,0000,0000,,maybe they just know who you are by the way that you act and the way that you talk. Dialogue: 0,1:04:33.51,1:04:37.06,Default,,0000,0000,0000,,There's not going to be any one way that we get our keys back. Dialogue: 0,1:04:37.06,1:04:41.08,Default,,0000,0000,0000,,If you lose your key, yeah, we're not saying that's never going to be a problem. Dialogue: 0,1:04:41.08,1:04:43.91,Default,,0000,0000,0000,,And I wouldn't recommend splitting your key up among a hundred people, Dialogue: 0,1:04:43.91,1:04:48.53,Default,,0000,0000,0000,,because that's a lot of people to ask for your key back. Dialogue: 0,1:04:48.53,1:04:53.57,Default,,0000,0000,0000,,The mechanism I have in mind is not that you get a little bit of your key from Dialogue: 0,1:04:53.57,1:04:56.42,Default,,0000,0000,0000,,everyone you know, it's that you spread out the key among Dialogue: 0,1:04:56.42,1:05:00.00,Default,,0000,0000,0000,,a lot of people, and you need a certain number of those people. Dialogue: 0,1:05:00.00,1:05:02.69,Default,,0000,0000,0000,,So maybe it's five of seven of your friends. Dialogue: 0,1:05:02.69,1:05:06.73,Default,,0000,0000,0000,,So you give seven people the key, but any five of them could give you a whole key. Dialogue: 0,1:05:06.73,1:05:09.73,Default,,0000,0000,0000,,So in case you can't reach somebody you can still manage to do it. Dialogue: 0,1:05:09.73,1:05:12.89,Default,,0000,0000,0000,,And we can make that access control as fine-grained as we want, Dialogue: 0,1:05:12.89,1:05:15.86,Default,,0000,0000,0000,,but a hundred would be overwhelming. Dialogue: 0,1:05:15.86,1:05:20.50,Default,,0000,0000,0000,,We wouldn't do that. Sure, you could do it if you wanted, Dialogue: 0,1:05:20.50,1:05:23.48,Default,,0000,0000,0000,,but I don't think you'll have a hundred friends you could trust that much. Dialogue: 0,1:05:23.48,1:05:26.75,Default,,0000,0000,0000,,Maybe you do, I don't. Dialogue: 0,1:05:26.75,1:05:33.88,Default,,0000,0000,0000,,More questions, statements? Dialogue: 0,1:05:33.88,1:05:39.50,Default,,0000,0000,0000,,Yes? Dialogue: 0,1:05:39.50,1:05:47.25,Default,,0000,0000,0000,,Erm, it's just a wish... but have you thought about the idea of using the FreedomBox to create Dialogue: 0,1:05:47.25,1:05:51.90,Default,,0000,0000,0000,,a community where you can exchange not only data but like Dialogue: 0,1:05:51.90,1:05:58.77,Default,,0000,0000,0000,,products or services, so that would maybe like, change the system? Dialogue: 0,1:05:58.77,1:06:04.74,Default,,0000,0000,0000,,One of the things we want to do with the FreedomBox is Dialogue: 0,1:06:04.74,1:06:10.38,Default,,0000,0000,0000,,create a thing that looks a lot like your current social networking, Dialogue: 0,1:06:10.38,1:06:12.91,Default,,0000,0000,0000,,minus the advertising and the spying. Dialogue: 0,1:06:12.91,1:06:16.42,Default,,0000,0000,0000,,A way to talk to all your friends at once. Dialogue: 0,1:06:16.42,1:06:20.30,Default,,0000,0000,0000,,Once you have a place, a platform, where you can communicate Dialogue: 0,1:06:20.30,1:06:23.13,Default,,0000,0000,0000,,with your friends, you can build on that platform Dialogue: 0,1:06:23.13,1:06:25.06,Default,,0000,0000,0000,,and you can create structures like that. Dialogue: 0,1:06:25.06,1:06:29.07,Default,,0000,0000,0000,,If we make a thing that has programmable interfaces, so Dialogue: 0,1:06:29.07,1:06:32.67,Default,,0000,0000,0000,,you can make apps for it, you can make an app like that, Dialogue: 0,1:06:32.67,1:06:34.44,Default,,0000,0000,0000,,if that's important to you. Dialogue: 0,1:06:34.44,1:06:38.17,Default,,0000,0000,0000,,What people do with the communication once they have it, Dialogue: 0,1:06:38.17,1:06:40.40,Default,,0000,0000,0000,,we don't have any opinions about. Dialogue: 0,1:06:40.40,1:06:43.24,Default,,0000,0000,0000,,We want them to do everything that's important to them. Dialogue: 0,1:06:43.24,1:06:45.93,Default,,0000,0000,0000,,And I think something like that could be important, Dialogue: 0,1:06:45.93,1:07:03.41,Default,,0000,0000,0000,,and yeah, that would be amazing if that were to emerge. Dialogue: 0,1:07:03.41,1:07:08.34,Default,,0000,0000,0000,,Some things I believe are easier to do in a centralized architecture than a decentralized one, Dialogue: 0,1:07:08.34,1:07:12.82,Default,,0000,0000,0000,,for example search, or services that require a lot of bandwidth. Dialogue: 0,1:07:12.82,1:07:16.09,Default,,0000,0000,0000,,I don't see how you can run something like YouTube on the FreedomBox. Dialogue: 0,1:07:16.09,1:07:18.46,Default,,0000,0000,0000,,So is your utopian vision one where everything is decentralized, Dialogue: 0,1:07:18.46,1:07:23.92,Default,,0000,0000,0000,,or is it ok to have some centralized pieces in a future network? Dialogue: 0,1:07:23.92,1:07:28.84,Default,,0000,0000,0000,,Look, if you're going to grant me my utopia then of course everything is decentralized. Dialogue: 0,1:07:28.84,1:07:31.81,Default,,0000,0000,0000,,But we don't live in a utopia, I don't have magic. Dialogue: 0,1:07:31.81,1:07:38.55,Default,,0000,0000,0000,,We actually have in our flowchart a box labeled "magic routing", Dialogue: 0,1:07:38.55,1:07:41.22,Default,,0000,0000,0000,,because routing is hard to do in a decentralized way... Dialogue: 0,1:07:41.22,1:07:44.05,Default,,0000,0000,0000,,You need someone to tell you where the IPs are. Dialogue: 0,1:07:44.05,1:07:47.35,Default,,0000,0000,0000,,And that's hard to do in a decentralized way. Dialogue: 0,1:07:47.35,1:07:52.11,Default,,0000,0000,0000,,We haven't solved it, and we don't think we're going to fully solve it. Dialogue: 0,1:07:52.11,1:07:54.73,Default,,0000,0000,0000,,We hope someone else solves it first of all. Dialogue: 0,1:07:54.73,1:07:56.84,Default,,0000,0000,0000,,But second of all, we don't know where the compromises are. Dialogue: 0,1:07:56.84,1:07:59.21,Default,,0000,0000,0000,,Some things are not possible to decentralize. Dialogue: 0,1:07:59.21,1:08:01.86,Default,,0000,0000,0000,,We're going to decentralize as much as we can, Dialogue: 0,1:08:01.86,1:08:04.23,Default,,0000,0000,0000,,but we're not committing to doing anything impossible. Dialogue: 0,1:08:04.23,1:08:06.16,Default,,0000,0000,0000,,If you can't run YouTube off this box, Dialogue: 0,1:08:06.16,1:08:08.41,Default,,0000,0000,0000,,which I disagree with by the way, Dialogue: 0,1:08:08.41,1:08:10.01,Default,,0000,0000,0000,,then you won't, because it's impossible. Dialogue: 0,1:08:10.01,1:08:12.26,Default,,0000,0000,0000,,If you want to run YouTube on this box you turn all your Dialogue: 0,1:08:12.26,1:08:14.49,Default,,0000,0000,0000,,friends into your content delivery network, Dialogue: 0,1:08:14.49,1:08:16.74,Default,,0000,0000,0000,,and all your friends parallelize the distribution of the box, Dialogue: 0,1:08:16.74,1:08:18.37,Default,,0000,0000,0000,,you share the bandwidth. Dialogue: 0,1:08:18.37,1:08:20.62,Default,,0000,0000,0000,,It's ad-hoc, BitTorrent-like functionality. Dialogue: 0,1:08:20.62,1:08:24.22,Default,,0000,0000,0000,,Yes, that technology doesn't exist yet, I just made all that up, Dialogue: 0,1:08:24.22,1:08:27.19,Default,,0000,0000,0000,,but we can do it. Dialogue: 0,1:08:27.19,1:08:32.56,Default,,0000,0000,0000,,The parts that are hard though, the things like the routing, Dialogue: 0,1:08:32.56,1:08:35.06,Default,,0000,0000,0000,,there will be real compromises. Dialogue: 0,1:08:35.06,1:08:36.41,Default,,0000,0000,0000,,There will be real trade-offs. Dialogue: 0,1:08:36.41,1:08:39.99,Default,,0000,0000,0000,,There will be places where we'll say, you know what, we have Dialogue: 0,1:08:39.99,1:08:41.61,Default,,0000,0000,0000,,to rely on the DNS system. Dialogue: 0,1:08:41.61,1:08:44.96,Default,,0000,0000,0000,,Everybody in this room knows that the DNS system has some Dialogue: 0,1:08:44.96,1:08:48.09,Default,,0000,0000,0000,,security problems, some architectural problems that make it Dialogue: 0,1:08:48.09,1:08:51.69,Default,,0000,0000,0000,,a thing we would ideally not have to rely on. Dialogue: 0,1:08:51.69,1:08:55.87,Default,,0000,0000,0000,,But you know what? This project is not going to be able to replace DNS. Dialogue: 0,1:08:55.87,1:08:59.30,Default,,0000,0000,0000,,There are plenty of alternate DNS proposals out there, but we are not going to Dialogue: 0,1:08:59.30,1:09:02.58,Default,,0000,0000,0000,,just chuck the old DNS system, because we want people Dialogue: 0,1:09:02.58,1:09:05.55,Default,,0000,0000,0000,,to be able to get to the box, even if they don't have a box. Dialogue: 0,1:09:05.55,1:09:09.29,Default,,0000,0000,0000,,We want you to be able to serve services to the public. Dialogue: 0,1:09:09.29,1:09:13.91,Default,,0000,0000,0000,,We are going to use a lot of structures that are less than ideal. Dialogue: 0,1:09:13.91,1:09:16.30,Default,,0000,0000,0000,,We're assuming that TCP/IP is there... Dialogue: 0,1:09:16.30,1:09:19.41,Default,,0000,0000,0000,,in the normal use case you're using the internet backbone Dialogue: 0,1:09:19.41,1:09:22.66,Default,,0000,0000,0000,,to do your communication. Dialogue: 0,1:09:22.66,1:09:25.64,Default,,0000,0000,0000,,The mesh routing story we talked about is not how you do Dialogue: 0,1:09:25.64,1:09:30.49,Default,,0000,0000,0000,,your normal use. That's an emergency mode if there's a crisis, a political instability, a tsunami, Dialogue: 0,1:09:30.49,1:09:35.11,Default,,0000,0000,0000,,if you can't get to your regular internet because it has failed you in some way because Dialogue: 0,1:09:35.11,1:09:38.22,Default,,0000,0000,0000,,it has become oppressive or inaccessible. Dialogue: 0,1:09:38.22,1:09:40.61,Default,,0000,0000,0000,,Then you would use something like the mesh network. Dialogue: 0,1:09:40.61,1:09:44.05,Default,,0000,0000,0000,,But in the normal course of business, you are using Dialogue: 0,1:09:44.05,1:09:47.32,Default,,0000,0000,0000,,a thing that is less than ideal, and that's a trade-off. Dialogue: 0,1:09:47.32,1:09:49.53,Default,,0000,0000,0000,,We can't as a project protect you from everything. Dialogue: 0,1:09:49.53,1:09:51.32,Default,,0000,0000,0000,,We are going to look for the places where we can make Dialogue: 0,1:09:51.32,1:09:54.48,Default,,0000,0000,0000,,effective protection. We are going to try and make it clear Dialogue: 0,1:09:54.48,1:09:57.75,Default,,0000,0000,0000,,the limits of that protection. And we're going to give you Dialogue: 0,1:09:57.75,1:09:59.10,Default,,0000,0000,0000,,everything we can. Dialogue: 0,1:09:59.10,1:10:05.39,Default,,0000,0000,0000,,And then, as we move forward, when opportunities to solve new problems present themselves, Dialogue: 0,1:10:05.39,1:10:08.50,Default,,0000,0000,0000,,we'll take them. Dialogue: 0,1:10:08.50,1:10:16.30,Default,,0000,0000,0000,,Well I have to add before when we had the talk, unfortunately German you couldn't Dialogue: 0,1:10:16.30,1:10:19.28,Default,,0000,0000,0000,,understand a lot. Dialogue: 0,1:10:19.28,1:10:22.57,Default,,0000,0000,0000,,I didn't understand it but I could tell that it was occurring at a very high level of technical competence Dialogue: 0,1:10:22.57,1:10:25.73,Default,,0000,0000,0000,,and that there was a lot of good information there. Dialogue: 0,1:10:25.73,1:10:28.70,Default,,0000,0000,0000,,And I'm really hoping that you'll take the video of it and put it up on universalsubtitles.org, or some Dialogue: 0,1:10:28.70,1:10:33.18,Default,,0000,0000,0000,,other service where people can subtitle it. And hopefully there'll be an English version and I'll get Dialogue: 0,1:10:33.18,1:10:35.88,Default,,0000,0000,0000,,to see it. I think there was a lot of really good information in there. Dialogue: 0,1:10:35.88,1:10:38.27,Default,,0000,0000,0000,,What's universalsubtitles.org? Dialogue: 0,1:10:38.27,1:10:46.35,Default,,0000,0000,0000,,Universalsubtitles.org is a great website. It's kind of like, you put a video up, and anyone can Dialogue: 0,1:10:46.35,1:10:49.02,Default,,0000,0000,0000,,add subtitles to as much or as little as they want. Dialogue: 0,1:10:49.02,1:10:53.78,Default,,0000,0000,0000,,And then other people can change the subtitles, and you can do it in as many languages as you want. Dialogue: 0,1:10:53.78,1:10:59.21,Default,,0000,0000,0000,,So you don't have to ask someone for a favour, "hey, will you subtitle my video?" Dialogue: 0,1:10:59.21,1:11:03.07,Default,,0000,0000,0000,,that's 20 minutes long or an hour long. You tell a community of people "we need help subtitling", Dialogue: 0,1:11:03.07,1:11:08.55,Default,,0000,0000,0000,,and everyone goes and subtitles 3 minutes in their favourite languages. Dialogue: 0,1:11:08.55,1:11:15.42,Default,,0000,0000,0000,,It's a very effective way to crowdsouce subtitling, and it's a very effective way to just share information. Dialogue: 0,1:11:15.42,1:11:20.95,Default,,0000,0000,0000,,We have a lot of videos with good information that are locked into languages that not everyone speaks. Dialogue: 0,1:11:20.95,1:11:22.71,Default,,0000,0000,0000,,So this is a way to get around that. Dialogue: 0,1:11:22.71,1:11:25.43,Default,,0000,0000,0000,,As FreedomBox, we use that project. Dialogue: 0,1:11:25.43,1:11:28.10,Default,,0000,0000,0000,,And I believe, if I'm not mistaken, I haven't looked in a while, Dialogue: 0,1:11:28.10,1:11:33.02,Default,,0000,0000,0000,,that it's all Free software that they are using. So you can download it and start your own if you want. Dialogue: 0,1:11:33.02,1:11:41.75,Default,,0000,0000,0000,,So back to my previous question - in the talk in the afternoon we heard about mesh networking Dialogue: 0,1:11:41.75,1:11:44.86,Default,,0000,0000,0000,,we talked about that, and it's actually not just being used in Dialogue: 0,1:11:44.86,1:11:46.81,Default,,0000,0000,0000,,emergency situations but people are really using it. Dialogue: 0,1:11:46.81,1:11:52.85,Default,,0000,0000,0000,,And especially, the philosophy that everyone becomes part of the net as not just a consumer Dialogue: 0,1:11:52.85,1:11:58.63,Default,,0000,0000,0000,,but providing part of the net, it certainly is like that that they Dialogue: 0,1:11:58.63,1:12:01.19,Default,,0000,0000,0000,,can share data among each other, they don't necessarily need Dialogue: 0,1:12:01.19,1:12:03.42,Default,,0000,0000,0000,,to go into the internet. Dialogue: 0,1:12:03.42,1:12:07.16,Default,,0000,0000,0000,,So, I would imagine the FreedomBox, with mesh networking, Dialogue: 0,1:12:07.16,1:12:10.59,Default,,0000,0000,0000,,we could essentially create a large network of many many Dialogue: 0,1:12:10.59,1:12:12.38,Default,,0000,0000,0000,,people using it. Dialogue: 0,1:12:12.38,1:12:17.46,Default,,0000,0000,0000,,We also talked about the mesh networking like FunkFeuer in Graz or Vienna Dialogue: 0,1:12:17.46,1:12:21.16,Default,,0000,0000,0000,,but it would be interesting to get them on mobile devices, Dialogue: 0,1:12:21.16,1:12:23.27,Default,,0000,0000,0000,,so that you could walk through the street, Dialogue: 0,1:12:23.27,1:12:30.38,Default,,0000,0000,0000,,theoretically people have these devices, and you could walk Dialogue: 0,1:12:30.38,1:12:32.02,Default,,0000,0000,0000,,through and it would automatically mesh and connect you. Dialogue: 0,1:12:32.02,1:12:37.83,Default,,0000,0000,0000,,So FreedomBox if applied to that, you told me this interesting example, you could screw them to Dialogue: 0,1:12:37.83,1:12:41.66,Default,,0000,0000,0000,,light posts on the street, so maybe elaborate on that, Dialogue: 0,1:12:41.66,1:12:44.49,Default,,0000,0000,0000,,maybe it could have an effect and give a lot of coverage. Dialogue: 0,1:12:44.49,1:12:48.97,Default,,0000,0000,0000,,The reason why we currently envision mesh, Dialogue: 0,1:12:48.97,1:12:50.62,Default,,0000,0000,0000,,and no decisions have been made, right, Dialogue: 0,1:12:50.62,1:12:54.20,Default,,0000,0000,0000,,but just in the way we think about it when we talk to each other, Dialogue: 0,1:12:54.20,1:12:58.22,Default,,0000,0000,0000,,and the reason why we think mesh networking is not your daily Dialogue: 0,1:12:58.22,1:13:03.30,Default,,0000,0000,0000,,mode of use is that the performance degradation is not acceptable to most end-users. Dialogue: 0,1:13:03.30,1:13:06.30,Default,,0000,0000,0000,,If mesh networking reaches the point where it is acceptable Dialogue: 0,1:13:06.30,1:13:09.73,Default,,0000,0000,0000,,if you're in a place where there's enough nodes, and you Dialogue: 0,1:13:09.73,1:13:13.03,Default,,0000,0000,0000,,have a density that you can move around then sure, that Dialogue: 0,1:13:13.03,1:13:15.84,Default,,0000,0000,0000,,can make a lot of sense. But for a lot of people who Dialogue: 0,1:13:15.84,1:13:19.25,Default,,0000,0000,0000,,exist as a person not near a lot of FreedomBoxes, they're Dialogue: 0,1:13:19.25,1:13:21.67,Default,,0000,0000,0000,,going to need the regular internet. Dialogue: 0,1:13:21.67,1:13:26.10,Default,,0000,0000,0000,,So yeah, we think mesh will be great where you have that Dialogue: 0,1:13:26.10,1:13:29.10,Default,,0000,0000,0000,,density, when the mesh technology is mature. Dialogue: 0,1:13:29.10,1:13:33.84,Default,,0000,0000,0000,,When that happens, we could have the most easy access Dialogue: 0,1:13:33.84,1:13:38.46,Default,,0000,0000,0000,,to municipal wifi by using the power in all the street Dialogue: 0,1:13:38.46,1:13:43.38,Default,,0000,0000,0000,,lights. Put a FreedomBox up in the top of every street lamp. Dialogue: 0,1:13:43.38,1:13:47.86,Default,,0000,0000,0000,,Unscrew the light bulb, screw in the FreedomBox, and screw the light bulb back on top. Dialogue: 0,1:13:47.86,1:13:51.13,Default,,0000,0000,0000,,So you still get light, we're not going to plunge you into darkness. Dialogue: 0,1:13:51.13,1:13:56.36,Default,,0000,0000,0000,,You still get light, but then you have a mesh node. Right there. Dialogue: 0,1:13:56.36,1:14:00.70,Default,,0000,0000,0000,,And you could do every 3rd or 4th street light down town, and you could cover Dialogue: 0,1:14:00.70,1:14:02.79,Default,,0000,0000,0000,,an area rather effectively. Dialogue: 0,1:14:02.79,1:14:07.11,Default,,0000,0000,0000,,It is a way to get simple municipal wifi without running Dialogue: 0,1:14:07.11,1:14:10.22,Default,,0000,0000,0000,,any fibre. And every time you have fibre you can link to it. Dialogue: 0,1:14:10.22,1:14:13.80,Default,,0000,0000,0000,,Like any time you're near fibre you can link to it and you'll Dialogue: 0,1:14:13.80,1:14:18.86,Default,,0000,0000,0000,,get your information out of that little mesh and into the regular network. Dialogue: 0,1:14:18.86,1:14:23.94,Default,,0000,0000,0000,,We could have municipal wifi with much lower infrastructure costs than most people currently think of Dialogue: 0,1:14:23.94,1:14:28.87,Default,,0000,0000,0000,,when they think of municipal wifi. And we can do it through mesh nodes. Dialogue: 0,1:14:28.87,1:14:33.95,Default,,0000,0000,0000,,And if we did it through mesh nodes we would be providing that service not only to people who have Dialogue: 0,1:14:33.95,1:14:38.57,Default,,0000,0000,0000,,FreedomBoxes, that just looks like wifi, it just looks like a regular connection. Dialogue: 0,1:14:38.57,1:14:45.58,Default,,0000,0000,0000,,You might need to do some fancy hopping, but it's not... Dialogue: 0,1:14:45.58,1:14:51.11,Default,,0000,0000,0000,,the mesh boxes themselves will do the fancy hopping, your phone itself won't have to do it. Dialogue: 0,1:14:51.11,1:14:54.08,Default,,0000,0000,0000,,While we are talking about phones, Dialogue: 0,1:14:54.08,1:14:59.01,Default,,0000,0000,0000,,I want to say that I'm not sure how phones fit into the FreedomBox. Dialogue: 0,1:14:59.01,1:15:02.42,Default,,0000,0000,0000,,I'm pretty sure there is a way that phones fit into FreedomBoxes, Dialogue: 0,1:15:02.42,1:15:05.86,Default,,0000,0000,0000,,but you can't trust your phone. Dialogue: 0,1:15:05.86,1:15:09.46,Default,,0000,0000,0000,,With the so-called smartphones it's not a phone actually but a little computer, no? Dialogue: 0,1:15:09.46,1:15:12.45,Default,,0000,0000,0000,,Yes, your phone, a smartphone is a little computer but Dialogue: 0,1:15:12.45,1:15:16.47,Default,,0000,0000,0000,,it's not a computer that you can trust, because Dialogue: 0,1:15:16.47,1:15:20.62,Default,,0000,0000,0000,,even if you replace the software on your phone, Dialogue: 0,1:15:20.62,1:15:26.89,Default,,0000,0000,0000,,with Free software, it's almost impossible to actually replace all the binary drivers, Dialogue: 0,1:15:26.89,1:15:29.73,Default,,0000,0000,0000,,it's almost impossible to go all the way down to the metal. Dialogue: 0,1:15:29.73,1:15:31.82,Default,,0000,0000,0000,,It's very hard to get a phone that is completely trustworthy Dialogue: 0,1:15:31.82,1:15:35.09,Default,,0000,0000,0000,,all the way down to the bottom of the stack. Dialogue: 0,1:15:35.09,1:15:37.20,Default,,0000,0000,0000,,So that's a problem we haven't quite figured out how to solve. Dialogue: 0,1:15:37.20,1:15:42.38,Default,,0000,0000,0000,,And pretty soon it's going to be impossible to put Free software on phones. Dialogue: 0,1:15:42.38,1:15:47.70,Default,,0000,0000,0000,,The days of jailbreaking your iPhone and rooting your Android phone might Dialogue: 0,1:15:47.70,1:15:55.01,Default,,0000,0000,0000,,very well come to an end. There is a proposal right now called UEFI. Dialogue: 0,1:15:55.01,1:16:01.03,Default,,0000,0000,0000,,It's a standard. We currently use EFI, this would be UEFI. Dialogue: 0,1:16:01.03,1:16:03.53,Default,,0000,0000,0000,,I don't know what it stands for, it's a new thing. Dialogue: 0,1:16:03.53,1:16:08.25,Default,,0000,0000,0000,,And what this proposal is, is that before your computer, Dialogue: 0,1:16:08.25,1:16:14.31,Default,,0000,0000,0000,,before the BIOS will load a bootloader on your computer Dialogue: 0,1:16:14.31,1:16:17.86,Default,,0000,0000,0000,,that BIOS has to authenticate, sorry, that bootloader has Dialogue: 0,1:16:17.86,1:16:20.11,Default,,0000,0000,0000,,to authenticate to the BIOS. It has to be signed by someone Dialogue: 0,1:16:20.11,1:16:23.11,Default,,0000,0000,0000,,the BIOS trusts, someone the BIOS manufacturer trusts. Dialogue: 0,1:16:23.11,1:16:25.78,Default,,0000,0000,0000,,And the person who puts the BIOS in your phone can decide who it trusts, Dialogue: 0,1:16:25.78,1:16:29.49,Default,,0000,0000,0000,,and they can decide they don't trust anyone except themselves. Dialogue: 0,1:16:29.49,1:16:36.62,Default,,0000,0000,0000,,If Apple sells you an iPhone with a BIOS that requires a Dialogue: 0,1:16:36.62,1:16:39.73,Default,,0000,0000,0000,,signed operating system, it might be very hard for you to Dialogue: 0,1:16:39.73,1:16:43.17,Default,,0000,0000,0000,,get another version of the operating system on there. Dialogue: 0,1:16:43.17,1:16:49.100,Default,,0000,0000,0000,,The proposals for this stuff are really in the realm of laptops and computers, that's where it's starting, Dialogue: 0,1:16:49.100,1:16:53.16,Default,,0000,0000,0000,,but believe me, technology spreads. Dialogue: 0,1:16:53.16,1:16:58.98,Default,,0000,0000,0000,,And if you want to be able to put Linux on a computer that you buy, on a laptop you buy, Dialogue: 0,1:16:58.98,1:17:03.46,Default,,0000,0000,0000,,very soon you might have a very difficult time doing that. Dialogue: 0,1:17:03.46,1:17:05.25,Default,,0000,0000,0000,,The standard is there, the companies paying attention to it Dialogue: 0,1:17:05.25,1:17:08.39,Default,,0000,0000,0000,,are not paying attention to it for our purposes. Dialogue: 0,1:17:08.39,1:17:12.57,Default,,0000,0000,0000,,They want to make sure that they can control what is on your computer. Dialogue: 0,1:17:12.57,1:17:17.60,Default,,0000,0000,0000,,So this is, you know, another political fight that we're going to engage in, Dialogue: 0,1:17:17.60,1:17:20.14,Default,,0000,0000,0000,,not the FreedomBox, but the community. Dialogue: 0,1:17:20.14,1:17:25.52,Default,,0000,0000,0000,,We're going to have to have this fight. UEFI. Look it up. Dialogue: 0,1:17:25.52,1:17:32.54,Default,,0000,0000,0000,,Start thinking about it. This is going to be a big piece of the puzzle for freedom in computing over Dialogue: 0,1:17:32.54,1:17:34.18,Default,,0000,0000,0000,,the next few years. Dialogue: 0,1:17:34.18,1:17:38.94,Default,,0000,0000,0000,,We're going to have some problems and we're going to have to find some solutions. Dialogue: 0,1:17:38.94,1:17:44.75,Default,,0000,0000,0000,,But wouldn't such an initiative, wouldn't that create a good market for companies who actually Dialogue: 0,1:17:44.75,1:17:49.60,Default,,0000,0000,0000,,would supply Linux on such devices, on the phone and on the laptop market. Dialogue: 0,1:17:49.60,1:17:53.16,Default,,0000,0000,0000,,I'm sure there are companies supplying that. Dialogue: 0,1:17:53.16,1:17:54.66,Default,,0000,0000,0000,,Absolutely. Dialogue: 0,1:17:54.66,1:17:58.22,Default,,0000,0000,0000,,And if the market in freedom were good enough to support Dialogue: 0,1:17:58.22,1:18:02.70,Default,,0000,0000,0000,,large-scale manufacturing and all that other stuff then we might get that. Dialogue: 0,1:18:02.70,1:18:05.32,Default,,0000,0000,0000,,And we might get that anyway. Dialogue: 0,1:18:05.32,1:18:07.13,Default,,0000,0000,0000,,I mean, the standard will include as many keys as you want, Dialogue: 0,1:18:07.13,1:18:08.64,Default,,0000,0000,0000,,so we might get the freedom. Dialogue: 0,1:18:08.64,1:18:12.66,Default,,0000,0000,0000,,But the manufacturers will have a really convenient way to turn the freedom off. Dialogue: 0,1:18:12.66,1:18:16.70,Default,,0000,0000,0000,,I think there will be a lot of boxes where you will have freedom. Dialogue: 0,1:18:16.70,1:18:21.62,Default,,0000,0000,0000,,But there will also be a lot where right now we think we can get Free software onto it, Dialogue: 0,1:18:21.62,1:18:24.02,Default,,0000,0000,0000,,where we won't be able to anymore. Dialogue: 0,1:18:24.02,1:18:25.96,Default,,0000,0000,0000,,It's going to be a narrowing of the market. Dialogue: 0,1:18:25.96,1:18:28.94,Default,,0000,0000,0000,,I don't think our freedom is going to completely disappear from devices. Dialogue: 0,1:18:28.94,1:18:33.12,Default,,0000,0000,0000,,But a lot of devices, if you buy the device without thinking about freedom, assuming you can have it, Dialogue: 0,1:18:33.12,1:18:37.58,Default,,0000,0000,0000,,you might get it home and discover that you can't. Dialogue: 0,1:18:37.58,1:18:45.26,Default,,0000,0000,0000,,Ok, we want to give the floor again to the audience for more questions or statements. Dialogue: 0,1:18:45.26,1:18:52.09,Default,,0000,0000,0000,,Ok, there in the back, one more. Dialogue: 0,1:18:52.09,1:18:54.78,Default,,0000,0000,0000,,Yeah, one more time, so... Dialogue: 0,1:18:54.78,1:19:01.49,Default,,0000,0000,0000,,Nowadays, where you can hardly really save your PC, laptop, whatever, against malware... Dialogue: 0,1:19:01.49,1:19:16.28,Default,,0000,0000,0000,,Isn't it really, a red carpet for hackers to, if you have social networks and circles of friends, Dialogue: 0,1:19:16.28,1:19:21.92,Default,,0000,0000,0000,,one gets some malware on his PC, mobile device, whatever, Dialogue: 0,1:19:21.92,1:19:26.68,Default,,0000,0000,0000,,has a FreedomBox, authenticates to his friends, the state is secure Dialogue: 0,1:19:26.68,1:19:32.47,Default,,0000,0000,0000,,wouldn't that open doors? Dialogue: 0,1:19:32.47,1:19:37.20,Default,,0000,0000,0000,,Sure, well, the human error is not one we can control for. Dialogue: 0,1:19:37.20,1:19:45.12,Default,,0000,0000,0000,,But someone who has a key that you trust is not necessarily someone who you let run arbitrary code Dialogue: 0,1:19:45.12,1:19:48.07,Default,,0000,0000,0000,,on your FreedomBox. Dialogue: 0,1:19:48.07,1:19:52.72,Default,,0000,0000,0000,,You might trust them to the point of having message passing with them, and trusting who they are Dialogue: 0,1:19:52.72,1:19:56.24,Default,,0000,0000,0000,,and what they say, but you don't necessarily trust the technology that they have and the Dialogue: 0,1:19:56.24,1:19:58.96,Default,,0000,0000,0000,,code that they have to be free of malware. Dialogue: 0,1:19:58.96,1:20:00.86,Default,,0000,0000,0000,,You'll still have to do all the things you currently do. Dialogue: 0,1:20:00.86,1:20:04.14,Default,,0000,0000,0000,,Right now if somebody sends you a file, it could have malware in it. Dialogue: 0,1:20:04.14,1:20:08.02,Default,,0000,0000,0000,,We're not making that easier, or better, or more likely to happen. Dialogue: 0,1:20:08.02,1:20:15.01,Default,,0000,0000,0000,,I think what we are doing is completely orthogonal to that problem. Dialogue: 0,1:20:15.01,1:20:19.44,Default,,0000,0000,0000,,At the same time, if we were to have email services on the box, Dialogue: 0,1:20:19.44,1:20:23.16,Default,,0000,0000,0000,,and you know we're not quite sure what the email story of a box like this looks like, Dialogue: 0,1:20:23.16,1:20:26.73,Default,,0000,0000,0000,,we probably would want to include some sort of virus scanning or spam catching, Dialogue: 0,1:20:26.73,1:20:31.75,Default,,0000,0000,0000,,all the usual filtering tools to give you whatever measure of protection might currently exist. Dialogue: 0,1:20:31.75,1:20:35.04,Default,,0000,0000,0000,,But the fact someone has a key and you know who they are Dialogue: 0,1:20:35.04,1:20:39.08,Default,,0000,0000,0000,,I don't think that will ever be the security hole. Dialogue: 0,1:20:39.08,1:20:42.22,Default,,0000,0000,0000,,Or at least we really hope we can make it so it's not. Dialogue: 0,1:20:42.22,1:20:48.93,Default,,0000,0000,0000,,If we fail in that then we've missed a trick. Dialogue: 0,1:20:48.93,1:20:53.69,Default,,0000,0000,0000,,Ok, any more statements or questions? Dialogue: 0,1:20:53.69,1:20:56.96,Default,,0000,0000,0000,,Ok, so, James, my last question would be... Dialogue: 0,1:20:56.96,1:20:59.24,Default,,0000,0000,0000,,You can actually buy the box right now? Dialogue: 0,1:20:59.24,1:21:00.42,Default,,0000,0000,0000,,Yes. Dialogue: 0,1:21:00.42,1:21:01.61,Default,,0000,0000,0000,,From a company? Dialogue: 0,1:21:01.61,1:21:02.96,Default,,0000,0000,0000,,Yes. Dialogue: 0,1:21:02.96,1:21:05.95,Default,,0000,0000,0000,,Maybe you can supply that information. But the software is being developed? Dialogue: 0,1:21:05.95,1:21:07.30,Default,,0000,0000,0000,,Yes. Dialogue: 0,1:21:07.30,1:21:11.90,Default,,0000,0000,0000,,Can you give an estimation about the timeline of your project, or the next milestones? Dialogue: 0,1:21:11.90,1:21:13.10,Default,,0000,0000,0000,,Sure. Dialogue: 0,1:21:13.10,1:21:16.96,Default,,0000,0000,0000,,So, the boxes are manufactures by a company called Globalscale, Dialogue: 0,1:21:16.96,1:21:18.58,Default,,0000,0000,0000,,they're about $140 US dollars. Dialogue: 0,1:21:18.58,1:21:24.22,Default,,0000,0000,0000,,There is a slightly older model called the SheevaPlug that is about $90. Dialogue: 0,1:21:24.22,1:21:28.10,Default,,0000,0000,0000,,It does just pretty much everything the Dreamplug does. Dialogue: 0,1:21:28.10,1:21:31.82,Default,,0000,0000,0000,,It has some heat sinking issues, but it's a pretty good box as well, Dialogue: 0,1:21:31.82,1:21:38.97,Default,,0000,0000,0000,,so if the price point matters to you you can get last year's model and it'll serve you just fine. Dialogue: 0,1:21:38.97,1:21:43.01,Default,,0000,0000,0000,,The software, right now we have a bare Linux distribution. Dialogue: 0,1:21:43.01,1:21:45.84,Default,,0000,0000,0000,,We spent a lot of time getting the binary blobs out of the kernel Dialogue: 0,1:21:45.84,1:21:50.32,Default,,0000,0000,0000,,and making it installable onto this hardware target. Dialogue: 0,1:21:50.32,1:21:54.80,Default,,0000,0000,0000,,We have a Jabber server, Prosody, that we are modifying to suit our needs. Dialogue: 0,1:21:54.80,1:22:00.80,Default,,0000,0000,0000,,And that should be ready, time-frame, weeks. Dialogue: 0,1:22:00.80,1:22:03.74,Default,,0000,0000,0000,,Some short number of weeks. Dialogue: 0,1:22:03.74,1:22:09.64,Default,,0000,0000,0000,,The Privoxy server, the SSH forwarding, some short number of months. Dialogue: 0,1:22:09.64,1:22:16.86,Default,,0000,0000,0000,,But those are our roadmap for the short-term future, is Jabber, SSH forwarding, browser proxying. Dialogue: 0,1:22:16.86,1:22:22.78,Default,,0000,0000,0000,,We also are working on the interface, so we're going to have an interface that you can actually Dialogue: 0,1:22:22.78,1:22:24.74,Default,,0000,0000,0000,,control some of these services with. Dialogue: 0,1:22:24.74,1:22:28.17,Default,,0000,0000,0000,,And the first thing we're doing with that interface is probably allowing you to Dialogue: 0,1:22:28.17,1:22:30.84,Default,,0000,0000,0000,,configure this box as a wireless router. Dialogue: 0,1:22:30.84,1:22:35.63,Default,,0000,0000,0000,,So it can become your wireless access point if you want it to be. Dialogue: 0,1:22:35.63,1:22:38.18,Default,,0000,0000,0000,,And your gateway of course. Dialogue: 0,1:22:38.18,1:22:39.94,Default,,0000,0000,0000,,So user interface in one vertical, Dialogue: 0,1:22:39.94,1:22:44.15,Default,,0000,0000,0000,,SSH forwarding, browser proxying a little bit out there, Dialogue: 0,1:22:44.15,1:22:47.58,Default,,0000,0000,0000,,a little bit closer: Jabber, XMPP secure chat. Dialogue: 0,1:22:47.58,1:22:52.65,Default,,0000,0000,0000,,And once we have that stack, we believe that we're going to build upwards from XMPP towards Dialogue: 0,1:22:52.65,1:22:55.66,Default,,0000,0000,0000,,perhaps something like BuddyCloud. Dialogue: 0,1:22:55.66,1:22:58.78,Default,,0000,0000,0000,,We're seriously looking at BuddyCloud and seeing what problems it solves for us Dialogue: 0,1:22:58.78,1:23:05.58,Default,,0000,0000,0000,,in terms of actually letting users group themselves in ways that they can then do access control Dialogue: 0,1:23:05.58,1:23:08.69,Default,,0000,0000,0000,,and channels and things of that nature. Dialogue: 0,1:23:08.69,1:23:13.89,Default,,0000,0000,0000,,And are you actually in contact with the hardware company producing the servers? Dialogue: 0,1:23:13.89,1:23:19.42,Default,,0000,0000,0000,,Yeah, we've had a number of conversations with them. Dialogue: 0,1:23:19.42,1:23:22.09,Default,,0000,0000,0000,,They've agreed that when our code is ready this is something Dialogue: 0,1:23:22.09,1:23:24.50,Default,,0000,0000,0000,,they are very interested in distributing. Dialogue: 0,1:23:24.50,1:23:26.73,Default,,0000,0000,0000,,More importantly we've had a lot of conversations with Dialogue: 0,1:23:26.73,1:23:28.82,Default,,0000,0000,0000,,them about freedom. Dialogue: 0,1:23:28.82,1:23:31.22,Default,,0000,0000,0000,,About why we do what we do, they way we do. Dialogue: 0,1:23:31.22,1:23:35.42,Default,,0000,0000,0000,,And how they need to act if they want to distribute code for Dialogue: 0,1:23:35.42,1:23:37.48,Default,,0000,0000,0000,,us and work with our community. Dialogue: 0,1:23:37.48,1:23:39.16,Default,,0000,0000,0000,,And what that means is we're teaching them how to comply Dialogue: 0,1:23:39.16,1:23:41.83,Default,,0000,0000,0000,,with the GPL, and we're teaching them how to remove the binary drivers, Dialogue: 0,1:23:41.83,1:23:45.70,Default,,0000,0000,0000,,and in fact we're doing some of that for them. Dialogue: 0,1:23:45.70,1:23:47.49,Default,,0000,0000,0000,,But they're Chinese, right? Dialogue: 0,1:23:47.49,1:23:49.14,Default,,0000,0000,0000,,No. No, Globalscale is not a Chinese company. Dialogue: 0,1:23:49.14,1:23:53.62,Default,,0000,0000,0000,,Their manufacturing is in China, but they're not a Chinese company. Dialogue: 0,1:23:53.62,1:23:58.22,Default,,0000,0000,0000,,And we're also talking to Marvel. Marvel makes the system-on-a-chip that goes onto the boards Dialogue: 0,1:23:58.22,1:24:00.84,Default,,0000,0000,0000,,that Globalscale is integrating into their boxes. Dialogue: 0,1:24:00.84,1:24:05.90,Default,,0000,0000,0000,,But we're also talking to Marvel about what they can do to better serve the needs of our community. Dialogue: 0,1:24:05.90,1:24:13.01,Default,,0000,0000,0000,,So a large part of our efforts is to try to convince manufacturers to make Dialogue: 0,1:24:13.01,1:24:14.96,Default,,0000,0000,0000,,hardware that suits our needs. Dialogue: 0,1:24:14.96,1:24:16.89,Default,,0000,0000,0000,,This box is a thing that they developed, they invented, Dialogue: 0,1:24:16.89,1:24:18.54,Default,,0000,0000,0000,,before they ever met us, before they ever heard of us. Dialogue: 0,1:24:18.54,1:24:23.62,Default,,0000,0000,0000,,And if we can get them enough business, Dialogue: 0,1:24:23.62,1:24:27.36,Default,,0000,0000,0000,,if by making FreedomBoxes and by putting our software on the box, Dialogue: 0,1:24:27.36,1:24:30.77,Default,,0000,0000,0000,,that enables them to sell more boxes they will be very happy Dialogue: 0,1:24:30.77,1:24:34.49,Default,,0000,0000,0000,,and when they design the next generation, Dialogue: 0,1:24:34.49,1:24:39.41,Default,,0000,0000,0000,,not the next generation of the DreamPlug, but the next generation after whatever they're designing now, Dialogue: 0,1:24:39.41,1:24:41.62,Default,,0000,0000,0000,,so we're talking a couple of years from now. Dialogue: 0,1:24:41.62,1:24:44.71,Default,,0000,0000,0000,,We can say to them, look, you're selling a lot of boxes Dialogue: 0,1:24:44.71,1:24:48.72,Default,,0000,0000,0000,,because you're making a thing that serves the free world very well. Dialogue: 0,1:24:48.72,1:24:52.28,Default,,0000,0000,0000,,Remove the 8 inch audio jack because our people don't need it. Dialogue: 0,1:24:52.28,1:24:55.55,Default,,0000,0000,0000,,Add a second wifi radio. Put antenna ports on it. Dialogue: 0,1:24:55.55,1:25:00.29,Default,,0000,0000,0000,,This box can go from something that looks really good for our purpose to Dialogue: 0,1:25:00.29,1:25:02.38,Default,,0000,0000,0000,,being something that looks amazingly good for our purpose. Dialogue: 0,1:25:02.38,1:25:05.21,Default,,0000,0000,0000,,And that will require scale. Dialogue: 0,1:25:05.21,1:25:07.44,Default,,0000,0000,0000,,And what that means is that the FreedomBox becomes a wedge for Dialogue: 0,1:25:07.44,1:25:13.38,Default,,0000,0000,0000,,making better hardware for everyone. Dialogue: 0,1:25:13.38,1:25:16.33,Default,,0000,0000,0000,,But it's not just the FreedomBox. The Tor router project is Dialogue: 0,1:25:16.33,1:25:21.37,Default,,0000,0000,0000,,also focused on the DreamPlug. They've also decided this is a good box for their purpose. Dialogue: 0,1:25:21.37,1:25:26.25,Default,,0000,0000,0000,,If you are making a box that is kind of like a FreedomBox but isn't the FreedomBox because Dialogue: 0,1:25:26.25,1:25:30.70,Default,,0000,0000,0000,,it's more specialised to what you want it for, think about Dialogue: 0,1:25:30.70,1:25:35.91,Default,,0000,0000,0000,,the DreamPlug as a hardware target. And let us know, Dialogue: 0,1:25:35.91,1:25:38.60,Default,,0000,0000,0000,,so that when we go to the company, we can say look, Dialogue: 0,1:25:38.60,1:25:42.45,Default,,0000,0000,0000,,look at all the business you are getting by being people that serve the Free world. Dialogue: 0,1:25:42.45,1:25:52.14,Default,,0000,0000,0000,,And then, hopefully, we can convince them to make boxes that better serve the Free world. Dialogue: 0,1:25:52.14,1:25:55.43,Default,,0000,0000,0000,,And that's not a fantasy. We are having those conversations with them, Dialogue: 0,1:25:55.43,1:25:57.82,Default,,0000,0000,0000,,and they are very receptive. Dialogue: 0,1:25:57.82,1:26:00.17,Default,,0000,0000,0000,,So I am pretty happy about that aspect we do. Dialogue: 0,1:26:00.17,1:26:02.86,Default,,0000,0000,0000,,And my last question would be... Dialogue: 0,1:26:02.86,1:26:05.40,Default,,0000,0000,0000,,since we are now, everything is turning mobile, Dialogue: 0,1:26:05.40,1:26:07.18,Default,,0000,0000,0000,,it's like we have these computers with an extra phone... Dialogue: 0,1:26:07.18,1:26:08.65,Default,,0000,0000,0000,,the phone is a small application on these devices. Dialogue: 0,1:26:08.65,1:26:13.24,Default,,0000,0000,0000,,Is there any plan or any idea or any project to say like, have Dialogue: 0,1:26:13.24,1:26:18.26,Default,,0000,0000,0000,,a FreedomPhone or Free mobile device? Dialogue: 0,1:26:18.26,1:26:23.02,Default,,0000,0000,0000,,So the way you connect to this box is kind of how you connect to your router, Dialogue: 0,1:26:23.02,1:26:24.64,Default,,0000,0000,0000,,port 80, browser. Dialogue: 0,1:26:24.64,1:26:28.54,Default,,0000,0000,0000,,But another way you could do it would be an app on your cellphone that bluetooths to the box. Dialogue: 0,1:26:28.54,1:26:33.61,Default,,0000,0000,0000,,I don't actually think the box has bluetooth, but you know, Dialogue: 0,1:26:33.61,1:26:36.32,Default,,0000,0000,0000,,an app on your cellphone that talks to the box over the network, say. Dialogue: 0,1:26:36.32,1:26:38.23,Default,,0000,0000,0000,,That's possible, we're thinking about that. Dialogue: 0,1:26:38.23,1:26:41.22,Default,,0000,0000,0000,,We're thinking about what that looks like for the large population Dialogue: 0,1:26:41.22,1:26:43.57,Default,,0000,0000,0000,,that exists out there that doesn't have computers. Dialogue: 0,1:26:43.57,1:26:46.84,Default,,0000,0000,0000,,There's an awful lot of people that only have cellphones, they don't have computers. Dialogue: 0,1:26:46.84,1:26:49.10,Default,,0000,0000,0000,,And we want them to have freedom too. Dialogue: 0,1:26:49.10,1:26:50.88,Default,,0000,0000,0000,,So figuring out how we can use a cellphone to talk to the box is a future problem. Dialogue: 0,1:26:50.88,1:26:51.76,Default,,0000,0000,0000,,We're not working on it right now, but we're certainly talking Dialogue: 0,1:26:51.76,1:26:57.29,Default,,0000,0000,0000,,about where it fits into the roadmap. Dialogue: 0,1:26:57.29,1:27:01.26,Default,,0000,0000,0000,,And that's why we are concerned about whether or not you Dialogue: 0,1:27:01.26,1:27:05.23,Default,,0000,0000,0000,,can trust your phone. Dialogue: 0,1:27:05.23,1:27:07.30,Default,,0000,0000,0000,,Because if you can trust your FreedomBox, but not the Dialogue: 0,1:27:07.30,1:27:09.67,Default,,0000,0000,0000,,thing you use to access it then you don't really have the privacy you think you have. Dialogue: 0,1:27:09.67,1:27:12.66,Default,,0000,0000,0000,,So, figuring out, can you trust your cellphone? Is a big part of the puzzle. Dialogue: 0,1:27:12.66,1:27:17.72,Default,,0000,0000,0000,,It's a big thing that we don't know how to do yet. Dialogue: 0,1:27:17.72,1:27:21.46,Default,,0000,0000,0000,,So let me make a little advertisement for another interesting project, Dialogue: 0,1:27:21.46,1:27:24.74,Default,,0000,0000,0000,,there is a Spanish development, I think it is also produced in China, Dialogue: 0,1:27:24.74,1:27:26.83,Default,,0000,0000,0000,,but it's called The Geek's Phone. Dialogue: 0,1:27:26.83,1:27:30.70,Default,,0000,0000,0000,,And they have a compatible Android installation by default, Dialogue: 0,1:27:30.70,1:27:34.14,Default,,0000,0000,0000,,and they are probably having a similar philosophy to keep the hardware open. Dialogue: 0,1:27:34.14,1:27:36.67,Default,,0000,0000,0000,,So maybe there is a new cooperation on the horizon. Dialogue: 0,1:27:36.67,1:27:40.94,Default,,0000,0000,0000,,Oh yeah, we love projects like that. Dialogue: 0,1:27:40.94,1:27:41.44,Default,,0000,0000,0000,,I don't know a lot about their project, but I have heard of it Dialogue: 0,1:27:41.44,1:27:44.06,Default,,0000,0000,0000,,and it is on my list of things to look into. Dialogue: 0,1:27:44.06,1:27:47.61,Default,,0000,0000,0000,,I would love to see that succeed, that would be excellent. Dialogue: 0,1:27:47.61,1:27:50.30,Default,,0000,0000,0000,,Well James, thank you for your presentation. Dialogue: 0,1:27:50.30,1:27:54.76,Default,,0000,0000,0000,,I think it was really interesting. And thank you for coming. Dialogue: 0,1:27:54.76,1:27:57.85,Default,,0000,0000,0000,,James will be back on this stage at 7pm when we have our final discussion on the 20 years of Dialogue: 0,1:27:57.85,1:28:03.49,Default,,0000,0000,0000,,the world wide web. Dialogue: 0,1:28:03.49,1:28:05.00,Default,,0000,0000,0000,,Thank you James for coming. Dialogue: 0,1:28:05.00,1:28:12.84,Default,,0000,0000,0000,,{\i1}APPLAUSE{\i0}