[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.00,0:00:17.14,Default,,0000,0000,0000,,{\i1}34C3 preroll music{\i0} Dialogue: 0,0:00:17.14,0:00:24.43,Default,,0000,0000,0000,,Herald Angel: Good. I have the pleasure\Nand the honor of introducing to you two Dialogue: 0,0:00:24.43,0:00:34.70,Default,,0000,0000,0000,,persons here who are really working at\N'La QuadratureDuNet'. Alors, c'est vraiment Dialogue: 0,0:00:34.70,0:00:39.05,Default,,0000,0000,0000,,quelque chose en Français ! It's an\Norganization NGO, it's actually working Dialogue: 0,0:00:39.05,0:00:45.98,Default,,0000,0000,0000,,really on the rights, on freedom of\Ncitizens on the internet. I understood Dialogue: 0,0:00:45.98,0:00:52.03,Default,,0000,0000,0000,,that Agnes is there responsible for the\Ncoordination mainly about legal issues and Dialogue: 0,0:00:52.03,0:00:58.50,Default,,0000,0000,0000,,that Okhin - I'll pronounce this well - is\Nmore responsible at the technical side. Dialogue: 0,0:00:58.50,0:01:04.52,Default,,0000,0000,0000,,He runs as well, I think, a bunch of\Nvolunteers, or helping you around. Dialogue: 0,0:01:04.52,0:01:08.37,Default,,0000,0000,0000,,Please give them a welcome applause.\NLet the show start! Dialogue: 0,0:01:08.37,0:01:16.87,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:01:16.87,0:01:20.48,Default,,0000,0000,0000,,Agnes: Hello, here is Okhin, but he has Dialogue: 0,0:01:20.48,0:01:25.97,Default,,0000,0000,0000,,already been introduced, the third person\Nfrom 'La Quadrature du Net', and I am Dialogue: 0,0:01:25.97,0:01:32.46,Default,,0000,0000,0000,,Agnes and I work on legal and political\Nissues at 'LaQuadrature' as well. So Dialogue: 0,0:01:32.46,0:01:38.27,Default,,0000,0000,0000,,LaQuadrature is an organization that\Nfights for fundamental rights and freedoms Dialogue: 0,0:01:38.27,0:01:44.09,Default,,0000,0000,0000,,in the digital area. We are here today to\Ntalk about the danger lying above your Dialogue: 0,0:01:44.09,0:01:50.20,Default,,0000,0000,0000,,jobs, especially if you're building or\Nmaintaining cryptographic tools. We're Dialogue: 0,0:01:50.20,0:01:55.58,Default,,0000,0000,0000,,here because we think it's important to\Ndemonstrate that the worst authoritarian Dialogue: 0,0:01:55.58,0:02:05.56,Default,,0000,0000,0000,,laws don't only come from far right\Ngovernments such as Hungaria or Poland, Dialogue: 0,0:02:05.56,0:02:09.76,Default,,0000,0000,0000,,but mostly from the "social democracy\Ncompatible with market economy", to quote Dialogue: 0,0:02:09.76,0:02:19.47,Default,,0000,0000,0000,,Angela Merkel. Along with Germany and the\NUnited Kingdom (but with Brexit, exit the Dialogue: 0,0:02:19.47,0:02:26.45,Default,,0000,0000,0000,,UK), France is one of the biggest forces\Nwithin the EU. And if France can rally at Dialogue: 0,0:02:26.45,0:02:31.10,Default,,0000,0000,0000,,least one of the two others on board it\Ncan obtain what it wants from its European Dialogue: 0,0:02:31.10,0:02:40.20,Default,,0000,0000,0000,,partners. It works both ways, of course!\NBut it's important because the problem Dialogue: 0,0:02:40.20,0:02:44.12,Default,,0000,0000,0000,,with that: France is not only exporting\Nits knowledge and practice of law Dialogue: 0,0:02:44.12,0:02:51.30,Default,,0000,0000,0000,,enforcement and anti-riot gear to various\Ngovernments such as Tunisia or others. Dialogue: 0,0:02:51.30,0:02:59.57,Default,,0000,0000,0000,,France is now also shining for its anti-\Nprivacy lobbying as you will see later. Dialogue: 0,0:02:59.57,0:03:12.46,Default,,0000,0000,0000,,{\i1}sound issues on Okhin's microphone{\i0} Dialogue: 0,0:03:12.46,0:03:15.46,Default,,0000,0000,0000,,Okhin: What is interesting here is to\Nthink about what we can do as technicians, Dialogue: 0,0:03:15.46,0:03:20.76,Default,,0000,0000,0000,,developers, sysadmins, sysops,\Nor legal persons Dialogue: 0,0:03:20.76,0:03:26.50,Default,,0000,0000,0000,,specialised in technology issues.\NBecause the threats come from legal, Dialogue: 0,0:03:26.50,0:03:32.28,Default,,0000,0000,0000,,political and technical area and endanger\Nnot only us but also sex workers, abused Dialogue: 0,0:03:32.28,0:03:36.57,Default,,0000,0000,0000,,women and abused people, who\Nneed to flee their home etc. Dialogue: 0,0:03:36.57,0:03:39.57,Default,,0000,0000,0000,,We have to think about our role\Nand to find ways to act, to fight Dialogue: 0,0:03:39.57,0:03:44.44,Default,,0000,0000,0000,,against the threats against encryption. Dialogue: 0,0:03:44.44,0:03:50.96,Default,,0000,0000,0000,,We're going to start with a quick but\Nsadly non-exhaustive history of laws Dialogue: 0,0:03:50.96,0:03:54.84,Default,,0000,0000,0000,,trying to weaken or circumvent\Ncryptography in France one way or another. Dialogue: 0,0:03:54.84,0:04:01.52,Default,,0000,0000,0000,,We are including here everything that\Ntalks about spyware and keyloggers, Dialogue: 0,0:04:01.52,0:04:06.26,Default,,0000,0000,0000,,because they're a direct threat against\Na lot of cryptographic tools. Dialogue: 0,0:04:06.26,0:04:14.31,Default,,0000,0000,0000,,Agnes: Okay, so let's be clear here, we\Nare only to talk about very specific Dialogue: 0,0:04:14.31,0:04:20.15,Default,,0000,0000,0000,,aspects of the digital related law. Access\Nto the Internet, filtering, censorship can Dialogue: 0,0:04:20.15,0:04:25.18,Default,,0000,0000,0000,,probably be discussed in other talks with\Nthe same quantity of laws hindering those Dialogue: 0,0:04:25.18,0:04:33.25,Default,,0000,0000,0000,,rights. But we will focus here on\Ncryptography only. Before 1998 use of Dialogue: 0,0:04:33.25,0:04:37.72,Default,,0000,0000,0000,,cryptographic tools for the public was\Nessentially forbidden. The key length was Dialogue: 0,0:04:37.72,0:04:46.56,Default,,0000,0000,0000,,limited to 128 bits for asymmetric\Ncryptography. There were authentication Dialogue: 0,0:04:46.56,0:04:56.18,Default,,0000,0000,0000,,of communication or for ensuring integrity\Nof the message a prior declaration Dialogue: 0,0:04:56.18,0:04:59.28,Default,,0000,0000,0000,,was necessary. For all\Nother uses, especially Dialogue: 0,0:04:59.28,0:05:02.28,Default,,0000,0000,0000,,for confidentiality, ex ante authorization\Nfrom Prime Minister was required as well. Dialogue: 0,0:05:02.28,0:05:10.66,Default,,0000,0000,0000,,Okhin: After lengthy negotiations with Dialogue: 0,0:05:10.66,0:05:15.53,Default,,0000,0000,0000,,intelligence services cryptography has\Nbeen freed in 1998. But it still Dialogue: 0,0:05:15.53,0:05:19.62,Default,,0000,0000,0000,,required that the system used respects one\Nof those three following limitations. Dialogue: 0,0:05:19.62,0:05:23.35,Default,,0000,0000,0000,,The cryptography system cannot be used\Nfor confidentiality purposes without Dialogue: 0,0:05:23.35,0:05:27.12,Default,,0000,0000,0000,,authorisation. Or the cryptography system\Nis operated by a third party owning a Dialogue: 0,0:05:27.12,0:05:32.11,Default,,0000,0000,0000,,master key which the police may have\Naccess to. Or the user does not need a Dialogue: 0,0:05:32.11,0:05:36.27,Default,,0000,0000,0000,,strong confidentiality and can use a\Nstandard encryption solution with a key Dialogue: 0,0:05:36.27,0:05:37.27,Default,,0000,0000,0000,,lower than 40 bits. Dialogue: 0,0:05:37.27,0:05:38.27,Default,,0000,0000,0000,,{\i1}bad sound, subtitles now\Nfrom author's transcript{\i0} Dialogue: 0,0:05:38.27,0:05:39.27,Default,,0000,0000,0000,,Furthermore: people providing encryption\Ntools for confidentiality purposes were Dialogue: 0,0:05:39.27,0:05:40.27,Default,,0000,0000,0000,,required to give the code, decryption\Ndevices or conventions when law required Dialogue: 0,0:05:40.27,0:05:41.27,Default,,0000,0000,0000,,by them. In 2001 the use of cryptography\Nis freed, but still requires that the Dialogue: 0,0:05:41.27,0:05:42.27,Default,,0000,0000,0000,,system used has been first registered at\Nthe Interior Ministry's office. Now it's Dialogue: 0,0:05:42.27,0:05:43.27,Default,,0000,0000,0000,,one of the ANSSI mission, the French\NNational Cybersecurity Agency ANSSI that Dialogue: 0,0:05:43.27,0:05:44.27,Default,,0000,0000,0000,,reports to the Prime Minister. France's\Ndoctrine toward cryptography has always Dialogue: 0,0:05:44.27,0:06:56.10,Default,,0000,0000,0000,,been dictated by intelligence services and\Nthe army. They want to collect as much Dialogue: 0,0:06:56.10,0:07:53.35,Default,,0000,0000,0000,,data as possible, multiple times, and to\Nhave the capability to decrypt every Dialogue: 0,0:07:53.35,0:07:54.35,Default,,0000,0000,0000,,conversation at any given time. This is at\Nthis condition that they consented to give Dialogue: 0,0:07:54.35,0:07:55.35,Default,,0000,0000,0000,,free access to cryptography for the\Ngeneral public. That's why, French law Dialogue: 0,0:07:55.35,0:07:56.35,Default,,0000,0000,0000,,oblige to declare to the ANSSI the supply\Nor importation of a cryptology tool. Dialogue: 0,0:07:56.35,0:07:57.35,Default,,0000,0000,0000,,This procedure is an obstacle for the\Ndeployment of such services in France, Dialogue: 0,0:07:57.35,0:07:58.35,Default,,0000,0000,0000,,mostly because you have to face an\Nadministrative system which refuses to Dialogue: 0,0:07:58.35,0:07:59.35,Default,,0000,0000,0000,,speak non-French. The delay for the\Ntransportation (?) is at least one month. Dialogue: 0,0:07:59.35,0:08:00.35,Default,,0000,0000,0000,,For a long time, all administrative\Ndocuments were in French only, ANSSI Dialogue: 0,0:08:00.35,0:08:01.70,Default,,0000,0000,0000,,now provides the translation as\Na courtesy, but you're still supposed Dialogue: 0,0:08:01.70,0:08:04.23,Default,,0000,0000,0000,,to fill the forms in French. You're\Nsupposed to provide your source code, but Dialogue: 0,0:08:04.23,0:08:05.23,Default,,0000,0000,0000,,since you all develop open software, this\Nis fine, isn't it? And of course, you have Dialogue: 0,0:08:05.23,0:08:06.23,Default,,0000,0000,0000,,to send it by regular snail mail, there's\Nno electronic version of it, in triplicate, Dialogue: 0,0:08:06.23,0:08:07.23,Default,,0000,0000,0000,,which is much more expensive, especially\Nif you're not in France. Let's say that Dialogue: 0,0:08:07.23,0:08:08.23,Default,,0000,0000,0000,,administrative documents are sometimes\Nvery complicated for French-speaking Dialogue: 0,0:08:08.23,0:08:09.23,Default,,0000,0000,0000,,people, who are supposed\Nto be used to them. Dialogue: 0,0:08:09.23,0:08:10.23,Default,,0000,0000,0000,,Agnes: So..\NOkhin: How enabling foreign people - not Dialogue: 0,0:08:10.23,0:08:11.23,Default,,0000,0000,0000,,French speaking ones - to understand them\Nand to correctly fill them? Dialogue: 0,0:08:11.23,0:08:12.23,Default,,0000,0000,0000,,{\i1}proper sound back again{\i0}\NAgnes: Since then cryptography legislation Dialogue: 0,0:08:12.23,0:08:14.18,Default,,0000,0000,0000,,has not really evolved. However, one\Nnational security or counter terrorism law Dialogue: 0,0:08:14.18,0:08:20.99,Default,,0000,0000,0000,,after another - we had something like 30\Nof them in the last 15 years - the Dialogue: 0,0:08:20.99,0:08:27.32,Default,,0000,0000,0000,,judiciary and repressive arsenal did grow.\NFor example, police were authorized to Dialogue: 0,0:08:27.32,0:08:40.19,Default,,0000,0000,0000,,install keyloggers in the LOPPSI 2 law in\N2011. Then police were authorized to force Dialogue: 0,0:08:40.19,0:08:50.99,Default,,0000,0000,0000,,any person or entity they think able\Nto decrypt or to analyze every kind of Dialogue: 0,0:08:50.99,0:08:58.30,Default,,0000,0000,0000,,encrypted content they get their hands on\Nin the counter-terrorism law of 2014, and Dialogue: 0,0:08:58.30,0:09:07.48,Default,,0000,0000,0000,,the army and intelligence agency of course\Ncan help to do those crypto analysis Dialogue: 0,0:09:07.48,0:09:33.75,Default,,0000,0000,0000,,if needed.\N{\i1}bad sound, again from author transcript now{\i0} Dialogue: 0,0:09:33.75,0:10:05.16,Default,,0000,0000,0000,,Okhin: And now the so-called "Black boxes"\Nentered the game in the Surveillance Law Dialogue: 0,0:10:05.16,0:10:07.65,Default,,0000,0000,0000,,of 2015. Those are algorithms collecting\Nand analysing metadata in order to catch Dialogue: 0,0:10:07.65,0:10:10.50,Default,,0000,0000,0000,,terrorists. We know they are made by\NPalantir and we had the confirmation on Dialogue: 0,0:10:10.50,0:10:12.31,Default,,0000,0000,0000,,November of their deployment.\NThe fun fact: the internal intelligence Dialogue: 0,0:10:12.31,0:10:14.02,Default,,0000,0000,0000,,service signed the agreement with Palantir\Nbut the military intelligence and foreign Dialogue: 0,0:10:14.02,0:10:16.65,Default,,0000,0000,0000,,intelligence services are quite concerned\Nabout it, because they would rather maintain a Dialogue: 0,0:10:16.65,0:10:17.78,Default,,0000,0000,0000,,strategic autonomy. Dialogue: 0,0:10:17.78,0:10:18.91,Default,,0000,0000,0000,,In the same law, the use\Nof IMSI Catchers is granted to cops Dialogue: 0,0:10:18.91,0:10:20.04,Default,,0000,0000,0000,,and they can install spyware on your\Nterminal without prior validation of a Dialogue: 0,0:10:20.04,0:10:21.29,Default,,0000,0000,0000,,judge. IMSI Catchers and spywares may be\Nused to gather any information that may Dialogue: 0,0:10:21.29,0:10:23.97,Default,,0000,0000,0000,,help protect vague interests, such as the\N"industrial and economic well being" of Dialogue: 0,0:10:23.97,0:10:29.67,Default,,0000,0000,0000,,France or the prevention of undeclared\Nprotests. {\i1}recording audio back to quality{\i0} Dialogue: 0,0:10:29.67,0:10:33.09,Default,,0000,0000,0000,,Thanks to the state of emergency since\N2015 and now made permanent in last Dialogue: 0,0:10:33.09,0:10:35.03,Default,,0000,0000,0000,,October, search warrants may now be\Ndelivered on mere rumour and suspicions, Dialogue: 0,0:10:35.03,0:10:36.03,Default,,0000,0000,0000,,after the fact, without any investigations.\NThey allow for collection of any data found Dialogue: 0,0:10:36.03,0:10:37.03,Default,,0000,0000,0000,,on site. And data is kept during three\Nmonths, but if they are encrypted the judge Dialogue: 0,0:10:37.03,0:10:39.09,Default,,0000,0000,0000,,can decide to retain them indefinitely\Nuntil they decrypt them. Dialogue: 0,0:10:39.09,0:10:41.15,Default,,0000,0000,0000,,And without any investigative power. Dialogue: 0,0:10:41.15,0:10:43.21,Default,,0000,0000,0000,,Agnes: So to conclude this\Ndepressive state of affairs Dialogue: 0,0:10:43.21,0:10:47.85,Default,,0000,0000,0000,,we need to add that cryptography\Nis an aggravating circumstance Dialogue: 0,0:10:47.85,0:10:56.75,Default,,0000,0000,0000,,in a long list of crimes\Nand felonies linked Dialogue: 0,0:10:56.75,0:11:02.31,Default,,0000,0000,0000,,primarily to organized crime and terroism,\Nbut also conveniently to aiding refugees Dialogue: 0,0:11:02.31,0:11:04.09,Default,,0000,0000,0000,,for example. So encrypting things makes\Nyou even more suspect and more guilty. Dialogue: 0,0:11:04.09,0:11:07.09,Default,,0000,0000,0000,,Okhin: Oh and we almost forgot - if ever\Nyou're operating a cryptographic system Dialogue: 0,0:11:07.09,0:11:10.82,Default,,0000,0000,0000,,for third parties you have an obligation\Nto provide either decryption key or plain Dialogue: 0,0:11:10.82,0:11:14.91,Default,,0000,0000,0000,,text to cops if they ask for it and\Nyou have 72 hours to comply Dialogue: 0,0:11:14.91,0:11:20.39,Default,,0000,0000,0000,,- which means a lot of pressure\Non you. It probably can Dialogue: 0,0:11:20.39,0:11:24.43,Default,,0000,0000,0000,,apply to yourself if you're being\Ninvestigated upon, but it might clash with Dialogue: 0,0:11:24.43,0:11:27.42,Default,,0000,0000,0000,,the right to remain silent and to not\Nself-incriminate we do not have a lot of Dialogue: 0,0:11:27.42,0:11:35.64,Default,,0000,0000,0000,,choice here. But we recently had cases\Nwhere cops.., where the law has been used Dialogue: 0,0:11:35.64,0:11:40.02,Default,,0000,0000,0000,,one of them was to coerce a teenager to\Nprovide decryption key for an encrypted Dialogue: 0,0:11:40.02,0:11:44.40,Default,,0000,0000,0000,,chat with OTR he was operating and which\Nhad been used by people who were making Dialogue: 0,0:11:44.40,0:11:55.09,Default,,0000,0000,0000,,fake bomb alert in schools. And for one we\Nknow about, how many of them have gone Dialogue: 0,0:11:55.09,0:11:59.73,Default,,0000,0000,0000,,unnoticed, people chosing to keep living\Ntheir lives instead of risking jails time Dialogue: 0,0:11:59.73,0:12:04.30,Default,,0000,0000,0000,,and huge fines ?\NAgnes: So here it's important to note that Dialogue: 0,0:12:04.30,0:12:09.64,Default,,0000,0000,0000,,there's difference being made between\Ncryptography which enforces security Dialogue: 0,0:12:09.64,0:12:15.55,Default,,0000,0000,0000,,communication and cryptography which\Nenforces confidentiality. In this Dialogue: 0,0:12:15.55,0:12:19.65,Default,,0000,0000,0000,,presentation we're addressing the issue of\Ncryptography in the concept context of Dialogue: 0,0:12:19.65,0:12:26.64,Default,,0000,0000,0000,,confidentiality only. To illustrate that\Nthis debate goes beyond the classic lines Dialogue: 0,0:12:26.64,0:12:32.69,Default,,0000,0000,0000,,of left/right politics we like to display\Nsome quotes on the topic by various Dialogue: 0,0:12:32.69,0:12:39.77,Default,,0000,0000,0000,,ministers, candidates, elected\Nrepresentatives and prominent political Dialogue: 0,0:12:39.77,0:12:47.01,Default,,0000,0000,0000,,speakers. For example, Éric Ciotti, he is\Na member of parliament from the right- Dialogue: 0,0:12:47.01,0:12:56.74,Default,,0000,0000,0000,,wing. He wants to fine Apple 1.5 million\Neuro, if they refuse to give encryption Dialogue: 0,0:12:56.74,0:13:02.17,Default,,0000,0000,0000,,keys, among other outrageous things he\Nsaid, this is one taking hold. Dialogue: 0,0:13:02.17,0:13:07.53,Default,,0000,0000,0000,,Okhin: François Molins, Paris Prosecutor,\Nwrote about that in the New York Times Dialogue: 0,0:13:07.53,0:13:11.99,Default,,0000,0000,0000,,against cryptography. The title is quite\Nexplicit it states: "When Phone Encryption Dialogue: 0,0:13:11.99,0:13:20.09,Default,,0000,0000,0000,,Blocks Justice" And he talks about the\Nimportance of privacy rights of the Dialogue: 0,0:13:20.09,0:13:24.22,Default,,0000,0000,0000,,individual in the same paragraph of the\N"marginal benefits of full disk Dialogue: 0,0:13:24.22,0:13:29.13,Default,,0000,0000,0000,,encryption". He signed this bullshit with\Nhis colleague Cyrus Vance Jr, District Dialogue: 0,0:13:29.13,0:13:32.88,Default,,0000,0000,0000,,Attorney of Manhattan, Adrian Leppard,\Ncommissioner of London City Police and Dialogue: 0,0:13:32.88,0:13:37.76,Default,,0000,0000,0000,,Javier Zaragoza, chief prosecutor of the\Nnational court of Spain. I let you read Dialogue: 0,0:13:37.76,0:13:46.28,Default,,0000,0000,0000,,the full quote in all its splendor.\NAgnes: So we have also Guillaume Poupard Dialogue: 0,0:13:46.28,0:13:53.42,Default,,0000,0000,0000,,from the ANSSI we talked about before. He\Nsaid just before the Bataclan attack in Dialogue: 0,0:13:53.42,0:13:59.97,Default,,0000,0000,0000,,2015 that backdoors and key sequestrations\Nis a bad idea and that he instead proposes Dialogue: 0,0:13:59.97,0:14:06.94,Default,,0000,0000,0000,,to work on "points of cleartext". Whatever\Nit means it probably stands for transport Dialogue: 0,0:14:06.94,0:14:10.41,Default,,0000,0000,0000,,security and against confidentiality of\Ncommunications. Dialogue: 0,0:14:10.41,0:14:15.26,Default,,0000,0000,0000,,Okhin: Emmanuel Valls, then Prime\NMinister, used the term "legal Dialogue: 0,0:14:15.26,0:14:18.80,Default,,0000,0000,0000,,cryptography" in interviews where the\Nofficial discourse for the last 20 years Dialogue: 0,0:14:18.80,0:14:27.72,Default,,0000,0000,0000,,was that all cryptography was legal.\NAgnes: Here the digital national council, Dialogue: 0,0:14:27.72,0:14:34.79,Default,,0000,0000,0000,,then chaired by Mounir Mahjoubi, who is\Nnow Secretary of State for digital issues, Dialogue: 0,0:14:34.79,0:14:39.93,Default,,0000,0000,0000,,did oppose the ideas of backdoors and did\Nadvocate for the use and development of Dialogue: 0,0:14:39.93,0:14:44.16,Default,,0000,0000,0000,,end-to-end encryption just before the\Npresidential electoral race - you'll see Dialogue: 0,0:14:44.16,0:14:47.88,Default,,0000,0000,0000,,later why it's important.\NOkhin: Bernard Debré, another elected Dialogue: 0,0:14:47.88,0:14:54.22,Default,,0000,0000,0000,,representative from the right wing he\Nactually ordered drugs online, cocaine for Dialogue: 0,0:14:54.22,0:15:00.52,Default,,0000,0000,0000,,80 euros a gram on onion-services to prove\Nhow dangerous it is. He also said you can Dialogue: 0,0:15:00.52,0:15:05.27,Default,,0000,0000,0000,,buy body parts and guns there and that\Nit's easier than ordering shoes online. He Dialogue: 0,0:15:05.27,0:15:09.70,Default,,0000,0000,0000,,also bought a lot of drugs from a non-\Nidentified website in Netherlands, so Dialogue: 0,0:15:09.70,0:15:18.38,Default,,0000,0000,0000,,surely the encryption is at fault here.\NAgnes: So Jean-Jacques Urvoas who was Dialogue: 0,0:15:18.38,0:15:25.40,Default,,0000,0000,0000,,Minister of Justice said he wants to\Naccess computers, Skype communications and Dialogue: 0,0:15:25.40,0:15:34.79,Default,,0000,0000,0000,,so on and to put all suspects and their\Nentourage under permanent recording. Dialogue: 0,0:15:34.79,0:15:40.81,Default,,0000,0000,0000,,Between the first and second turn of the\Nlast presidential elections he broke the Dialogue: 0,0:15:40.81,0:15:46.58,Default,,0000,0000,0000,,professional secret and sent to Thierry\NSolère who is a member of parliament from Dialogue: 0,0:15:46.58,0:15:53.48,Default,,0000,0000,0000,,the white ring the information that he was\Ninvestigated upon. He sent a message by Dialogue: 0,0:15:53.48,0:15:59.68,Default,,0000,0000,0000,,Telegram and the note was saved on Thierry\NSolère's phone and found during a police Dialogue: 0,0:15:59.68,0:16:06.80,Default,,0000,0000,0000,,search at his house later on.\NOkhin: In August 2016 there was a joint Dialogue: 0,0:16:06.80,0:16:11.21,Default,,0000,0000,0000,,declaration of Thomas de Maizière and\NBernard Cazeneuve, interior ministers of Dialogue: 0,0:16:11.21,0:16:16.52,Default,,0000,0000,0000,,Germany and France respectively about\NEuropean internal security and they stated Dialogue: 0,0:16:16.52,0:16:20.58,Default,,0000,0000,0000,,that: "At the european level, it will\Nrequire to force the non cooperatives Dialogue: 0,0:16:20.58,0:16:24.83,Default,,0000,0000,0000,,operators to remove illegal content or to\Ndecrypt messages during investigation." Dialogue: 0,0:16:24.83,0:16:32.36,Default,,0000,0000,0000,,Agnes: However, so it was a joint\Ncommunication but French written version Dialogue: 0,0:16:32.36,0:16:38.65,Default,,0000,0000,0000,,of the joint declaration was different\Nthan Germans. Only France kept the part Dialogue: 0,0:16:38.65,0:16:43.81,Default,,0000,0000,0000,,about how it would be so great to have\Nback doors or golden keys. So either Dialogue: 0,0:16:43.81,0:16:50.04,Default,,0000,0000,0000,,Germany did not want to publicly advocate\Nfor backdoors or they had a different Dialogue: 0,0:16:50.04,0:16:56.48,Default,,0000,0000,0000,,strategy, but unfortunately very recently\Nthe same de Maizière announced that he Dialogue: 0,0:16:56.48,0:17:01.48,Default,,0000,0000,0000,,wanted to force tech and car companies to\Nprovide the security services with hidden Dialogue: 0,0:17:01.48,0:17:07.22,Default,,0000,0000,0000,,digital access to all devices and\Nmachines. He probably did not know that if Dialogue: 0,0:17:07.22,0:17:11.16,Default,,0000,0000,0000,,you lowered the security of cars you\Ndramatically increase the risk of accident Dialogue: 0,0:17:11.16,0:17:15.47,Default,,0000,0000,0000,,among others.\NOkhin: All this was before Macron was Dialogue: 0,0:17:15.47,0:17:22.58,Default,,0000,0000,0000,,elected last spring. It's like an actual\Nphoto. It's not a Photoshop. During his Dialogue: 0,0:17:22.58,0:17:27.63,Default,,0000,0000,0000,,presidential campaign Emmanuel Macron said\Nthat we should put an end to cryptography Dialogue: 0,0:17:27.63,0:17:31.61,Default,,0000,0000,0000,,by forcing the biggest companies to\Nprovide encryption keys or to give access Dialogue: 0,0:17:31.61,0:17:38.27,Default,,0000,0000,0000,,to the complete content stating that "one\Nday they'll have to be responsible of Dialogue: 0,0:17:38.27,0:17:45.60,Default,,0000,0000,0000,,terror attacks complicity".\NAgnes: So Mounir Mahjoubi again. He was Dialogue: 0,0:17:45.60,0:17:54.13,Default,,0000,0000,0000,,then concealing the candidate and he is\Nnow internet minister. He has been forced Dialogue: 0,0:17:54.13,0:17:59.21,Default,,0000,0000,0000,,to backpedal and to explain that messing\Nwith end-to-end cryptography was out of Dialogue: 0,0:17:59.21,0:18:03.63,Default,,0000,0000,0000,,question and that they'd rather force\Ncompanies to cooperate faster with police Dialogue: 0,0:18:03.63,0:18:09.64,Default,,0000,0000,0000,,forces. He specifically emphasized the\Nimportance of cryptography by companies to Dialogue: 0,0:18:09.64,0:18:16.89,Default,,0000,0000,0000,,protect trade and industrial secrets and\Nsince then Mounir Mahjoubi has become Dialogue: 0,0:18:16.89,0:18:24.68,Default,,0000,0000,0000,,totally silent on this topic. So it seems\Nthat encryption for confidentiality is a Dialogue: 0,0:18:24.68,0:18:30.00,Default,,0000,0000,0000,,real problem for them. Would you be\Nsurprised to know that to communicate with Dialogue: 0,0:18:30.00,0:18:34.59,Default,,0000,0000,0000,,his political party and representatives\NEmmanuel Macron, now president, uses Dialogue: 0,0:18:34.59,0:18:41.09,Default,,0000,0000,0000,,telegram? An application regularly\Ndescribed by a lot of representatives as Dialogue: 0,0:18:41.09,0:18:48.46,Default,,0000,0000,0000,,an enabling terrorism tool and which\Nshould be banned. Their words, not ours. Dialogue: 0,0:18:48.46,0:18:52.67,Default,,0000,0000,0000,,Animal Farm is back: We are all equal with\Nthe use of cryptography, but some are more Dialogue: 0,0:18:52.67,0:18:58.63,Default,,0000,0000,0000,,equal than the others. Coupled with this\Nfocus on protecting companies' secrets Dialogue: 0,0:18:58.63,0:19:03.22,Default,,0000,0000,0000,,this confirms that the Start Up Nation\Ndoesn't care about protecting citizens but Dialogue: 0,0:19:03.22,0:19:08.61,Default,,0000,0000,0000,,only about business and powerful friends.\NThis becomes blatantly obvious when you Dialogue: 0,0:19:08.61,0:19:12.12,Default,,0000,0000,0000,,look at Macron's social and economy's\Npolicies. Dialogue: 0,0:19:12.12,0:19:16.61,Default,,0000,0000,0000,,Okhin: Last but not least, successive\NFrench government put pressure to add in Dialogue: 0,0:19:16.61,0:19:21.29,Default,,0000,0000,0000,,the law possibility for cops to ask you\Nfor all of your online handles, including Dialogue: 0,0:19:21.29,0:19:25.96,Default,,0000,0000,0000,,that all Yahoo mailboxes, ICQ numbers,\Nyour Twitter or Facebook account, all the Dialogue: 0,0:19:25.96,0:19:30.62,Default,,0000,0000,0000,,weird nicknames you use on IRC and stuff\Nlike that. That's why mine is currently a Dialogue: 0,0:19:30.62,0:19:34.97,Default,,0000,0000,0000,,fork-bomb embedded into a shellshock, but\NI think we can get more creative and find Dialogue: 0,0:19:34.97,0:19:39.18,Default,,0000,0000,0000,,a way to be more destructive for a system\Nwhen cops would have to enter it into Dialogue: 0,0:19:39.18,0:19:46.44,Default,,0000,0000,0000,,their systems. Two attempts have been made\Nalready and rejected at some point. This Dialogue: 0,0:19:46.44,0:19:50.59,Default,,0000,0000,0000,,kind of registration already exist in the\NUK in the US and we hope the government Dialogue: 0,0:19:50.59,0:19:54.48,Default,,0000,0000,0000,,won't succeed in France to put this kind\Nof limitation in law. Dialogue: 0,0:19:54.48,0:20:00.74,Default,,0000,0000,0000,,Agnes: So, as demonstrated France is one\Nof the very active power against Dialogue: 0,0:20:00.74,0:20:05.19,Default,,0000,0000,0000,,cryptography within the EU. Even if some\Nof other member states did express some Dialogue: 0,0:20:05.19,0:20:13.12,Default,,0000,0000,0000,,concerns namely Poland, Croatia, Hungary,\NItaly, Latvia, and other countries, those Dialogue: 0,0:20:13.12,0:20:18.21,Default,,0000,0000,0000,,concerns have been prompted by other\Nmember states and probably France. Each Dialogue: 0,0:20:18.21,0:20:23.68,Default,,0000,0000,0000,,new bill is a risk to reduce the use of\Ncryptography especially with the criminal, Dialogue: 0,0:20:23.68,0:20:30.58,Default,,0000,0000,0000,,digital or judiciary laws that are coming\Nsoon. For instance France is pushing hard Dialogue: 0,0:20:30.58,0:20:37.55,Default,,0000,0000,0000,,for avoiding any obligation on end-to-end\Nencryption in the ePrivacy regulation. Dialogue: 0,0:20:37.55,0:20:45.22,Default,,0000,0000,0000,,They explicitly ask to gain access to any\Ncommunication or metadata, which is what Dialogue: 0,0:20:45.22,0:20:51.46,Default,,0000,0000,0000,,is written here in French. Sorry, we\Ndidn't translate it. The government also Dialogue: 0,0:20:51.46,0:20:57.54,Default,,0000,0000,0000,,pushes to obtain EU legislation on\Nencryption which would limit end to end Dialogue: 0,0:20:57.54,0:21:04.50,Default,,0000,0000,0000,,encryption, of course. The government\Nintends then to use this EU legislation Dialogue: 0,0:21:04.50,0:21:11.92,Default,,0000,0000,0000,,for justifying its position while it did\Ncreate this proposal at the first place. Dialogue: 0,0:21:11.92,0:21:20.52,Default,,0000,0000,0000,,In the next month the discussions\NeEvidence will start at the EU level. They Dialogue: 0,0:21:20.52,0:21:26.57,Default,,0000,0000,0000,,will probably be a lot of talks about\Ncryptography in the next "counter- Dialogue: 0,0:21:26.57,0:21:32.23,Default,,0000,0000,0000,,terrorist package" expected in 2018.\NCounterterrorism is always a good way for Dialogue: 0,0:21:32.23,0:21:37.58,Default,,0000,0000,0000,,the governments to make some provisions to\Nenhance security and to lower the rights Dialogue: 0,0:21:37.58,0:21:43.22,Default,,0000,0000,0000,,and freedoms. They threaten the Parliament\Nto be responsible of the next attacks and Dialogue: 0,0:21:43.22,0:21:48.41,Default,,0000,0000,0000,,the members of parliament thus vote\Nanything just because they don't want to Dialogue: 0,0:21:48.41,0:21:54.20,Default,,0000,0000,0000,,be responsible.\NOkhin: So as technician, what can we do? Dialogue: 0,0:21:54.20,0:21:58.59,Default,,0000,0000,0000,,From a technical perspective we think we\Nshould operate communication Dialogue: 0,0:21:58.59,0:22:03.60,Default,,0000,0000,0000,,infrastructure and systems in an illegal\Nand clandestine way. It is important to Dialogue: 0,0:22:03.60,0:22:07.14,Default,,0000,0000,0000,,build undetectable and encrypted\Ncommunication systems that break the link Dialogue: 0,0:22:07.14,0:22:11.44,Default,,0000,0000,0000,,between your online communications and\Nyourself. Making those tools available to Dialogue: 0,0:22:11.44,0:22:15.90,Default,,0000,0000,0000,,the general public and mass adopted by\Nthem is a critical and non trivial issue Dialogue: 0,0:22:15.90,0:22:19.98,Default,,0000,0000,0000,,to address. Especially as French legal\Nregistration system might block access to Dialogue: 0,0:22:19.98,0:22:25.21,Default,,0000,0000,0000,,high-quality privacy preserving encryption\Ntools. For instance, Apple requires you to Dialogue: 0,0:22:25.21,0:22:29.38,Default,,0000,0000,0000,,fill the ANSSI form and obtain a\Ncertificate from them to put your software Dialogue: 0,0:22:29.38,0:22:34.64,Default,,0000,0000,0000,,on the Apple App Store already.\NMoreover it is paramount to think wider, Dialogue: 0,0:22:34.64,0:22:38.87,Default,,0000,0000,0000,,because if your encrypted communication\Nrelies on centralized infrastructure at a Dialogue: 0,0:22:38.87,0:22:44.81,Default,,0000,0000,0000,,highly identifying piece of information\Nsuch as for instance a phone number, then Dialogue: 0,0:22:44.81,0:22:49.63,Default,,0000,0000,0000,,a passive listener such as an IMSI catcher\Ncan get your phone number from a protest Dialogue: 0,0:22:49.63,0:22:54.67,Default,,0000,0000,0000,,you were at for instance and then guess\Nwhat your account is and then, they got Dialogue: 0,0:22:54.67,0:22:59.24,Default,,0000,0000,0000,,your phone number, so they can ask to\Ndeploy key loggers and spyware on your Dialogue: 0,0:22:59.24,0:23:08.75,Default,,0000,0000,0000,,phones. And this defeating all the\Nsecurity based on your phone number. At a Dialogue: 0,0:23:08.75,0:23:11.73,Default,,0000,0000,0000,,time where more and more governments want\Nto hinder encryption and secret of Dialogue: 0,0:23:11.73,0:23:15.80,Default,,0000,0000,0000,,communications, it is critical to have\Naccess to communication systems that are Dialogue: 0,0:23:15.80,0:23:19.25,Default,,0000,0000,0000,,free, pseudonymous, decentralised and\Ndistributed to the widest audience Dialogue: 0,0:23:19.25,0:23:24.20,Default,,0000,0000,0000,,possible, meaning user-friendly, yes, and\Nto think about way to push those tools Dialogue: 0,0:23:24.20,0:23:30.85,Default,,0000,0000,0000,,everywhere. It is also important to lead\Npolitical battles. We need all available Dialogue: 0,0:23:30.85,0:23:34.81,Default,,0000,0000,0000,,help to slow down this attack at the\Nnational and European levels. We need to Dialogue: 0,0:23:34.81,0:23:39.51,Default,,0000,0000,0000,,get out of the security discourses and to\Nbreak the link between encryption and Dialogue: 0,0:23:39.51,0:23:44.78,Default,,0000,0000,0000,,security for the state and to control the\Nargument that only people committing Dialogue: 0,0:23:44.78,0:23:49.10,Default,,0000,0000,0000,,crimes and felonies do use cryptography.\NWe need a positive discourse about Dialogue: 0,0:23:49.10,0:23:53.25,Default,,0000,0000,0000,,cryptography: how it helps people with\Ntheir daily lives, how it impr Dialogue: 0,0:23:53.25,0:23:57.06,Default,,0000,0000,0000,,oves social structures, how it protects\Nthe identity of queers, how it helps Dialogue: 0,0:23:57.06,0:24:01.20,Default,,0000,0000,0000,,abused women to seek help and to escape\Ntheir home, how it enables a positive Dialogue: 0,0:24:01.20,0:24:05.66,Default,,0000,0000,0000,,change in the society, as main change\Noften comes from activities not approved Dialogue: 0,0:24:05.66,0:24:11.41,Default,,0000,0000,0000,,by the society. If you want more concrete\Nsteps and ways to help we're currently Dialogue: 0,0:24:11.41,0:24:15.75,Default,,0000,0000,0000,,running a support campaign so you can help\Nus there at support.laquadrature.net. Dialogue: 0,0:24:15.75,0:24:21.57,Default,,0000,0000,0000,,After the Q&A, because we have some time\Nleft, you can come drink some tea at the Dialogue: 0,0:24:21.57,0:24:28.49,Default,,0000,0000,0000,,teahouse in the CCL building and have some\Ntea and chat with us. Thank you all for Dialogue: 0,0:24:28.49,0:24:34.27,Default,,0000,0000,0000,,listening and if you have any question I\Nthink we have some time. Dialogue: 0,0:24:34.27,0:24:40.80,Default,,0000,0000,0000,,{\i1}applause{\i0}\NHerald Angel: Alright we have 5 minutes Dialogue: 0,0:24:40.80,0:24:50.30,Default,,0000,0000,0000,,for questions. Are there people out there,\Nmaybe on the internet? No, are there some Dialogue: 0,0:24:50.30,0:24:55.83,Default,,0000,0000,0000,,people here who have questions for this\Nlovely organization? Well I have a Dialogue: 0,0:24:55.83,0:25:01.67,Default,,0000,0000,0000,,question actually: So you gave us some\Nadvice regarding using avatars, alter Dialogue: 0,0:25:01.67,0:25:08.78,Default,,0000,0000,0000,,egos. You know what, I'm teaching as well\Nand my colleagues teachers even in that Dialogue: 0,0:25:08.78,0:25:13.09,Default,,0000,0000,0000,,kind of digital age that we live in are\Nalways wondering why I am using several Dialogue: 0,0:25:13.09,0:25:20.88,Default,,0000,0000,0000,,avatars, several devices. It seems like\Nit's not accepted actually because they're Dialogue: 0,0:25:20.88,0:25:27.04,Default,,0000,0000,0000,,looking at you like "Are you a criminal or\Nwhat? What did you do wrong?" Don't you Dialogue: 0,0:25:27.04,0:25:29.15,Default,,0000,0000,0000,,get that kind of questions as well from\Nyour audience? Dialogue: 0,0:25:29.15,0:25:34.88,Default,,0000,0000,0000,,Ohkin: Yes, we got that a lot. The thing\Nis, a lot of people commit crimes using Dialogue: 0,0:25:34.88,0:25:39.56,Default,,0000,0000,0000,,their real name and IDs and stuff like\Nthat. Most of the people are asking people Dialogue: 0,0:25:39.56,0:25:42.61,Default,,0000,0000,0000,,online, for instance, to not use a\Npseudonymous account or something like Dialogue: 0,0:25:42.61,0:25:47.43,Default,,0000,0000,0000,,that, they want to be known as our same\Npeople and stuff like that. So it's like Dialogue: 0,0:25:47.43,0:25:50.54,Default,,0000,0000,0000,,we need to get out of this kind of\Ndiscourse and say: "I can do whatever I Dialogue: 0,0:25:50.54,0:25:55.21,Default,,0000,0000,0000,,want with my online identities. It's not\Nyour business. And if I'm doing something Dialogue: 0,0:25:55.21,0:25:59.55,Default,,0000,0000,0000,,wrong, you have to prove it, like with due\Nprocess of law and stuff like that. Dialogue: 0,0:25:59.55,0:26:04.69,Default,,0000,0000,0000,,Herald: Ok, I see there's a question\Nraised in here. Microphone number two. Dialogue: 0,0:26:04.69,0:26:10.11,Default,,0000,0000,0000,,Mic2: What counts in practice as import\Nand export of cryptography. I mean, if I'm Dialogue: 0,0:26:10.11,0:26:16.41,Default,,0000,0000,0000,,in France and I download open SSL, do I\Nhave to fill out the ANSSI form? Dialogue: 0,0:26:16.41,0:26:25.85,Default,,0000,0000,0000,,Okhin: Not for open SSL, because it's not\Nprotocol that have a goal to provide Dialogue: 0,0:26:25.85,0:26:28.97,Default,,0000,0000,0000,,confidentiality of communication which is\Nend-to-end encryption. Dialogue: 0,0:26:28.97,0:26:34.76,Default,,0000,0000,0000,,Mic2: So GPG?\NOkhin: Yeah, GPG is supposed to have an Dialogue: 0,0:26:34.76,0:26:37.40,Default,,0000,0000,0000,,important certificate and I think they\Nhave it. Dialogue: 0,0:26:37.40,0:26:39.89,Default,,0000,0000,0000,,Mic2: For individuals or for\Norganizations? Dialogue: 0,0:26:39.89,0:26:44.06,Default,,0000,0000,0000,,Okhin: For the organization which provides\Nyou the access to the tool. Like Google is Dialogue: 0,0:26:44.06,0:26:51.30,Default,,0000,0000,0000,,supposed to provide that, Apple,\NMicrosoft, Debian. Debian I think filled Dialogue: 0,0:26:51.30,0:27:00.37,Default,,0000,0000,0000,,the paperwork. Each Linux distribution\Nshould do it. Dialogue: 0,0:27:00.37,0:27:03.64,Default,,0000,0000,0000,,Herald: Question here, microphone number\None? Dialogue: 0,0:27:03.64,0:27:07.65,Default,,0000,0000,0000,,Mic1: Okay, thanks so much for the talk.\NI'd really love to hear a little bit more Dialogue: 0,0:27:07.65,0:27:13.96,Default,,0000,0000,0000,,about the very crunchy in-depth bits about\Nencryption policy in France. Now might not Dialogue: 0,0:27:13.96,0:27:20.87,Default,,0000,0000,0000,,be the right time, but building off of the\Nlast question: What kinds of laws or Dialogue: 0,0:27:20.87,0:27:25.34,Default,,0000,0000,0000,,policy are around taking encryption\Ntechnology outside of France, like across Dialogue: 0,0:27:25.34,0:27:30.12,Default,,0000,0000,0000,,a border?\NAgnes: Well for exporting to closed Dialogue: 0,0:27:30.12,0:27:36.97,Default,,0000,0000,0000,,encryption technology there is the\NWassenaar Arrangement signed by several Dialogue: 0,0:27:36.97,0:27:55.89,Default,,0000,0000,0000,,countries, so I don't know by heart\Neverything in there, but for example a Dialogue: 0,0:27:55.89,0:28:07.71,Default,,0000,0000,0000,,system that can use for war and for other\Nuse. Then you have it's forbidden or you Dialogue: 0,0:28:07.71,0:28:12.44,Default,,0000,0000,0000,,have to declare that you're exporting such\Ntools etc. So for exporting you have this Dialogue: 0,0:28:12.44,0:28:23.85,Default,,0000,0000,0000,,Wassenaar agreement and I think there is\Nnothing else if it's not a double use Dialogue: 0,0:28:23.85,0:28:25.71,Default,,0000,0000,0000,,system.\NMic2: Thank you! Dialogue: 0,0:28:25.71,0:28:29.74,Default,,0000,0000,0000,,Herald: Okay, one last question, please\Nthere, mister three. Dialogue: 0,0:28:29.74,0:28:35.01,Default,,0000,0000,0000,,Mic3: It seems to me that all of these\Nlaws are mostly falling under national Dialogue: 0,0:28:35.01,0:28:39.88,Default,,0000,0000,0000,,security. Are there any laws way to\Nchallenge any of this in the European Dialogue: 0,0:28:39.88,0:28:44.06,Default,,0000,0000,0000,,level? So on the European level there's\Nwonderful direct data protection Dialogue: 0,0:28:44.06,0:28:47.79,Default,,0000,0000,0000,,directives and all the stuff. But my\Nunderstanding is that all of these Dialogue: 0,0:28:47.79,0:28:53.82,Default,,0000,0000,0000,,directives any state can kind of opt out\Nof them for national security reasons. So Dialogue: 0,0:28:53.82,0:28:59.09,Default,,0000,0000,0000,,is there anything that can be done on any\Nlevel without invoking a national security Dialogue: 0,0:28:59.09,0:29:04.62,Default,,0000,0000,0000,,exception?\NAgnes: Yeah well all data protection Dialogue: 0,0:29:04.62,0:29:11.10,Default,,0000,0000,0000,,regulation policies at the EU level and\Nespecially the GDPR, general data Dialogue: 0,0:29:11.10,0:29:19.45,Default,,0000,0000,0000,,protection regulation, has a specific\Nprovision that enable member states to Dialogue: 0,0:29:19.45,0:29:28.42,Default,,0000,0000,0000,,say: okay, it doesn't apply because it's a\Nnational security issue. What I said, what Dialogue: 0,0:29:28.42,0:29:35.12,Default,,0000,0000,0000,,I showed here, is that in in the ePrivacy\Nregulation, which is currently under Dialogue: 0,0:29:35.12,0:29:45.39,Default,,0000,0000,0000,,negotiation at the EU level, the EU\NParliament has already adopted a position Dialogue: 0,0:29:45.39,0:29:51.72,Default,,0000,0000,0000,,which promotes encryption as soon as it's\Npossible to have end-to-end encryption. Dialogue: 0,0:29:51.72,0:29:57.27,Default,,0000,0000,0000,,And that's why the French government is\Ntrying to push it away, there will be Dialogue: 0,0:29:57.27,0:30:03.27,Default,,0000,0000,0000,,negotiation between the Council, the\NEuropean Parliament and the European Dialogue: 0,0:30:03.27,0:30:07.01,Default,,0000,0000,0000,,Commission. The Council represents all\Nmember states, so there will be a Dialogue: 0,0:30:07.01,0:30:13.05,Default,,0000,0000,0000,,negotiation with all the institutions,\Nbeginning this summer probably. Or just Dialogue: 0,0:30:13.05,0:30:20.27,Default,,0000,0000,0000,,after the summer, but maybe a little bit\Nbefore. And then the French government is Dialogue: 0,0:30:20.27,0:30:30.71,Default,,0000,0000,0000,,going to try to push it away. As we saw\Nin the document which we showed in Dialogue: 0,0:30:30.71,0:30:38.66,Default,,0000,0000,0000,,French, the government is trying to get to\Ngain access to all communications and Dialogue: 0,0:30:38.66,0:30:43.33,Default,,0000,0000,0000,,data. It's very clear in the French\Ncommunication we showed. Dialogue: 0,0:30:43.33,0:30:48.31,Default,,0000,0000,0000,,Herald: May I make a suggestion?\NThey have a fantastic tea house. Dialogue: 0,0:30:48.31,0:30:52.21,Default,,0000,0000,0000,,You have to continue this discussion\Nlater on there with a cup of tea, Dialogue: 0,0:30:52.21,0:30:56.85,Default,,0000,0000,0000,,and some massage maybe. I have\None last call for you both, you know, Dialogue: 0,0:30:56.85,0:30:59.100,Default,,0000,0000,0000,,and the audience: « Indignez-vous ! »\N[i.e.“Time for Outrage!”] Dialogue: 0,0:30:59.100,0:31:04.98,Default,,0000,0000,0000,,Ca, c'est! That's why we wanna hear you! (?)\NIndignez-vous ! Dialogue: 0,0:31:04.98,0:31:09.69,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:31:09.69,0:31:23.20,Default,,0000,0000,0000,,{\i1}postroll music{\i0} Dialogue: 0,0:31:23.20,0:31:30.78,Default,,0000,0000,0000,,{\i1}Subtitles created by c3subtitles.de\Nin the year 2018{\i0}