[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.00,0:00:19.76,Default,,0000,0000,0000,,{\i1}Preroll 36C3 Music {\i0} Dialogue: 0,0:00:19.76,0:00:28.41,Default,,0000,0000,0000,,Herald: Good evening and welcome to day\Ntwo of the Congress. Our next speaker, Dialogue: 0,0:00:28.41,0:00:37.27,Default,,0000,0000,0000,,Paul Gardner-Stephen is fighting for a\Nfree, secure and resilient communications. Dialogue: 0,0:00:37.27,0:00:43.32,Default,,0000,0000,0000,,He's known as the leader of the cerebral\Nprojects, building cell phone mesh Dialogue: 0,0:00:43.32,0:00:49.72,Default,,0000,0000,0000,,networks and also as the creator of the\Nmega 65 computer, that you can see right Dialogue: 0,0:00:49.72,0:01:01.11,Default,,0000,0000,0000,,here. {\i1}Some Applause{\i0} And. So he's going\Nto tell us about his next project right Dialogue: 0,0:01:01.11,0:01:07.78,Default,,0000,0000,0000,,now and also explore some issues that we\Nface about, building networks and keeping Dialogue: 0,0:01:07.78,0:01:13.97,Default,,0000,0000,0000,,them secure and resilient. So please\Nwelcome Paul Gardner-Stephen "Creating Dialogue: 0,0:01:13.97,0:01:18.24,Default,,0000,0000,0000,,Resilient and Sustainable mobile networks".\NA round of applause. Dialogue: 0,0:01:18.24,0:01:21.36,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:01:21.36,0:01:24.36,Default,,0000,0000,0000,,Paul Gardner-Stephen: OK. Thanks for coming\Nalong, everyone. Tonight is getting a Dialogue: 0,0:01:24.36,0:01:28.56,Default,,0000,0000,0000,,little bit late in the night , Sidney, for\Nme it is past my normal bedtime, so Dialogue: 0,0:01:28.56,0:01:32.55,Default,,0000,0000,0000,,apologies if I yawn. It's not that I'm\Nbored or disengaged. It's just I flew in Dialogue: 0,0:01:32.55,0:01:37.60,Default,,0000,0000,0000,,from Australia yesterday and still haven't\Nreally had enough sleep. But we should be Dialogue: 0,0:01:37.60,0:01:46.45,Default,,0000,0000,0000,,fine. So cool. So what we can see here we\Nhave the mega 65 prototype and we have a Dialogue: 0,0:01:46.45,0:01:52.40,Default,,0000,0000,0000,,prototype of the megaphone and I'll talk\Nabout those two in a minute. So the entire Dialogue: 0,0:01:52.40,0:01:56.73,Default,,0000,0000,0000,,presentation is actually going to be\Ndelivered with the technology that we're Dialogue: 0,0:01:56.73,0:02:00.81,Default,,0000,0000,0000,,creating. So a bit of a dog food eating\Nsession for this kind of thing is a bit of Dialogue: 0,0:02:00.81,0:02:05.94,Default,,0000,0000,0000,,proof by example that we can actually do\Nuseful things with 8-bit systems because a Dialogue: 0,0:02:05.94,0:02:09.22,Default,,0000,0000,0000,,whole pile of advantages when it comes to\Nthe security and digital sovereignty with Dialogue: 0,0:02:09.22,0:02:15.51,Default,,0000,0000,0000,,that. So we'll switch the screen to the\Nscreen. Super excellent. So we can have a Dialogue: 0,0:02:15.51,0:02:20.14,Default,,0000,0000,0000,,look and make sure I've got the correct\Ndisk in there. Yes, we do. We will drop to Dialogue: 0,0:02:20.14,0:02:37.82,Default,,0000,0000,0000,,see 64 mode. And we'll load the wrong one.\NFor sure, we don't have to wait the long Dialogue: 0,0:02:37.82,0:02:42.57,Default,,0000,0000,0000,,time if I press and hold down the caps\Nlock key. The CPU runs at the full speed Dialogue: 0,0:02:42.57,0:02:51.32,Default,,0000,0000,0000,,instead of normal speed. And so now it\Nwill light up. Its Commodore 64 software, Dialogue: 0,0:02:51.32,0:02:56.54,Default,,0000,0000,0000,,right. So of course it has to be cracked.\NEven if I had to supply the originals to Dialogue: 0,0:02:56.54,0:03:02.07,Default,,0000,0000,0000,,the cracking crew because in 2019. So\Nwe'll let that go for the year. The Dialogue: 0,0:03:02.07,0:03:07.70,Default,,0000,0000,0000,,graphic change a little bit as we go along\Nand let the grease roll out there. So all Dialogue: 0,0:03:07.70,0:03:13.02,Default,,0000,0000,0000,,of this has been created in FPGA. So we\Nhave complete sovereignty in that sense Dialogue: 0,0:03:13.02,0:03:16.59,Default,,0000,0000,0000,,over the architecture so that we can\Nreally start trying to, you know, to make Dialogue: 0,0:03:16.59,0:03:22.10,Default,,0000,0000,0000,,systems that we have full control over\Nfrom that full hardware layer and that are Dialogue: 0,0:03:22.10,0:03:26.55,Default,,0000,0000,0000,,simple enough that we don't need to have a\Nhuge, massive team of people to actually Dialogue: 0,0:03:26.55,0:03:29.97,Default,,0000,0000,0000,,work on these things. A lot of what we are\Ntalking about here has been created in Dialogue: 0,0:03:29.97,0:03:37.25,Default,,0000,0000,0000,,maybe three or four person years over the\Nlast few years. So it is quite possible to Dialogue: 0,0:03:37.25,0:03:41.03,Default,,0000,0000,0000,,do a lot with these systems without\Nneeding to have the huge resources of a Dialogue: 0,0:03:41.03,0:03:51.12,Default,,0000,0000,0000,,multinational company or something, which\Nis kind of key. Okay, so we'll do. Mega. Dialogue: 0,0:03:51.12,0:04:02.76,Default,,0000,0000,0000,,Oh. 36C3. Okay. I'll press a five for\Npresentation mode, which really just hides Dialogue: 0,0:04:02.76,0:04:09.16,Default,,0000,0000,0000,,the cursor. And then I can use my clicker.\NSo we have to switch, the camera here for Dialogue: 0,0:04:09.16,0:04:15.85,Default,,0000,0000,0000,,a moment {\i1}applause{\i0} we switch the\Ncamera. So it's a genuine homemade Dialogue: 0,0:04:15.85,0:04:20.18,Default,,0000,0000,0000,,Commodore 64 compatible joystick. And it\Nmakes the most satisfying click noise when Dialogue: 0,0:04:20.18,0:04:29.93,Default,,0000,0000,0000,,we use it. So if we switch back to the\Nslides, that will be great. But they are Dialogue: 0,0:04:29.93,0:04:36.33,Default,,0000,0000,0000,,super, cool. So I am indeed going to be\Ntalking about creating resilient and Dialogue: 0,0:04:36.33,0:04:38.63,Default,,0000,0000,0000,,sustainable mobile phones and hopefully\Nthat link when we already have the the Dialogue: 0,0:04:38.63,0:04:46.12,Default,,0000,0000,0000,,artifact there of the megaphone prototype,\Nthat will become clearer as we go through. Dialogue: 0,0:04:46.12,0:04:51.00,Default,,0000,0000,0000,,So really, the last talk, was it kind of\Ninteresting talking about this whole a Dialogue: 0,0:04:51.00,0:04:54.34,Default,,0000,0000,0000,,different angle, this whole thing, that\Ncommunications has actually become really Dialogue: 0,0:04:54.34,0:05:00.36,Default,,0000,0000,0000,,weaponized over the last decade or two in\Nparticular that, you know, we're seeing Dialogue: 0,0:05:00.36,0:05:03.18,Default,,0000,0000,0000,,that, you know, where it used to be\Nnatural disasters, that are the main Dialogue: 0,0:05:03.18,0:05:06.84,Default,,0000,0000,0000,,problem, that now there is this whole\Nproblem of manmade disaster, which is a Dialogue: 0,0:05:06.84,0:05:11.84,Default,,0000,0000,0000,,major problem for us. And so we see\NInternet shut communication shutdowns. We Dialogue: 0,0:05:11.84,0:05:15.81,Default,,0000,0000,0000,,have surveillance happening in different\Nplaces where it really ought not be Dialogue: 0,0:05:15.81,0:05:19.90,Default,,0000,0000,0000,,happening. You know, this state level\Nactors that are very well resourced, able Dialogue: 0,0:05:19.90,0:05:23.69,Default,,0000,0000,0000,,to find zero day exploits. And the attack\Nsurface, as we know in modern Dialogue: 0,0:05:23.69,0:05:30.52,Default,,0000,0000,0000,,communications devices is simply huge. And\Nso this is this is very asymmetric in the Dialogue: 0,0:05:30.52,0:05:34.95,Default,,0000,0000,0000,,power equation between, you know, the\Nforces that seek to oppress people and, Dialogue: 0,0:05:34.95,0:05:38.49,Default,,0000,0000,0000,,you know, the vulnerable people at the\Ncoalface who are just trying to get on Dialogue: 0,0:05:38.49,0:05:42.72,Default,,0000,0000,0000,,with their lives and believe good decent\Nlives and need communications to help Dialogue: 0,0:05:42.72,0:05:46.96,Default,,0000,0000,0000,,protect themselves and enable that to\Nhappen. And that we're seeing that the Dialogue: 0,0:05:46.96,0:05:53.00,Default,,0000,0000,0000,,value of communications is so well\Nunderstood by these pressing forces that Dialogue: 0,0:05:53.00,0:05:56.26,Default,,0000,0000,0000,,it really has become quite a you know,\Nit's quite high up their list of things to Dialogue: 0,0:05:56.26,0:05:59.68,Default,,0000,0000,0000,,do. You know, you don't send the army in\Nfirst to quiet people down. You cut off Dialogue: 0,0:05:59.68,0:06:06.58,Default,,0000,0000,0000,,their Internet as the first thing. So this\Nis part of the backdrop of what we see. Dialogue: 0,0:06:06.58,0:06:11.78,Default,,0000,0000,0000,,And so what I would say is that the\Ndigital summer has actually finished. Dialogue: 0,0:06:11.78,0:06:18.05,Default,,0000,0000,0000,,We're now in the digital autumn. We can\Nsee in that, you know, with the with farms Dialogue: 0,0:06:18.05,0:06:20.64,Default,,0000,0000,0000,,and trees and things that, you know,\Nthere's still plenty of fruit to see in Dialogue: 0,0:06:20.64,0:06:25.68,Default,,0000,0000,0000,,the early autumn. Right? And there's lots\Non the ground. It feels like this time of Dialogue: 0,0:06:25.68,0:06:30.92,Default,,0000,0000,0000,,plenty will continue. And, you know, we\Ncan all eat as we need that there is Dialogue: 0,0:06:30.92,0:06:36.49,Default,,0000,0000,0000,,enough more or less to go around. But the\Nrisk that we have is from this parable of Dialogue: 0,0:06:36.49,0:06:39.85,Default,,0000,0000,0000,,the grasshopper and the yet. Who here\Nknows the parable of the grasshopper and Dialogue: 0,0:06:39.85,0:06:43.35,Default,,0000,0000,0000,,the ant? Hands right up. Is it really hard\Nfor me to see up here? Okay. We'll stop Dialogue: 0,0:06:43.35,0:06:49.33,Default,,0000,0000,0000,,and say who doesn't know? Okay, cool. So I\Nthought actually it was originally a Dialogue: 0,0:06:49.33,0:06:52.74,Default,,0000,0000,0000,,German kind of problem. This is the story\Nof where the grashoper, you know, the Dialogue: 0,0:06:52.74,0:06:56.57,Default,,0000,0000,0000,,grasshopper is kind of lounging around and\Nenjoying the summer. While ant aren't busy Dialogue: 0,0:06:56.57,0:07:00.53,Default,,0000,0000,0000,,carrying all the seeds back into the nest.\NAnd the ant's telling the grasshopper, Dialogue: 0,0:07:00.53,0:07:03.37,Default,,0000,0000,0000,,hey, you need to get some food and stuff\Nand put away for the winter so that you Dialogue: 0,0:07:03.37,0:07:07.61,Default,,0000,0000,0000,,can actually survive the winter. And the\Ngrasshopper is basically in denial about Dialogue: 0,0:07:07.61,0:07:11.65,Default,,0000,0000,0000,,the fact that, you know, the season will\Nchange. And then, of course, the season Dialogue: 0,0:07:11.65,0:07:14.63,Default,,0000,0000,0000,,changes. It snows and gets cold. And then\Nthe grasshopper kind of goes knocking on Dialogue: 0,0:07:14.63,0:07:17.68,Default,,0000,0000,0000,,the door of the antholl, not the lake,\Nkind of really have doors, but that's Dialogue: 0,0:07:17.68,0:07:21.87,Default,,0000,0000,0000,,fine. It's like, oh, I'm starving and cold\Nout here. And and ant is kind of like, Dialogue: 0,0:07:21.87,0:07:23.94,Default,,0000,0000,0000,,well, I've told you so kind of thing. And\NI think actually in the end, it kind of Dialogue: 0,0:07:23.94,0:07:28.27,Default,,0000,0000,0000,,lets it into we that want to scare\Nchildren too much with their stories. And Dialogue: 0,0:07:28.27,0:07:34.09,Default,,0000,0000,0000,,so this is actually the challenge that we\Nhave that we, I love every time I come to Dialogue: 0,0:07:34.09,0:07:38.73,Default,,0000,0000,0000,,these events or the creativity that we\Nsee. You know, we're enjoying the digital Dialogue: 0,0:07:38.73,0:07:41.87,Default,,0000,0000,0000,,summer and all of the things that is\Nletting us create and, you know, the great Dialogue: 0,0:07:41.87,0:07:45.40,Default,,0000,0000,0000,,open source software and tools and\Neverything that's going on, it's Dialogue: 0,0:07:45.40,0:07:50.63,Default,,0000,0000,0000,,absolutely fantastic. And we want that to\Nbe to continue indefinitely. But we know Dialogue: 0,0:07:50.63,0:07:55.20,Default,,0000,0000,0000,,that, as we said, that, you know, the you\Nknow, the chilling winds are beginning to Dialogue: 0,0:07:55.20,0:08:00.63,Default,,0000,0000,0000,,to come that tell us that unless we\Nactually do something about it, that this Dialogue: 0,0:08:00.63,0:08:05.71,Default,,0000,0000,0000,,isn't actually going to continue\Nindefinitely. And just a statement that I Dialogue: 0,0:08:05.71,0:08:09.40,Default,,0000,0000,0000,,really want to make here is this last\Npoint that I've got. The freedoms of the Dialogue: 0,0:08:09.40,0:08:14.46,Default,,0000,0000,0000,,second half of the 20th century, post-\NWorld War 2. If you look at history, they Dialogue: 0,0:08:14.46,0:08:22.89,Default,,0000,0000,0000,,are an aberration. To my knowledge, never\Nbefore and I fear perhaps never again will Dialogue: 0,0:08:22.89,0:08:27.81,Default,,0000,0000,0000,,we have that degree of personal liberty,\Nfocus on, you know, individual freedom and Dialogue: 0,0:08:27.81,0:08:32.13,Default,,0000,0000,0000,,agency and everything that was in this\Npost-World War era and is now starting to Dialogue: 0,0:08:32.13,0:08:38.90,Default,,0000,0000,0000,,unwind and starting to unwind back to the\Nnormal totally asymmetric, you know. Well, Dialogue: 0,0:08:38.90,0:08:43.50,Default,,0000,0000,0000,,to say sharing of power is the wrong word.\NIt's the greedy collection of power and Dialogue: 0,0:08:43.50,0:08:49.20,Default,,0000,0000,0000,,depravation of the mass population from\Nhaving any thing resembling a fair share Dialogue: 0,0:08:49.20,0:08:54.65,Default,,0000,0000,0000,,of what's going on. And so we have to act\Nif we want for the, you know, the digital Dialogue: 0,0:08:54.65,0:08:59.20,Default,,0000,0000,0000,,summer to continue or at worst for the\Ndigital winter to be as short and shallow Dialogue: 0,0:08:59.20,0:09:06.79,Default,,0000,0000,0000,,as we can have it, so that the you know,\Nwe can come back to a new digital summer. Dialogue: 0,0:09:06.79,0:09:13.16,Default,,0000,0000,0000,,Because once we hit the digital winter, it\Nwill actually be too late. Because if we Dialogue: 0,0:09:13.16,0:09:16.02,Default,,0000,0000,0000,,push this analogy, you know that the\Ndigital winter is the time when there is Dialogue: 0,0:09:16.02,0:09:22.06,Default,,0000,0000,0000,,no food on the train or it isn't any\Nlonger possible or at least practical to Dialogue: 0,0:09:22.06,0:09:27.86,Default,,0000,0000,0000,,create new technologies to enable us to,\Nyou know, to feed our digital needs. And Dialogue: 0,0:09:27.86,0:09:31.93,Default,,0000,0000,0000,,we can't plant any new crop, so to speak,\Nuntil the digital spring comes again after Dialogue: 0,0:09:31.93,0:09:36.91,Default,,0000,0000,0000,,that. And so the opportunity, like with\Nthe grasshopper is now before the winter Dialogue: 0,0:09:36.91,0:09:42.88,Default,,0000,0000,0000,,comes to say, right, what do we need to\Nhave in our store of technology, the store Dialogue: 0,0:09:42.88,0:09:46.29,Default,,0000,0000,0000,,of protocols, all of these different\Nthings, so that when the digital winter Dialogue: 0,0:09:46.29,0:09:51.58,Default,,0000,0000,0000,,comes, we don't starve. And fortunately,\Nyou know, we can actually change the Dialogue: 0,0:09:51.58,0:09:57.16,Default,,0000,0000,0000,,length of the digital winter. We can\Nempower people so that, you know, the Dialogue: 0,0:09:57.16,0:10:02.59,Default,,0000,0000,0000,,bitter cold of the digital winter is\Nmoderated and the spring can come as soon Dialogue: 0,0:10:02.59,0:10:08.54,Default,,0000,0000,0000,,as it can. And the trouble that we have\Nwith this, we actually don't know when the Dialogue: 0,0:10:08.54,0:10:13.28,Default,,0000,0000,0000,,digital winter will come exactly. We see\Nthese challenges around in the way that Dialogue: 0,0:10:13.28,0:10:18.74,Default,,0000,0000,0000,,different governments and non-state actors\Nas well, you know, working you in Dialogue: 0,0:10:18.74,0:10:23.95,Default,,0000,0000,0000,,propaganda and all all of these things\Nthat are becoming sadly more intense and Dialogue: 0,0:10:23.95,0:10:28.89,Default,,0000,0000,0000,,acute around us. We don't know when that\Ntipping point will happen. But given the Dialogue: 0,0:10:28.89,0:10:32.24,Default,,0000,0000,0000,,complexity of supply chains and things\Nthat are necessary in this, I think Bunny Dialogue: 0,0:10:32.24,0:10:37.41,Default,,0000,0000,0000,,was talking about that earlier today, \Nthat this is actually quite easy for it to Dialogue: 0,0:10:37.41,0:10:43.26,Default,,0000,0000,0000,,actually quite quickly flip into the\Ndigital winter mode. And then as with the Dialogue: 0,0:10:43.26,0:10:45.75,Default,,0000,0000,0000,,real winter, at the very beginning of\Nwinter, there might still be enough to Dialogue: 0,0:10:45.75,0:10:50.11,Default,,0000,0000,0000,,eat, but it gets harder and harder very\Nrapidly. And, you know, if the winter gets Dialogue: 0,0:10:50.11,0:10:55.25,Default,,0000,0000,0000,,too deep, then it's just not going to be\Npossible to continue with these things. Dialogue: 0,0:10:55.25,0:11:00.93,Default,,0000,0000,0000,,And so we've tried to think about what's\Nneeded to actually overcome this. What do Dialogue: 0,0:11:00.93,0:11:04.66,Default,,0000,0000,0000,,we need focusing on mobile communications\Nas a key piece of that? And there's a Dialogue: 0,0:11:04.66,0:11:10.17,Default,,0000,0000,0000,,reason for that in that it's the way that\Nwe can communicate, organize, you know, Dialogue: 0,0:11:10.17,0:11:14.68,Default,,0000,0000,0000,,collectively protect communities against\Nthe threats that come in. If we look at Dialogue: 0,0:11:14.68,0:11:19.08,Default,,0000,0000,0000,,things like that great Haiti earthquake\Njust back in 2010, the breakdown of Dialogue: 0,0:11:19.08,0:11:23.03,Default,,0000,0000,0000,,communications and law and order meant\Nthat they were quite horrible things going Dialogue: 0,0:11:23.03,0:11:28.46,Default,,0000,0000,0000,,on. We don't know about three days,\Nactually, of the earthquake there. So Dialogue: 0,0:11:28.46,0:11:32.97,Default,,0000,0000,0000,,there were militias that were basically\Nrobbing medical teams, trying to transport Dialogue: 0,0:11:32.97,0:11:37.12,Default,,0000,0000,0000,,people between different hospitals. And\Nthere were much nastier things with, you Dialogue: 0,0:11:37.12,0:11:40.16,Default,,0000,0000,0000,,know, gangs of people going around \Nfrom village to village, basically doing Dialogue: 0,0:11:40.16,0:11:45.30,Default,,0000,0000,0000,,whatever they want to, whoever they want.\NIt was really not cool. And so we want to Dialogue: 0,0:11:45.30,0:11:51.53,Default,,0000,0000,0000,,avoid that kind of problem that comes, when\Npeople are not able to to collectively Dialogue: 0,0:11:51.53,0:11:57.18,Default,,0000,0000,0000,,work together effectively as a community.\NAnd so the GPO four freedoms that we know Dialogue: 0,0:11:57.18,0:12:00.97,Default,,0000,0000,0000,,from software, they're a great starting\Npoint. But I think actually we've seen Dialogue: 0,0:12:00.97,0:12:05.14,Default,,0000,0000,0000,,enough things like with TiVoization and\Nall these sorts of other challenges, that Dialogue: 0,0:12:05.14,0:12:10.41,Default,,0000,0000,0000,,this is not sufficient, when it comes to\Nhardware. And there's actually some even Dialogue: 0,0:12:10.41,0:12:14.83,Default,,0000,0000,0000,,more complicated things. You start talking\Nabout mobile phone kind of hardware, as to Dialogue: 0,0:12:14.83,0:12:20.18,Default,,0000,0000,0000,,how we can do that, which I'll talk about\Nin a moment. But these are a starting Dialogue: 0,0:12:20.18,0:12:23.94,Default,,0000,0000,0000,,point of what I've come up with as things\Nthat I see as being necessary. There's Dialogue: 0,0:12:23.94,0:12:27.88,Default,,0000,0000,0000,,ample room for improvement. And in fact,\Nwith any of what we're trying to do in Dialogue: 0,0:12:27.88,0:12:32.83,Default,,0000,0000,0000,,this space, we need folks to come along\Nand help us. We can't do it alone. We need Dialogue: 0,0:12:32.83,0:12:39.18,Default,,0000,0000,0000,,to work together so that we can help\None another when the digital winter comes. Dialogue: 0,0:12:39.18,0:12:44.90,Default,,0000,0000,0000,,So the first freedom is simply the freedom\Nfrom energy infrastructure. We know Dialogue: 0,0:12:44.90,0:12:48.32,Default,,0000,0000,0000,,critical infrastructure is disturbingly\Nvulnerable, that the security of it is Dialogue: 0,0:12:48.32,0:12:52.17,Default,,0000,0000,0000,,quite bad. But also you have these like\Nlarge centralized places that produce the Dialogue: 0,0:12:52.17,0:12:56.70,Default,,0000,0000,0000,,energy that we need. And, you know, we see\Npower cut offs in Venezuela and all of Dialogue: 0,0:12:56.70,0:12:58.39,Default,,0000,0000,0000,,these sorts of \Nthings, regardless Dialogue: 0,0:12:58.39,0:12:59.39,Default,,0000,0000,0000,,of who's actually doing it, whether\Nit's sabotage or whether Dialogue: 0,0:12:59.39,0:13:02.32,Default,,0000,0000,0000,,it was purposeful from the\Ngovernment, I don't know. It actually Dialogue: 0,0:13:02.32,0:13:06.34,Default,,0000,0000,0000,,doesn't matter. The fact is, it happens.\NBut also, of course, a natural disaster. Dialogue: 0,0:13:06.34,0:13:10.31,Default,,0000,0000,0000,,Power goes out. Fortunately, this is\Nactually one of the easiest things to Dialogue: 0,0:13:10.31,0:13:15.43,Default,,0000,0000,0000,,solve. We just need to include some kind\Nof alternative energy supply into the kind Dialogue: 0,0:13:15.43,0:13:18.89,Default,,0000,0000,0000,,of devices that we're creating. So that\Ncould be solar panel on the back. Or you Dialogue: 0,0:13:18.89,0:13:23.00,Default,,0000,0000,0000,,could have the you know, the Faraday, you\Nknow, you shake it like a martini kind of Dialogue: 0,0:13:23.00,0:13:27.09,Default,,0000,0000,0000,,thing to generate power or both, whatever\Nyou feel like. Or if you can find a good Dialogue: 0,0:13:27.09,0:13:31.47,Default,,0000,0000,0000,,supply of NASA radio, I hope then with\Ngenerators, that would also be fantastic. Dialogue: 0,0:13:31.47,0:13:35.49,Default,,0000,0000,0000,,And we'll keep you warm through the winter\Nas well. But, you know, if anyone has a Dialogue: 0,0:13:35.49,0:13:40.63,Default,,0000,0000,0000,,supply of those, let me know. I'd love to\Nhear. So then the second freedom is Dialogue: 0,0:13:40.63,0:13:43.76,Default,,0000,0000,0000,,actually quite similar to the first. It's\Nthe realization that we need energy to Dialogue: 0,0:13:43.76,0:13:49.30,Default,,0000,0000,0000,,communicate in communications, to organize\Nourselves and be effective. And again, the Dialogue: 0,0:13:49.30,0:13:53.66,Default,,0000,0000,0000,,communications infrastructure is in many\Nways that she even more fragile than the Dialogue: 0,0:13:53.66,0:13:58.43,Default,,0000,0000,0000,,energy production. Infrastructure is much\Neasier to guard a couple of power stations Dialogue: 0,0:13:58.43,0:14:01.88,Default,,0000,0000,0000,,in a country than it is to guard every\Nphone tower and all of the interconnecting Dialogue: 0,0:14:01.88,0:14:06.05,Default,,0000,0000,0000,,links and all these sorts of things\Nbetween them. As we said, communications Dialogue: 0,0:14:06.05,0:14:11.78,Default,,0000,0000,0000,,depravation is already being weaponized\Nagainst the vulnerable around us. Again, Dialogue: 0,0:14:11.78,0:14:13.89,Default,,0000,0000,0000,,fortunate there's been a whole pile of\Nwork in the space of the previous work Dialogue: 0,0:14:13.89,0:14:19.73,Default,,0000,0000,0000,,I've done with the serval mesh and \Nfreifunk. And a whole bunch of groups Dialogue: 0,0:14:19.73,0:14:23.53,Default,,0000,0000,0000,,working on a whole bunch of different\Nthings in this kind of space for peer to Dialogue: 0,0:14:23.53,0:14:28.62,Default,,0000,0000,0000,,peer secure, authenticated communications.\NSo, yes, there's work to be done, but this Dialogue: 0,0:14:28.62,0:14:32.24,Default,,0000,0000,0000,,is an area where there's actually already\Nlike the energy one. There's been quite a Dialogue: 0,0:14:32.24,0:14:39.73,Default,,0000,0000,0000,,lot of work done that makes that quite\Nfeasible to work on. So then we start Dialogue: 0,0:14:39.73,0:14:43.60,Default,,0000,0000,0000,,going into some of the the harder ones, we\Nneed to make sure that we are not Dialogue: 0,0:14:43.60,0:14:50.38,Default,,0000,0000,0000,,dependent on, you know, the major vendors\Nof our devices, when it comes to the Dialogue: 0,0:14:50.38,0:14:53.80,Default,,0000,0000,0000,,security of our devices. So this starts\Nwith simple things like that the GPL Dialogue: 0,0:14:53.80,0:14:58.68,Default,,0000,0000,0000,,provides. So, you know, full source code\Nhas to be available. But more than that, Dialogue: 0,0:14:58.68,0:15:04.52,Default,,0000,0000,0000,,we actually have to make sure that we can\Nactually exercise those rights in Dialogue: 0,0:15:04.52,0:15:09.35,Default,,0000,0000,0000,,practice. So it needs to be simple enough\Nthat we can actually, you know, go right. Dialogue: 0,0:15:09.35,0:15:13.31,Default,,0000,0000,0000,,Okay. There's a security vulnerability in\Nsuch and such like you now. Yes. You were Dialogue: 0,0:15:13.31,0:15:16.82,Default,,0000,0000,0000,,talking about earlier today with some of\Nthe bluetooth things. And then to actually Dialogue: 0,0:15:16.82,0:15:21.79,Default,,0000,0000,0000,,be out to patch it yourself, it's quite\Nobvious that this is not the case for Dialogue: 0,0:15:21.79,0:15:26.13,Default,,0000,0000,0000,,whether it's firmware or whether it's the\Nregular operating system on modern mobile Dialogue: 0,0:15:26.13,0:15:30.97,Default,,0000,0000,0000,,phones. So who here is actually built\NAndroid from source themselves? Excellent. Dialogue: 0,0:15:30.97,0:15:36.95,Default,,0000,0000,0000,,Expected to see a few folks here. Who has\Ntried and gave up in disgust. Right. More Dialogue: 0,0:15:36.95,0:15:41.53,Default,,0000,0000,0000,,hands? Yes. I myself was all like, you\Nknow, I work on the civil project and we Dialogue: 0,0:15:41.53,0:15:45.10,Default,,0000,0000,0000,,do a whole pile of things and basically\Njust know after spending a number of hours Dialogue: 0,0:15:45.10,0:15:48.31,Default,,0000,0000,0000,,on, it just went like, you know, this is\Nactually this is a lot of work for Dialogue: 0,0:15:48.31,0:15:52.67,Default,,0000,0000,0000,,something that ought to be straightforward\Nif we want to be out to make rapid Dialogue: 0,0:15:52.67,0:15:58.29,Default,,0000,0000,0000,,progress. And so we want to have systems\Nthat are simple enough, we can patch. But Dialogue: 0,0:15:58.29,0:16:01.29,Default,,0000,0000,0000,,in fact, there's another really key\Nadvantage, the simplicity that I'll Dialogue: 0,0:16:01.29,0:16:05.92,Default,,0000,0000,0000,,probably come over a few times in this\Ntalk, and that is that simplicity reduces Dialogue: 0,0:16:05.92,0:16:10.82,Default,,0000,0000,0000,,the attack surface. If we are in an\Nasymmetric power environment, where there Dialogue: 0,0:16:10.82,0:16:15.50,Default,,0000,0000,0000,,are whether they are state or non-state\Nactors seeking to deprive vulnerable Dialogue: 0,0:16:15.50,0:16:19.82,Default,,0000,0000,0000,,people of communications, they're going to\Nhave potentially the ability to put whole Dialogue: 0,0:16:19.82,0:16:24.28,Default,,0000,0000,0000,,teams looking for vulnerabilities in\Nsoftware. In contrast, we might be lucky Dialogue: 0,0:16:24.28,0:16:28.13,Default,,0000,0000,0000,,to have someone who's going to try and\Nmadly find when things are being exploited Dialogue: 0,0:16:28.13,0:16:35.41,Default,,0000,0000,0000,,and to patch them. So we need to have ways\Naround this kind of thing. And to my mind, Dialogue: 0,0:16:35.41,0:16:38.46,Default,,0000,0000,0000,,reducing the attack surface is the only\Nway that we can actually have any real Dialogue: 0,0:16:38.46,0:16:47.88,Default,,0000,0000,0000,,hope of, you know, being at a keep up in\Nthat arms race of security. So Freedom #4 Dialogue: 0,0:16:47.88,0:16:50.94,Default,,0000,0000,0000,,is related to this previous one. Is\Nactually saying not only do we want to be Dialogue: 0,0:16:50.94,0:16:54.35,Default,,0000,0000,0000,,at a patch, where she wants to be at a\Nchange, enhance doing these things. And Dialogue: 0,0:16:54.35,0:16:58.65,Default,,0000,0000,0000,,again, it comes back to the same basic\Nneed that the software is actually able to Dialogue: 0,0:16:58.65,0:17:03.02,Default,,0000,0000,0000,,be compiled. And the hardware designs are\Nsimple enough that we can actually, you Dialogue: 0,0:17:03.02,0:17:10.66,Default,,0000,0000,0000,,know, to work on these things so that we\Nget not merely in theory have permission Dialogue: 0,0:17:10.66,0:17:17.09,Default,,0000,0000,0000,,to innovate, but that it is in practice\Nfeasible to do so. And again, the simpler Dialogue: 0,0:17:17.09,0:17:21.17,Default,,0000,0000,0000,,the system, the the the more probable it\Nis that we can actually succeed in this Dialogue: 0,0:17:21.17,0:17:28.83,Default,,0000,0000,0000,,kind of space. And then again, there's a\Nlot of these are quite interrelated, Dialogue: 0,0:17:28.83,0:17:30.11,Default,,0000,0000,0000,,that's part of why I \Nsay it would actually be Dialogue: 0,0:17:30.11,0:17:32.12,Default,,0000,0000,0000,,great to get feedback\Non how we might Dialogue: 0,0:17:32.12,0:17:34.87,Default,,0000,0000,0000,,restructure these to make the boundaries\Nreally clear Dialogue: 0,0:17:34.87,0:17:37.51,Default,,0000,0000,0000,,between these freedoms\Nthat we need. Dialogue: 0,0:17:37.51,0:17:41.79,Default,,0000,0000,0000,,So we need the freedom to\Nmaintain the devices for the long run. So Dialogue: 0,0:17:41.79,0:17:47.71,Default,,0000,0000,0000,,who here has or has had a fair phone, for\Nexample? I love the fair phone by the way. Dialogue: 0,0:17:47.71,0:17:53.75,Default,,0000,0000,0000,,A number of us. I've had one as well. And,\Nyou know, if you talk to the people at Dialogue: 0,0:17:53.75,0:17:58.62,Default,,0000,0000,0000,,Faith, I think they have a team of a bunch\Nof people just trying to maintain Android Dialogue: 0,0:17:58.62,0:18:02.52,Default,,0000,0000,0000,,on the faire phone 2, for example. And\Nalso now on the faire phone 3 as it comes Dialogue: 0,0:18:02.52,0:18:07.38,Default,,0000,0000,0000,,out. And this is actually really hard\Nwork. But again, the complexity and the Dialogue: 0,0:18:07.38,0:18:11.66,Default,,0000,0000,0000,,barriers that are there, make it really\Ndifficult to be able to just keep the Dialogue: 0,0:18:11.66,0:18:14.98,Default,,0000,0000,0000,,thing running with the same hardware\Nlittle and each time you want to target Dialogue: 0,0:18:14.98,0:18:19.71,Default,,0000,0000,0000,,new hardware with new capabilities. This\Nis just going to be, you know, as a Dialogue: 0,0:18:19.71,0:18:23.09,Default,,0000,0000,0000,,community, we can probably do one or two\Ndevices if we kind of all collected our Dialogue: 0,0:18:23.09,0:18:27.79,Default,,0000,0000,0000,,effort. But to actually do it for, you\Nknow, devices that meet individual needs Dialogue: 0,0:18:27.79,0:18:31.17,Default,,0000,0000,0000,,or, you know, appropriate for a particular\Narea might have, as we say, a different Dialogue: 0,0:18:31.17,0:18:34.98,Default,,0000,0000,0000,,energy source. So I might want to try\Nputting, you know, some thermal electric Dialogue: 0,0:18:34.98,0:18:39.81,Default,,0000,0000,0000,,thing or whatever that at the moment to do\Nthat with mobile phone hardware is just Dialogue: 0,0:18:39.81,0:18:44.31,Default,,0000,0000,0000,,prohibitive in the complexity and the, you\Nknow, the resourcing and effort that it Dialogue: 0,0:18:44.31,0:18:51.13,Default,,0000,0000,0000,,would require. So we need to find\Nsolutions around this. And then again, Dialogue: 0,0:18:51.13,0:18:55.47,Default,,0000,0000,0000,,related to that, overall, we have this\Nproblem of scale dependency. I think this Dialogue: 0,0:18:55.47,0:18:59.95,Default,,0000,0000,0000,,is one of the really key things at the\Nmoment to make a mobile phone. You need to Dialogue: 0,0:18:59.95,0:19:03.54,Default,,0000,0000,0000,,have a big enough market and you'd have a\Nbig enough enterprise and enough capital Dialogue: 0,0:19:03.54,0:19:07.34,Default,,0000,0000,0000,,and all of the rest of it to actually be\Nhad to go through the very expensive Dialogue: 0,0:19:07.34,0:19:13.27,Default,,0000,0000,0000,,process of designing the thing, getting\Ninjection molding, tooling and all of that Dialogue: 0,0:19:13.27,0:19:18.58,Default,,0000,0000,0000,,kind of thing made. That, you know, to do\Nthat for a modern phone. I suspect it's a Dialogue: 0,0:19:18.58,0:19:23.81,Default,,0000,0000,0000,,few million euros to do it reasonably\Nwell. And if you did it on the cheap and Dialogue: 0,0:19:23.81,0:19:30.27,Default,,0000,0000,0000,,skinny is probably still maybe something\Nlike a million euros to achieve. So we Dialogue: 0,0:19:30.27,0:19:39.10,Default,,0000,0000,0000,,have to somehow break this down, to make\Nit feasible to do. And as I said earlier, Dialogue: 0,0:19:39.10,0:19:43.53,Default,,0000,0000,0000,,simplicity is a key theme to my mind, and\Nit is the only way I think that we can Dialogue: 0,0:19:43.53,0:19:46.49,Default,,0000,0000,0000,,actually do it. So we've already talked\Nabout the challenges of distributing an Dialogue: 0,0:19:46.49,0:19:51.01,Default,,0000,0000,0000,,Android ROM, let alone modifying it to do\Nnew things in any kind of sophisticated Dialogue: 0,0:19:51.01,0:19:54.87,Default,,0000,0000,0000,,way. And even if you do, the hardware is\Nactually too complicated. And there's a Dialogue: 0,0:19:54.87,0:19:58.49,Default,,0000,0000,0000,,whole pile of trust issues around the\Ncomplicated hardware. If you can't Dialogue: 0,0:19:58.49,0:20:02.13,Default,,0000,0000,0000,,understand something, by definition, it's\Na black box. And if it's a black box, by Dialogue: 0,0:20:02.13,0:20:06.51,Default,,0000,0000,0000,,definition, you can't trust it. Because\Nyou don't know what's inside. So, you Dialogue: 0,0:20:06.51,0:20:10.52,Default,,0000,0000,0000,,know, we we have this point again, the\Ndigital winter. You don't want any black Dialogue: 0,0:20:10.52,0:20:15.97,Default,,0000,0000,0000,,boxes or if you do, you want them very\Ncarefully monitored and managed. And so Dialogue: 0,0:20:15.97,0:20:19.80,Default,,0000,0000,0000,,the system has to be not simple enough to\Nmake once. It is simple enough that we can Dialogue: 0,0:20:19.80,0:20:24.66,Default,,0000,0000,0000,,actually remake it again and again and\Nagain, as we have need. It's a bit like Dialogue: 0,0:20:24.66,0:20:27.39,Default,,0000,0000,0000,,the difference between a chainsaw or an\Nax, right? If you want to be in a remote Dialogue: 0,0:20:27.39,0:20:32.49,Default,,0000,0000,0000,,area and have to be self-sufficient. Much\Nbetter to depend on ax to chop your wood, Dialogue: 0,0:20:32.49,0:20:36.10,Default,,0000,0000,0000,,because if you need two, you can make a\Nnew handle for your ax. And you know, with Dialogue: 0,0:20:36.10,0:20:39.95,Default,,0000,0000,0000,,a bit more effort, you could do some very\Nsimple metallurgy and, you know, metal Dialogue: 0,0:20:39.95,0:20:43.92,Default,,0000,0000,0000,,smelting with iron ore. If you happen to\Nbe lucky enough to have an area or copper Dialogue: 0,0:20:43.92,0:20:47.77,Default,,0000,0000,0000,,or whatever, it's going to be a much\Neasier proposition than having to do that Dialogue: 0,0:20:47.77,0:20:50.78,Default,,0000,0000,0000,,and then somehow make a fine machine\Ntooling and making you chain parts and Dialogue: 0,0:20:50.78,0:20:55.62,Default,,0000,0000,0000,,motor parts and all of this kind of thing.\NSo it has to be if it is going to be Dialogue: 0,0:20:55.62,0:20:59.64,Default,,0000,0000,0000,,resilient and survivable, it has to be\Nsimple enough that you actually can build Dialogue: 0,0:20:59.64,0:21:03.18,Default,,0000,0000,0000,,it with relatively simple tools going\Nforward. Electronics is going to be a big Dialogue: 0,0:21:03.18,0:21:07.10,Default,,0000,0000,0000,,challenge in this area because, you know,\Nyou need to be PCV fabrication, you need Dialogue: 0,0:21:07.10,0:21:11.06,Default,,0000,0000,0000,,to get components and things. But we have\Nto try and reduce the barriers as much as Dialogue: 0,0:21:11.06,0:21:14.65,Default,,0000,0000,0000,,we can, so that at least, for example,\Ncomponent scavenging, for example, might Dialogue: 0,0:21:14.65,0:21:19.20,Default,,0000,0000,0000,,be an option. Or devices that will be\Navailable, because they're still needed by Dialogue: 0,0:21:19.20,0:21:24.10,Default,,0000,0000,0000,,other industries that have more protection\Nas we head into a digital winter Dialogue: 0,0:21:24.10,0:21:31.45,Default,,0000,0000,0000,,environment that we can take and repurpose\Nthat kind of hardware. So that this kind Dialogue: 0,0:21:31.45,0:21:36.47,Default,,0000,0000,0000,,of leads into this tension then of saying,\Nokay, if we make something which is simple Dialogue: 0,0:21:36.47,0:21:41.04,Default,,0000,0000,0000,,enough, we know we as a community, we only\Nhave limited resources available to us, to Dialogue: 0,0:21:41.04,0:21:45.12,Default,,0000,0000,0000,,make this kind of resilient device. Do we\Nmake one or do we all kind of like run off Dialogue: 0,0:21:45.12,0:21:52.66,Default,,0000,0000,0000,,and make different kind of things? And I\Nthink the you know, this is a tension. I'm Dialogue: 0,0:21:52.66,0:21:57.37,Default,,0000,0000,0000,,not going to claim that. I know the\Nabsolute best setting for this. I think we Dialogue: 0,0:21:57.37,0:22:02.00,Default,,0000,0000,0000,,need to have, as I say, kind of multiple\Ngerm lines so that if one system gets Dialogue: 0,0:22:02.00,0:22:05.72,Default,,0000,0000,0000,,chronically critically broken or proves to\Nbe ineffective and that, you know, there Dialogue: 0,0:22:05.72,0:22:09.50,Default,,0000,0000,0000,,are others kind of in the wing that can\Nkind of fill that niche in the Dialogue: 0,0:22:09.50,0:22:14.57,Default,,0000,0000,0000,,environment. But we don't have so many,\Nthat if you don't get anywhere. And so Dialogue: 0,0:22:14.57,0:22:19.00,Default,,0000,0000,0000,,this is a bit tricky. My gut feeling is,\Nyou know, making a an initial device that Dialogue: 0,0:22:19.00,0:22:22.02,Default,,0000,0000,0000,,can kind of demonstrate some of these kind\Nof positive properties. And then so other Dialogue: 0,0:22:22.02,0:22:23.98,Default,,0000,0000,0000,,people will look at and go like, well,\Nthat's really great. That's got us Dialogue: 0,0:22:23.98,0:22:26.66,Default,,0000,0000,0000,,forward. But, you know, that was a really\Nstupid design. I think this is a way Dialogue: 0,0:22:26.66,0:22:30.45,Default,,0000,0000,0000,,better way to do it in the way, that we\Nhave that freedom in the open source Dialogue: 0,0:22:30.45,0:22:36.44,Default,,0000,0000,0000,,community to do, is probably a pretty good\Nway to do things. And I would say, we're Dialogue: 0,0:22:36.44,0:22:41.22,Default,,0000,0000,0000,,not yet at the end point of that proof of\Nconcept, but we're trying to move things Dialogue: 0,0:22:41.22,0:22:47.42,Default,,0000,0000,0000,,forward to that and that point. So, come\Nactual to the the megaphone that we're Dialogue: 0,0:22:47.42,0:22:53.66,Default,,0000,0000,0000,,trying to create. And so in terms of what\Nwe've actually set out to do for the goals Dialogue: 0,0:22:53.66,0:22:57.52,Default,,0000,0000,0000,,and kind of the methodology, we want\Nsomething, which is simple, secure, self- Dialogue: 0,0:22:57.52,0:23:03.33,Default,,0000,0000,0000,,sufficient and survivable. A lot of the\Nwork that I do is, for example, with, you Dialogue: 0,0:23:03.33,0:23:06.46,Default,,0000,0000,0000,,know, NGOs. We've worked with folks\Nfrom Red Cross. We work with folks from Dialogue: 0,0:23:06.46,0:23:11.49,Default,,0000,0000,0000,,the UN World Food Program, who part of\Nthe interestingly, are the distributors of Dialogue: 0,0:23:11.49,0:23:15.99,Default,,0000,0000,0000,,communications in the UN cluster system\Nfor disasters. Because they kind of like Dialogue: 0,0:23:15.99,0:23:19.21,Default,,0000,0000,0000,,hand out blankets and they hand out rice\Nand things. Someone basically say to them, Dialogue: 0,0:23:19.21,0:23:23.44,Default,,0000,0000,0000,,well, you should also be handing out the\Ncommunications. And so that's just kind of Dialogue: 0,0:23:23.44,0:23:28.80,Default,,0000,0000,0000,,how it's fell. And so, you know, in an\Neasy way I do smartphony kind of things Dialogue: 0,0:23:28.80,0:23:32.43,Default,,0000,0000,0000,,like would be great to have some\Nnavigation, it would be great to have in a Dialogue: 0,0:23:32.43,0:23:35.61,Default,,0000,0000,0000,,disaster context, the ability to fill in\Nforms on the screen with a touch screen Dialogue: 0,0:23:35.61,0:23:40.39,Default,,0000,0000,0000,,and the rest of it and have the uplink\Nthrough. So if you think, you know, an Dialogue: 0,0:23:40.39,0:23:45.48,Default,,0000,0000,0000,,Ebola outbreak in Africa, for example, to\Nbe out a collect, you know that case Dialogue: 0,0:23:45.48,0:23:48.69,Default,,0000,0000,0000,,information to track down the you know,\Nthe case zeros and. Kind of thing, you Dialogue: 0,0:23:48.69,0:23:55.02,Default,,0000,0000,0000,,need communications that can work. Often\Nthese outbreaks happen in places where law Dialogue: 0,0:23:55.02,0:23:58.85,Default,,0000,0000,0000,,and order and civil society is not really\Nworking. Because if it was, then they Dialogue: 0,0:23:58.85,0:24:01.58,Default,,0000,0000,0000,,wouldn't have had the outbreak there, it\Nwould have been managed more effectively. Dialogue: 0,0:24:01.58,0:24:07.07,Default,,0000,0000,0000,,And so you need this kind of,\Nyou know, dependable device that can work Dialogue: 0,0:24:07.07,0:24:10.73,Default,,0000,0000,0000,,independent of everything else that's\Ngoing on. And that might have to do Dialogue: 0,0:24:10.73,0:24:14.12,Default,,0000,0000,0000,,software updates, for example, over a\Nreally expensive narrowband satellite link Dialogue: 0,0:24:14.12,0:24:19.00,Default,,0000,0000,0000,,that might be, you know, tens of bytes per\Nsecond or less. So that was kind of some Dialogue: 0,0:24:19.00,0:24:26.16,Default,,0000,0000,0000,,of the, you know, the motivation around\Nthis to create it. And it separately have Dialogue: 0,0:24:26.16,0:24:32.25,Default,,0000,0000,0000,,been working on the Mega 65 project for a\Ncouple of years at that point. And it just Dialogue: 0,0:24:32.25,0:24:36.15,Default,,0000,0000,0000,,kind of dawned on me that actually this\Nsimple 8 bit architecture is Dialogue: 0,0:24:36.15,0:24:40.61,Default,,0000,0000,0000,,powerful enough to actually be useful to\Ndo some things. Math kind of, you know, Dialogue: 0,0:24:40.61,0:24:44.83,Default,,0000,0000,0000,,well, you're doing this. You know, the fun\Nproof of, you know, proof by example, Dialogue: 0,0:24:44.83,0:24:49.77,Default,,0000,0000,0000,,really, of delivering the slides with this\Nmachine to show. that you can do useful Dialogue: 0,0:24:49.77,0:24:53.38,Default,,0000,0000,0000,,things if you write the code carefully \Nand carefully written code is more likely Dialogue: 0,0:24:53.38,0:24:59.70,Default,,0000,0000,0000,,to be verifiable and secure. And it's\Nprobably I don't think you can get any Dialogue: 0,0:24:59.70,0:25:03.44,Default,,0000,0000,0000,,simpler than an eight bit system and still\Nbe useful like I don't think we want to be Dialogue: 0,0:25:03.44,0:25:09.66,Default,,0000,0000,0000,,trying to use an Intel 4004 derived\N4 Bit CPU to do things. Boeing's if Dialogue: 0,0:25:09.66,0:25:13.01,Default,,0000,0000,0000,,someone can find a way to do something\Nwith a system that's that simple and they Dialogue: 0,0:25:13.01,0:25:17.21,Default,,0000,0000,0000,,can still do everything we need and it\Nmakes it even easier to verify. Fantastic. Dialogue: 0,0:25:17.21,0:25:21.17,Default,,0000,0000,0000,,My gut feeling is it would actually be\Nworse on every point, because the amount Dialogue: 0,0:25:21.17,0:25:24.90,Default,,0000,0000,0000,,of work that you would have to do to do\Neach useful thing, you end up with code Dialogue: 0,0:25:24.90,0:25:29.80,Default,,0000,0000,0000,,which is actually larger in size. That I\Nthink, my feeling is that the 8 Bit Dialogue: 0,0:25:29.80,0:25:33.13,Default,,0000,0000,0000,,architecture is about that sweet point.\NAnd so anyway, so as a result of the Dialogue: 0,0:25:33.13,0:25:40.26,Default,,0000,0000,0000,,Mega 65 work, it's based directly on that. So\Nthe the phone actually is a Mega 65 Dialogue: 0,0:25:40.26,0:25:48.60,Default,,0000,0000,0000,,importable form and will show that in a\Nlittle bit. And so we're getting towards Dialogue: 0,0:25:48.60,0:25:52.31,Default,,0000,0000,0000,,that kind of proof of concept stage. So we\Nhad the first phone calls back in Linuxconf. Dialogue: 0,0:25:52.31,0:25:55.74,Default,,0000,0000,0000,,So if you kind of dig back through this,\Nthe the video of that talk where with a Dialogue: 0,0:25:55.74,0:26:00.81,Default,,0000,0000,0000,,much earlier prototype, we actually had\Npeople calling the machine, which is quite Dialogue: 0,0:26:00.81,0:26:06.58,Default,,0000,0000,0000,,fun. And I took a little bit later as well\Nabout the some of the audio part kind of Dialogue: 0,0:26:06.58,0:26:10.57,Default,,0000,0000,0000,,issues around that. So let's look at those\Nsix freedoms again now, and what we're Dialogue: 0,0:26:10.57,0:26:14.81,Default,,0000,0000,0000,,trying to do with the megaphone. So energy\Nindependence. The first thing is we've got Dialogue: 0,0:26:14.81,0:26:18.76,Default,,0000,0000,0000,,a filthy, great big battery. I hate it\Nwhen phones go flat. And when you're in a Dialogue: 0,0:26:18.76,0:26:21.67,Default,,0000,0000,0000,,disaster zone or these kind of vulnerable\Nsituations, you really don't want it going Dialogue: 0,0:26:21.67,0:26:26.52,Default,,0000,0000,0000,,flat at the wrong time. So we've put a 32\Nwatt our lithium ion phosphate battery Dialogue: 0,0:26:26.52,0:26:31.68,Default,,0000,0000,0000,,that should have 2000 full charge cycles\Nin there. The device is about the size of Dialogue: 0,0:26:31.68,0:26:35.79,Default,,0000,0000,0000,,an intended switch in terms of surface\Narea. So putting high performance solar Dialogue: 0,0:26:35.79,0:26:39.40,Default,,0000,0000,0000,,cells like you would put on the solar\Nracing car or on your roof, we can Dialogue: 0,0:26:39.40,0:26:44.22,Default,,0000,0000,0000,,probably get about seven watts with that.\NAnd if you do the kind of math that's, you Dialogue: 0,0:26:44.22,0:26:52.13,Default,,0000,0000,0000,,know, four or so hours of charge time, but\Nwe know in reality that the, you know, the Dialogue: 0,0:26:52.13,0:26:55.83,Default,,0000,0000,0000,,solar environment will often be much worse\Nthan that. It might be only 10 percent of Dialogue: 0,0:26:55.83,0:26:59.62,Default,,0000,0000,0000,,what it to be 1 percent of that if you're\Ntalking about these kinds of latitudes Dialogue: 0,0:26:59.62,0:27:04.21,Default,,0000,0000,0000,,under cloudy conditions. And so you really\Nwant to have the big battery and as big a Dialogue: 0,0:27:04.21,0:27:07.72,Default,,0000,0000,0000,,solar panel as you can and you want the\Npower consumption to be as low as Dialogue: 0,0:27:07.72,0:27:12.89,Default,,0000,0000,0000,,possible. So we've got CPO data to\Ncandlelight little teeny tiny FPGAs, Dialogue: 0,0:27:12.89,0:27:16.05,Default,,0000,0000,0000,,that are managing the whole power\Nenvironment and wake up the main FPGA only Dialogue: 0,0:27:16.05,0:27:20.42,Default,,0000,0000,0000,,when something important needs to happen.\NSo we believe with 32 watt hours, we Dialogue: 0,0:27:20.42,0:27:25.86,Default,,0000,0000,0000,,should be out to get about a thousand\Nhours standby with a 4G off the shelf Dialogue: 0,0:27:25.86,0:27:29.99,Default,,0000,0000,0000,,cellular modem. And that's, you know,\Nassuming the solar panel was actually, you Dialogue: 0,0:27:29.99,0:27:35.33,Default,,0000,0000,0000,,know, like, you know, in a black box, even\Nthe light here, if we had the solar, the Dialogue: 0,0:27:35.33,0:27:40.02,Default,,0000,0000,0000,,seven watt solar panel would have a sunny\Nside up and we would be able to maintain Dialogue: 0,0:27:40.02,0:27:43.56,Default,,0000,0000,0000,,charge indefinitely on the device, because\Nwe only need to have about 8 Milli Dialogue: 0,0:27:43.56,0:27:49.88,Default,,0000,0000,0000,,Watts coming in. So we're talking about\None one thousandth of the capacity of the Dialogue: 0,0:27:49.88,0:27:56.59,Default,,0000,0000,0000,,solar panel. OK. So if a communications\Nfor independence, we really want as many Dialogue: 0,0:27:56.59,0:28:00.60,Default,,0000,0000,0000,,possible ways to communicate as we can and\Nthe naughty little things that we can't Dialogue: 0,0:28:00.60,0:28:05.48,Default,,0000,0000,0000,,trust, in particular the cellular modem,\Nwe want to have a sandbox and quarantined Dialogue: 0,0:28:05.48,0:28:09.45,Default,,0000,0000,0000,,so that it can't spread its naughty plague\Nof whatever vulnerabilities it has in Dialogue: 0,0:28:09.45,0:28:13.36,Default,,0000,0000,0000,,there. Again, there are black box. We\Ncan't trust them. They're too hard for us Dialogue: 0,0:28:13.36,0:28:16.96,Default,,0000,0000,0000,,to implement. So this is kind of a\Ndecision that we've taken. We'd much Dialogue: 0,0:28:16.96,0:28:21.20,Default,,0000,0000,0000,,rather have a fully open 4G modem and if \Nsomeone makes one fantastic, Dialogue: 0,0:28:21.20,0:28:22.74,Default,,0000,0000,0000,,will incorporate \Nit straight in. Dialogue: 0,0:28:22.74,0:28:24.87,Default,,0000,0000,0000,,Right. because the \Nsystemis designed to be Dialogue: 0,0:28:24.87,0:28:26.76,Default,,0000,0000,0000,,easy to change. \NBut in the meantime, Dialogue: 0,0:28:26.76,0:28:29.25,Default,,0000,0000,0000,,we have to kind of deal with\Nwhat there is. The great thing is that Dialogue: 0,0:28:29.25,0:28:34.04,Default,,0000,0000,0000,,these m.2 cellular modems are used\Nin vending machines, in cars, in all sorts Dialogue: 0,0:28:34.04,0:28:37.36,Default,,0000,0000,0000,,of things. So they're just the common\Neyes. Again, if he had to scavenge them in Dialogue: 0,0:28:37.36,0:28:41.85,Default,,0000,0000,0000,,the future. This would be quite feasible\Nand also means, we can upgrade. So we have Dialogue: 0,0:28:41.85,0:28:47.05,Default,,0000,0000,0000,,two of these slots, so we could actually\Nhave a dual 5G Commodore 64 so that, you Dialogue: 0,0:28:47.05,0:28:49.64,Default,,0000,0000,0000,,know, because he wants to \Nlight weight extra time Dialogue: 0,0:28:49.64,0:28:51.05,Default,,0000,0000,0000,,when you're downloading \Nyour games, right? Dialogue: 0,0:28:51.05,0:28:54.00,Default,,0000,0000,0000,,And 40 kilobytes can take a\Nlong time to download. I've only got one Dialogue: 0,0:28:54.00,0:28:58.60,Default,,0000,0000,0000,,5G link, right? We have two of them so we\Ncan do it in parallel. Because he was to Dialogue: 0,0:28:58.60,0:29:02.69,Default,,0000,0000,0000,,more than about, you know, four\Nmilliseconds to download new software and Dialogue: 0,0:29:02.69,0:29:07.97,Default,,0000,0000,0000,,again, limited communications availability\Nin these kind of oppressive environments. Dialogue: 0,0:29:07.97,0:29:12.19,Default,,0000,0000,0000,,This is actually key. You might only have\Nshort communications window. So while it Dialogue: 0,0:29:12.19,0:29:16.45,Default,,0000,0000,0000,,is a little bit tongue in cheek, it's not\Nentirely. And of course, with several Dialogue: 0,0:29:16.45,0:29:20.77,Default,,0000,0000,0000,,mesh, we've been doing, you know, UHF?\Npacket radio. So we've put in try band Dialogue: 0,0:29:20.77,0:29:25.88,Default,,0000,0000,0000,,Laura compatible radios in there. Not\NLaura when we're doing it fully. We're Dialogue: 0,0:29:25.88,0:29:29.78,Default,,0000,0000,0000,,just sending out radio packets and\Nlistening in with the modules. We've also Dialogue: 0,0:29:29.78,0:29:34.80,Default,,0000,0000,0000,,got ESP 1, 266 Wi-Fi and some Bluetooth in\Nthere. So that's some other potential Dialogue: 0,0:29:34.80,0:29:38.21,Default,,0000,0000,0000,,options. Acoustic networking. So we've \Ngot 4 microphones that are directly Dialogue: 0,0:29:38.21,0:29:42.14,Default,,0000,0000,0000,,connected to our FPGA so we can do crazy\Nsignal processing on that. And we've got a Dialogue: 0,0:29:42.14,0:29:46.95,Default,,0000,0000,0000,,nice loud speaker that should work up into\Nthe ultrasonic range so we could even have Dialogue: 0,0:29:46.95,0:29:51.37,Default,,0000,0000,0000,,quite decent communications over, you\Nknow, 10 or so meters in the acoustic Dialogue: 0,0:29:51.37,0:29:55.29,Default,,0000,0000,0000,,band. And there's a crazy bunch. And I've\Nforgotten the name of the research group Dialogue: 0,0:29:55.29,0:30:02.17,Default,,0000,0000,0000,,that do air gap jumping. And they've done\Nsome quite crazy things with acoustics Dialogue: 0,0:30:02.17,0:30:06.20,Default,,0000,0000,0000,,with the live your headphones plugged into\Nyour computer on your desk in a headphone Dialogue: 0,0:30:06.20,0:30:10.06,Default,,0000,0000,0000,,jack. You can software reconfigure that\Nand make that that's a speaker and Dialogue: 0,0:30:10.06,0:30:14.98,Default,,0000,0000,0000,,microphone. There's anyone that's\Ninterested in a hall after. And we can Dialogue: 0,0:30:14.98,0:30:19.08,Default,,0000,0000,0000,,have a look and try and find the link for\Nyou. We've also got infrared LED. And so Dialogue: 0,0:30:19.08,0:30:24.34,Default,,0000,0000,0000,,the idea with all of these kind of things\Nand whatever else you can kind of do, is Dialogue: 0,0:30:24.34,0:30:28.87,Default,,0000,0000,0000,,that it should be really hard for an\Nadversary to actually jam all of these Dialogue: 0,0:30:28.87,0:30:33.83,Default,,0000,0000,0000,,things at the same time. You know, you\Nmight be able to do broadband RF jamming, Dialogue: 0,0:30:33.83,0:30:38.27,Default,,0000,0000,0000,,but that's not going to stop the acoustics\Nor the LED. And even if you can kind of Dialogue: 0,0:30:38.27,0:30:41.69,Default,,0000,0000,0000,,make a lot of noise, it's gonna be really\Nhard to block the LED, if people are kind Dialogue: 0,0:30:41.69,0:30:47.75,Default,,0000,0000,0000,,of holding the devices near one another to\Ndo delay tolerant transfer. And of course, Dialogue: 0,0:30:47.75,0:30:51.29,Default,,0000,0000,0000,,any other crazy things that people come up\Nwith. Again, a simple system design that Dialogue: 0,0:30:51.29,0:30:57.68,Default,,0000,0000,0000,,you can extend it easily yourself. OK.\NSecurity independence. So the operating Dialogue: 0,0:30:57.68,0:31:01.38,Default,,0000,0000,0000,,system runs in a little bit CPU, which is\Nbasically a slightly enhanced version of Dialogue: 0,0:31:01.38,0:31:07.41,Default,,0000,0000,0000,,the Commodore 64 CPU. It has a a bit\Nhypervisor, which is 16 kilobytes inside Dialogue: 0,0:31:07.41,0:31:12.70,Default,,0000,0000,0000,,hardware limitation, because we don't want\Nit getting bigger. If it gets 16K then Dialogue: 0,0:31:12.70,0:31:15.23,Default,,0000,0000,0000,,you have to throw some other things out\Nand right. What does it actually really Dialogue: 0,0:31:15.23,0:31:18.72,Default,,0000,0000,0000,,need to do so, that you still have a\Nsystem which is actually much more Dialogue: 0,0:31:18.72,0:31:22.94,Default,,0000,0000,0000,,verifiable. And this kind of small\Nsoftware, it should be quite possible on Dialogue: 0,0:31:22.94,0:31:26.84,Default,,0000,0000,0000,,this machine to run a simple C compiler,\Nfor example, to we had to compile the Dialogue: 0,0:31:26.84,0:31:30.41,Default,,0000,0000,0000,,software that is actually running the\Ncore operating system, so we can have Dialogue: 0,0:31:30.41,0:31:34.72,Default,,0000,0000,0000,,that whole complete offgrid operation. \NWe've really talked a little bit about having Dialogue: 0,0:31:34.72,0:31:39.78,Default,,0000,0000,0000,,the untrusted components fully sandboxed. \NSo for example, cellular modems only have Dialogue: 0,0:31:39.78,0:31:45.32,Default,,0000,0000,0000,,a 80 command serial interface to the rest\Nof the system. And so this is going to Dialogue: 0,0:31:45.32,0:31:47.11,Default,,0000,0000,0000,,make it much harder for\Nan adversary to work Dialogue: 0,0:31:47.11,0:31:48.57,Default,,0000,0000,0000,,out how with a fully\Ncompromised cellular Dialogue: 0,0:31:48.57,0:31:52.05,Default,,0000,0000,0000,,modem, you can compromise the\Nrest of the system by giving presumably Dialogue: 0,0:31:52.05,0:31:56.25,Default,,0000,0000,0000,,bogus responses to 80 command requests.\NAnd because we know that's where the Dialogue: 0,0:31:56.25,0:32:00.16,Default,,0000,0000,0000,,vulnerable point is, we can put a lot of\Neffort in our software to really Dialogue: 0,0:32:00.16,0:32:04.29,Default,,0000,0000,0000,,interrogate the command response to the\Ncoming back and no look for any QIT Dialogue: 0,0:32:04.29,0:32:08.16,Default,,0000,0000,0000,,command responses within a semicolon, drop\Ntables and all the rest of it in there. It Dialogue: 0,0:32:08.16,0:32:13.22,Default,,0000,0000,0000,,should be pretty straightforward to pick\Nup. So we also have an integrated hardware Dialogue: 0,0:32:13.22,0:32:17.97,Default,,0000,0000,0000,,in sufferance inspectors, so that you can\Nreal time verify. It is a little bit fun. Dialogue: 0,0:32:17.97,0:32:22.72,Default,,0000,0000,0000,,So I can hit mega tab and we call it\Nmatrix mode for good reason. So the system Dialogue: 0,0:32:22.72,0:32:26.06,Default,,0000,0000,0000,,is still running in the background. So the\Nslides are still there. So I can go back Dialogue: 0,0:32:26.06,0:32:35.77,Default,,0000,0000,0000,,to the previous slow, I begin to say, it\Nwas a joystick actually when I'm in there. Dialogue: 0,0:32:35.77,0:32:43.30,Default,,0000,0000,0000,,Yes, they you go. Or file a bug for that, \Nbut we can, if I go back into it, we can Dialogue: 0,0:32:43.30,0:32:49.51,Default,,0000,0000,0000,,look at all of memory in real time. So if\Nyou are truly paranoid and you are about Dialogue: 0,0:32:49.51,0:32:53.36,Default,,0000,0000,0000,,to, for example, do some encrypted email\Non your, you know, digitally sovereign Dialogue: 0,0:32:53.36,0:32:57.96,Default,,0000,0000,0000,,device. You could actually go into this,\Nstop the CPU and then inspect every byte Dialogue: 0,0:32:57.96,0:33:02.65,Default,,0000,0000,0000,,of memory and compare it to your physical\Nprintout of the, you know, 30 or 40 Dialogue: 0,0:33:02.65,0:33:06.92,Default,,0000,0000,0000,,kilobytes of your software. Or you might\Nevery time he might do, you know, half a Dialogue: 0,0:33:06.92,0:33:10.97,Default,,0000,0000,0000,,kilobyte or something, right?! And verify\Nit so that progressively over time, you've Dialogue: 0,0:33:10.97,0:33:15.38,Default,,0000,0000,0000,,actually verified that the system is\Nalways byte identical. At that point in Dialogue: 0,0:33:15.38,0:33:18.66,Default,,0000,0000,0000,,time to what it should be doing. And\Nagain, the simplicity, we only have one Dialogue: 0,0:33:18.66,0:33:23.92,Default,,0000,0000,0000,,program running at a time. So, you know,\Nyou know exactly what the system is doing. Dialogue: 0,0:33:23.92,0:33:27.93,Default,,0000,0000,0000,,And we can tasks which we got a built in\Nphrase constantly if I press the restore Dialogue: 0,0:33:27.93,0:33:32.81,Default,,0000,0000,0000,,key. Anyone who's used a Commodore 64 and\Nwith an action replay will probably Dialogue: 0,0:33:32.81,0:33:36.85,Default,,0000,0000,0000,,recognize the inspired format. And so\Nthat's our program. They're running with Dialogue: 0,0:33:36.85,0:33:39.62,Default,,0000,0000,0000,,hardware, thumbnail, generation of colors,\Na bit wrong. We need to fix that. But, you Dialogue: 0,0:33:39.62,0:33:44.78,Default,,0000,0000,0000,,know, we've got other software that we've\Nhad running on it. And so if we wanted to, Dialogue: 0,0:33:44.78,0:33:52.21,Default,,0000,0000,0000,,you know, break up the presentation with a\Nquick game of Gyruss, for example. We can Dialogue: 0,0:33:52.21,0:33:56.30,Default,,0000,0000,0000,,do that. I need to switch the joystick.\NWhat I can do that in here as well. Jay. Dialogue: 0,0:33:56.30,0:33:58.77,Default,,0000,0000,0000,,{\i1}silence{\i0} Dialogue: 0,0:33:58.77,0:34:00.00,Default,,0000,0000,0000,,{\i1}retro music{\i0} Dialogue: 0,0:34:00.00,0:34:05.52,Default,,0000,0000,0000,,You know, if we wanted to, we can do that.\NAnd then we can go back and, you know, Dialogue: 0,0:34:05.52,0:34:09.33,Default,,0000,0000,0000,,pretend that we weren't doing anything\Nnaughty at all. And of course, I forgot to Dialogue: 0,0:34:09.33,0:34:12.57,Default,,0000,0000,0000,,save what I was doing first, right. So I\Nhave to load the program again. So that's Dialogue: 0,0:34:12.57,0:34:17.91,Default,,0000,0000,0000,,my bad. That's right. Because reboot time\Nis about two seconds. Dialogue: 0,0:34:17.91,0:34:36.88,Default,,0000,0000,0000,,{\i1}typing commands{\i0} Dialogue: 0,0:34:36.88,0:34:39.96,Default,,0000,0000,0000,,So the worst part now is that we actually\Nwe haven't got a command to jumped through Dialogue: 0,0:34:39.96,0:34:44.13,Default,,0000,0000,0000,,the slides and so it actually takes a\Nlittle bit of time to render each slide as Dialogue: 0,0:34:44.13,0:34:50.80,Default,,0000,0000,0000,,we go through. So that that's my\Npunishment for not saving first. Dialogue: 0,0:34:50.80,0:34:55.67,Default,,0000,0000,0000,,But see what we might do. We'll skip that for the\Nmoment. And I'm kind of at the right point Dialogue: 0,0:34:55.67,0:35:01.48,Default,,0000,0000,0000,,anyway to talk about it, which is the\Naudio powers and a mobile phone. This is a Dialogue: 0,0:35:01.48,0:35:07.92,Default,,0000,0000,0000,,really important area to protect. So, so\Nimportant, that is the only diagram that Dialogue: 0,0:35:07.92,0:35:13.69,Default,,0000,0000,0000,,I've put an entire presentation. So at the\Ntop we have a normal mobile phone. So Dialogue: 0,0:35:13.69,0:35:17.05,Default,,0000,0000,0000,,basically what we see is that the\Nuntrustable cellular modem is not merely Dialogue: 0,0:35:17.05,0:35:21.19,Default,,0000,0000,0000,,on trustable. It's like an evil squid that\Nhas tentacles at reach into every part of Dialogue: 0,0:35:21.19,0:35:25.28,Default,,0000,0000,0000,,your mobile phone that you really don't\Nwant it getting into. So it has the direct Dialogue: 0,0:35:25.28,0:35:29.42,Default,,0000,0000,0000,,connection to your microphone and speaker.\NThe normal CPU in your mobile phone Dialogue: 0,0:35:29.42,0:35:34.20,Default,,0000,0000,0000,,usually has to say pretty please, oh\Nuntrustable, completely untrustworthy Dialogue: 0,0:35:34.20,0:35:37.76,Default,,0000,0000,0000,,cellular modem. May I please have\Nsomething which you're going to tell me is Dialogue: 0,0:35:37.76,0:35:41.51,Default,,0000,0000,0000,,the audio that's coming in through the\Nmicrophone? Whether or not it's actually Dialogue: 0,0:35:41.51,0:35:44.16,Default,,0000,0000,0000,,the audio or not, there's a whole separate\Nthing. It might be doing all manner of Dialogue: 0,0:35:44.16,0:35:46.93,Default,,0000,0000,0000,,crazy things first, because you can't tell\Nbecause it's a big fat black box in the Dialogue: 0,0:35:46.93,0:35:51.34,Default,,0000,0000,0000,,way. And then just to make sure that the\Nyou know, it can fully compromise, what Dialogue: 0,0:35:51.34,0:35:54.75,Default,,0000,0000,0000,,you're doing often is on the same memory\Nbus. And so, you know, you might go, oh, Dialogue: 0,0:35:54.75,0:35:58.27,Default,,0000,0000,0000,,I'm being all secret squirrel from the\Ncellular modem and asking you anything. Dialogue: 0,0:35:58.27,0:36:01.19,Default,,0000,0000,0000,,And it's just quietly lifting the covers\Nand looking at what you got under there Dialogue: 0,0:36:01.19,0:36:04.60,Default,,0000,0000,0000,,going like, oh, no, no, that bites wrong.\NYou really want that value in that bite. Dialogue: 0,0:36:04.60,0:36:08.25,Default,,0000,0000,0000,,And likewise, the RAM and the storage. So,\Nyou know, the cellular modem can totally Dialogue: 0,0:36:08.25,0:36:12.97,Default,,0000,0000,0000,,compromise your bootloader and all of that\Nkind of stuff along the way. Let's just Dialogue: 0,0:36:12.97,0:36:17.57,Default,,0000,0000,0000,,say that that's not really a very\Nsurvivable model or a very resilient model Dialogue: 0,0:36:17.57,0:36:21.43,Default,,0000,0000,0000,,or a very secure model for a phone. So\Nwe have instead is that we've Dialogue: 0,0:36:21.43,0:36:26.54,Default,,0000,0000,0000,,basically put the fully untranslatable \Nthing completely out in its own little tiny Dialogue: 0,0:36:26.54,0:36:30.25,Default,,0000,0000,0000,,shed. We've got the tin can and string\Nbetween us and it with a very controlled Dialogue: 0,0:36:30.25,0:36:33.49,Default,,0000,0000,0000,,interface and the microphone and speaker,\Nthank you very much, are directly Dialogue: 0,0:36:33.49,0:36:37.93,Default,,0000,0000,0000,,connected to our FPGA. So we can do\Nencryption at the microphone and Dialogue: 0,0:36:37.93,0:36:42.38,Default,,0000,0000,0000,,decryption at the speaker. The storage is\Nsecure, so we could even have massive one Dialogue: 0,0:36:42.38,0:36:48.37,Default,,0000,0000,0000,,time pad. So we could actually do sig\Nsally style provably secure communications Dialogue: 0,0:36:48.37,0:36:55.80,Default,,0000,0000,0000,,over distance. If you can set up the key\Nmaterial beforehand for one time pad. So Dialogue: 0,0:36:55.80,0:37:01.28,Default,,0000,0000,0000,,it's a radically different approach to\Nwhat we see with devices out there at the Dialogue: 0,0:37:01.28,0:37:29.05,Default,,0000,0000,0000,,moment. So we'll just get the the last few\Nslides up in. Oh, no, for CONAN. Whoops. So Dialogue: 0,0:37:29.05,0:37:34.47,Default,,0000,0000,0000,,even simple software can have bugs. This\Nis why we need many eyes. Think of a load. Dialogue: 0,0:37:34.47,0:37:38.61,Default,,0000,0000,0000,,This one first. Yep. And now I can load\Nthe other one because it just hadn't Dialogue: 0,0:37:38.61,0:37:53.49,Default,,0000,0000,0000,,loaded the fonts in. Yeah. Cool. It's\Ncoming. Yeah. You could even use the Dialogue: 0,0:37:53.49,0:38:03.08,Default,,0000,0000,0000,,joystick to move read and the text if you\Nwant to. Okay, so if we think then about Dialogue: 0,0:38:03.08,0:38:09.45,Default,,0000,0000,0000,,this whole, you know, like what are we\Nactually trying to achieve around this and Dialogue: 0,0:38:09.45,0:38:14.40,Default,,0000,0000,0000,,what are some of the things that we need\Nin the, in the. The Commodore derived 8 bit Dialogue: 0,0:38:14.40,0:38:17.67,Default,,0000,0000,0000,,platform to us has a whole pile of\Nadvantages as the basis for doing this. Dialogue: 0,0:38:17.67,0:38:20.12,Default,,0000,0000,0000,,Now, we could have done it with a\Ncompletely different platform. You'll like Dialogue: 0,0:38:20.12,0:38:23.98,Default,,0000,0000,0000,,some would think like RISC-V, for example,\Nis a nice open platform. Could be an idea. Dialogue: 0,0:38:23.98,0:38:27.45,Default,,0000,0000,0000,,Might it be that the RISC-V CPU was\Nactually still too complicated to actually Dialogue: 0,0:38:27.45,0:38:30.70,Default,,0000,0000,0000,,verify and trust yourself is my kind of\Nview, but I'm really happy that other Dialogue: 0,0:38:30.70,0:38:33.97,Default,,0000,0000,0000,,people might disagree with me. Again,\Nmultiple germ lines, totally different Dialogue: 0,0:38:33.97,0:38:38.50,Default,,0000,0000,0000,,ways of doing things, and at least one of\Nthem keeps working at any point in time Dialogue: 0,0:38:38.50,0:38:42.95,Default,,0000,0000,0000,,would be really, really good. You're kind\Nof combination things as well. So one of Dialogue: 0,0:38:42.95,0:38:45.84,Default,,0000,0000,0000,,the things that we're looking at is\Nhaving, for example, a Raspberry Pi Dialogue: 0,0:38:45.84,0:38:49.04,Default,,0000,0000,0000,,running the PI port of Android that\Nsomebody else maintains. I don't have to Dialogue: 0,0:38:49.04,0:38:53.89,Default,,0000,0000,0000,,do it. And then having the 8 bit layer\Nactually visualizing all of the IO around Dialogue: 0,0:38:53.89,0:38:57.75,Default,,0000,0000,0000,,that, including access to the SD card\Nstorage, including access to the screen. Dialogue: 0,0:38:57.75,0:39:00.89,Default,,0000,0000,0000,,And as that, she also makes it possible\Nfor us to work to make custom mobile Dialogue: 0,0:39:00.89,0:39:05.21,Default,,0000,0000,0000,,devices for people living with disability.\NAnd actually some of the Android again is Dialogue: 0,0:39:05.21,0:39:07.97,Default,,0000,0000,0000,,easy to maintain because we don't even\Nhave to recompile it. We can just get the Dialogue: 0,0:39:07.97,0:39:11.26,Default,,0000,0000,0000,,standard version and then make it think\Nit's got a normal touchscreen when in Dialogue: 0,0:39:11.26,0:39:15.65,Default,,0000,0000,0000,,actual fact it might have some completely\Ndifferent input method going on. So Dialogue: 0,0:39:15.65,0:39:19.59,Default,,0000,0000,0000,,there's a bunch of advantages. I've run\Nout of the official time that have a lot Dialogue: 0,0:39:19.59,0:39:24.99,Default,,0000,0000,0000,,of so I quickly go through and it will go\Ninto the questions. So the platform is Dialogue: 0,0:39:24.99,0:39:28.63,Default,,0000,0000,0000,,really well documented. So there's another\Nwhole pile of tools and everything Dialogue: 0,0:39:28.63,0:39:32.95,Default,,0000,0000,0000,,programing languages. So this is pretty\Nstraightforward to go through. We've Dialogue: 0,0:39:32.95,0:39:36.44,Default,,0000,0000,0000,,already talked about capability\Nmaintenance again. So that is actually Dialogue: 0,0:39:36.44,0:39:40.08,Default,,0000,0000,0000,,another key point: Making the hardware big\Nactually is a massive advantage because Dialogue: 0,0:39:40.08,0:39:44.87,Default,,0000,0000,0000,,then we can do normal PCP fabrication. We\Ndon't have to be any BGA parts placement, Dialogue: 0,0:39:44.87,0:39:47.50,Default,,0000,0000,0000,,which is a real pain to do in your home\Noven, it is possible, but you don't want Dialogue: 0,0:39:47.50,0:39:52.55,Default,,0000,0000,0000,,to have to work to learn how to do it in\Ndigital winter. And yet it's largely this Dialogue: 0,0:39:52.55,0:39:57.20,Default,,0000,0000,0000,,kind of similar size to existing kind of\Ndevices out there. There's a bunch of Dialogue: 0,0:39:57.20,0:40:01.52,Default,,0000,0000,0000,,advantages with that. There's a whole pile\Nof different things that we really would Dialogue: 0,0:40:01.52,0:40:06.24,Default,,0000,0000,0000,,like some folks to help us with to try and\Nget this finished and out there for people Dialogue: 0,0:40:06.24,0:40:10.97,Default,,0000,0000,0000,,to try out and to, you know, we had a\Nmature it and make it work. So it doesn't Dialogue: 0,0:40:10.97,0:40:14.43,Default,,0000,0000,0000,,matter whether you have a programmable\N8 bit computer I've ever done any FPGA work or Dialogue: 0,0:40:14.43,0:40:20.90,Default,,0000,0000,0000,,PCB work or whatever. You know, there's\Nlots of space for people to join in what Dialogue: 0,0:40:20.90,0:40:24.27,Default,,0000,0000,0000,,is quite, we think is actually both an\Nimportant and actually a really fun and Dialogue: 0,0:40:24.27,0:40:29.75,Default,,0000,0000,0000,,enjoyable project to work on. And so\Nreally just want to finish. But she said Dialogue: 0,0:40:29.75,0:40:34.42,Default,,0000,0000,0000,,that I think it is a thinking about this\Ntalk and preparing for it. I think Dialogue: 0,0:40:34.42,0:40:38.83,Default,,0000,0000,0000,,actually, it is a call to action. You\Nknow, the digital autumn has begun. Dialogue: 0,0:40:38.83,0:40:42.27,Default,,0000,0000,0000,,Digital winter is on its way. We don't\Nknow when it's going to come. And it might Dialogue: 0,0:40:42.27,0:40:47.14,Default,,0000,0000,0000,,come a lot quicker, than we would really\Nlike it to come, you know? Myself and the Dialogue: 0,0:40:47.14,0:40:49.87,Default,,0000,0000,0000,,people who are already working on the\Nproject, we can't do everything alone. Dialogue: 0,0:40:49.87,0:40:54.76,Default,,0000,0000,0000,,We're doing what we can. We going to try\Nto organize another event in early April Dialogue: 0,0:40:54.76,0:40:59.68,Default,,0000,0000,0000,,up in Berlin. But there's no need to wait\Nfor that to get involved. You know, we'll Dialogue: 0,0:40:59.68,0:41:04.53,Default,,0000,0000,0000,,be around at the vintage computer area. If\Nanyone wants to come and have a look or Dialogue: 0,0:41:04.53,0:41:08.24,Default,,0000,0000,0000,,ask anything about how you might get\Ninvolved or just play around with the Dialogue: 0,0:41:08.24,0:41:16.30,Default,,0000,0000,0000,,platform, it's quite fun to use. Oups. And\Nyeah, we'll leave it at that point. So any Dialogue: 0,0:41:16.30,0:41:18.65,Default,,0000,0000,0000,,questions would be really welcome. Dialogue: 0,0:41:18.65,0:41:24.27,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:41:24.27,0:41:29.80,Default,,0000,0000,0000,,Herald: That was incredible. You have the\Nbest present and set up that I've ever Dialogue: 0,0:41:29.80,0:41:31.98,Default,,0000,0000,0000,,seen.\NPGS: {\i1}Laughing{\i0} Thank you. Dialogue: 0,0:41:31.98,0:41:35.41,Default,,0000,0000,0000,,Herald: That joistick is amazing. \N{\i1}Applause{\i0} Dialogue: 0,0:41:35.41,0:41:38.20,Default,,0000,0000,0000,,PGS: The joystick is also open source\Nhardware. I can give you the plans to make Dialogue: 0,0:41:38.20,0:41:41.97,Default,,0000,0000,0000,,one of those you sell from from parts.\NIt's the spare joystick part through Dialogue: 0,0:41:41.97,0:41:45.91,Default,,0000,0000,0000,,arcade games basically.\NHerald: Yes, please. OK. We're Dialogue: 0,0:41:45.91,0:41:51.01,Default,,0000,0000,0000,,taking questions. I remind you, we have\Nsix microphones in the audience. We also Dialogue: 0,0:41:51.01,0:41:56.05,Default,,0000,0000,0000,,have the amazing signal angel that's going\Nto relay questions from the Internet. And Dialogue: 0,0:41:56.05,0:42:00.23,Default,,0000,0000,0000,,we're going to take one right now.\NSignal-angel: Okay. So you already talked Dialogue: 0,0:42:00.23,0:42:06.66,Default,,0000,0000,0000,,about some events, but maybe can you bit\Nmore elaborate on how you're planning to Dialogue: 0,0:42:06.66,0:42:10.41,Default,,0000,0000,0000,,involve the community?\NPGS: Okay. So how we gonna involve the Dialogue: 0,0:42:10.41,0:42:14.62,Default,,0000,0000,0000,,community? Basically, anyway, the\Ncommunity would like to be involved. The Dialogue: 0,0:42:14.62,0:42:17.73,Default,,0000,0000,0000,,moment in terms of with the phone as\Nmyself and kind of the work at a Dialogue: 0,0:42:17.73,0:42:22.83,Default,,0000,0000,0000,,university and we have kind of a couple of\Npart time students working on things. So Dialogue: 0,0:42:22.83,0:42:27.58,Default,,0000,0000,0000,,the bus number is disturbingly near one at\Nthe moment. So there's ample scope to Dialogue: 0,0:42:27.58,0:42:32.16,Default,,0000,0000,0000,,help. We've got a few other people who are\Nhelping with the Mega 65 project itself. Dialogue: 0,0:42:32.16,0:42:36.44,Default,,0000,0000,0000,,And so there is obviously this crossover\Nin that. But what would be really great Dialogue: 0,0:42:36.44,0:42:39.10,Default,,0000,0000,0000,,would be to find, for example, a couple of\Npeople who are willing to work on Dialogue: 0,0:42:39.10,0:42:42.96,Default,,0000,0000,0000,,software, primarily coding and C. You\Ndon't even have to know any 65 to Dialogue: 0,0:42:42.96,0:42:46.37,Default,,0000,0000,0000,,assembler to begin with, to do things\Nlike, you know, finishing off the dialer Dialogue: 0,0:42:46.37,0:42:50.09,Default,,0000,0000,0000,,software and things that we demonstrated\Nback in January and get it all working, so Dialogue: 0,0:42:50.09,0:42:54.07,Default,,0000,0000,0000,,we can actually walk around with a pair of\Nlarge plastic bricks by our heads, talking Dialogue: 0,0:42:54.07,0:42:58.41,Default,,0000,0000,0000,,on the phones that we've actually created.\NThat would be a really great way to work, Dialogue: 0,0:42:58.41,0:43:02.55,Default,,0000,0000,0000,,to get some initial forward movement. And\Nthen things like case design, there's a Dialogue: 0,0:43:02.55,0:43:06.24,Default,,0000,0000,0000,,whole bunch of stuff that, you know, we'd\Nwelcome involvement on. Dialogue: 0,0:43:06.24,0:43:12.33,Default,,0000,0000,0000,,Herald: Thank you. Do we have more from\Nthe Signal Angels? Yes, we do. Dialogue: 0,0:43:12.33,0:43:18.69,Default,,0000,0000,0000,,Signal-Angel: So, okay, um, there's a\Nquestion when a prototype will be Dialogue: 0,0:43:18.69,0:43:21.88,Default,,0000,0000,0000,,available.\NPGS: Okay. When a prototype would be Dialogue: 0,0:43:21.88,0:43:27.53,Default,,0000,0000,0000,,available, I'm happy to give out blank\NPCBs or post them to people. I've Dialogue: 0,0:43:27.53,0:43:30.71,Default,,0000,0000,0000,,got actually packed them with me. We've\Ngot looking at the next prototype is Dialogue: 0,0:43:30.71,0:43:36.78,Default,,0000,0000,0000,,actually being built at the moment. So,\Nyou know, these can be built for about 400 Dialogue: 0,0:43:36.78,0:43:41.14,Default,,0000,0000,0000,,euros at the moment. So you can buy like\Nfive of these instead of an iPhone. Right? Dialogue: 0,0:43:41.14,0:43:45.96,Default,,0000,0000,0000,,So it's already it's it's economically\Nsurvivable as well in comparison. Dialogue: 0,0:43:45.96,0:43:48.92,Default,,0000,0000,0000,,Essentially, it's one of the really quite\Nfunny things that we kind of making isn't Dialogue: 0,0:43:48.92,0:43:53.81,Default,,0000,0000,0000,,going like a few person years of effort.\NAnd we can already make a mobile phone Dialogue: 0,0:43:53.81,0:43:57.50,Default,,0000,0000,0000,,case, not a small and ch'mic, but it's got\Na joystick port. Right. Does your iPhone Dialogue: 0,0:43:57.50,0:44:02.66,Default,,0000,0000,0000,,have a joystick port? So, you know, it's\Nit's amazing. We've actually been able to Dialogue: 0,0:44:02.66,0:44:07.22,Default,,0000,0000,0000,,do quite quickly. So, it's the kind of\Nproject where we do have people kind of Dialogue: 0,0:44:07.22,0:44:11.42,Default,,0000,0000,0000,,come in to help us. You know, I think\Nlike, you know, by next Congress, we ought Dialogue: 0,0:44:11.42,0:44:15.63,Default,,0000,0000,0000,,to have people running around with\Nmegaphones and being able to communicate Dialogue: 0,0:44:15.63,0:44:19.80,Default,,0000,0000,0000,,in fun an independent kind of ways. So,\Nyeah. Dialogue: 0,0:44:19.80,0:44:25.70,Default,,0000,0000,0000,,Herald: Thank you. Microphone one, please.\NMic 1: Thanks for a cool talk. And I have Dialogue: 0,0:44:25.70,0:44:29.84,Default,,0000,0000,0000,,another question because you want to\Nreduce black boxes. But what about Dialogue: 0,0:44:29.84,0:44:34.71,Default,,0000,0000,0000,,encryption? Because it's really complex.\NAnd how do you plan to reduce this black Dialogue: 0,0:44:34.71,0:44:38.33,Default,,0000,0000,0000,,box?\NPGS: Ah okay. So an excellent question. So Dialogue: 0,0:44:38.33,0:44:42.67,Default,,0000,0000,0000,,the best encryption there is, is actually\Nthe simplest. It's called one time pad. So Dialogue: 0,0:44:42.67,0:44:46.29,Default,,0000,0000,0000,,if you can actually meet with people. So\Nagain, we're talking about focusing on Dialogue: 0,0:44:46.29,0:44:49.73,Default,,0000,0000,0000,,supporting local communities in one\Nanother. If you get your megaphone on the Dialogue: 0,0:44:49.73,0:44:52.53,Default,,0000,0000,0000,,other person's megaphone and you come in\Ninfrared range, for example, and then you Dialogue: 0,0:44:52.53,0:44:55.51,Default,,0000,0000,0000,,shake them like martinis to\Ngenerate some random data and you do that Dialogue: 0,0:44:55.51,0:44:59.28,Default,,0000,0000,0000,,until you've decided you've got enough one\Ntime pad and that one time pad is secure Dialogue: 0,0:44:59.28,0:45:04.54,Default,,0000,0000,0000,,enough in your device, then actually like\Nxor is pretty easy to debug. Right? Dialogue: 0,0:45:04.54,0:45:07.91,Default,,0000,0000,0000,,Herald: Thank you. Microphone number\Nthree. Dialogue: 0,0:45:07.91,0:45:14.66,Default,,0000,0000,0000,,Mic 3: So you talked about the form factor\Nright now being Nintendo's switch. Dialogue: 0,0:45:14.66,0:45:17.14,Default,,0000,0000,0000,,PGS: Yeah.\NMic 3:Do you have plans on going smaller Dialogue: 0,0:45:17.14,0:45:19.87,Default,,0000,0000,0000,,than that? More like a classic mobile\Nphone? Dialogue: 0,0:45:19.87,0:45:22.15,Default,,0000,0000,0000,,PGS: Yeah, I think it's actually quite\Npossible. So the. Dialogue: 0,0:45:22.15,0:45:26.12,Default,,0000,0000,0000,,So this is if you like,\Nthat the first version is this one. You Dialogue: 0,0:45:26.12,0:45:30.42,Default,,0000,0000,0000,,can see it's about five centimeters thick.\NThe second one, we think we can get down Dialogue: 0,0:45:30.42,0:45:34.90,Default,,0000,0000,0000,,to about four centimeters thick, but it's\Notherwise the same size as PCB. We've got Dialogue: 0,0:45:34.90,0:45:37.48,Default,,0000,0000,0000,,a student amount is going to try and work\Non making one that's about the size of Dialogue: 0,0:45:37.48,0:45:42.33,Default,,0000,0000,0000,,only the screen, still probably about four\Ncentimeters thick. And we think that Dialogue: 0,0:45:42.33,0:45:46.19,Default,,0000,0000,0000,,that's going to be quiet. It's the PCB\Nlayout. He's basically been cursing me for Dialogue: 0,0:45:46.19,0:45:49.27,Default,,0000,0000,0000,,the last three months to try and get all\Nthe trucks routing without it needing to Dialogue: 0,0:45:49.27,0:45:55.49,Default,,0000,0000,0000,,be a 15 layer sponge torte kind of PCB,\Nbut that should be quite possible to do it Dialogue: 0,0:45:55.49,0:45:58.41,Default,,0000,0000,0000,,again. That's the kind of thing. Once\Nyou've got a working prototype, then the Dialogue: 0,0:45:58.41,0:46:02.58,Default,,0000,0000,0000,,people, you're like, okay, we're going to\Nbe on the miniaturization team, too. And Dialogue: 0,0:46:02.58,0:46:06.87,Default,,0000,0000,0000,,part of me try and make something which is\Neven smaller. But, you know, there's Dialogue: 0,0:46:06.87,0:46:09.56,Default,,0000,0000,0000,,always tradeoffs in these things. Again,\Nthe smaller you make it, the less solar Dialogue: 0,0:46:09.56,0:46:12.80,Default,,0000,0000,0000,,panel you can have on the back. So that's\Nkind of these things. It's only trying to Dialogue: 0,0:46:12.80,0:46:15.92,Default,,0000,0000,0000,,make it as thin as we can. I think it\Nmakes a whole pile of sense. Dialogue: 0,0:46:15.92,0:46:20.33,Default,,0000,0000,0000,,Herald: Honestly, you can make it smaller,\Nbut I don't think you should. Because when Dialogue: 0,0:46:20.33,0:46:24.43,Default,,0000,0000,0000,,the zombie apocalypse happens, it's a\Ncommunication to the weapon. Dialogue: 0,0:46:24.43,0:46:29.61,Default,,0000,0000,0000,,PGS: Yeah. And it's less. Right. It's kind\Nof, you know. Exactly. We can use a full Dialogue: 0,0:46:29.61,0:46:32.55,Default,,0000,0000,0000,,sized one as well. Right. I've kind of\Ngot, you know, quite a nice solid metal Dialogue: 0,0:46:32.55,0:46:38.39,Default,,0000,0000,0000,,keyboard in there as well.\NHerald: A question from the Internet, Dialogue: 0,0:46:38.39,0:46:45.75,Default,,0000,0000,0000,,please show.\NSignal-Angel: So what do you think about Dialogue: 0,0:46:45.75,0:46:48.63,Default,,0000,0000,0000,,the open moko phone?\NPGS: The Openmoko phone? I'll try. Dialogue: 0,0:46:48.63,0:46:53.90,Default,,0000,0000,0000,,Remember the details about those and the\Nwhole again. Everything that's being done Dialogue: 0,0:46:53.90,0:47:00.01,Default,,0000,0000,0000,,on all of these fronts to make fully open\Ndevices with a few black boxes as possible Dialogue: 0,0:47:00.01,0:47:05.53,Default,,0000,0000,0000,,is fantastic. So as I say, open moko can\Nmake an M.2 form factor cellular Dialogue: 0,0:47:05.53,0:47:10.54,Default,,0000,0000,0000,,modem that we can put in the megaphone. I\Nwould be so, so happy. But we can do a Dialogue: 0,0:47:10.54,0:47:13.71,Default,,0000,0000,0000,,whole pile of stuff, while we are\Nwaiting for that to happen? Dialogue: 0,0:47:13.71,0:47:18.90,Default,,0000,0000,0000,,Herald: Thank you. We actually had a talk\Nyesterday about from one of the people Dialogue: 0,0:47:18.90,0:47:26.07,Default,,0000,0000,0000,,behind the Openmoko. So you can watch the\Nrecording if you want. Next question, Dialogue: 0,0:47:26.07,0:47:29.30,Default,,0000,0000,0000,,microphone one.\NMic 1: Sure. Thank you for the great talk. Dialogue: 0,0:47:29.30,0:47:35.00,Default,,0000,0000,0000,,I was interested in the Mega 65 itself. Is\Nthat available? Can can, is it sold? Dialogue: 0,0:47:35.00,0:47:38.58,Default,,0000,0000,0000,,PGS: Yes, it's all okay. So the two most\Ncommon questions, We have about the mega Dialogue: 0,0:47:38.58,0:47:44.67,Default,,0000,0000,0000,,65 is can I buy one now and how much does\Nit cost? Unfortunately, the answer to both Dialogue: 0,0:47:44.67,0:47:48.54,Default,,0000,0000,0000,,of those is we don't yet know exactly.\NIt'll be a three digit number in euros for Dialogue: 0,0:47:48.54,0:47:54.75,Default,,0000,0000,0000,,the price. This is pretty certain. But at\Nthe moment, our big challenge is we. This Dialogue: 0,0:47:54.75,0:47:59.82,Default,,0000,0000,0000,,one is it's a prototype made with the\Nvacuum for molding. So each case cost Dialogue: 0,0:47:59.82,0:48:05.51,Default,,0000,0000,0000,,upwards of 500 euros for the case. This is\Nnot really sustainable. So we know we need Dialogue: 0,0:48:05.51,0:48:11.93,Default,,0000,0000,0000,,to make injection molding tooling for\Nthat. And so the guys from the German part Dialogue: 0,0:48:11.93,0:48:16.62,Default,,0000,0000,0000,,of the mega 65 team are running a fund\Nraiser, just a little bit careful that Dialogue: 0,0:48:16.62,0:48:21.35,Default,,0000,0000,0000,,Australian law for fundraising is a bit\Nweird. So I am not doing any fund raising. Dialogue: 0,0:48:21.35,0:48:25.02,Default,,0000,0000,0000,,Some people here in Germany are doing some\Nfund raising to try and raise the money Dialogue: 0,0:48:25.02,0:48:28.08,Default,,0000,0000,0000,,for the mall. If you look at mega65.org,\Nyou can find out what they're doing in Dialogue: 0,0:48:28.08,0:48:35.95,Default,,0000,0000,0000,,that space and and have a look at that.\NHerald: Thank you. Do we have more Dialogue: 0,0:48:35.95,0:48:43.58,Default,,0000,0000,0000,,Internet questions? Nope. Cool, cool. I\Nthink that's it. So thank you again for Dialogue: 0,0:48:43.58,0:48:46.59,Default,,0000,0000,0000,,the wonderful talk. My pleasure. Thank\Nyou. Dialogue: 0,0:48:46.59,0:48:47.93,Default,,0000,0000,0000,,{\i1}Applause{\i0} Dialogue: 0,0:48:47.93,0:48:53.05,Default,,0000,0000,0000,,{\i1}Postroll music{\i0} Dialogue: 0,0:48:53.05,0:49:14.00,Default,,0000,0000,0000,,Subtitles created by c3subtitles.de\Nin the year 2020. Join, and help us!