[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:08.02,0:00:11.01,Default,,0000,0000,0000,,Ich bin sehr Stolz einen Gast aus den vereinigten Staaten hier auf der \N2\N00:00:11,012 --> 00:00:14,086\NElevate begrüssen zu dürfen, es ist James Vasile von der Freedom Box Foundation Dialogue: 0,0:00:14.09,0:00:20.06,Default,,0000,0000,0000,,James Vasile arbeitet an meheren Projekten Dialogue: 0,0:00:20.06,0:00:23.06,Default,,0000,0000,0000,,z.b.Apache, ich denke auch Joomla und viele andere. Er ist auch Anwalt, Dialogue: 0,0:00:23.06,0:00:31.03,Default,,0000,0000,0000,,und arbeitet für die Freedom Box Foundation und die Free Software Foundation. Dialogue: 0,0:00:31.03,0:00:37.09,Default,,0000,0000,0000,,Er presentiert nun, meiner Meinung nach, eines der illusionärsten Projekte , das ich in Jahren sah. Dialogue: 0,0:00:37.09,0:00:43.02,Default,,0000,0000,0000,,wie wir hier sehen können, eine kleine Kiste, die Freedom Box. Dialogue: 0,0:00:43.02,0:00:48.00,Default,,0000,0000,0000,,Ja, James wird eine Präsentation geben und dann werden wir Dialogue: 0,0:00:48.00,0:00:50.03,Default,,0000,0000,0000,,in einer gesprächsrunde Fragen beantworten. Dialogue: 0,0:00:50.03,0:00:53.07,Default,,0000,0000,0000,,so James, es ist deine Bühne. Dialogue: 0,0:00:53.07,0:00:56.06,Default,,0000,0000,0000,,Danke Daniel. Dialogue: 0,0:00:56.06,0:01:03.01,Default,,0000,0000,0000,,Ich bin jetzt seit ein paar Tagen auf dem Elevate Festival Dialogue: 0,0:01:03.01,0:01:10.01,Default,,0000,0000,0000,,Ich besuchte einige Vorlesungen, sah Filme und hörte Musik Dialogue: 0,0:01:10.01,0:01:15.07,Default,,0000,0000,0000,,und es ist ein grossartiger Platz wo alle diese Ideen zusammmenkommen. Dialogue: 0,0:01:15.07,0:01:21.02,Default,,0000,0000,0000,,Ich möchte mich bei Daniel für die organisation bedanken Dialogue: 0,0:01:21.02,0:01:23.06,Default,,0000,0000,0000,,und natürlich auch bei Joseph. Dialogue: 0,0:01:23.06,0:01:30.03,Default,,0000,0000,0000,,Im besonderen bei Daniel , der mich dazubewegte hierher zu kommen. Dialogue: 0,0:01:30.03,0:01:33.05,Default,,0000,0000,0000,,und ein wirklich toller Gastgeber ist. Dialogue: 0,0:01:33.05,0:01:36.03,Default,,0000,0000,0000,,Vielen Dank noch einmal. Dialogue: 0,0:01:36.03,0:01:42.08,Default,,0000,0000,0000,,{\i1}APPLAUS{\i0} Dialogue: 0,0:01:42.08,0:01:52.05,Default,,0000,0000,0000,,lange Zeit zurück, in den Anfängen des Internets Dialogue: 0,0:01:52.05,0:01:56.06,Default,,0000,0000,0000,,als wir anfingen das internet zu benutzen um miteinander zu reden, Dialogue: 0,0:01:56.06,0:02:00.06,Default,,0000,0000,0000,,Sprachen wir meistens direkt zu den menschen, richtig ? Dialogue: 0,0:02:00.06,0:02:05.01,Default,,0000,0000,0000,,Think about how email works, on a technical level Dialogue: 0,0:02:05.01,0:02:10.00,Default,,0000,0000,0000,,You take a message, you hand it off to your mail transport agent Dialogue: 0,0:02:10.00,0:02:14.06,Default,,0000,0000,0000,,It sends it through a network, directly to the recipient. Dialogue: 0,0:02:14.06,0:02:16.09,Default,,0000,0000,0000,,It hops through some other computers, but funadmentally Dialogue: 0,0:02:16.09,0:02:21.01,Default,,0000,0000,0000,,you use the network to talk directly to your other computer Dialogue: 0,0:02:21.01,0:02:26.03,Default,,0000,0000,0000,,the other computer where the recipient gets his or her mail Dialogue: 0,0:02:26.03,0:02:30.05,Default,,0000,0000,0000,,It was a direct communication medium. Dialogue: 0,0:02:30.05,0:02:33.05,Default,,0000,0000,0000,,If you're old enough to remember a program called 'talk' Dialogue: 0,0:02:33.05,0:02:37.02,Default,,0000,0000,0000,,Talk was the first, sort of, interactive you type, they see it, they type, you see it Dialogue: 0,0:02:37.02,0:02:40.04,Default,,0000,0000,0000,,instant message application. Dialogue: 0,0:02:40.04,0:02:43.01,Default,,0000,0000,0000,,This again, was direct. Dialogue: 0,0:02:43.01,0:02:48.02,Default,,0000,0000,0000,,You would put your, put their name, into your program, and address Dialogue: 0,0:02:48.02,0:02:51.04,Default,,0000,0000,0000,,they would put theirs into yours, and you would just talk directly to each other Dialogue: 0,0:02:51.04,0:02:57.03,Default,,0000,0000,0000,,You didn't send this message through servers. That centralised technology. Dialogue: 0,0:02:57.03,0:03:02.01,Default,,0000,0000,0000,,From there, from those beginnings of talking directly to each other Dialogue: 0,0:03:02.01,0:03:07.07,Default,,0000,0000,0000,,we started to build communities, emailing directly to people. Dialogue: 0,0:03:07.07,0:03:10.07,Default,,0000,0000,0000,,But that was relatively inefficient. Dialogue: 0,0:03:10.07,0:03:17.02,Default,,0000,0000,0000,,Talking directly to people, one-to-one, works very good for one-to-one converstions. Dialogue: 0,0:03:17.02,0:03:19.05,Default,,0000,0000,0000,,But as soon as you want a group conversation Dialogue: 0,0:03:19.05,0:03:21.07,Default,,0000,0000,0000,,as soon as you want to find people reliably who you haven't Dialogue: 0,0:03:21.07,0:03:26.08,Default,,0000,0000,0000,,already set up contacts for, exchanged email addresses and such Dialogue: 0,0:03:26.08,0:03:28.07,Default,,0000,0000,0000,,you run into friction, you run into problems Dialogue: 0,0:03:28.07,0:03:34.00,Default,,0000,0000,0000,,So the solution to that, was to create more centralised structures Dialogue: 0,0:03:34.00,0:03:37.09,Default,,0000,0000,0000,,and we did this with IRC Dialogue: 0,0:03:37.09,0:03:41.05,Default,,0000,0000,0000,,IRC is a place where instead of talking directly to the people we're trying to reach Dialogue: 0,0:03:41.05,0:03:45.02,Default,,0000,0000,0000,,we take a message, and we send it to an IRC server Dialogue: 0,0:03:45.02,0:03:46.07,Default,,0000,0000,0000,,a third party Dialogue: 0,0:03:46.07,0:03:48.05,Default,,0000,0000,0000,,and the IRC server then copies that message Dialogue: 0,0:03:48.05,0:03:51.02,Default,,0000,0000,0000,,to all the people who we might want to talk to. Dialogue: 0,0:03:51.02,0:03:54.03,Default,,0000,0000,0000,,We developed mailing lists, listservs Dialogue: 0,0:03:54.03,0:03:58.02,Default,,0000,0000,0000,,And again, this was a way where we would take our message Dialogue: 0,0:03:58.02,0:03:59.04,Default,,0000,0000,0000,,and hand it to a third party Dialogue: 0,0:03:59.04,0:04:03.04,Default,,0000,0000,0000,,A mail server, that is not us and not the person we're trying to talk to Dialogue: 0,0:04:03.04,0:04:05.09,Default,,0000,0000,0000,,and that mail server would then echo our communication to Dialogue: 0,0:04:05.09,0:04:07.06,Default,,0000,0000,0000,,all the people we want to talk to Dialogue: 0,0:04:07.06,0:04:10.04,Default,,0000,0000,0000,,and this was great, because you didn't have to know the Dialogue: 0,0:04:10.04,0:04:12.06,Default,,0000,0000,0000,,addresses of all the people you wanted to talk to Dialogue: 0,0:04:12.06,0:04:15.04,Default,,0000,0000,0000,,You could just all 'meet' in a common place Dialogue: 0,0:04:15.04,0:04:19.05,Default,,0000,0000,0000,,We all meet in an IRC chatroom, we all meet on a listserv Dialogue: 0,0:04:19.05,0:04:23.05,Default,,0000,0000,0000,,And there were a lot of IRC channels, and a lot of IRC servers Dialogue: 0,0:04:23.05,0:04:25.03,Default,,0000,0000,0000,,and a lot of mail servers Dialogue: 0,0:04:25.03,0:04:27.03,Default,,0000,0000,0000,,all across the internet Dialogue: 0,0:04:27.03,0:04:28.09,Default,,0000,0000,0000,,A lot of places to do this communication. Dialogue: 0,0:04:28.09,0:04:32.05,Default,,0000,0000,0000,,And if you didn't like the policies or the structures or the technology Dialogue: 0,0:04:32.05,0:04:34.03,Default,,0000,0000,0000,,of any one of these service providers Dialogue: 0,0:04:34.03,0:04:36.05,Default,,0000,0000,0000,,these IRC servers, or these list servers Dialogue: 0,0:04:36.05,0:04:38.04,Default,,0000,0000,0000,,you could just switch, you could choose to run your own. Dialogue: 0,0:04:38.04,0:04:40.01,Default,,0000,0000,0000,,It was very simple. Dialogue: 0,0:04:40.01,0:04:46.10,Default,,0000,0000,0000,,This infrastructure is not hard to create, it's not hard to run, it's not hard to install. Dialogue: 0,0:04:46.10,0:04:49.07,Default,,0000,0000,0000,,And so a lot of people did run, create and install it. Dialogue: 0,0:04:49.07,0:04:53.01,Default,,0000,0000,0000,,There were a bunch of IRC servers, there were a bunch of different listserv packages Dialogue: 0,0:04:53.01,0:04:57.08,Default,,0000,0000,0000,,But as we've moved forward in time, Dialogue: 0,0:04:57.08,0:05:01.04,Default,,0000,0000,0000,,we've started to centralise even more. Dialogue: 0,0:05:01.04,0:05:05.04,Default,,0000,0000,0000,,And, you can fast-forward to today Dialogue: 0,0:05:05.04,0:05:07.04,Default,,0000,0000,0000,,where we're channeling our communication Dialogue: 0,0:05:07.04,0:05:10.06,Default,,0000,0000,0000,,through fewer and fewer places. Dialogue: 0,0:05:10.06,0:05:13.07,Default,,0000,0000,0000,,And we are making structures that are more and more central Dialogue: 0,0:05:13.07,0:05:15.06,Default,,0000,0000,0000,,and more and more over-arching Dialogue: 0,0:05:15.06,0:05:20.08,Default,,0000,0000,0000,,So, from the, the IRC way of talking to each other Dialogue: 0,0:05:20.08,0:05:25.04,Default,,0000,0000,0000,,we moved to instant messaging applications. Dialogue: 0,0:05:25.04,0:05:28.01,Default,,0000,0000,0000,,AOL Instant Messenger, ICQ, Dialogue: 0,0:05:28.01,0:05:31.04,Default,,0000,0000,0000,,those were the early ways to do it Dialogue: 0,0:05:31.04,0:05:33.03,Default,,0000,0000,0000,,and there were only a few of them Dialogue: 0,0:05:33.03,0:05:36.08,Default,,0000,0000,0000,,MSN had its messaging system, Yahoo had its messaging system Dialogue: 0,0:05:36.08,0:05:39.04,Default,,0000,0000,0000,,and when people wanted to talk to each other now, Dialogue: 0,0:05:39.04,0:05:41.03,Default,,0000,0000,0000,,they were using third-parties again. Dialogue: 0,0:05:41.03,0:05:43.01,Default,,0000,0000,0000,,But they were only using a few third parties. Dialogue: 0,0:05:43.01,0:05:46.09,Default,,0000,0000,0000,,And if you wanted to switch providers, Dialogue: 0,0:05:46.09,0:05:49.04,Default,,0000,0000,0000,,you would leave almost everyone you knew behind, Dialogue: 0,0:05:49.04,0:05:51.04,Default,,0000,0000,0000,,your entire community behind. Dialogue: 0,0:05:51.04,0:05:53.00,Default,,0000,0000,0000,,And so it becomes harder to switch. Dialogue: 0,0:05:53.00,0:05:54.07,Default,,0000,0000,0000,,There are fewer options Dialogue: 0,0:05:54.07,0:05:58.01,Default,,0000,0000,0000,,and the cost of switching leaves more and more people behind Dialogue: 0,0:05:58.01,0:06:00.08,Default,,0000,0000,0000,,So you started to have lock-in. Dialogue: 0,0:06:00.08,0:06:05.05,Default,,0000,0000,0000,,You started to have people who were chained to their methods of communication Dialogue: 0,0:06:05.05,0:06:07.09,Default,,0000,0000,0000,,because the cost of losing your community is too high. Dialogue: 0,0:06:07.09,0:06:10.01,Default,,0000,0000,0000,,And so if you don't like the technology, or you don't like the policy Dialogue: 0,0:06:10.01,0:06:12.01,Default,,0000,0000,0000,,or you don't like the politics Dialogue: 0,0:06:12.01,0:06:13.03,Default,,0000,0000,0000,,or if they're trying to filter you Dialogue: 0,0:06:13.03,0:06:14.09,Default,,0000,0000,0000,,or censor you Dialogue: 0,0:06:14.09,0:06:16.01,Default,,0000,0000,0000,,you don't have a lot of options. Dialogue: 0,0:06:16.01,0:06:18.06,Default,,0000,0000,0000,,The cost of leaving is so high that you might stay. Dialogue: 0,0:06:18.06,0:06:21.04,Default,,0000,0000,0000,,People do stay. And they accept it. Dialogue: 0,0:06:21.04,0:06:25.03,Default,,0000,0000,0000,,And we went from that small basket of providers of this kind Dialogue: 0,0:06:25.03,0:06:27.00,Default,,0000,0000,0000,,of communication technology Dialogue: 0,0:06:27.00,0:06:29.01,Default,,0000,0000,0000,,to an even more centralised structure Dialogue: 0,0:06:29.01,0:06:33.06,Default,,0000,0000,0000,,where there is effectively only one way to reach all our friends, Dialogue: 0,0:06:33.06,0:06:36.00,Default,,0000,0000,0000,,in each mod of communication, Dialogue: 0,0:06:36.00,0:06:37.05,Default,,0000,0000,0000,,Facebook. Dialogue: 0,0:06:37.05,0:06:38.07,Default,,0000,0000,0000,,And Twitter. Dialogue: 0,0:06:38.07,0:06:41.04,Default,,0000,0000,0000,,These two services rule everything. Dialogue: 0,0:06:41.04,0:06:43.05,Default,,0000,0000,0000,,And I'm not going to stand here and say Facebook is evil Dialogue: 0,0:06:43.05,0:06:45.01,Default,,0000,0000,0000,,and that Twitter is evil Dialogue: 0,0:06:45.01,0:06:49.00,Default,,0000,0000,0000,,What I want to say is that having one place Dialogue: 0,0:06:49.00,0:06:50.06,Default,,0000,0000,0000,,where we do all our communication Dialogue: 0,0:06:50.06,0:06:53.02,Default,,0000,0000,0000,,leaves us at the mercy of the policies of the people Dialogue: 0,0:06:53.02,0:06:55.05,Default,,0000,0000,0000,,that control the infrastructure that we are chained to, Dialogue: 0,0:06:55.05,0:06:57.08,Default,,0000,0000,0000,,that we are stuck using, that we are locked into. Dialogue: 0,0:06:57.08,0:07:02.02,Default,,0000,0000,0000,,You can't leave Facebook without leaving everybody you know Dialogue: 0,0:07:02.02,0:07:05.06,Default,,0000,0000,0000,,because everybody you know is on Facebook. Dialogue: 0,0:07:05.06,0:07:09.05,Default,,0000,0000,0000,,I was not a Facebook user. Dialogue: 0,0:07:09.05,0:07:11.02,Default,,0000,0000,0000,,I was against Facebook. Dialogue: 0,0:07:11.02,0:07:14.05,Default,,0000,0000,0000,,I thought it was bad to centralise all our communication in one place. Dialogue: 0,0:07:14.05,0:07:15.06,Default,,0000,0000,0000,,I didn't like the privacy implications, Dialogue: 0,0:07:15.06,0:07:18.02,Default,,0000,0000,0000,,I didn't like Facebook's censorship Dialogue: 0,0:07:18.02,0:07:21.08,Default,,0000,0000,0000,,of things like pictures of nursing mothers. Dialogue: 0,0:07:21.08,0:07:22.10,Default,,0000,0000,0000,,I don't think that kind of thing is obscene, Dialogue: 0,0:07:22.10,0:07:25.05,Default,,0000,0000,0000,,and I don't think Facebook should have the ability to tell us Dialogue: 0,0:07:25.05,0:07:27.06,Default,,0000,0000,0000,,what we can share with our friends. Dialogue: 0,0:07:27.06,0:07:29.01,Default,,0000,0000,0000,,So I thought those were bad policies, Dialogue: 0,0:07:29.01,0:07:32.05,Default,,0000,0000,0000,,and I reacted to that by not joining Facebook. For years. Dialogue: 0,0:07:32.05,0:07:35.06,Default,,0000,0000,0000,,All my friends were on Facebook. Dialogue: 0,0:07:35.06,0:07:41.07,Default,,0000,0000,0000,,I joined Facebook late last year. November. Dialogue: 0,0:07:41.07,0:07:48.02,Default,,0000,0000,0000,,Because in November, a friend of mine passed away. Dialogue: 0,0:07:48.02,0:07:50.00,Default,,0000,0000,0000,,His name was Chuck. He was a brilliant man. Dialogue: 0,0:07:50.00,0:07:55.02,Default,,0000,0000,0000,,And he lived a lot of his life online. Dialogue: 0,0:07:55.02,0:07:58.02,Default,,0000,0000,0000,,He was on Facebook, and he shared things with friends on Facebook. Dialogue: 0,0:07:58.02,0:08:01.01,Default,,0000,0000,0000,,When he passed away I realised I hadn't communicated with him in a while, Dialogue: 0,0:08:01.01,0:08:02.07,Default,,0000,0000,0000,,I hadn't really talked to him in a while. Dialogue: 0,0:08:02.07,0:08:05.06,Default,,0000,0000,0000,,And the reason I hadn't was because I wasn't Dialogue: 0,0:08:05.06,0:08:08.01,Default,,0000,0000,0000,,communicating with him in the place he communicates. Dialogue: 0,0:08:08.01,0:08:10.00,Default,,0000,0000,0000,,I wasn't meeting him where he was, I wasn't on Facebook. Dialogue: 0,0:08:10.00,0:08:12.04,Default,,0000,0000,0000,,I was missing out on something huge. Dialogue: 0,0:08:12.04,0:08:15.06,Default,,0000,0000,0000,,That's the cost of not being there. Dialogue: 0,0:08:15.06,0:08:17.04,Default,,0000,0000,0000,,And so I joined. Dialogue: 0,0:08:17.04,0:08:19.04,Default,,0000,0000,0000,,Because I decided that as strong as my beliefs were, Dialogue: 0,0:08:19.04,0:08:21.03,Default,,0000,0000,0000,,it was more important to me to be there with my friends and Dialogue: 0,0:08:21.03,0:08:23.01,Default,,0000,0000,0000,,to talk to my friends. Dialogue: 0,0:08:23.01,0:08:24.06,Default,,0000,0000,0000,,That's the power of lock-in. Dialogue: 0,0:08:24.06,0:08:27.02,Default,,0000,0000,0000,,Me, a person who cares, as much as I do, Dialogue: 0,0:08:27.02,0:08:31.00,Default,,0000,0000,0000,,who cares enough about these issues that I do something like this Dialogue: 0,0:08:31.00,0:08:32.10,Default,,0000,0000,0000,,I got locked into Facebook. I'm there now. Dialogue: 0,0:08:32.10,0:08:35.03,Default,,0000,0000,0000,,That's how I talk to a lot of my friends, whether I like it or not Dialogue: 0,0:08:35.03,0:08:38.07,Default,,0000,0000,0000,,I am locked into Facebook. Dialogue: 0,0:08:38.07,0:08:42.08,Default,,0000,0000,0000,,You know, I'm also on Diaspora. But my friends aren't on Diaspora. Dialogue: 0,0:08:42.08,0:08:46.08,Default,,0000,0000,0000,,This sort of lock-in creates a sort of situation where Dialogue: 0,0:08:46.08,0:08:51.01,Default,,0000,0000,0000,,we have one arbiter of what is acceptable speech, Dialogue: 0,0:08:51.01,0:08:53.02,Default,,0000,0000,0000,,whether we like it or not. Dialogue: 0,0:08:53.02,0:08:55.00,Default,,0000,0000,0000,,If they're free, we're free to the extent, Dialogue: 0,0:08:55.00,0:08:56.02,Default,,0000,0000,0000,,only to the extent, Dialogue: 0,0:08:56.02,0:08:57.03,Default,,0000,0000,0000,,that they give us freedom. Dialogue: 0,0:08:57.03,0:08:59.00,Default,,0000,0000,0000,,And that to me isn't freedom. Dialogue: 0,0:08:59.00,0:09:01.04,Default,,0000,0000,0000,,That to me is accepting what you're given. Dialogue: 0,0:09:01.04,0:09:04.01,Default,,0000,0000,0000,,It's the exact opposite of making your own choices. Dialogue: 0,0:09:04.01,0:09:08.06,Default,,0000,0000,0000,,The exact opposite of self-determination. Dialogue: 0,0:09:08.06,0:09:13.06,Default,,0000,0000,0000,,All of our problems in communication can be traced Dialogue: 0,0:09:13.06,0:09:16.10,Default,,0000,0000,0000,,to centralized communications infrastructure. Dialogue: 0,0:09:16.10,0:09:22.06,Default,,0000,0000,0000,,Now, I've sort of told this story at the social level, Dialogue: 0,0:09:22.06,0:09:25.09,Default,,0000,0000,0000,,in the way that we're talking about how to talk to your peers Dialogue: 0,0:09:25.09,0:09:28.07,Default,,0000,0000,0000,,and your friends on the internet. Dialogue: 0,0:09:28.07,0:09:33.08,Default,,0000,0000,0000,,But this story also exists when we think about relying on the pipes, Dialogue: 0,0:09:33.08,0:09:38.02,Default,,0000,0000,0000,,relying on the hardware, the technical infrastructure behind the software. Dialogue: 0,0:09:38.02,0:09:43.05,Default,,0000,0000,0000,,We rely on internet backbones, Dialogue: 0,0:09:43.05,0:09:45.07,Default,,0000,0000,0000,,we rely on centralized cellphone networks, Dialogue: 0,0:09:45.07,0:09:47.10,Default,,0000,0000,0000,,we rely on centralized telephone networks. Dialogue: 0,0:09:47.10,0:09:52.04,Default,,0000,0000,0000,,The people that control these networks have the ability Dialogue: 0,0:09:52.04,0:09:54.08,Default,,0000,0000,0000,,to tell us what we're allowed to say, Dialogue: 0,0:09:54.08,0:09:56.06,Default,,0000,0000,0000,,when we're allowed to say it. Dialogue: 0,0:09:56.06,0:09:59.07,Default,,0000,0000,0000,,They have the ability to filter us, to censor us, to influence us. Dialogue: 0,0:09:59.07,0:10:02.06,Default,,0000,0000,0000,,Sometimes they use that ability, and sometimes they don't, Dialogue: 0,0:10:02.06,0:10:04.07,Default,,0000,0000,0000,,and sometimes by law they're not allowed to. Dialogue: 0,0:10:04.07,0:10:06.05,Default,,0000,0000,0000,,But at the end of the day Dialogue: 0,0:10:06.05,0:10:09.03,Default,,0000,0000,0000,,the power doesn't rest in our hands. Dialogue: 0,0:10:09.03,0:10:11.05,Default,,0000,0000,0000,,The power, from a technological perspective, Dialogue: 0,0:10:11.05,0:10:13.06,Default,,0000,0000,0000,,rests in the hands of the people that operate the Dialogue: 0,0:10:13.06,0:10:15.06,Default,,0000,0000,0000,,networks. Dialogue: 0,0:10:15.06,0:10:20.04,Default,,0000,0000,0000,,Centralization doesn't just allow this sort of filtering and censorship. Dialogue: 0,0:10:20.04,0:10:23.05,Default,,0000,0000,0000,,There's another big problem with centralization. Dialogue: 0,0:10:23.05,0:10:26.00,Default,,0000,0000,0000,,The other big problem with centralization is that by Dialogue: 0,0:10:26.00,0:10:30.00,Default,,0000,0000,0000,,gathering all of our data in one place Dialogue: 0,0:10:30.00,0:10:33.05,Default,,0000,0000,0000,,it becomes easy Dialogue: 0,0:10:33.05,0:10:36.06,Default,,0000,0000,0000,,to spy on us. Dialogue: 0,0:10:36.06,0:10:39.03,Default,,0000,0000,0000,,So every time you go to a website Dialogue: 0,0:10:39.03,0:10:41.04,Default,,0000,0000,0000,,pretty much Dialogue: 0,0:10:41.04,0:10:45.04,Default,,0000,0000,0000,,the website includes, at the bottom of the page Dialogue: 0,0:10:45.04,0:10:49.09,Default,,0000,0000,0000,,a little graphic or invisible Javascript thing Dialogue: 0,0:10:49.09,0:10:53.01,Default,,0000,0000,0000,,that tells Google that you came to visit the page. Dialogue: 0,0:10:53.01,0:10:56.02,Default,,0000,0000,0000,,Eva goes to a website, and the website says Dialogue: 0,0:10:56.02,0:10:59.03,Default,,0000,0000,0000,,"Hey Google! Eva just came to my website!" Dialogue: 0,0:10:59.03,0:11:01.05,Default,,0000,0000,0000,,Every time she goes to a website, that happens. Dialogue: 0,0:11:01.05,0:11:04.08,Default,,0000,0000,0000,,And so Google effectively sits next to her and watches, Dialogue: 0,0:11:04.08,0:11:06.06,Default,,0000,0000,0000,,while she uses the internet. Dialogue: 0,0:11:06.06,0:11:07.09,Default,,0000,0000,0000,,Watches everything she does, Dialogue: 0,0:11:07.09,0:11:09.01,Default,,0000,0000,0000,,and everything she enters, Dialogue: 0,0:11:09.01,0:11:11.06,Default,,0000,0000,0000,,everything she looks at and knows. Dialogue: 0,0:11:11.06,0:11:15.02,Default,,0000,0000,0000,,It's not just her search data, it's not just her Gmail. Dialogue: 0,0:11:15.02,0:11:19.02,Default,,0000,0000,0000,,It's the entire picture of her digital life. Dialogue: 0,0:11:19.02,0:11:22.01,Default,,0000,0000,0000,,In one place. Dialogue: 0,0:11:22.01,0:11:23.07,Default,,0000,0000,0000,,That's a pretty complete profile. Dialogue: 0,0:11:23.07,0:11:24.08,Default,,0000,0000,0000,,If you were able... Dialogue: 0,0:11:24.08,0:11:27.06,Default,,0000,0000,0000,,...imagine if somebody could sit next to you and watch Dialogue: 0,0:11:27.06,0:11:29.03,Default,,0000,0000,0000,,everything you did online, Dialogue: 0,0:11:29.03,0:11:31.04,Default,,0000,0000,0000,,imagine how much they would know about you. Dialogue: 0,0:11:31.04,0:11:33.03,Default,,0000,0000,0000,,That's how much Google knows about you. Dialogue: 0,0:11:33.03,0:11:36.02,Default,,0000,0000,0000,,Google knows more about you than you know about yourself, Dialogue: 0,0:11:36.02,0:11:39.09,Default,,0000,0000,0000,,because Google never forgets. Dialogue: 0,0:11:39.09,0:11:42.09,Default,,0000,0000,0000,,Google knows more about you than your parents, Dialogue: 0,0:11:42.09,0:11:43.10,Default,,0000,0000,0000,,than your partner, Dialogue: 0,0:11:43.10,0:11:46.09,Default,,0000,0000,0000,,Google knows your secrets, your worst secrets, Dialogue: 0,0:11:46.09,0:11:48.07,Default,,0000,0000,0000,,Google knows if you're cheating on your spouse Dialogue: 0,0:11:48.07,0:11:49.08,Default,,0000,0000,0000,,because they saw you do the Google search for the Dialogue: 0,0:11:49.08,0:11:54.06,Default,,0000,0000,0000,,sexually-transmitted disease. Dialogue: 0,0:11:54.06,0:11:56.07,Default,,0000,0000,0000,,Google knows your hopes and your dreams. Dialogue: 0,0:11:56.07,0:11:58.02,Default,,0000,0000,0000,,Because the things we hope and dream about, Dialogue: 0,0:11:58.02,0:11:59.04,Default,,0000,0000,0000,,we look for more information about. Dialogue: 0,0:11:59.04,0:12:00.07,Default,,0000,0000,0000,,We're natural information seekers. Dialogue: 0,0:12:00.07,0:12:02.05,Default,,0000,0000,0000,,We think about something, it fascinates us, Dialogue: 0,0:12:02.05,0:12:05.02,Default,,0000,0000,0000,,we go and look it up online. We search around. Dialogue: 0,0:12:05.02,0:12:06.10,Default,,0000,0000,0000,,We look around the internet, and we think about it. Dialogue: 0,0:12:06.10,0:12:11.00,Default,,0000,0000,0000,,And Google is right there. Following our thought process, Dialogue: 0,0:12:11.00,0:12:15.00,Default,,0000,0000,0000,,the thought process in our click trail. Dialogue: 0,0:12:15.00,0:12:19.03,Default,,0000,0000,0000,,That is an intimate relationship. Dialogue: 0,0:12:19.03,0:12:21.03,Default,,0000,0000,0000,,Right? Do you want an intimate relationship with Google? Dialogue: 0,0:12:21.03,0:12:21.09,Default,,0000,0000,0000,,Maybe you do. Dialogue: 0,0:12:21.09,0:12:25.05,Default,,0000,0000,0000,,I personally, don't. Dialogue: 0,0:12:25.05,0:12:28.08,Default,,0000,0000,0000,,But that's it, Google sits next to us and watches us use Dialogue: 0,0:12:28.08,0:12:30.01,Default,,0000,0000,0000,,our computers. Dialogue: 0,0:12:30.01,0:12:34.07,Default,,0000,0000,0000,,And if anyone actually did... if you had a friend who wanted Dialogue: 0,0:12:34.07,0:12:37.03,Default,,0000,0000,0000,,to sit next to you, or a stranger said I want to sit next to you Dialogue: 0,0:12:37.03,0:12:39.00,Default,,0000,0000,0000,,and just watch you use your computer all day, Dialogue: 0,0:12:39.00,0:12:41.04,Default,,0000,0000,0000,,you would use that computer very differently to the way you do now. Dialogue: 0,0:12:41.04,0:12:44.04,Default,,0000,0000,0000,,But because Google doesn't physically sit next to you, Dialogue: 0,0:12:44.04,0:12:49.01,Default,,0000,0000,0000,,Google sits invisibly in the box, you don't know Google is there. Dialogue: 0,0:12:49.01,0:12:51.02,Default,,0000,0000,0000,,But you do know, right? Dialogue: 0,0:12:51.02,0:12:52.06,Default,,0000,0000,0000,,We're all aware of this. I'm not saying any of you don't know, Dialogue: 0,0:12:52.06,0:12:55.08,Default,,0000,0000,0000,,especially in a room like this. Dialogue: 0,0:12:55.08,0:12:57.01,Default,,0000,0000,0000,,But we don't think about it. Dialogue: 0,0:12:57.01,0:12:58.08,Default,,0000,0000,0000,,We try not to think about it. Dialogue: 0,0:12:58.08,0:13:01.06,Default,,0000,0000,0000,,We are locked in, to the internet. Dialogue: 0,0:13:01.06,0:13:03.06,Default,,0000,0000,0000,,We can't stop using it. Dialogue: 0,0:13:03.06,0:13:05.03,Default,,0000,0000,0000,,And the structures that exist, Dialogue: 0,0:13:05.03,0:13:06.05,Default,,0000,0000,0000,,the infrastructure that exists, Dialogue: 0,0:13:06.05,0:13:09.00,Default,,0000,0000,0000,,that has been slowly turned from Dialogue: 0,0:13:09.00,0:13:12.07,Default,,0000,0000,0000,,a means to allow us to communicate with each other Dialogue: 0,0:13:12.07,0:13:16.01,Default,,0000,0000,0000,,to a means of allowing us to access web services Dialogue: 0,0:13:16.01,0:13:19.08,Default,,0000,0000,0000,,in return for all our personal information so we can be bought and sold Dialogue: 0,0:13:19.08,0:13:21.06,Default,,0000,0000,0000,,like products. Dialogue: 0,0:13:21.06,0:13:24.10,Default,,0000,0000,0000,,That is the problem. That is the problem of centralization, of having one structure. Dialogue: 0,0:13:24.10,0:13:27.04,Default,,0000,0000,0000,,As soon as we put all that information in one place Dialogue: 0,0:13:27.04,0:13:32.00,Default,,0000,0000,0000,,we get complete profiles of us, you get complete pictures of you. Dialogue: 0,0:13:32.00,0:13:33.05,Default,,0000,0000,0000,,And that is a lot of information. Dialogue: 0,0:13:33.05,0:13:34.06,Default,,0000,0000,0000,,It's valuable information. Dialogue: 0,0:13:34.06,0:13:39.04,Default,,0000,0000,0000,,It's information that is used, right now, mostly to sell you things. Dialogue: 0,0:13:39.04,0:13:42.03,Default,,0000,0000,0000,,And that, you might find objectionable. Dialogue: 0,0:13:42.03,0:13:43.02,Default,,0000,0000,0000,,Maybe you don't. Dialogue: 0,0:13:43.02,0:13:46.09,Default,,0000,0000,0000,,Maybe you don't believe the studies that say you can't ignore advertising. Dialogue: 0,0:13:46.09,0:13:51.07,Default,,0000,0000,0000,,Maybe you think that you are smart and special, and advertising doesn't affect you. Dialogue: 0,0:13:51.07,0:13:53.04,Default,,0000,0000,0000,,You're wrong. Dialogue: 0,0:13:53.04,0:13:56.03,Default,,0000,0000,0000,,But maybe you believe that. Dialogue: 0,0:13:56.03,0:14:02.00,Default,,0000,0000,0000,,But that information, that same infrastructure, that same technology that allows them Dialogue: 0,0:14:02.00,0:14:05.10,Default,,0000,0000,0000,,to know you well enough to sell you soap Dialogue: 0,0:14:05.10,0:14:12.02,Default,,0000,0000,0000,,allows them to know you well enough to decide how much of a credit risk you are, Dialogue: 0,0:14:12.02,0:14:14.01,Default,,0000,0000,0000,,how much of a health risk you are, Dialogue: 0,0:14:14.01,0:14:16.10,Default,,0000,0000,0000,,and what your insurance premiums should look like. Dialogue: 0,0:14:16.10,0:14:18.09,Default,,0000,0000,0000,,In America we have a big problem right now. Dialogue: 0,0:14:18.09,0:14:23.02,Default,,0000,0000,0000,,Insurance costs are out of control. Health insurance. We're having a lot of difficulty paying for it. Dialogue: 0,0:14:23.02,0:14:28.07,Default,,0000,0000,0000,,Insurance companies would like to respond to this problem Dialogue: 0,0:14:28.07,0:14:31.07,Default,,0000,0000,0000,,by knowing better who's a good risk and who's a bad risk Dialogue: 0,0:14:31.07,0:14:35.06,Default,,0000,0000,0000,,so they can lower prices for the good risk and raise prices for the bad risk. Dialogue: 0,0:14:35.06,0:14:41.03,Default,,0000,0000,0000,,Essentially they want to make people who are going to get sick, uninsurable. Dialogue: 0,0:14:41.03,0:14:45.03,Default,,0000,0000,0000,,And if you could know enough about a person to know what they're risk factors are based on Dialogue: 0,0:14:45.03,0:14:49.03,Default,,0000,0000,0000,,what they're digital life is, if you can get just a little bit of information about them, Dialogue: 0,0:14:49.03,0:14:53.04,Default,,0000,0000,0000,,maybe you can figure out who their parents are and what hereditary diseases they might be subject to, Dialogue: 0,0:14:53.04,0:14:55.09,Default,,0000,0000,0000,,you can start to understand these things. Dialogue: 0,0:14:55.09,0:14:58.08,Default,,0000,0000,0000,,You can start to figure out who's a good risk and who's a bad risk. Dialogue: 0,0:14:58.08,0:15:04.05,Default,,0000,0000,0000,,You can use this information for ends that seem reasonable if you're a health insurance Dialogue: 0,0:15:04.05,0:15:07.00,Default,,0000,0000,0000,,company, but probably don't seem reasonable if you're Dialogue: 0,0:15:07.00,0:15:10.03,Default,,0000,0000,0000,,the kind of person sitting in this room, the kind of person that I talk to. Dialogue: 0,0:15:10.03,0:15:17.05,Default,,0000,0000,0000,,And that's the problem. The innocuous use. The use that seems kind of icky, but not truly evil, Dialogue: 0,0:15:17.05,0:15:19.07,Default,,0000,0000,0000,,which is advertising. Dialogue: 0,0:15:19.07,0:15:25.02,Default,,0000,0000,0000,,It's the same mechanism, the same data, that then gets used for other purposes. Dialogue: 0,0:15:25.02,0:15:32.08,Default,,0000,0000,0000,,It's the same data that then gets turned over to a government who wants to oppress you Dialogue: 0,0:15:32.08,0:15:36.06,Default,,0000,0000,0000,,because you are supporting wikileaks. Dialogue: 0,0:15:36.06,0:15:39.08,Default,,0000,0000,0000,,And that's not a fantasy, that's what happened. Dialogue: 0,0:15:39.08,0:15:49.03,Default,,0000,0000,0000,,It's the same information that anybody who wants to know something about you for an evil end would use. Dialogue: 0,0:15:49.03,0:15:56.06,Default,,0000,0000,0000,,We have a saying in the world of information, that if the data exists, you can't decide what it gets Dialogue: 0,0:15:56.06,0:15:58.01,Default,,0000,0000,0000,,used for. Dialogue: 0,0:15:58.01,0:16:03.00,Default,,0000,0000,0000,,Once data exists, especially data in the hands of the government, of officials, Dialogue: 0,0:16:03.00,0:16:05.08,Default,,0000,0000,0000,,once that data exists, it's a resource. Dialogue: 0,0:16:05.08,0:16:10.02,Default,,0000,0000,0000,,And the use of that resource it its own energy, its own logic. Dialogue: 0,0:16:10.02,0:16:15.04,Default,,0000,0000,0000,,Once a resource is there begging to be used, it's very hard to stop it from being used. Dialogue: 0,0:16:15.04,0:16:22.06,Default,,0000,0000,0000,,Because it's so attractive, it's so efficient, it would solve so many problems to use the data. Dialogue: 0,0:16:22.06,0:16:28.06,Default,,0000,0000,0000,,And so once you collect the data, once the data exists in one centralized place, Dialogue: 0,0:16:28.06,0:16:35.04,Default,,0000,0000,0000,,for anybody to come and get it with a warrant, or maybe no warrant, or maybe some money... Dialogue: 0,0:16:35.04,0:16:41.00,Default,,0000,0000,0000,,somebody is going to come with a warrant, or no warrant, and they are going to get that data. Dialogue: 0,0:16:41.00,0:16:42.08,Default,,0000,0000,0000,,And they will use it for whatever they want to use it. Dialogue: 0,0:16:42.08,0:16:47.02,Default,,0000,0000,0000,,Once it's out of the hands of the first person who collected it, who maybe you trust, Dialogue: 0,0:16:47.02,0:16:52.07,Default,,0000,0000,0000,,who maybe has good privacy policies, who maybe has no intention to do anything with your data Dialogue: 0,0:16:52.07,0:16:58.06,Default,,0000,0000,0000,,other than use it for diagnostic purposes, once it's out of that person's hands it's gone. Dialogue: 0,0:16:58.06,0:17:00.10,Default,,0000,0000,0000,,You never know where it goes after that. Dialogue: 0,0:17:00.10,0:17:02.09,Default,,0000,0000,0000,,It is completely uncontrolled and unchecked Dialogue: 0,0:17:02.09,0:17:05.09,Default,,0000,0000,0000,,and there is no ability to restrain what happens to that data. Dialogue: 0,0:17:05.09,0:17:14.04,Default,,0000,0000,0000,,So all of this is my attempt to convince you that privacy is a real value in our society, Dialogue: 0,0:17:14.04,0:17:18.01,Default,,0000,0000,0000,,and that the danger of losing privacy is a real problem. Dialogue: 0,0:17:18.01,0:17:20.08,Default,,0000,0000,0000,,It's not just the censorship, it's not just the filtering, Dialogue: 0,0:17:20.08,0:17:26.09,Default,,0000,0000,0000,,it's not just the propaganda, the influencing of opinion, that's one aspect of it, Dialogue: 0,0:17:26.09,0:17:35.04,Default,,0000,0000,0000,,it's not just the free speech. It's also the privacy, because privacy goes to the heart of our autonomy. Dialogue: 0,0:17:35.04,0:17:43.04,Default,,0000,0000,0000,,About a year and a half ago to two years ago at the Software Freedom Law Center Dialogue: 0,0:17:43.04,0:17:47.06,Default,,0000,0000,0000,,a man named Ian Sullivan who's a co-worker of mine, Dialogue: 0,0:17:47.06,0:17:49.07,Default,,0000,0000,0000,,he bought a bunch of plug servers, Dialogue: 0,0:17:49.07,0:17:54.05,Default,,0000,0000,0000,,because he was really excited at the thought of using them as print servers, and media servers, Dialogue: 0,0:17:54.05,0:17:59.02,Default,,0000,0000,0000,,and he started tinkering with them in our office. Dialogue: 0,0:17:59.02,0:18:02.09,Default,,0000,0000,0000,,My boss Eben Moglen who is a long-time activist in the Free Software movement, Dialogue: 0,0:18:02.09,0:18:15.00,Default,,0000,0000,0000,,fought very hard for Phil Zimmerman and PGP when that was a big issue, Dialogue: 0,0:18:15.00,0:18:23.06,Default,,0000,0000,0000,,he looked at this technology and he immediately realised that several streams had come together in one Dialogue: 0,0:18:23.06,0:18:24.06,Default,,0000,0000,0000,,place. Dialogue: 0,0:18:24.06,0:18:27.10,Default,,0000,0000,0000,,There's a lot of really good technology to protect your privacy right now. Dialogue: 0,0:18:27.10,0:18:31.01,Default,,0000,0000,0000,,In fact that's the stuff we're putting on the Freedom Box. Dialogue: 0,0:18:31.01,0:18:33.01,Default,,0000,0000,0000,,We're not writing new software. Dialogue: 0,0:18:33.01,0:18:36.07,Default,,0000,0000,0000,,We are gathering stuff, and putting it in one place. Dialogue: 0,0:18:36.07,0:18:40.09,Default,,0000,0000,0000,,Stuff that other people did because there are people who are better at writing software, and security, Dialogue: 0,0:18:40.09,0:18:43.03,Default,,0000,0000,0000,,than we are. We're software integrators. Dialogue: 0,0:18:43.03,0:18:46.07,Default,,0000,0000,0000,,And he realised there was all this software out there, and suddenly there was a box to put it on. Dialogue: 0,0:18:46.07,0:18:53.01,Default,,0000,0000,0000,,You could put all that software in one place, make it easy, and give it to people in one neat package. Dialogue: 0,0:18:53.01,0:18:56.07,Default,,0000,0000,0000,,Pre-installed, pre-configured, or as close to it as we can get. Dialogue: 0,0:18:56.07,0:19:02.06,Default,,0000,0000,0000,,And that, was the vision for the FreedomBox. Dialogue: 0,0:19:02.06,0:19:08.02,Default,,0000,0000,0000,,The FreedomBox is a tiny computer. Look at this. Dialogue: 0,0:19:08.02,0:19:10.09,Default,,0000,0000,0000,,That's small, it's unobtrusive. Dialogue: 0,0:19:10.09,0:19:11.08,Default,,0000,0000,0000,,So it's a small computer. Dialogue: 0,0:19:11.08,0:19:16.02,Default,,0000,0000,0000,,And we don't just mean small in size... it doesn't take a lot of energy. Dialogue: 0,0:19:16.02,0:19:22.07,Default,,0000,0000,0000,,I could be running this box on a couple of AA batteries for the life of this presentation. Dialogue: 0,0:19:22.07,0:19:24.06,Default,,0000,0000,0000,,You could run it on a solar panel. Dialogue: 0,0:19:24.06,0:19:27.08,Default,,0000,0000,0000,,It's very lightweight infrastructure. Dialogue: 0,0:19:27.08,0:19:33.03,Default,,0000,0000,0000,,You plug it into your home network, and when I say home network, Dialogue: 0,0:19:33.03,0:19:35.01,Default,,0000,0000,0000,,(I'm going to pass this around) Dialogue: 0,0:19:35.01,0:19:38.03,Default,,0000,0000,0000,,When I say home network, I mean home network. Dialogue: 0,0:19:38.03,0:19:42.08,Default,,0000,0000,0000,,This is technology we are designing for individuals to use to talk to their friends. Dialogue: 0,0:19:42.08,0:19:47.09,Default,,0000,0000,0000,,Our use-case, the thing we're trying to protect is you guys, as individuals in your communities. Dialogue: 0,0:19:47.09,0:19:51.09,Default,,0000,0000,0000,,This isn't a small-business appliance, it's not a large corporate applicance, this is a thing Dialogue: 0,0:19:51.09,0:19:58.09,Default,,0000,0000,0000,,that we are truly aiming at the home market, and people who care about privacy on an individual level. Dialogue: 0,0:19:58.09,0:20:05.10,Default,,0000,0000,0000,,You plug it into your home network to protect your privacy, your freedom, your anonymity and your security. Dialogue: 0,0:20:05.10,0:20:09.07,Default,,0000,0000,0000,,That is our mission statement, I guess. Unofficially. Dialogue: 0,0:20:09.07,0:20:17.00,Default,,0000,0000,0000,,That is what we believe we are trying to do with this device. Dialogue: 0,0:20:17.00,0:20:22.01,Default,,0000,0000,0000,,So, what privacy means in this context, the way we're going to go about trying to protect your privacy Dialogue: 0,0:20:22.01,0:20:27.06,Default,,0000,0000,0000,,is to connect you directly with other people and take everything you do and try to encrypt it Dialogue: 0,0:20:27.06,0:20:31.03,Default,,0000,0000,0000,,so that only you and the person you are talking to can see it. This is not a new idea. Dialogue: 0,0:20:31.03,0:20:35.07,Default,,0000,0000,0000,,We can do encrypted messaging, and we can do encrypted browsing. Dialogue: 0,0:20:35.07,0:20:43.10,Default,,0000,0000,0000,,Now there are problems with encrypted browsing. Right now if you want to have secure browsing you generally Dialogue: 0,0:20:43.10,0:20:45.09,Default,,0000,0000,0000,,use something called SSL. Dialogue: 0,0:20:45.09,0:20:57.05,Default,,0000,0000,0000,,SSL is a system of certificate that allow a web server to say to you "we can talk privately". Dialogue: 0,0:20:57.05,0:21:01.10,Default,,0000,0000,0000,,That's the first guarantee, a secure cryptographic connection (A). Dialogue: 0,0:21:01.10,0:21:05.07,Default,,0000,0000,0000,,and (B) I can authenticate to you that I am who I say I am. Dialogue: 0,0:21:05.07,0:21:11.04,Default,,0000,0000,0000,,So not only can nobody listen, but you know who you're talking to. Dialogue: 0,0:21:11.04,0:21:18.03,Default,,0000,0000,0000,,You're not secretly talking to the government, when really you're talking to me. Dialogue: 0,0:21:18.03,0:21:23.09,Default,,0000,0000,0000,,The problem with SSL, the big problem with SSL, is that the system for signing certificates relies Dialogue: 0,0:21:23.09,0:21:28.03,Default,,0000,0000,0000,,on a trust hierachy that goes back to a cartel of companies who have the server certificates, Dialogue: 0,0:21:28.03,0:21:35.06,Default,,0000,0000,0000,,who have the ability to do this "guarantee". So when the website says to you "I guarantee I am who I Dialogue: 0,0:21:35.06,0:21:42.06,Default,,0000,0000,0000,,am", you say "I don't know you, I don't trust you". And they say "Oh, but this other company, I paid Dialogue: 0,0:21:42.06,0:21:47.01,Default,,0000,0000,0000,,them money, and so they'll guarantee that I am me." Dialogue: 0,0:21:47.01,0:21:52.06,Default,,0000,0000,0000,,Which is a really interesting idea - because I also don't know this company, why would I trust that company? Dialogue: 0,0:21:52.06,0:21:57.00,Default,,0000,0000,0000,,I mean, the company is just old enough and influential enough that they could actually get their Dialogue: 0,0:21:57.00,0:22:03.06,Default,,0000,0000,0000,,authority into my browser. So really my browser is willing to accept at face-value that this website Dialogue: 0,0:22:03.06,0:22:07.03,Default,,0000,0000,0000,,is who it says it is, but I don't necessarily accept that. Dialogue: 0,0:22:07.03,0:22:13.02,Default,,0000,0000,0000,,And then, we have the problem of self-signed certificate. Where if they say, none of those authorities Dialogue: 0,0:22:13.02,0:22:17.08,Default,,0000,0000,0000,,in your browser trust me, I trust myself and look, I've signed a piece of paper - Dialogue: 0,0:22:17.08,0:22:20.06,Default,,0000,0000,0000,,I swear I am who I say I am. Dialogue: 0,0:22:20.06,0:22:24.00,Default,,0000,0000,0000,,And that, is not trustworthy at all, right? Dialogue: 0,0:22:24.00,0:22:27.09,Default,,0000,0000,0000,,That's just him saying again "No, really! I'm me!". Dialogue: 0,0:22:27.09,0:22:33.06,Default,,0000,0000,0000,,So this is a problem, because the FreedomBoxes are not going to trust the SSL cartel, Dialogue: 0,0:22:33.06,0:22:36.07,Default,,0000,0000,0000,,and they are not going to trust each other, so they can't just sort of swear to each other that Dialogue: 0,0:22:36.07,0:22:39.05,Default,,0000,0000,0000,,they are who they are. Dialogue: 0,0:22:39.05,0:22:45.01,Default,,0000,0000,0000,,So we think we've solved this. I'm not going to say we've solved it, because we're just starting to tell Dialogue: 0,0:22:45.01,0:22:52.01,Default,,0000,0000,0000,,people about this idea, and I'm sure people will have reasons why the idea can be improved. Dialogue: 0,0:22:52.01,0:22:58.04,Default,,0000,0000,0000,,But there is a technology called MonkeySphere, that allows you to take an SSH key and wrap it around a Dialogue: 0,0:22:58.04,0:23:03.03,Default,,0000,0000,0000,,PGP key, and use a PGP key to authenticate SSH connections. Dialogue: 0,0:23:03.03,0:23:10.03,Default,,0000,0000,0000,,It's really neat technology that allows you to replace SSH trust with PGP trust. Dialogue: 0,0:23:10.03,0:23:14.05,Default,,0000,0000,0000,,And we looked at that, and we thought, why can't we do that with SSL? Dialogue: 0,0:23:14.05,0:23:21.04,Default,,0000,0000,0000,,So one thing we're going do with browsing is take an SSL certificate, an X.509 certificate, Dialogue: 0,0:23:21.04,0:23:25.02,Default,,0000,0000,0000,,and wrap it around a PGP key and send it through the normal SSL layer mechanisms Dialogue: 0,0:23:25.02,0:23:32.03,Default,,0000,0000,0000,,but when it gets to the other end, smart servers and smart browsers will open it up and use PGP mechanisms Dialogue: 0,0:23:32.03,0:23:39.06,Default,,0000,0000,0000,,to figure out how to trust people, to verify the connections, to sign the authentication of the identity Dialogue: 0,0:23:39.06,0:23:42.07,Default,,0000,0000,0000,,of the browser, of the server. Dialogue: 0,0:23:42.07,0:23:48.05,Default,,0000,0000,0000,,This allows us to replace the SSL cartel with the web of trust, the keyservers. Dialogue: 0,0:23:48.05,0:23:57.03,Default,,0000,0000,0000,,We're replacing a tiny group of companies that control everything with keyservers, community infrastructure. Dialogue: 0,0:23:57.03,0:24:01.02,Default,,0000,0000,0000,,Anyone can set up a keyserver, and you can decide which one you want to trust. Dialogue: 0,0:24:01.02,0:24:02.08,Default,,0000,0000,0000,,They share information. Dialogue: 0,0:24:02.08,0:24:06.02,Default,,0000,0000,0000,,The web of trust is built on people, telling each other that they trust each other. Dialogue: 0,0:24:06.02,0:24:09.09,Default,,0000,0000,0000,,Again, you can decide who to trust and how much you want to trust them. Dialogue: 0,0:24:09.09,0:24:16.02,Default,,0000,0000,0000,,This is emblematic of our approach. We've identified structures that are unreliable because Dialogue: 0,0:24:16.02,0:24:20.04,Default,,0000,0000,0000,,they are centralized, because they are controlled by interests that are not the same interests Dialogue: 0,0:24:20.04,0:24:22.06,Default,,0000,0000,0000,,as our interests. Dialogue: 0,0:24:22.06,0:24:29.08,Default,,0000,0000,0000,,And we've decided to replace them wherever we can with structures that rely on people, Dialogue: 0,0:24:29.08,0:24:37.05,Default,,0000,0000,0000,,that rely on human relationships, that rely less on the notion that you can buy trust, and more on the Dialogue: 0,0:24:37.05,0:24:42.03,Default,,0000,0000,0000,,notion that you earn trust, by being trustworthy, by having people vouch for you over time. Dialogue: 0,0:24:42.03,0:24:50.03,Default,,0000,0000,0000,,So that's our approach to encrypted browsing. It's also our approach to encrypted messaging. Dialogue: 0,0:24:50.03,0:24:58.02,Default,,0000,0000,0000,,We're doing Jabber for a lot of message passing, XMPP, and we're securing that again with PGP. Dialogue: 0,0:24:58.02,0:25:02.01,Default,,0000,0000,0000,,Everywhere we can we're going to try to use the PGP network, because it already exists... Dialogue: 0,0:25:02.01,0:25:04.04,Default,,0000,0000,0000,,as I said, we're not trying to invent anything new. Dialogue: 0,0:25:04.04,0:25:10.06,Default,,0000,0000,0000,,PGP already exists and it does a really good job. So we're taking the PGP trust system and we're Dialogue: 0,0:25:10.06,0:25:16.06,Default,,0000,0000,0000,,going to apply it to things like XMPP and make sure that we can do message passing in a way Dialogue: 0,0:25:16.06,0:25:18.05,Default,,0000,0000,0000,,that we can trust. Dialogue: 0,0:25:18.05,0:25:26.00,Default,,0000,0000,0000,,Once we have XMPP we have a way to send text, a way to send audio, sure... Dialogue: 0,0:25:26.00,0:25:28.07,Default,,0000,0000,0000,,but also you can send structured data. Dialogue: 0,0:25:28.07,0:25:33.01,Default,,0000,0000,0000,,Through that same channel. And you can send that data to buddy lists. Dialogue: 0,0:25:33.01,0:25:39.03,Default,,0000,0000,0000,,So the system starts to look like a way to pass data in a social way. And we think this is the Dialogue: 0,0:25:39.03,0:25:42.04,Default,,0000,0000,0000,,beginning of the social layer of the box. Dialogue: 0,0:25:42.04,0:25:46.09,Default,,0000,0000,0000,,At the bottom of the box we have a belief that the technology should be social Dialogue: 0,0:25:46.09,0:25:48.04,Default,,0000,0000,0000,,from the ground up. Dialogue: 0,0:25:48.04,0:25:50.06,Default,,0000,0000,0000,,And so we're building structures that allow it to be social, Dialogue: 0,0:25:50.06,0:25:55.05,Default,,0000,0000,0000,,that assume you want to connect with friends in a network of freedom, Dialogue: 0,0:25:55.05,0:26:01.03,Default,,0000,0000,0000,,perhaps FreedomBoxes, perhaps other kinds of software, other kinds of technology. Dialogue: 0,0:26:01.03,0:26:04.02,Default,,0000,0000,0000,,And we're designing with that in mind. Dialogue: 0,0:26:04.02,0:26:08.07,Default,,0000,0000,0000,,With that in mind, we think we get certain benefits technologically which I'll get into later. Dialogue: 0,0:26:08.07,0:26:13.04,Default,,0000,0000,0000,,We think we can simply things like key management, through methods like this. Dialogue: 0,0:26:13.04,0:26:19.02,Default,,0000,0000,0000,,By privacy I also mean that we can install a proxy server, privoxy, Dialogue: 0,0:26:19.02,0:26:21.02,Default,,0000,0000,0000,,we think the answer is privoxy here, Dialogue: 0,0:26:21.02,0:26:26.08,Default,,0000,0000,0000,,privoxy on the box, so you can point your browser at the box, surf the web on the box, Dialogue: 0,0:26:26.08,0:26:33.06,Default,,0000,0000,0000,,and strip ads, strip cookies, stop Google from tracking you from website to website to website, Dialogue: 0,0:26:33.06,0:26:43.03,Default,,0000,0000,0000,,to remove, the constant person sitting at your side, spying, recording, listening to everything you do. Dialogue: 0,0:26:43.03,0:26:46.09,Default,,0000,0000,0000,,In that vein, we don't just want to block ads and reject cookies, Dialogue: 0,0:26:46.09,0:26:50.03,Default,,0000,0000,0000,,we want to do something new, relatively new. Dialogue: 0,0:26:50.03,0:27:02.08,Default,,0000,0000,0000,,We think we want to munge your browser fingerprint, that unique pattern of data that is captured by your Dialogue: 0,0:27:02.08,0:27:03.06,Default,,0000,0000,0000,,user-agent string and what plugins you have, and all that stuff Dialogue: 0,0:27:03.06,0:27:07.08,Default,,0000,0000,0000,,that forms a unique profile of you that allows people to track your browser, companies to track your Dialogue: 0,0:27:07.08,0:27:09.09,Default,,0000,0000,0000,,browser as you hop along the web, even if they don't know anything about you. Dialogue: 0,0:27:09.09,0:27:13.03,Default,,0000,0000,0000,,It can sort of tie you to the browser, make profiles about your browser. Dialogue: 0,0:27:13.03,0:27:16.05,Default,,0000,0000,0000,,And that turns out to be a very effective way of figuring out who you are. Dialogue: 0,0:27:16.05,0:27:23.06,Default,,0000,0000,0000,,So even without a cookie, even without serving you with an ad, once they're talking to you they can Dialogue: 0,0:27:23.06,0:27:26.04,Default,,0000,0000,0000,,uniquely identify you, or relatively uniquely. Dialogue: 0,0:27:26.04,0:27:32.08,Default,,0000,0000,0000,,But it's relatively early in the browser fingerprint arms race. Dialogue: 0,0:27:32.08,0:27:37.06,Default,,0000,0000,0000,,We think that with a very little bit of changing, we can foil the recording. Dialogue: 0,0:27:37.06,0:27:40.05,Default,,0000,0000,0000,,and win this round at least. Dialogue: 0,0:27:40.05,0:27:46.09,Default,,0000,0000,0000,,And instead of having one profile where they gather all of your data, you will present to services Dialogue: 0,0:27:46.09,0:27:51.03,Default,,0000,0000,0000,,as a different person every time you use the service. So they cannot build profiles of you over time. Dialogue: 0,0:27:51.06,0:27:53.02,Default,,0000,0000,0000,,That's what privacy looks like in our context. We're looking for cheap ways to foil the tracking. Dialogue: 0,0:27:55.00,0:28:02.00,Default,,0000,0000,0000,,We're looking for easy things we can do, because we believe there's a lot of low-hanging fruit. Dialogue: 0,0:28:02.00,0:28:05.09,Default,,0000,0000,0000,,And we'll talk about that more in a minute. Dialogue: 0,0:28:05.09,0:28:09.08,Default,,0000,0000,0000,,Freedom is our value, freedom is the thing we are aiming for, Dialogue: 0,0:28:09.08,0:28:13.04,Default,,0000,0000,0000,,freedom from centralized structures like the pipes. Dialogue: 0,0:28:13.04,0:28:19.02,Default,,0000,0000,0000,,Now mesh networking, I have mesh networking in my slides. That is a lie. Dialogue: 0,0:28:19.02,0:28:21.05,Default,,0000,0000,0000,,We are not doing mesh networking. Dialogue: 0,0:28:21.05,0:28:26.10,Default,,0000,0000,0000,,The reason we are not doing mesh networking is because I do not know {\i1}anything{\i0} about mesh networking Dialogue: 0,0:28:26.10,0:28:31.07,Default,,0000,0000,0000,,and one of the reaons I came here was to meet people who know a lot about mesh networking Dialogue: 0,0:28:31.07,0:28:34.05,Default,,0000,0000,0000,,and I see people in this audience who know a lot about mesh networking. Dialogue: 0,0:28:34.05,0:28:41.03,Default,,0000,0000,0000,,If you want to turn that lie into the truth, the way you do that Dialogue: 0,0:28:41.03,0:28:43.05,Default,,0000,0000,0000,,is by continuing on your projects, making mesh networking awesome, Dialogue: 0,0:28:43.05,0:28:46.02,Default,,0000,0000,0000,,to the point where I can say yes, we're going to put that in this box. Dialogue: 0,0:28:46.02,0:28:49.02,Default,,0000,0000,0000,,Then eventually, by the time this box is ready to do real Dialogue: 0,0:28:49.02,0:28:52.08,Default,,0000,0000,0000,,things for real people, we're really hoping that the mesh story Dialogue: 0,0:28:52.08,0:28:56.05,Default,,0000,0000,0000,,coheres, where we've identified the protocol and the technology and the people who are going to help Dialogue: 0,0:28:56.05,0:29:00.02,Default,,0000,0000,0000,,us. If you think you might be one of those people, we want to talk to you. Dialogue: 0,0:29:00.02,0:29:02.08,Default,,0000,0000,0000,,So yes, we are going to do mesh networking, Dialogue: 0,0:29:02.08,0:29:05.07,Default,,0000,0000,0000,,and that might be a lie Dialogue: 0,0:29:05.07,0:29:08.03,Default,,0000,0000,0000,,but I hope not. Dialogue: 0,0:29:08.03,0:29:10.07,Default,,0000,0000,0000,,We want you to have the freedom to own your data Dialogue: 0,0:29:10.07,0:29:16.08,Default,,0000,0000,0000,,that means data portability, that means that your data sits on your box and never goes to a third party. Dialogue: 0,0:29:16.08,0:29:18.06,Default,,0000,0000,0000,,It only goes to the people you want it to go to. Dialogue: 0,0:29:18.06,0:29:23.06,Default,,0000,0000,0000,,Fine-grained access control. Your data, your structures, you decide where it goes. Dialogue: 0,0:29:23.06,0:29:25.04,Default,,0000,0000,0000,,That's a user-interface problem, Dialogue: 0,0:29:25.04,0:29:27.02,Default,,0000,0000,0000,,that's a user permission problem, Dialogue: 0,0:29:27.02,0:29:29.01,Default,,0000,0000,0000,,an access control problem. Dialogue: 0,0:29:29.01,0:29:33.03,Default,,0000,0000,0000,,Access control is a solved problem. Dialogue: 0,0:29:33.03,0:29:37.09,Default,,0000,0000,0000,,Doing it through a convenient user-interface, that's not solved... so that's work to be done. Dialogue: 0,0:29:37.09,0:29:42.00,Default,,0000,0000,0000,,That's a big chunk of our todo list. Dialogue: 0,0:29:42.00,0:29:43.07,Default,,0000,0000,0000,,We want you to own your social network Dialogue: 0,0:29:43.07,0:29:50.01,Default,,0000,0000,0000,,Before Facebook there was a thing called MySpace, which was... I'm not even sure it exists anymore. Dialogue: 0,0:29:50.01,0:29:54.01,Default,,0000,0000,0000,,Before MySpace there was Tribe. Dialogue: 0,0:29:54.01,0:29:56.06,Default,,0000,0000,0000,,Before Tribe there was Friendster. Dialogue: 0,0:29:56.06,0:29:59.08,Default,,0000,0000,0000,,Friendster is now like a... "gaming network". Dialogue: 0,0:29:59.08,0:30:02.08,Default,,0000,0000,0000,,I don't know what it is but they still send me email Dialogue: 0,0:30:02.08,0:30:06.02,Default,,0000,0000,0000,,Which is the only reason I know they're still alive. Dialogue: 0,0:30:06.02,0:30:11.00,Default,,0000,0000,0000,,Before Friendster was the original social network. Dialogue: 0,0:30:11.00,0:30:15.05,Default,,0000,0000,0000,,We called this social network "the internet". Dialogue: 0,0:30:15.05,0:30:17.00,Default,,0000,0000,0000,,We talked directly to each other, Dialogue: 0,0:30:17.00,0:30:21.04,Default,,0000,0000,0000,,we used email, an instant messenger and IRC. Dialogue: 0,0:30:21.04,0:30:23.10,Default,,0000,0000,0000,,We talked to people using the structures that were out there. Dialogue: 0,0:30:23.10,0:30:27.08,Default,,0000,0000,0000,,It wasn't centralized in one service, we had a lot of ways of meeting each other Dialogue: 0,0:30:27.08,0:30:29.02,Default,,0000,0000,0000,,and passing messages. Dialogue: 0,0:30:29.02,0:30:31.07,Default,,0000,0000,0000,,What we lacked was a centralized interface. Dialogue: 0,0:30:31.07,0:30:35.06,Default,,0000,0000,0000,,So when we say "own your social network" we mean use the services of the internet, Dialogue: 0,0:30:35.06,0:30:37.06,Default,,0000,0000,0000,,own the pieces that talk to each other. Dialogue: 0,0:30:37.06,0:30:41.01,Default,,0000,0000,0000,,Hopefully we'll provide you with a convenient interface to do that. Dialogue: 0,0:30:41.01,0:30:44.01,Default,,0000,0000,0000,,But the actual structures, the places where your data live, Dialogue: 0,0:30:44.01,0:30:48.04,Default,,0000,0000,0000,,that is just the same pieces that we know how to use already. Dialogue: 0,0:30:48.04,0:30:51.02,Default,,0000,0000,0000,,We are not going to try to reinvent how you talk to people, Dialogue: 0,0:30:51.02,0:30:56.04,Default,,0000,0000,0000,,we're just going to make it so that the pipes are secure. Dialogue: 0,0:30:56.04,0:30:59.04,Default,,0000,0000,0000,,A big part of freedom, a big part of privacy, Dialogue: 0,0:30:59.04,0:31:02.04,Default,,0000,0000,0000,,is anonymity. Dialogue: 0,0:31:02.04,0:31:06.04,Default,,0000,0000,0000,,Tor can provide anonymity. Dialogue: 0,0:31:06.04,0:31:08.08,Default,,0000,0000,0000,,But we don't have to go all the way to Tor. Dialogue: 0,0:31:08.08,0:31:12.02,Default,,0000,0000,0000,,Tor is expensive, in terms of latency. Dialogue: 0,0:31:12.02,0:31:16.08,Default,,0000,0000,0000,,Tor is difficult to manage... Dialogue: 0,0:31:16.08,0:31:21.04,Default,,0000,0000,0000,,I don't know how many people have tried to use Tor, to run all their traffic through Tor. Dialogue: 0,0:31:21.04,0:31:23.06,Default,,0000,0000,0000,,It's hard. For two reasons. Dialogue: 0,0:31:23.06,0:31:26.06,Default,,0000,0000,0000,,For one, the latency... it takes a very long time to load a web page. Dialogue: 0,0:31:26.06,0:31:32.04,Default,,0000,0000,0000,,And two, you look like a criminal. To every website that you go to. Dialogue: 0,0:31:32.04,0:31:38.06,Default,,0000,0000,0000,,My bank shut down my account when I used Tor. Dialogue: 0,0:31:38.06,0:31:44.09,Default,,0000,0000,0000,,Because suddenly, I was coming from an IP address in Germany that they had detected in the past Dialogue: 0,0:31:44.09,0:31:48.05,Default,,0000,0000,0000,,efforts to hack them on. Dialogue: 0,0:31:48.05,0:31:52.02,Default,,0000,0000,0000,,So they closed my account, well I had to talk to them about it, Dialogue: 0,0:31:52.02,0:31:53.09,Default,,0000,0000,0000,,it did all get solved in the end. Dialogue: 0,0:31:53.09,0:31:57.08,Default,,0000,0000,0000,,PayPal as well closed my account down. Dialogue: 0,0:31:57.08,0:31:59.04,Default,,0000,0000,0000,,So that was the end of my ability to use Tor. Dialogue: 0,0:31:59.04,0:32:01.00,Default,,0000,0000,0000,,So we can't just run all our traffic through Tor. Dialogue: 0,0:32:01.00,0:32:07.01,Default,,0000,0000,0000,,It's too slow, and the network has weird properties in terms of how you present to websites, Dialogue: 0,0:32:07.01,0:32:08.10,Default,,0000,0000,0000,,that frankly, are scary. Dialogue: 0,0:32:08.10,0:32:16.09,Default,,0000,0000,0000,,Because if I look like a criminal to the bank, I don't want to imagine what I look like to my own government. Dialogue: 0,0:32:16.09,0:32:19.00,Default,,0000,0000,0000,,But we can do privacy in other ways. Dialogue: 0,0:32:19.00,0:32:25.02,Default,,0000,0000,0000,,If you are a web user, in China, and you want to surf the internet, Dialogue: 0,0:32:25.02,0:32:30.09,Default,,0000,0000,0000,,with full access to every website you might go to, and with privacy from your government, Dialogue: 0,0:32:30.09,0:32:34.10,Default,,0000,0000,0000,,so that you don't get a knock on your door from visiting those websites, Dialogue: 0,0:32:34.10,0:32:36.08,Default,,0000,0000,0000,,we can do that without Tor. Dialogue: 0,0:32:36.08,0:32:39.00,Default,,0000,0000,0000,,We don't need Tor to do that. We can do that cheaply. Dialogue: 0,0:32:39.00,0:32:45.06,Default,,0000,0000,0000,,Because all you need to do in that situation is get your connection out of China. Dialogue: 0,0:32:45.06,0:32:54.04,Default,,0000,0000,0000,,Send your request for a web page through an encrypted connection to a FreedomBox in... Dialogue: 0,0:32:54.04,0:32:58.04,Default,,0000,0000,0000,,Austria, America, who knows? Dialogue: 0,0:32:58.04,0:33:05.09,Default,,0000,0000,0000,,Just get the request away from the people who physically have the power to control you. Dialogue: 0,0:33:05.09,0:33:08.09,Default,,0000,0000,0000,,And we can do that cheaply, that's just SSH port forwarding. Dialogue: 0,0:33:08.09,0:33:14.01,Default,,0000,0000,0000,,That's just a little bit of tunneling, that's just a little bit of VPN. Dialogue: 0,0:33:14.01,0:33:16.00,Default,,0000,0000,0000,,There's a lot of ways to do that sort of thing, Dialogue: 0,0:33:16.00,0:33:20.08,Default,,0000,0000,0000,,to give you anonymity and privacy in your specific context Dialogue: 0,0:33:20.08,0:33:22.08,Default,,0000,0000,0000,,without going all the way into something like Tor. Dialogue: 0,0:33:22.08,0:33:25.09,Default,,0000,0000,0000,,Now there are people who are going to need Tor. Dialogue: 0,0:33:25.09,0:33:27.10,Default,,0000,0000,0000,,They will need it for their use case. Dialogue: 0,0:33:27.10,0:33:32.09,Default,,0000,0000,0000,,But not every use case requires that level of attack. Dialogue: 0,0:33:32.09,0:33:37.09,Default,,0000,0000,0000,,And so one of the things we're trying to do is figure out how much privacy and anonymity you need, Dialogue: 0,0:33:37.09,0:33:40.02,Default,,0000,0000,0000,,and from whom you need it. Dialogue: 0,0:33:40.02,0:33:43.04,Default,,0000,0000,0000,,If we can do that effectively we can give people solutions Dialogue: 0,0:33:43.04,0:33:45.05,Default,,0000,0000,0000,,that actually work for them. Because if we just tell people Dialogue: 0,0:33:45.05,0:33:49.05,Default,,0000,0000,0000,,to use Tor, we're going to have a problem. Dialogue: 0,0:33:49.05,0:33:52.06,Default,,0000,0000,0000,,They're not going to use it, and they won't get any privacy at all. Dialogue: 0,0:33:52.06,0:33:55.02,Default,,0000,0000,0000,,And that's bad. Dialogue: 0,0:33:55.02,0:33:57.02,Default,,0000,0000,0000,,So we want to allow people to do anonymous publishing, Dialogue: 0,0:33:57.02,0:33:59.07,Default,,0000,0000,0000,,and file-sharing, and web-browsing and email. Dialogue: 0,0:33:59.07,0:34:01.06,Default,,0000,0000,0000,,All the communications you want to do. Dialogue: 0,0:34:01.06,0:34:03.09,Default,,0000,0000,0000,,The technology to do that already exists, Dialogue: 0,0:34:03.09,0:34:05.08,Default,,0000,0000,0000,,we could do all of that with Tor. Dialogue: 0,0:34:05.08,0:34:09.00,Default,,0000,0000,0000,,The next piece of our challenge is to figure out how to do it without Tor. Dialogue: 0,0:34:09.00,0:34:12.00,Default,,0000,0000,0000,,To figure out what pieces we need Tor for, and to figure out Dialogue: 0,0:34:12.00,0:34:17.08,Default,,0000,0000,0000,,what pieces we can do a little bit more cheaply. Dialogue: 0,0:34:17.08,0:34:19.06,Default,,0000,0000,0000,,Security. Dialogue: 0,0:34:19.06,0:34:23.10,Default,,0000,0000,0000,,Without security, you don't have freedom and privacy and anonymity. Dialogue: 0,0:34:23.10,0:34:25.06,Default,,0000,0000,0000,,If the box isn't secure, Dialogue: 0,0:34:25.06,0:34:27.08,Default,,0000,0000,0000,,you lose. Dialogue: 0,0:34:27.08,0:34:32.00,Default,,0000,0000,0000,,We're going to encrypt everything. Dialogue: 0,0:34:32.00,0:34:36.02,Default,,0000,0000,0000,,We're going to do something that's called social key management, which I'm going to talk about. Dialogue: 0,0:34:36.02,0:34:39.01,Default,,0000,0000,0000,,I do want to talk about the Debian-based bit. Dialogue: 0,0:34:39.01,0:34:42.08,Default,,0000,0000,0000,,We are based on a distribution of Linux called Debian, Dialogue: 0,0:34:42.08,0:34:46.03,Default,,0000,0000,0000,,because it is a community-based distribution. Dialogue: 0,0:34:46.03,0:34:48.04,Default,,0000,0000,0000,,It is made by people who care a lot about your Dialogue: 0,0:34:48.04,0:34:51.06,Default,,0000,0000,0000,,freedom, your privacy, and your ability to speak anonymously. Dialogue: 0,0:34:51.06,0:34:55.05,Default,,0000,0000,0000,,And we really believe that the best way to distribute this Dialogue: 0,0:34:55.05,0:34:58.03,Default,,0000,0000,0000,,software is to hand it to the Debian mirror network and let Dialogue: 0,0:34:58.03,0:35:00.01,Default,,0000,0000,0000,,them distribute it. Because they have mechanisms Dialogue: 0,0:35:00.01,0:35:02.02,Default,,0000,0000,0000,,to make sure that nobody changes it. Dialogue: 0,0:35:02.02,0:35:05.02,Default,,0000,0000,0000,,If we were to distribute the software to you directly, we Dialogue: 0,0:35:05.02,0:35:09.01,Default,,0000,0000,0000,,would become a target. People would want to change the Dialogue: 0,0:35:09.01,0:35:11.08,Default,,0000,0000,0000,,software as we distribute it on our website. Dialogue: 0,0:35:11.08,0:35:13.03,Default,,0000,0000,0000,,They would want to crack our website and distribute their Dialogue: 0,0:35:13.03,0:35:15.10,Default,,0000,0000,0000,,version of the package. Dialogue: 0,0:35:15.10,0:35:18.05,Default,,0000,0000,0000,,We don't want to be a target, so we're not going to give you software. Dialogue: 0,0:35:18.05,0:35:21.06,Default,,0000,0000,0000,,We're going to give it to Debian, and let them give you the software. Dialogue: 0,0:35:21.06,0:35:26.04,Default,,0000,0000,0000,,And at the same time you get all of the Debian guarantees about freedom. Dialogue: 0,0:35:26.04,0:35:28.07,Default,,0000,0000,0000,,The Debian Free Software Guidelines. Dialogue: 0,0:35:28.07,0:35:32.01,Default,,0000,0000,0000,,They're not going to give you software unless it comes Dialogue: 0,0:35:32.01,0:35:37.00,Default,,0000,0000,0000,,with all of the social guarantees that are required to participate in the Debian community. Dialogue: 0,0:35:37.00,0:35:39.06,Default,,0000,0000,0000,,So we're very proud to be using Debian in this manner, Dialogue: 0,0:35:39.06,0:35:41.09,Default,,0000,0000,0000,,and working with Debian in this manner. Dialogue: 0,0:35:41.09,0:35:44.08,Default,,0000,0000,0000,,And we think that's the most effective way we can guarantee that we're going to live up to Dialogue: 0,0:35:44.08,0:35:51.07,Default,,0000,0000,0000,,our promises to you, because it provides a mechanism whereby if we fail to live up to our promises, Dialogue: 0,0:35:51.07,0:35:56.03,Default,,0000,0000,0000,,we cannot give you something that is broken. Because Debian won't let us, Dialogue: 0,0:35:56.03,0:35:59.06,Default,,0000,0000,0000,,they just won't distribute it. Dialogue: 0,0:35:59.06,0:36:02.00,Default,,0000,0000,0000,,There are problems with security. Dialogue: 0,0:36:02.00,0:36:04.01,Default,,0000,0000,0000,,There are things we can't solve. Dialogue: 0,0:36:04.01,0:36:05.04,Default,,0000,0000,0000,,One... Dialogue: 0,0:36:05.04,0:36:08.07,Default,,0000,0000,0000,,Physical security of the box. Dialogue: 0,0:36:08.07,0:36:13.06,Default,,0000,0000,0000,,We haven't really talked much internally about whether we can encrypt the filesystem on this box. Dialogue: 0,0:36:13.06,0:36:16.06,Default,,0000,0000,0000,,I don't quite see a way to do it. Dialogue: 0,0:36:16.06,0:36:20.00,Default,,0000,0000,0000,,It doesn't have an interface for you to enter a password effectively. Dialogue: 0,0:36:20.00,0:36:23.03,Default,,0000,0000,0000,,By the time you've brought an interface up you'd be running untrusted code. Dialogue: 0,0:36:23.03,0:36:25.02,Default,,0000,0000,0000,,I don't know a way to do it. Dialogue: 0,0:36:25.02,0:36:29.05,Default,,0000,0000,0000,,If anyone can think of a way that we can effectively encrypt the filesystem, I'd love to hear it. Dialogue: 0,0:36:29.05,0:36:35.00,Default,,0000,0000,0000,,But, on top of that, if we do encrypt the filesystem, Dialogue: 0,0:36:35.00,0:36:38.06,Default,,0000,0000,0000,,then the thing cannot be rebooted remotely, which is a downside. Dialogue: 0,0:36:38.06,0:36:40.07,Default,,0000,0000,0000,,So there are trade-offs at every step of the way. Dialogue: 0,0:36:40.07,0:36:45.00,Default,,0000,0000,0000,,If we can figure out some of these security issues, then we can be ahead of the game. Dialogue: 0,0:36:45.00,0:36:50.03,Default,,0000,0000,0000,,But I think the encrypting the filesystem is the only way to guarantee the box is secure, even if it's Dialogue: 0,0:36:50.03,0:36:52.04,Default,,0000,0000,0000,,not physically secure. Dialogue: 0,0:36:52.04,0:36:53.07,Default,,0000,0000,0000,,So I think that's a big one. Dialogue: 0,0:36:53.07,0:36:58.00,Default,,0000,0000,0000,,If you have ideas about that, please come and talk to me after the talk. Dialogue: 0,0:36:58.00,0:37:01.03,Default,,0000,0000,0000,,I promised I would talk about social key management, and here it is. Dialogue: 0,0:37:01.03,0:37:06.04,Default,,0000,0000,0000,,So we're building the idea of knowing who your friends are Dialogue: 0,0:37:06.04,0:37:08.00,Default,,0000,0000,0000,,into the box at a somewhat low level. Dialogue: 0,0:37:08.00,0:37:12.09,Default,,0000,0000,0000,,To the point where things that are on the box can assume it is there, Dialogue: 0,0:37:12.09,0:37:17.05,Default,,0000,0000,0000,,or ask you if it's there, or rely on it as a matter of course in some cases. Dialogue: 0,0:37:17.05,0:37:21.09,Default,,0000,0000,0000,,So we can do things with keys that make your keys unlosable. Dialogue: 0,0:37:21.09,0:37:25.02,Default,,0000,0000,0000,,Right now a PGP key is a hard thing to manage. Dialogue: 0,0:37:25.02,0:37:26.07,Default,,0000,0000,0000,,Key management is terrible. Dialogue: 0,0:37:26.07,0:37:30.04,Default,,0000,0000,0000,,Do you guys like PGP? PGP is good. Dialogue: 0,0:37:30.04,0:37:34.07,Default,,0000,0000,0000,,Does anyone here like key management? Dialogue: 0,0:37:34.07,0:37:36.02,Default,,0000,0000,0000,,We have one guy who likes key management. Dialogue: 0,0:37:36.02,0:37:39.05,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,0:37:39.05,0:37:41.02,Default,,0000,0000,0000,,He's going to do it for all of you! Dialogue: 0,0:37:41.02,0:37:43.05,Default,,0000,0000,0000,,So, none of us like key management. Dialogue: 0,0:37:43.05,0:37:46.02,Default,,0000,0000,0000,,Key management doesn't work, especially if your use-case is home users, naive end-users. Dialogue: 0,0:37:46.02,0:37:48.01,Default,,0000,0000,0000,,Nobody wants to do key management. Dialogue: 0,0:37:48.01,0:37:51.07,Default,,0000,0000,0000,,Writing their key down and putting it in a safety deposit box is ludicrous. Dialogue: 0,0:37:51.07,0:37:54.04,Default,,0000,0000,0000,,It's a very difficult thing to actually convince people to do. Dialogue: 0,0:37:54.04,0:38:00.03,Default,,0000,0000,0000,,Sticking it on a USB key, putting it in a zip-lock back and burying it in your backyard is paranoid. Dialogue: 0,0:38:00.03,0:38:03.03,Default,,0000,0000,0000,,I can't believe I just told you what I do with my key. Dialogue: 0,0:38:03.03,0:38:04.08,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,0:38:04.08,0:38:06.07,Default,,0000,0000,0000,,No, you can't ask people to do that. Dialogue: 0,0:38:06.07,0:38:08.01,Default,,0000,0000,0000,,They won't do it. Dialogue: 0,0:38:08.01,0:38:09.09,Default,,0000,0000,0000,,You can't protect keys in this manner. Dialogue: 0,0:38:09.09,0:38:13.03,Default,,0000,0000,0000,,You have to have a system that allows them to sort of, not ever know they have a key. Dialogue: 0,0:38:13.03,0:38:16.00,Default,,0000,0000,0000,,To not think about their key unless they really want to. Dialogue: 0,0:38:16.00,0:38:19.00,Default,,0000,0000,0000,,We think we've come up with something that might work. Dialogue: 0,0:38:19.00,0:38:20.08,Default,,0000,0000,0000,,You take the key, Dialogue: 0,0:38:20.08,0:38:22.03,Default,,0000,0000,0000,,or a subkey, Dialogue: 0,0:38:22.03,0:38:24.05,Default,,0000,0000,0000,,you chop it into little bits Dialogue: 0,0:38:24.05,0:38:25.04,Default,,0000,0000,0000,,and you give that key... Dialogue: 0,0:38:25.04,0:38:31.02,Default,,0000,0000,0000,,and we're talking about a key of a very long length, so there's a giant attack space Dialogue: 0,0:38:31.02,0:38:36.03,Default,,0000,0000,0000,,and you can chop it into bits and hand it to people without reducing the search space for a key. Dialogue: 0,0:38:36.03,0:38:39.00,Default,,0000,0000,0000,,You chop it into bits and hand all the bits to your friends. Dialogue: 0,0:38:39.00,0:38:42.04,Default,,0000,0000,0000,,Now all your friends have your key, as a group. Dialogue: 0,0:38:42.04,0:38:44.03,Default,,0000,0000,0000,,Individually, none of them can attack you. Dialogue: 0,0:38:44.03,0:38:47.07,Default,,0000,0000,0000,,Indicidually, none of them has the power to come root your box, Dialogue: 0,0:38:47.07,0:38:50.04,Default,,0000,0000,0000,,to access your services and pretend to be you. Dialogue: 0,0:38:50.04,0:38:53.08,Default,,0000,0000,0000,,As a group, they can do this. Dialogue: 0,0:38:53.08,0:39:04.02,Default,,0000,0000,0000,,We trust our friends, as a group, more than we trust them as individuals. Dialogue: 0,0:39:04.02,0:39:08.07,Default,,0000,0000,0000,,Any single one of your friends, if you gave them the key to your financial data and your private online Dialogue: 0,0:39:08.07,0:39:10.08,Default,,0000,0000,0000,,life that would make you very nervous. Dialogue: 0,0:39:10.08,0:39:14.04,Default,,0000,0000,0000,,You would worry that they would succumb to temptation to peek, Dialogue: 0,0:39:14.04,0:39:17.02,Default,,0000,0000,0000,,fall on hard times and want to attack you in some way, Dialogue: 0,0:39:17.02,0:39:19.06,Default,,0000,0000,0000,,fall out with you, get mad at you. Dialogue: 0,0:39:19.06,0:39:23.03,Default,,0000,0000,0000,,As an individual, people are sort of fallible in this sense. Dialogue: 0,0:39:23.03,0:39:25.06,Default,,0000,0000,0000,,But as a group of friends who would have to get together Dialogue: 0,0:39:25.06,0:39:30.00,Default,,0000,0000,0000,,and affirmatively make a decision to attack you, Dialogue: 0,0:39:30.00,0:39:32.06,Default,,0000,0000,0000,,we think that's extremely unlikely. Dialogue: 0,0:39:32.06,0:39:38.01,Default,,0000,0000,0000,,It's so unlikely that there are only a few scenarios where we think it might happen. Dialogue: 0,0:39:38.01,0:39:39.05,Default,,0000,0000,0000,,One... Dialogue: 0,0:39:39.05,0:39:42.07,Default,,0000,0000,0000,,if you are ill, and unable to access your box Dialogue: 0,0:39:42.07,0:39:44.02,Default,,0000,0000,0000,,or you're in jail Dialogue: 0,0:39:44.02,0:39:45.05,Default,,0000,0000,0000,,or you've passed away Dialogue: 0,0:39:45.05,0:39:49.00,Default,,0000,0000,0000,,or you've disappeared. Dialogue: 0,0:39:49.00,0:39:52.03,Default,,0000,0000,0000,,Or... you've gone crazy. Dialogue: 0,0:39:52.03,0:39:57.06,Default,,0000,0000,0000,,We call this type of event, where all your friends get together and help you, Dialogue: 0,0:39:57.06,0:39:59.09,Default,,0000,0000,0000,,even if you don't ask them for help, Dialogue: 0,0:39:59.09,0:40:02.09,Default,,0000,0000,0000,,we call that an intervention. Dialogue: 0,0:40:02.09,0:40:05.06,Default,,0000,0000,0000,,When your friends sit you down and say, Dialogue: 0,0:40:05.06,0:40:09.03,Default,,0000,0000,0000,,"you need our help, you can't ask us for it because you're not in a position to ask us for it", Dialogue: 0,0:40:09.03,0:40:10.10,Default,,0000,0000,0000,,that's an intervention. Dialogue: 0,0:40:10.10,0:40:16.07,Default,,0000,0000,0000,,If you have a moment in your life, a crisis in your life that is an intervention level event, Dialogue: 0,0:40:16.07,0:40:18.05,Default,,0000,0000,0000,,that's when you can go to your friends. Dialogue: 0,0:40:18.05,0:40:22.01,Default,,0000,0000,0000,,If your house burns down, you lose your key and all your data Dialogue: 0,0:40:22.01,0:40:25.05,Default,,0000,0000,0000,,You go to your friends, and you say "can I have part of my key back?" Dialogue: 0,0:40:25.05,0:40:29.08,Default,,0000,0000,0000,,"Oh, and give me that data that you have in a cryptographically-sealed box that you can't read." Dialogue: 0,0:40:29.08,0:40:31.00,Default,,0000,0000,0000,,To all your friends... Dialogue: 0,0:40:31.00,0:40:32.00,Default,,0000,0000,0000,,"My data please, my key please, ..." Dialogue: 0,0:40:32.00,0:40:32.08,Default,,0000,0000,0000,,"My data please, my key please, ..." Dialogue: 0,0:40:32.08,0:40:34.01,Default,,0000,0000,0000,,"My data please, my key please, ..." Dialogue: 0,0:40:34.01,0:40:39.07,Default,,0000,0000,0000,,You take all those pieces, you get a new box, Dialogue: 0,0:40:39.07,0:40:42.01,Default,,0000,0000,0000,,you load it all onto your box. Dialogue: 0,0:40:42.01,0:40:47.02,Default,,0000,0000,0000,,You have the key, you have your entire key, and now you can read your data. Dialogue: 0,0:40:47.02,0:40:49.02,Default,,0000,0000,0000,,And you haven't lost your digital life. Dialogue: 0,0:40:49.02,0:40:54.00,Default,,0000,0000,0000,,You have a key that is now unlosable. Dialogue: 0,0:40:54.00,0:40:58.08,Default,,0000,0000,0000,,Even if you never wrote it down, even if you never buried it in the backyard. Dialogue: 0,0:40:58.08,0:41:00.05,Default,,0000,0000,0000,,This is a hard problem in key management. Dialogue: 0,0:41:00.05,0:41:04.02,Default,,0000,0000,0000,,People lose their keys and their passwords to services all the time. Dialogue: 0,0:41:04.02,0:41:09.00,Default,,0000,0000,0000,,The only way we can think of to make that impossible, is this mechanism. Dialogue: 0,0:41:09.00,0:41:10.04,Default,,0000,0000,0000,,And of course it's optional. Dialogue: 0,0:41:10.04,0:41:13.08,Default,,0000,0000,0000,,If you're a person who doesn't trust your friends, even as a group, Dialogue: 0,0:41:13.08,0:41:17.02,Default,,0000,0000,0000,,or if you're a person who just doesn't have a lot of friends Dialogue: 0,0:41:17.02,0:41:20.05,Default,,0000,0000,0000,,(let me finish!) Dialogue: 0,0:41:20.05,0:41:25.01,Default,,0000,0000,0000,,...who doesn't have a lot of friends with FreedomBoxes who can be the backend for this, Dialogue: 0,0:41:25.01,0:41:27.02,Default,,0000,0000,0000,,you don't have to trust this mechanism. Dialogue: 0,0:41:27.02,0:41:30.00,Default,,0000,0000,0000,,You can do something else to make your key unforgettable. Dialogue: 0,0:41:30.00,0:41:32.04,Default,,0000,0000,0000,,But for a lot of naive end-users, Dialogue: 0,0:41:32.04,0:41:34.05,Default,,0000,0000,0000,,this is the mechanism. Dialogue: 0,0:41:34.05,0:41:36.07,Default,,0000,0000,0000,,This is the way they are going to never Dialogue: 0,0:41:36.07,0:41:37.10,Default,,0000,0000,0000,,lose their keys Dialogue: 0,0:41:37.10,0:41:41.07,Default,,0000,0000,0000,,Because the first time a user gets irretrievably locked out of his FreedomBox, Dialogue: 0,0:41:41.07,0:41:43.08,Default,,0000,0000,0000,,we lose that user forever. Dialogue: 0,0:41:43.08,0:41:45.06,Default,,0000,0000,0000,,And we lose all his friends forever. Dialogue: 0,0:41:45.06,0:41:52.03,Default,,0000,0000,0000,,Because it would scare you to lose such an important group of information. Dialogue: 0,0:41:52.03,0:41:53.09,Default,,0000,0000,0000,,Social key management. Dialogue: 0,0:41:53.09,0:41:58.07,Default,,0000,0000,0000,,This is the benefit of building social, of building knowledge Dialogue: 0,0:41:58.07,0:42:03.06,Default,,0000,0000,0000,,of who your friends are, into the box, at a deep level. Dialogue: 0,0:42:03.06,0:42:05.08,Default,,0000,0000,0000,,We have never done that before, with a technology Dialogue: 0,0:42:05.08,0:42:08.00,Default,,0000,0000,0000,,as a community project. Dialogue: 0,0:42:08.00,0:42:11.00,Default,,0000,0000,0000,,And it opens up new possibilities. This is just one. Dialogue: 0,0:42:11.00,0:42:13.01,Default,,0000,0000,0000,,There are others. Dialogue: 0,0:42:13.01,0:42:15.03,Default,,0000,0000,0000,,But it's a field we haven't really thought a lot about. Dialogue: 0,0:42:15.03,0:42:19.06,Default,,0000,0000,0000,,I think once we get out there and we start doing this kind of Dialogue: 0,0:42:19.06,0:42:25.04,Default,,0000,0000,0000,,construction, a lot of new uses are going to be found for this architecture. Dialogue: 0,0:42:25.04,0:42:28.06,Default,,0000,0000,0000,,I encourage you all to think about what changes, Dialogue: 0,0:42:28.06,0:42:34.09,Default,,0000,0000,0000,,when you can assume that the box has people you can trust, just a little bit, Dialogue: 0,0:42:34.09,0:42:38.02,Default,,0000,0000,0000,,because right now we live in a world where we are asked Dialogue: 0,0:42:38.02,0:42:42.07,Default,,0000,0000,0000,,to trust third party services like Facebook with all our photos, Dialogue: 0,0:42:42.07,0:42:46.04,Default,,0000,0000,0000,,or Flickr with all our photos, or Gmail with all our email. Dialogue: 0,0:42:46.04,0:42:47.08,Default,,0000,0000,0000,,We are asked to trust them. Dialogue: 0,0:42:47.08,0:42:50.01,Default,,0000,0000,0000,,We have no reason to trust them. Dialogue: 0,0:42:50.01,0:42:54.09,Default,,0000,0000,0000,,I mean, we expect that they'll act all right, because they have no reason to destroy us. Dialogue: 0,0:42:54.09,0:42:56.09,Default,,0000,0000,0000,,But we don't know what's going to happen. Dialogue: 0,0:42:56.09,0:43:01.07,Default,,0000,0000,0000,,We're effectively giving all our information to people we don't trust at all right now. Dialogue: 0,0:43:01.07,0:43:04.06,Default,,0000,0000,0000,,How does a network of people we trust, just a little bit, Dialogue: 0,0:43:04.06,0:43:06.10,Default,,0000,0000,0000,,change the landscape? Dialogue: 0,0:43:06.10,0:43:09.01,Default,,0000,0000,0000,,I think that's a really interesting question. Dialogue: 0,0:43:09.01,0:43:10.04,Default,,0000,0000,0000,,This box explores that question, Dialogue: 0,0:43:10.04,0:43:16.01,Default,,0000,0000,0000,,this box creates new solutions to old problems that previously seemed intractable. Dialogue: 0,0:43:16.01,0:43:19.06,Default,,0000,0000,0000,,So, I encourage everybody to think about how that might Dialogue: 0,0:43:19.06,0:43:27.01,Default,,0000,0000,0000,,change the solution to a problem they have with a technological architecture as it exists today. Dialogue: 0,0:43:27.01,0:43:31.06,Default,,0000,0000,0000,,Here's another problem... Dialogue: 0,0:43:31.06,0:43:34.06,Default,,0000,0000,0000,,Boxes that know who you are, and know who your friends are, Dialogue: 0,0:43:34.06,0:43:37.06,Default,,0000,0000,0000,,and know how your friends normally act, Dialogue: 0,0:43:37.06,0:43:41.09,Default,,0000,0000,0000,,can also know when your friends are acting weird. Dialogue: 0,0:43:41.09,0:43:49.06,Default,,0000,0000,0000,,If you have a friend who sends you one email a year, who suddenly sends you ten emails in a day, Dialogue: 0,0:43:49.06,0:43:51.07,Default,,0000,0000,0000,,that look like spam, Dialogue: 0,0:43:51.07,0:43:53.04,Default,,0000,0000,0000,,you know that box is rooted. Dialogue: 0,0:43:53.04,0:43:55.04,Default,,0000,0000,0000,,You know that box is weird. Dialogue: 0,0:43:55.04,0:43:59.04,Default,,0000,0000,0000,,Or if you are using the FreedomBox as your gateway to the internet, Dialogue: 0,0:43:59.04,0:44:05.04,Default,,0000,0000,0000,,and a box it is serving downstream, starts sending a bunch of spam through it, it knows. Dialogue: 0,0:44:05.04,0:44:08.08,Default,,0000,0000,0000,,It can say "Oh no! You're acting like a zombie." Dialogue: 0,0:44:08.08,0:44:10.04,Default,,0000,0000,0000,,"You should get a check-up." Dialogue: 0,0:44:10.04,0:44:15.05,Default,,0000,0000,0000,,It can shut off mail service to that box, and not let the messages out. Dialogue: 0,0:44:15.05,0:44:21.06,Default,,0000,0000,0000,,It can make that decision to protect the wider internet to make you a better citizen in the world. Dialogue: 0,0:44:21.06,0:44:27.10,Default,,0000,0000,0000,,If suddenly your computer starts saying "Hey, I'm in Scotland and I need $5000"... Dialogue: 0,0:44:27.10,0:44:30.02,Default,,0000,0000,0000,,but we know you're not in Scotland Dialogue: 0,0:44:30.02,0:44:33.00,Default,,0000,0000,0000,,Maybe this box, because it has contact information, Dialogue: 0,0:44:33.00,0:44:35.07,Default,,0000,0000,0000,,maybe this box sends you an SMS. Dialogue: 0,0:44:35.07,0:44:40.09,Default,,0000,0000,0000,,And says "Dude, you've been hacked, go do something about your box." Dialogue: 0,0:44:40.09,0:44:43.08,Default,,0000,0000,0000,,So the types of things we can do once we assume we have Dialogue: 0,0:44:43.08,0:44:49.00,Default,,0000,0000,0000,,close relations as opposed to arms-length relations, Dialogue: 0,0:44:49.00,0:44:51.01,Default,,0000,0000,0000,,the types of things we can do when we trust each other a little bit Dialogue: 0,0:44:51.01,0:44:54.04,Default,,0000,0000,0000,,and we trust our boxes a little bit, goes way up. Dialogue: 0,0:44:54.04,0:44:55.09,Default,,0000,0000,0000,,Way up. Dialogue: 0,0:44:55.09,0:44:58.08,Default,,0000,0000,0000,,And by bringing that infrastructure closer to us, Dialogue: 0,0:44:58.08,0:45:03.04,Default,,0000,0000,0000,,I mean Gmail is too far away to play that role from a network perspective. Dialogue: 0,0:45:03.04,0:45:08.08,Default,,0000,0000,0000,,But if the box is in our land, we can do that. Dialogue: 0,0:45:08.08,0:45:11.08,Default,,0000,0000,0000,,These boxes will only work if they are convenient. Dialogue: 0,0:45:11.08,0:45:14.08,Default,,0000,0000,0000,,There's an old punk-rock slogan, from the Dead Kennedys, Dialogue: 0,0:45:14.08,0:45:18.05,Default,,0000,0000,0000,,"Give me convenience, or give me death." Dialogue: 0,0:45:18.05,0:45:24.07,Default,,0000,0000,0000,,We laugh at that, but that's a belief users have, Dialogue: 0,0:45:24.07,0:45:26.06,Default,,0000,0000,0000,,and I deduce that based on their behaviour, Dialogue: 0,0:45:26.06,0:45:29.07,Default,,0000,0000,0000,,because every time there is a convenient web service, Dialogue: 0,0:45:29.07,0:45:31.02,Default,,0000,0000,0000,,people use it. Dialogue: 0,0:45:31.02,0:45:34.08,Default,,0000,0000,0000,,Even if it's not very good with privacy, a lot of people are going to use it. Dialogue: 0,0:45:34.08,0:45:41.03,Default,,0000,0000,0000,,And conversely, whenever we have web services that are very good at privacy, but aren't very convenient, Dialogue: 0,0:45:41.03,0:45:44.00,Default,,0000,0000,0000,,comparatively fewer people use them. Dialogue: 0,0:45:44.00,0:45:47.07,Default,,0000,0000,0000,,We don't think this box works without convenience. Dialogue: 0,0:45:47.07,0:45:51.03,Default,,0000,0000,0000,,If we don't get the user-interface right then this project Dialogue: 0,0:45:51.03,0:45:53.04,Default,,0000,0000,0000,,will probably fall over. Dialogue: 0,0:45:53.04,0:45:56.00,Default,,0000,0000,0000,,It will never gain any sort of critical mass. Dialogue: 0,0:45:56.00,0:45:57.08,Default,,0000,0000,0000,,So we need a simple interface, Dialogue: 0,0:45:57.08,0:46:00.09,Default,,0000,0000,0000,,we need a way for users to interact with this box in a minimal way. Dialogue: 0,0:46:00.09,0:46:03.05,Default,,0000,0000,0000,,They should think about it as little as possible. Dialogue: 0,0:46:03.05,0:46:06.00,Default,,0000,0000,0000,,That's the hardest problem we face. Dialogue: 0,0:46:06.00,0:46:07.05,Default,,0000,0000,0000,,Quite frankly. Dialogue: 0,0:46:07.05,0:46:10.05,Default,,0000,0000,0000,,The technology to do private communication, that exists. Dialogue: 0,0:46:10.05,0:46:14.04,Default,,0000,0000,0000,,A lot of the people in this room helped to build that infrastructure and technology. Dialogue: 0,0:46:14.04,0:46:16.06,Default,,0000,0000,0000,,We can put it on the box. Dialogue: 0,0:46:16.06,0:46:21.01,Default,,0000,0000,0000,,Making it easy and accessible for users, that's hard. Dialogue: 0,0:46:21.01,0:46:23.04,Default,,0000,0000,0000,,And right now we're trying to figure out what that looks like, Dialogue: 0,0:46:23.04,0:46:25.01,Default,,0000,0000,0000,,who the designers are going to be. Dialogue: 0,0:46:25.01,0:46:30.08,Default,,0000,0000,0000,,If you have user interface or user experience design that you want to bring to a project like this, Dialogue: 0,0:46:30.08,0:46:33.09,Default,,0000,0000,0000,,please, please, come find me. Dialogue: 0,0:46:33.09,0:46:38.10,Default,,0000,0000,0000,,In order to have convenience, we need to have the thing provide services that are not just Dialogue: 0,0:46:38.10,0:46:44.09,Default,,0000,0000,0000,,freedom-oriented, we need to use its position in your network as a trusted device Dialogue: 0,0:46:44.09,0:46:48.05,Default,,0000,0000,0000,,to do things for you that aren't just about privacy. Dialogue: 0,0:46:48.05,0:46:50.05,Default,,0000,0000,0000,,It needs to do backups. Dialogue: 0,0:46:50.05,0:46:52.00,Default,,0000,0000,0000,,This is important. Dialogue: 0,0:46:52.00,0:46:56.06,Default,,0000,0000,0000,,Right now the way people back up their photos is by giving them to Flickr. Dialogue: 0,0:46:56.06,0:47:00.02,Default,,0000,0000,0000,,The way they back up their email is by giving it to Gmail. Dialogue: 0,0:47:00.02,0:47:06.00,Default,,0000,0000,0000,,If we don't provide backups, we can never be an effective replacement Dialogue: 0,0:47:06.00,0:47:09.01,Default,,0000,0000,0000,,for the services that store your data somewhere else. Dialogue: 0,0:47:09.01,0:47:14.08,Default,,0000,0000,0000,,Even though they're storing it out there in the cloud for their purposes, you get a benefit from it. Dialogue: 0,0:47:14.08,0:47:16.06,Default,,0000,0000,0000,,We have to replicate that benefit. Dialogue: 0,0:47:16.06,0:47:19.09,Default,,0000,0000,0000,,So things that we don't think of as privacy features have to Dialogue: 0,0:47:19.09,0:47:21.06,Default,,0000,0000,0000,,be in the box. Dialogue: 0,0:47:21.06,0:47:25.05,Default,,0000,0000,0000,,The backups, the passwords, and the keys, you can't forget them. Dialogue: 0,0:47:25.05,0:47:29.01,Default,,0000,0000,0000,,We would like it to be a music, a video, a photo server, Dialogue: 0,0:47:29.01,0:47:33.07,Default,,0000,0000,0000,,all the kinds of things you might expect from a convenient box on your network. Dialogue: 0,0:47:33.07,0:47:37.07,Default,,0000,0000,0000,,All the things that you want to share with other people, this box has to do those things. Dialogue: 0,0:47:37.07,0:47:44.10,Default,,0000,0000,0000,,And these aren't privacy features, but without them we won't be able to give people privacy. Dialogue: 0,0:47:44.10,0:47:49.02,Default,,0000,0000,0000,,Our first feature, the thing we are working towards Dialogue: 0,0:47:49.02,0:47:50.05,Default,,0000,0000,0000,,is Jabber. Dialogue: 0,0:47:50.05,0:47:53.01,Default,,0000,0000,0000,,It's secure encrypted chat, point-to-point. Dialogue: 0,0:47:53.01,0:47:57.07,Default,,0000,0000,0000,,That will be the thing we are working on right now. Dialogue: 0,0:47:57.07,0:48:02.02,Default,,0000,0000,0000,,But in order to do that we need to solve this monkey-spherish SSL problem that I described. Dialogue: 0,0:48:02.02,0:48:06.07,Default,,0000,0000,0000,,We have code, it needs to get packaged and all that. Dialogue: 0,0:48:06.07,0:48:10.02,Default,,0000,0000,0000,,Our development strategy, the way we are going to do all the things we said, Dialogue: 0,0:48:10.02,0:48:15.02,Default,,0000,0000,0000,,because the list of things I have said we're going to do... Dialogue: 0,0:48:15.02,0:48:19.04,Default,,0000,0000,0000,,I can't believe you're not throwing things at me. Dialogue: 0,0:48:19.04,0:48:21.06,Default,,0000,0000,0000,,Because it's ludicrous to believe that we can actually do all these things by ourselves. Dialogue: 0,0:48:21.06,0:48:23.05,Default,,0000,0000,0000,,And we're not. Dialogue: 0,0:48:23.05,0:48:25.09,Default,,0000,0000,0000,,We're going to let other people make the software. Dialogue: 0,0:48:25.09,0:48:28.02,Default,,0000,0000,0000,,As much as possible we're going to encourage other people Dialogue: 0,0:48:28.02,0:48:31.07,Default,,0000,0000,0000,,to build stuff. We're going to use stuff that already exists. Dialogue: 0,0:48:31.07,0:48:35.00,Default,,0000,0000,0000,,We're going to use Privoxy, we're going to use Prosody, we're going to use Apache. Dialogue: 0,0:48:35.00,0:48:38.06,Default,,0000,0000,0000,,We're not going to reinvent the web server, we're not going to reinvent protocols. Dialogue: 0,0:48:38.06,0:48:45.06,Default,,0000,0000,0000,,I really hope that by the time this project is mature, we haven't invented any new protocols. Dialogue: 0,0:48:45.06,0:48:48.06,Default,,0000,0000,0000,,Maybe we'll use new protocols, but I don't want to be Dialogue: 0,0:48:48.06,0:48:53.02,Default,,0000,0000,0000,,generating new things that haven't been tested, and then putting them in FreedomBox. Dialogue: 0,0:48:53.02,0:48:58.05,Default,,0000,0000,0000,,I want to see things in the real world, tested, gain credibility and take them. Dialogue: 0,0:48:58.05,0:49:01.07,Default,,0000,0000,0000,,The less we invent, the better. Dialogue: 0,0:49:01.07,0:49:07.05,Default,,0000,0000,0000,,As far as timelines go, by the time we have it ready, you'll know why you need it. Dialogue: 0,0:49:07.05,0:49:10.07,Default,,0000,0000,0000,,People right now are figuring out that privacy is important. Dialogue: 0,0:49:10.07,0:49:12.10,Default,,0000,0000,0000,,They're seeing it over and over again. Dialogue: 0,0:49:12.10,0:49:18.01,Default,,0000,0000,0000,,In Egypt, the at the start of the Arab spring, one of the things the government did to try to Dialogue: 0,0:49:18.01,0:49:22.10,Default,,0000,0000,0000,,tamp down the organisation was to convince companies to shut off cell networks, Dialogue: 0,0:49:22.10,0:49:25.02,Default,,0000,0000,0000,,to prevent people from talking to each other. Dialogue: 0,0:49:25.02,0:49:28.03,Default,,0000,0000,0000,,In America they did the same thing in San Francisco I hear. Dialogue: 0,0:49:28.03,0:49:36.03,Default,,0000,0000,0000,,Turned off the cell towers to prevent people from organising to meet for a protest. Dialogue: 0,0:49:36.03,0:49:42.02,Default,,0000,0000,0000,,With Occupy Wall Street, you're starting to see infiltration, Dialogue: 0,0:49:42.02,0:49:45.10,Default,,0000,0000,0000,,you're starting to see people going and getting information Dialogue: 0,0:49:45.10,0:49:48.05,Default,,0000,0000,0000,,that Occupy Wall Street is talking about and turning it over Dialogue: 0,0:49:48.05,0:49:51.09,Default,,0000,0000,0000,,to the authorities, the police, the FBI. Dialogue: 0,0:49:51.09,0:49:59.01,Default,,0000,0000,0000,,So the need for privacy as we enter a new age of increased activism, we hope, Dialogue: 0,0:49:59.01,0:50:01.08,Default,,0000,0000,0000,,of increased activity, of social activity, Dialogue: 0,0:50:01.08,0:50:06.02,Default,,0000,0000,0000,,I think the need for a lot of this privacy stuff is going to become clear. Dialogue: 0,0:50:06.02,0:50:11.00,Default,,0000,0000,0000,,As the technology for invading your privacy improves, Dialogue: 0,0:50:11.00,0:50:18.01,Default,,0000,0000,0000,,the need for technology to protect your privacy will become stark and clear. Dialogue: 0,0:50:18.01,0:50:22.05,Default,,0000,0000,0000,,Our two big challenges as I said are user experience, Dialogue: 0,0:50:22.05,0:50:27.06,Default,,0000,0000,0000,,and the one I didn't say was paying for developers, paying for designers. Dialogue: 0,0:50:27.06,0:50:31.07,Default,,0000,0000,0000,,Those are the hard parts that we're working on. Dialogue: 0,0:50:31.07,0:50:35.09,Default,,0000,0000,0000,,And if we fail, we think that's where we fail. Dialogue: 0,0:50:35.09,0:50:40.02,Default,,0000,0000,0000,,Software isn't on that list, as I said software is already out there. Dialogue: 0,0:50:40.02,0:50:42.04,Default,,0000,0000,0000,,So you can have a FreedomBox. Dialogue: 0,0:50:42.04,0:50:46.08,Default,,0000,0000,0000,,If you like that box that we've been passing around the audience, you can buy one from Globalscale. Dialogue: 0,0:50:46.08,0:50:51.02,Default,,0000,0000,0000,,If you don't want the box, it's just Debian, it's just Linux, it's just packages. Dialogue: 0,0:50:51.02,0:50:56.05,Default,,0000,0000,0000,,Throw Debian on a box, we will have packages available through the normal Debian mechanisms. Dialogue: 0,0:50:56.05,0:50:58.03,Default,,0000,0000,0000,,You don't even have to use our repository. Dialogue: 0,0:50:58.03,0:51:01.06,Default,,0000,0000,0000,,In fact, I don't think we're going to have a repository. Dialogue: 0,0:51:01.06,0:51:06.01,Default,,0000,0000,0000,,You're just going to download it and install it the same way you normally do it if you're technologically Dialogue: 0,0:51:06.01,0:51:08.05,Default,,0000,0000,0000,,capable of doing that. Dialogue: 0,0:51:08.05,0:51:10.02,Default,,0000,0000,0000,,I grabbed a bunch of photos from Flickr, Dialogue: 0,0:51:10.02,0:51:14.04,Default,,0000,0000,0000,,my colleague Ian Sullivan took that awesome picture of the FreedomBox. Dialogue: 0,0:51:14.04,0:51:17.02,Default,,0000,0000,0000,,And that's how you reach me. Dialogue: 0,0:51:18.10,0:51:31.03,Default,,0000,0000,0000,,{\i1}APPLAUSE{\i0} Dialogue: 0,0:51:39.00,0:51:44.08,Default,,0000,0000,0000,,Thanks James, please sit down. Dialogue: 0,0:51:44.08,0:51:49.01,Default,,0000,0000,0000,,We are up for questions from the audience for James. Dialogue: 0,0:51:49.01,0:52:03.05,Default,,0000,0000,0000,,Please raise your hand if you have any questions about the FreedomBox. Dialogue: 0,0:52:03.05,0:52:05.08,Default,,0000,0000,0000,,Hello, thanks that was a very interesting presentation. Dialogue: 0,0:52:05.08,0:52:06.06,Default,,0000,0000,0000,,Thank you. Dialogue: 0,0:52:06.06,0:52:10.05,Default,,0000,0000,0000,,Your boss Eben Moglen, he has given a speech at a committee of the US congress Dialogue: 0,0:52:10.05,0:52:13.05,Default,,0000,0000,0000,,I believe, which has received a lot of attention Dialogue: 0,0:52:13.05,0:52:18.06,Default,,0000,0000,0000,,and in Iran during the green movement the US state department Dialogue: 0,0:52:18.06,0:52:24.01,Default,,0000,0000,0000,,I believe has told Twitter to reschedule maintainence so that Dialogue: 0,0:52:24.01,0:52:29.02,Default,,0000,0000,0000,,the opposition could keep using Twitter during the attempted revolution Dialogue: 0,0:52:29.02,0:52:33.00,Default,,0000,0000,0000,,and Hilary Clinton has given a very popular speech about Dialogue: 0,0:52:33.00,0:52:36.09,Default,,0000,0000,0000,,how America would support the promotion of internet freedom Dialogue: 0,0:52:36.09,0:52:40.08,Default,,0000,0000,0000,,and I think things such as the New America Foundation are Dialogue: 0,0:52:40.08,0:52:46.04,Default,,0000,0000,0000,,funding and supporting projects such as the Commotion mesh networking project Dialogue: 0,0:52:46.04,0:52:49.02,Default,,0000,0000,0000,,that we've already heard about before. Dialogue: 0,0:52:49.02,0:52:52.06,Default,,0000,0000,0000,,So in other words there's a link between politics and technology sometimes, Dialogue: 0,0:52:52.06,0:52:57.09,Default,,0000,0000,0000,,and in the past I believe certain influential Americans such Dialogue: 0,0:52:57.09,0:53:03.10,Default,,0000,0000,0000,,Rupert Murdoch or George W. Bush have viewed modern communication technologies as a way to Dialogue: 0,0:53:03.10,0:53:09.00,Default,,0000,0000,0000,,promote U.S. foreign policy and to spread democracy and freedom in the world. Dialogue: 0,0:53:09.00,0:53:14.01,Default,,0000,0000,0000,,So my question is, what is your relationship with your government? Dialogue: 0,0:53:14.01,0:53:16.01,Default,,0000,0000,0000,,That's a really good question. Dialogue: 0,0:53:16.01,0:53:21.03,Default,,0000,0000,0000,,So one of the things that we sort of figured out from the beginning was that Dialogue: 0,0:53:21.03,0:53:25.08,Default,,0000,0000,0000,,if we had close relationships with the U.S. government, Dialogue: 0,0:53:25.08,0:53:29.08,Default,,0000,0000,0000,,people outside of the U.S. might have difficulty trusting us, Dialogue: 0,0:53:29.08,0:53:34.05,Default,,0000,0000,0000,,because nobody wants to tell all their secrets to the American government. Dialogue: 0,0:53:34.05,0:53:42.07,Default,,0000,0000,0000,,So we were thinking about what that really looks like in the context of a box that could be used globally. Dialogue: 0,0:53:42.07,0:53:48.06,Default,,0000,0000,0000,,We are working very hard to engineer a device that does not require you to trust us. Dialogue: 0,0:53:48.06,0:53:50.06,Default,,0000,0000,0000,,I'm not asking for your trust. Dialogue: 0,0:53:50.06,0:53:55.00,Default,,0000,0000,0000,,I'm not asking for your trust, I'm asking for your help. Dialogue: 0,0:53:55.00,0:53:59.01,Default,,0000,0000,0000,,All the code we write you'll be able to see it, you'll be able to Dialogue: 0,0:53:59.01,0:54:02.01,Default,,0000,0000,0000,,audit it, you'll be able to make your own decisions about what it does, Dialogue: 0,0:54:02.01,0:54:05.04,Default,,0000,0000,0000,,you'll be able to test it if it trustworthy or not, Dialogue: 0,0:54:05.04,0:54:10.09,Default,,0000,0000,0000,,and if you decide that it is not, you can tell everyone, Dialogue: 0,0:54:10.09,0:54:11.09,Default,,0000,0000,0000,,and they won't use it. Dialogue: 0,0:54:11.09,0:54:16.08,Default,,0000,0000,0000,,So from a trust perspective, it doesn't matter what our relationship is with anybody. Dialogue: 0,0:54:16.08,0:54:18.04,Default,,0000,0000,0000,,So that's the first thing. Dialogue: 0,0:54:18.04,0:54:23.08,Default,,0000,0000,0000,,The second thing is that right now we don't have much of a relationship with the U.S. government. Dialogue: 0,0:54:23.08,0:54:33.04,Default,,0000,0000,0000,,Jacob Applebaum is somewhat famous for his work with Julian Assange on Wikileaks, Dialogue: 0,0:54:33.04,0:54:36.06,Default,,0000,0000,0000,,and his work on Tor, and security in general, Dialogue: 0,0:54:36.06,0:54:39.07,Default,,0000,0000,0000,,his efforts to provide you with freedom and privacy. Dialogue: 0,0:54:39.07,0:54:45.08,Default,,0000,0000,0000,,He is a guy who was recently revealed in the Wall Street Journal that the U.S. government has been spying Dialogue: 0,0:54:45.08,0:54:51.05,Default,,0000,0000,0000,,on. And he is on our team, he's on our technical advisory committee. Dialogue: 0,0:54:51.05,0:54:56.00,Default,,0000,0000,0000,,He's one of the people we go to for help when we need to understand security on the box. Dialogue: 0,0:54:56.00,0:55:02.07,Default,,0000,0000,0000,,So right now our position with the American government is that we're not really related except in Dialogue: 0,0:55:02.07,0:55:05.07,Default,,0000,0000,0000,,so much that we are a bunch of people who really care about these issues, Dialogue: 0,0:55:05.07,0:55:12.08,Default,,0000,0000,0000,,which maybe occasionally makes us targets. Which gives us a reason to use a box like this. Dialogue: 0,0:55:12.08,0:55:21.03,Default,,0000,0000,0000,,Coupled with that, there is a program in America - you were talking about Hilary Clinton saying Dialogue: 0,0:55:21.03,0:55:26.00,Default,,0000,0000,0000,,she was going to encourage technologies that will spread democracy. Dialogue: 0,0:55:26.00,0:55:30.02,Default,,0000,0000,0000,,So the way America encourages things is by spending money on it. Dialogue: 0,0:55:30.02,0:55:34.07,Default,,0000,0000,0000,,That's our typical way to support programs. We fund different things. Dialogue: 0,0:55:34.07,0:55:40.07,Default,,0000,0000,0000,,We don't generally have feel-good campaigns, we just pay people to make good work, or try to. Dialogue: 0,0:55:40.07,0:55:46.09,Default,,0000,0000,0000,,So the U.S. state department has a program to provide funding for projects like the FreedomBox. Dialogue: 0,0:55:46.09,0:55:48.05,Default,,0000,0000,0000,,We have not applied for that funding. Dialogue: 0,0:55:48.05,0:55:50.02,Default,,0000,0000,0000,,I don't know if we will. Dialogue: 0,0:55:50.02,0:55:56.01,Default,,0000,0000,0000,,However I do know that they have given funding to some very good and genuine projects that are Dialogue: 0,0:55:56.01,0:56:00.03,Default,,0000,0000,0000,,run by people I trust, so I try not to be cynical about that. Dialogue: 0,0:56:00.03,0:56:06.05,Default,,0000,0000,0000,,I imagine at some point that through a direct grant or a sub-grant or something, Dialogue: 0,0:56:06.05,0:56:11.01,Default,,0000,0000,0000,,some state department money might support some aspect of work that is related to us. Dialogue: 0,0:56:11.01,0:56:15.00,Default,,0000,0000,0000,,I mean, we might take work from a project that is state department funded, Dialogue: 0,0:56:15.00,0:56:17.08,Default,,0000,0000,0000,,just because it's quick work. Dialogue: 0,0:56:17.08,0:56:20.08,Default,,0000,0000,0000,,Have I answered your question? Dialogue: 0,0:56:20.08,0:56:21.07,Default,,0000,0000,0000,,Yes, thanks. Dialogue: 0,0:56:32.02,0:56:37.06,Default,,0000,0000,0000,,Hi, well you always have tension if you talk about privacy Dialogue: 0,0:56:37.06,0:56:41.01,Default,,0000,0000,0000,,since 9/11 you know, I heard this in America very often, Dialogue: 0,0:56:41.01,0:56:44.02,Default,,0000,0000,0000,,"we have to be careful", every body is suspicious and stuff. Dialogue: 0,0:56:44.02,0:56:48.02,Default,,0000,0000,0000,,So how do you react when people like the government say well, Dialogue: 0,0:56:48.02,0:56:55.04,Default,,0000,0000,0000,,you are creating a way to support terrorism, whatever. Dialogue: 0,0:56:55.04,0:57:00.02,Default,,0000,0000,0000,,That's a good question, and it's a common question. Dialogue: 0,0:57:00.02,0:57:04.07,Default,,0000,0000,0000,,Frankly every time I do this talk, it's one of the first questions that come up. Dialogue: 0,0:57:04.07,0:57:06.09,Default,,0000,0000,0000,,The answer is really simple. Dialogue: 0,0:57:06.09,0:57:11.07,Default,,0000,0000,0000,,The fact is, this box doesn't create any new privacy technology. Dialogue: 0,0:57:11.07,0:57:15.01,Default,,0000,0000,0000,,It just makes it easier to use and easier to access. Dialogue: 0,0:57:15.01,0:57:21.04,Default,,0000,0000,0000,,People who are committed to terrorism or criminal activity, they have sufficient motivation that they Dialogue: 0,0:57:21.04,0:57:23.06,Default,,0000,0000,0000,,can use the technology that exists. Terrorists are already using PGP. Dialogue: 0,0:57:23.06,0:57:27.02,Default,,0000,0000,0000,,They're already using Tor. Dialogue: 0,0:57:27.02,0:57:30.02,Default,,0000,0000,0000,,They're already using stuff to hide their data. Dialogue: 0,0:57:30.02,0:57:33.03,Default,,0000,0000,0000,,At best we are helping stupid terrorists. Dialogue: 0,0:57:33.03,0:57:35.07,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,0:57:35.07,0:57:42.09,Default,,0000,0000,0000,,Granted, I'm not excited about that, but I don't that's a sufficient reason to deny common people Dialogue: 0,0:57:42.09,0:57:44.05,Default,,0000,0000,0000,,access to these technologies. Dialogue: 0,0:57:44.05,0:57:49.01,Default,,0000,0000,0000,,And more importantly than the fact that terrorists and criminals have access to this technology, Dialogue: 0,0:57:49.01,0:57:52.04,Default,,0000,0000,0000,,governments have access to this technology. Dialogue: 0,0:57:52.04,0:57:54.06,Default,,0000,0000,0000,,The largest corporations have access to this technology. Dialogue: 0,0:57:54.06,0:58:00.08,Default,,0000,0000,0000,,Every bank, the same encryption methods that we are using is the stuff that protects trillions of dollars Dialogue: 0,0:58:00.08,0:58:05.01,Default,,0000,0000,0000,,in value that banks trade every day. Dialogue: 0,0:58:05.01,0:58:12.06,Default,,0000,0000,0000,,This is technology that is currently being used by everyone except us. Dialogue: 0,0:58:12.06,0:58:15.01,Default,,0000,0000,0000,,All we're doing is levelling the playing field. Dialogue: 0,0:58:15.01,0:58:22.02,Default,,0000,0000,0000,,The same technology that hides data from us, that causes a complete lack of transparency in a downward Dialogue: 0,0:58:22.02,0:58:27.09,Default,,0000,0000,0000,,direction, we can have to level the playing field a little bit. Dialogue: 0,0:58:27.09,0:58:39.07,Default,,0000,0000,0000,,More questions? Dialogue: 0,0:58:39.07,0:58:43.09,Default,,0000,0000,0000,,Thank you for your presentation. Dialogue: 0,0:58:43.09,0:58:51.03,Default,,0000,0000,0000,,Could we add to challenges, maybe we could produce it in a non-communist dictatorship? Dialogue: 0,0:58:51.03,0:58:54.03,Default,,0000,0000,0000,,Because I saw the label "Made in China", so I think it is just Dialogue: 0,0:58:54.03,0:59:00.09,Default,,0000,0000,0000,,paradox to produce something like the FreedomBox in this country, and I would also like to be independent Dialogue: 0,0:59:00.09,0:59:07.02,Default,,0000,0000,0000,,from producing in China. So that's just something for a challenge I think. Dialogue: 0,0:59:07.02,0:59:10.06,Default,,0000,0000,0000,,That's a really good question and important point. Dialogue: 0,0:59:10.06,0:59:16.02,Default,,0000,0000,0000,,So, we're not a hardware project. Hardware is really really hard to do right and do well. Dialogue: 0,0:59:16.02,0:59:19.03,Default,,0000,0000,0000,,We have some hardware hackers on our project. Dialogue: 0,0:59:19.03,0:59:25.03,Default,,0000,0000,0000,,Our tech lead Bdale Garbee does amazing work with satellites and model rockets and altimeters, Dialogue: 0,0:59:25.03,0:59:28.08,Default,,0000,0000,0000,,and he's brilliant. But this is not a hardware project. Dialogue: 0,0:59:28.08,0:59:31.10,Default,,0000,0000,0000,,All we can do is use hardware that already exists. Dialogue: 0,0:59:31.10,0:59:37.06,Default,,0000,0000,0000,,When the world makes hardware in places other than China, we will use that hardware. Dialogue: 0,0:59:37.06,0:59:41.01,Default,,0000,0000,0000,,Right now, we don't have a lot of options. Dialogue: 0,0:59:41.01,0:59:46.06,Default,,0000,0000,0000,,And we're not going to deny everybody privacy because we don't have a lot of hardware options. Dialogue: 0,0:59:46.06,0:59:48.01,Default,,0000,0000,0000,,When we have those options we'll take them. Dialogue: 0,0:59:48.01,0:59:51.09,Default,,0000,0000,0000,,In the meantime, if you are a person who really cares about this issue, Dialogue: 0,0:59:51.09,0:59:55.06,Default,,0000,0000,0000,,don't buy a FreedomBox. Dialogue: 0,0:59:55.06,0:59:58.10,Default,,0000,0000,0000,,Take the software, go find a computer that isn't made in China, Dialogue: 0,0:59:58.10,1:00:02.02,Default,,0000,0000,0000,,{\i1}LAUGHTER{\i0} Dialogue: 0,1:00:02.02,1:00:05.00,Default,,0000,0000,0000,,and go put the software on that box. Dialogue: 0,1:00:05.00,1:00:11.07,Default,,0000,0000,0000,,If you want a solution that is run on computers that don't exist, I can't help you with that. Dialogue: 0,1:00:11.07,1:00:15.10,Default,,0000,0000,0000,,If you want a solution that runs, I might be able to help you with that. Dialogue: 0,1:00:15.10,1:00:20.03,Default,,0000,0000,0000,,But yes, I agree that that is a real issue, and we are thinking about that. Dialogue: 0,1:00:20.03,1:00:25.05,Default,,0000,0000,0000,,We believe that there is an open hardware project story here. Dialogue: 0,1:00:25.05,1:00:28.09,Default,,0000,0000,0000,,And one thing we've been doing is working with the manufacturer of the box, Dialogue: 0,1:00:28.09,1:00:32.09,Default,,0000,0000,0000,,to get the code free, to make sure we know what's in it, Dialogue: 0,1:00:32.09,1:00:35.03,Default,,0000,0000,0000,,so that there are no binary blobs in the box, Dialogue: 0,1:00:35.03,1:00:38.01,Default,,0000,0000,0000,,so we have some assurances that we actually do have freedom. Dialogue: 0,1:00:38.01,1:00:45.07,Default,,0000,0000,0000,,At some point though, we do believe that somebody will solve the open hardware problem for us. Dialogue: 0,1:00:45.07,1:00:50.05,Default,,0000,0000,0000,,We're not going to be the hardware project, but there are people trying to do this in an open way. Dialogue: 0,1:00:50.05,1:00:54.04,Default,,0000,0000,0000,,RaspberryPi for example. They're not quite right for our use-case, but those kinds of projects Dialogue: 0,1:00:54.04,1:00:58.06,Default,,0000,0000,0000,,are starting to exist, and they're starting to be really good. Dialogue: 0,1:00:58.06,1:01:01.04,Default,,0000,0000,0000,,In a few years, maybe that will be the thing we move onto. Dialogue: 0,1:01:01.04,1:01:09.09,Default,,0000,0000,0000,,Now, I'm guessing that even an open hardware project like RaspberryPi does their manufacturing in Dialogue: 0,1:01:09.09,1:01:14.09,Default,,0000,0000,0000,,a place like China. And that's a big problem. Dialogue: 0,1:01:14.09,1:01:19.05,Default,,0000,0000,0000,,When the world is ready with a solution to that, we will be ready to accept that solution and adopt it Dialogue: 0,1:01:19.05,1:01:22.06,Default,,0000,0000,0000,,of course. Dialogue: 0,1:01:22.06,1:01:30.05,Default,,0000,0000,0000,,Any more questions for James? or statements? Dialogue: 0,1:01:33.00,1:01:37.00,Default,,0000,0000,0000,,This is more of a statement than a question I guess, Dialogue: 0,1:01:37.00,1:01:42.10,Default,,0000,0000,0000,,but should the FreedomBox start being made in China there will be a lot more of them coming out of Dialogue: 0,1:01:42.10,1:01:46.02,Default,,0000,0000,0000,,the back door and enabling privacy for people that don't get Dialogue: 0,1:01:46.02,1:01:51.09,Default,,0000,0000,0000,,it, but also as soon as it starts getting manufactured I'd imagine you may, Dialogue: 0,1:01:51.09,1:01:54.09,Default,,0000,0000,0000,,because you're not in it for the money as you told me last night, Dialogue: 0,1:01:54.09,1:01:59.06,Default,,0000,0000,0000,,you may be looking forward to how easy it will be to copy, Dialogue: 0,1:01:59.06,1:02:05.10,Default,,0000,0000,0000,,and with things like MakerBot, making a case, making a bot is easy, Dialogue: 0,1:02:05.10,1:02:08.08,Default,,0000,0000,0000,,you can do it in your bedroom now with 3D printers. Dialogue: 0,1:02:08.08,1:02:15.10,Default,,0000,0000,0000,,So there will be a bag of components, a board, made by some online place that is really into this, Dialogue: 0,1:02:15.10,1:02:18.02,Default,,0000,0000,0000,,and you can assemble these at home. Dialogue: 0,1:02:18.02,1:02:22.10,Default,,0000,0000,0000,,So you've just got to get it out there first I think, and lead the way. Dialogue: 0,1:02:22.10,1:02:29.06,Default,,0000,0000,0000,,Yeah, I think that's quite right in that we are not the only place to get a box like this. Dialogue: 0,1:02:29.06,1:02:34.06,Default,,0000,0000,0000,,I mean, we're putting it on a specific box to make it easy, but there will be lots of places that make Dialogue: 0,1:02:34.06,1:02:40.06,Default,,0000,0000,0000,,boxes, and hopefully there will be places where working conditions are acceptable to everybody. Dialogue: 0,1:02:40.06,1:02:43.09,Default,,0000,0000,0000,,And at that point you can make your own boxes, Dialogue: 0,1:02:43.09,1:02:44.04,Default,,0000,0000,0000,,you can put them on any box you can find. Dialogue: 0,1:02:44.04,1:02:46.01,Default,,0000,0000,0000,,The point of Free Software is not to lock you into a service, Dialogue: 0,1:02:46.01,1:02:53.02,Default,,0000,0000,0000,,a technology, a software, a structure or a box. Dialogue: 0,1:02:53.02,1:02:53.07,Default,,0000,0000,0000,,We're not going to lock you into anything, that's one thing we're extremely clear about. Dialogue: 0,1:02:53.07,1:03:00.09,Default,,0000,0000,0000,,If you manage to make a box like this at home, I would really love to hear about it. Dialogue: 0,1:03:00.09,1:03:06.04,Default,,0000,0000,0000,,If you can spin up a MakerBot to make a case, Dialogue: 0,1:03:06.04,1:03:08.09,Default,,0000,0000,0000,,and you have a friend who can etch boards, Dialogue: 0,1:03:08.09,1:03:10.06,Default,,0000,0000,0000,,and you make a box like this at home, Dialogue: 0,1:03:10.06,1:03:14.01,Default,,0000,0000,0000,,that would be big news and a lot of people would want to know about it. Dialogue: 0,1:03:14.01,1:03:22.07,Default,,0000,0000,0000,,More statements or questions? Yes... Dialogue: 0,1:03:22.07,1:03:31.05,Default,,0000,0000,0000,,So, if you lose your box and get a new one, how is it going to reauthenticate to the boxes of your friends? Dialogue: 0,1:03:31.05,1:03:34.03,Default,,0000,0000,0000,,I think I didn't get that one. Dialogue: 0,1:03:34.03,1:03:39.04,Default,,0000,0000,0000,,Yeah, so, the good thing about friends is that they don't actually know you by your PGP key. Dialogue: 0,1:03:39.04,1:03:48.02,Default,,0000,0000,0000,,Sorry, I didn't specify it, if you want a grand security and you want distribution to more than 12 friends, Dialogue: 0,1:03:48.02,1:03:54.00,Default,,0000,0000,0000,,so let's say a hundred, and they're like, all over the world. Dialogue: 0,1:03:54.00,1:03:59.05,Default,,0000,0000,0000,,You are probably going to reach them through the internet to get your key parts back, Dialogue: 0,1:03:59.05,1:04:05.02,Default,,0000,0000,0000,,and you are probably not going to be able to use the FreedomBox to get a new one because Dialogue: 0,1:04:05.02,1:04:06.05,Default,,0000,0000,0000,,it has to be authenticated. Dialogue: 0,1:04:06.05,1:04:09.03,Default,,0000,0000,0000,,So how do you do? Dialogue: 0,1:04:09.03,1:04:10.10,Default,,0000,0000,0000,,Well, you at that point... Dialogue: 0,1:04:10.10,1:04:14.05,Default,,0000,0000,0000,,if you don't have a FreedomBox, the FreedomBox can't provide you with a solution to that problem. Dialogue: 0,1:04:14.05,1:04:16.08,Default,,0000,0000,0000,,What you're going to have to do, Dialogue: 0,1:04:16.08,1:04:19.00,Default,,0000,0000,0000,,is perhaps call your friends. Dialogue: 0,1:04:19.00,1:04:20.10,Default,,0000,0000,0000,,Have a conversation with them, Dialogue: 0,1:04:20.10,1:04:23.05,Default,,0000,0000,0000,,convince them that you are the person you say you are. Dialogue: 0,1:04:23.05,1:04:27.04,Default,,0000,0000,0000,,Reference your shared experiences, maybe they know your voice, Dialogue: 0,1:04:27.04,1:04:33.05,Default,,0000,0000,0000,,maybe they just know who you are by the way that you act and the way that you talk. Dialogue: 0,1:04:33.05,1:04:37.00,Default,,0000,0000,0000,,There's not going to be any one way that we get our keys back. Dialogue: 0,1:04:37.00,1:04:41.01,Default,,0000,0000,0000,,If you lose your key, yeah, we're not saying that's never going to be a problem. Dialogue: 0,1:04:41.01,1:04:43.09,Default,,0000,0000,0000,,And I wouldn't recommend splitting your key up among a hundred people, Dialogue: 0,1:04:43.09,1:04:48.05,Default,,0000,0000,0000,,because that's a lot of people to ask for your key back. Dialogue: 0,1:04:48.05,1:04:53.06,Default,,0000,0000,0000,,The mechanism I have in mind is not that you get a little bit of your key from Dialogue: 0,1:04:53.06,1:04:56.04,Default,,0000,0000,0000,,everyone you know, it's that you spread out the key among Dialogue: 0,1:04:56.04,1:05:00.00,Default,,0000,0000,0000,,a lot of people, and you need a certain number of those people. Dialogue: 0,1:05:00.00,1:05:02.07,Default,,0000,0000,0000,,So maybe it's five of seven of your friends. Dialogue: 0,1:05:02.07,1:05:06.07,Default,,0000,0000,0000,,So you give seven people the key, but any five of them could give you a whole key. Dialogue: 0,1:05:06.07,1:05:09.07,Default,,0000,0000,0000,,So in case you can't reach somebody you can still manage to do it. Dialogue: 0,1:05:09.07,1:05:12.09,Default,,0000,0000,0000,,And we can make that access control as fine-grained as we want, Dialogue: 0,1:05:12.09,1:05:15.09,Default,,0000,0000,0000,,but a hundred would be overwhelming. Dialogue: 0,1:05:15.09,1:05:20.05,Default,,0000,0000,0000,,We wouldn't do that. Sure, you could do it if you wanted, Dialogue: 0,1:05:20.05,1:05:23.05,Default,,0000,0000,0000,,but I don't think you'll have a hundred friends you could trust that much. Dialogue: 0,1:05:23.05,1:05:26.08,Default,,0000,0000,0000,,Maybe you do, I don't. Dialogue: 0,1:05:26.08,1:05:33.09,Default,,0000,0000,0000,,More questions, statements? Dialogue: 0,1:05:33.09,1:05:39.05,Default,,0000,0000,0000,,Yes? Dialogue: 0,1:05:39.05,1:05:47.02,Default,,0000,0000,0000,,Erm, it's just a wish... but have you thought about the idea of using the FreedomBox to create Dialogue: 0,1:05:47.02,1:05:51.09,Default,,0000,0000,0000,,a community where you can exchange not only data but like Dialogue: 0,1:05:51.09,1:05:58.08,Default,,0000,0000,0000,,products or services, so that would maybe like, change the system? Dialogue: 0,1:05:58.08,1:06:04.07,Default,,0000,0000,0000,,One of the things we want to do with the FreedomBox is Dialogue: 0,1:06:04.07,1:06:10.04,Default,,0000,0000,0000,,create a thing that looks a lot like your current social networking, Dialogue: 0,1:06:10.04,1:06:12.09,Default,,0000,0000,0000,,minus the advertising and the spying. Dialogue: 0,1:06:12.09,1:06:16.04,Default,,0000,0000,0000,,A way to talk to all your friends at once. Dialogue: 0,1:06:16.04,1:06:20.03,Default,,0000,0000,0000,,Once you have a place, a platform, where you can communicate Dialogue: 0,1:06:20.03,1:06:23.01,Default,,0000,0000,0000,,with your friends, you can build on that platform Dialogue: 0,1:06:23.01,1:06:25.00,Default,,0000,0000,0000,,and you can create structures like that. Dialogue: 0,1:06:25.00,1:06:29.01,Default,,0000,0000,0000,,If we make a thing that has programmable interfaces, so Dialogue: 0,1:06:29.01,1:06:32.07,Default,,0000,0000,0000,,you can make apps for it, you can make an app like that, Dialogue: 0,1:06:32.07,1:06:34.04,Default,,0000,0000,0000,,if that's important to you. Dialogue: 0,1:06:34.04,1:06:38.02,Default,,0000,0000,0000,,What people do with the communication once they have it, Dialogue: 0,1:06:38.02,1:06:40.04,Default,,0000,0000,0000,,we don't have any opinions about. Dialogue: 0,1:06:40.04,1:06:43.02,Default,,0000,0000,0000,,We want them to do everything that's important to them. Dialogue: 0,1:06:43.02,1:06:45.09,Default,,0000,0000,0000,,And I think something like that could be important, Dialogue: 0,1:06:45.09,1:07:03.04,Default,,0000,0000,0000,,and yeah, that would be amazing if that were to emerge. Dialogue: 0,1:07:03.04,1:07:08.03,Default,,0000,0000,0000,,Some things I believe are easier to do in a centralized architecture than a decentralized one, Dialogue: 0,1:07:08.03,1:07:12.08,Default,,0000,0000,0000,,for example search, or services that require a lot of bandwidth. Dialogue: 0,1:07:12.08,1:07:16.01,Default,,0000,0000,0000,,I don't see how you can run something like YouTube on the FreedomBox. Dialogue: 0,1:07:16.01,1:07:18.05,Default,,0000,0000,0000,,So is your utopian vision one where everything is decentralized, Dialogue: 0,1:07:18.05,1:07:23.09,Default,,0000,0000,0000,,or is it ok to have some centralized pieces in a future network? Dialogue: 0,1:07:23.09,1:07:28.08,Default,,0000,0000,0000,,Look, if you're going to grant me my utopia then of course everything is decentralized. Dialogue: 0,1:07:28.08,1:07:31.08,Default,,0000,0000,0000,,But we don't live in a utopia, I don't have magic. Dialogue: 0,1:07:31.08,1:07:38.05,Default,,0000,0000,0000,,We actually have in our flowchart a box labeled "magic routing", Dialogue: 0,1:07:38.05,1:07:41.02,Default,,0000,0000,0000,,because routing is hard to do in a decentralized way... Dialogue: 0,1:07:41.02,1:07:44.00,Default,,0000,0000,0000,,You need someone to tell you where the IPs are. Dialogue: 0,1:07:44.00,1:07:47.03,Default,,0000,0000,0000,,And that's hard to do in a decentralized way. Dialogue: 0,1:07:47.03,1:07:52.01,Default,,0000,0000,0000,,We haven't solved it, and we don't think we're going to fully solve it. Dialogue: 0,1:07:52.01,1:07:54.07,Default,,0000,0000,0000,,We hope someone else solves it first of all. Dialogue: 0,1:07:54.07,1:07:56.08,Default,,0000,0000,0000,,But second of all, we don't know where the compromises are. Dialogue: 0,1:07:56.08,1:07:59.02,Default,,0000,0000,0000,,Some things are not possible to decentralize. Dialogue: 0,1:07:59.02,1:08:01.08,Default,,0000,0000,0000,,We're going to decentralize as much as we can, Dialogue: 0,1:08:01.08,1:08:04.02,Default,,0000,0000,0000,,but we're not committing to doing anything impossible. Dialogue: 0,1:08:04.02,1:08:06.02,Default,,0000,0000,0000,,If you can't run YouTube off this box, Dialogue: 0,1:08:06.02,1:08:08.04,Default,,0000,0000,0000,,which I disagree with by the way, Dialogue: 0,1:08:08.04,1:08:10.00,Default,,0000,0000,0000,,then you won't, because it's impossible. Dialogue: 0,1:08:10.00,1:08:12.03,Default,,0000,0000,0000,,If you want to run YouTube on this box you turn all your Dialogue: 0,1:08:12.03,1:08:14.05,Default,,0000,0000,0000,,friends into your content delivery network, Dialogue: 0,1:08:14.05,1:08:16.07,Default,,0000,0000,0000,,and all your friends parallelize the distribution of the box, Dialogue: 0,1:08:16.07,1:08:18.04,Default,,0000,0000,0000,,you share the bandwidth. Dialogue: 0,1:08:18.04,1:08:20.06,Default,,0000,0000,0000,,It's ad-hoc, BitTorrent-like functionality. Dialogue: 0,1:08:20.06,1:08:24.02,Default,,0000,0000,0000,,Yes, that technology doesn't exist yet, I just made all that up, Dialogue: 0,1:08:24.02,1:08:27.02,Default,,0000,0000,0000,,but we can do it. Dialogue: 0,1:08:27.02,1:08:32.06,Default,,0000,0000,0000,,The parts that are hard though, the things like the routing, Dialogue: 0,1:08:32.06,1:08:35.01,Default,,0000,0000,0000,,there will be real compromises. Dialogue: 0,1:08:35.01,1:08:36.04,Default,,0000,0000,0000,,There will be real trade-offs. Dialogue: 0,1:08:36.04,1:08:39.10,Default,,0000,0000,0000,,There will be places where we'll say, you know what, we have Dialogue: 0,1:08:39.10,1:08:41.06,Default,,0000,0000,0000,,to rely on the DNS system. Dialogue: 0,1:08:41.06,1:08:44.10,Default,,0000,0000,0000,,Everybody in this room knows that the DNS system has some Dialogue: 0,1:08:44.10,1:08:48.01,Default,,0000,0000,0000,,security problems, some architectural problems that make it Dialogue: 0,1:08:48.01,1:08:51.07,Default,,0000,0000,0000,,a thing we would ideally not have to rely on. Dialogue: 0,1:08:51.07,1:08:55.09,Default,,0000,0000,0000,,But you know what? This project is not going to be able to replace DNS. Dialogue: 0,1:08:55.09,1:08:59.03,Default,,0000,0000,0000,,There are plenty of alternate DNS proposals out there, but we are not going to Dialogue: 0,1:08:59.03,1:09:02.06,Default,,0000,0000,0000,,just chuck the old DNS system, because we want people Dialogue: 0,1:09:02.06,1:09:05.06,Default,,0000,0000,0000,,to be able to get to the box, even if they don't have a box. Dialogue: 0,1:09:05.06,1:09:09.03,Default,,0000,0000,0000,,We want you to be able to serve services to the public. Dialogue: 0,1:09:09.03,1:09:13.09,Default,,0000,0000,0000,,We are going to use a lot of structures that are less than ideal. Dialogue: 0,1:09:13.09,1:09:16.03,Default,,0000,0000,0000,,We're assuming that TCP/IP is there... Dialogue: 0,1:09:16.03,1:09:19.04,Default,,0000,0000,0000,,in the normal use case you're using the internet backbone Dialogue: 0,1:09:19.04,1:09:22.07,Default,,0000,0000,0000,,to do your communication. Dialogue: 0,1:09:22.07,1:09:25.06,Default,,0000,0000,0000,,The mesh routing story we talked about is not how you do Dialogue: 0,1:09:25.06,1:09:30.05,Default,,0000,0000,0000,,your normal use. That's an emergency mode if there's a crisis, a political instability, a tsunami, Dialogue: 0,1:09:30.05,1:09:35.01,Default,,0000,0000,0000,,if you can't get to your regular internet because it has failed you in some way because Dialogue: 0,1:09:35.01,1:09:38.02,Default,,0000,0000,0000,,it has become oppressive or inaccessible. Dialogue: 0,1:09:38.02,1:09:40.06,Default,,0000,0000,0000,,Then you would use something like the mesh network. Dialogue: 0,1:09:40.06,1:09:44.00,Default,,0000,0000,0000,,But in the normal course of business, you are using Dialogue: 0,1:09:44.00,1:09:47.03,Default,,0000,0000,0000,,a thing that is less than ideal, and that's a trade-off. Dialogue: 0,1:09:47.03,1:09:49.05,Default,,0000,0000,0000,,We can't as a project protect you from everything. Dialogue: 0,1:09:49.05,1:09:51.03,Default,,0000,0000,0000,,We are going to look for the places where we can make Dialogue: 0,1:09:51.03,1:09:54.05,Default,,0000,0000,0000,,effective protection. We are going to try and make it clear Dialogue: 0,1:09:54.05,1:09:57.08,Default,,0000,0000,0000,,the limits of that protection. And we're going to give you Dialogue: 0,1:09:57.08,1:09:59.01,Default,,0000,0000,0000,,everything we can. Dialogue: 0,1:09:59.01,1:10:05.04,Default,,0000,0000,0000,,And then, as we move forward, when opportunities to solve new problems present themselves, Dialogue: 0,1:10:05.04,1:10:08.05,Default,,0000,0000,0000,,we'll take them. Dialogue: 0,1:10:08.05,1:10:16.03,Default,,0000,0000,0000,,Well I have to add before when we had the talk, unfortunately German you couldn't Dialogue: 0,1:10:16.03,1:10:19.03,Default,,0000,0000,0000,,understand a lot. Dialogue: 0,1:10:19.03,1:10:22.06,Default,,0000,0000,0000,,I didn't understand it but I could tell that it was occurring at a very high level of technical competence Dialogue: 0,1:10:22.06,1:10:25.07,Default,,0000,0000,0000,,and that there was a lot of good information there. Dialogue: 0,1:10:25.07,1:10:28.07,Default,,0000,0000,0000,,And I'm really hoping that you'll take the video of it and put it up on universalsubtitles.org, or some Dialogue: 0,1:10:28.07,1:10:33.02,Default,,0000,0000,0000,,other service where people can subtitle it. And hopefully there'll be an English version and I'll get Dialogue: 0,1:10:33.02,1:10:35.09,Default,,0000,0000,0000,,to see it. I think there was a lot of really good information in there. Dialogue: 0,1:10:35.09,1:10:38.03,Default,,0000,0000,0000,,What's universalsubtitles.org? Dialogue: 0,1:10:38.03,1:10:46.03,Default,,0000,0000,0000,,Universalsubtitles.org is a great website. It's kind of like, you put a video up, and anyone can Dialogue: 0,1:10:46.03,1:10:49.00,Default,,0000,0000,0000,,add subtitles to as much or as little as they want. Dialogue: 0,1:10:49.00,1:10:53.08,Default,,0000,0000,0000,,And then other people can change the subtitles, and you can do it in as many languages as you want. Dialogue: 0,1:10:53.08,1:10:59.02,Default,,0000,0000,0000,,So you don't have to ask someone for a favour, "hey, will you subtitle my video?" Dialogue: 0,1:10:59.02,1:11:03.01,Default,,0000,0000,0000,,that's 20 minutes long or an hour long. You tell a community of people "we need help subtitling", Dialogue: 0,1:11:03.01,1:11:08.05,Default,,0000,0000,0000,,and everyone goes and subtitles 3 minutes in their favourite languages. Dialogue: 0,1:11:08.05,1:11:15.04,Default,,0000,0000,0000,,It's a very effective way to crowdsouce subtitling, and it's a very effective way to just share information. Dialogue: 0,1:11:15.04,1:11:20.09,Default,,0000,0000,0000,,We have a lot of videos with good information that are locked into languages that not everyone speaks. Dialogue: 0,1:11:20.09,1:11:22.07,Default,,0000,0000,0000,,So this is a way to get around that. Dialogue: 0,1:11:22.07,1:11:25.04,Default,,0000,0000,0000,,As FreedomBox, we use that project. Dialogue: 0,1:11:25.04,1:11:28.01,Default,,0000,0000,0000,,And I believe, if I'm not mistaken, I haven't looked in a while, Dialogue: 0,1:11:28.01,1:11:33.00,Default,,0000,0000,0000,,that it's all Free software that they are using. So you can download it and start your own if you want. Dialogue: 0,1:11:33.00,1:11:41.08,Default,,0000,0000,0000,,So back to my previous question - in the talk in the afternoon we heard about mesh networking Dialogue: 0,1:11:41.08,1:11:44.09,Default,,0000,0000,0000,,we talked about that, and it's actually not just being used in Dialogue: 0,1:11:44.09,1:11:46.08,Default,,0000,0000,0000,,emergency situations but people are really using it. Dialogue: 0,1:11:46.08,1:11:52.08,Default,,0000,0000,0000,,And especially, the philosophy that everyone becomes part of the net as not just a consumer Dialogue: 0,1:11:52.08,1:11:58.06,Default,,0000,0000,0000,,but providing part of the net, it certainly is like that that they Dialogue: 0,1:11:58.06,1:12:01.02,Default,,0000,0000,0000,,can share data among each other, they don't necessarily need Dialogue: 0,1:12:01.02,1:12:03.04,Default,,0000,0000,0000,,to go into the internet. Dialogue: 0,1:12:03.04,1:12:07.02,Default,,0000,0000,0000,,So, I would imagine the FreedomBox, with mesh networking, Dialogue: 0,1:12:07.02,1:12:10.06,Default,,0000,0000,0000,,we could essentially create a large network of many many Dialogue: 0,1:12:10.06,1:12:12.04,Default,,0000,0000,0000,,people using it. Dialogue: 0,1:12:12.04,1:12:17.05,Default,,0000,0000,0000,,We also talked about the mesh networking like FunkFeuer in Graz or Vienna Dialogue: 0,1:12:17.05,1:12:21.02,Default,,0000,0000,0000,,but it would be interesting to get them on mobile devices, Dialogue: 0,1:12:21.02,1:12:23.03,Default,,0000,0000,0000,,so that you could walk through the street, Dialogue: 0,1:12:23.03,1:12:30.04,Default,,0000,0000,0000,,theoretically people have these devices, and you could walk Dialogue: 0,1:12:30.04,1:12:32.00,Default,,0000,0000,0000,,through and it would automatically mesh and connect you. Dialogue: 0,1:12:32.00,1:12:37.08,Default,,0000,0000,0000,,So FreedomBox if applied to that, you told me this interesting example, you could screw them to Dialogue: 0,1:12:37.08,1:12:41.06,Default,,0000,0000,0000,,light posts on the street, so maybe elaborate on that, Dialogue: 0,1:12:41.06,1:12:44.05,Default,,0000,0000,0000,,maybe it could have an effect and give a lot of coverage. Dialogue: 0,1:12:44.05,1:12:48.10,Default,,0000,0000,0000,,The reason why we currently envision mesh, Dialogue: 0,1:12:48.10,1:12:50.06,Default,,0000,0000,0000,,and no decisions have been made, right, Dialogue: 0,1:12:50.06,1:12:54.02,Default,,0000,0000,0000,,but just in the way we think about it when we talk to each other, Dialogue: 0,1:12:54.02,1:12:58.02,Default,,0000,0000,0000,,and the reason why we think mesh networking is not your daily Dialogue: 0,1:12:58.02,1:13:03.03,Default,,0000,0000,0000,,mode of use is that the performance degradation is not acceptable to most end-users. Dialogue: 0,1:13:03.03,1:13:06.03,Default,,0000,0000,0000,,If mesh networking reaches the point where it is acceptable Dialogue: 0,1:13:06.03,1:13:09.07,Default,,0000,0000,0000,,if you're in a place where there's enough nodes, and you Dialogue: 0,1:13:09.07,1:13:13.00,Default,,0000,0000,0000,,have a density that you can move around then sure, that Dialogue: 0,1:13:13.00,1:13:15.08,Default,,0000,0000,0000,,can make a lot of sense. But for a lot of people who Dialogue: 0,1:13:15.08,1:13:19.02,Default,,0000,0000,0000,,exist as a person not near a lot of FreedomBoxes, they're Dialogue: 0,1:13:19.02,1:13:21.07,Default,,0000,0000,0000,,going to need the regular internet. Dialogue: 0,1:13:21.07,1:13:26.01,Default,,0000,0000,0000,,So yeah, we think mesh will be great where you have that Dialogue: 0,1:13:26.01,1:13:29.01,Default,,0000,0000,0000,,density, when the mesh technology is mature. Dialogue: 0,1:13:29.01,1:13:33.08,Default,,0000,0000,0000,,When that happens, we could have the most easy access Dialogue: 0,1:13:33.08,1:13:38.04,Default,,0000,0000,0000,,to municipal wifi by using the power in all the street Dialogue: 0,1:13:38.04,1:13:43.04,Default,,0000,0000,0000,,lights. Put a FreedomBox up in the top of every street lamp. Dialogue: 0,1:13:43.04,1:13:47.08,Default,,0000,0000,0000,,Unscrew the light bulb, screw in the FreedomBox, and screw the light bulb back on top. Dialogue: 0,1:13:47.08,1:13:51.01,Default,,0000,0000,0000,,So you still get light, we're not going to plunge you into darkness. Dialogue: 0,1:13:51.01,1:13:56.04,Default,,0000,0000,0000,,You still get light, but then you have a mesh node. Right there. Dialogue: 0,1:13:56.04,1:14:00.07,Default,,0000,0000,0000,,And you could do every 3rd or 4th street light down town, and you could cover Dialogue: 0,1:14:00.07,1:14:02.08,Default,,0000,0000,0000,,an area rather effectively. Dialogue: 0,1:14:02.08,1:14:07.01,Default,,0000,0000,0000,,It is a way to get simple municipal wifi without running Dialogue: 0,1:14:07.01,1:14:10.02,Default,,0000,0000,0000,,any fibre. And every time you have fibre you can link to it. Dialogue: 0,1:14:10.02,1:14:13.08,Default,,0000,0000,0000,,Like any time you're near fibre you can link to it and you'll Dialogue: 0,1:14:13.08,1:14:18.08,Default,,0000,0000,0000,,get your information out of that little mesh and into the regular network. Dialogue: 0,1:14:18.08,1:14:23.09,Default,,0000,0000,0000,,We could have municipal wifi with much lower infrastructure costs than most people currently think of Dialogue: 0,1:14:23.09,1:14:28.09,Default,,0000,0000,0000,,when they think of municipal wifi. And we can do it through mesh nodes. Dialogue: 0,1:14:28.09,1:14:33.10,Default,,0000,0000,0000,,And if we did it through mesh nodes we would be providing that service not only to people who have Dialogue: 0,1:14:33.10,1:14:38.06,Default,,0000,0000,0000,,FreedomBoxes, that just looks like wifi, it just looks like a regular connection. Dialogue: 0,1:14:38.06,1:14:45.06,Default,,0000,0000,0000,,You might need to do some fancy hopping, but it's not... Dialogue: 0,1:14:45.06,1:14:51.01,Default,,0000,0000,0000,,the mesh boxes themselves will do the fancy hopping, your phone itself won't have to do it. Dialogue: 0,1:14:51.01,1:14:54.01,Default,,0000,0000,0000,,While we are talking about phones, Dialogue: 0,1:14:54.01,1:14:59.00,Default,,0000,0000,0000,,I want to say that I'm not sure how phones fit into the FreedomBox. Dialogue: 0,1:14:59.00,1:15:02.04,Default,,0000,0000,0000,,I'm pretty sure there is a way that phones fit into FreedomBoxes, Dialogue: 0,1:15:02.04,1:15:05.08,Default,,0000,0000,0000,,but you can't trust your phone. Dialogue: 0,1:15:05.08,1:15:09.04,Default,,0000,0000,0000,,With the so-called smartphones it's not a phone actually but a little computer, no? Dialogue: 0,1:15:09.04,1:15:12.04,Default,,0000,0000,0000,,Yes, your phone, a smartphone is a little computer but Dialogue: 0,1:15:12.04,1:15:16.05,Default,,0000,0000,0000,,it's not a computer that you can trust, because Dialogue: 0,1:15:16.05,1:15:20.06,Default,,0000,0000,0000,,even if you replace the software on your phone, Dialogue: 0,1:15:20.06,1:15:26.09,Default,,0000,0000,0000,,with Free software, it's almost impossible to actually replace all the binary drivers, Dialogue: 0,1:15:26.09,1:15:29.07,Default,,0000,0000,0000,,it's almost impossible to go all the way down to the metal. Dialogue: 0,1:15:29.07,1:15:31.08,Default,,0000,0000,0000,,It's very hard to get a phone that is completely trustworthy Dialogue: 0,1:15:31.08,1:15:35.01,Default,,0000,0000,0000,,all the way down to the bottom of the stack. Dialogue: 0,1:15:35.01,1:15:37.02,Default,,0000,0000,0000,,So that's a problem we haven't quite figured out how to solve. Dialogue: 0,1:15:37.02,1:15:42.04,Default,,0000,0000,0000,,And pretty soon it's going to be impossible to put Free software on phones. Dialogue: 0,1:15:42.04,1:15:47.07,Default,,0000,0000,0000,,The days of jailbreaking your iPhone and rooting your Android phone might Dialogue: 0,1:15:47.07,1:15:55.00,Default,,0000,0000,0000,,very well come to an end. There is a proposal right now called UEFI. Dialogue: 0,1:15:55.00,1:16:01.00,Default,,0000,0000,0000,,It's a standard. We currently use EFI, this would be UEFI. Dialogue: 0,1:16:01.00,1:16:03.05,Default,,0000,0000,0000,,I don't know what it stands for, it's a new thing. Dialogue: 0,1:16:03.05,1:16:08.02,Default,,0000,0000,0000,,And what this proposal is, is that before your computer, Dialogue: 0,1:16:08.02,1:16:14.03,Default,,0000,0000,0000,,before the BIOS will load a bootloader on your computer Dialogue: 0,1:16:14.03,1:16:17.08,Default,,0000,0000,0000,,that BIOS has to authenticate, sorry, that bootloader has Dialogue: 0,1:16:17.08,1:16:20.01,Default,,0000,0000,0000,,to authenticate to the BIOS. It has to be signed by someone Dialogue: 0,1:16:20.01,1:16:23.01,Default,,0000,0000,0000,,the BIOS trusts, someone the BIOS manufacturer trusts. Dialogue: 0,1:16:23.01,1:16:25.08,Default,,0000,0000,0000,,And the person who puts the BIOS in your phone can decide who it trusts, Dialogue: 0,1:16:25.08,1:16:29.05,Default,,0000,0000,0000,,and they can decide they don't trust anyone except themselves. Dialogue: 0,1:16:29.05,1:16:36.06,Default,,0000,0000,0000,,If Apple sells you an iPhone with a BIOS that requires a Dialogue: 0,1:16:36.06,1:16:39.07,Default,,0000,0000,0000,,signed operating system, it might be very hard for you to Dialogue: 0,1:16:39.07,1:16:43.02,Default,,0000,0000,0000,,get another version of the operating system on there. Dialogue: 0,1:16:43.02,1:16:49.10,Default,,0000,0000,0000,,The proposals for this stuff are really in the realm of laptops and computers, that's where it's starting, Dialogue: 0,1:16:49.10,1:16:53.02,Default,,0000,0000,0000,,but believe me, technology spreads. Dialogue: 0,1:16:53.02,1:16:58.10,Default,,0000,0000,0000,,And if you want to be able to put Linux on a computer that you buy, on a laptop you buy, Dialogue: 0,1:16:58.10,1:17:03.05,Default,,0000,0000,0000,,very soon you might have a very difficult time doing that. Dialogue: 0,1:17:03.05,1:17:05.02,Default,,0000,0000,0000,,The standard is there, the companies paying attention to it Dialogue: 0,1:17:05.02,1:17:08.04,Default,,0000,0000,0000,,are not paying attention to it for our purposes. Dialogue: 0,1:17:08.04,1:17:12.06,Default,,0000,0000,0000,,They want to make sure that they can control what is on your computer. Dialogue: 0,1:17:12.06,1:17:17.06,Default,,0000,0000,0000,,So this is, you know, another political fight that we're going to engage in, Dialogue: 0,1:17:17.06,1:17:20.01,Default,,0000,0000,0000,,not the FreedomBox, but the community. Dialogue: 0,1:17:20.01,1:17:25.05,Default,,0000,0000,0000,,We're going to have to have this fight. UEFI. Look it up. Dialogue: 0,1:17:25.05,1:17:32.05,Default,,0000,0000,0000,,Start thinking about it. This is going to be a big piece of the puzzle for freedom in computing over Dialogue: 0,1:17:32.05,1:17:34.02,Default,,0000,0000,0000,,the next few years. Dialogue: 0,1:17:34.02,1:17:38.09,Default,,0000,0000,0000,,We're going to have some problems and we're going to have to find some solutions. Dialogue: 0,1:17:38.09,1:17:44.08,Default,,0000,0000,0000,,But wouldn't such an initiative, wouldn't that create a good market for companies who actually Dialogue: 0,1:17:44.08,1:17:49.06,Default,,0000,0000,0000,,would supply Linux on such devices, on the phone and on the laptop market. Dialogue: 0,1:17:49.06,1:17:53.02,Default,,0000,0000,0000,,I'm sure there are companies supplying that. Dialogue: 0,1:17:53.02,1:17:54.07,Default,,0000,0000,0000,,Absolutely. Dialogue: 0,1:17:54.07,1:17:58.02,Default,,0000,0000,0000,,And if the market in freedom were good enough to support Dialogue: 0,1:17:58.02,1:18:02.07,Default,,0000,0000,0000,,large-scale manufacturing and all that other stuff then we might get that. Dialogue: 0,1:18:02.07,1:18:05.03,Default,,0000,0000,0000,,And we might get that anyway. Dialogue: 0,1:18:05.03,1:18:07.01,Default,,0000,0000,0000,,I mean, the standard will include as many keys as you want, Dialogue: 0,1:18:07.01,1:18:08.06,Default,,0000,0000,0000,,so we might get the freedom. Dialogue: 0,1:18:08.06,1:18:12.06,Default,,0000,0000,0000,,But the manufacturers will have a really convenient way to turn the freedom off. Dialogue: 0,1:18:12.06,1:18:16.07,Default,,0000,0000,0000,,I think there will be a lot of boxes where you will have freedom. Dialogue: 0,1:18:16.07,1:18:21.06,Default,,0000,0000,0000,,But there will also be a lot where right now we think we can get Free software onto it, Dialogue: 0,1:18:21.06,1:18:24.00,Default,,0000,0000,0000,,where we won't be able to anymore. Dialogue: 0,1:18:24.00,1:18:25.10,Default,,0000,0000,0000,,It's going to be a narrowing of the market. Dialogue: 0,1:18:25.10,1:18:28.09,Default,,0000,0000,0000,,I don't think our freedom is going to completely disappear from devices. Dialogue: 0,1:18:28.09,1:18:33.01,Default,,0000,0000,0000,,But a lot of devices, if you buy the device without thinking about freedom, assuming you can have it, Dialogue: 0,1:18:33.01,1:18:37.06,Default,,0000,0000,0000,,you might get it home and discover that you can't. Dialogue: 0,1:18:37.06,1:18:45.03,Default,,0000,0000,0000,,Ok, we want to give the floor again to the audience for more questions or statements. Dialogue: 0,1:18:45.03,1:18:52.01,Default,,0000,0000,0000,,Ok, there in the back, one more. Dialogue: 0,1:18:52.01,1:18:54.08,Default,,0000,0000,0000,,Yeah, one more time, so... Dialogue: 0,1:18:54.08,1:19:01.05,Default,,0000,0000,0000,,Nowadays, where you can hardly really save your PC, laptop, whatever, against malware... Dialogue: 0,1:19:01.05,1:19:16.03,Default,,0000,0000,0000,,Isn't it really, a red carpet for hackers to, if you have social networks and circles of friends, Dialogue: 0,1:19:16.03,1:19:21.09,Default,,0000,0000,0000,,one gets some malware on his PC, mobile device, whatever, Dialogue: 0,1:19:21.09,1:19:26.07,Default,,0000,0000,0000,,has a FreedomBox, authenticates to his friends, the state is secure Dialogue: 0,1:19:26.07,1:19:32.05,Default,,0000,0000,0000,,wouldn't that open doors? Dialogue: 0,1:19:32.05,1:19:37.02,Default,,0000,0000,0000,,Sure, well, the human error is not one we can control for. Dialogue: 0,1:19:37.02,1:19:45.01,Default,,0000,0000,0000,,But someone who has a key that you trust is not necessarily someone who you let run arbitrary code Dialogue: 0,1:19:45.01,1:19:48.01,Default,,0000,0000,0000,,on your FreedomBox. Dialogue: 0,1:19:48.01,1:19:52.07,Default,,0000,0000,0000,,You might trust them to the point of having message passing with them, and trusting who they are Dialogue: 0,1:19:52.07,1:19:56.02,Default,,0000,0000,0000,,and what they say, but you don't necessarily trust the technology that they have and the Dialogue: 0,1:19:56.02,1:19:58.10,Default,,0000,0000,0000,,code that they have to be free of malware. Dialogue: 0,1:19:58.10,1:20:00.09,Default,,0000,0000,0000,,You'll still have to do all the things you currently do. Dialogue: 0,1:20:00.09,1:20:04.01,Default,,0000,0000,0000,,Right now if somebody sends you a file, it could have malware in it. Dialogue: 0,1:20:04.01,1:20:08.00,Default,,0000,0000,0000,,We're not making that easier, or better, or more likely to happen. Dialogue: 0,1:20:08.00,1:20:15.00,Default,,0000,0000,0000,,I think what we are doing is completely orthogonal to that problem. Dialogue: 0,1:20:15.00,1:20:19.04,Default,,0000,0000,0000,,At the same time, if we were to have email services on the box, Dialogue: 0,1:20:19.04,1:20:23.02,Default,,0000,0000,0000,,and you know we're not quite sure what the email story of a box like this looks like, Dialogue: 0,1:20:23.02,1:20:26.07,Default,,0000,0000,0000,,we probably would want to include some sort of virus scanning or spam catching, Dialogue: 0,1:20:26.07,1:20:31.07,Default,,0000,0000,0000,,all the usual filtering tools to give you whatever measure of protection might currently exist. Dialogue: 0,1:20:31.07,1:20:35.00,Default,,0000,0000,0000,,But the fact someone has a key and you know who they are Dialogue: 0,1:20:35.00,1:20:39.01,Default,,0000,0000,0000,,I don't think that will ever be the security hole. Dialogue: 0,1:20:39.01,1:20:42.02,Default,,0000,0000,0000,,Or at least we really hope we can make it so it's not. Dialogue: 0,1:20:42.02,1:20:48.09,Default,,0000,0000,0000,,If we fail in that then we've missed a trick. Dialogue: 0,1:20:48.09,1:20:53.07,Default,,0000,0000,0000,,Ok, any more statements or questions? Dialogue: 0,1:20:53.07,1:20:56.10,Default,,0000,0000,0000,,Ok, so, James, my last question would be... Dialogue: 0,1:20:56.10,1:20:59.02,Default,,0000,0000,0000,,You can actually buy the box right now? Dialogue: 0,1:20:59.02,1:21:00.04,Default,,0000,0000,0000,,Yes. Dialogue: 0,1:21:00.04,1:21:01.06,Default,,0000,0000,0000,,From a company? Dialogue: 0,1:21:01.06,1:21:02.10,Default,,0000,0000,0000,,Yes. Dialogue: 0,1:21:02.10,1:21:05.09,Default,,0000,0000,0000,,Maybe you can supply that information. But the software is being developed? Dialogue: 0,1:21:05.09,1:21:07.03,Default,,0000,0000,0000,,Yes. Dialogue: 0,1:21:07.03,1:21:11.09,Default,,0000,0000,0000,,Can you give an estimation about the timeline of your project, or the next milestones? Dialogue: 0,1:21:11.09,1:21:13.01,Default,,0000,0000,0000,,Sure. Dialogue: 0,1:21:13.01,1:21:16.10,Default,,0000,0000,0000,,So, the boxes are manufactures by a company called Globalscale, Dialogue: 0,1:21:16.10,1:21:18.06,Default,,0000,0000,0000,,they're about $140 US dollars. Dialogue: 0,1:21:18.06,1:21:24.02,Default,,0000,0000,0000,,There is a slightly older model called the SheevaPlug that is about $90. Dialogue: 0,1:21:24.02,1:21:28.01,Default,,0000,0000,0000,,It does just pretty much everything the Dreamplug does. Dialogue: 0,1:21:28.01,1:21:31.08,Default,,0000,0000,0000,,It has some heat sinking issues, but it's a pretty good box as well, Dialogue: 0,1:21:31.08,1:21:38.10,Default,,0000,0000,0000,,so if the price point matters to you you can get last year's model and it'll serve you just fine. Dialogue: 0,1:21:38.10,1:21:43.00,Default,,0000,0000,0000,,The software, right now we have a bare Linux distribution. Dialogue: 0,1:21:43.00,1:21:45.08,Default,,0000,0000,0000,,We spent a lot of time getting the binary blobs out of the kernel Dialogue: 0,1:21:45.08,1:21:50.03,Default,,0000,0000,0000,,and making it installable onto this hardware target. Dialogue: 0,1:21:50.03,1:21:54.08,Default,,0000,0000,0000,,We have a Jabber server, Prosody, that we are modifying to suit our needs. Dialogue: 0,1:21:54.08,1:22:00.08,Default,,0000,0000,0000,,And that should be ready, time-frame, weeks. Dialogue: 0,1:22:00.08,1:22:03.07,Default,,0000,0000,0000,,Some short number of weeks. Dialogue: 0,1:22:03.07,1:22:09.06,Default,,0000,0000,0000,,The Privoxy server, the SSH forwarding, some short number of months. Dialogue: 0,1:22:09.06,1:22:16.09,Default,,0000,0000,0000,,But those are our roadmap for the short-term future, is Jabber, SSH forwarding, browser proxying. Dialogue: 0,1:22:16.09,1:22:22.08,Default,,0000,0000,0000,,We also are working on the interface, so we're going to have an interface that you can actually Dialogue: 0,1:22:22.08,1:22:24.07,Default,,0000,0000,0000,,control some of these services with. Dialogue: 0,1:22:24.07,1:22:28.02,Default,,0000,0000,0000,,And the first thing we're doing with that interface is probably allowing you to Dialogue: 0,1:22:28.02,1:22:30.08,Default,,0000,0000,0000,,configure this box as a wireless router. Dialogue: 0,1:22:30.08,1:22:35.06,Default,,0000,0000,0000,,So it can become your wireless access point if you want it to be. Dialogue: 0,1:22:35.06,1:22:38.02,Default,,0000,0000,0000,,And your gateway of course. Dialogue: 0,1:22:38.02,1:22:39.09,Default,,0000,0000,0000,,So user interface in one vertical, Dialogue: 0,1:22:39.09,1:22:44.01,Default,,0000,0000,0000,,SSH forwarding, browser proxying a little bit out there, Dialogue: 0,1:22:44.01,1:22:47.06,Default,,0000,0000,0000,,a little bit closer: Jabber, XMPP secure chat. Dialogue: 0,1:22:47.06,1:22:52.06,Default,,0000,0000,0000,,And once we have that stack, we believe that we're going to build upwards from XMPP towards Dialogue: 0,1:22:52.06,1:22:55.07,Default,,0000,0000,0000,,perhaps something like BuddyCloud. Dialogue: 0,1:22:55.07,1:22:58.08,Default,,0000,0000,0000,,We're seriously looking at BuddyCloud and seeing what problems it solves for us Dialogue: 0,1:22:58.08,1:23:05.06,Default,,0000,0000,0000,,in terms of actually letting users group themselves in ways that they can then do access control Dialogue: 0,1:23:05.06,1:23:08.07,Default,,0000,0000,0000,,and channels and things of that nature. Dialogue: 0,1:23:08.07,1:23:13.09,Default,,0000,0000,0000,,And are you actually in contact with the hardware company producing the servers? Dialogue: 0,1:23:13.09,1:23:19.04,Default,,0000,0000,0000,,Yeah, we've had a number of conversations with them. Dialogue: 0,1:23:19.04,1:23:22.01,Default,,0000,0000,0000,,They've agreed that when our code is ready this is something Dialogue: 0,1:23:22.01,1:23:24.05,Default,,0000,0000,0000,,they are very interested in distributing. Dialogue: 0,1:23:24.05,1:23:26.07,Default,,0000,0000,0000,,More importantly we've had a lot of conversations with Dialogue: 0,1:23:26.07,1:23:28.08,Default,,0000,0000,0000,,them about freedom. Dialogue: 0,1:23:28.08,1:23:31.02,Default,,0000,0000,0000,,About why we do what we do, they way we do. Dialogue: 0,1:23:31.02,1:23:35.04,Default,,0000,0000,0000,,And how they need to act if they want to distribute code for Dialogue: 0,1:23:35.04,1:23:37.05,Default,,0000,0000,0000,,us and work with our community. Dialogue: 0,1:23:37.05,1:23:39.02,Default,,0000,0000,0000,,And what that means is we're teaching them how to comply Dialogue: 0,1:23:39.02,1:23:41.08,Default,,0000,0000,0000,,with the GPL, and we're teaching them how to remove the binary drivers, Dialogue: 0,1:23:41.08,1:23:45.07,Default,,0000,0000,0000,,and in fact we're doing some of that for them. Dialogue: 0,1:23:45.07,1:23:47.05,Default,,0000,0000,0000,,But they're Chinese, right? Dialogue: 0,1:23:47.05,1:23:49.01,Default,,0000,0000,0000,,No. No, Globalscale is not a Chinese company. Dialogue: 0,1:23:49.01,1:23:53.06,Default,,0000,0000,0000,,Their manufacturing is in China, but they're not a Chinese company. Dialogue: 0,1:23:53.06,1:23:58.02,Default,,0000,0000,0000,,And we're also talking to Marvel. Marvel makes the system-on-a-chip that goes onto the boards Dialogue: 0,1:23:58.02,1:24:00.08,Default,,0000,0000,0000,,that Globalscale is integrating into their boxes. Dialogue: 0,1:24:00.08,1:24:05.09,Default,,0000,0000,0000,,But we're also talking to Marvel about what they can do to better serve the needs of our community. Dialogue: 0,1:24:05.09,1:24:13.00,Default,,0000,0000,0000,,So a large part of our efforts is to try to convince manufacturers to make Dialogue: 0,1:24:13.00,1:24:14.10,Default,,0000,0000,0000,,hardware that suits our needs. Dialogue: 0,1:24:14.10,1:24:16.09,Default,,0000,0000,0000,,This box is a thing that they developed, they invented, Dialogue: 0,1:24:16.09,1:24:18.05,Default,,0000,0000,0000,,before they ever met us, before they ever heard of us. Dialogue: 0,1:24:18.05,1:24:23.06,Default,,0000,0000,0000,,And if we can get them enough business, Dialogue: 0,1:24:23.06,1:24:27.04,Default,,0000,0000,0000,,if by making FreedomBoxes and by putting our software on the box, Dialogue: 0,1:24:27.04,1:24:30.08,Default,,0000,0000,0000,,that enables them to sell more boxes they will be very happy Dialogue: 0,1:24:30.08,1:24:34.05,Default,,0000,0000,0000,,and when they design the next generation, Dialogue: 0,1:24:34.05,1:24:39.04,Default,,0000,0000,0000,,not the next generation of the DreamPlug, but the next generation after whatever they're designing now, Dialogue: 0,1:24:39.04,1:24:41.06,Default,,0000,0000,0000,,so we're talking a couple of years from now. Dialogue: 0,1:24:41.06,1:24:44.07,Default,,0000,0000,0000,,We can say to them, look, you're selling a lot of boxes Dialogue: 0,1:24:44.07,1:24:48.07,Default,,0000,0000,0000,,because you're making a thing that serves the free world very well. Dialogue: 0,1:24:48.07,1:24:52.03,Default,,0000,0000,0000,,Remove the 8 inch audio jack because our people don't need it. Dialogue: 0,1:24:52.03,1:24:55.05,Default,,0000,0000,0000,,Add a second wifi radio. Put antenna ports on it. Dialogue: 0,1:24:55.05,1:25:00.03,Default,,0000,0000,0000,,This box can go from something that looks really good for our purpose to Dialogue: 0,1:25:00.03,1:25:02.04,Default,,0000,0000,0000,,being something that looks amazingly good for our purpose. Dialogue: 0,1:25:02.04,1:25:05.02,Default,,0000,0000,0000,,And that will require scale. Dialogue: 0,1:25:05.02,1:25:07.04,Default,,0000,0000,0000,,And what that means is that the FreedomBox becomes a wedge for Dialogue: 0,1:25:07.04,1:25:13.04,Default,,0000,0000,0000,,making better hardware for everyone. Dialogue: 0,1:25:13.04,1:25:16.03,Default,,0000,0000,0000,,But it's not just the FreedomBox. The Tor router project is Dialogue: 0,1:25:16.03,1:25:21.04,Default,,0000,0000,0000,,also focused on the DreamPlug. They've also decided this is a good box for their purpose. Dialogue: 0,1:25:21.04,1:25:26.02,Default,,0000,0000,0000,,If you are making a box that is kind of like a FreedomBox but isn't the FreedomBox because Dialogue: 0,1:25:26.02,1:25:30.07,Default,,0000,0000,0000,,it's more specialised to what you want it for, think about Dialogue: 0,1:25:30.07,1:25:35.09,Default,,0000,0000,0000,,the DreamPlug as a hardware target. And let us know, Dialogue: 0,1:25:35.09,1:25:38.06,Default,,0000,0000,0000,,so that when we go to the company, we can say look, Dialogue: 0,1:25:38.06,1:25:42.04,Default,,0000,0000,0000,,look at all the business you are getting by being people that serve the Free world. Dialogue: 0,1:25:42.04,1:25:52.01,Default,,0000,0000,0000,,And then, hopefully, we can convince them to make boxes that better serve the Free world. Dialogue: 0,1:25:52.01,1:25:55.04,Default,,0000,0000,0000,,And that's not a fantasy. We are having those conversations with them, Dialogue: 0,1:25:55.04,1:25:57.08,Default,,0000,0000,0000,,and they are very receptive. Dialogue: 0,1:25:57.08,1:26:00.02,Default,,0000,0000,0000,,So I am pretty happy about that aspect we do. Dialogue: 0,1:26:00.02,1:26:02.09,Default,,0000,0000,0000,,And my last question would be... Dialogue: 0,1:26:02.09,1:26:05.04,Default,,0000,0000,0000,,since we are now, everything is turning mobile, Dialogue: 0,1:26:05.04,1:26:07.02,Default,,0000,0000,0000,,it's like we have these computers with an extra phone... Dialogue: 0,1:26:07.02,1:26:08.06,Default,,0000,0000,0000,,the phone is a small application on these devices. Dialogue: 0,1:26:08.06,1:26:13.02,Default,,0000,0000,0000,,Is there any plan or any idea or any project to say like, have Dialogue: 0,1:26:13.02,1:26:18.02,Default,,0000,0000,0000,,a FreedomPhone or Free mobile device? Dialogue: 0,1:26:18.02,1:26:23.00,Default,,0000,0000,0000,,So the way you connect to this box is kind of how you connect to your router, Dialogue: 0,1:26:23.00,1:26:24.06,Default,,0000,0000,0000,,port 80, browser. Dialogue: 0,1:26:24.06,1:26:28.05,Default,,0000,0000,0000,,But another way you could do it would be an app on your cellphone that bluetooths to the box. Dialogue: 0,1:26:28.05,1:26:33.06,Default,,0000,0000,0000,,I don't actually think the box has bluetooth, but you know, Dialogue: 0,1:26:33.06,1:26:36.03,Default,,0000,0000,0000,,an app on your cellphone that talks to the box over the network, say. Dialogue: 0,1:26:36.03,1:26:38.02,Default,,0000,0000,0000,,That's possible, we're thinking about that. Dialogue: 0,1:26:38.02,1:26:41.02,Default,,0000,0000,0000,,We're thinking about what that looks like for the large population Dialogue: 0,1:26:41.02,1:26:43.06,Default,,0000,0000,0000,,that exists out there that doesn't have computers. Dialogue: 0,1:26:43.06,1:26:46.08,Default,,0000,0000,0000,,There's an awful lot of people that only have cellphones, they don't have computers. Dialogue: 0,1:26:46.08,1:26:49.01,Default,,0000,0000,0000,,And we want them to have freedom too. Dialogue: 0,1:26:49.01,1:26:50.09,Default,,0000,0000,0000,,So figuring out how we can use a cellphone to talk to the box is a future problem. Dialogue: 0,1:26:50.09,1:26:51.08,Default,,0000,0000,0000,,We're not working on it right now, but we're certainly talking Dialogue: 0,1:26:51.08,1:26:57.03,Default,,0000,0000,0000,,about where it fits into the roadmap. Dialogue: 0,1:26:57.03,1:27:01.03,Default,,0000,0000,0000,,And that's why we are concerned about whether or not you Dialogue: 0,1:27:01.03,1:27:05.02,Default,,0000,0000,0000,,can trust your phone. Dialogue: 0,1:27:05.02,1:27:07.03,Default,,0000,0000,0000,,Because if you can trust your FreedomBox, but not the Dialogue: 0,1:27:07.03,1:27:09.07,Default,,0000,0000,0000,,thing you use to access it then you don't really have the privacy you think you have. Dialogue: 0,1:27:09.07,1:27:12.07,Default,,0000,0000,0000,,So, figuring out, can you trust your cellphone? Is a big part of the puzzle. Dialogue: 0,1:27:12.07,1:27:17.07,Default,,0000,0000,0000,,It's a big thing that we don't know how to do yet. Dialogue: 0,1:27:17.07,1:27:21.05,Default,,0000,0000,0000,,So let me make a little advertisement for another interesting project, Dialogue: 0,1:27:21.05,1:27:24.07,Default,,0000,0000,0000,,there is a Spanish development, I think it is also produced in China, Dialogue: 0,1:27:24.07,1:27:26.08,Default,,0000,0000,0000,,but it's called The Geek's Phone. Dialogue: 0,1:27:26.08,1:27:30.07,Default,,0000,0000,0000,,And they have a compatible Android installation by default, Dialogue: 0,1:27:30.07,1:27:34.01,Default,,0000,0000,0000,,and they are probably having a similar philosophy to keep the hardware open. Dialogue: 0,1:27:34.01,1:27:36.07,Default,,0000,0000,0000,,So maybe there is a new cooperation on the horizon. Dialogue: 0,1:27:36.07,1:27:40.09,Default,,0000,0000,0000,,Oh yeah, we love projects like that. Dialogue: 0,1:27:40.09,1:27:41.04,Default,,0000,0000,0000,,I don't know a lot about their project, but I have heard of it Dialogue: 0,1:27:41.04,1:27:44.00,Default,,0000,0000,0000,,and it is on my list of things to look into. Dialogue: 0,1:27:44.00,1:27:47.06,Default,,0000,0000,0000,,I would love to see that succeed, that would be excellent. Dialogue: 0,1:27:47.06,1:27:50.03,Default,,0000,0000,0000,,Well James, thank you for your presentation. Dialogue: 0,1:27:50.03,1:27:54.08,Default,,0000,0000,0000,,I think it was really interesting. And thank you for coming. Dialogue: 0,1:27:54.08,1:27:57.08,Default,,0000,0000,0000,,James will be back on this stage at 7pm when we have our final discussion on the 20 years of Dialogue: 0,1:27:57.08,1:28:03.05,Default,,0000,0000,0000,,the world wide web. Dialogue: 0,1:28:03.05,1:28:05.00,Default,,0000,0000,0000,,Thank you James for coming. Dialogue: 0,1:28:05.00,1:28:12.08,Default,,0000,0000,0000,,{\i1}APPLAUSE{\i0}