Why Political Liberty Depends on Software Freedom More Than Ever
-
0:08 - 0:11Ok, so, it's time for the keynotes
and we are very honoured to have -
0:11 - 0:15Eben Moglen here as first keynote speaker
-
0:15 - 0:20He is a professor of Law
and Legal History at Columbia University. -
0:21 - 0:25He is probably most known
for his involvement in the FSF -
0:25 - 0:28and for creating the Software Freedom Law Centre.
-
0:28 - 0:34He was also heavily involved
in the creation of the GPL version 3 -
0:34 - 0:39and many other things of course
and so he will give a talk here today about -
0:39 - 0:44Why political liberty depends
on software freedom more than ever. -
0:44 - 0:47Eben Moglen, thank you.
-
0:54 - 0:57Thank you, good morning
it's a great pleasure to be here. -
0:58 - 1:03I wanna thank the organisers
for the miracle that FOSDEM is -
1:04 - 1:05You all know that only chaos
-
1:06 - 1:11could create an organisation
of this quality and power -
1:12 - 1:17and it's an honour for me
to play a little bit of a role in it. -
1:17 - 1:21I know how eager you are
to deal with technical matters -
1:22 - 1:29and I'm sorry to start with politics
first thing in the morning, but it's urgent. -
1:30 - 1:36You've been watching it all around the world
the past several weeks haven't you? -
1:36 - 1:40It's about how politics actually works now
-
1:41 - 1:45for people actually seeking freedom now
-
1:46 - 1:49for people trying to make
change in their world now. -
1:50 - 1:56Software is what the 21st century is made of.
-
1:57 - 2:03What steel was to the economy of the 20th century
-
2:03 - 2:08what steel was to the power of the 20th century
-
2:08 - 2:15what steel was to the politics
of the 20th century, software is now. -
2:15 - 2:22It's the crucial building block,
the component out of which everything else is made. -
2:22 - 2:28And when I speak of everything else
I mean, of course, freedom. -
2:28 - 2:34As well as tyranny, as well as business as usual
-
2:35 - 2:40as well as spying on everybody for free all the time.
-
2:42 - 2:46In other words, the very composition of social life
-
2:46 - 2:51the way it works or doesn't work for us
-
2:51 - 2:55the way it works or doesn't work for those who own
-
2:55 - 3:00the way it works or doesn't work for those who oppress
-
3:00 - 3:04all now depends on software.
-
3:06 - 3:12At the other end of this hastening process
-
3:12 - 3:17when we started our little conspiracy
you and me and everybody else -
3:17 - 3:19you remember how it works, right?
-
3:19 - 3:21I mean it's a simple idea.
-
3:21 - 3:28Make freedom, put freedom in everything,
turn freedom on, right? -
3:28 - 3:33That was how the conspiracy was designed
that's how the thing is supposed to work -
3:34 - 3:38We did pretty well with it
and about halfway through stage 1 -
3:38 - 3:45my dear friend Larry Lessig
figured out what was going on for us -
3:45 - 3:48and he wrote his first
quite astonishing book "Code" -
3:48 - 3:57in which he said that code was going
to do the work of law in the 21st century. -
3:57 - 4:01That was a crucial idea
out of which much else got born -
4:01 - 4:05including creative commons
and a bunch of other useful things. -
4:07 - 4:12The really important point now is
that code does the work of law -
4:12 - 4:19and the work of the state and code does
the work of revolution against the state. -
4:19 - 4:23And code does all the work that the state does
-
4:23 - 4:28trying to retain its power in revolutionary situations.
-
4:29 - 4:35But code also organises the people in the street.
-
4:35 - 4:39We're having enormous demonstration
around the world right now -
4:39 - 4:42of the power of code in both directions.
-
4:43 - 4:49The newspapers in the United States
this past month have been full of the buzz -
4:49 - 4:53around the book called
"The Net Delusion" by Evgeny Morozov -
4:53 - 5:03A very interesting book taking a more pessimistic view
of the political nature of the changes in the net -
5:03 - 5:06Mr. Morozov who comes from Belarus
-
5:07 - 5:12and therefore has a clear understanding
of the mechanism of 21st century despotism -
5:13 - 5:18sees the ways in which the institutions of the net
-
5:18 - 5:27are increasingly being co-opted by the state
in an effort to limit control or eliminate freedom. -
5:28 - 5:37And his summary of half decade of
policy papers on that subject in his book -
5:37 - 5:44is a warning to the technological optimists,
at least he says it is -
5:44 - 5:50about the nature of the net delusion
that the net brings freedom. -
5:50 - 5:58I am, I guess, one of the technological optimists
because I do think the net brings freedom. -
5:58 - 6:01I don't think Mr. Morozov is wrong, however.
-
6:02 - 6:06The wrong net brings tyranny
and the right net brings freedom. -
6:06 - 6:10This is a version of the reason why
I still have the buttons for distribution -
6:10 - 6:14that says "Stallman was right".
-
6:14 - 6:18The right net brings freedom
and the wrong net brings tyranny -
6:18 - 6:22because it all depends on how the code works.
-
6:23 - 6:25All right, so we all know that.
-
6:25 - 6:27We've spent a lot of time making free software.
-
6:27 - 6:30We've spent a lot of time
putting free software in everything -
6:30 - 6:34and we have tried to turn freedom on.
-
6:34 - 6:38We have also joined forces with other elements
-
6:38 - 6:44of the free culture world
that we helped to bring into existence. -
6:44 - 6:55I've known Jimmy Wales a long time
and Julian Assange, and that changes the world. -
6:56 - 7:00Wikipedia and Wikileaks
are two sides of the same coin. -
7:00 - 7:05They are the two sides of the same coin
the third side of which is FOSDEM. -
7:05 - 7:11It is the power of ordinary people
to organise, to change the world -
7:11 - 7:14without having to create hierarchy
-
7:14 - 7:18and without having to recapitulate
the structures of power -
7:18 - 7:23that are being challenged
by the desire to make freedom. -
7:25 - 7:29Wikileaks was being treated
everywhere around the world -
7:29 - 7:35in a semi-criminal fashion at Christmas time
-
7:36 - 7:40and then events in Tunisia made it
a little more complicated. -
7:41 - 7:46As it became clear that what was
being reported on around the world -
7:46 - 7:53as though it was primarily a conspiracy
to injure the dignity of the US State Department -
7:53 - 7:56or to embarrass the United States military
-
7:56 - 8:03was actually, really, an attempt
to allow people to learn about their world. -
8:04 - 8:11To learn about how power really operates
and therefore to do something about it. -
8:13 - 8:18And what happened in Tunisia was,
I thought, an eloquent rebuttal -
8:18 - 8:24to the idea that the Wikileaks
and free culture and free software -
8:24 - 8:35was primarily engaged in destruction,
nihilism or I shrink from even employing -
8:35 - 8:38the word in this context, terrorism.
-
8:39 - 8:44It was instead freedom
which is messy, complicated, -
8:44 - 8:50potentially damaging in the short term
but salvational in the long term. -
8:50 - 8:53The medicine for the human soul.
-
8:53 - 8:59It's hard, I know, because most
of the time when we're coding -
8:59 - 9:02it doesn't feel like
we're doing anything -
9:02 - 9:05that the human soul is directly
very much involved in -
9:06 - 9:09to take with full seriousness
-
9:09 - 9:16the political and spiritual meaning
of free software at the present hour. -
9:18 - 9:23But there are a lot of Egyptians
whose freedom now depends -
9:23 - 9:27upon their ability
to communicate with one another -
9:27 - 9:32through a database owned
for-profit by a guy in California -
9:32 - 9:40who obeys orders from governments,
who send orders to disclose to Facebook. -
9:42 - 9:48We are watching in real time
the evolution of the kinds of politics -
9:48 - 9:54of liberation and freedom
in the 21st century that code can make -
9:54 - 10:00and we are watching in real time
the discovery of the vulnerabilities -
10:00 - 10:05that arise from the bad engineering
of the current system. -
10:06 - 10:14Social networking, that is the ability
to use free-form methods of communication -
10:15 - 10:22from many to many, now,
in an instantaneous fashion -
10:22 - 10:27changes the balance of power in society.
-
10:27 - 10:33Away from highly organised
vehicles of state control -
10:33 - 10:37towards people in their own lives.
-
10:38 - 10:44What has happened in Iran, in Egypt, in Tunisia
-
10:44 - 10:49and what will happen in other
societies over the next few years -
10:49 - 10:57demonstrates the enormous political
and social importance of social networking. -
10:57 - 11:01But everything we know
about technology tells us -
11:01 - 11:05that the current forms
of social network communication -
11:05 - 11:14despite their enormous current value for
politics are also intensely dangerous to use. -
11:14 - 11:17They are too centralised
-
11:17 - 11:22They are too vulnerable
to state retaliation and control. -
11:22 - 11:25And the design of their technology
-
11:26 - 11:31like the design of almost
all unfree software technology -
11:31 - 11:36is motivated more by
business interests seeking profit -
11:36 - 11:40than by technological interests seeking freedom.
-
11:40 - 11:44As a result of which, we are watching
-
11:44 - 11:47political movements of enormous value
-
11:47 - 11:52capable of transforming
the lives of hundreds of millions of people -
11:52 - 12:00resting on a fragile basis
like for example the courage of Mr. Zuckerberg -
12:00 - 12:05or the willingness of Google to resist the state
-
12:05 - 12:09where the state is a powerful business partner
-
12:09 - 12:17and a party Google cannot afford to insult.
-
12:18 - 12:23We are living in a world
in which real-time information -
12:23 - 12:28crucial to people in the street
seeking to build their freedom -
12:28 - 12:34depends on a commercial
micro-blogging service in northern California -
12:34 - 12:40which must turn a profit
in order to justify its existence -
12:40 - 12:43to the people who design its technology
-
12:43 - 12:49and which we know is capable
of deciding overnight all by itself -
12:50 - 12:55to donate the entire history
of everything, everybody said through it -
12:55 - 12:57to the library of Congress.
-
12:57 - 13:00Which means, I suppose, that in some other place
-
13:01 - 13:04they could make a different style of donation.
-
13:06 - 13:15We need to fix this. We need to fix it quickly.
-
13:15 - 13:24We are now behind the curve of the movements
for freedom that depend on code. -
13:24 - 13:29And every day that we don't fix the problems created
by the use of insecure, over-centralised -
13:29 - 13:35overcapitalised social network media
to do the politics of freedom -
13:35 - 13:41the real politics of freedom
in the street, where the tanks are. -
13:42 - 13:48The more we don't fix this,
the more we are becoming part of the system -
13:48 - 13:52which will bring about a tragedy soon.
-
13:53 - 13:58What has happened in Egypt
is enormously inspiring. -
13:59 - 14:05But the Egyptian state was late
to the attempt to control the net -
14:05 - 14:13and not ready to be
as remorseless as it could have been. -
14:14 - 14:23It is not hard when everybody's just in one
big database controlled by Mr. Zuckerberg -
14:23 - 14:33to decapitate a revolution by sending an order
to Mr. Zuckerberg that he cannot afford to refuse. -
14:35 - 14:46We need to think deeply and rapidly
and to good technological effect -
14:46 - 14:53about the consequences of what
we have built and what we haven't built yet. -
14:54 - 14:58I pointed a couple of times
already to the reason why -
14:58 - 15:02centralised social networking
and data distribution services -
15:02 - 15:06should be replaced by federated services.
-
15:06 - 15:09I was talking about that intensively last year
-
15:10 - 15:14before this recent round
of demonstrations in the street -
15:14 - 15:17of the importance of the whole thing began.
-
15:18 - 15:22And I want to come back
to the projects I have been advocating. -
15:22 - 15:28But let me just say here,
again, from this other perspective -
15:28 - 15:35that the overcentralisation of network services
is a crucial political vulnerability. -
15:35 - 15:39Friends of ours, people seeking freedom
-
15:39 - 15:47are going to get arrested, beaten, tortured
and eventually killed somewhere on earth. -
15:47 - 15:53Because they're depending for their political
survival in their movements for freedom -
15:53 - 15:59on technology we know, is built to sell them out.
-
16:03 - 16:07If we care about freedom as much as we do
-
16:07 - 16:10and if we are as bright
with technology as we are -
16:10 - 16:14we have to address that problem.
We are actually running out of time. -
16:15 - 16:19Because people whose movements we care deeply about
-
16:19 - 16:25are already out there in harm's way
using stuff that can hurt them. -
16:27 - 16:36I don't want anybody taking life or death risks
to make freedom somewhere carrying an iPhone. -
16:37 - 16:40Because I know what that iPhone can be doing to him
-
16:40 - 16:46without our having any way to control it,
stop it, help it or even know what's going on. -
16:47 - 16:53We need to think infrastructurally
about what we mean to freedom now. -
16:54 - 16:59And we need to learn the lessons
of what we see happening around us in real time. -
17:00 - 17:04One thing that the Egyptian situation showed us
-
17:04 - 17:09as we probably knew after the Iranian situation
-
17:09 - 17:16when we watched the forces of the Iranian state
buy the telecommunications carriers -
17:16 - 17:22as we learnt when the Egyptians
begin to lean on Vodafone last week. -
17:22 - 17:27We learn again why
closed networks are so harmful to us. -
17:27 - 17:32Why the ability to build a kill switch on the infrastructure
-
17:32 - 17:36by pressuring the for-profit communications carriers
-
17:36 - 17:41who must have a way of life
with government in order to survive -
17:41 - 17:48can harm our people seeking freedom
using technology we understand well. -
17:49 - 17:56Now, what can we do to help freedom
under circumstances where the state -
17:56 - 18:02has decided to try
to clamp the network infrastructure? -
18:02 - 18:05Well, we can go back to mesh networking.
-
18:05 - 18:08We've got to go back to mesh networking.
-
18:09 - 18:13We've got to understand how we can provide people
-
18:13 - 18:19using the ordinary devices already available
to them or cheaply available to them -
18:19 - 18:26to build networking
that resists centralised control. -
18:26 - 18:31Mesh networking in densely populated urban environments
-
18:31 - 18:35is capable of sustaining the kind of social action
-
18:35 - 18:40we saw in Cairo and in Alexandria this week.
-
18:41 - 18:47Even without the centralised network services providers
-
18:47 - 18:55if people have wireless routers that mesh up
in their apartments, in their work places -
18:55 - 19:02in the places of public resort around them
they can continue to communicate -
19:02 - 19:07despite attempts in central terms to shut them down.
-
19:08 - 19:12We need to go back to ensuring people
-
19:12 - 19:17secure end-to-end communications
over those local meshes. -
19:18 - 19:22We need to provide survivable conditions
-
19:22 - 19:27for the kinds of communications
that people now depend upon -
19:28 - 19:32outside the context of
centralised networking environments -
19:32 - 19:38that can be used to surveil,
control, arrest or shut them down. -
19:40 - 19:46Can we do this? Sure. Are we gonna do this?
-
19:48 - 19:54If we don't, the great social promise
of the free software movement -
19:54 - 20:00that free software can lead
to free society will begin to be broken. -
20:00 - 20:08Force will intervene somewhere soon
and a demonstration will be offered to humanity -
20:08 - 20:12that even with all that networking technology
-
20:12 - 20:17and all those young people seeking
to build new lives for themselves -
20:17 - 20:20the state still wins.
-
20:20 - 20:23This must not happen.
-
20:25 - 20:33If you look at that map of the globe at night
the one where all the lights on -
20:33 - 20:38and imagine next time you look at it
that you're looking instead at a network graph -
20:39 - 20:43instead of an electrical infrastructure graph
-
20:43 - 20:49you'll feel like a kind of pulsing
coming out of the North American continent -
20:49 - 20:54where all the world's data mining is being done.
-
20:56 - 21:00Think of it that way, right?
-
21:00 - 21:06North America is becoming the heart
of the global data mining industry -
21:07 - 21:13Its job is becoming knowing everything
about everybody, everywhere. -
21:13 - 21:19When Dwight Eisenhower
was leaving the presidency in 1960 -
21:19 - 21:24he made a famous farewell speech to the American people
-
21:24 - 21:30in which he warned them against
the power of the military industrial complex -
21:31 - 21:35a phrase that became so common place in discussion
-
21:35 - 21:39that people stopped thinking seriously about what it meant.
-
21:41 - 21:48The general who had run the largest
military activity of the 20th century -
21:48 - 21:51the invasion of Europe.
-
21:51 - 21:58The general who had become the president
of America at the height of the cold war -
21:58 - 22:04was warning Americans about
the permanent changes to their society -
22:05 - 22:07that would result from the interaction
-
22:07 - 22:13of industrial capitalism with American military might.
-
22:13 - 22:18And since the time of that speech, as you all know,
-
22:18 - 22:25the United States has spent on defence
more than the rest of the world combined. -
22:28 - 22:37Now, in the 21st century, which we can define
as after the latter part of September 2001 -
22:38 - 22:43the United States began to build a new thing.
-
22:43 - 22:47A surveillance industrial military complex.
-
22:48 - 22:56The Washington Post produced the most important piece
of public journalism in the United States last year -
22:56 - 23:01a series available to you online called 'Top Secret America'
-
23:01 - 23:08in which the Washington Post not only wrote
eight very useful, lengthy, analytic stories -
23:08 - 23:13about the classified sector
of American industrial life -
23:13 - 23:16built around surveillance and data processing.
-
23:16 - 23:22The Post produced an enormous database
which is publicly available to everyone -
23:22 - 23:27through the newspaper
of all the classified contractors -
23:27 - 23:30available to them in public record
-
23:30 - 23:33what they do for the government, what they're paid
-
23:33 - 23:35and what can be known about them.
-
23:36 - 23:40A database which can be used
to create all sorts of journalism -
23:40 - 23:43beyond what the Post published itself.
-
23:43 - 23:48I would encourage everybody
to take a look at 'Top Secret America'. -
23:48 - 23:53What it will show you is how many goggles there are
-
23:54 - 23:57under the direct control of the United States government
-
23:57 - 24:02as well as how many goggles there are
under the control of Google. -
24:02 - 24:06In other words the vast outspreading web
-
24:06 - 24:11which joins the traditional
post second world war US listening -
24:11 - 24:16to everything everywhere
on earth outside the United States -
24:17 - 24:22to the newly available listening
to things inside the United States -
24:22 - 24:28that used to be against the law
in my country as I knew its law -
24:28 - 24:33to all the data now available
in all the commercial collection systems -
24:33 - 24:37which includes everything
you type into search boxes about -
24:37 - 24:44what you believe, wish, hope, fear or doubt
as well as every travel reservation you make -
24:44 - 24:49and every piece of tracking data
coming off your friendly smartphone. -
24:55 - 25:00When governments talk about
the future of the net these days -
25:01 - 25:06I have on decent authority from
government officials in several countries. -
25:07 - 25:10When governments talk about
the future of the net these days -
25:10 - 25:14they talk almost entirely in terms of cyberwar.
-
25:15 - 25:19A field in which I've never had much interest
and which has a jargon all its own -
25:19 - 25:24but some current lessons
from inter-governmental discussions -
25:24 - 25:28about cyberwar are probably valuable to us here.
-
25:31 - 25:36The three most powerful collections of states on earth
-
25:36 - 25:40the United States of America, the European Union
and the People's Republic of China -
25:40 - 25:47discuss cyberwar at a fairly high
inter-governmental level fairly regularly. -
25:47 - 25:55Some of the people around
that table have disagreements of policy -
25:55 - 25:58but there is a broad area of consensus.
-
25:58 - 26:02In the world of cyberwar
they talk about exfiltration. -
26:03 - 26:11We would call that spying, they mean exfiltrating
our data off our networks into their pockets. -
26:12 - 26:17Exfiltration, I am told by government
officials here and there and everywhere -
26:17 - 26:23exfiltration is broadly considered by all
the governments to be a free fire zone. -
26:23 - 26:26Everybody may listen to everything everywhere all the time
-
26:26 - 26:28we don't believe in any governmental limits
-
26:29 - 26:31and the reason is every government wants to listen
-
26:32 - 26:35and no government believes listening can be prevented.
-
26:36 - 26:38On that latter point, I think they're too pessimistic
-
26:38 - 26:42but let's grant them that
they've spent a lot of money trying -
26:42 - 26:43and they think they know.
-
26:43 - 26:46Where the disagreements currently exist
-
26:46 - 26:50I am told by the government officials I talked to
-
26:50 - 26:54concerns not exfiltration,
but what they call network disruption. -
26:54 - 26:58By which they mean destroying freedom.
-
26:58 - 27:07The basic attitude here
is of a two parties in balanced speech. -
27:07 - 27:12One side in that conversation
says what we want is clear rules. -
27:12 - 27:14We want to know what we are allowed to attack,
-
27:14 - 27:20what we have to defend and what we do with
the things that are neither friendly nor enemy. -
27:20 - 27:26The other side in that conversation
says we recognise no distinctions. -
27:26 - 27:28Anywhere on the net where there is a threat
-
27:28 - 27:32to our national security
or our national interests, -
27:32 - 27:35we claim the right to disrupt or destroy that threat
-
27:35 - 27:39regardless of its geographical location.
-
27:39 - 27:42I need not to characterise
for you which among the governments -
27:42 - 27:45the United States of America, the European Union
-
27:45 - 27:49or the People's Republic of China take those different positions.
-
27:49 - 27:53And I should say that my guess
is that within all those governments -
27:53 - 27:55there are differences of opinion on those points
-
27:55 - 27:59dominant factions and less dominant factions
-
27:59 - 28:02but all parties are increasingly aware
-
28:02 - 28:06that in North America is where the data mining is.
-
28:07 - 28:11And that's either a benefit, a dubiousness or a problem
-
28:12 - 28:16depending upon which state
or collection of states you represent. -
28:17 - 28:21European data protection law has done this much.
-
28:22 - 28:29It has put your personal data almost exclusively
in North America where it is uncontrolled. -
28:29 - 28:33To that extent, European legislation succeded.
-
28:36 - 28:40The data mining industries
are concentrated outside the European Union -
28:40 - 28:43largely for reasons of legal policy.
-
28:44 - 28:49They operate as any enterprise
tends to operate in the part of the world -
28:49 - 28:53where there is least control over their behaviour.
-
28:53 - 28:58There is no prospect that
the North American governments -
28:58 - 29:00particularly the government of the United States
-
29:01 - 29:06whose national security policy now depends
on listening and data mining everything -
29:06 - 29:09are going to change that for you.
-
29:09 - 29:14No possibility. No time soon.
-
29:18 - 29:22When he was a candidate for president, at the beginning
-
29:22 - 29:26in the Democratic primaries, Barack Obama was in favour
-
29:26 - 29:31of not immunising American telecommunications giants
-
29:31 - 29:36for participation in spying domestically
inside the United States -
29:36 - 29:39without direct public legal authorisation.
-
29:39 - 29:42By the time he was a candidate in the general election
-
29:42 - 29:46he was no longer in favour of preventing immunisation
-
29:46 - 29:50Indeed he, as a Senator from Illinois
-
29:50 - 29:57did not fillibuster the legislation
immunising the telecomms giants and it went through. -
29:57 - 30:00As you are aware the Obama administration's policies
-
30:00 - 30:05with respect to data mining,
surveillance and domestic security in the net -
30:05 - 30:09are hardly different from the predecessor administrations'
-
30:09 - 30:15except where they are more
aggressive about government control. -
30:17 - 30:23We can't depend upon the pro-freedom bias
-
30:23 - 30:30in the listening to everybody, everywhere
about everything now going on. -
30:31 - 30:36Profit motive will not produce privacy
-
30:36 - 30:42let alone will it produce robust defence
for freedom in the street. -
30:44 - 30:50If we are going to build systems
of communication for future politics -
30:50 - 30:54we're going to have to build them under the assumption
-
30:54 - 30:59that the network is not only untrusted, but untrustworthy.
-
31:00 - 31:08And we're going to have to build under
the assumption that centralised services can kill you. -
31:08 - 31:12We can't fool around about this.
-
31:12 - 31:20We can't let Facebook dance up and down
about their privacy policy. That's ludicrous. -
31:20 - 31:25We have to replace the things that create vulnerability
-
31:25 - 31:30and lure our colleagues around the world into using them
-
31:30 - 31:33to make freedom only to discover
-
31:33 - 31:38that the promise is easily broken by a kill switch.
-
31:40 - 31:46Fortunately we actually do know how
to engineer ourselves out of this situation. -
31:47 - 31:56Cheap, small, low power plug servers
are the form factor we need. -
31:56 - 31:58And they exist everywhere now
-
31:58 - 32:03and they will get very cheap very quick very soon.
-
32:04 - 32:08A small device the size of a cell phone charger
-
32:08 - 32:13running a low power chip with a wireless NIC or two
-
32:13 - 32:17and some other available ports
-
32:17 - 32:22and some very sweet free software of our own
-
32:22 - 32:28is a practical device for creating
significant personal privacy -
32:28 - 32:31and freedom based communications.
-
32:31 - 32:35Think what it needs to have in it.
-
32:36 - 32:42Mesh networking, we are not quite there, but we should be.
-
32:42 - 32:47OpenBTS, asterisk, yeah,
we could make telephone systems -
32:47 - 32:52that are self-constructing
out of parts that cost next to nothing. -
32:55 - 32:59Federated, rather than centralised, micro-blogging
-
33:00 - 33:04social networking, photo exchange,
-
33:05 - 33:11anonymous publication platforms
based around cloudy web servers. -
33:12 - 33:15We can do all of that.
-
33:15 - 33:21Your data at home in your house
where they have to come and get it -
33:22 - 33:25facing whatever the legal restrictions are,
-
33:25 - 33:28if any, in your society about
-
33:28 - 33:31what goes on inside the precincts of the home.
-
33:32 - 33:36Encrypted email, just all the time
-
33:36 - 33:41perimeter defence for all those wonky Windows computers
-
33:41 - 33:47and other bad devices that roll over any time
they're pushed at by a twelve year old -
33:50 - 33:54Proxy services for climbing over national firewalls.
-
33:55 - 33:59Smart tunnelling to get around anti-neutrality activity
-
33:59 - 34:04by upstream ISPs and other network providers.
-
34:04 - 34:13All of that can be easily done on top of stuff
we already make and use all the time. -
34:13 - 34:20We have general purpose distributions of stacks
more than robust enough for all of this -
34:20 - 34:25and a little bit of application layer
work to do on the top. -
34:27 - 34:34Yesterday in the United States
we formed the Freedom Box Foundation -
34:34 - 34:41which I plan to use as the temporary
or long term as the case may be -
34:41 - 34:46organisational headquarters
for work making free software -
34:46 - 34:50to run on small format server boxes
-
34:50 - 34:56free hardware wherever possible
unfree hardware where we must -
34:56 - 35:01in order to make available
around the world at low prices -
35:02 - 35:06appliances human beings
will like interacting with -
35:06 - 35:12that produce privacy
and help to secure robust freedom. -
35:23 - 35:31We can make such objects cheaper
than the chargers for smart phones. -
35:31 - 35:38We can give people something
that they can buy at very low cost -
35:38 - 35:43that will go in their houses
that will run free software -
35:43 - 35:49to provide them services that make
life better on the ordinary days -
35:49 - 35:54and really come into their own
on those not so ordinary days -
35:54 - 35:58when we are out in the street
making freedom thank you for calling. -
36:03 - 36:09A Belarussian theatre troupe
that got arrested and heavily beaten on -
36:09 - 36:14after the so called elections in Minsk this winter
-
36:14 - 36:20exfiltrated itself to New York city in January
-
36:20 - 36:25did some performances of
Tom Stoppard and gave some interviews -
36:25 - 36:29I'm sorry of Harold Pinter and gave some interviews
-
36:29 - 36:36One of the Belarussian actors
who was part of that troupe -
36:36 - 36:38said in an interview to New York Times
-
36:38 - 36:44the Belarussian KGB is the most
honest organisation on earth. -
36:45 - 36:52After the Soviet Union fell apart
they saw no need to change anything they did -
36:52 - 36:57so they saw no need to change their name either.
-
36:58 - 37:03And I thought that was a really quite useful comment.
-
37:04 - 37:09We need to keep in mind that they are
exactly the same people they always were -
37:09 - 37:15whether they're in Cairo or Moscow
or Belarus or Los Angeles or Jakarta -
37:15 - 37:16or anywhere else on earth.
-
37:16 - 37:20They're exactly the same people they always were.
-
37:20 - 37:24So are we exactly the same people we always were too.
-
37:24 - 37:28We set out a generation ago to make
freedom and we're still doing it. -
37:29 - 37:32But we have to pick up the pace now.
-
37:32 - 37:35We have to get more urgent now.
-
37:35 - 37:41We have to aim our engineering
more directly at politics now. -
37:42 - 37:48Because we have friends in the street
trying to create human freedom. -
37:48 - 37:52And if we don't help them they'll get hurt.
-
37:53 - 38:02We rise to challenges, this is one.
We've got to do it. Thank you very much. -
38:29 - 38:35Thank you very much and I think
there is enough time for a few questions -
38:35 - 38:38so please raise your hand if you want to
-
39:02 - 39:07The question was what does complete
decentralisation mean for identity -
39:07 - 39:13because the state, you may believe who you are
but the state gives you a passport -
39:13 - 39:17or some other legal document
that allows you to identify yourself. -
39:17 - 39:22So in complete decentralisation
how do you identify yourself on that network? -
39:23 - 39:27I doubt that complete decentralisation
is the outcome of anything -
39:27 - 39:32but let me tell you a story which
may help to explain how I feel about this. -
39:32 - 39:39We need to go back now by 16 years
to a time when there was a program called PGP -
39:39 - 39:43and there was a government in the United States
that was trying to eradicate it. -
39:43 - 39:49I know this will seem like ancient history
to many people, but it's my life so it doesn't to me. -
39:50 - 39:56We were having a debate at Harvard
Law School in January of 1995 -
39:56 - 40:02two on two about PGP and the criminal
investigation and the future of secrecy. -
40:03 - 40:07The debators on my side
were me and Danny Whitesner -
40:07 - 40:10then at the Electronic Privacy Information Center
-
40:10 - 40:15later at the W3C and now
in the United States Department of Commerce. -
40:15 - 40:19And on the other side was the then
Deputy Attorney General of the United States -
40:19 - 40:24and a former General Counsel
of the National Security Agency. -
40:24 - 40:28We debated PGP and then encryption
and the clipper chip and various other, -
40:28 - 40:31now long dead, subjects for a couple of hours
-
40:31 - 40:34and then we were all on an offered
little dinner at the Harvard faculty club. -
40:35 - 40:37On the way across the Harvard campus
-
40:37 - 40:40the Deputy Attorney General
of the United States said to me -
40:40 - 40:43Eben, on the basis of your
public statements this afternoon -
40:43 - 40:48I have enough to order the interception
of your telephone conversations. -
40:49 - 40:52She thought that was a joke.
-
40:53 - 40:57And back in 1995 you could sort of
get away with thinking it was a joke -
40:57 - 41:02as the Deputy Attorney General of the United States
because it was so clearly against the law. -
41:02 - 41:06So I smiled and we went off, we had our dinner
-
41:06 - 41:11and after the plates were cleared and the walnuts
and the port had been strewn about -
41:11 - 41:15this former General Counsel
to the National Security Agency -
41:15 - 41:19I'm concealing names to protect
the not so innocent here -
41:19 - 41:23this former NSA lawyer,
he looked around the table calmly -
41:23 - 41:26and with that sort of plummy
through the port kind of look -
41:26 - 41:31and he said ok we'll let our head down
we agree we're not gonna prosecute your client -
41:31 - 41:35PGP will happen. We've fought
a long delaying action -
41:35 - 41:40against public key encryption
but it's coming to an end now. -
41:40 - 41:46And then he looked around the table and he said
but nobody here cares about anonymity, do they? -
41:46 - 41:48And a cold chill went up my spine
-
41:48 - 41:52because I knew what
the next 15 years were gonna be about. -
41:52 - 41:56So I would like to turn around
the thing you said to say -
41:56 - 42:01what we're really talking about is whether
there's gonna be any preservation of anonymity at all. -
42:01 - 42:06Where power on the other side
made its peace in the mid 1990s -
42:06 - 42:09was with the idea that
there would be strong encryption -
42:09 - 42:11and e-commerce but there would be no anomymity.
-
42:11 - 42:15And in the course of the last decade
they picked up a strong alliance -
42:15 - 42:17with the global entertainment industries
-
42:18 - 42:20the things that now call
themselves content companies -
42:20 - 42:22which are also adverse to anonymity, right?
-
42:22 - 42:26cause they wanna know what you read
and listen to and watch every single time -
42:26 - 42:29so that you can increase
their shareholders' wealth for them. -
42:30 - 42:33The real problem of identity
isn't the problem of -
42:33 - 42:37are we gonna be decentralised
past the point when we have identity -
42:37 - 42:40we are not going to do that.
We are not going to be able to do that. -
42:40 - 42:44The real problem of identity is
are we gonna have any of our own? -
42:44 - 42:49or are we gonna be the data cloud
that everybody else is keeping about us -
42:49 - 42:55which contains where we are, what we do, what we think
what we read, what we eat and everything else too -
42:55 - 42:58as long as you send a subpoena
-
42:58 - 43:02to Mr. Zuckerberg who has the one big database
in which you live your entire life. -
43:02 - 43:08I understand the idea that
we might be thought of or satirically -
43:08 - 43:11or even pointedly claim to be
-
43:11 - 43:16trying too radically decentralise
to the point in which identity gets lost. -
43:16 - 43:20But if you find yourself
in an argument where people telling you -
43:20 - 43:24you are trying to anarchise so far that
there won't be any name in the passport anymore -
43:24 - 43:28you can reassure them that meat-space
will stay pretty much the way it is right now. -
43:28 - 43:33We just want fewer people
ripping fingernails off in meat-space. -
43:33 - 43:39Which is why we are busy building
Freedom Boxes and helping people use them. -
43:39 - 43:44Thank you very much, the passport will
remain pretty much the way it is right now -
43:44 - 43:49with the RFID chip in it and the fingerprints
and the retinal scan and everything. -
43:50 - 43:52I'm not worried that we are
going to go too far friends. -
43:52 - 43:56It's the other folks who went
way too far and our job's to get back home. -
44:06 - 44:09Hello Eben, I'm here.
-
44:13 - 44:15Jérémie from La Quadrature du Net
-
44:15 - 44:20First of all I want to thank you
and I will never thank you enough -
44:20 - 44:23for how inspiring you are for everyone of us
-
44:29 - 44:35By thanking you for inspiring us
under an engineering perspective -
44:35 - 44:40as I am both an engineering geek
and a political activist by what I do. -
44:40 - 44:46I wanted to stress that the ACTA,
the Anti-Counterfeiting Trade Agreement -
44:47 - 44:53that deeply concern strengthening
of DRMs and the legal protection -
44:53 - 44:57and also turns every internet service provider
-
44:57 - 45:01every internet intermediate
into private copyright police -
45:01 - 45:07with deep consequence on our freedom of speech,
our privacy, on right to a fair trial and so on. -
45:07 - 45:12The ACTA will be coming to the
European Parliament around next summer -
45:12 - 45:18maybe before maybe after and it will be
our ultimate chance to defeat the thing. -
45:18 - 45:22We won in the European Parliament before.
-
45:22 - 45:28This is a battle we can win
and everybody here can participate into it -
45:28 - 45:29and I wanted to ask you Eben
-
45:30 - 45:35Are those legislative fights worth fighting?
Do we still have a chance? -
45:36 - 45:38and especially on the front of the net neutrality,
-
45:38 - 45:43What are your insights? What do you think?
Can we still win today? -
45:43 - 45:49No European citizen should need any
introduction to Jérémie Zimmermann, right? -
45:50 - 45:54That's the future of the
European Union speaking to you. -
45:54 - 45:59Your question: Should we bother
fighting in legislature -
45:59 - 46:03seems to me fair, oh yeah we should.
It's unpleasant work. -
46:03 - 46:08I worry about you.
I don't want your heart to burst. -
46:09 - 46:14I don't want people killing
themselves over the strain of it. -
46:14 - 46:18It's ugly, boring, tedious work
-
46:18 - 46:27and the other side pays people to sit you out
to wait until you go home, to decide you give up. -
46:27 - 46:33Think of Egypt as a place where that
was done for thirty years along with torture. -
46:33 - 46:35Everything stops moving.
-
46:36 - 46:39If you read Claude Manceron
on the French revolution -
46:39 - 46:42or the coming of the French revolution
-
46:42 - 46:45as he moves his thousands
of men and women of freedom -
46:45 - 46:49towards the climactic events of the late 1780s
-
46:49 - 46:54you see how deeply the feeling in France
at the end of the Ancien Régime -
46:54 - 46:58was of status beginning
to break up into movement. -
46:59 - 47:03The work you're talking about
is work that is largely defensive -
47:03 - 47:07to prevent harm from being done.
-
47:07 - 47:12And as you say you are lucky when you win
after an enormous effort that nothing happens. -
47:12 - 47:18But the good news is in legislative politics
that there is a thousand ways to stop a thing -
47:18 - 47:20and only one way for it to get done.
-
47:20 - 47:26And therefore the side that wants
to stop things has an inherent advantage. -
47:26 - 47:32Most of the time that's deeply
funded capital but sometimes it's us. -
47:32 - 47:39About ACTA, I think there is no question.
It's a fight worth fighting everywhere all the time. -
47:39 - 47:46Because as you say it's really the concordat,
the treaty between the state and private power -
47:46 - 47:50for the control of the net
under 21st century conditions -
47:50 - 47:55in the mingled interests of
the listeners and the owners. -
47:55 - 48:04If we do beat it, water it down, force
withdrawal of particularly offensive premises -
48:04 - 48:08or significantly expose it
to disinfecting daylight -
48:08 - 48:10we will help ourselves.
-
48:10 - 48:14We are not going to achieve everything by any means.
-
48:14 - 48:22We need to turn the international trade conversation
in the direction of direct support for freedom. -
48:22 - 48:27My line with the trade negotiators
around the world has become: -
48:27 - 48:29Governments have a right to share
-
48:29 - 48:39the sharing economy has as much right to support
in the international trade system as the owning economy. -
48:39 - 48:42My colleague Mishi Choudhary
who directs SFLC India -
48:42 - 48:47was in Beijing making a speech
on that point earlier this year. -
48:47 - 48:52We will be re-iterating that point
in various places around the world -
48:52 - 48:56where strong states with which
we have other difficulties -
48:56 - 49:00meet with us in recognising
that the world trade system -
49:00 - 49:06is now overwhelmingly tilted
in favour of ownership based production -
49:06 - 49:10which is only one part
of the world's economic production. -
49:10 - 49:17We need to press hard against ACTA
and other pro-ownership trade law -
49:17 - 49:22but we also need to begin to roll out
an affirmative strategy of our own -
49:22 - 49:29demanding protection for sharing based
economic activities in the global trade system. -
49:29 - 49:33That effort will take 20 years
to begin to show fruit -
49:33 - 49:36but we need to begin that too now.
-
49:37 - 49:40On network neutrality I will say this
-
49:40 - 49:50We are going to have to establish counterforce
to the various oligopolists of telecommunications. -
49:50 - 49:56The regulators believe a lot of things
they have been told by industry. -
49:56 - 50:04I was at ARCEP myself in September
to discuss wireless network neutrality in Paris -
50:04 - 50:10with regulators who are well educated,
shrewd, thoughtful and capable -
50:10 - 50:13but who believe something which isn't true.
-
50:13 - 50:20Namely that it costs enormous monetary
investments to build wireless networks. -
50:21 - 50:28And I said to the ARCEP regulators
Do you know about OpenBTS? -
50:28 - 50:32Do you know that I can take
a coat hanger and a laptop -
50:32 - 50:38and make a GSM cell phone base station
out of it using some free software? -
50:38 - 50:40Do you know about Asterisk?
-
50:40 - 50:47I suggested that maybe they would like
to give us a small French city, say, Grenoble. -
50:47 - 50:53where using the extraodinary
high quality wired harness -
50:54 - 50:56that they built around the hexagon that is France
-
50:57 - 51:00we will create cell phone companies out of nowhere
-
51:01 - 51:06using cheap commodity hardware and existing handsets
and provide service to everybody. -
51:07 - 51:12And then I say it will be possible
to have a realistic fact-based discussion -
51:12 - 51:17about whether the enormous investment
necessities of wireless network build out -
51:17 - 51:23require non-neutrality in network routing practices.
-
51:23 - 51:27Well, the regulator of course nods and smiles
and thanks me very much for all that information -
51:27 - 51:29and forgets it the minute I leave.
-
51:29 - 51:35Because he still believes what Orange,
that used to be France Télécom, tells him -
51:36 - 51:42about how you can't make wireless networks
without immense monetary investments. -
51:42 - 51:45We will begin to gain on network neutrality
-
51:45 - 51:51when we have a box in everybody's apartment
that can offer free telephone service over tunnelling -
51:51 - 51:58around non-neutrality and talk to GSM handsets.
Oh, that would be the Freedom Box. -
51:58 - 52:03See, that's what I wanna do.
I wanna build a ring of engineering -
52:03 - 52:07around the idea of
non-neutral network management. -
52:07 - 52:11I wanna have a box in your house
that senses the upstream and says -
52:11 - 52:14oh my God he's stopping port 655
-
52:14 - 52:17I think I'll route that
from my friend's apartment. -
52:18 - 52:24Then I think we will get some interesting
network neutrality conversation going. -
52:29 - 52:34When you call for decentralisation
-
52:34 - 52:38aren't you really going against
the trend of history as we've seen it? -
52:38 - 52:42For example we used to have
Usenet which was decentralised -
52:42 - 52:46that's moved much more to web based forums.
-
52:47 - 52:54Or likewise we in geekdom may love IRC.
We may go to Freenode -
52:54 - 52:59but the general public all know about
Twitter which is moving into that space. -
52:59 - 53:03And I think there are many reasons
why this could be happening -
53:03 - 53:09but I think the primary reason is perhaps mindshare.
The journalists who report this to the general public -
53:09 - 53:13outside geekdom know about websites,
they know about Twitter. -
53:13 - 53:18They never knew about Usenet
so only geeks know about that -
53:20 - 53:26If we take this point perhaps the mindshare
you need to be going for is the journalists -
53:26 - 53:32who report on the net, get them
to report on decentralised networks -
53:34 - 53:39and get the public to start using them.
-
53:39 - 53:42Yes, it's a crucial part
of the activity, that's right. -
53:42 - 53:44We're going to talk to people.
-
53:44 - 53:48Some of those people are gonna be journalists
and some of them are gonna be our friends -
53:48 - 53:51and some of them are gonna be other engineers
and some of them are gonna be people who -
53:52 - 53:54when their wireless router breaks
they can go out buying a Freedom Box -
53:55 - 53:58cause it's cheaper and neater
and cooler and does more good stuff. -
53:58 - 54:01And some of them are gonna be
people who buy because they need it. -
54:01 - 54:04We just have to make the software.
-
54:04 - 54:07The hardware guys will make
the hardware and everything will happen. -
54:07 - 54:10I don't know how long.
I don't know with what degree of certainty. -
54:10 - 54:13But I don't know if it's
about going against the flow of history. -
54:14 - 54:17I think it's about pushing the pendulum back.
-
54:20 - 54:26The general public have to know that this
option exists and will serve their needs. -
54:26 - 54:30Yes, Apple will always advertise more than we will.
-
54:32 - 54:38But the general public knows about Firefox
so they can know about the Freedom Box too. -
54:45 - 54:48I think we have to stop
in order to allow the conference to go on. -
54:48 - 54:51Thank you very much for your time.
- Title:
- Why Political Liberty Depends on Software Freedom More Than Ever
- Description:
-
By Eben Moglen
We have come a very long way since the beginning of free software. GNU, Android, Linux, Open Solaris, X, Apache, Perl & other free software have changed & are changing the world.
But events happening now, like the Wikileaks investigation, and technologies of spying and control, like Facebook and iPad, are reminding us just how politically and socially unfree computers can make us if we're not careful. In this talk, I consider where we are now, and where we need to go
FOSDEM (Free and Open Source Development European Meeting) is a European event centered around Free and Open Source software development. It is aimed at developers and all interested in the Free and Open Source news in the world. Its goals are to enable developers to meet and to promote the awareness and use of free and open source software. More info at http://fosdem.org
- Video Language:
- English
- Duration:
- 55:05
Børge A. Roum edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever | ||
Børge A. Roum edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever | ||
Børge A. Roum edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever | ||
Børge A. Roum edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever | ||
Schnouki edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever | ||
Schnouki edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever | ||
Schnouki edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever | ||
Schnouki edited English subtitles for Why Political Liberty Depends on Software Freedom More Than Ever |