1 00:00:10,000 --> 00:00:14,000 Merci. Félicitations aux étudiants [de l'association Libertés Numériques -- NdR] 2 00:00:14,100 --> 00:00:16,000 d’avoir organisé cette réunion. 3 00:00:16,100 --> 00:00:19,900 Ils ont eu raison, non seulement à cause de la célébrité de Richard 4 00:00:20,000 --> 00:00:22,200 mais aussi parce que les sujets nous intéressent beaucoup. 5 00:00:22,300 --> 00:00:25,000 Ils nous intéressent particulièrement ici à Sciences Po 6 00:00:25,100 --> 00:00:29,200 puisque nous essayons d’abord d’étudier les controverses; 7 00:00:29,300 --> 00:00:31,200 certains d’entre vous ici étudient les controverses 8 00:00:31,300 --> 00:00:34,100 et Richard est lui-même un personnage controversé. 9 00:00:34,200 --> 00:00:37,000 Je n’ai rien trouvé sur le Web qui permette de donner un accord 10 00:00:37,100 --> 00:00:45,100 ni sur ce qu’il fait, ni sur ce qu’il dit, ni sur les mots qu’il utilise, donc il est un cas d’école 11 00:00:45,200 --> 00:00:48,700 pour nous qui étudions les cartographies de controverse dans cette maison. 12 00:00:48,800 --> 00:00:51,700 On a en quelque sorte la présentation d’un personnage controversé 13 00:00:51,800 --> 00:00:53,700 sur des sujets qui nous importent. 14 00:00:53,800 --> 00:00:56,800 Le deuxième point évidemment, c’est que le sujet lui-même 15 00:00:56,900 --> 00:01:01,000 et la question des degrés de liberté et de contrôle 16 00:01:01,100 --> 00:01:08,200 qui sont au cœur de toutes ces innovations autour du numérique 17 00:01:08,300 --> 00:01:11,000 nous intéressent directement, pour des raisons de sciences politiques 18 00:01:11,100 --> 00:01:14,300 pour des raisons de sociologie, pour des raisons également de droit 19 00:01:14,400 --> 00:01:18,000 toutes questions qui nous intéressent dans cette maison. 20 00:01:18,100 --> 00:01:21,800 C’est d’ailleurs assez intéressant que Richard vienne chez nous 21 00:01:21,900 --> 00:01:28,100 quelques jours après la mort de Steve Jobs, mort qu’il a célébrée à sa façon si j’ose dire 22 00:01:28,200 --> 00:01:32,200 en expliquant que la disparition de Steve Jobs n’était pas un énorme malheur 23 00:01:32,300 --> 00:01:36,100 pour l’ensemble des questions de liberté numérique 24 00:01:36,200 --> 00:01:40,000 à cause du fait que — même si on pouvait estimer Steve Jobs 25 00:01:40,100 --> 00:01:42,800 le contrôle qu’il exerçait sur les logiciels 26 00:01:42,900 --> 00:01:47,000 et la domination qui nous rend en quelque sorte libres 27 00:01:47,100 --> 00:01:51,000 mais sous la forme, comme il le dit dans plusieurs de ses propos 28 00:01:51,100 --> 00:01:54,200 d’une espèce de prison dorée — prison dorée que j’adore 29 00:01:54,300 --> 00:01:56,600 puisque je suis moi-même un adepte du Macintosh 30 00:01:56,700 --> 00:01:59,000 mais ce n’est pas évidemment le genre de personnage 31 00:01:59,100 --> 00:02:01,600 le genre de liberté auxquels pense Richard. 32 00:02:01,700 --> 00:02:04,000 La troisième raison, c’est évidemment que 33 00:02:04,100 --> 00:02:06,700 pour des tas de questions qui nous intéressent directement 34 00:02:06,800 --> 00:02:09,000 dans cette maison autour des humanités scientifiques 35 00:02:09,100 --> 00:02:11,700 la liaison entre les innovations techniques 36 00:02:11,800 --> 00:02:14,700 et les dipositifs politiques nous intéresse directement. 37 00:02:14,800 --> 00:02:17,700 Donc nous avons au moins, en tout cas moi à la direction scientifique 38 00:02:17,800 --> 00:02:23,000 trois raisons de nous réjouir de l’initiative du groupe d’élèves 39 00:02:23,100 --> 00:02:25,000 qui a organisé cette réunion 40 00:02:25,100 --> 00:02:28,000 et je suis heureux de laisser la parole à Richard Stallman 41 00:02:28,100 --> 00:02:31,100 et je vous prie de l’applaudir avant qu’il ne parle. 42 00:02:37,700 --> 00:02:43,100 Projects with the goal of digital inclusion are making a big assumption. 43 00:02:43,200 --> 00:02:48,600 They are assuming that participating in a digital society is good; 44 00:02:48,700 --> 00:02:51,000 but that’s not necessarily true. 45 00:02:51,100 --> 00:02:54,800 Being in a digital society can be good or bad 46 00:02:54,900 --> 00:03:00,800 depending on whether that digital society is just or unjust. 47 00:03:02,000 --> 00:03:09,000 There are many ways in which our freedom is being attacked by digital technology. 48 00:03:09,100 --> 00:03:17,100 Digital technology can make things worse, and it will, unless we fight to prevent it. 49 00:03:20,900 --> 00:03:26,000 Therefore, if we have an unjust digital society 50 00:03:26,100 --> 00:03:30,000 we should cancel these projects for digital inclusion 51 00:03:30,100 --> 00:03:34,000 and launch projects for digital extraction. 52 00:03:34,500 --> 00:03:41,400 We have to extract people from digital society if it doesn’t respect their freedom; 53 00:03:41,500 --> 00:03:44,800 or we have to make it respect their freedom. 54 00:03:45,100 --> 00:03:50,000 So, what are the threats? First, surveillance. 55 00:03:50,100 --> 00:03:54,000 Computers are Stalin’s dream. 56 00:03:54,100 --> 00:03:57,600 They are ideal tools for surveillance 57 00:03:57,700 --> 00:04:03,000 because anything we do with computers, the computers can record. 58 00:04:03,100 --> 00:04:05,000 They can record the information 59 00:04:05,100 --> 00:04:10,900 in a perfectly indexed searchable form in a central database 60 00:04:11,000 --> 00:04:17,100 ideal for any tyrant who wants to crush opposition. 61 00:04:19,800 --> 00:04:24,100 Surveillance is sometimes done with our own computers. 62 00:04:24,700 --> 00:04:30,000 For instance, if you have a computer that’s running Microsoft Windows 63 00:04:30,100 --> 00:04:33,000 that system is doing surveillance. 64 00:04:33,100 --> 00:04:38,300 There are features in Windows that send data to some server. 65 00:04:38,400 --> 00:04:41,000 Data about the use of the computer. 66 00:04:41,100 --> 00:04:45,700 A surveillance feature was discovered in the iPhone a few months ago 67 00:04:45,800 --> 00:04:48,800 and people started calling it the “spy-phone”. 68 00:04:51,000 --> 00:04:54,600 Flash player has a surveillance feature too 69 00:04:54,800 --> 00:04:58,200 and so does the Amazon “Swindle”. 70 00:04:58,700 --> 00:05:04,000 They call it the Kindle, but I call it the Swindle, l’escroc 71 00:05:04,500 --> 00:05:08,200 because it’s meant to swindle users out of their freedom. 72 00:05:08,800 --> 00:05:14,000 It makes people identify themselves whenever they buy a book 73 00:05:14,200 --> 00:05:21,000 and that means Amazon has a giant list of all the books each user has read. 74 00:05:21,400 --> 00:05:25,100 And such a list must not exist anywhere. 75 00:05:27,100 --> 00:05:32,000 Most portable phones will transmit their location 76 00:05:32,100 --> 00:05:38,100 computed using GPS, on remote command. 77 00:05:38,900 --> 00:05:45,900 And the phone company is accumulating a giant list of places that the user has been. 78 00:05:46,100 --> 00:05:51,100 A German from the Green Party asked the phone company 79 00:05:51,200 --> 00:05:56,000 to give him the data it had about where he was. 80 00:05:56,500 --> 00:05:59,800 He had to sue, he had to go to court to get this information. 81 00:05:59,900 --> 00:06:06,000 And when he got it, he received forty-four thousand location points 82 00:06:06,100 --> 00:06:08,100 for a period of six months. 83 00:06:08,200 --> 00:06:12,400 That’s more than two hundred per day. 84 00:06:12,800 --> 00:06:20,000 So what that means is someone could form a very good picture of his activities 85 00:06:20,100 --> 00:06:24,000 just by looking at that data. 86 00:06:28,000 --> 00:06:32,800 We can stop our own computers from doing surveillance on us 87 00:06:32,900 --> 00:06:37,100 if we have control of the software that they run. 88 00:06:38,000 --> 00:06:43,000 But the software these people are running, they don’t have control over. 89 00:06:43,100 --> 00:06:49,100 It’s non-free software and that’s why it has malicious features, such as surveillance. 90 00:06:49,700 --> 00:06:54,600 However, the surveillance is not always done with our own computers 91 00:06:54,700 --> 00:06:57,700 it’s also done at one remove. 92 00:06:57,800 --> 00:07:02,100 For instance ISPs in Europe are required 93 00:07:02,200 --> 00:07:09,000 to keep data about the user’s internet communications for a long time 94 00:07:09,100 --> 00:07:16,100 in case the State decides to investigate that person later 95 00:07:16,200 --> 00:07:19,100 for whatever imaginable reason. 96 00:07:22,000 --> 00:07:26,900 And with a portable phone, even if you can stop the phone 97 00:07:27,000 --> 00:07:30,000 from transmitting your GPS location 98 00:07:30,100 --> 00:07:34,100 the system can determine the phone’s location approximately 99 00:07:34,200 --> 00:07:40,700 by comparing the time when the signals arrive at different towers. 100 00:07:41,000 --> 00:07:45,000 So the phone system can do surveillance 101 00:07:45,100 --> 00:07:49,400 even without special cooperation from the phone itself. 102 00:07:54,000 --> 00:07:59,700 Likewise, the bicycles that people rent in Paris. 103 00:07:59,800 --> 00:08:02,900 Of course the system knows where you get the bicycle 104 00:08:03,000 --> 00:08:06,000 and it knows where you return the bicycle 105 00:08:06,000 --> 00:08:10,000 and I’ve heard reports that it tracks the bicycles 106 00:08:10,600 --> 00:08:14,000 as they are moving around as well. 107 00:08:15,100 --> 00:08:23,000 So they are not something we can really trust. 108 00:08:23,300 --> 00:08:30,900 But there are also systems that have nothing to do with us that exist only for tracking. 109 00:08:31,000 --> 00:08:37,800 For instance, in the UK all car travel is monitored. 110 00:08:37,900 --> 00:08:43,500 Every car’s movements are being recorded in real time 111 00:08:43,600 --> 00:08:47,200 and can be tracked by the State in real time. 112 00:08:47,300 --> 00:08:52,000 This is done with cameras on the side of the road. 113 00:08:52,400 --> 00:08:57,100 Now, the only way we can prevent surveillance 114 00:08:57,200 --> 00:09:01,000 that’s done at one remove or by unrelated systems 115 00:09:01,100 --> 00:09:07,100 is through political action against increased government power 116 00:09:07,200 --> 00:09:11,100 to track and monitor everyone. 117 00:09:11,500 --> 00:09:17,000 Which means of course we have to reject whatever excuse they come up with. 118 00:09:18,000 --> 00:09:25,000 For doing such systems, no excuse is valid to monitor everyone. 119 00:09:25,600 --> 00:09:31,800 In a free society, when you go out in public you are not guaranteed anonymity. 120 00:09:31,900 --> 00:09:36,500 It’s possible for someone to recognize you and remember. 121 00:09:36,600 --> 00:09:41,800 And later that person could say that he saw you at a certain place. 122 00:09:42,000 --> 00:09:45,000 But that information is diffuse. 123 00:09:45,100 --> 00:09:52,000 It’s not conveniently assembled to track everybody and investigate what they did. 124 00:09:52,100 --> 00:09:55,700 To collect that information is a lot of work 125 00:09:55,800 --> 00:10:01,000 so it’s only done in special cases when it’s necessary. 126 00:10:02,800 --> 00:10:06,000 But computerized surveillance makes it possible 127 00:10:06,100 --> 00:10:09,800 to centralize and index all this information 128 00:10:09,900 --> 00:10:16,900 so that an unjust regime can find it all and find out all about everyone. 129 00:10:17,000 --> 00:10:21,000 If a dictator takes power, which could happen anywhere 130 00:10:21,400 --> 00:10:25,500 people realize this and they recognize 131 00:10:25,600 --> 00:10:31,500 that they should not communicate with other dissidents 132 00:10:31,600 --> 00:10:36,000 in a way that the State could find out about. 133 00:10:36,100 --> 00:10:40,400 But if the dictator has several years of stored records 134 00:10:40,500 --> 00:10:46,000 of who talks with whom, it’s too late to take any precautions then. 135 00:10:46,300 --> 00:10:51,000 Because he already has everything he needs to realize 136 00:10:51,100 --> 00:10:56,000 “OK this guy is a dissident and he spoke with him. Maybe he is a dissident too.” 137 00:10:56,100 --> 00:11:00,100 “Maybe we should grab him and torture him.” 138 00:11:02,000 --> 00:11:11,800 So we need to campaign to put an end to digital surveillance now. 139 00:11:12,000 --> 00:11:17,300 You can’t wait until there is a dictator and it would really matter. 140 00:11:17,600 --> 00:11:26,000 And besides, it doesn’t take an outright dictatorship to start attacking human rights. 141 00:11:27,000 --> 00:11:31,600 I wouldn’t quite call the government of the UK a dictatorship. 142 00:11:31,700 --> 00:11:39,000 It’s not very democratic and one way it crushes democracy is using surveillance. 143 00:11:39,100 --> 00:11:45,000 A few years ago, people believed to be on their way to a protest 144 00:11:45,100 --> 00:11:47,000 they were going to protest. 145 00:11:47,100 --> 00:11:50,000 They were arrested before they could get there 146 00:11:50,100 --> 00:11:58,000 because their car was tracked through this universal car tracking system. 147 00:12:03,900 --> 00:12:07,000 The second threat is censorship. 148 00:12:07,100 --> 00:12:11,700 Censorship is not new, it existed long before computers. 149 00:12:11,800 --> 00:12:17,700 But 15 years ago, we thought that the Internet would protect us from censorship 150 00:12:17,800 --> 00:12:20,700 that it would defeat censorship. 151 00:12:20,800 --> 00:12:25,000 Then, China and some other obvious tyrannies 152 00:12:25,100 --> 00:12:30,800 went to great lengths to impose censorship on the Internet, and we said: 153 00:12:30,900 --> 00:12:34,800 “well that’s not surprising, what else would governments like that do?” 154 00:12:34,900 --> 00:12:39,000 But today we see censorship imposed in countries 155 00:12:39,100 --> 00:12:44,900 that are not normally thought of as dictatorships 156 00:12:45,000 --> 00:12:53,300 such as for instance the UK, France, Spain, Italy, Denmark… 157 00:12:54,400 --> 00:13:00,700 They all have systems of blocking access to some websites. 158 00:13:00,900 --> 00:13:04,000 Denmark established a system 159 00:13:04,100 --> 00:13:10,900 that blocks access to a long list of webpages, which was secret. 160 00:13:11,000 --> 00:13:15,800 The citizens were not supposed to know how the government was censoring them 161 00:13:15,900 --> 00:13:19,800 but the list was leaked, and posted on WikiLeaks. 162 00:13:19,900 --> 00:13:26,000 At that point, Denmark added the WikiLeaks page to its censorship list. 163 00:13:27,500 --> 00:13:30,000 So, the whole rest of the world can find out 164 00:13:30,100 --> 00:13:35,000 how Danes are being censored, but Danes are not supposed to know. 165 00:13:35,900 --> 00:13:43,800 A few months ago, Turkey, which claims to respect some human rights 166 00:13:43,900 --> 00:13:47,000 announced that every Internet user 167 00:13:47,100 --> 00:13:51,000 would have to choose between censorship and more censorship. 168 00:13:51,500 --> 00:13:54,900 Four different levels of censorship they get to choose! 169 00:13:55,000 --> 00:14:02,000 But freedom is not one of the options. 170 00:14:04,400 --> 00:14:09,100 Australia wanted to impose filtering on the Internet but that was blocked. 171 00:14:09,200 --> 00:14:13,000 However Australia has a different kind of censorship. 172 00:14:13,100 --> 00:14:15,900 It has censorship of links. 173 00:14:16,000 --> 00:14:20,500 That is, if a website in Australia has a link 174 00:14:20,600 --> 00:14:23,900 to some censored site outside Australia 175 00:14:24,000 --> 00:14:27,000 the one in Australia can be punished. 176 00:14:27,100 --> 00:14:29,000 Electronic Frontier Australia 177 00:14:29,100 --> 00:14:32,900 which is an organization that defends human rights 178 00:14:33,000 --> 00:14:36,700 in the digital domain in Australia 179 00:14:36,800 --> 00:14:41,200 posted a link to a foreign political website. 180 00:14:41,900 --> 00:14:49,000 It was ordered to delete the link or face a penalty of $11,000 a day. 181 00:14:49,500 --> 00:14:52,000 So they deleted it, what else could they do? 182 00:14:52,100 --> 00:14:55,800 This is a very harsh system of censorship. 183 00:14:55,900 --> 00:15:01,800 In Spain, the censorship that was adopted earlier this year 184 00:15:02,000 --> 00:15:12,700 allows officials to arbitrarily shut down an Internet site in Spain 185 00:15:12,800 --> 00:15:17,400 or impose filtering to block access to a site outside of Spain. 186 00:15:17,500 --> 00:15:22,000 And they can do this without any kind of trial. 187 00:15:22,100 --> 00:15:27,000 This was one of the motivations for the Indignados 188 00:15:29,400 --> 00:15:33,000 who have been protesting in the street. 189 00:15:34,300 --> 00:15:38,800 There were protests in the street in Turkey as well after that announcement 190 00:15:38,900 --> 00:15:42,800 but the government refused to change its policy. 191 00:15:42,900 --> 00:15:46,600 We must recognize that a country 192 00:15:46,700 --> 00:15:50,800 that imposes censorship on the Internet is not a free country. 193 00:15:51,000 --> 00:15:57,000 And is not a legitimate government either. 194 00:16:05,800 --> 00:16:13,300 The next threat to our freedom comes from data formats that restrict the users. 195 00:16:13,900 --> 00:16:17,000 Sometimes it’s because the format is secret. 196 00:16:17,100 --> 00:16:20,000 There are many application programs 197 00:16:20,100 --> 00:16:25,000 that save the user’s data in a secret format 198 00:16:25,900 --> 00:16:28,800 which is meant to prevent the user 199 00:16:28,900 --> 00:16:33,000 from taking that data and using it with some other program. 200 00:16:33,100 --> 00:16:38,000 The goal is to prevent interoperability. 201 00:16:38,700 --> 00:16:45,000 Now evidently, if the program implements a secret format 202 00:16:45,100 --> 00:16:48,800 that’s because the program is not free software. 203 00:16:48,900 --> 00:16:51,900 So this is another kind of malicious feature. 204 00:16:52,000 --> 00:16:55,100 Surveillance is one kind of malicious feature 205 00:16:55,200 --> 00:16:58,900 that you find in some non-free programs; 206 00:16:59,000 --> 00:17:01,900 using secret formats to restrict the users 207 00:17:02,000 --> 00:17:04,900 is another kind of malicious feature 208 00:17:05,000 --> 00:17:09,000 that you also find in some non-free programs. 209 00:17:10,000 --> 00:17:15,000 But if you have a free program that handles a certain format 210 00:17:15,900 --> 00:17:19,000 ipso facto that format is not secret. 211 00:17:19,100 --> 00:17:26,000 This kind of malicious feature can only exist in a non-free program. 212 00:17:26,300 --> 00:17:31,100 Surveillance features could theoretically exist in a free program 213 00:17:31,200 --> 00:17:35,000 but you don’t find them happening. 214 00:17:35,500 --> 00:17:37,900 Because the users would fix it. 215 00:17:38,000 --> 00:17:42,000 The users wouldn’t like this, so they would fix it. 216 00:17:45,000 --> 00:17:53,700 In any case, we also find secret data formats in use for publication of works. 217 00:17:53,900 --> 00:17:58,700 You find secret data formats in use for audio 218 00:17:58,800 --> 00:18:02,800 such as music, for video, for books… 219 00:18:03,000 --> 00:18:11,000 And these secret formats are known as Digital Restrictions Management, or DRM 220 00:18:11,500 --> 00:18:16,400 or digital handcuffs (les menottes numériques). 221 00:18:19,000 --> 00:18:23,200 So, the works are published in secret formats 222 00:18:23,300 --> 00:18:27,900 so that only proprietary programs can play them 223 00:18:28,000 --> 00:18:35,700 so that these proprietary programs can have the malicious feature of restricting the users 224 00:18:35,800 --> 00:18:40,000 stopping them from doing something that would be natural to do. 225 00:18:44,600 --> 00:18:49,900 And this is used even by public entities to communicate with the people. 226 00:18:50,000 --> 00:18:56,400 For instance Italian public television makes its programs available on the net 227 00:18:56,500 --> 00:18:59,000 in a format called VC-1 228 00:18:59,100 --> 00:19:05,000 which is a standard supposedly, but it’s a secret standard. 229 00:19:06,500 --> 00:19:12,000 Now I can’t imagine how any publicly supported entity 230 00:19:12,100 --> 00:19:17,800 could justify using a secret format to communicate with the public. 231 00:19:17,900 --> 00:19:20,800 This should be illegal. 232 00:19:20,900 --> 00:19:25,100 In fact I think all use of Digital Restrictions Management should be illegal. 233 00:19:25,200 --> 00:19:29,000 No company should be allowed to do this. 234 00:19:31,600 --> 00:19:35,700 There are also formats that are not secret 235 00:19:35,800 --> 00:19:41,000 but almost might as well be secret, for instance Flash. 236 00:19:42,500 --> 00:19:49,300 Flash is not actually secret but Adobe keeps making new versions, which are different 237 00:19:49,400 --> 00:19:57,000 faster than anyone can keep up and make free software to play those files. 238 00:19:57,100 --> 00:20:01,000 So it has almost the same effect as being secret. 239 00:20:02,800 --> 00:20:11,100 Then there are the patented formats, such as MP3 for audio. 240 00:20:11,200 --> 00:20:16,100 It’s bad to distribute audio in MP3 format! 241 00:20:16,600 --> 00:20:21,900 There is free software to handle MP3 format, to play it and to generate it 242 00:20:22,000 --> 00:20:25,600 but because it’s patented in many countries 243 00:20:25,700 --> 00:20:31,900 many distributors of free software don’t dare include those programs. 244 00:20:32,000 --> 00:20:35,800 So if they distribute the GNU+Linux system 245 00:20:35,900 --> 00:20:39,800 their system doesn’t include a player for MP3. 246 00:20:39,900 --> 00:20:48,000 As a result if anyone distributes some music in MP3 247 00:20:48,100 --> 00:20:54,700 that’s putting pressure on people not to use GNU/Linux. 248 00:20:54,800 --> 00:20:58,500 Sure, if you’re an expert you can find a free software and install it 249 00:20:58,600 --> 00:21:00,800 but there are lots of non experts 250 00:21:00,900 --> 00:21:04,800 and they might see that they installed a version of GNU/Linux 251 00:21:04,900 --> 00:21:09,800 which doesn’t have that software and it won’t play MP3 files 252 00:21:09,900 --> 00:21:12,500 and they think it’s the system’s fault. 253 00:21:12,600 --> 00:21:18,800 They don’t realize it’s MP3′s fault. But this is the fact. 254 00:21:18,900 --> 00:21:25,300 Therefore, if you want to support freedom, don’t distribute MP3 files. 255 00:21:25,400 --> 00:21:29,900 That’s why I say if you’re recording my speech and you want to distribute copies 256 00:21:30,000 --> 00:21:38,800 don’t do it in a patented format such as MPEG-2, or MPEG-4, or MP3. 257 00:21:38,900 --> 00:21:49,000 Use a format friendly to free software, such as the Ogg format or WebM. 258 00:21:50,500 --> 00:21:54,000 And by the way, if you are going to distribute copies of the recording 259 00:21:54,100 --> 00:22:01,000 please put on it the Creative Commons-No derivatives license. 260 00:22:01,100 --> 00:22:04,000 This is a statement of my personal views. 261 00:22:04,100 --> 00:22:09,000 If it were a lecture for a course, if it were didactic 262 00:22:09,100 --> 00:22:14,000 then it ought to be free, but statements of opinion are different. 263 00:22:23,900 --> 00:22:26,800 Now this leads me to the next threat 264 00:22:26,900 --> 00:22:32,200 which comes from software that the users don’t have control over. 265 00:22:32,900 --> 00:22:37,800 In other words: software that isn’t free, that is not “libre”. 266 00:22:37,900 --> 00:22:42,000 In this particular point French is clearer than English. 267 00:22:42,100 --> 00:22:46,000 The English word free means ‘libre’ and ‘gratuit’ 268 00:22:46,100 --> 00:22:52,800 but what I mean when I say free software is ‘logiciel libre‘. I don’t mean ‘gratuit’. 269 00:22:52,900 --> 00:22:54,900 I’m not talking about price. 270 00:22:55,000 --> 00:23:01,000 Price is a side issue, just a detail, because it doesn't matter ethically. 271 00:23:01,100 --> 00:23:04,000 You know if I have a copy of a program 272 00:23:04,100 --> 00:23:10,100 and I sell it to you for one euro or a hundred euros, who cares? 273 00:23:10,200 --> 00:23:14,000 Why should anyone think that that’s good or bad? 274 00:23:14,100 --> 00:23:20,900 Or suppose I gave it to you ‘gratuitement’… still, who cares? 275 00:23:21,000 --> 00:23:26,800 But whether this program respects your freedom, that’s important! 276 00:23:26,900 --> 00:23:31,500 So free software is software that respects users’ freedom. 277 00:23:31,900 --> 00:23:34,000 What does this mean? 278 00:23:34,100 --> 00:23:37,800 Ultimately there are just two possibilities with software: 279 00:23:37,900 --> 00:23:44,000 either the users control the program or the program controls the users. 280 00:23:44,100 --> 00:23:48,000 If the users have certain essential freedoms 281 00:23:48,100 --> 00:23:51,300 then they control the program 282 00:23:51,400 --> 00:23:57,000 and those freedoms are the criterion for free software. 283 00:23:57,900 --> 00:24:01,800 But if the users don’t fully have the essential freedoms 284 00:24:01,900 --> 00:24:04,900 then the program controls the users. 285 00:24:05,000 --> 00:24:12,000 But somebody controls that program and, through it, has power over the users. 286 00:24:12,100 --> 00:24:16,800 So, a non-free program is an instrument 287 00:24:16,900 --> 00:24:21,700 to give somebody power over a lot of other people 288 00:24:21,800 --> 00:24:26,300 and this is unjust power that nobody should ever have. 289 00:24:26,400 --> 00:24:36,600 This is why non-free software, les logiciels privateurs, qui privent de la liberté 290 00:24:37,000 --> 00:24:42,000 why proprietary software is an injustice and should not exist? 291 00:24:43,000 --> 00:24:46,900 Because it leaves the users without freedom. 292 00:24:47,000 --> 00:24:51,800 Now, the developer who has control of the program 293 00:24:51,900 --> 00:24:56,900 often feels tempted to introduce malicious features 294 00:24:57,000 --> 00:25:01,600 to further exploit or abuse those users. 295 00:25:01,700 --> 00:25:05,400 He feels a temptation because he knows he can get away with it: 296 00:25:05,500 --> 00:25:08,800 because his program controls the users 297 00:25:08,900 --> 00:25:11,700 and the users do not have control of the program. 298 00:25:11,800 --> 00:25:16,600 If he puts in a malicious feature, the users can’t fix it; 299 00:25:16,700 --> 00:25:19,600 they can’t remove the malicious feature. 300 00:25:19,700 --> 00:25:22,800 I’ve already told you about two kinds of malicious features: 301 00:25:22,900 --> 00:25:26,800 surveillance features, such as are found in Windows 302 00:25:26,900 --> 00:25:32,100 and the iPhone and Flash player and the “Swindle”. 303 00:25:35,000 --> 00:25:40,000 And there are also features to restrict users 304 00:25:40,200 --> 00:25:42,800 which work with secret data formats 305 00:25:42,900 --> 00:25:49,800 and those are found in Windows, Macintosh, the iPhone, Flash player 306 00:25:49,900 --> 00:25:58,000 the Amazon “Swindle”, the Playstation 3 and lots and lots of other programs. 307 00:26:00,000 --> 00:26:04,000 The other kind of malicious feature is the backdoor. 308 00:26:04,100 --> 00:26:07,000 That means something in that program 309 00:26:07,100 --> 00:26:11,600 is listening for remote commands and obeying them 310 00:26:11,700 --> 00:26:16,000 and those commands can mistreat the user. 311 00:26:16,100 --> 00:26:26,000 We know of backdoors in Windows, in the iPhone, in the Amazon “Swindle”. 312 00:26:26,700 --> 00:26:33,800 The Amazon “Swindle” has a backdoor that can remotely delete books. 313 00:26:33,900 --> 00:26:38,900 We know this by observation, because Amazon did it: 314 00:26:39,000 --> 00:26:46,900 in 2009 Amazon remotely deleted thousands of copies of a particular book. 315 00:26:47,000 --> 00:26:52,900 Those were authorized copies, people had obtain them directly from Amazon 316 00:26:53,000 --> 00:26:58,200 and thus Amazon knew exactly where they were. 317 00:26:58,800 --> 00:27:03,700 Which is how Amazon knew where to send the commands to delete those books. 318 00:27:03,800 --> 00:27:11,800 You know which book Amazon deleted? 319 00:27:12,000 --> 00:27:18,000 It’s a book everyone should read because it discusses a totalitarian state 320 00:27:18,100 --> 00:27:22,100 that did things like delete books it didn’t like. 321 00:27:22,700 --> 00:27:28,000 Everybody should read it, but not on the Amazon “Swindle”. 322 00:27:31,000 --> 00:27:39,900 Anyway, malicious features are present in the most widely used non-free programs 323 00:27:40,000 --> 00:27:46,800 but they are rare in free software, because with free software the users have control: 324 00:27:47,000 --> 00:27:50,000 they can read the source code and they can change it. 325 00:27:50,100 --> 00:27:53,900 So, if there were a malicious feature 326 00:27:54,000 --> 00:27:58,000 somebody would sooner or later spot it and fix it. 327 00:27:58,100 --> 00:28:01,800 This means that somebody who is considering 328 00:28:01,900 --> 00:28:06,300 introducing a malicious feature does not find it so tempting 329 00:28:06,400 --> 00:28:09,800 because he knows he might get away with it for a while 330 00:28:09,900 --> 00:28:12,900 but somebody will spot it, will fix it 331 00:28:13,000 --> 00:28:18,200 and everybody will loose trust in the perpetrator. 332 00:28:18,900 --> 00:28:23,400 It’s not so tempting when you know you’re going to fail. 333 00:28:23,800 --> 00:28:29,000 And that’s why we find that malicious features are rare in free software 334 00:28:29,000 --> 00:28:34,000 and common in proprietary software. 335 00:28:35,000 --> 00:28:39,600 Now the essential freedoms are four. 336 00:28:39,700 --> 00:28:44,000 Freedom 0 is the freedom to run the program as you wish. 337 00:28:44,100 --> 00:28:49,800 Freedom 1 is the freedom to study the source code and change it 338 00:28:49,900 --> 00:28:54,000 so the program does your computing the way you wish. 339 00:28:54,800 --> 00:28:58,000 Freedom 2 is the freedom to help others. 340 00:28:58,100 --> 00:29:03,600 That’s the freedom to make exact copies and redistribute them when you wish. 341 00:29:03,700 --> 00:29:09,000 Freedom 3 is the freedom to contribute to your community. 342 00:29:09,100 --> 00:29:13,700 That’s the freedom to make copies of your modified versions 343 00:29:13,800 --> 00:29:20,800 if you have made any, and then distribute them to others when you wish. 344 00:29:21,000 --> 00:29:27,700 These freedoms, in order to be adequate, must apply to all activities of life. 345 00:29:27,800 --> 00:29:34,000 For instance if it says: “This is free for academic use”, it’s not free. 346 00:29:34,100 --> 00:29:38,400 Because that’s too limited. It doesn’t apply to all areas of life. 347 00:29:38,500 --> 00:29:42,000 In particular, if a program is free 348 00:29:42,100 --> 00:29:47,900 that means it can be modified and distributed commercially 349 00:29:48,000 --> 00:29:53,000 because commerce is an area of life, an activity in life. 350 00:29:53,100 --> 00:29:56,900 And this freedom has to apply to all activities. 351 00:29:57,000 --> 00:30:03,700 Now however, it’s not obligatory to do any of these things. 352 00:30:03,800 --> 00:30:07,900 The point is you’re free to do them if you wish, when you wish. 353 00:30:08,000 --> 00:30:12,600 But you never have to do them. You don’t have to do any of them. 354 00:30:12,700 --> 00:30:14,600 You don’t have to run the program. 355 00:30:14,700 --> 00:30:17,000 You don’t have to study or change the source code. 356 00:30:17,100 --> 00:30:20,000 You don’t have to make any copies. 357 00:30:20,100 --> 00:30:22,800 You don’t have to distribute your modified versions. 358 00:30:22,900 --> 00:30:28,000 The point is you should be free to do those things if you wish. 359 00:30:29,000 --> 00:30:34,000 Now, freedom number 1, the freedom to study and change the source code 360 00:30:34,100 --> 00:30:37,900 to make the program do your computing as you wish 361 00:30:38,000 --> 00:30:41,900 includes something that might not be obvious at first. 362 00:30:42,000 --> 00:30:46,200 If the program comes in a product 363 00:30:47,000 --> 00:30:51,900 and a developer can provide an upgrade that will run 364 00:30:52,000 --> 00:30:56,800 then you have to be able to make your version run in that product. 365 00:30:56,900 --> 00:31:00,900 If the product would only run the developer’s versions 366 00:31:01,000 --> 00:31:07,000 and refuses to run yours, the executable in that product is not free software. 367 00:31:07,300 --> 00:31:10,800 Even if it was compiled from free source code 368 00:31:10,900 --> 00:31:13,800 it’s not free because you don’t have the freedom 369 00:31:13,900 --> 00:31:18,000 to make the program do your computing the way you wish. 370 00:31:18,500 --> 00:31:23,000 So, freedom 1 has to be real, not just theoretical. 371 00:31:23,100 --> 00:31:27,000 It has to include the freedom to use your version 372 00:31:27,100 --> 00:31:31,800 not just the freedom to make some source code that won’t run. 373 00:31:33,000 --> 00:31:37,000 I launched the free software movement in 1983 374 00:31:37,500 --> 00:31:40,000 when I announced the plan to develop 375 00:31:40,100 --> 00:31:44,400 a free software operating system whose name is GNU. 376 00:31:45,400 --> 00:31:50,000 Now GNU, the name GNU, is a joke. 377 00:31:51,500 --> 00:31:54,000 Because part of the hacker’s spirit 378 00:31:54,100 --> 00:31:58,800 is to have fun even when you’re doing something very serious. 379 00:31:58,900 --> 00:32:06,800 Now I can’t think of anything more seriously important than defending freedom. 380 00:32:11,800 --> 00:32:16,000 But that didn’t mean I couldn’t give my system a name that’s a joke. 381 00:32:20,000 --> 00:32:24,000 So GNU is a joke because it’s a recursive acronym 382 00:32:24,100 --> 00:32:31,000 it stands for “GNU is Not Unix”, so G.N.U.: GNU’s Not Unix. 383 00:32:31,100 --> 00:32:35,000 So the G in GNU stands for GNU. 384 00:32:36,000 --> 00:32:39,000 Now in fact this was a tradition at the time. 385 00:32:39,100 --> 00:32:43,900 The tradition was: if there was an existing program 386 00:32:44,000 --> 00:32:48,500 and you wrote something similar to it, inspired by it 387 00:32:48,600 --> 00:32:52,500 you could give credit by giving your program a name 388 00:32:52,600 --> 00:32:57,200 that’s a recursive acronym saying it’s not the other one. 389 00:32:58,000 --> 00:33:03,000 So I gave credit to Unix for the technical ideas of Unix 390 00:33:03,300 --> 00:33:09,700 but with the name GNU, because I decided to make GNU a Unix-like system 391 00:33:09,800 --> 00:33:15,700 with the same commands, the same system calls so that it would be compatible 392 00:33:15,800 --> 00:33:19,800 so that people who used Unix can switch over easily. 393 00:33:19,900 --> 00:33:23,800 But the reason for developing GNU, that was unique. 394 00:33:23,900 --> 00:33:28,600 GNU is the only operating system, as far as I know 395 00:33:28,700 --> 00:33:33,300 ever developed for the purpose of freedom. 396 00:33:33,400 --> 00:33:37,700 Not for technical motivations, not for commercial motivations. 397 00:33:37,800 --> 00:33:41,000 GNU was written for your freedom. 398 00:33:41,100 --> 00:33:44,800 Because without a free operating system 399 00:33:44,900 --> 00:33:49,300 it’s impossible to have freedom and use a computer. 400 00:33:49,900 --> 00:33:54,000 And there were none, and I wanted people to have freedom 401 00:33:54,100 --> 00:33:57,000 so it was up to me to write one. 402 00:33:57,100 --> 00:34:00,900 Nowadays there are millions of users of the GNU operating system 403 00:34:01,000 --> 00:34:05,800 and most of them don’t know they are using the GNU operating system 404 00:34:05,900 --> 00:34:10,000 because there is a widespread practice which is not nice. 405 00:34:10,100 --> 00:34:13,600 People call the system “Linux”. 406 00:34:13,700 --> 00:34:18,800 Many do, but some people don’t and I hope you’ll be one of them. 407 00:34:18,900 --> 00:34:22,400 Please, since we started this 408 00:34:22,500 --> 00:34:25,300 since we wrote the biggest piece of the code 409 00:34:25,400 --> 00:34:28,000 please give us equal mention 410 00:34:28,100 --> 00:34:36,800 please call the system GNU+Linux or GNU/Linux. It’s not much to ask! 411 00:34:37,300 --> 00:34:40,000 But there is another reason to do this. 412 00:34:40,100 --> 00:34:44,600 It turns out that the person who wrote Linux 413 00:34:44,700 --> 00:34:48,700 which is one component of the system as we use it today 414 00:34:48,900 --> 00:34:52,000 he doesn’t agree with the free software movement. 415 00:34:52,900 --> 00:34:56,800 And so if you call the whole system Linux 416 00:34:56,900 --> 00:35:03,500 in effect you’re steering people towards his ideas and away from our ideas. 417 00:35:03,600 --> 00:35:07,800 Because he’s not gonna say to them that they deserve freedom. 418 00:35:07,900 --> 00:35:15,000 He’s going to say to them that he likes convenient, reliable, powerful software. 419 00:35:15,100 --> 00:35:19,000 He’s going to tell people that those are the important values. 420 00:35:19,100 --> 00:35:26,700 But if you tell them the system is GNU+Linux, the GNU operating system plus Linux the kernel 421 00:35:26,800 --> 00:35:32,300 then they’ll know about us and then they might listen to what we say. 422 00:35:33,000 --> 00:35:41,800 You deserve freedom, and since freedom will be lost if we don’t defend it — 423 00:35:41,900 --> 00:35:46,200 there’s always going to be a Sarkozy to take it away — 424 00:35:47,900 --> 00:35:52,800 we need above all to teach people to demand freedom 425 00:35:52,900 --> 00:35:56,000 to be ready to stand up for their freedom 426 00:35:56,800 --> 00:36:03,000 the next time someone threatens to take it away. 427 00:36:10,000 --> 00:36:15,900 Nowadays, you can tell who doesn't want to discuss these ideas of freedom 428 00:36:16,000 --> 00:36:19,000 because they don’t say “logiciel libre”. 429 00:36:19,100 --> 00:36:22,900 They don’t say “libre”, they say “open source”. 430 00:36:23,000 --> 00:36:26,900 That term was coined by the people like Mr Torvalds 431 00:36:27,000 --> 00:36:31,800 who would prefer that these ethical issues don’t get raised. 432 00:36:31,900 --> 00:36:36,900 And so the way you can help us raise them is by saying libre. 433 00:36:37,000 --> 00:36:41,800 You know, it’s up to you where you stand you’re free to say what you think. 434 00:36:41,900 --> 00:36:45,000 If you agree with them, you can say open source. 435 00:36:45,000 --> 00:36:49,000 If you agree with us, show it: say libre! 436 00:36:51,900 --> 00:36:55,900 Now the most important point about free software 437 00:36:56,000 --> 00:37:02,000 is that schools must teach exclusively free software. 438 00:37:02,100 --> 00:37:05,900 All levels of schools from kindergarten to university 439 00:37:06,000 --> 00:37:13,900 it’s their moral responsibility to teach only free software in their education 440 00:37:14,000 --> 00:37:17,000 and all other educational activities as well 441 00:37:17,100 --> 00:37:23,000 including those that say that they’re spreading digital literacy. 442 00:37:23,100 --> 00:37:30,000 A lot of those activities teach Windows, which means they’re teaching dependence. 443 00:37:30,100 --> 00:37:35,000 To teach people the use of proprietary software is to teach dependence 444 00:37:36,000 --> 00:37:43,000 and educational activities must never do that because it’s the opposite of their mission. 445 00:37:43,600 --> 00:37:49,500 Educational activities have a social mission to educate good citizens 446 00:37:49,600 --> 00:37:57,500 of a strong, capable, cooperating, independent and free society. 447 00:37:57,900 --> 00:38:03,300 And in the area of computing, that means: teach free software. 448 00:38:04,000 --> 00:38:11,000 Never teach a proprietary program because that’s inculcating dependence. 449 00:38:11,200 --> 00:38:17,900 Why do you think some proprietary developers offer gratis copies to schools? 450 00:38:18,000 --> 00:38:23,000 They want the schools to make the children dependent. 451 00:38:23,200 --> 00:38:28,000 And then, when they graduate, they’re still dependent 452 00:38:28,100 --> 00:38:32,500 and you know the company is not going to offer them gratis copies. 453 00:38:33,000 --> 00:38:37,900 And some of them get jobs and go to work for companies. 454 00:38:38,000 --> 00:38:42,000 Not many of them anymore, but some of them. 455 00:38:42,100 --> 00:38:46,800 And those companies are not going to be offered gratis copies. 456 00:38:46,900 --> 00:38:50,800 Oh no! The idea is if the school directs the students 457 00:38:50,900 --> 00:38:53,500 down the path of permanent dependence 458 00:38:53,600 --> 00:38:57,900 they can drag the rest of society with them into dependence. 459 00:38:58,000 --> 00:39:03,500 That’s the plan! It’s just like giving the school gratis needles 460 00:39:03,600 --> 00:39:06,900 full of addicting drugs, saying 461 00:39:07,000 --> 00:39:11,100 “inject this into your students, the first dose is gratis.” 462 00:39:11,900 --> 00:39:15,000 Once you’re dependent, then you have to pay. 463 00:39:15,100 --> 00:39:18,000 Well, the school would reject the drugs 464 00:39:18,000 --> 00:39:21,800 because it isn’t right to teach the students to use addictive drugs 465 00:39:21,900 --> 00:39:26,900 and it’s got to reject the proprietary software also. 466 00:39:27,000 --> 00:39:34,000 Some people say “let’s have the school teach both proprietary software and free software” 467 00:39:34,400 --> 00:39:37,800 “so the students become familiar with both.” 468 00:39:37,900 --> 00:39:44,400 That’s like saying “for lunch lets give the kids spinach and tobacco” 469 00:39:44,500 --> 00:39:47,800 “so that they become accustomed to both.” 470 00:39:47,900 --> 00:39:54,400 No! The schools are only supposed to teach good habits, not bad ones! 471 00:39:55,000 --> 00:39:59,700 So there should be no Windows in a school 472 00:39:59,800 --> 00:40:05,400 no Macintosh, nothing proprietary in the education. 473 00:40:05,800 --> 00:40:10,000 But also, for the sake of educating good programmers. 474 00:40:10,100 --> 00:40:14,800 You see, some people have a talent for programming. 475 00:40:14,900 --> 00:40:19,800 At ten to thirteen years old, typically, they’re fascinated 476 00:40:19,900 --> 00:40:24,000 and if they use a program, they want to know “how does it do this?” 477 00:40:24,100 --> 00:40:28,800 But when they ask the teacher, if it’s proprietary, the teacher has to say 478 00:40:28,900 --> 00:40:31,800 “I’m sorry, it’s a secret, we can’t find out.” 479 00:40:31,900 --> 00:40:35,100 Which means education is forbidden. 480 00:40:35,500 --> 00:40:40,400 A proprietary program is the enemy of the spirit of education. 481 00:40:40,500 --> 00:40:45,900 It’s knowledge withheld, so it should not be tolerated in a school 482 00:40:46,000 --> 00:40:49,600 even though there may be plenty of people in the school 483 00:40:49,700 --> 00:40:53,300 who don’t care about programming, don’t want to learn this. 484 00:40:53,400 --> 00:40:57,800 Still, because it’s the enemy of the spirit of education 485 00:40:57,900 --> 00:41:00,800 it shouldn’t be there in the school. 486 00:41:00,900 --> 00:41:04,800 But if the program is free, the teacher can explain what he knows 487 00:41:04,900 --> 00:41:07,800 and then give out copies of the source code, saying: 488 00:41:07,900 --> 00:41:10,600 “read it and you’ll understand everything.” 489 00:41:10,700 --> 00:41:13,800 And those who are really fascinated, they will read it! 490 00:41:13,900 --> 00:41:19,700 And this gives them an opportunity to start to learn how to be good programmers. 491 00:41:19,800 --> 00:41:24,000 To learn to be a good programmer, you’ll need to recognize 492 00:41:24,100 --> 00:41:30,300 that certain ways of writing code, even if they make sense to you and they are correct 493 00:41:30,400 --> 00:41:35,000 they’re not good because other people will have trouble understanding them. 494 00:41:35,100 --> 00:41:40,000 Good code is clear code that others will have an easy time working on 495 00:41:40,100 --> 00:41:43,000 when they need to make further changes. 496 00:41:43,100 --> 00:41:46,000 How do you learn to write good clear code? 497 00:41:46,100 --> 00:41:49,700 You do it by reading lots of code, and writing lots of code. 498 00:41:49,800 --> 00:41:53,000 And only free software offers the chance 499 00:41:53,100 --> 00:41:58,500 to read the code of large programs that we really use. 500 00:41:58,600 --> 00:42:02,600 And then you have to write lots of code 501 00:42:02,700 --> 00:42:06,000 which means you have to write changes in large programs. 502 00:42:06,000 --> 00:42:09,900 How do you learn to write good code for large programs? 503 00:42:10,000 --> 00:42:15,800 You have to start small, which does not mean small programs, oh no! 504 00:42:15,900 --> 00:42:22,800 The challenges of the code for large programs don’t even begin to appear in small programs. 505 00:42:22,900 --> 00:42:26,800 So the way you start small at writing code for large programs 506 00:42:26,900 --> 00:42:31,300 is by writing small changes in large programs. 507 00:42:31,600 --> 00:42:35,000 And only free software gives you the chance to do that! 508 00:42:35,100 --> 00:42:43,800 So, if a school wants to offer the possibility of learning to be a good programmer 509 00:42:43,900 --> 00:42:46,800 it needs to be a free software school. 510 00:42:46,900 --> 00:42:49,100 But there is an even deeper reason 511 00:42:49,200 --> 00:42:52,800 and that is for the sake of moral education 512 00:42:52,900 --> 00:42:55,700 education in citizenship. 513 00:42:55,800 --> 00:42:59,800 It’s not enough for a school to teach facts and skills 514 00:42:59,900 --> 00:43:07,000 it has to teach the spirit of goodwill, the habit of helping others. 515 00:43:07,100 --> 00:43:10,000 Therefore, every class should have this rule: 516 00:43:10,100 --> 00:43:15,000 “Students, if you bring software to class, you may not keep it for yourself” 517 00:43:15,100 --> 00:43:18,900 ”you must share copies with the rest of the class” 518 00:43:19,000 --> 00:43:24,400 ”including the source code in case anyone here wants to learn!” 519 00:43:24,600 --> 00:43:28,000 ”Because this class is a place where we share our knowledge.” 520 00:43:28,100 --> 00:43:34,500 ”Therefore, bringing a proprietary program to class is not permitted.” 521 00:43:34,900 --> 00:43:39,800 The school must follow its own rule to set a good example. 522 00:43:39,900 --> 00:43:43,700 Therefore, the school must bring only free software to class 523 00:43:43,800 --> 00:43:49,600 and share copies, including the source code with anyone in the class that wants copies. 524 00:43:50,400 --> 00:43:53,800 Those of you who have a connection with a school 525 00:43:53,900 --> 00:44:01,400 it’s your duty to campaign and pressure that school to move to free software. 526 00:44:01,900 --> 00:44:04,000 And you have to be firm. 527 00:44:04,100 --> 00:44:10,700 It may take years, but you can succeed as long as you never give up. 528 00:44:10,800 --> 00:44:18,000 Keep seeking more allies among the students, the faculty, the staff, the parents, anyone! 529 00:44:18,600 --> 00:44:22,900 And always bring it up as an ethical issue. 530 00:44:23,000 --> 00:44:26,000 If someone else wants to sidetrack the discussion 531 00:44:26,100 --> 00:44:30,800 into this practical advantage and this practical disadvantage 532 00:44:30,900 --> 00:44:35,900 which means they’re ignoring the most important question, then you have to say: 533 00:44:36,000 --> 00:44:41,800 “this is not about how to do the best job of educating“ 534 00:44:41,900 --> 00:44:48,000 “this is about how to do a good education instead of an evil one.“ 535 00:44:48,200 --> 00:44:53,800 “It’s how to do education right instead of wrong“ 536 00:44:53,900 --> 00:44:58,800 “not just how to make it a little more effective or less.” 537 00:44:59,000 --> 00:45:06,000 So don’t get distracted with those secondary issues and ignore what really matters! 538 00:45:07,000 --> 00:45:12,000 So, moving on to the next menace. 539 00:45:12,500 --> 00:45:20,600 There are two issues that arise from the use of internet services. 540 00:45:20,700 --> 00:45:26,900 One of them is that the server could abuse your data 541 00:45:27,000 --> 00:45:31,800 and another is that it could take control of your computing. 542 00:45:31,900 --> 00:45:35,800 The first issue, people already know about. 543 00:45:35,900 --> 00:45:41,800 They are aware that, if you upload data to an internet service 544 00:45:41,900 --> 00:45:44,900 there is a question of what it will do with that data. 545 00:45:45,000 --> 00:45:48,000 It might do things that mistreat you. 546 00:45:48,100 --> 00:45:53,800 What could it do? It could lose the data, it could change the data 547 00:45:53,900 --> 00:45:57,900 it could refuse to let you get the data back. 548 00:45:58,000 --> 00:46:04,000 And it could also show the data to someone else you don’t want to show it to. 549 00:46:04,200 --> 00:46:07,000 Four different possible things. 550 00:46:07,100 --> 00:46:13,000 Now, here, I’m talking about the data that you knowingly gave to that site. 551 00:46:13,100 --> 00:46:19,000 Of course, many of those services do surveillance as well. 552 00:46:19,300 --> 00:46:22,000 For instance, consider Facebook. 553 00:46:22,100 --> 00:46:28,000 Users send lots of data to Facebook, and one of the bad things about Facebook 554 00:46:28,100 --> 00:46:33,000 is that it shows a lot of that data to lots of other people 555 00:46:33,100 --> 00:46:40,800 and even if it offers them a setting to say “no!”, that may not really work. 556 00:46:40,900 --> 00:46:45,900 After all, if you say “some other people can see this piece of information,” 557 00:46:46,000 --> 00:46:48,400 one of them might publish it. 558 00:46:48,500 --> 00:46:50,400 Now, that’s not Facebook’s fault 559 00:46:50,500 --> 00:46:54,200 there is nothing they could do to prevent that but it ought to warn people. 560 00:46:54,300 --> 00:46:59,800 Instead of saying “mark this as only to your so-called friends” 561 00:46:59,900 --> 00:47:05,900 “it should say “keep in mind that your so-called friends are not really your friends” 562 00:47:06,000 --> 00:47:10,800 “and if they want to make trouble for you, they could publish this.” 563 00:47:10,900 --> 00:47:17,000 Every time, it should say that, if they want to deal with people ethically. 564 00:47:21,500 --> 00:47:26,000 As well as all the data users of Facebook voluntarily give to Facebook 565 00:47:26,000 --> 00:47:32,700 Facebook is collecting through data about people’s activities on the net 566 00:47:32,800 --> 00:47:38,600 through various methods of surveillance. But that was the first menace. 567 00:47:38,700 --> 00:47:45,000 For now I am talking about the data that people know they are giving to these sites. 568 00:47:47,000 --> 00:47:54,200 Losing data is something that could always happen by accident. 569 00:47:54,400 --> 00:47:59,000 That possibility is always there, no matter how careful someone is. 570 00:47:59,100 --> 00:48:04,000 Therefore, you need to keep multiple copies of data that matters. 571 00:48:04,100 --> 00:48:12,000 If you do that, then, even if someone decided to delete your data intentionally 572 00:48:12,100 --> 00:48:16,000 it wouldn’t hurt you that much, because you’d have other copies of it. 573 00:48:16,100 --> 00:48:19,800 So, as long as you are maintaining multiple copies 574 00:48:19,900 --> 00:48:25,000 you don’t have to worry too much about someone’s losing your data. 575 00:48:25,600 --> 00:48:29,600 What about whether you can get it back. 576 00:48:29,700 --> 00:48:35,700 Well, some services make it possible to get back all the data that you sent, and some don’t. 577 00:48:35,800 --> 00:48:41,800 Google services will let the user get back the data the user has put into them. 578 00:48:41,900 --> 00:48:45,200 Facebook, famously, does not. 579 00:48:45,600 --> 00:48:51,900 Of course in the case of Google, this only applies to the data the user knows Google has. 580 00:48:52,000 --> 00:48:57,000 Google does lots of surveillance, too and that data is not included. 581 00:48:58,800 --> 00:49:02,600 But in any case, if you can get the data back 582 00:49:02,700 --> 00:49:07,500 then you could track whether they have altered it. 583 00:49:07,600 --> 00:49:13,000 And they are not very likely to start altering people’s data if the people can tell. 584 00:49:13,100 --> 00:49:18,900 So maybe we can keep a track on that particular kind of abuse. 585 00:49:19,000 --> 00:49:24,400 But the abuse of showing the data to someone you don’t want it to be shown to 586 00:49:24,500 --> 00:49:29,000 is very common and almost impossible for you to prevent 587 00:49:29,600 --> 00:49:33,100 especially if it’s a US company. 588 00:49:33,300 --> 00:49:40,000 You see, the most hypocritically named law in US history 589 00:49:40,100 --> 00:49:49,900 the so-called USA Patriot Act, says that Big Brother’s police 590 00:49:50,000 --> 00:49:56,000 can collect just about all the data that companies maintain about individuals. 591 00:49:56,100 --> 00:50:01,700 Not just companies, but other organizations too, like public libraries. 592 00:50:01,800 --> 00:50:07,700 The police can get this massively, without even going to court. 593 00:50:07,900 --> 00:50:13,000 Now, in a country that was founded on an idea of freedom 594 00:50:13,100 --> 00:50:19,000 there is nothing more unpatriotic than this. But this is what they did. 595 00:50:19,100 --> 00:50:24,800 So you mustn’t ever trust any of your data to a US company. 596 00:50:24,900 --> 00:50:32,000 And they say that foreign subsidiaries of US companies are subject to this as well 597 00:50:32,100 --> 00:50:36,000 so the company you are directly dealing with may be in Europe 598 00:50:36,000 --> 00:50:43,000 but if it’s owned by a US company, you got the same problem to deal with. 599 00:50:48,800 --> 00:50:52,800 However, this is mainly a concern 600 00:50:52,900 --> 00:50:59,700 when the data you are sending to the service is not for publication. 601 00:50:59,700 --> 00:51:03,000 There are some services where you publish things. 602 00:51:03,100 --> 00:51:07,800 Of course, if you publish something, you know everybody is gonna be able to see it. 603 00:51:07,900 --> 00:51:10,300 So, there is no way they can hurt you 604 00:51:10,400 --> 00:51:13,100 by showing it to somebody who wasn’t supposed to see it. 605 00:51:13,200 --> 00:51:17,700 There is nobody who wasn’t supposed to see it if you published it. 606 00:51:17,800 --> 00:51:22,000 So in that case the problem doesn’t exist. 607 00:51:23,500 --> 00:51:32,000 So these are four sub-issues of this one threat of abusing our data. 608 00:51:32,100 --> 00:51:38,800 The idea of the Freedom Box project is you have your own server in your own home 609 00:51:38,900 --> 00:51:43,000 and when you want to do something remotely you do it with your own server 610 00:51:43,100 --> 00:51:48,800 and the police have to get a court order in order to search your server. 611 00:51:48,900 --> 00:51:56,000 So you have the same rights this way that you would have traditionally in the physical world. 612 00:51:56,300 --> 00:52:02,000 The point here and in so many other issues is: 613 00:52:02,100 --> 00:52:06,400 as we start doing things digitally instead of physically 614 00:52:06,500 --> 00:52:15,000 we shouldn’t lose any of our rights, because the general tendency is that we do lose rights. 615 00:52:18,200 --> 00:52:25,000 Basically, Stallman’s law says 616 00:52:25,100 --> 00:52:31,700 that in an epoch when governments work for the mega-corporations 617 00:52:31,800 --> 00:52:36,000 instead of reporting to their citizens 618 00:52:36,100 --> 00:52:45,000 every technological change can be taken advantage of to reduce our freedom. 619 00:52:47,000 --> 00:52:51,200 Because reducing our freedom is what these governments want to do. 620 00:52:52,000 --> 00:52:55,000 So the question is: when do they get an opportunity? 621 00:52:55,100 --> 00:53:01,600 Well, any change that happens for some other reason is a possible opportunity 622 00:53:01,700 --> 00:53:07,000 and they will take advantage of it if that’s their general desire. 623 00:53:09,500 --> 00:53:12,400 But the other issue with internet services 624 00:53:12,500 --> 00:53:16,000 is that they can take control of your computing 625 00:53:16,100 --> 00:53:22,000 and that’s not so commonly known. But It’s becoming more common. 626 00:53:22,100 --> 00:53:29,700 There are services that offer to do computing for you on data supplied by you 627 00:53:30,000 --> 00:53:34,800 things that you should do in your own computer 628 00:53:34,900 --> 00:53:41,000 but they invite you to let somebody else’s computer do that computing work for you. 629 00:53:41,300 --> 00:53:49,200 And the result is you lose control over it. It’s just as if you used a non-free program. 630 00:53:49,700 --> 00:53:55,800 Two different scenarios but they lead to the same problem. 631 00:53:55,900 --> 00:54:01,000 If you do your computing with a non-free program 632 00:54:01,100 --> 00:54:05,000 well, the users don’t control the non-free program 633 00:54:05,100 --> 00:54:08,000 it controls the users, which would include you. 634 00:54:08,100 --> 00:54:12,000 So you’ve lost control of the computing that’s being done. 635 00:54:12,100 --> 00:54:17,000 But if you do your computing in his server 636 00:54:17,100 --> 00:54:22,800 well, the programs that are doing it are the ones he chose. 637 00:54:22,900 --> 00:54:27,800 You can’t touch them or see them, so you have no control over them. 638 00:54:27,900 --> 00:54:31,000 He has control over them, maybe. 639 00:54:31,100 --> 00:54:36,000 If they are free software and he installs them then he has control over them. 640 00:54:36,100 --> 00:54:38,800 But even he might not have control. 641 00:54:38,900 --> 00:54:42,200 He might be running a proprietary program in his server 642 00:54:42,300 --> 00:54:49,400 in which case it’s somebody else who has control of the computing being done in his server. 643 00:54:49,500 --> 00:54:52,000 He doesn’t control it and you don’t. 644 00:54:52,300 --> 00:54:55,500 But suppose he installs a free program 645 00:54:55,600 --> 00:55:02,000 then he has control over the computing being done in his computer, but you don’t. 646 00:55:02,100 --> 00:55:05,000 So, either way, you don’t! 647 00:55:05,100 --> 00:55:08,000 So the only way to have control over your computing 648 00:55:08,100 --> 00:55:14,800 is to do it with your copy of a free program. 649 00:55:15,800 --> 00:55:20,000 This practice is called “Software as a Service”. 650 00:55:20,400 --> 00:55:28,200 It means doing your computing with your data in somebody else’s server. 651 00:55:28,300 --> 00:55:32,200 And I don’t know of anything that can make this acceptable. 652 00:55:32,300 --> 00:55:37,000 It’s always something that takes away your freedom 653 00:55:37,100 --> 00:55:41,400 and the only solution I know of is to refuse. 654 00:55:41,800 --> 00:55:47,800 For instance, there are servers that will do translation or voice recognition 655 00:55:47,900 --> 00:55:53,800 and you are letting them have control over this computing activity 656 00:55:53,900 --> 00:55:56,000 which we shouldn’t ever do. 657 00:55:56,100 --> 00:55:59,000 Of course, we are also giving them data about ourselves 658 00:55:59,100 --> 00:56:02,000 which they shouldn’t have. 659 00:56:02,100 --> 00:56:06,400 Imagine if you had a conversation with somebody 660 00:56:06,500 --> 00:56:13,100 through a voice-recognition translation system that was Software as as Service 661 00:56:13,200 --> 00:56:18,000 and it’s really running on a server belonging to some company. 662 00:56:18,100 --> 00:56:24,000 That company also gets to know what was said in the conversation 663 00:56:24,100 --> 00:56:32,000 and if it’s a US company that means Big Brother also gets to know. This is no good. 664 00:56:35,700 --> 00:56:44,000 The next threat to our freedom in a digital society is using computers for voting. 665 00:56:46,000 --> 00:56:50,700 You can’t trust computers for voting. 666 00:56:50,800 --> 00:56:54,000 Whoever controls the software in those computers 667 00:56:54,100 --> 00:57:00,000 has the power to commit undetectable fraud. 668 00:57:02,000 --> 00:57:10,700 Elections are special. Because there’s nobody involved that we dare trust fully. 669 00:57:10,900 --> 00:57:15,000 Everybody has to be checked, crosschecked by others 670 00:57:15,100 --> 00:57:21,700 so that nobody is in the position to falsify the results by himself. 671 00:57:21,800 --> 00:57:26,300 Because if anybody is in a position to do that he might do it! 672 00:57:26,400 --> 00:57:31,000 So our traditional systems for voting were designed 673 00:57:31,100 --> 00:57:37,200 so that nobody was fully trusted, everybody was being checked by others. 674 00:57:37,300 --> 00:57:42,000 So that nobody could easily commit fraud. 675 00:57:42,000 --> 00:57:48,300 But once you introduce a program, this is impossible! 676 00:57:48,400 --> 00:57:53,700 How can you tell if a voting machine would honestly count the votes? 677 00:57:53,800 --> 00:57:59,000 You’d have to study the program that’s running in it during the election 678 00:57:59,200 --> 00:58:05,800 which of course nobody can do, and most people wouldn’t even know how to do. 679 00:58:05,900 --> 00:58:10,800 But even the experts who might theoretically be capable of studying the program 680 00:58:10,900 --> 00:58:15,400 they can’t do it while people are voting. 681 00:58:15,500 --> 00:58:18,000 They’d have to do it in advance 682 00:58:18,100 --> 00:58:21,700 and then how do they know that the program they studied 683 00:58:21,800 --> 00:58:26,900 is the one that’s running while people vote? Maybe it’s been changed. 684 00:58:27,000 --> 00:58:34,000 Now, if this program is proprietary, that means some company controls it. 685 00:58:34,100 --> 00:58:38,000 The election authority can’t even tell what that program is doing. 686 00:58:38,100 --> 00:58:41,700 Well, this company then could rig the election. 687 00:58:41,800 --> 00:58:47,000 There are accusations that this was done in the US within the past ten years 688 00:58:47,100 --> 00:58:51,000 that election results were falsified this way. 689 00:58:51,100 --> 00:58:54,000 But what if the program is free software? 690 00:58:54,100 --> 00:58:57,000 That means the election authority 691 00:58:57,100 --> 00:59:01,400 who owns this voting machine has control over the software in it 692 00:59:01,500 --> 00:59:04,000 so the election authority could rig the election. 693 00:59:04,100 --> 00:59:07,000 You can’t trust them either. 694 00:59:07,000 --> 00:59:11,000 You don’t dare trust anybody in voting 695 00:59:11,100 --> 00:59:17,000 and the reason is, there’s no way that the voters can verify for themselves 696 00:59:17,100 --> 00:59:24,700 that their votes were correctly counted, nor that false votes were not added. 697 00:59:25,000 --> 00:59:33,000 In other activities of life, you can usually tell if somebody is trying to cheat you. 698 00:59:33,100 --> 00:59:36,800 Consider for instance buying something from a store. 699 00:59:36,900 --> 00:59:40,000 You order something, maybe you give a credit card number. 700 00:59:40,100 --> 00:59:46,000 If the product doesn’t come, you can complain 701 00:59:46,100 --> 00:59:48,400 and you can, of course if you got a good enough memory, 702 00:59:48,500 --> 00:59:51,200 you will notice if that product doesn’t come. 703 00:59:51,700 --> 00:59:59,000 You’re not just giving total blind trust to the store, because you can check. 704 00:59:59,100 --> 01:00:02,200 But in elections you can’t check. 705 01:00:02,900 --> 01:00:06,000 I saw once a paper where someone described 706 01:00:06,100 --> 01:00:10,200 a theoretical system for voting 707 01:00:10,800 --> 01:00:15,200 which uses some sophisticated mathematics 708 01:00:15,300 --> 01:00:20,000 so that people could check that their votes had been counted 709 01:00:20,100 --> 01:00:23,000 even though everybody’s vote was secret 710 01:00:23,100 --> 01:00:27,000 and they could also verify that false votes hadn’t been added. 711 01:00:27,100 --> 01:00:30,800 It was very exciting, powerful mathematics; 712 01:00:30,900 --> 01:00:34,000 but even if that mathematics is correct 713 01:00:34,100 --> 01:00:38,000 that doesn’t mean the system would be acceptable to use in practice 714 01:00:38,100 --> 01:00:45,700 because the vulnerabilities of a real system might be outside of that mathematics. 715 01:00:45,900 --> 01:00:50,300 For instance, suppose you’re voting over the Internet 716 01:00:50,400 --> 01:00:54,200 and suppose you’re using a machine that’s a zombie. 717 01:00:54,800 --> 01:00:59,000 It might tell you that the vote was sent for A 718 01:00:59,100 --> 01:01:05,000 while actually sending a vote for B. Who knows whether you’d ever find out? 719 01:01:05,100 --> 01:01:11,800 In practice, the only way to see if these systems work and are honest 720 01:01:11,900 --> 01:01:23,000 is through years, in fact decades, of trying them and checking in other ways what happened. 721 01:01:26,400 --> 01:01:33,000 I wouldn’t want my country to be the pioneer in this. 722 01:01:34,000 --> 01:01:43,000 So, use paper for voting. Make sure there are ballots that can be recounted. 723 01:01:46,000 --> 01:01:54,500 The next threat to our freedom in a digital society comes from the war on sharing. 724 01:01:55,000 --> 01:01:59,500 One of the tremendous benefits of digital technology 725 01:01:59,800 --> 01:02:08,000 is that it is easy to copy published works and share these copies with others. 726 01:02:09,000 --> 01:02:15,300 Sharing is good, and with digital technology, sharing is easy. 727 01:02:15,500 --> 01:02:18,700 So, millions of people share. 728 01:02:18,800 --> 01:02:23,000 Those who profit by having power 729 01:02:23,100 --> 01:02:28,000 over the distribution of these works don’t want us to share. 730 01:02:28,800 --> 01:02:35,000 And since they are businesses, governments which have betrayed their people 731 01:02:35,100 --> 01:02:40,800 and work for the empire of mega-corporations try to serve those businesses 732 01:02:40,900 --> 01:02:46,000 they are against their own people, they are for the businesses, for the publishers. 733 01:02:46,200 --> 01:02:52,800 Well, that’s not good. And with the help of these governments 734 01:02:52,900 --> 01:02:58,000 the companies have been waging war on sharing 735 01:02:58,100 --> 01:03:05,700 and they’ve proposed a series of cruel draconian measures. 736 01:03:05,800 --> 01:03:08,800 Why do they propose cruel draconian measures? 737 01:03:08,900 --> 01:03:13,800 Because nothing less has a chance of success: 738 01:03:13,900 --> 01:03:19,000 when something is good and easy, people do it. 739 01:03:20,000 --> 01:03:24,800 And the only way to stop them is by being very nasty. 740 01:03:24,900 --> 01:03:31,000 So of course, what they propose is nasty, nasty, and the next one is nastier. 741 01:03:33,000 --> 01:03:41,000 So they tried suing teenagers for hundreds of thousands of dollars — that was pretty nasty. 742 01:03:41,600 --> 01:03:46,000 And they tried turning our technology against us 743 01:03:46,100 --> 01:03:51,900 Digital Restrictions Management that means, digital handcuffs. 744 01:03:52,000 --> 01:03:57,600 But among the people there were clever programmers too 745 01:03:57,700 --> 01:04:01,000 and they found ways to break the handcuffs. 746 01:04:01,100 --> 01:04:08,600 For instance, DVDs were designed to have encrypted movies in a secret encryption format 747 01:04:08,700 --> 01:04:14,600 and the idea was that all the programs to decrypt the video 748 01:04:14,700 --> 01:04:18,700 would be proprietary with digital handcuffs. 749 01:04:18,800 --> 01:04:22,000 They would all be designed to restrict the users. 750 01:04:22,100 --> 01:04:25,000 And their scheme worked okay for a while. 751 01:04:25,100 --> 01:04:29,000 But some people in Europe figured out the encryption 752 01:04:29,100 --> 01:04:37,000 and they released a free program that could actually play the video on a DVD. 753 01:04:40,300 --> 01:04:44,000 Well, the movie companies didn’t leave it there. 754 01:04:44,100 --> 01:04:51,700 They went to the US congress and bought a law making that software illegal. 755 01:04:51,800 --> 01:04:58,600 The United States invented censorship of software in 1998 756 01:04:58,700 --> 01:05:02,000 with the Digital Millennium Copyright Act [DMCA]. 757 01:05:02,100 --> 01:05:08,000 So the distribution of that free program was forbidden in the United States. 758 01:05:08,100 --> 01:05:11,800 Unfortunately it didn’t stop with the United States. 759 01:05:11,900 --> 01:05:21,000 The European Union adopted a directive in 2003 I believe, requiring such laws. 760 01:05:21,300 --> 01:05:27,900 The directive only says that commercial distribution has to be banned 761 01:05:28,000 --> 01:05:34,000 but just about every country in the European Union has adopted a nastier law. 762 01:05:34,700 --> 01:05:40,400 In France, the mere possession of a copy of that program 763 01:05:40,500 --> 01:05:46,000 is an offense punished by imprisonment, thanks to Sarkozy. 764 01:05:47,900 --> 01:05:52,400 I believe that was done by the law DADVSI. 765 01:05:53,000 --> 01:05:56,300 I guess he hoped that with an unpronounceable name 766 01:05:56,400 --> 01:06:00,000 people wouldn’t be able to criticize it. 767 01:06:02,000 --> 01:06:08,000 So, elections are coming. Ask the candidates in the parties: 768 01:06:08,100 --> 01:06:14,400 will you repeal the DADVSI? And if not, don’t support them. 769 01:06:14,800 --> 01:06:22,400 You mustn’t give up lost moral territory forever. 770 01:06:22,500 --> 01:06:26,000 You’ve got to fight to win it back. 771 01:06:26,100 --> 01:06:31,600 So, we still are fighting against digital handcuffs. 772 01:06:31,800 --> 01:06:36,000 The Amazon “Swindle” has digital handcuffs 773 01:06:36,100 --> 01:06:41,300 to take away the traditional freedoms of readers to do things such as: 774 01:06:41,400 --> 01:06:46,000 give a book to someone else, or lend a book to someone else. 775 01:06:46,100 --> 01:06:49,000 That’s a vitally important social act. 776 01:06:49,100 --> 01:06:55,400 That is what builds society among people who read: lending books. 777 01:06:55,500 --> 01:06:59,000 Amazon doesn’t want to let people lend books freely. 778 01:06:59,100 --> 01:07:08,000 And then there is also selling a book, perhaps to a used bookstore. You can’t do that either. 779 01:07:12,000 --> 01:07:18,000 It looked for a while as if DRM had disappeared on music 780 01:07:18,100 --> 01:07:25,900 but now they’re bringing it back with streaming services such as Spotify. 781 01:07:26,000 --> 01:07:31,000 These services all require proprietary client software 782 01:07:31,100 --> 01:07:37,000 and the reason is so they can put digital handcuffs on the users. 783 01:07:37,700 --> 01:07:44,600 So, reject them! They already showed quite openly 784 01:07:44,700 --> 01:07:48,000 that you can’t trust them, because first they said: 785 01:07:48,100 --> 01:07:51,000 “you can listen as much as you like”, and then they said: 786 01:07:51,100 --> 01:07:55,000 “Oh, no! You can only listen a certain number of hours a month.” 787 01:07:57,900 --> 01:08:06,800 The issue is not whether that particular change was good or bad, just or unjust; 788 01:08:06,900 --> 01:08:11,300 the point is, they have the power to impose any change in policies. 789 01:08:11,400 --> 01:08:14,500 So don’t let them have that power. 790 01:08:14,600 --> 01:08:21,000 You should have your own copy of any music you want to listen to. 791 01:08:22,100 --> 01:08:34,500 And then came the next assault on our freedom: HADOPI, basically punishment on accusation. 792 01:08:34,600 --> 01:08:41,400 It was started in France but it’s been exported to many other countries. 793 01:08:41,800 --> 01:08:50,000 The United States now demand such unjust policies in its free exploitation treaties. 794 01:08:50,100 --> 01:09:00,000 A few months ago, Columbia adopted such a law under orders from its masters in Washington. 795 01:09:01,000 --> 01:09:05,000 Of course, the ones in Washington are not the real masters 796 01:09:05,100 --> 01:09:10,500 they’re just the ones who control the United States on behalf of the Empire. 797 01:09:11,000 --> 01:09:19,000 But they’re the ones who also dictate to Columbia on behalf of the Empire. 798 01:09:21,900 --> 01:09:27,800 In France, since the Constitutional Council 799 01:09:27,900 --> 01:09:33,000 objected to explicitly giving people punishment without trial 800 01:09:33,100 --> 01:09:36,800 they invented a kind of trial which is not a real trial 801 01:09:36,900 --> 01:09:39,000 which is just a form of a trial 802 01:09:39,100 --> 01:09:44,300 so they can pretend that people have a trial before they’re punished. 803 01:09:44,400 --> 01:09:47,000 But in other countries they don’t bother with that 804 01:09:47,100 --> 01:09:52,000 it’s explicit punishment on accusation only. 805 01:09:53,000 --> 01:09:57,000 Which means that for the sake of their war on sharing 806 01:09:57,100 --> 01:10:01,400 they’re prepared to abolish the basic principles of justice. 807 01:10:01,500 --> 01:10:08,700 It shows how thoroughly anti-freedom, anti-justice they are. 808 01:10:08,800 --> 01:10:12,000 These are not legitimate governments. 809 01:10:15,500 --> 01:10:19,000 And I’m sure they’ll come up with more nasty ideas 810 01:10:19,100 --> 01:10:27,000 because they’re paid to defeat the people no matter what it takes. 811 01:10:28,700 --> 01:10:36,000 Now, when they do this, they always say that it’s for the sake of the artists 812 01:10:36,100 --> 01:10:42,000 that they have “protect” the “creators”. 813 01:10:42,100 --> 01:10:45,000 Now those are both propaganda terms. 814 01:10:45,100 --> 01:10:48,200 I‘m convinced that the reason they love the word “creators“ 815 01:10:48,300 --> 01:10:53,400 is because it is a comparison with a deity. 816 01:10:53,500 --> 01:10:57,000 They want us to think of artists as super-human 817 01:10:57,100 --> 01:11:03,000 and thus deserving special privileges and power over us 818 01:11:03,600 --> 01:11:06,800 which is something I disagree with. 819 01:11:06,900 --> 01:11:15,000 In fact though, the only artists that benefit very much from this system are the big stars. 820 01:11:15,300 --> 01:11:20,300 The other artists are getting crushed into the ground 821 01:11:20,400 --> 01:11:24,400 by the heels of these same companies. 822 01:11:25,600 --> 01:11:30,300 But they treat the stars very well, because the stars have a lot of clout. 823 01:11:30,400 --> 01:11:34,000 If a star threatens to move to another company, the company says: 824 01:11:34,100 --> 01:11:36,500 “oh, we’ll give you what you want.” 825 01:11:36,600 --> 01:11:44,000 But for any other artist they say: “you don’t matter, we can treat you any way we like.” 826 01:11:46,600 --> 01:11:54,200 So the superstars have been corrupted by the millions of dollars or euros that they get 827 01:11:54,300 --> 01:12:01,300 to the point where they’ll do almost anything for more money. 828 01:12:01,900 --> 01:12:06,200 For instance, J. K. Rowling is a good example. 829 01:12:07,800 --> 01:12:12,800 J. K. Rowling, a few years ago, went to court in Canada 830 01:12:12,900 --> 01:12:21,200 and obtained an order that people who had bought her books must not read them. 831 01:12:21,800 --> 01:12:27,000 She got an order telling people not to read her books. 832 01:12:27,500 --> 01:12:34,900 Here’s what happened. A bookstore put the books on display for sale too early 833 01:12:35,000 --> 01:12:38,600 before the day they were supposed to go on sale. 834 01:12:38,700 --> 01:12:40,700 And people came into the store and said: 835 01:12:40,800 --> 01:12:44,600 “oh, I want that!” and they bought it and took away their copies. 836 01:12:44,700 --> 01:12:50,800 Then, they discovered the mistake so they took the copies off of display. 837 01:12:52,200 --> 01:13:01,700 But Rowling wanted to crush any circulation of any information from those books 838 01:13:01,800 --> 01:13:04,900 so she went to court, and the court ordered 839 01:13:05,000 --> 01:13:10,000 those people not to read the books that they now owned. 840 01:13:11,900 --> 01:13:19,000 In response, I call for a total boycott of Harry Potter. 841 01:13:20,200 --> 01:13:25,000 But I don’t say you shouldn’t read those books or watch the movies 842 01:13:25,100 --> 01:13:30,000 I only say you shouldn’t buy the books or pay for the movies. 843 01:13:30,300 --> 01:13:36,300 I leave it to Rowling to tell people not to read the books. 844 01:13:37,800 --> 01:13:44,000 As far as I’m concerned, if you borrow the book and read it, that’s okay. 845 01:13:44,800 --> 01:13:52,900 Just don’t give her any money! But this happened with paper books. 846 01:13:53,000 --> 01:13:57,000 The court could make this order but it couldn’t get the books back 847 01:13:57,100 --> 01:13:59,900 from the people who had bought them. 848 01:14:00,000 --> 01:14:06,400 Imagine if they were ebooks. Imagine if they were ebooks on the “Swindle”. 849 01:14:06,500 --> 01:14:12,000 Amazon could send commands to erase them. 850 01:14:16,000 --> 01:14:25,400 So, I don’t have much respect for stars who will go to such lengths for more money. 851 01:14:25,500 --> 01:14:31,300 But most artists aren’t like that, they never got enough money to be corrupted. 852 01:14:31,800 --> 01:14:39,000 Because the current system of copyright supports most artists very badly. 853 01:14:39,100 --> 01:14:47,000 And so, when these companies demand to expand the war on sharing 854 01:14:47,100 --> 01:14:50,000 supposedly for the sake of the artists 855 01:14:50,100 --> 01:14:54,400 I’m against what they want but I would like to support the artists better. 856 01:14:54,500 --> 01:15:01,000 I appreciate their work and I realize if we want them to do more work we should support them. 857 01:15:01,100 --> 01:15:05,000 I have two proposals for how to support artists 858 01:15:05,100 --> 01:15:09,000 methods that are compatible with sharing. 859 01:15:09,100 --> 01:15:15,000 That would allow us to end the war on sharing and still support artists. 860 01:15:15,100 --> 01:15:18,000 One method uses tax money. 861 01:15:18,100 --> 01:15:24,800 We get a certain amount of public funds to distribute among artists. 862 01:15:25,700 --> 01:15:32,400 But, how much should each artist get? We have to measure popularity. 863 01:15:32,500 --> 01:15:38,100 The current system supposedly supports artists based on their popularity. 864 01:15:38,200 --> 01:15:44,800 So I’m saying let’s keep that, let’s continue on this system based on popularity. 865 01:15:44,900 --> 01:15:48,000 We can measure the popularity of all the artists 866 01:15:48,100 --> 01:15:54,100 with some kind of polling or sampling, so that we don’t have to do surveillance. 867 01:15:54,200 --> 01:15:57,000 We can respect people’s anonymity. 868 01:15:57,100 --> 01:16:01,000 We get a raw popularity figure for each artist. 869 01:16:01,100 --> 01:16:05,000 How do we convert that into an amount of money? 870 01:16:05,100 --> 01:16:12,000 The obvious way is: distribute the money in proportion to popularity. 871 01:16:12,600 --> 01:16:21,000 So if A is a thousand times as popular as B A will get a thousand times as much money as B. 872 01:16:21,300 --> 01:16:25,000 That’s not efficient distribution of the money. 873 01:16:25,100 --> 01:16:28,000 It’s not putting the money to good use. 874 01:16:28,100 --> 01:16:36,000 It’s easy for a star A to be a thousand times as popular as a fairly successful artist B. 875 01:16:36,100 --> 01:16:44,000 If we use linear proportion, we’ll give A a thousand times as much money as we give B. 876 01:16:44,100 --> 01:16:50,000 And that means that, either we have to make A tremendously rich 877 01:16:50,100 --> 01:16:54,500 or we are not supporting B enough. 878 01:16:55,000 --> 01:16:59,000 The money we use to make A tremendously rich 879 01:16:59,100 --> 01:17:06,200 is failing to do an effective job of supporting the arts; so, it’s inefficient. 880 01:17:06,300 --> 01:17:12,000 Therefore I say: let’s use the cube root. Cube root looks sort of like this. 881 01:17:12,100 --> 01:17:17,700 The point is: if A is a thousand times as popular as B 882 01:17:17,800 --> 01:17:22,200 with the cube root A will get ten times as much as B 883 01:17:22,800 --> 01:17:25,800 not a thousand times as much, just ten times as much. 884 01:17:25,900 --> 01:17:30,000 The use of the cube root shifts a lot of the money 885 01:17:30,100 --> 01:17:36,000 from the stars to the artists of moderate popularity. 886 01:17:36,600 --> 01:17:44,000 And that means, with less money we can adequately support a much larger number of artists. 887 01:17:44,100 --> 01:17:49,000 There are two reasons why this system would use less money than we pay now. 888 01:17:49,100 --> 01:17:53,000 First of all because it would be supporting artists but not companies. 889 01:17:53,100 --> 01:18:01,600 Second because it would shift the money from the stars to the artists of moderate popularity. 890 01:18:02,000 --> 01:18:09,300 Now, it would remain the case that the more popular you are, the more money you get. 891 01:18:09,700 --> 01:18:17,000 So the star A would still get more than B, but not astronomically more. 892 01:18:19,800 --> 01:18:24,000 That’s one method, and because it won’t be so much money 893 01:18:24,100 --> 01:18:27,100 it doesn’t matter so much how we get the money. 894 01:18:27,200 --> 01:18:31,000 It could be from a special tax on Internet connectivity 895 01:18:31,100 --> 01:18:36,000 it could just be some of the general budget that gets allocated to this purpose. 896 01:18:36,100 --> 01:18:39,900 We won’t care because it won’t be so much money; 897 01:18:40,000 --> 01:18:43,300 much less than we’re paying now. 898 01:18:43,900 --> 01:18:47,800 The other method I’ve proposed is voluntary payments. 899 01:18:47,900 --> 01:18:55,000 Suppose each player had a button you could use to send one euro. 900 01:18:55,900 --> 01:19:01,000 A lot of people would send it, after all it’s not that much money. 901 01:19:01,100 --> 01:19:06,400 I think a lot of you might push that button every day 902 01:19:06,500 --> 01:19:12,300 to give one euro to some artist who had made a work that you liked. 903 01:19:12,700 --> 01:19:15,000 But nothing would demand this 904 01:19:15,100 --> 01:19:19,200 you wouldn’t be required or ordered or pressured to send the money; 905 01:19:19,300 --> 01:19:21,800 you would do it because you felt like it. 906 01:19:21,900 --> 01:19:25,000 But there are some people who wouldn’t do it 907 01:19:25,100 --> 01:19:29,000 because they’re poor and they can’t afford to give one euro. 908 01:19:29,100 --> 01:19:32,000 And it’s good that they won’t give it. 909 01:19:32,100 --> 01:19:36,000 We don’t have to squeeze money out of poor people to support the artists. 910 01:19:36,100 --> 01:19:41,000 There are enough non poor people who’ll be happy to do it. 911 01:19:41,100 --> 01:19:48,000 Why wouldn’t you give one euro to some artists today, if you appreciated their work? 912 01:19:48,100 --> 01:19:56,400 It’s too inconvenient to give it to them. So my proposal is to remove the inconvenience. 913 01:19:56,500 --> 01:20:02,000 If the only reason not to give that euro is you would have one euro less 914 01:20:02,100 --> 01:20:06,000 you would do it fairly often. 915 01:20:07,800 --> 01:20:13,000 So these are my two proposals for how to support artists 916 01:20:13,100 --> 01:20:19,000 while encouraging sharing because sharing is good. 917 01:20:19,100 --> 01:20:25,000 Let’s put an end to the war on sharing, laws like DADVSI and HADOPI. 918 01:20:25,200 --> 01:20:29,000 It’s not just the methods that they propose that are evil 919 01:20:29,100 --> 01:20:31,000 their purpose is evil. 920 01:20:31,100 --> 01:20:36,000 That’s why they propose cruel and draconian measures. 921 01:20:36,100 --> 01:20:41,000 They’re trying to do something that’s nasty by nature. 922 01:20:41,100 --> 01:20:45,300 So let’s support artists in other ways. 923 01:20:45,900 --> 01:20:52,000 The last threat to our freedom in digital society is the fact 924 01:20:52,100 --> 01:21:01,000 that we don’t have a firm right to do the things we do, in cyberspace. 925 01:21:02,000 --> 01:21:05,800 In the physical world, if you have certain views 926 01:21:05,900 --> 01:21:11,400 and you want to give people copies of a text that defends those views 927 01:21:11,500 --> 01:21:16,000 you’re free to do so. You could even buy a printer to print them 928 01:21:16,100 --> 01:21:20,900 and you’re free to hand them out on the street 929 01:21:21,000 --> 01:21:25,000 or you’re free to rent a store and hand them out there. 930 01:21:25,100 --> 01:21:29,000 If you want to collect money to support your cause 931 01:21:29,100 --> 01:21:33,800 you can just have a can and people could put money into the can. 932 01:21:33,900 --> 01:21:42,000 You don’t need to get somebody else’s approval or cooperation to do these things. 933 01:21:42,100 --> 01:21:47,200 But, in the Internet, you do need that. 934 01:21:47,300 --> 01:21:51,000 For instance if you want to distribute a text on the Internet 935 01:21:51,100 --> 01:21:58,000 you need companies to help you do it. You can’t do it by yourself. 936 01:21:58,100 --> 01:22:06,000 So if you want to have a website, you need the support of an ISP or a hosting company 937 01:22:06,100 --> 01:22:09,000 and you need a domain name registrar. 938 01:22:09,100 --> 01:22:14,400 You need them to continue to let you do what you’re doing. 939 01:22:14,500 --> 01:22:20,700 So you’re doing it effectively on sufferance, not by right. 940 01:22:20,900 --> 01:22:25,800 And if you want to receive money, you can’t just hold out a can. 941 01:22:25,900 --> 01:22:33,000 You need the cooperation of a payment company. 942 01:22:37,700 --> 01:22:45,800 And we saw that this makes all of our digital activities vulnerable to suppression. 943 01:22:45,900 --> 01:22:49,000 We learned this when the United States government 944 01:22:49,100 --> 01:22:54,000 launched a distributed denial of service attack [DDoS] against WikiLeaks. 945 01:22:54,100 --> 01:23:00,900 Now I’m making a bit of a joke because the words “distributed denial of service attack” 946 01:23:01,000 --> 01:23:05,000 usually refer to a different kind of attack. 947 01:23:05,100 --> 01:23:09,000 But they fit perfectly with what the United States did. 948 01:23:09,000 --> 01:23:16,000 The United States went to the various kinds of network services that WikiLeaks depended on 949 01:23:16,100 --> 01:23:22,400 and told them to cut off service to WikiLeaks. And they did. 950 01:23:22,500 --> 01:23:27,300 For instance, WikiLeaks had rented a virtual Amazon server 951 01:23:27,800 --> 01:23:35,000 and the US government told Amazon: “cut off service for WikiLeaks.” And it did, arbitrarily. 952 01:23:36,000 --> 01:23:41,400 And then, Amazon had certain domain names such as wikileaks.org 953 01:23:41,700 --> 01:23:47,000 the US government tried to get all those domains shut off. 954 01:23:47,100 --> 01:23:53,000 But it didn’t succeed, some of them were outside its control and were not shut off. 955 01:23:55,000 --> 01:24:02,500 Then, there were the payment companies. The US went to PayPal and said: 956 01:24:02,600 --> 01:24:07,300 “Stop transferring money to WikiLeaks or we’ll make life difficult for you.” 957 01:24:07,400 --> 01:24:11,000 And PayPal shut off payments to WikiLeaks. 958 01:24:11,100 --> 01:24:18,000 And then it went to Visa and Mastercard and got them to shut off payments to WikiLeaks. 959 01:24:18,100 --> 01:24:27,000 Others started collecting money on WikiLeaks behalf and their accounts were shut off too. 960 01:24:27,100 --> 01:24:31,300 But in this case, maybe something can be done. 961 01:24:31,600 --> 01:24:38,000 There’s a company in Iceland which began collecting money on behalf of WikiLeaks 962 01:24:38,100 --> 01:24:41,700 and so Visa and Mastercard shut off its account; 963 01:24:41,800 --> 01:24:46,000 it couldn’t receive money from its customers either. 964 01:24:46,100 --> 01:24:51,700 Now, that business is suing Visa and Mastercard apparently under European Union law 965 01:24:51,800 --> 01:24:56,600 because Visa and Mastercard together have a near-monopoly. 966 01:24:56,700 --> 01:25:01,500 They’re not allowed to arbitrarily deny service to anyone. 967 01:25:01,600 --> 01:25:05,000 Well, this is an example of how things need to be 968 01:25:05,100 --> 01:25:10,500 for all kinds of services that we use in the Internet. 969 01:25:10,700 --> 01:25:17,000 If you rented a store to hand out statements of what you think 970 01:25:17,100 --> 01:25:22,400 or any other kind of information that you can lawfully distribute 971 01:25:22,500 --> 01:25:27,800 the landlord couldn’t kick you out just because he didn’t like what you were saying. 972 01:25:27,900 --> 01:25:32,800 As long as you keep paying the rent, you have the right to continue in that store 973 01:25:32,900 --> 01:25:37,000 for a certain agreed-on period of time that you signed. 974 01:25:37,100 --> 01:25:41,000 So you have some rights that you can enforce. 975 01:25:41,100 --> 01:25:44,300 And they couldn’t shut off your telephone line 976 01:25:44,400 --> 01:25:48,500 because the phone company doesn’t like what you said 977 01:25:48,600 --> 01:25:55,000 or because some powerful entity didn’t like what you said and threatened the phone company. 978 01:25:55,100 --> 01:26:03,300 No! As long as you pay the bills and obey certain basic rules 979 01:26:03,400 --> 01:26:11,000 they can’t shut off your phone line. This is what it’s like to have some rights! 980 01:26:11,100 --> 01:26:18,300 Well, if we move our activities from the physical world to the virtual world 981 01:26:18,700 --> 01:26:27,000 then either we have the same rights in the virtual world, or we have been harmed. 982 01:26:28,000 --> 01:26:37,000 So, the precarity of all our Internet activities is the last of the menaces I wanted to mention. 983 01:26:37,100 --> 01:26:46,000 Now I’d like to say that for more information about free software, look at GNU.org. 984 01:26:46,100 --> 01:26:52,400 Also look at fsf.org, which is the website of the Free Software Foundation. 985 01:26:52,500 --> 01:26:58,400 You can go there and find many ways you can help us, for instance. 986 01:26:58,500 --> 01:27:03,500 You can also become a member of the Free Software Foundation through that site 987 01:27:03,600 --> 01:27:11,100 if you're going to do e-commerce. If you'd like to join and pay cash 988 01:27:11,200 --> 01:27:14,100 right here you can do that too. I've got cards you can fill out. 989 01:27:14,200 --> 01:27:24,000 There is also the Free Software Foundation of Europe fsfe.org. You can join FSFE also. 990 01:27:24,500 --> 01:27:28,000 Can you accept membership in cash? 991 01:27:28,100 --> 01:27:31,000 Is there someone who wants to join right now? 992 01:27:31,100 --> 01:27:37,000 Ok, so you can join FSFE also paying with cash. 993 01:27:39,000 --> 01:27:42,000 Now it's time and, by the way 994 01:27:42,100 --> 01:27:47,700 I know the case of the FSF we get most of our funds from members 995 01:27:47,800 --> 01:27:53,000 so joining is really important and probably for FSFE as well. 996 01:27:53,100 --> 01:27:57,000 Now it's time for me to raise funds in another way. 997 01:27:57,100 --> 01:28:04,000 This is an adorable gnu that needs a home. 998 01:28:05,000 --> 01:28:11,400 And I'm going to auction it on behalf of the Free Software Foundation. 999 01:28:11,800 --> 01:28:17,000 If you buy the gnu, I'll sign a card for you, if you like 1000 01:28:17,600 --> 01:28:22,000 and if you have a penguin you need to get a gnu 1001 01:28:22,100 --> 01:28:28,000 because as we all know a penguin can hardly function without a gnu. 1002 01:28:31,000 --> 01:28:38,000 When you bid, please wave your arm and shout the quantity you are bidding 1003 01:28:38,100 --> 01:28:40,600 so that I notice you. 1004 01:28:40,700 --> 01:28:44,000 If you are bidding, I think you want me to notice that you're bidding. 1005 01:28:46,000 --> 01:28:51,000 The FSF can accept payments either in cash or with a credit card. 1006 01:28:51,100 --> 01:28:56,000 If the credit card works for ordering by telephone then it won't work with us. 1007 01:28:57,000 --> 01:29:03,000 So, I'm going to start with 20 euros. Do I get 20 euros? 1008 01:29:03,600 --> 01:29:07,000 I've got 20 euros, do I have 25? 1009 01:29:09,100 --> 01:29:12,000 How much? 1010 01:29:16,000 --> 01:29:20,000 Trente? Ok, I've got 30 euros, do I have 35? 1011 01:29:21,100 --> 01:29:24,800 How much? I've got 35, do I get 40? 1012 01:29:25,000 --> 01:29:28,200 I have 42 1013 01:29:32,000 --> 01:29:36,000 I have 42 euros, do I have 50? 1014 01:29:36,800 --> 01:29:40,400 How much? I've got 50, do I get 60? 1015 01:29:46,000 --> 01:29:49,000 I've got 60, do I get 70? 1016 01:29:52,100 --> 01:29:56,000 How much? I've got 70, do I get 80? 1017 01:30:02,000 --> 01:30:05,000 I've got 80, do I get 90? 1018 01:30:05,100 --> 01:30:11,000 I've got 80 euros, do I get 90 for this adorable gnu? 1019 01:30:14,400 --> 01:30:20,000 How much? I've got 100 euros, do I get 110? 1020 01:30:25,000 --> 01:30:29,000 I've got 110, do I get 120? 1021 01:30:30,000 --> 01:30:34,000 I've got 120, do I get 130? 1022 01:30:39,000 --> 01:30:46,000 I've got 130, do I get 140? 1023 01:30:46,100 --> 01:30:51,000 How much? I've got 140, do I get 150? 1024 01:30:54,700 --> 01:30:58,000 I've got 150, do I get 160? 1025 01:30:58,500 --> 01:31:02,000 I've got 160, do I get 170? 1026 01:31:05,000 --> 01:31:10,000 How much? I've got 170, do I get 180? 1027 01:31:14,100 --> 01:31:18,200 Do you bid? I've got 200 1028 01:31:25,000 --> 01:31:29,000 I've got 200, do I get 210? 1029 01:31:32,600 --> 01:31:36,000 I've got 210, do I get 220? 1030 01:31:44,000 --> 01:31:49,800 I've got 220, do I get 230? 1031 01:31:49,900 --> 01:31:54,600 Do I get 230 for this adorable gnu that needs a home? 1032 01:31:54,700 --> 01:32:00,000 Do I get 230 to the Free Software Foundation to defend freedom? 1033 01:32:01,700 --> 01:32:05,000 Last chance to bid. How much? 1034 01:32:06,200 --> 01:32:10,000 I've got 230, do I get 240? 1035 01:32:14,000 --> 01:32:17,100 I've got 240, do I get 250? 1036 01:32:20,000 --> 01:32:23,500 For this adorable gnu to defend freedom? 1037 01:32:23,600 --> 01:32:28,000 How much? I've got 300 1038 01:32:32,000 --> 01:32:44,000 I've got 300, do I get 320 for this adorable gnu to defend freedom? 1039 01:32:46,500 --> 01:32:53,000 I've got 320, do I get 340? 1040 01:32:55,600 --> 01:33:00,000 How much? 340? I've got 340, do I get 360? 1041 01:33:04,000 --> 01:33:08,000 What? I've got 340. 1042 01:33:09,000 --> 01:33:14,100 No, no I don't want to go up by such small increments, we'll be here all night 1043 01:33:14,200 --> 01:33:18,000 I've got 340, do I get 360? 1044 01:33:19,600 --> 01:33:23,000 I've got 360, do I get 380? 1045 01:33:23,100 --> 01:33:30,000 I've got 380, do I get 400? 1046 01:33:30,100 --> 01:33:34,500 to defend freedom? for this adorable gnu, do I get 400? 1047 01:33:34,700 --> 01:33:41,000 I've got 380, do I get 400? Last chance to bid, 400 or more. 1048 01:33:41,100 --> 01:33:46,000 Last chance, going... 1049 01:33:46,500 --> 01:33:54,200 I've got 400, do I get 420? 1050 01:33:57,100 --> 01:34:07,000 How much? I've got 420, do I get 440? 1051 01:34:07,800 --> 01:34:13,000 Last chance to bid 440 or more for this adorable gnu. 1052 01:34:13,700 --> 01:34:20,600 Do I get 440? Last chance, going, going 1053 01:34:21,000 --> 01:34:25,000 sold for 420. 1054 01:34:29,200 --> 01:34:37,700 Please note that there are stickers which are gratuit to take. 1055 01:34:37,800 --> 01:34:40,300 Please take as many as you can and make good use of. 1056 01:34:40,400 --> 01:34:48,700 There are also various small things to sell, like badges and elegant pins 1057 01:34:48,900 --> 01:34:51,600 and the money supports the Free Software Foundation. 1058 01:34:51,700 --> 01:34:53,000 Anyway now it's time for me to answer questions.