free-digital-society.html (64117B)
1 <!--#include virtual="/server/header.html" --> 2 <!-- Parent-Version: 1.96 --> 3 <!-- This page is derived from /server/standards/boilerplate.html --> 4 <!--#set var="TAGS" value="speeches" --> 5 <!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --> 6 <title>A Free Digital Society - What Makes Digital Inclusion Good or 7 Bad? - GNU Project - Free Software Foundation</title> 8 <style type="text/css" media="screen"><!-- 9 @media (min-width: 55em) { 10 .toc li a { 11 display: inline-block; width: 100%; 12 vertical-align: top; 13 position: relative; bottom: .15em; 14 } 15 } 16 --></style> 17 <!--#include virtual="/philosophy/po/free-digital-society.translist" --> 18 <!--#include virtual="/server/banner.html" --> 19 <!--#include virtual="/philosophy/ph-breadcrumb.html" --> 20 <!--GNUN: OUT-OF-DATE NOTICE--> 21 <!--#include virtual="/server/top-addendum.html" --> 22 <div class="article reduced-width"> 23 24 <h2>A Free Digital Society - What Makes Digital Inclusion Good or Bad?</h2> 25 26 <address class="byline">by Richard Stallman</address> 27 28 <div class="infobox"> 29 <p>Transcription of a lecture at Sciences Po Paris, October 19, 2011 (<a 30 href="//audio-video.gnu.org/video/stallman-sciencespo-freesociety.webm">video</a>)</p> 31 </div> 32 33 <div class="toc"> 34 <h3 class="no-display">Table of Contents</h3> 35 <ul class="columns"> 36 <li><a href="#intro">Introduction</a></li> 37 <li><a href="#surveillance">Surveillance</a></li> 38 <li><a href="#censorship">Censorship</a></li> 39 <li><a href="#formats">Restricted data formats</a></li> 40 <li><a href="#proprietary">Software that isn't free</a></li> 41 <li><a href="#four-freedoms">The four freedoms of free software</a></li> 42 <li><a href="#gnu">The GNU Project and the Free Software movement</a></li> 43 <li><a href="#education">Free software and education</a></li> 44 <li><a href="#services">Internet services</a></li> 45 <li><a href="#voting">Computers for voting</a></li> 46 <li><a href="#sharing">The war on sharing</a></li> 47 <li><a href="#arts">Supporting the arts</a></li> 48 <li><a href="#rights">Rights in cyberspace</a></li> 49 </ul> 50 <hr class="no-display" /> 51 </div> 52 53 <h3 id="intro">Introduction</h3> 54 55 <p>Projects with the goal of digital inclusion are making a big 56 assumption. They are assuming that participating in a digital society 57 is good, but that's not necessarily true. Being in a digital society 58 can be good or bad, depending on whether that digital society is just 59 or unjust. There are many ways in which our freedom is being attacked 60 by digital technology. Digital technology can make things worse, and it 61 will, unless we fight to prevent it.</p> 62 63 <p>Therefore, if we have an unjust digital society, we should cancel 64 these projects for digital inclusion and launch projects for digital 65 extraction. We have to extract people from digital society if it doesn't 66 respect their freedom, or we have to make it respect their freedom.</p> 67 68 <h3 id="surveillance">Surveillance</h3> 69 70 <p>What are the threats? First, surveillance. Computers are Stalin's 71 dream: they are ideal tools for surveillance, because anything we do 72 with computers, the computers can record. They can record the 73 information in a perfectly indexed searchable form in a central 74 database, ideal for any tyrant who wants to crush opposition.</p> 75 76 <p>Surveillance is sometimes done with our own computers. For instance, 77 if you have a computer that's running Microsoft Windows, that system is 78 doing surveillance. There are features in Windows that send data to some 79 server, data about the use of the computer. A surveillance feature was 80 discovered in the iPhone a few months ago, and people started calling it 81 the “spy-phone.” Flash player has a surveillance feature 82 too, and so does the Amazon “Swindle.” They call it the Kindle, but 83 I call it “<a href="/philosophy/why-call-it-the-swindle.html">the 84 Swindle</a>,” <em>l'escroc</em>, 85 because it's meant to swindle users out of their freedom. It makes 86 people identify themselves whenever they buy a book, and that means 87 Amazon has a giant list of all the books each user has read. Such a list 88 must not exist anywhere.</p> 89 90 <p>Most portable phones will transmit their location, computed using 91 GPS, on remote command. The phone company is accumulating a giant list 92 of places that the user has been. A German MP in the Green Party 93 [correction: Malte Spitz is on the staff of the Green Party, not an 94 elected official] asked the phone company to give him the data it had 95 about where he was. He had to sue, he had to go to court to get this 96 information. And when he got it, he received forty-four thousand 97 location points for a period of six months! That's more than two hundred 98 per day! What that means is someone could form a very good picture of 99 his activities just by looking at that data.</p> 100 101 <p>We can stop our own computers from doing surveillance on us 102 if <em>we</em> have control of the software that they run. But the 103 software these people are running, they don't have control over. It's 104 nonfree software, and that's why it has malicious features such as 105 surveillance. However, the surveillance is not always done with our own 106 computers, it's also done at one remove. For instance ISPs in Europe 107 are required to keep data about the user's Internet communications for 108 a long time, in case the State decides to investigate that person later 109 for whatever imaginable reason.</p> 110 111 <p>With a portable phone… even if you can stop the phone from 112 transmitting your GPS location, the system can determine the phone's 113 location approximately, by comparing the time when the signals arrive at 114 different towers. So the phone system can do surveillance even without 115 special cooperation from the phone itself.</p> 116 117 <p>Likewise, the bicycles that people rent in Paris. Of course the 118 system knows where you get the bicycle and it knows where you return the 119 bicycle, and I've heard reports that it tracks the bicycles as they are 120 moving around as well. So they are not something we can really trust.</p> 121 122 <p>But there are also systems that have nothing to do with us that exist 123 only for tracking. For instance, in the UK all car travel is monitored. 124 Every car's movements are being recorded in real time and can be tracked 125 by the State in real time. This is done with cameras on the side of 126 the road.</p> 127 128 <p>Now, the only way we can prevent surveillance that's done at one 129 remove or by unrelated systems is through political action against 130 increased government power to track and monitor everyone, which means of 131 course we have to reject whatever excuse they come up with. For doing 132 such systems, no excuse is valid—to monitor everyone.</p> 133 134 <p>In a free society, when you go out in public, you are not guaranteed 135 anonymity. It's possible for someone to recognize you and remember. And 136 later that person could say that he saw you at a certain place. But 137 that information is diffuse. It's not conveniently assembled to track 138 everybody and investigate what they did. To collect that information is 139 a lot of work, so it's only done in special cases when it's necessary.</p> 140 141 <p>But computerized surveillance makes it possible to centralize and 142 index all this information so that an unjust regime can find it all, 143 and find out all about everyone. If a dictator takes power, which 144 could happen anywhere, people realize this and they recognize that they 145 should not communicate with other dissidents in a way that the State 146 could find out about. But if the dictator has several years of stored 147 records of who talks with whom, it's too late to take any precautions 148 then, because he already has everything he needs to realize: “OK, 149 this guy is a dissident, and he spoke with him. Maybe he is a dissident 150 too. Maybe we should grab him and torture him.”</p> 151 152 <p>So we need to campaign to put an end to digital surveillance 153 <em>now</em>. You can't wait until there is a dictator and it would 154 really matter. And besides, it doesn't take an outright dictatorship to 155 start attacking human rights.</p> 156 157 <p>I wouldn't quite call the government of the UK a dictatorship. It's 158 not very democratic, and one way it crushes democracy is using 159 surveillance. A few years ago, people believed to be on their way to a 160 protest, they were going to protest, they were arrested before they 161 could get there because their car was tracked through this universal car 162 tracking system.</p> 163 164 <h3 id="censorship">Censorship</h3> 165 166 <p>The second threat is censorship. Censorship is not new, it existed 167 long before computers. But 15 years ago, we thought that the Internet 168 would protect us from censorship, that it would defeat censorship. Then, 169 China and some other obvious tyrannies went to great lengths to 170 impose censorship on the Internet, and we said: “Well that's not 171 surprising, what else would governments like that do?”</p> 172 173 <p>But today we see censorship imposed in countries that are not 174 normally thought of as dictatorships, such as for instance the UK, 175 France, Spain, Italy, Denmark…</p> 176 177 <p>They all have systems of blocking access to some websites. Denmark 178 established a system that blocks access to a long list of web pages, 179 which was secret. The citizens were not supposed to know how the 180 government was censoring them, but the list was leaked and posted on 181 WikiLeaks. At that point, Denmark added the WikiLeaks page to its 182 censorship list. So, the whole rest of the world can find out how Danes 183 are being censored, but Danes are not supposed to know.</p> 184 185 <p>A few months ago, Turkey, which claims to respect some human rights, 186 announced that every Internet user would have to choose between 187 censorship and more censorship. Four different levels of censorship they 188 get to choose! But freedom is not one of the options.</p> 189 190 <p>Australia wanted to impose filtering on the Internet, but that was 191 blocked. However Australia has a different kind of censorship: it has 192 censorship of links. That is, if a website in Australia has a link 193 to some censored site outside Australia, the one in Australia can be 194 punished. Electronic Frontiers Australia, that is an organization that 195 defends human rights in the digital domain in Australia, posted a link 196 to a foreign political website. It was ordered to delete the link or 197 face a penalty of $11,000 a day. So they deleted it, what else could 198 they do? This is a very harsh system of censorship.</p> 199 200 <p>In Spain, the censorship that was adopted earlier this year allows 201 officials to arbitrarily shut down an Internet site in Spain, or impose 202 filtering to block access to a site outside of Spain. And they can do 203 this without any kind of trial. This was one of the motivations for the 204 <i>Indignados</i>, who have been protesting in the street.</p> 205 206 <p>There were protests in the street in Turkey as well, after that 207 announcement, but the government refused to change its policy.</p> 208 209 <p>We must recognize that a country that imposes censorship on the 210 Internet is not a free country. And is not a legitimate government 211 either.</p> 212 213 <h3 id="formats">Restricted data formats</h3> 214 215 <p>The next threat to our freedom comes from data formats that restrict 216 users.</p> 217 218 <p>Sometimes it's because the format is secret. There are many 219 application programs that save the user's data in a secret format, which 220 is meant to prevent the user from taking that data and using it with 221 some other program. The goal is to prevent interoperability.</p> 222 223 <p>Now, evidently, if a program implements a secret format, that's 224 because the program is not free software. So this is another kind of 225 malicious feature. Surveillance is one kind of malicious feature that 226 you find in some nonfree programs; using secret formats to restrict the 227 users is another kind of malicious feature that you also find in some 228 nonfree programs.</p> 229 230 <p>But if you have a free program that handles a certain format, 231 <em>ipso facto</em> that format is not secret. This kind of malicious 232 feature can only exist in a nonfree program. Surveillance features, 233 well, theoretically they could exist in a free program but you don't 234 find them happening. Because the users would fix it, you see. The users 235 wouldn't like this, so they would fix it.</p> 236 237 <p>In any case, we also find secret data formats in use for publication 238 of works. You find secret data formats in use for audio, such as music, 239 for video, for books… And these secret formats are known as 240 Digital Restrictions Management, or DRM, or digital handcuffs <em>(les 241 menottes numériques)</em>.</p> 242 243 <p>So, the works are published in secret formats so that only 244 proprietary programs can play them, so that these proprietary programs 245 can have the malicious feature of restricting the users, stopping them 246 from doing something that would be natural to do.</p> 247 248 <p>And this is used even by public entities to communicate with the 249 people. For instance Italian public television makes its programs 250 available on the net in a format called VC-1, which is a standard 251 supposedly, but it's a secret standard. Now I can't imagine how any 252 publicly supported entity could justify using a secret format to 253 communicate with the public. This should be illegal. In fact I think 254 all use of Digital Restrictions Management should be illegal. No company 255 should be allowed to do this.</p> 256 257 <p>There are also formats that are not secret but almost might as well 258 be secret, for instance Flash. Flash is not actually secret but Adobe 259 keeps making new versions, which are different, faster than anyone can 260 keep up and make free software to play those files; so it has almost 261 the same effect as being secret.</p> 262 263 <p>Then there are the patented formats, such as 264 MP3<a href="#f1"><sup>1</sup></a> for audio. It's bad to distribute 265 audio in MP3 format. There is free software to handle MP3 format, to 266 play it and to generate it, but because it's patented in many 267 countries, many distributors of free software don't dare include those 268 programs; so if they distribute the GNU+Linux system, their system 269 doesn't include a player for MP3. As a result if anyone distributes 270 some music in MP3, that's putting pressure on people not to use 271 GNU/Linux. Sure, if you're an expert you can find a free software and 272 install it, but there are lots of non experts, and they might see that 273 they installed a version of GNU/Linux which doesn't have that 274 software, and it won't play MP3 files, and they think it's the 275 system's fault. They don't realize it's MP3's fault. But this is the 276 fact.</p> 277 278 <p>Therefore, if you want to support freedom, don't distribute MP3 279 files. That's why I say if you're recording my speech and you want to 280 distribute copies, don't do it in a patented format such as MPEG-2, 281 or MPEG-4, or MP3. Use a format friendly to free software, such as the 282 OGG formats or WebM. And by the way, if you are going to distribute 283 copies of the recording, please put on it the Creative Commons, No 284 Derivatives license. This is a statement of my personal views. If it 285 were a lecture for a course, if it were didactic, then it ought to be 286 free, but statements of opinion are different.</p> 287 288 <h3 id="proprietary">Software that isn't free</h3> 289 290 <p>Now this leads me to the next threat which comes from software that 291 the users don't have control over. In other words, software that isn't 292 free, that is not <i>libre</i>. In this particular point French 293 is clearer than English. The English word “free” means 294 <i>libre</i> and <i>gratuit</i>, but what I mean when I say 295 “free software” is <i>logiciel libre</i>. I don't mean 296 <i>gratuit</i>. I'm not talking about price. Price is a side 297 issue, just a detail, because it doesn't matter ethically. You know, if 298 I have a copy of a program and I sell it to you for one euro or a 299 hundred euros, who cares? Right? Why should anyone think that's good or 300 bad? Or suppose I gave it to you <i>gratuitement</i>… 301 Still, who cares? But whether this program respects your freedom, that's 302 important!</p> 303 304 <p>So free software is software that respects users' freedom. What does 305 this mean? Ultimately there are just two possibilities with software: 306 either the users control the program or the program controls the users. 307 If the users have certain essential freedoms, then <em>they</em> control 308 the program, and those freedoms are the criterion for free software. But 309 if the users <em>don't</em> fully have the essential freedoms, then 310 the program controls the users. But somebody controls that program and, 311 through it, has <em>power</em> over the users. </p> 312 313 <p>So, a nonfree program is an instrument to give somebody <em>power</em> 314 over a lot of other people, and this is unjust power that nobody should 315 ever have. This is why nonfree software <i>(les logiciels privateurs, 316 qui privent de la liberté)</i>, why proprietary software is 317 an injustice and should not exist; because it leaves the users without 318 freedom.</p> 319 320 <p>Now, the developer who has control of the program often feels tempted 321 to introduce malicious features to <em>further</em> exploit or abuse 322 those users. He feels a temptation because he knows he can get away with 323 it. Because his program controls the users and the users do not have 324 control of the program, if he puts in a malicious feature, the users 325 can't fix it; they can't remove the malicious feature.</p> 326 327 <p>I've already told you about two kinds of malicious features: 328 surveillance features, such as are found in Windows and the iPhone and 329 Flash player and the Swindle, sort of. And there are also features to 330 restrict users, which work with secret data formats, and those are found 331 in Windows, Macintosh, the iPhone, Flash player, the Amazon Swindle, 332 the Playstation 3 and lots and lots of other programs.</p> 333 334 <p>The other kind of malicious feature is the backdoor. That means 335 something in that program is listening for remote commands and obeying 336 them, and those commands can mistreat the user. We know of backdoors in 337 Windows, in the iPhone, in the Amazon Swindle. The Amazon Swindle has 338 a backdoor that can delete books, remotely delete books. We know this 339 by observation, because Amazon did it: in 2009 Amazon remotely deleted 340 thousands of copies of a particular book. Those were authorized copies, 341 people had obtained them directly from Amazon, and thus Amazon knew 342 exactly where they were, which is how Amazon knew where to send the 343 commands to delete those books. You know which book Amazon deleted? 344 <em>1984</em> by George Orwell. [laughter] It's a book everyone should 345 read, because it discusses a totalitarian state that did things like 346 delete books it didn't like. Everybody should read it, but not on the 347 Amazon Swindle. [laughter]</p> 348 349 <p>Anyway, malicious features are present in the most widely used 350 nonfree programs, but they are rare in free software, because with free 351 software the users have control. They can read the source code and they 352 can change it. So, if there were a malicious feature, somebody would 353 sooner or later spot it and fix it. This means that somebody who is 354 considering introducing a malicious feature does not find it so 355 tempting, because he knows he might get away with it for a while but 356 somebody will spot it, will fix it, and everybody will loose trust in 357 the perpetrator. It's not so tempting when you know you're going to 358 fail. And that's why we find that malicious features are rare in free 359 software, and common in proprietary software.</p> 360 361 <h3 id="four-freedoms">The four freedoms of free software</h3> 362 363 <p>The essential freedoms are four:</p> 364 365 <ul> 366 <li>Freedom 0 is the freedom to run the program as you wish.</li> 367 <li>Freedom 1 is the freedom to study the source code and change it, 368 so the program does your computing the way you wish.</li> 369 <li>Freedom 2 is the freedom to help others. That's the freedom to 370 make exact copies and redistribute them when you wish.</li> 371 <li>Freedom 3 is the freedom to contribute to your community. That's 372 the freedom to make copies of your modified versions, if you 373 have made any, and then distribute them to others when you wish.</li> 374 </ul> 375 376 <p>These freedoms, in order to be adequate, must apply to all activities 377 of life. For instance if it says “this is free for academic 378 use,” it's not free. Because that's too limited. It doesn't apply 379 to all areas of life. In particular, if a program is free, that means 380 it can be modified and distributed commercially, because commerce is 381 an area of life, an activity in life. And this freedom has to apply to 382 all activities.</p> 383 384 <p>However, it's not obligatory to do any of these things. The point 385 is you're free to do them if you wish, when you wish. But you never have 386 to do them. You don't have to do any of them. You don't have to run the 387 program. You don't have to study or change the source code. You don't 388 have to make any copies. You don't have to distribute your modified 389 versions. The point is you should be free to do those things <em>if 390 you wish</em>.</p> 391 392 <p>Now, freedom number 1, the freedom to study and change the source 393 code to make the program do your computing as you wish, includes 394 something that might not be obvious at first. If the program comes in a 395 product, and the developer can provide an upgrade that will run, then 396 you have to be able to make your version run in that product. If the 397 product will only run the developer's versions, and refuses to run 398 yours, the executable in that product is not free software. Even if it 399 was compiled from free source code, it's not free because you don't have 400 the freedom to make the program do your computing the way you wish. So, 401 freedom 1 has to be real, not just theoretical. It has to include the 402 freedom to use <em>your</em> version, not just the freedom to make some 403 source code that won't run.</p> 404 405 <h3 id="gnu">The GNU Project and the Free Software movement</h3> 406 407 <p>I launched the Free Software movement in 1983, when I announced 408 the plan to develop a free software operating system whose name is 409 GNU. Now GNU, the name GNU, is a joke; because part of the hacker's 410 spirit is to have fun even when you're doing something <em>very</em> 411 serious. Now I can't think of anything more seriously important than 412 defending freedom.</p> 413 414 <p>But that didn't mean I couldn't give my system a name that's a joke. 415 So GNU is a joke because it's a recursive acronym, it stands for 416 “GNU's Not Unix,” so G.N.U.: GNU's Not Unix. So the G in 417 GNU stands for GNU.</p> 418 419 <p>In fact this was a tradition at the time. The tradition was: if 420 there was an existing program and you wrote something similar to it, 421 inspired by it, you could give credit by giving your program a name 422 that's a recursive acronym saying it's not the other one. So I gave 423 credit to Unix for the technical ideas of Unix, but with the name GNU, 424 because I decided to make GNU a Unix-like system, with the same 425 commands, the same system calls, so that it would be compatible, so that 426 people who used Unix could switch over easily.</p> 427 428 <p>But the reason for developing GNU, that was unique. GNU is the 429 only operating system, as far as I know, ever developed for the 430 purpose of freedom. Not for technical motivations, not for commercial 431 motivations. GNU was written for <em>your</em> freedom. Because without 432 a free operating system, it's impossible to have freedom and use a 433 computer. And there were none, and I wanted people to have freedom, 434 so it was up to me to write one.</p> 435 436 <p>Nowadays there are millions of users of the GNU operating system and 437 most of them don't <em>know</em> they are using the GNU operating 438 system, because there is a widespread practice which is not nice. People 439 call the system “Linux.” Many do, but some people don't, and 440 I hope you'll be one of them. Please, since we started this, since we 441 wrote the biggest piece of the code, please give us equal mention, please 442 call the system “GNU+Linux,” or “GNU/Linux.” 443 It's not much to ask.</p> 444 445 <p>But there is another reason to do this. It turns out that the person 446 who wrote Linux, which is one component of the system as we use it 447 today, he doesn't agree with the Free Software movement. And so if you 448 call the whole system Linux, in effect you're steering people towards 449 his ideas, and away from our ideas. Because he's not gonna say to them 450 that they deserve freedom. He's going to say to them that he likes 451 convenient, reliable, powerful software. He's going to tell people that 452 those are the important values.</p> 453 454 <p>But if you tell them the system is GNU+Linux—it's the GNU 455 operating system plus Linux the kernel—then they'll know about us, 456 and then they might listen to what we say: you deserve freedom. And 457 since freedom will be lost if we don't defend it—there's always 458 going to be a Sarkozy to take it away—we need above all to teach 459 people to demand freedom, to be ready to stand up for their freedom the 460 next time someone threatens to take it away.</p> 461 462 <p>Nowadays, you can tell who doesn't want to discuss these ideas of 463 freedom because they don't say <i>logiciel libre</i>. They don't 464 say <i>libre</i>, they say “open source.” That term 465 was coined by the people like Mr Torvalds who would prefer that these 466 ethical issues don't get raised. And so the way you can help us raise 467 them is by saying <i>libre</i>. You know, it's up to you where you 468 stand, you're free to say what you think. If you agree with them, you 469 can say open source. If you agree with us, show it, say 470 <i>libre</i>!</p> 471 472 <h3 id="education">Free software and education</h3> 473 474 <p>The most important point about free software is that schools 475 <em>must</em> teach exclusively free software. All levels of schools 476 from kindergarten to university, it's their moral responsibility to 477 teach only free software in their education, and all other educational 478 activities as well, including those that say that they're spreading 479 digital literacy. A lot of those activities teach Windows, which means 480 they're teaching <em>dependence</em>. To teach people the use of 481 proprietary software is to teach dependence, and educational activities 482 must never do that because it's the opposite of their mission. 483 Educational activities have a social mission to educate good citizens of 484 a strong, capable, cooperating, independent and free society. And in the 485 area of computing, that means: teach free software; never teach a 486 proprietary program because that's inculcating dependence.</p> 487 488 <p>Why do you think some proprietary developers offer gratis copies to 489 schools? They want the schools to make the children dependent. And then, 490 when they graduate, they're still dependent and, you know, the company 491 is not going to offer them gratis copies. And some of them get jobs and 492 go to work for companies. Not many of them anymore, but some of them. 493 And those companies are not going to be offered gratis copies. Oh no! 494 The idea is: if the school directs the students down the path of 495 permanent dependence, they can drag the rest of society with them into 496 dependence. That's the plan! It's just like giving the school gratis 497 needles full of addicting drugs, saying: “Inject this into your 498 students, the first dose is gratis. Once you're dependent, then you have 499 to pay.” Well, the school would reject the drugs because it isn't 500 right to teach the students to use addictive drugs, and it's got to 501 reject the proprietary software also. </p> 502 503 <p>Some people say: “Let's have the school teach both proprietary 504 software and free software, so the students become familiar with 505 both.” That's like saying: “For the lunch let's give the 506 kids spinach and tobacco, so that they become accustomed to both.” 507 No! The schools are only supposed to teach good habits, not bad ones! So 508 there should be no Windows in a school, no Macintosh, nothing 509 proprietary in the education.</p> 510 511 <p>But also, for the sake of educating the programmers. You see, some 512 people have a talent for programming. At ten to thirteen years old, 513 typically, they're fascinated, and if they use a program, they want to 514 know: “How does it do this?” But when they ask the teacher, 515 if it's proprietary, the teacher has to say: “I'm sorry, it's a 516 secret, we can't find out.” Which means education is forbidden. A 517 proprietary program is the enemy of the spirit of education. It's 518 knowledge withheld, so it should not be tolerated in a school, even 519 though there may be plenty of people in the school who don't care about 520 programming, don't want to learn this. Still, because it's the enemy of 521 the spirit of education, it shouldn't be there in the school. </p> 522 523 <p>But if the program is free, the teacher can explain what he knows, 524 and then give out copies of the source code, saying: “Read it and 525 you'll understand everything.” And those who are really 526 fascinated, they will read it! And this gives them an opportunity to 527 start to learn how to be good programmers.</p> 528 529 <p>To learn to be a good programmer, you'll need to recognize that 530 certain ways of writing code, even if they make sense to you and they 531 are correct, they're not good because other people will have trouble 532 understanding them. Good code is clear code that others will have an 533 easy time working on when they need to make further changes.</p> 534 535 <p>How do you learn to write good clear code? You do it by reading lots 536 of code, and writing lots of code. Well, only free software offers the 537 chance to read the code of large programs that we really use. And then 538 you have to write lots of code, which means you have to write changes 539 in large programs.</p> 540 541 <p>How do you learn to write good code for the large programs? You have 542 to start small, which does <em>not</em> mean small program, oh no! The 543 challenges of the code for large programs don't even begin to appear in 544 small programs. So the way you start small at writing code for large 545 programs is by writing small changes in large programs. And only free 546 software gives you the chance to do that.</p> 547 548 <p>So, if a school wants to offer the possibility of learning to be a 549 good programmer, it needs to be a free software school.</p> 550 551 <p>But there is an even deeper reason, and that is for the sake of 552 moral education, education in citizenship. It's not enough for a school 553 to teach facts and skills, it has to teach the spirit of goodwill, the 554 habit of helping others. Therefore, every class should have this rule: 555 “Students, if you bring software to class, you may not keep it for 556 yourself, you must share copies with the rest of the class, including 557 the source code in case anyone here wants to learn. Because this class 558 is a place where we share our knowledge. Therefore, bringing a 559 proprietary program to class is not permitted.” The school must 560 follow its own rule to set a good example. Therefore, the school must 561 bring only free software to class, and share copies, including the 562 source code, with anyone in the class that wants copies.</p> 563 564 <p>Those of you who have a connection with a school, it's <em>your</em> 565 duty to campaign and pressure that school to move to free software. And 566 you have to be firm. It may take years, but you can succeed as long 567 as you never give up. Keep seeking more allies among the students, the 568 faculty, the staff, the parents, anyone! And always bring it up as an 569 ethical issue. If someone else wants to sidetrack the discussion into 570 this practical advantage and this practical disadvantage, which means 571 they're ignoring the most important question, then you have to say: 572 “This is not about how to do the best job of educating, this is 573 about how to do a good education instead of an evil one. It's how to do 574 education right instead of wrong, not just how to make it a little more 575 effective, or less.” So don't get distracted with those secondary 576 issues, and ignore what really matters!</p> 577 578 <h3 id="services">Internet services</h3> 579 580 <p>So, moving on to the next menace. There are two issues that arise 581 from the use of Internet services. One of them is that the server 582 could abuse your data, and another is that it could take control of 583 your computing.</p> 584 585 <p>The first issue, people already know about. They are aware that, if 586 you upload data to an Internet service, there is a question of what it 587 will do with that data. It might do things that mistreat you. What could 588 it do? It could lose the data, it could change the data, it could refuse 589 to let you get the data back. And it could also show the data to someone 590 else you don't want to show it to. Four different possible things.</p> 591 592 <p>Now, here, I'm talking about the data that you <em>knowingly</em> 593 gave to that site. Of course, many of those services do 594 <em>surveillance</em> as well.</p> 595 596 <p>For instance, consider Facebook. Users send lots of data to Facebook, 597 and one of the bad things about Facebook is that it shows a lot of that 598 data to lots of other people, and even if it offers them a setting to 599 say “no,” that may not really work. After all, if you say 600 “some other people can see this piece of information,” 601 one of them might publish it. Now, that's not Facebook's fault, 602 there is nothing they could do to prevent that, but it ought to warn 603 people. Instead of saying “mark this as only to your so-called 604 friends,” it should say “keep in mind that your so-called 605 friends are not really your friends, and if they want to make trouble 606 for you, they could publish this.” Every time, it should say that, 607 if they want to deal with people ethically.</p> 608 609 <p>As well as all the data users of Facebook voluntarily give to 610 Facebook, Facebook is collecting data about people's activities on the 611 net through various methods of surveillance. But that's the first 612 menace. For now I am talking about the data that people <em>know</em> 613 they are giving to these sites.</p> 614 615 <p>Now, losing data is something that could always happen by accident. 616 That possibility is always there, no matter how careful someone is. 617 Therefore, you need to keep multiple copies of data that matters. If you 618 do that, then, even if someone decided to delete your data 619 intentionally, it wouldn't hurt you that much, because you'd have other 620 copies of it.</p> 621 622 <p>So, as long as you are maintaining multiple copies, you don't have 623 to worry too much about someone's losing your data. What about whether 624 you can get it back. Well, some services make it possible to get back 625 all the data that you sent, and some don't. Google services will let the 626 user get back the data the user has put into them. Facebook, famously, 627 does not.</p> 628 629 <p>Of course in the case of Google, this only applies to the data the 630 user <em>knows</em> Google has. Google does lots of surveillance, too, 631 and that data is not included. But in any case, if you can get the data 632 back, then you could track whether they have altered it. And they're not 633 very likely to start altering people's data if the people can tell. So 634 maybe we can keep a track on that particular kind of abuse.</p> 635 636 <p>But the abuse of showing the data to someone you don't want it to 637 be shown to is very common and almost impossible for you to prevent, 638 especially if it's a US company. You see, the most hypocritically named 639 law in US history, the so-called USA Patriot Act, says that Big 640 Brother's police can collect just about all the data that companies 641 maintain about individuals. Not just companies, but other organizations 642 too, like public libraries. The police can get this massively, without 643 even going to court. Now, in a country that was founded on an idea of 644 freedom, there's nothing more unpatriotic than this. But this is what 645 they did. So you mustn't ever trust any of your data to a US company. 646 And they say that foreign subsidiaries of US companies are subject to 647 this as well. So the company you're directly dealing with may be in 648 Europe, but if it's owned by a US company, you've got the same problem 649 to deal with.</p> 650 651 <p>However, this is mainly of concern when the data you're sending to 652 the service is not for publication. There are some services where you 653 publish things. Of course, if you publish something, you know everybody 654 is gonna be able to see it. So, there is no way they can hurt you by 655 showing it to somebody who wasn't supposed to see it. There is nobody 656 who wasn't supposed to see it, if you published it. So in that case the 657 problem doesn't exist.</p> 658 659 <p>So these are four sub-issues of this one threat of abusing our data. 660 The idea of the Freedom Box project is you have your own server in your 661 own home, and when you want to do something remotely, you do it with 662 your own server, and the police have to get a court order in order to 663 search your server. So you have the same rights this way that you would 664 have traditionally in the physical world.</p> 665 666 <p>The point here and in so many other issues is: as we start doing 667 things digitally instead of physically, we shouldn't lose any of our 668 rights; because the general tendency is that we do lose rights.</p> 669 670 <p>Basically, Stallman's law says that, in an epoch when governments 671 work for the mega-corporations instead of reporting to their citizens, 672 every technological change can be taken advantage of to reduce our 673 freedom. Because reducing our freedom is what these governments want 674 to do. So the question is: when do they get an opportunity? Well, any 675 change that happens for some other reason is a possible opportunity, 676 and they will take advantage of it if that's their general desire.</p> 677 678 <p>But the other issue with Internet services is that they can take 679 control of your computing, and that's not so commonly known. But it's 680 becoming more common. There are services that offer to do computing for 681 you on data supplied by you—things that you should do in your own 682 computer but they invite you to let somebody else's computer do that 683 computing work for you. And the result is you lose control over it. It's 684 just as if you used a nonfree program.</p> 685 686 <p>Two different scenarios, but they lead to the same problem. If you 687 do your computing with a nonfree program… well, the users don't 688 control the nonfree program, it controls the users, which would include 689 you. So you've lost control of the computing that's being done. But 690 if you do your computing in his server… well, the programs that 691 are doing it are the ones he chose. You can't touch them or see them, 692 so you have no control over them. He has control over them, maybe.</p> 693 694 <p>If they are free software and he installs them, then he has control 695 over them. But even he might not have control. He might be running a 696 proprietary program in his server, in which case it's somebody else 697 who has control of the computing being done in his server. He doesn't 698 control it and you don't.</p> 699 700 <p>But suppose he installs a free program, then he has control over the 701 computing being done in his computer, but you don't. So, either way, 702 <em>you don't!</em> So the only way to have control over your computing 703 is to do it with <em>your copy</em> of a free program.</p> 704 705 <p>This practice is called “Software as a Service.” It means 706 doing your computing with your data in somebody else's server. And 707 I don't know of anything that can make this acceptable. It's always 708 something that takes away your freedom, and the only solution I know of 709 is to refuse. For instance, there are servers that will do translation 710 or voice recognition, and you are letting them have control over this 711 computing activity, which we shouldn't ever do.</p> 712 713 <p>Of course, we are also giving them data about ourselves which they 714 shouldn't have. Imagine if you had a conversation with somebody through 715 a voice-recognition translation system that was Software as a Service 716 and it's really running on a server belonging to some company. Well, 717 that company also gets to know what was said in the conversation, and 718 if it's a US company that means Big Brother also gets to know. This is 719 no good.</p> 720 721 <h3 id="voting">Computers for voting</h3> 722 723 <p>The next threat to our freedom in a digital society is using 724 computers for voting. You can't trust computers for voting. Whoever 725 controls the software in those computers has the power to commit 726 undetectable fraud.</p> 727 728 <p>Elections are special, because there's nobody involved that we dare 729 trust fully. Everybody has to be checked, crosschecked by others, so 730 that nobody is in a position to falsify the results by himself. Because 731 if anybody is in a position to do that, he might do it. So our 732 traditional systems for voting were designed so that nobody was fully 733 trusted, everybody was being checked by others. So that nobody could 734 easily commit fraud. But once you introduce a program, this is 735 impossible.</p> 736 737 <p>How can you tell if a voting machine will honestly count the 738 votes? You'd have to study the program that's running in it during the 739 election, which of course nobody can do, and most people wouldn't even 740 know how to do. But even the experts who might theoretically be capable 741 of studying the program, they can't do it while people are voting. 742 They'd have to do it in advance, and then how do they know that the 743 program they studied is the one that's running while people vote? Maybe 744 it's been changed.</p> 745 746 <p>Now, if this program is proprietary, that means some company 747 controls it. The election authority can't even tell what that program 748 is doing. Well, this company then could rig the election. And there 749 are accusations that this was done in the US within the past ten years, 750 that election results were falsified this way.</p> 751 752 <p>But what if the program is free software? That means the election 753 authority who owns this voting machine has control over the software in 754 it, so the election authority could rig the election. You can't trust 755 them either. You don't dare trust <em>anybody</em> in voting, and the 756 reason is, there's no way that the voters can verify for themselves that 757 their votes were correctly counted, nor that false votes were not added.</p> 758 759 <p>In other activities of life, you can usually tell if somebody is 760 trying to cheat you. Consider for instance buying something from a 761 store. You order something, maybe you give a credit card number. If the 762 product doesn't come, you can complain and you can… of course if 763 you've got a good enough memory you'll notice if that product doesn't 764 come. You're not just giving total blind trust to the store, because you 765 can check. But in elections you can't check.</p> 766 767 <p>I saw once a paper where someone described a theoretical system for 768 voting which used some sophisticated mathematics so that people could 769 check that their votes had been counted, even though everybody's vote 770 was secret, and they could also verify that false votes hadn't been 771 added. It was very exciting, powerful mathematics; but even if that 772 mathematics is correct, that doesn't mean the system would be acceptable 773 to use in practice, because the vulnerabilities of a real system might 774 be outside of that mathematics. For instance, suppose you're voting over 775 the Internet and suppose you're using a machine that's a zombie. It 776 might tell you that the vote was sent for A while actually sending a 777 vote for B. Who knows whether you'd ever find out? So, in practice the 778 only way to see if these systems work and are honest is through years, 779 in fact decades, of trying them and checking in other ways what 780 happened.</p> 781 782 <p>I wouldn't want my country to be the pioneer in this. So, use paper 783 for voting. Make sure there are ballots that can be recounted.</p> 784 785 <h4>Speaker's note, added subsequently</h4> 786 787 <p>Remote voting by internet has an inherent social danger, that your 788 boss might tell you, “I want you to vote for candidate C, and do it 789 from the computer in my office while I watch you.” He does not need 790 to say out loud that you might be fired if you do not comply. This 791 danger is not based on a technical flaw, so it can't be fixed by 792 fixing the technology.</p> 793 794 795 <h3 id="sharing">The war on sharing</h3> 796 797 <p>The next threat to our freedom in a digital society comes from the 798 war on sharing.</p> 799 800 <p>One of the tremendous benefits of digital technology is that it is 801 easy to copy published works and share these copies with others. Sharing 802 is good, and with digital technology, sharing is easy. So, millions of 803 people share. Those who profit by having power over the distribution 804 of these works don't want us to share. And since they are businesses, 805 governments which have betrayed their people and work for the Empire of 806 mega-corporations try to serve those businesses, they are against their 807 own people, they are for the businesses, for the publishers.</p> 808 809 <p>Well, that's not good. And with the help of these governments, 810 the companies have been waging <em>war</em> on sharing, and they've 811 proposed a series of cruel draconian measures. Why do they propose cruel 812 draconian measures? Because nothing less has a chance of success: when 813 something is good and easy, people do it, and the only way to stop them 814 is by being very nasty. So of course, what they propose is nasty, nasty, 815 and the next one is nastier. So they tried suing teenagers for hundreds 816 of thousands of dollars. That was pretty nasty. And they tried turning 817 our technology against us, Digital Restrictions Management that means, 818 digital handcuffs.</p> 819 820 <p>But among the people there were clever programmers too and they found 821 ways to break the handcuffs. So for instance, DVDs were designed to have 822 encrypted movies in a secret encryption format, and the idea was that 823 all the programs to decrypt the video would be proprietary with digital 824 handcuffs. They would all be designed to restrict the users. And their 825 scheme worked OK for a while. But some people in Europe figured out the 826 encryption and they released a free program that could actually play 827 the video on a DVD.</p> 828 829 <p>Well, the movie companies didn't leave it there. They went to the US 830 congress and bought a law making that software illegal. The United 831 States invented censorship of software in 1998, with the Digital 832 Millennium Copyright Act (DMCA). So the distribution of that free 833 program was forbidden in the United States. Unfortunately it didn't stop 834 with the United States. The European Union adopted a directive, in 2003 835 I believe, requiring such laws. The directive only says that commercial 836 distribution has to be banned, but just about every country in the 837 European Union has adopted a nastier law. In France, the mere possession 838 of a copy of that program is an offense punished by imprisonment, thanks 839 to Sarkozy. I believe that was done by the law DADVSI. I guess he hoped 840 that with an unpronounceable name, people wouldn't be able to criticize 841 it. [laughter]</p> 842 843 <p>So, elections are coming. Ask the candidates in the parties: will you 844 repeal the DADVSI? And if not, don't support them. You mustn't give up 845 lost moral territory forever. You've got to fight to win it back.</p> 846 847 <p>So, we still are fighting against digital handcuffs. The Amazon 848 Swindle has digital handcuffs to take away the traditional freedoms of 849 readers to do things such as: give a book to someone else, or lend a 850 book to someone else. That's a vitally important social act. That is 851 what builds society among people who read, lending books. Amazon doesn't 852 want to let people lend books freely. And then there is also selling a 853 book, perhaps to a used bookstore. You can't do that either.</p> 854 855 <p>It looked for a while as if DRM had disappeared on music, but now 856 they're bringing it back with streaming services such as Spotify. These 857 services all require proprietary client software, and the reason is 858 so they can put digital handcuffs on the users. So, reject them! They 859 already showed quite openly that you can't trust them, because first 860 they said: “You can listen as much as you like.” And then 861 they said: “Oh, no! You can only listen a certain number of hours 862 a month.” The issue is not whether that particular change was good 863 or bad, just or unjust; the point is, they have the power to impose any 864 change in policies. So don't let them have that power. You should have 865 your <em>own</em> copy of any music you want to listen to.</p> 866 867 <p>And then came the next assault on our freedom: HADOPI, basically 868 punishment on accusation. It was started in France but it's been 869 exported to many other countries. The United States now demand such 870 unjust policies in its free exploitation treaties. A few months ago, 871 Colombia adopted such a law under orders from its masters in Washington. 872 Of course, the ones in Washington are not the real masters, they're just 873 the ones who control the United States on behalf of the Empire. But 874 they're the ones who also dictate to Colombia on behalf of the Empire.</p> 875 876 <p>In France, since the Constitutional Council objected to explicitly 877 giving people punishment without trial, they invented a kind of trial 878 which is not a real trial, it's just a form of a trial, so they can 879 <em>pretend</em> that people have a trial before they're punished. But 880 in other countries they don't bother with that, it's explicit punishment 881 on accusation only. Which means that for the sake of their war on 882 sharing, they're prepared to abolish the basic principles of justice. It 883 shows how thoroughly anti-freedom anti-justice they are. These are not 884 legitimate governments.</p> 885 886 <p>And I'm sure they'll come up with more nasty ideas because they're 887 paid to defeat the people no matter what it takes. Now, when they do 888 this, they always say that it's for the sake of the artists, that they 889 have to “protect” the “creators.” Now those are 890 both propaganda terms. I am convinced that the reason they love the word 891 “creators” is because it is a comparison with a deity. They 892 want us to think of artists as super-human, and thus deserving special 893 privileges and power over us, which is something I disagree with.</p> 894 895 <p>In fact though, the only artists that benefit very much from this 896 system are the big stars. The other artists are getting crushed into the 897 ground by the heels of these same companies. But they treat the stars 898 very well, because the stars have a lot of clout. If a star threatens to 899 move to another company, the company says: “Oh, we'll give you 900 what you want.” But for any other artist they say: “You 901 don't matter, we can treat you any way we like.”</p> 902 903 <p>So the superstars have been corrupted by the millions of dollars 904 or euros that they get, to the point where they'll do almost 905 anything for more money. For instance, J. K. Rowling is a good 906 example. J. K. Rowling, a few years ago, went to court in Canada and 907 obtained an order that people who had bought her books must not read 908 them. She got an order telling people not to read her books!</p> 909 910 <p>Here's what happened. A bookstore put the books on display for sale 911 too early, before the date they were supposed to go on sale. And people 912 came into the store and said: “Oh, I want that!” And they 913 bought it and took away their copies. And then, they discovered the 914 mistake, so they took the copies off of display. But Rowling wanted to 915 crush any circulation of any information from those books, so she went 916 to court, and the court ordered those people not to read the books that 917 they now owned.</p> 918 919 <p>In response, I call for a total boycott of Harry Potter. But I don't 920 say you shouldn't read those books or watch the movies, I only say you 921 shouldn't buy the books or pay for the movies. [laughter] I leave it to 922 Rowling to tell people not to read the books. As far as I am concerned, 923 if you borrow the book and read it, that's OK. [laughter] Just don't 924 give her any money! But this happened with paper books. The court could 925 make this order but it couldn't get the books back from the people who 926 had bought them. Imagine if they were ebooks. Imagine if they were 927 ebooks on the Swindle. Amazon could send commands to erase them.</p> 928 929 <p>So, I don't have much respect for stars who will go to such lengths 930 for more money. But most artists aren't like that, they never got 931 enough money to be corrupted. Because the current system of copyright 932 supports most artists very badly. And so, when these companies demand to 933 expand the war on sharing, supposedly for the sake of the artists, I'm 934 against what they want but I would like to support the artists better. I 935 appreciate their work and I realize if we want them to do more work we 936 should support them.</p> 937 938 <h3 id="arts">Supporting the arts</h3> 939 940 <p>I have two proposals for how to support artists, methods that are 941 compatible with sharing, that would allow us to end the war on sharing 942 and still support artists.</p> 943 944 <p>One method uses tax money. We get a certain amount of public funds to 945 distribute among artists. But, how much should each artist get? Well, 946 we have to measure popularity. You see, the current system supposedly 947 supports artists based on their popularity. So I'm saying: let's keep 948 that, let's continue in this system to support them based on their 949 popularity. We can measure the popularity of all the artists with some 950 kind of polling or sampling, so that we don't have to do surveillance. 951 We can respect people's anonymity.</p> 952 953 <p>OK, we get a raw popularity figure for each artist, how do we convert 954 that into an amount of money? Well, the obvious way is: distribute 955 the money in proportion to popularity. So if A is a thousand times as 956 popular as B, A will get a thousand times as much money as B. That's not 957 efficient distribution of the money. It's not putting the money to good 958 use. You see, it's easy for a star A to be a thousand times as popular 959 as a fairly successful artist B. And if we use linear proportion, we'll 960 give A a thousand times as much money as we give B. And that means that, 961 either we have to make A tremendously rich, or we are not supporting 962 B enough.</p> 963 964 <p>Well, the money we use to make A tremendously rich is failing to do 965 an effective job of supporting the arts; so, it's inefficient. Therefore 966 I say: let's use the cube root. Cube root looks sort of like this. The 967 point is: if A is a thousand times as popular as B, with the cube root A 968 will get ten times as much as B, not a thousand times as much, just ten 969 times as much. So the use of the cube root shifts a lot of the money 970 from the stars to the artists of moderate popularity. And that means, 971 with less money we can adequately support a much larger number of 972 artists.</p> 973 974 <p>There are two reasons why this system would use less money than we 975 pay now. First of all because it would be supporting artists but not 976 companies, second because it would shift the money from the stars to the 977 artists of moderate popularity. Now, it would remain the case that the 978 more popular you are, the more money you get. And so the star A would 979 still get more than B, but not astronomically more.</p> 980 981 <p>That's one method, and because it won't be so much money it doesn't 982 matter so much how we get the money. It could be from a special tax on 983 Internet connectivity, it could just be some of the general budget that 984 gets allocated to this purpose. We won't care because it won't be so 985 much money, much less than we're paying now.</p> 986 987 <p>The other method I've proposed is voluntary payments. Suppose each 988 player had a button you could use to send one euro. A lot of people 989 would send it; after all it's not that much money. I think a lot of 990 you might push that button every day, to give one euro to some artist 991 who had made a work that you liked. But nothing would demand this, you 992 wouldn't be required or ordered or pressured to send the money; you 993 would do it because you felt like it. But there are some people who 994 wouldn't do it because they're poor and they can't afford to give one 995 euro. And it's good that they won't give it, we don't have to squeeze 996 money out of poor people to support the artists. There are enough 997 non-poor people who'll be happy to do it. Why wouldn't you give one euro 998 to some artists today, if you appreciated their work? It's too 999 inconvenient to give it to them. So my proposal is to remove the 1000 inconvenience. If the only reason not to give that euro is you would 1001 have one euro less, you would do it fairly often.</p> 1002 1003 <p>So these are my two proposals for how to support artists, while 1004 encouraging sharing because sharing is good. Let's put an end to the 1005 war on sharing, laws like DADVSI and HADOPI, it's not just the methods 1006 that they propose that are evil, their purpose is evil. That's why they 1007 propose cruel and draconian measures. They're trying to do something 1008 that's nasty by nature. So let's support artists in other ways.</p> 1009 1010 <h3 id="rights">Rights in cyberspace</h3> 1011 1012 <p>The last threat to our freedom in digital society is the fact that we 1013 don't have a firm right to do the things we do, in cyberspace. In the 1014 physical world, if you have certain views and you want to give people 1015 copies of a text that defends those views, you're free to do so. You 1016 could even buy a printer to print them, and you're free to hand them out 1017 on the street, or you're free to rent a store and hand them out there. 1018 If you want to collect money to support your cause, you can just have 1019 a can and people could put money into the can. You don't need to get 1020 somebody else's approval or cooperation to do these things.</p> 1021 1022 <p>But, in the Internet, you <em>do</em> need that. For instance if want 1023 to distribute a text on the Internet, you need companies to help you 1024 do it. You can't do it by yourself. So if you want to have a website, 1025 you need the support of an ISP or a hosting company, and you need a 1026 domain name registrar. You need them to continue to let you do what 1027 you're doing. So you're doing it effectively on sufferance, not by 1028 right.</p> 1029 1030 <p>And if you want to receive money, you can't just hold out a can. You 1031 need the cooperation of a payment company. And we saw that this makes 1032 all of our digital activities vulnerable to suppression. We learned this 1033 when the United States government launched a “distributed denial 1034 of service attack” (DDoS) against WikiLeaks. Now I'm making a 1035 bit of joke because the words “distributed denial of service 1036 attack” usually refer to a different kind of attack. But they 1037 fit perfectly with what the United States did. The United States went 1038 to the various kinds of network services that WikiLeaks depended on, 1039 and told them to cut off service to WikiLeaks. And they did!</p> 1040 1041 <p>For instance, WikiLeaks had rented a virtual Amazon server, and the 1042 US government told Amazon: “Cut off service for WikiLeaks.” 1043 And it did, arbitrarily. And then, Amazon had certain domain names such 1044 as wikileaks.org. The US government tried to get all those domains shut 1045 off. But it didn't succeed, some of them were outside its control and 1046 were not shut off.</p> 1047 1048 <p>Then, there were the payment companies. The US went to PayPal and 1049 said: “Stop transferring money to WikiLeaks or we'll make life 1050 difficult for you.” And PayPal shut off payments to WikiLeaks. And 1051 then it went to Visa and Mastercard and got them to shut off payments 1052 to WikiLeaks. Others started collecting money on WikiLeaks' behalf and 1053 their accounts were shut off too. But in this case, maybe something can 1054 be done. There's a company in Iceland which began collecting money on 1055 behalf of WikiLeaks, and so Visa and Mastercard shut off its account; 1056 it couldn't receive money from its customers either. And now, that 1057 business is suing Visa and Mastercard apparently, under European Union 1058 law, because Visa and Mastercard together have a near-monopoly. They're 1059 not allowed to arbitrarily deny service to anyone.</p> 1060 1061 <p>Well, this is an example of how things need to be for all kinds of 1062 services that we use in the Internet. If you rented a store to hand 1063 out statements of what you think, or any other kind of information 1064 that you can lawfully distribute, the landlord couldn't kick you out 1065 just because he didn't like what you were saying. As long as you keep 1066 paying the rent, you have a right to continue in that store for a 1067 certain agreed-on period of time that you signed. So you have some 1068 rights that you can enforce. And they couldn't shut off your telephone 1069 line because the phone company doesn't like what you said, or because 1070 some powerful entity didn't like what you said and threatened the phone 1071 company. No! As long as you pay the bills and obey certain basic rules, 1072 they can't shut off your phone line. This is what it's like to have some 1073 rights!</p> 1074 1075 <p>Well, if we move our activities from the physical world to the 1076 virtual world, then either we have the same rights in the virtual world, 1077 or we have been harmed. So, the precarity of all our Internet activities 1078 is the last of the menaces I wanted to mention.</p> 1079 1080 <p>Now I'd like to say that for more information about free software, 1081 look at gnu.org. Also look at fsf.org, which is the website of the Free 1082 Software Foundation. You can go there and find many ways you can help 1083 us, for instance. You can also become a member of the Free Software 1084 Foundation through that site. […] There is also the Free Software 1085 Foundation of Europe fsfe.org. You can join FSF Europe also. […]</p> 1086 <div class="column-limit"></div> 1087 1088 <h3 id="footnotes" class="footnote">Footnote</h3> 1089 1090 <ol> 1091 <li id="f1">As of 2017 the patents on playing MP3 files have 1092 reportedly expired.</li> 1093 </ol> 1094 </div> 1095 1096 </div><!-- for id="content", starts in the include above --> 1097 <!--#include virtual="/server/footer.html" --> 1098 <div id="footer" role="contentinfo"> 1099 <div class="unprintable"> 1100 1101 <p>Please send general FSF & GNU inquiries to 1102 <a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>. 1103 There are also <a href="/contact/">other ways to contact</a> 1104 the FSF. Broken links and other corrections or suggestions can be sent 1105 to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p> 1106 1107 <p><!-- TRANSLATORS: Ignore the original text in this paragraph, 1108 replace it with the translation of these two: 1109 1110 We work hard and do our best to provide accurate, good quality 1111 translations. However, we are not exempt from imperfection. 1112 Please send your comments and general suggestions in this regard 1113 to <a href="mailto:web-translators@gnu.org"> 1114 <web-translators@gnu.org></a>.</p> 1115 1116 <p>For information on coordinating and contributing translations of 1117 our web pages, see <a 1118 href="/server/standards/README.translations.html">Translations 1119 README</a>. --> 1120 Please see the <a 1121 href="/server/standards/README.translations.html">Translations 1122 README</a> for information on coordinating and contributing translations 1123 of this article.</p> 1124 </div> 1125 1126 <!-- Regarding copyright, in general, standalone pages (as opposed to 1127 files generated as part of manuals) on the GNU web server should 1128 be under CC BY-ND 4.0. Please do NOT change or remove this 1129 without talking with the webmasters or licensing team first. 1130 Please make sure the copyright date is consistent with the 1131 document. For web pages, it is ok to list just the latest year the 1132 document was modified, or published. 1133 1134 If you wish to list earlier years, that is ok too. 1135 Either "2001, 2002, 2003" or "2001-2003" are ok for specifying 1136 years, as long as each year in the range is in fact a copyrightable 1137 year, i.e., a year in which the document was published (including 1138 being publicly visible on the web or in a revision control system). 1139 1140 There is more detail about copyright years in the GNU Maintainers 1141 Information document, www.gnu.org/prep/maintain. --> 1142 1143 <p>Copyright © 2011, 2014, 2021 Richard Stallman</p> 1144 1145 <p>This page is licensed under a <a rel="license" 1146 href="http://creativecommons.org/licenses/by-nd/4.0/">Creative 1147 Commons Attribution-NoDerivatives 4.0 International License</a>.</p> 1148 1149 <!--#include virtual="/server/bottom-notes.html" --> 1150 1151 <p class="unprintable">Updated: 1152 <!-- timestamp start --> 1153 $Date: 2021/10/15 14:13:51 $ 1154 <!-- timestamp end --> 1155 </p> 1156 </div> 1157 </div><!-- for class="inner", starts in the banner include --> 1158 </body> 1159 </html>