taler-merchant-demos

Python-based Frontends for the Demonstration Web site
Log | Files | Refs | Submodules | README | LICENSE

free-digital-society.html (64117B)


      1 <!--#include virtual="/server/header.html" -->
      2 <!-- Parent-Version: 1.96 -->
      3 <!-- This page is derived from /server/standards/boilerplate.html -->
      4 <!--#set var="TAGS" value="speeches" -->
      5 <!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
      6 <title>A Free Digital Society - What Makes Digital Inclusion Good or 
      7 Bad? - GNU Project - Free Software Foundation</title>
      8 <style type="text/css" media="screen"><!--
      9 @media (min-width: 55em) {
     10   .toc li a {
     11     display: inline-block; width: 100%;
     12     vertical-align: top;
     13     position: relative; bottom: .15em;
     14   }
     15 }
     16 --></style>
     17 <!--#include virtual="/philosophy/po/free-digital-society.translist" -->
     18 <!--#include virtual="/server/banner.html" -->
     19 <!--#include virtual="/philosophy/ph-breadcrumb.html" -->
     20 <!--GNUN: OUT-OF-DATE NOTICE-->
     21 <!--#include virtual="/server/top-addendum.html" -->
     22 <div class="article reduced-width">
     23 
     24 <h2>A Free Digital Society - What Makes Digital Inclusion Good or Bad?</h2>
     25 
     26 <address class="byline">by Richard Stallman</address>
     27 
     28 <div class="infobox">
     29 <p>Transcription of a lecture at Sciences Po Paris, October 19, 2011&nbsp; (<a
     30 href="//audio-video.gnu.org/video/stallman-sciencespo-freesociety.webm">video</a>)</p> 
     31 </div>
     32 
     33 <div class="toc">
     34 <h3 class="no-display">Table of Contents</h3>
     35 <ul class="columns">
     36   <li><a href="#intro">Introduction</a></li>
     37   <li><a href="#surveillance">Surveillance</a></li> 
     38   <li><a href="#censorship">Censorship</a></li> 
     39   <li><a href="#formats">Restricted data formats</a></li> 
     40   <li><a href="#proprietary">Software that isn't free</a></li> 
     41   <li><a href="#four-freedoms">The four freedoms of free software</a></li> 
     42   <li><a href="#gnu">The GNU Project and the Free Software movement</a></li> 
     43   <li><a href="#education">Free software and education</a></li> 
     44   <li><a href="#services">Internet services</a></li>
     45   <li><a href="#voting">Computers for voting</a></li> 
     46   <li><a href="#sharing">The war on sharing</a></li> 
     47   <li><a href="#arts">Supporting the arts</a></li> 
     48   <li><a href="#rights">Rights in cyberspace</a></li>
     49 </ul>
     50 <hr class="no-display" />
     51 </div>
     52 
     53 <h3 id="intro">Introduction</h3>
     54 
     55 <p>Projects with the goal of digital inclusion are making a big
     56 assumption. They are assuming that participating in a digital society
     57 is good, but that's not necessarily true. Being in a digital society
     58 can be good or bad, depending on whether that digital society is just
     59 or unjust. There are many ways in which our freedom is being attacked
     60 by digital technology. Digital technology can make things worse, and it
     61 will, unless we fight to prevent it.</p>
     62 
     63 <p>Therefore, if we have an unjust digital society, we should cancel
     64 these projects for digital inclusion and launch projects for digital
     65 extraction. We have to extract people from digital society if it doesn't
     66 respect their freedom, or we have to make it respect their freedom.</p>
     67 
     68 <h3 id="surveillance">Surveillance</h3>
     69 
     70 <p>What are the threats? First, surveillance. Computers are Stalin's
     71 dream: they are ideal tools for surveillance, because anything we do
     72 with computers, the computers can record. They can record the 
     73 information in a perfectly indexed searchable form in a central 
     74 database, ideal for any tyrant who wants to crush opposition.</p>
     75 
     76 <p>Surveillance is sometimes done with our own computers. For instance,
     77 if you have a computer that's running Microsoft Windows, that system is
     78 doing surveillance. There are features in Windows that send data to some
     79 server, data about the use of the computer. A surveillance feature was
     80 discovered in the iPhone a few months ago, and people started calling it
     81 the &ldquo;spy-phone.&rdquo; Flash player has a surveillance feature 
     82 too, and so does the Amazon &ldquo;Swindle.&rdquo; They call it the Kindle, but
     83 I call it &ldquo;<a href="/philosophy/why-call-it-the-swindle.html">the
     84 Swindle</a>,&rdquo; <em>l'escroc</em>, 
     85 because it's meant to swindle users out of their freedom. It makes 
     86 people identify themselves whenever they buy a book, and that means 
     87 Amazon has a giant list of all the books each user has read. Such a list 
     88 must not exist anywhere.</p>
     89 
     90 <p>Most portable phones will transmit their location, computed using
     91 GPS, on remote command. The phone company is accumulating a giant list 
     92 of places that the user has been. A German MP in the Green Party 
     93 [correction: Malte Spitz is on the staff of the Green Party, not an 
     94 elected official] asked the phone company to give him the data it had 
     95 about where he was. He had to sue, he had to go to court to get this 
     96 information. And when he got it, he received forty-four thousand 
     97 location points for a period of six months! That's more than two hundred 
     98 per day! What that means is someone could form a very good picture of 
     99 his activities just by looking at that data.</p>
    100 
    101 <p>We can stop our own computers from doing surveillance on us
    102 if <em>we</em> have control of the software that they run. But the
    103 software these people are running, they don't have control over. It's
    104 nonfree software, and that's why it has malicious features such as
    105 surveillance. However, the surveillance is not always done with our own
    106 computers, it's also done at one remove. For instance ISPs in Europe
    107 are required to keep data about the user's Internet communications for
    108 a long time, in case the State decides to investigate that person later
    109 for whatever imaginable reason.</p>
    110 
    111 <p>With a portable phone&hellip; even if you can stop the phone from
    112 transmitting your GPS location, the system can determine the phone's
    113 location approximately, by comparing the time when the signals arrive at
    114 different towers. So the phone system can do surveillance even without
    115 special cooperation from the phone itself.</p>
    116 
    117 <p>Likewise, the bicycles that people rent in Paris. Of course the 
    118 system knows where you get the bicycle and it knows where you return the 
    119 bicycle, and I've heard reports that it tracks the bicycles as they are 
    120 moving around as well. So they are not something we can really trust.</p>
    121 
    122 <p>But there are also systems that have nothing to do with us that exist
    123 only for tracking. For instance, in the UK all car travel is monitored.
    124 Every car's movements are being recorded in real time and can be tracked
    125 by the State in real time. This is done with cameras on the side of
    126 the road.</p>
    127 
    128 <p>Now, the only way we can prevent surveillance that's done at one 
    129 remove or by unrelated systems is through political action against 
    130 increased government power to track and monitor everyone, which means of 
    131 course we have to reject whatever excuse they come up with. For doing 
    132 such systems, no excuse is valid&mdash;to monitor everyone.</p>
    133 
    134 <p>In a free society, when you go out in public, you are not guaranteed
    135 anonymity. It's possible for someone to recognize you and remember. And
    136 later that person could say that he saw you at a certain place. But
    137 that information is diffuse. It's not conveniently assembled to track
    138 everybody and investigate what they did. To collect that information is
    139 a lot of work, so it's only done in special cases when it's necessary.</p>
    140 
    141 <p>But computerized surveillance makes it possible to centralize and
    142 index all this information so that an unjust regime can find it all,
    143 and find out all about everyone. If a dictator takes power, which
    144 could happen anywhere, people realize this and they recognize that they
    145 should not communicate with other dissidents in a way that the State
    146 could find out about. But if the dictator has several years of stored
    147 records of who talks with whom, it's too late to take any precautions
    148 then, because he already has everything he needs to realize: &ldquo;OK,
    149 this guy is a dissident, and he spoke with him. Maybe he is a dissident
    150 too. Maybe we should grab him and torture him.&rdquo;</p>
    151 
    152 <p>So we need to campaign to put an end to digital surveillance
    153 <em>now</em>. You can't wait until there is a dictator and it would
    154 really matter. And besides, it doesn't take an outright dictatorship to
    155 start attacking human rights.</p>
    156 
    157 <p>I wouldn't quite call the government of the UK a dictatorship. It's 
    158 not very democratic, and one way it crushes democracy is using 
    159 surveillance. A few years ago, people believed to be on their way to a 
    160 protest, they were going to protest, they were arrested before they 
    161 could get there because their car was tracked through this universal car 
    162 tracking system.</p>
    163 
    164 <h3 id="censorship">Censorship</h3>
    165 
    166 <p>The second threat is censorship. Censorship is not new, it existed
    167 long before computers. But 15 years ago, we thought that the Internet
    168 would protect us from censorship, that it would defeat censorship. Then,
    169 China and some other obvious tyrannies went to great lengths to
    170 impose censorship on the Internet, and we said: &ldquo;Well that's not
    171 surprising, what else would governments like that do?&rdquo;</p>
    172 
    173 <p>But today we see censorship imposed in countries that are not 
    174 normally thought of as dictatorships, such as for instance the UK, 
    175 France, Spain, Italy, Denmark&hellip;</p>
    176 
    177 <p>They all have systems of blocking access to some websites. Denmark
    178 established a system that blocks access to a long list of web pages, 
    179 which was secret. The citizens were not supposed to know how the 
    180 government was censoring them, but the list was leaked and posted on 
    181 WikiLeaks. At that point, Denmark added the WikiLeaks page to its 
    182 censorship list. So, the whole rest of the world can find out how Danes 
    183 are being censored, but Danes are not supposed to know.</p>
    184 
    185 <p>A few months ago, Turkey, which claims to respect some human rights,
    186 announced that every Internet user would have to choose between 
    187 censorship and more censorship. Four different levels of censorship they 
    188 get to choose! But freedom is not one of the options.</p>
    189 
    190 <p>Australia wanted to impose filtering on the Internet, but that was
    191 blocked. However Australia has a different kind of censorship: it has
    192 censorship of links. That is, if a website in Australia has a link
    193 to some censored site outside Australia, the one in Australia can be
    194 punished. Electronic Frontiers Australia, that is an organization that
    195 defends human rights in the digital domain in Australia, posted a link
    196 to a foreign political website. It was ordered to delete the link or 
    197 face a penalty of $11,000 a day. So they deleted it, what else could 
    198 they do? This is a very harsh system of censorship.</p>
    199 
    200 <p>In Spain, the censorship that was adopted earlier this year allows
    201 officials to arbitrarily shut down an Internet site in Spain, or impose
    202 filtering to block access to a site outside of Spain. And they can do
    203 this without any kind of trial. This was one of the motivations for the
    204 <i>Indignados</i>, who have been protesting in the street.</p>
    205 
    206 <p>There were protests in the street in Turkey as well, after that
    207 announcement, but the government refused to change its policy.</p>
    208 
    209 <p>We must recognize that a country that imposes censorship on the
    210 Internet is not a free country. And is not a legitimate government
    211 either.</p>
    212 
    213 <h3 id="formats">Restricted data formats</h3>
    214 
    215 <p>The next threat to our freedom comes from data formats that restrict
    216 users.</p>
    217 
    218 <p>Sometimes it's because the format is secret. There are many 
    219 application programs that save the user's data in a secret format, which 
    220 is meant to prevent the user from taking that data and using it with 
    221 some other program. The goal is to prevent interoperability.</p>
    222 
    223 <p>Now, evidently, if a program implements a secret format, that's
    224 because the program is not free software. So this is another kind of
    225 malicious feature. Surveillance is one kind of malicious feature that
    226 you find in some nonfree programs; using secret formats to restrict the
    227 users is another kind of malicious feature that you also find in some
    228 nonfree programs.</p>
    229 
    230 <p>But if you have a free program that handles a certain format,
    231 <em>ipso facto</em> that format is not secret. This kind of malicious
    232 feature can only exist in a nonfree program. Surveillance features, 
    233 well, theoretically they could exist in a free program but you don't 
    234 find them happening. Because the users would fix it, you see. The users 
    235 wouldn't like this, so they would fix it.</p>
    236 
    237 <p>In any case, we also find secret data formats in use for publication
    238 of works. You find secret data formats in use for audio, such as music,
    239 for video, for books&hellip; And these secret formats are known as
    240 Digital Restrictions Management, or DRM, or digital handcuffs <em>(les
    241 menottes num&eacute;riques)</em>.</p>
    242 
    243 <p>So, the works are published in secret formats so that only 
    244 proprietary programs can play them, so that these proprietary programs 
    245 can have the malicious feature of restricting the users, stopping them 
    246 from doing something that would be natural to do.</p>
    247 
    248 <p>And this is used even by public entities to communicate with the
    249 people. For instance Italian public television makes its programs
    250 available on the net in a format called VC-1, which is a standard
    251 supposedly, but it's a secret standard. Now I can't imagine how any
    252 publicly supported entity could justify using a secret format to
    253 communicate with the public. This should be illegal. In fact I think
    254 all use of Digital Restrictions Management should be illegal. No company
    255 should be allowed to do this.</p>
    256 
    257 <p>There are also formats that are not secret but almost might as well
    258 be secret, for instance Flash. Flash is not actually secret but Adobe
    259 keeps making new versions, which are different, faster than anyone can
    260 keep up and make free software to play those files; so it has almost
    261 the same effect as being secret.</p>
    262 
    263 <p>Then there are the patented formats, such as
    264 MP3<a href="#f1"><sup>1</sup></a> for audio. It's bad to distribute
    265 audio in MP3 format. There is free software to handle MP3 format, to
    266 play it and to generate it, but because it's patented in many
    267 countries, many distributors of free software don't dare include those
    268 programs; so if they distribute the GNU+Linux system, their system
    269 doesn't include a player for MP3. As a result if anyone distributes
    270 some music in MP3, that's putting pressure on people not to use
    271 GNU/Linux.  Sure, if you're an expert you can find a free software and
    272 install it, but there are lots of non experts, and they might see that
    273 they installed a version of GNU/Linux which doesn't have that
    274 software, and it won't play MP3 files, and they think it's the
    275 system's fault. They don't realize it's MP3's fault. But this is the
    276 fact.</p>
    277 
    278 <p>Therefore, if you want to support freedom, don't distribute MP3
    279 files. That's why I say if you're recording my speech and you want to
    280 distribute copies, don't do it in a patented format such as MPEG-2,
    281 or MPEG-4, or MP3. Use a format friendly to free software, such as the
    282 OGG formats or WebM. And by the way, if you are going to distribute
    283 copies of the recording, please put on it the Creative Commons, No
    284 Derivatives license. This is a statement of my personal views. If it 
    285 were a lecture for a course, if it were didactic, then it ought to be 
    286 free, but statements of opinion are different.</p>
    287 
    288 <h3 id="proprietary">Software that isn't free</h3>
    289 
    290 <p>Now this leads me to the next threat which comes from software that
    291 the users don't have control over. In other words, software that isn't
    292 free, that is not <i>libre</i>. In this particular point French
    293 is clearer than English. The English word &ldquo;free&rdquo; means
    294 <i>libre</i> and <i>gratuit</i>, but what I mean when I say
    295 &ldquo;free software&rdquo; is <i>logiciel libre</i>. I don't mean
    296 <i>gratuit</i>. I'm not talking about price. Price is a side 
    297 issue, just a detail, because it doesn't matter ethically. You know, if 
    298 I have a copy of a program and I sell it to you for one euro or a 
    299 hundred euros, who cares? Right? Why should anyone think that's good or 
    300 bad? Or suppose I gave it to you <i>gratuitement</i>&hellip; 
    301 Still, who cares? But whether this program respects your freedom, that's 
    302 important!</p>
    303 
    304 <p>So free software is software that respects users' freedom. What does
    305 this mean? Ultimately there are just two possibilities with software:
    306 either the users control the program or the program controls the users.
    307 If the users have certain essential freedoms, then <em>they</em> control
    308 the program, and those freedoms are the criterion for free software. But
    309 if the users <em>don't</em> fully have the essential freedoms, then
    310 the program controls the users. But somebody controls that program and,
    311 through it, has <em>power</em> over the users. </p>
    312 
    313 <p>So, a nonfree program is an instrument to give somebody <em>power</em>
    314 over a lot of other people, and this is unjust power that nobody should
    315 ever have. This is why nonfree software <i>(les logiciels privateurs,
    316 qui privent de la libert&eacute;)</i>, why proprietary software is
    317 an injustice and should not exist; because it leaves the users without
    318 freedom.</p>
    319 
    320 <p>Now, the developer who has control of the program often feels tempted
    321 to introduce malicious features to <em>further</em> exploit or abuse
    322 those users. He feels a temptation because he knows he can get away with
    323 it. Because his program controls the users and the users do not have
    324 control of the program, if he puts in a malicious feature, the users
    325 can't fix it; they can't remove the malicious feature.</p>
    326 
    327 <p>I've already told you about two kinds of malicious features:
    328 surveillance features, such as are found in Windows and the iPhone and
    329 Flash player and the Swindle, sort of. And there are also features to
    330 restrict users, which work with secret data formats, and those are found
    331 in Windows, Macintosh, the iPhone, Flash player, the Amazon Swindle,
    332 the Playstation 3 and lots and lots of other programs.</p>
    333 
    334 <p>The other kind of malicious feature is the backdoor. That means
    335 something in that program is listening for remote commands and obeying
    336 them, and those commands can mistreat the user. We know of backdoors in
    337 Windows, in the iPhone, in the Amazon Swindle. The Amazon Swindle has
    338 a backdoor that can delete books, remotely delete books. We know this
    339 by observation, because Amazon did it: in 2009 Amazon remotely deleted
    340 thousands of copies of a particular book. Those were authorized copies,
    341 people had obtained them directly from Amazon, and thus Amazon knew
    342 exactly where they were, which is how Amazon knew where to send the
    343 commands to delete those books. You know which book Amazon deleted?
    344 <em>1984</em> by George Orwell. [laughter] It's a book everyone should
    345 read, because it discusses a totalitarian state that did things like
    346 delete books it didn't like. Everybody should read it, but not on the
    347 Amazon Swindle. [laughter]</p>
    348 
    349 <p>Anyway, malicious features are present in the most widely used 
    350 nonfree programs, but they are rare in free software, because with free 
    351 software the users have control. They can read the source code and they 
    352 can change it. So, if there were a malicious feature, somebody would 
    353 sooner or later spot it and fix it. This means that somebody who is 
    354 considering introducing a malicious feature does not find it so 
    355 tempting, because he knows he might get away with it for a while but 
    356 somebody will spot it, will fix it, and everybody will loose trust in 
    357 the perpetrator. It's not so tempting when you know you're going to 
    358 fail. And that's why we find that malicious features are rare in free 
    359 software, and common in proprietary software.</p>
    360 
    361 <h3 id="four-freedoms">The four freedoms of free software</h3>
    362 
    363 <p>The essential freedoms are four:</p>
    364 
    365 <ul>
    366     <li>Freedom 0 is the freedom to run the program as you wish.</li>
    367     <li>Freedom 1 is the freedom to study the source code and change it,
    368         so the program does your computing the way you wish.</li>
    369     <li>Freedom 2 is the freedom to help others. That's the freedom to
    370         make exact copies and redistribute them when you wish.</li>
    371     <li>Freedom 3 is the freedom to contribute to your community. That's
    372         the freedom to make copies of your modified versions, if you 
    373         have made any, and then distribute them to others when you wish.</li> 
    374 </ul>
    375 
    376 <p>These freedoms, in order to be adequate, must apply to all activities
    377 of life. For instance if it says &ldquo;this is free for academic
    378 use,&rdquo; it's not free. Because that's too limited. It doesn't apply
    379 to all areas of life. In particular, if a program is free, that means
    380 it can be modified and distributed commercially, because commerce is
    381 an area of life, an activity in life. And this freedom has to apply to
    382 all activities.</p>
    383 
    384 <p>However, it's not obligatory to do any of these things. The point
    385 is you're free to do them if you wish, when you wish. But you never have
    386 to do them. You don't have to do any of them. You don't have to run the
    387 program. You don't have to study or change the source code. You don't
    388 have to make any copies. You don't have to distribute your modified
    389 versions. The point is you should be free to do those things <em>if
    390 you wish</em>.</p>
    391 
    392 <p>Now, freedom number 1, the freedom to study and change the source 
    393 code to make the program do your computing as you wish, includes 
    394 something that might not be obvious at first. If the program comes in a 
    395 product, and the developer can provide an upgrade that will run, then 
    396 you have to be able to make your version run in that product. If the 
    397 product will only run the developer's versions, and refuses to run 
    398 yours, the executable in that product is not free software. Even if it 
    399 was compiled from free source code, it's not free because you don't have 
    400 the freedom to make the program do your computing the way you wish. So, 
    401 freedom 1 has to be real, not just theoretical. It has to include the 
    402 freedom to use <em>your</em> version, not just the freedom to make some 
    403 source code that won't run.</p>
    404 
    405 <h3 id="gnu">The GNU Project and the Free Software movement</h3>
    406 
    407 <p>I launched the Free Software movement in 1983, when I announced
    408 the plan to develop a free software operating system whose name is
    409 GNU. Now GNU, the name GNU, is a joke; because part of the hacker's
    410 spirit is to have fun even when you're doing something <em>very</em>
    411 serious. Now I can't think of anything more seriously important than
    412 defending freedom.</p>
    413 
    414 <p>But that didn't mean I couldn't give my system a name that's a joke.
    415 So GNU is a joke because it's a recursive acronym, it stands for
    416 &ldquo;GNU's Not Unix,&rdquo; so G.N.U.: GNU's Not Unix. So the G in
    417 GNU stands for GNU.</p>
    418 
    419 <p>In fact this was a tradition at the time. The tradition was: if
    420 there was an existing program and you wrote something similar to it,
    421 inspired by it, you could give credit by giving your program a name
    422 that's a recursive acronym saying it's not the other one. So I gave
    423 credit to Unix for the technical ideas of Unix, but with the name GNU,
    424 because I decided to make GNU a Unix-like system, with the same 
    425 commands, the same system calls, so that it would be compatible, so that 
    426 people who used Unix could switch over easily.</p>
    427 
    428 <p>But the reason for developing GNU, that was unique. GNU is the
    429 only operating system, as far as I know, ever developed for the
    430 purpose of freedom. Not for technical motivations, not for commercial
    431 motivations. GNU was written for <em>your</em> freedom. Because without
    432 a free operating system, it's impossible to have freedom and use a
    433 computer. And there were none, and I wanted people to have freedom,
    434 so it was up to me to write one.</p>
    435 
    436 <p>Nowadays there are millions of users of the GNU operating system and
    437 most of them don't <em>know</em> they are using the GNU operating 
    438 system, because there is a widespread practice which is not nice. People 
    439 call the system &ldquo;Linux.&rdquo; Many do, but some people don't, and 
    440 I hope you'll be one of them. Please, since we started this, since we 
    441 wrote the biggest piece of the code, please give us equal mention, please
    442 call the system &ldquo;GNU+Linux,&rdquo; or &ldquo;GNU/Linux.&rdquo;
    443 It's not much to ask.</p>
    444 
    445 <p>But there is another reason to do this. It turns out that the person
    446 who wrote Linux, which is one component of the system as we use it 
    447 today, he doesn't agree with the Free Software movement. And so if you 
    448 call the whole system Linux, in effect you're steering people towards 
    449 his ideas, and away from our ideas. Because he's not gonna say to them 
    450 that they deserve freedom. He's going to say to them that he likes 
    451 convenient, reliable, powerful software. He's going to tell people that 
    452 those are the important values.</p>
    453 
    454 <p>But if you tell them the system is GNU+Linux&mdash;it's the GNU
    455 operating system plus Linux the kernel&mdash;then they'll know about us,
    456 and then they might listen to what we say: you deserve freedom. And 
    457 since freedom will be lost if we don't defend it&mdash;there's always 
    458 going to be a Sarkozy to take it away&mdash;we need above all to teach 
    459 people to demand freedom, to be ready to stand up for their freedom the 
    460 next time someone threatens to take it away.</p>
    461 
    462 <p>Nowadays, you can tell who doesn't want to discuss these ideas of
    463 freedom because they don't say <i>logiciel libre</i>. They don't 
    464 say <i>libre</i>, they say &ldquo;open source.&rdquo; That term 
    465 was coined by the people like Mr Torvalds who would prefer that these 
    466 ethical issues don't get raised. And so the way you can help us raise 
    467 them is by saying <i>libre</i>. You know, it's up to you where you 
    468 stand, you're free to say what you think. If you agree with them, you 
    469 can say open source. If you agree with us, show it, say 
    470 <i>libre</i>!</p>
    471 
    472 <h3 id="education">Free software and education</h3>
    473 
    474 <p>The most important point about free software is that schools
    475 <em>must</em> teach exclusively free software. All levels of schools 
    476 from kindergarten to university, it's their moral responsibility to 
    477 teach only free software in their education, and all other educational 
    478 activities as well, including those that say that they're spreading 
    479 digital literacy. A lot of those activities teach Windows, which means 
    480 they're teaching <em>dependence</em>. To teach people the use of 
    481 proprietary software is to teach dependence, and educational activities 
    482 must never do that because it's the opposite of their mission. 
    483 Educational activities have a social mission to educate good citizens of 
    484 a strong, capable, cooperating, independent and free society. And in the 
    485 area of computing, that means: teach free software; never teach a 
    486 proprietary program because that's inculcating dependence.</p>
    487 
    488 <p>Why do you think some proprietary developers offer gratis copies to
    489 schools? They want the schools to make the children dependent. And then,
    490 when they graduate, they're still dependent and, you know, the company 
    491 is not going to offer them gratis copies. And some of them get jobs and 
    492 go to work for companies. Not many of them anymore, but some of them. 
    493 And those companies are not going to be offered gratis copies. Oh no! 
    494 The idea is: if the school directs the students down the path of 
    495 permanent dependence, they can drag the rest of society with them into 
    496 dependence. That's the plan! It's just like giving the school gratis 
    497 needles full of addicting drugs, saying: &ldquo;Inject this into your 
    498 students, the first dose is gratis. Once you're dependent, then you have 
    499 to pay.&rdquo; Well, the school would reject the drugs because it isn't 
    500 right to teach the students to use addictive drugs, and it's got to 
    501 reject the proprietary software also. </p>
    502 
    503 <p>Some people say: &ldquo;Let's have the school teach both proprietary
    504 software and free software, so the students become familiar with
    505 both.&rdquo; That's like saying: &ldquo;For the lunch let's give the
    506 kids spinach and tobacco, so that they become accustomed to both.&rdquo;
    507 No! The schools are only supposed to teach good habits, not bad ones! So
    508 there should be no Windows in a school, no Macintosh, nothing 
    509 proprietary in the education.</p>
    510 
    511 <p>But also, for the sake of educating the programmers. You see, some
    512 people have a talent for programming. At ten to thirteen years old,
    513 typically, they're fascinated, and if they use a program, they want to
    514 know: &ldquo;How does it do this?&rdquo; But when they ask the teacher,
    515 if it's proprietary, the teacher has to say: &ldquo;I'm sorry, it's a
    516 secret, we can't find out.&rdquo; Which means education is forbidden. A
    517 proprietary program is the enemy of the spirit of education. It's
    518 knowledge withheld, so it should not be tolerated in a school, even
    519 though there may be plenty of people in the school who don't care about
    520 programming, don't want to learn this. Still, because it's the enemy of
    521 the spirit of education, it shouldn't be there in the school. </p>
    522 
    523 <p>But if the program is free, the teacher can explain what he knows,
    524 and then give out copies of the source code, saying: &ldquo;Read it and
    525 you'll understand everything.&rdquo; And those who are really 
    526 fascinated, they will read it! And this gives them an opportunity to 
    527 start to learn how to be good programmers.</p>
    528 
    529 <p>To learn to be a good programmer, you'll need to recognize that
    530 certain ways of writing code, even if they make sense to you and they
    531 are correct, they're not good because other people will have trouble
    532 understanding them. Good code is clear code that others will have an
    533 easy time working on when they need to make further changes.</p>
    534 
    535 <p>How do you learn to write good clear code? You do it by reading lots
    536 of code, and writing lots of code. Well, only free software offers the
    537 chance to read the code of large programs that we really use. And then
    538 you have to write lots of code, which means you have to write changes
    539 in large programs.</p>
    540 
    541 <p>How do you learn to write good code for the large programs? You have
    542 to start small, which does <em>not</em> mean small program, oh no! The
    543 challenges of the code for large programs don't even begin to appear in
    544 small programs. So the way you start small at writing code for large
    545 programs is by writing small changes in large programs. And only free
    546 software gives you the chance to do that.</p>
    547 
    548 <p>So, if a school wants to offer the possibility of learning to be a
    549 good programmer, it needs to be a free software school.</p>
    550 
    551 <p>But there is an even deeper reason, and that is for the sake of
    552 moral education, education in citizenship. It's not enough for a school
    553 to teach facts and skills, it has to teach the spirit of goodwill, the
    554 habit of helping others. Therefore, every class should have this rule:
    555 &ldquo;Students, if you bring software to class, you may not keep it for
    556 yourself, you must share copies with the rest of the class, including 
    557 the source code in case anyone here wants to learn. Because this class 
    558 is a place where we share our knowledge. Therefore, bringing a 
    559 proprietary program to class is not permitted.&rdquo; The school must 
    560 follow its own rule to set a good example. Therefore, the school must 
    561 bring only free software to class, and share copies, including the 
    562 source code, with anyone in the class that wants copies.</p>
    563 
    564 <p>Those of you who have a connection with a school, it's <em>your</em>
    565 duty to campaign and pressure that school to move to free software. And
    566 you have to be firm. It may take years, but you can succeed as long
    567 as you never give up. Keep seeking more allies among the students, the
    568 faculty, the staff, the parents, anyone! And always bring it up as an
    569 ethical issue. If someone else wants to sidetrack the discussion into
    570 this practical advantage and this practical disadvantage, which means
    571 they're ignoring the most important question, then you have to say:
    572 &ldquo;This is not about how to do the best job of educating, this is
    573 about how to do a good education instead of an evil one. It's how to do
    574 education right instead of wrong, not just how to make it a little more
    575 effective, or less.&rdquo; So don't get distracted with those secondary
    576 issues, and ignore what really matters!</p>
    577 
    578 <h3 id="services">Internet services</h3>
    579 
    580 <p>So, moving on to the next menace. There are two issues that arise
    581 from the use of Internet services. One of them is that the server
    582 could abuse your data, and another is that it could take control of
    583 your computing.</p>
    584 
    585 <p>The first issue, people already know about. They are aware that, if
    586 you upload data to an Internet service, there is a question of what it
    587 will do with that data. It might do things that mistreat you. What could
    588 it do? It could lose the data, it could change the data, it could refuse
    589 to let you get the data back. And it could also show the data to someone
    590 else you don't want to show it to. Four different possible things.</p>
    591 
    592 <p>Now, here, I'm talking about the data that you <em>knowingly</em> 
    593 gave to that site. Of course, many of those services do 
    594 <em>surveillance</em> as well.</p>
    595 
    596 <p>For instance, consider Facebook. Users send lots of data to Facebook,
    597 and one of the bad things about Facebook is that it shows a lot of that
    598 data to lots of other people, and even if it offers them a setting to
    599 say &ldquo;no,&rdquo; that may not really work. After all, if you say
    600 &ldquo;some other people can see this piece of information,&rdquo;
    601 one of them might publish it. Now, that's not Facebook's fault,
    602 there is nothing they could do to prevent that, but it ought to warn
    603 people. Instead of saying &ldquo;mark this as only to your so-called
    604 friends,&rdquo; it should say &ldquo;keep in mind that your so-called
    605 friends are not really your friends, and if they want to make trouble
    606 for you, they could publish this.&rdquo; Every time, it should say that,
    607 if they want to deal with people ethically.</p>
    608 
    609 <p>As well as all the data users of Facebook voluntarily give to 
    610 Facebook, Facebook is collecting data about people's activities on the 
    611 net through various methods of surveillance. But that's the first 
    612 menace. For now I am talking about the data that people <em>know</em> 
    613 they are giving to these sites.</p>
    614 
    615 <p>Now, losing data is something that could always happen by accident. 
    616 That possibility is always there, no matter how careful someone is.  
    617 Therefore, you need to keep multiple copies of data that matters. If you 
    618 do that, then, even if someone decided to delete your data 
    619 intentionally, it wouldn't hurt you that much, because you'd have other 
    620 copies of it.</p>
    621 
    622 <p>So, as long as you are maintaining multiple copies, you don't have
    623 to worry too much about someone's losing your data. What about whether
    624 you can get it back. Well, some services make it possible to get back
    625 all the data that you sent, and some don't. Google services will let the
    626 user get back the data the user has put into them. Facebook, famously,
    627 does not.</p>
    628 
    629 <p>Of course in the case of Google, this only applies to the data the
    630 user <em>knows</em> Google has. Google does lots of surveillance, too,
    631 and that data is not included. But in any case, if you can get the data
    632 back, then you could track whether they have altered it. And they're not
    633 very likely to start altering people's data if the people can tell. So
    634 maybe we can keep a track on that particular kind of abuse.</p>
    635 
    636 <p>But the abuse of showing the data to someone you don't want it to
    637 be shown to is very common and almost impossible for you to prevent,
    638 especially if it's a US company. You see, the most hypocritically named
    639 law in US history, the so-called USA Patriot Act, says that Big 
    640 Brother's police can collect just about all the data that companies 
    641 maintain about individuals. Not just companies, but other organizations 
    642 too, like public libraries. The police can get this massively, without 
    643 even going to court. Now, in a country that was founded on an idea of 
    644 freedom, there's nothing more unpatriotic than this. But this is what 
    645 they did. So you mustn't ever trust any of your data to a US company.  
    646 And they say that foreign subsidiaries of US companies are subject to 
    647 this as well. So the company you're directly dealing with may be in 
    648 Europe, but if it's owned by a US company, you've got the same problem 
    649 to deal with.</p>
    650 
    651 <p>However, this is mainly of concern when the data you're sending to
    652 the service is not for publication. There are some services where you
    653 publish things. Of course, if you publish something, you know everybody
    654 is gonna be able to see it. So, there is no way they can hurt you by
    655 showing it to somebody who wasn't supposed to see it. There is nobody
    656 who wasn't supposed to see it, if you published it. So in that case the
    657 problem doesn't exist.</p>
    658 
    659 <p>So these are four sub-issues of this one threat of abusing our data.
    660 The idea of the Freedom Box project is you have your own server in your
    661 own home, and when you want to do something remotely, you do it with
    662 your own server, and the police have to get a court order in order to
    663 search your server. So you have the same rights this way that you would
    664 have traditionally in the physical world.</p>
    665 
    666 <p>The point here and in so many other issues is: as we start doing
    667 things digitally instead of physically, we shouldn't lose any of our
    668 rights; because the general tendency is that we do lose rights.</p>
    669 
    670 <p>Basically, Stallman's law says that, in an epoch when governments
    671 work for the mega-corporations instead of reporting to their citizens,
    672 every technological change can be taken advantage of to reduce our
    673 freedom. Because reducing our freedom is what these governments want
    674 to do. So the question is: when do they get an opportunity? Well, any
    675 change that happens for some other reason is a possible opportunity,
    676 and they will take advantage of it if that's their general desire.</p>
    677 
    678 <p>But the other issue with Internet services is that they can take
    679 control of your computing, and that's not so commonly known. But it's
    680 becoming more common. There are services that offer to do computing for
    681 you on data supplied by you&mdash;things that you should do in your own
    682 computer but they invite you to let somebody else's computer do that
    683 computing work for you. And the result is you lose control over it. It's
    684 just as if you used a nonfree program.</p>
    685 
    686 <p>Two different scenarios, but they lead to the same problem. If you
    687 do your computing with a nonfree program&hellip; well, the users don't
    688 control the nonfree program, it controls the users, which would include
    689 you. So you've lost control of the computing that's being done. But
    690 if you do your computing in his server&hellip; well, the programs that
    691 are doing it are the ones he chose. You can't touch them or see them,
    692 so you have no control over them. He has control over them, maybe.</p>
    693 
    694 <p>If they are free software and he installs them, then he has control
    695 over them. But even he might not have control. He might be running a
    696 proprietary program in his server, in which case it's somebody else
    697 who has control of the computing being done in his server. He doesn't
    698 control it and you don't.</p>
    699 
    700 <p>But suppose he installs a free program, then he has control over the
    701 computing being done in his computer, but you don't. So, either way,
    702 <em>you don't!</em> So the only way to have control over your computing
    703 is to do it with <em>your copy</em> of a free program.</p>
    704 
    705 <p>This practice is called &ldquo;Software as a Service.&rdquo; It means
    706 doing your computing with your data in somebody else's server. And
    707 I don't know of anything that can make this acceptable. It's always
    708 something that takes away your freedom, and the only solution I know of
    709 is to refuse. For instance, there are servers that will do translation
    710 or voice recognition, and you are letting them have control over this
    711 computing activity, which we shouldn't ever do.</p>
    712 
    713 <p>Of course, we are also giving them data about ourselves which they
    714 shouldn't have. Imagine if you had a conversation with somebody through
    715 a voice-recognition translation system that was Software as a Service
    716 and it's really running on a server belonging to some company. Well,
    717 that company also gets to know what was said in the conversation, and
    718 if it's a US company that means Big Brother also gets to know. This is
    719 no good.</p>
    720 
    721 <h3 id="voting">Computers for voting</h3>
    722 
    723 <p>The next threat to our freedom in a digital society is using 
    724 computers for voting. You can't trust computers for voting. Whoever 
    725 controls the software in those computers has the power to commit 
    726 undetectable fraud.</p>
    727 
    728 <p>Elections are special, because there's nobody involved that we dare
    729 trust fully. Everybody has to be checked, crosschecked by others, so 
    730 that nobody is in a position to falsify the results by himself. Because 
    731 if anybody is in a position to do that, he might do it. So our 
    732 traditional systems for voting were designed so that nobody was fully 
    733 trusted, everybody was being checked by others. So that nobody could 
    734 easily commit fraud. But once you introduce a program, this is 
    735 impossible.</p>
    736 
    737 <p>How can you tell if a voting machine will honestly count the
    738 votes? You'd have to study the program that's running in it during the
    739 election, which of course nobody can do, and most people wouldn't even
    740 know how to do. But even the experts who might theoretically be capable
    741 of studying the program, they can't do it while people are voting. 
    742 They'd have to do it in advance, and then how do they know that the 
    743 program they studied is the one that's running while people vote? Maybe 
    744 it's been changed.</p>
    745 
    746 <p>Now, if this program is proprietary, that means some company
    747 controls it. The election authority can't even tell what that program
    748 is doing. Well, this company then could rig the election.  And there
    749 are accusations that this was done in the US within the past ten years,
    750 that election results were falsified this way.</p>
    751 
    752 <p>But what if the program is free software? That means the election
    753 authority who owns this voting machine has control over the software in
    754 it, so the election authority could rig the election. You can't trust 
    755 them either. You don't dare trust <em>anybody</em> in voting, and the 
    756 reason is, there's no way that the voters can verify for themselves that 
    757 their votes were correctly counted, nor that false votes were not added.</p>
    758 
    759 <p>In other activities of life, you can usually tell if somebody is  
    760 trying to cheat you. Consider for instance buying something from a 
    761 store. You order something, maybe you give a credit card number. If the 
    762 product doesn't come, you can complain and you can&hellip; of course if 
    763 you've got a good enough memory you'll notice if that product doesn't 
    764 come. You're not just giving total blind trust to the store, because you 
    765 can check. But in elections you can't check.</p>
    766 
    767 <p>I saw once a paper where someone described a theoretical system for
    768 voting which used some sophisticated mathematics so that people could
    769 check that their votes had been counted, even though everybody's vote 
    770 was secret, and they could also verify that false votes hadn't been 
    771 added. It was very exciting, powerful mathematics; but even if that 
    772 mathematics is correct, that doesn't mean the system would be acceptable 
    773 to use in practice, because the vulnerabilities of a real system might 
    774 be outside of that mathematics. For instance, suppose you're voting over 
    775 the Internet and suppose you're using a machine that's a zombie. It 
    776 might tell you that the vote was sent for A while actually sending a 
    777 vote for B. Who knows whether you'd ever find out? So, in practice the 
    778 only way to see if these systems work and are honest is through years, 
    779 in fact decades, of trying them and checking in other ways what 
    780 happened.</p>
    781 
    782 <p>I wouldn't want my country to be the pioneer in this. So, use paper
    783 for voting. Make sure there are ballots that can be recounted.</p>
    784 
    785 <h4>Speaker's note, added subsequently</h4>
    786 
    787 <p>Remote voting by internet has an inherent social danger, that your
    788 boss might tell you, &ldquo;I want you to vote for candidate C, and do it
    789 from the computer in my office while I watch you.&rdquo; He does not need
    790 to say out loud that you might be fired if you do not comply. This
    791 danger is not based on a technical flaw, so it can't be fixed by
    792 fixing the technology.</p>
    793 
    794 
    795 <h3 id="sharing">The war on sharing</h3>
    796 
    797 <p>The next threat to our freedom in a digital society comes from the
    798 war on sharing.</p>
    799 
    800 <p>One of the tremendous benefits of digital technology is that it is
    801 easy to copy published works and share these copies with others. Sharing
    802 is good, and with digital technology, sharing is easy. So, millions of
    803 people share. Those who profit by having power over the distribution
    804 of these works don't want us to share. And since they are businesses,
    805 governments which have betrayed their people and work for the Empire of
    806 mega-corporations try to serve those businesses, they are against their
    807 own people, they are for the businesses, for the publishers.</p>
    808 
    809 <p>Well, that's not good. And with the help of these governments,
    810 the companies have been waging <em>war</em> on sharing, and they've
    811 proposed a series of cruel draconian measures. Why do they propose cruel
    812 draconian measures? Because nothing less has a chance of success: when
    813 something is good and easy, people do it, and the only way to stop them
    814 is by being very nasty. So of course, what they propose is nasty, nasty,
    815 and the next one is nastier. So they tried suing teenagers for hundreds
    816 of thousands of dollars. That was pretty nasty. And they tried turning
    817 our technology against us, Digital Restrictions Management that means,
    818 digital handcuffs.</p>
    819 
    820 <p>But among the people there were clever programmers too and they found
    821 ways to break the handcuffs. So for instance, DVDs were designed to have
    822 encrypted movies in a secret encryption format, and the idea was that
    823 all the programs to decrypt the video would be proprietary with digital
    824 handcuffs. They would all be designed to restrict the users. And their
    825 scheme worked OK for a while. But some people in Europe figured out the
    826 encryption and they released a free program that could actually play
    827 the video on a DVD.</p>
    828 
    829 <p>Well, the movie companies didn't leave it there. They went to the US
    830 congress and bought a law making that software illegal. The United 
    831 States invented censorship of software in 1998, with the Digital 
    832 Millennium Copyright Act (DMCA). So the distribution of that free 
    833 program was forbidden in the United States. Unfortunately it didn't stop 
    834 with the United States. The European Union adopted a directive, in 2003 
    835 I believe, requiring such laws. The directive only says that commercial 
    836 distribution has to be banned, but just about every country in the 
    837 European Union has adopted a nastier law. In France, the mere possession 
    838 of a copy of that program is an offense punished by imprisonment, thanks 
    839 to Sarkozy. I believe that was done by the law DADVSI. I guess he hoped
    840 that with an unpronounceable name, people wouldn't be able to criticize
    841 it. [laughter]</p>
    842 
    843 <p>So, elections are coming. Ask the candidates in the parties: will you
    844 repeal the DADVSI? And if not, don't support them. You mustn't give up
    845 lost moral territory forever. You've got to fight to win it back.</p>
    846 
    847 <p>So, we still are fighting against digital handcuffs. The Amazon
    848 Swindle has digital handcuffs to take away the traditional freedoms of
    849 readers to do things such as: give a book to someone else, or lend a
    850 book to someone else. That's a vitally important social act. That is 
    851 what builds society among people who read, lending books. Amazon doesn't 
    852 want to let people lend books freely. And then there is also selling a 
    853 book, perhaps to a used bookstore. You can't do that either.</p>
    854 
    855 <p>It looked for a while as if DRM had disappeared on music, but now
    856 they're bringing it back with streaming services such as Spotify. These
    857 services all require proprietary client software, and the reason is
    858 so they can put digital handcuffs on the users. So, reject them! They
    859 already showed quite openly that you can't trust them, because first
    860 they said: &ldquo;You can listen as much as you like.&rdquo; And then
    861 they said: &ldquo;Oh, no! You can only listen a certain number of hours
    862 a month.&rdquo; The issue is not whether that particular change was good
    863 or bad, just or unjust; the point is, they have the power to impose any
    864 change in policies. So don't let them have that power. You should have
    865 your <em>own</em> copy of any music you want to listen to.</p>
    866 
    867 <p>And then came the next assault on our freedom: HADOPI, basically
    868 punishment on accusation. It was started in France but it's been 
    869 exported to many other countries. The United States now demand such 
    870 unjust policies in its free exploitation treaties. A few months ago, 
    871 Colombia adopted such a law under orders from its masters in Washington.  
    872 Of course, the ones in Washington are not the real masters, they're just 
    873 the ones who control the United States on behalf of the Empire. But 
    874 they're the ones who also dictate to Colombia on behalf of the Empire.</p>
    875 
    876 <p>In France, since the Constitutional Council objected to explicitly
    877 giving people punishment without trial, they invented a kind of trial
    878 which is not a real trial, it's just a form of a trial, so they can
    879 <em>pretend</em> that people have a trial before they're punished. But 
    880 in other countries they don't bother with that, it's explicit punishment 
    881 on accusation only. Which means that for the sake of their war on 
    882 sharing, they're prepared to abolish the basic principles of justice. It 
    883 shows how thoroughly anti-freedom anti-justice they are. These are not 
    884 legitimate governments.</p>
    885 
    886 <p>And I'm sure they'll come up with more nasty ideas because they're
    887 paid to defeat the people no matter what it takes. Now, when they do
    888 this, they always say that it's for the sake of the artists, that they
    889 have to &ldquo;protect&rdquo; the &ldquo;creators.&rdquo; Now those are
    890 both propaganda terms. I am convinced that the reason they love the word
    891 &ldquo;creators&rdquo; is because it is a comparison with a deity. They
    892 want us to think of artists as super-human, and thus deserving special
    893 privileges and power over us, which is something I disagree with.</p>
    894 
    895 <p>In fact though, the only artists that benefit very much from this
    896 system are the big stars. The other artists are getting crushed into the
    897 ground by the heels of these same companies. But they treat the stars 
    898 very well, because the stars have a lot of clout. If a star threatens to 
    899 move to another company, the company says: &ldquo;Oh, we'll give you 
    900 what you want.&rdquo; But for any other artist they say: &ldquo;You 
    901 don't matter, we can treat you any way we like.&rdquo;</p>
    902 
    903 <p>So the superstars have been corrupted by the millions of dollars
    904 or euros that they get, to the point where they'll do almost
    905 anything for more money. For instance, J. K. Rowling is a good
    906 example. J. K. Rowling, a few years ago, went to court in Canada and
    907 obtained an order that people who had bought her books must not read
    908 them. She got an order telling people not to read her books!</p>
    909 
    910 <p>Here's what happened. A bookstore put the books on display for sale
    911 too early, before the date they were supposed to go on sale. And people
    912 came into the store and said: &ldquo;Oh, I want that!&rdquo; And they
    913 bought it and took away their copies. And then, they discovered the
    914 mistake, so they took the copies off of display. But Rowling wanted to
    915 crush any circulation of any information from those books, so she went
    916 to court, and the court ordered those people not to read the books that
    917 they now owned.</p>
    918 
    919 <p>In response, I call for a total boycott of Harry Potter. But I don't
    920 say you shouldn't read those books or watch the movies, I only say you
    921 shouldn't buy the books or pay for the movies. [laughter] I leave it to
    922 Rowling to tell people not to read the books. As far as I am concerned,
    923 if you borrow the book and read it, that's OK. [laughter] Just don't 
    924 give her any money!  But this happened with paper books. The court could 
    925 make this order but it couldn't get the books back from the people who 
    926 had bought them.  Imagine if they were ebooks. Imagine if they were 
    927 ebooks on the Swindle. Amazon could send commands to erase them.</p>
    928 
    929 <p>So, I don't have much respect for stars who will go to such lengths
    930 for more money. But most artists aren't like that, they never got
    931 enough money to be corrupted. Because the current system of copyright
    932 supports most artists very badly. And so, when these companies demand to
    933 expand the war on sharing, supposedly for the sake of the artists, I'm
    934 against what they want but I would like to support the artists better. I
    935 appreciate their work and I realize if we want them to do more work we
    936 should support them.</p>
    937 
    938 <h3 id="arts">Supporting the arts</h3>
    939 
    940 <p>I have two proposals for how to support artists, methods that are
    941 compatible with sharing, that would allow us to end the war on sharing
    942 and still support artists.</p>
    943 
    944 <p>One method uses tax money. We get a certain amount of public funds to
    945 distribute among artists. But, how much should each artist get? Well,
    946 we have to measure popularity. You see, the current system supposedly
    947 supports artists based on their popularity. So I'm saying: let's keep
    948 that, let's continue in this system to support them based on their
    949 popularity. We can measure the popularity of all the artists with some
    950 kind of polling or sampling, so that we don't have to do surveillance. 
    951 We can respect people's anonymity.</p>
    952 
    953 <p>OK, we get a raw popularity figure for each artist, how do we convert
    954 that into an amount of money? Well, the obvious way is: distribute
    955 the money in proportion to popularity. So if A is a thousand times as
    956 popular as B, A will get a thousand times as much money as B. That's not
    957 efficient distribution of the money. It's not putting the money to good
    958 use. You see, it's easy for a star A to be a thousand times as popular
    959 as a fairly successful artist B. And if we use linear proportion, we'll
    960 give A a thousand times as much money as we give B. And that means that,
    961 either we have to make A tremendously rich, or we are not supporting
    962 B enough.</p>
    963 
    964 <p>Well, the money we use to make A tremendously rich is failing to do
    965 an effective job of supporting the arts; so, it's inefficient. Therefore
    966 I say: let's use the cube root. Cube root looks sort of like this. The
    967 point is: if A is a thousand times as popular as B, with the cube root A
    968 will get ten times as much as B, not a thousand times as much, just ten
    969 times as much. So the use of the cube root shifts a lot of the money 
    970 from the stars to the artists of moderate popularity. And that means, 
    971 with less money we can adequately support a much larger number of 
    972 artists.</p>
    973 
    974 <p>There are two reasons why this system would use less money than we
    975 pay now. First of all because it would be supporting artists but not
    976 companies, second because it would shift the money from the stars to the
    977 artists of moderate popularity. Now, it would remain the case that the
    978 more popular you are, the more money you get. And so the star A would
    979 still get more than B, but not astronomically more.</p>
    980 
    981 <p>That's one method, and because it won't be so much money it doesn't
    982 matter so much how we get the money. It could be from a special tax on
    983 Internet connectivity, it could just be some of the general budget that
    984 gets allocated to this purpose. We won't care because it won't be so
    985 much money, much less than we're paying now.</p>
    986 
    987 <p>The other method I've proposed is voluntary payments. Suppose each
    988 player had a button you could use to send one euro. A lot of people
    989 would send it; after all it's not that much money. I think a lot of
    990 you might push that button every day, to give one euro to some artist
    991 who had made a work that you liked. But nothing would demand this, you
    992 wouldn't be required or ordered or pressured to send the money; you 
    993 would do it because you felt like it. But there are some people who 
    994 wouldn't do it because they're poor and they can't afford to give one 
    995 euro. And it's good that they won't give it, we don't have to squeeze 
    996 money out of poor people to support the artists. There are enough 
    997 non-poor people who'll be happy to do it. Why wouldn't you give one euro 
    998 to some artists today, if you appreciated their work? It's too 
    999 inconvenient to give it to them. So my proposal is to remove the 
   1000 inconvenience. If the only reason not to give that euro is you would 
   1001 have one euro less, you would do it fairly often.</p>
   1002 
   1003 <p>So these are my two proposals for how to support artists, while
   1004 encouraging sharing because sharing is good. Let's put an end to the
   1005 war on sharing, laws like DADVSI and HADOPI, it's not just the methods
   1006 that they propose that are evil, their purpose is evil. That's why they
   1007 propose cruel and draconian measures. They're trying to do something
   1008 that's nasty by nature. So let's support artists in other ways.</p>
   1009 
   1010 <h3 id="rights">Rights in cyberspace</h3>
   1011 
   1012 <p>The last threat to our freedom in digital society is the fact that we
   1013 don't have a firm right to do the things we do, in cyberspace. In the
   1014 physical world, if you have certain views and you want to give people
   1015 copies of a text that defends those views, you're free to do so. You
   1016 could even buy a printer to print them, and you're free to hand them out
   1017 on the street, or you're free to rent a store and hand them out there.
   1018 If you want to collect money to support your cause, you can just have
   1019 a can and people could put money into the can. You don't need to get
   1020 somebody else's approval or cooperation to do these things.</p>
   1021 
   1022 <p>But, in the Internet, you <em>do</em> need that. For instance if want
   1023 to distribute a text on the Internet, you need companies to help you
   1024 do it.  You can't do it by yourself. So if you want to have a website, 
   1025 you need the support of an ISP or a hosting company, and you need a 
   1026 domain name registrar. You need them to continue to let you do what 
   1027 you're doing. So you're doing it effectively on sufferance, not by 
   1028 right.</p>
   1029 
   1030 <p>And if you want to receive money, you can't just hold out a can. You
   1031 need the cooperation of a payment company. And we saw that this makes
   1032 all of our digital activities vulnerable to suppression. We learned this
   1033 when the United States government launched a &ldquo;distributed denial
   1034 of service attack&rdquo; (DDoS) against WikiLeaks. Now I'm making a
   1035 bit of joke because the words &ldquo;distributed denial of service
   1036 attack&rdquo; usually refer to a different kind of attack. But they
   1037 fit perfectly with what the United States did. The United States went
   1038 to the various kinds of network services that WikiLeaks depended on,
   1039 and told them to cut off service to WikiLeaks. And they did!</p>
   1040 
   1041 <p>For instance, WikiLeaks had rented a virtual Amazon server, and the
   1042 US government told Amazon: &ldquo;Cut off service for WikiLeaks.&rdquo;
   1043 And it did, arbitrarily. And then, Amazon had certain domain names such
   1044 as wikileaks.org. The US government tried to get all those domains shut
   1045 off. But it didn't succeed, some of them were outside its control and
   1046 were not shut off.</p>
   1047 
   1048 <p>Then, there were the payment companies. The US went to PayPal and
   1049 said: &ldquo;Stop transferring money to WikiLeaks or we'll make life
   1050 difficult for you.&rdquo; And PayPal shut off payments to WikiLeaks. And
   1051 then it went to Visa and Mastercard and got them to shut off payments
   1052 to WikiLeaks.  Others started collecting money on WikiLeaks' behalf and
   1053 their accounts were shut off too. But in this case, maybe something can
   1054 be done.  There's a company in Iceland which began collecting money on
   1055 behalf of WikiLeaks, and so Visa and Mastercard shut off its account;
   1056 it couldn't receive money from its customers either. And now, that
   1057 business is suing Visa and Mastercard apparently, under European Union
   1058 law, because Visa and Mastercard together have a near-monopoly. They're
   1059 not allowed to arbitrarily deny service to anyone.</p>
   1060 
   1061 <p>Well, this is an example of how things need to be for all kinds of
   1062 services that we use in the Internet. If you rented a store to hand
   1063 out statements of what you think, or any other kind of information
   1064 that you can lawfully distribute, the landlord couldn't kick you out
   1065 just because he didn't like what you were saying. As long as you keep
   1066 paying the rent, you have a right to continue in that store for a 
   1067 certain agreed-on period of time that you signed. So you have some 
   1068 rights that you can enforce. And they couldn't shut off your telephone 
   1069 line because the phone company doesn't like what you said, or because 
   1070 some powerful entity didn't like what you said and threatened the phone 
   1071 company. No! As long as you pay the bills and obey certain basic rules, 
   1072 they can't shut off your phone line. This is what it's like to have some 
   1073 rights!</p>
   1074 
   1075 <p>Well, if we move our activities from the physical world to the 
   1076 virtual world, then either we have the same rights in the virtual world, 
   1077 or we have been harmed. So, the precarity of all our Internet activities 
   1078 is the last of the menaces I wanted to mention.</p>
   1079 
   1080 <p>Now I'd like to say that for more information about free software,
   1081 look at gnu.org. Also look at fsf.org, which is the website of the Free
   1082 Software Foundation. You can go there and find many ways you can help 
   1083 us, for instance. You can also become a member of the Free Software 
   1084 Foundation through that site. [&hellip;] There is also the Free Software 
   1085 Foundation of Europe fsfe.org. You can join FSF Europe also. [&hellip;]</p>
   1086 <div class="column-limit"></div>
   1087 
   1088 <h3 id="footnotes" class="footnote">Footnote</h3>
   1089 
   1090 <ol>
   1091   <li id="f1">As of 2017 the patents on playing MP3 files have
   1092     reportedly expired.</li>
   1093 </ol>
   1094 </div>
   1095 
   1096 </div><!-- for id="content", starts in the include above -->
   1097 <!--#include virtual="/server/footer.html" -->
   1098 <div id="footer" role="contentinfo">
   1099 <div class="unprintable">
   1100 
   1101 <p>Please send general FSF &amp; GNU inquiries to
   1102 <a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>.
   1103 There are also <a href="/contact/">other ways to contact</a>
   1104 the FSF.  Broken links and other corrections or suggestions can be sent
   1105 to <a href="mailto:webmasters@gnu.org">&lt;webmasters@gnu.org&gt;</a>.</p>
   1106 
   1107 <p><!-- TRANSLATORS: Ignore the original text in this paragraph,
   1108         replace it with the translation of these two:
   1109 
   1110         We work hard and do our best to provide accurate, good quality
   1111         translations.  However, we are not exempt from imperfection.
   1112         Please send your comments and general suggestions in this regard
   1113         to <a href="mailto:web-translators@gnu.org">
   1114         &lt;web-translators@gnu.org&gt;</a>.</p>
   1115 
   1116         <p>For information on coordinating and contributing translations of
   1117         our web pages, see <a
   1118         href="/server/standards/README.translations.html">Translations
   1119         README</a>. -->
   1120 Please see the <a
   1121 href="/server/standards/README.translations.html">Translations
   1122 README</a> for information on coordinating and contributing translations
   1123 of this article.</p>
   1124 </div>
   1125 
   1126 <!-- Regarding copyright, in general, standalone pages (as opposed to
   1127      files generated as part of manuals) on the GNU web server should
   1128      be under CC BY-ND 4.0.  Please do NOT change or remove this
   1129      without talking with the webmasters or licensing team first.
   1130      Please make sure the copyright date is consistent with the
   1131      document.  For web pages, it is ok to list just the latest year the
   1132      document was modified, or published.
   1133      
   1134      If you wish to list earlier years, that is ok too.
   1135      Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
   1136      years, as long as each year in the range is in fact a copyrightable
   1137      year, i.e., a year in which the document was published (including
   1138      being publicly visible on the web or in a revision control system).
   1139      
   1140      There is more detail about copyright years in the GNU Maintainers
   1141      Information document, www.gnu.org/prep/maintain. -->
   1142 
   1143 <p>Copyright &copy; 2011, 2014, 2021 Richard Stallman</p>
   1144 
   1145 <p>This page is licensed under a <a rel="license"
   1146 href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
   1147 Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
   1148 
   1149 <!--#include virtual="/server/bottom-notes.html" -->
   1150 
   1151 <p class="unprintable">Updated:
   1152 <!-- timestamp start -->
   1153 $Date: 2021/10/15 14:13:51 $
   1154 <!-- timestamp end -->
   1155 </p>
   1156 </div>
   1157 </div><!-- for class="inner", starts in the banner include -->
   1158 </body>
   1159 </html>