1 00:00:10,000 --> 00:00:14,000 Merci. Félicitations aux étudiants [de l'association Libertés Numériques -- NdR] 2 00:00:14,100 --> 00:00:16,000 d’avoir organisé cette réunion. 3 00:00:16,100 --> 00:00:19,900 Ils ont eu raison, non seulement à cause de la célébrité de Richard 4 00:00:20,000 --> 00:00:22,200 mais aussi parce que les sujets nous intéressent beaucoup. 5 00:00:22,300 --> 00:00:25,000 Ils nous intéressent particulièrement ici à Sciences Po 6 00:00:25,100 --> 00:00:29,200 puisque nous essayons d’abord d’étudier les controverses; 7 00:00:29,300 --> 00:00:31,200 certains d’entre vous ici étudient les controverses 8 00:00:31,300 --> 00:00:34,100 et Richard est lui-même un personnage controversé. 9 00:00:34,200 --> 00:00:37,000 Je n’ai rien trouvé sur le Web qui permette de donner un accord 10 00:00:37,100 --> 00:00:45,100 ni sur ce qu’il fait, ni sur ce qu’il dit, ni sur les mots qu’il utilise, donc il est un cas d’école 11 00:00:45,200 --> 00:00:48,700 pour nous qui étudions les cartographies de controverse dans cette maison. 12 00:00:48,800 --> 00:00:51,700 On a en quelque sorte la présentation d’un personnage controversé 13 00:00:51,800 --> 00:00:53,700 sur des sujets qui nous importent. 14 00:00:53,800 --> 00:00:56,800 Le deuxième point évidemment, c’est que le sujet lui-même 15 00:00:56,900 --> 00:01:01,000 et la question des degrés de liberté et de contrôle 16 00:01:01,100 --> 00:01:08,200 qui sont au cœur de toutes ces innovations autour du numérique 17 00:01:08,300 --> 00:01:11,000 nous intéressent directement, pour des raisons de sciences politiques 18 00:01:11,100 --> 00:01:14,300 pour des raisons de sociologie, pour des raisons également de droit 19 00:01:14,400 --> 00:01:18,000 toutes questions qui nous intéressent dans cette maison. 20 00:01:18,100 --> 00:01:21,800 C’est d’ailleurs assez intéressant que Richard vienne chez nous 21 00:01:21,900 --> 00:01:28,100 quelques jours après la mort de Steve Jobs, mort qu’il a célébrée à sa façon si j’ose dire 22 00:01:28,200 --> 00:01:32,200 en expliquant que la disparition de Steve Jobs n’était pas un énorme malheur 23 00:01:32,300 --> 00:01:36,100 pour l’ensemble des questions de liberté numérique 24 00:01:36,200 --> 00:01:40,000 à cause du fait que — même si on pouvait estimer Steve Jobs 25 00:01:40,100 --> 00:01:42,800 le contrôle qu’il exerçait sur les logiciels 26 00:01:42,900 --> 00:01:47,000 et la domination qui nous rend en quelque sorte libres 27 00:01:47,100 --> 00:01:51,000 mais sous la forme, comme il le dit dans plusieurs de ses propos 28 00:01:51,100 --> 00:01:54,200 d’une espèce de prison dorée — prison dorée que j’adore 29 00:01:54,300 --> 00:01:56,600 puisque je suis moi-même un adepte du Macintosh 30 00:01:56,700 --> 00:01:59,000 mais ce n’est pas évidemment le genre de personnage 31 00:01:59,100 --> 00:02:01,600 le genre de liberté auxquels pense Richard. 32 00:02:01,700 --> 00:02:04,000 La troisième raison, c’est évidemment que 33 00:02:04,100 --> 00:02:06,700 pour des tas de questions qui nous intéressent directement 34 00:02:06,800 --> 00:02:09,000 dans cette maison autour des humanités scientifiques 35 00:02:09,100 --> 00:02:11,700 la liaison entre les innovations techniques 36 00:02:11,800 --> 00:02:14,700 et les dipositifs politiques nous intéresse directement. 37 00:02:14,800 --> 00:02:17,700 Donc nous avons au moins, en tout cas moi à la direction scientifique 38 00:02:17,800 --> 00:02:23,000 trois raisons de nous réjouir de l’initiative du groupe d’élèves 39 00:02:23,100 --> 00:02:25,000 qui a organisé cette réunion 40 00:02:25,100 --> 00:02:28,000 et je suis heureux de laisser la parole à Richard Stallman 41 00:02:28,100 --> 00:02:31,100 et je vous prie de l’applaudir avant qu’il ne parle. 42 00:02:37,700 --> 00:02:43,100 Aidez-nous à continuer les sous titres SVP ! 43 99:59:59,999 --> 99:59:59,999 il y a de multiples façons par lesquelles notre liberté est attaquée par les technologies numériques 44 99:59:59,999 --> 99:59:59,999 les technologies numériques peuvent rendre les choses pires et elles le feront tant que nous ne nous batterons pas pour le prévenir 45 99:59:59,999 --> 99:59:59,999 So, projects with the goal of digital inclusion are making a big aassumption: 46 99:59:59,999 --> 99:59:59,999 They are assuming that participating in a digital society is good. 47 99:59:59,999 --> 99:59:59,999 But that's not necessarily true! 48 99:59:59,999 --> 99:59:59,999 Being in a digital society can be good or bad depending on wether that digiatl society is just or unjust. 49 99:59:59,999 --> 99:59:59,999 And there are many ways in which our freedom is being attacked by digital technology. 50 99:59:59,999 --> 99:59:59,999 Digital technology can make things worse and it will unless we fight to prevent it. 51 99:59:59,999 --> 99:59:59,999 Therefor, if we have an unjust digital society we should cancel these projects for digital inclusion and launch projects for digital extraction. 52 99:59:59,999 --> 99:59:59,999 We have to be - We have to extract people from digital society if it does not respect their freedom. 53 99:59:59,999 --> 99:59:59,999 Or we have to make it respect their freedom. 54 99:59:59,999 --> 99:59:59,999 So, what are the threats? 55 99:59:59,999 --> 99:59:59,999 First: Surveillance. 56 99:59:59,999 --> 99:59:59,999 Computers are Stalin's dreams. They are ideal tools for surveillance because everything we do with computers, the computer can record. 57 99:59:59,999 --> 99:59:59,999 They can record the information in a perfectly indexed and searchable form in a central database. 58 99:59:59,999 --> 99:59:59,999 Ideal for any tyran who want to crush opposition. 59 99:59:59,999 --> 99:59:59,999 Surveillance is sometimes done with our own computers. 60 99:59:59,999 --> 99:59:59,999 For instance, if you have a computer that's running Microsoft Windows, that system is doing surveillance. 61 99:59:59,999 --> 99:59:59,999 There are features in Windows that send data to some server. 62 99:59:59,999 --> 99:59:59,999 Data about the use of the computer. 63 99:59:59,999 --> 99:59:59,999 A surveillance feature was discovered in the iPhone a few month ago and 64 99:59:59,999 --> 99:59:59,999 people started to call it the SpyPhone. 65 99:59:59,999 --> 99:59:59,999 FlashPlayer has a surveillance feature too and so does the Amazon "Swindle". 66 99:59:59,999 --> 99:59:59,999 They call it the Kindle but I call it swindle ????? because it's meant to swindle users out of their freedom. 67 99:59:59,999 --> 99:59:59,999 It makes people identify themselves whenever they buy a book. 68 99:59:59,999 --> 99:59:59,999 And that means Amazon has a giant list of all the books each user has read ... 69 99:59:59,999 --> 99:59:59,999 And such a list must not exist anywhere. 70 99:59:59,999 --> 99:59:59,999 Most portable phone will transmit their location using - computed using GPS on remote command 71 99:59:59,999 --> 99:59:59,999 and the phone's company is accumulating a giant list of places that the user has been. 72 99:59:59,999 --> 99:59:59,999 A German MP in a green party asked the phone company to give him the data it had about where he was. 73 99:59:59,999 --> 99:59:59,999 He had to sue, to go to court, to get this information. 74 99:59:59,999 --> 99:59:59,999 When he got it, he received 44000 location points for a period of 6 months. 75 99:59:59,999 --> 99:59:59,999 That's more than 200 per day. 76 99:59:59,999 --> 99:59:59,999 So what that means is someone could form a very good picture of his activities just by looking at that data. 77 99:59:59,999 --> 99:59:59,999 Surveillance is also done - well 78 99:59:59,999 --> 99:59:59,999 We can stop our own's computers from doing surveillance on us if we have control of the software that they run. 79 99:59:59,999 --> 99:59:59,999 But the software these people are running, they don't have control over it. 80 99:59:59,999 --> 99:59:59,999 Non free software ... and that's why it has malicious features such as the surveillance. 81 99:59:59,999 --> 99:59:59,999 However, the surveillance is not always done with our own computers. 82 99:59:59,999 --> 99:59:59,999 It's also done at one remove (???). 83 99:59:59,999 --> 99:59:59,999 For instance, ISPs in Europe are required to keep data about the user's internet communication for a long time 84 99:59:59,999 --> 99:59:59,999 in case the state decides to investigate that person later for whatever immaginable reason. 85 99:59:59,999 --> 99:59:59,999 And with a portable phone, even if you can stop the phone from transmitting your GPS location, 86 99:59:59,999 --> 99:59:59,999 the system can determine the phone's location approximately by comparing when the signals arrive 87 99:59:59,999 --> 99:59:59,999 at tdifferent towers. So the phone's system can do surveillance even without special cooperation from the phone itself.