[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:10.00,0:00:14.00,Default,,0000,0000,0000,,Merci. Félicitations aux étudiants\N[de l'association Libertés Numériques -- NdR] Dialogue: 0,0:00:14.10,0:00:16.00,Default,,0000,0000,0000,,d’avoir organisé cette réunion. Dialogue: 0,0:00:16.10,0:00:19.90,Default,,0000,0000,0000,,Ils ont eu raison, non seulement\Nà cause de la célébrité de Richard Dialogue: 0,0:00:20.00,0:00:22.20,Default,,0000,0000,0000,,mais aussi parce que les sujets\Nnous intéressent beaucoup. Dialogue: 0,0:00:22.30,0:00:25.00,Default,,0000,0000,0000,,Ils nous intéressent particulièrement\Nici à Sciences Po Dialogue: 0,0:00:25.10,0:00:29.20,Default,,0000,0000,0000,,puisque nous essayons d’abord\Nd’étudier les controverses; Dialogue: 0,0:00:29.30,0:00:31.20,Default,,0000,0000,0000,,certains d’entre vous ici\Nétudient les controverses Dialogue: 0,0:00:31.30,0:00:34.10,Default,,0000,0000,0000,,et Richard est lui-même\Nun personnage controversé. Dialogue: 0,0:00:34.20,0:00:37.00,Default,,0000,0000,0000,,Je n’ai rien trouvé sur le Web\Nqui permette de donner un accord Dialogue: 0,0:00:37.10,0:00:45.10,Default,,0000,0000,0000,,ni sur ce qu’il fait, ni sur ce qu’il dit, ni sur\Nles mots qu’il utilise, donc il est un cas d’école Dialogue: 0,0:00:45.20,0:00:48.70,Default,,0000,0000,0000,,pour nous qui étudions les cartographies\Nde controverse dans cette maison. Dialogue: 0,0:00:48.80,0:00:51.70,Default,,0000,0000,0000,,On a en quelque sorte la présentation\Nd’un personnage controversé Dialogue: 0,0:00:51.80,0:00:53.70,Default,,0000,0000,0000,,sur des sujets qui nous importent. Dialogue: 0,0:00:53.80,0:00:56.80,Default,,0000,0000,0000,,Le deuxième point évidemment,\Nc’est que le sujet lui-même Dialogue: 0,0:00:56.90,0:01:01.00,Default,,0000,0000,0000,,et la question des degrés\Nde liberté et de contrôle Dialogue: 0,0:01:01.10,0:01:08.20,Default,,0000,0000,0000,,qui sont au cœur de toutes\Nces innovations autour du numérique Dialogue: 0,0:01:08.30,0:01:11.00,Default,,0000,0000,0000,,nous intéressent directement,\Npour des raisons de sciences politiques Dialogue: 0,0:01:11.10,0:01:14.30,Default,,0000,0000,0000,,pour des raisons de sociologie,\Npour des raisons également de droit Dialogue: 0,0:01:14.40,0:01:18.00,Default,,0000,0000,0000,,toutes questions qui\Nnous intéressent dans cette maison. Dialogue: 0,0:01:18.10,0:01:21.80,Default,,0000,0000,0000,,C’est d’ailleurs assez intéressant\Nque Richard vienne chez nous Dialogue: 0,0:01:21.90,0:01:28.10,Default,,0000,0000,0000,,quelques jours après la mort de Steve Jobs,\Nmort qu’il a célébrée à sa façon si j’ose dire Dialogue: 0,0:01:28.20,0:01:32.20,Default,,0000,0000,0000,,en expliquant que la disparition\Nde Steve Jobs n’était pas un énorme malheur Dialogue: 0,0:01:32.30,0:01:36.10,Default,,0000,0000,0000,,pour l’ensemble des questions\Nde liberté numérique Dialogue: 0,0:01:36.20,0:01:40.00,Default,,0000,0000,0000,,à cause du fait que — même\Nsi on pouvait estimer Steve Jobs Dialogue: 0,0:01:40.10,0:01:42.80,Default,,0000,0000,0000,,le contrôle qu’il exerçait sur les logiciels Dialogue: 0,0:01:42.90,0:01:47.00,Default,,0000,0000,0000,,et la domination qui nous rend\Nen quelque sorte libres Dialogue: 0,0:01:47.10,0:01:51.00,Default,,0000,0000,0000,,mais sous la forme, comme il le dit\Ndans plusieurs de ses propos Dialogue: 0,0:01:51.10,0:01:54.20,Default,,0000,0000,0000,,d’une espèce de prison dorée —\Nprison dorée que j’adore Dialogue: 0,0:01:54.30,0:01:56.60,Default,,0000,0000,0000,,puisque je suis moi-même\Nun adepte du Macintosh Dialogue: 0,0:01:56.70,0:01:59.00,Default,,0000,0000,0000,,mais ce n’est pas évidemment\Nle genre de personnage Dialogue: 0,0:01:59.10,0:02:01.60,Default,,0000,0000,0000,,le genre de liberté auxquels pense Richard. Dialogue: 0,0:02:01.70,0:02:04.00,Default,,0000,0000,0000,,La troisième raison, c’est évidemment que Dialogue: 0,0:02:04.10,0:02:06.70,Default,,0000,0000,0000,,pour des tas de questions\Nqui nous intéressent directement Dialogue: 0,0:02:06.80,0:02:09.00,Default,,0000,0000,0000,,dans cette maison autour\Ndes humanités scientifiques Dialogue: 0,0:02:09.10,0:02:11.70,Default,,0000,0000,0000,,la liaison entre les innovations techniques Dialogue: 0,0:02:11.80,0:02:14.70,Default,,0000,0000,0000,,et les dipositifs politiques\Nnous intéresse directement. Dialogue: 0,0:02:14.80,0:02:17.70,Default,,0000,0000,0000,,Donc nous avons au moins,\Nen tout cas moi à la direction scientifique Dialogue: 0,0:02:17.80,0:02:23.00,Default,,0000,0000,0000,,trois raisons de nous réjouir\Nde l’initiative du groupe d’élèves Dialogue: 0,0:02:23.10,0:02:25.00,Default,,0000,0000,0000,,qui a organisé cette réunion Dialogue: 0,0:02:25.10,0:02:28.00,Default,,0000,0000,0000,,et je suis heureux de laisser\Nla parole à Richard Stallman Dialogue: 0,0:02:28.10,0:02:31.10,Default,,0000,0000,0000,,et je vous prie de l’applaudir avant qu’il ne parle. Dialogue: 0,0:02:37.70,0:02:43.10,Default,,0000,0000,0000,,Aidez-nous à continuer les sous titres SVP ! Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,il y a de multiples façons par lesquelles notre liberté est attaquée par les technologies numériques Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,les technologies numériques peuvent rendre les choses pires et elles le feront tant que nous ne nous batterons pas pour le prévenir Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So, projects with the goal of digital inclusion are making a big aassumption: Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They are assuming that participating in a digital society is good. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But that's not necessarily true! Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Being in a digital society can be good or bad depending on wether that digiatl society is just or unjust. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And there are many ways in which our freedom is being attacked by digital technology. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Digital technology can make things worse and it will unless we fight to prevent it. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Therefor, if we have an unjust digital society we should cancel these projects for digital inclusion and launch projects for digital extraction. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,We have to be - We have to extract people from digital society if it does not respect their freedom. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Or we have to make it respect their freedom. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So, what are the threats? Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,First: Surveillance. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Computers are Stalin's dreams. They are ideal tools for surveillance because everything we do with computers, the computer can record. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They can record the information in a perfectly indexed and searchable form in a central database. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Ideal for any tyran who want to crush opposition. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Surveillance is sometimes done with our own computers. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,For instance, if you have a computer that's running Microsoft Windows, that system is doing surveillance. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,There are features in Windows that send data to some server. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Data about the use of the computer. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,A surveillance feature was discovered in the iPhone a few month ago and Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,people started to call it the SpyPhone. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,FlashPlayer has a surveillance feature too and so does the Amazon "Swindle". Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They call it the Kindle but I call it swindle ????? because it's meant to swindle users out of their freedom. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It makes people identify themselves whenever they buy a book. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And that means Amazon has a giant list of all the books each user has read ... Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And such a list must not exist anywhere. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Most portable phone will transmit their location using - computed using GPS on remote command Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and the phone's company is accumulating a giant list of places that the user has been. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,A German MP in a green party asked the phone company to give him the data it had about where he was. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,He had to sue, to go to court, to get this information. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,When he got it, he received 44000 location points for a period of 6 months. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,That's more than 200 per day. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So what that means is someone could form a very good picture of his activities just by looking at that data. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Surveillance is also done - well Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,We can stop our own's computers from doing surveillance on us if we have control of the software that they run. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But the software these people are running, they don't have control over it. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Non free software ... and that's why it has malicious features such as the surveillance. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,However, the surveillance is not always done with our own computers. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It's also done at one remove (???). Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,For instance, ISPs in Europe are required to keep data about the user's internet communication for a long time Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in case the state decides to investigate that person later for whatever immaginable reason. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And with a portable phone, even if you can stop the phone from transmitting your GPS location, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,the system can determine the phone's location approximately by comparing when the signals arrive Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,at tdifferent towers. So the phone's system can do surveillance even without special cooperation from the phone itself.