﻿WEBVTT

1
00:00:11.100 --> 00:00:15.360
free software is the first battle in the

2
00:00:15.360 --> 00:00:17.360
liberation of cyberspace

3
00:00:17.360 --> 00:00:20.080
who controls your computer

4
00:00:20.080 --> 00:00:22.440
is it you or is it some

5
00:00:22.440 --> 00:00:25.600
big company that's really controlling it

6
00:00:25.830 --> 00:00:28.610
well what is a computer a computer is a

7
00:00:28.610 --> 00:00:32.660
universal machine it will do any

8
00:00:32.660 --> 00:00:35.640
computation you wanted to because you

9
00:00:35.640 --> 00:00:37.770
give it a program that says what the

10
00:00:37.770 --> 00:00:40.460
computation is that you want so the

11
00:00:40.460 --> 00:00:42.510
computer only knows how to get out and

12
00:00:42.510 --> 00:00:44.430
instruction and do it and get add

13
00:00:44.430 --> 00:00:46.320
another instruction and do it

14
00:00:46.320 --> 00:00:48.890
the program has the instructions it says

15
00:00:48.890 --> 00:00:52.280
what to do and so you by writing the

16
00:00:52.280 --> 00:00:53.870
right program you can make it do

17
00:00:53.870 --> 00:00:56.760
anything well almost anything

18
00:00:56.760 --> 00:00:59.480
um so who gives the instructions to your

19
00:00:59.480 --> 00:01:01.890
computer you might think it's obeying

20
00:01:01.890 --> 00:01:05.480
your instructions when really it's

21
00:01:05.480 --> 00:01:08.760
obeying somebody else first and you only

22
00:01:08.760 --> 00:01:11.100
as much as that company wants it too

23
00:01:11.100 --> 00:01:14.640
will let it listen to you with software

24
00:01:14.640 --> 00:01:16.380
there are two possibilities either the

25
00:01:16.380 --> 00:01:19.470
users control the program or the program

26
00:01:19.470 --> 00:01:22.740
controls the users it's inevitably one

27
00:01:22.740 --> 00:01:23.850
or the other

28
00:01:23.850 --> 00:01:26.580
so in order for the users to control the

29
00:01:26.580 --> 00:01:28.790
program they need the four essential

30
00:01:28.790 --> 00:01:32.670
freedoms and that's the definition of

31
00:01:32.670 --> 00:01:36.900
free software free software respects the

32
00:01:36.900 --> 00:01:39.000
users freedom and community now we often

33
00:01:39.000 --> 00:01:41.460
call it libra using the french or

34
00:01:41.460 --> 00:01:43.400
spanish word pronounce it as you like

35
00:01:43.400 --> 00:01:45.810
the point is that's what we mean we

36
00:01:45.810 --> 00:01:47.790
don't mean it's gratis we're not talking

37
00:01:47.790 --> 00:01:49.970
about price we're concerned with your

38
00:01:49.970 --> 00:01:53.430
freedom and we sometimes say free /

39
00:01:53.430 --> 00:01:56.720
libre to show that so freedom zeros the

40
00:01:56.720 --> 00:01:59.150
freedom to run the program as you wish

41
00:01:59.150 --> 00:02:02.490
for whatever purpose freedom one is the

42
00:02:02.490 --> 00:02:04.500
freedom to study the source code of the

43
00:02:04.500 --> 00:02:07.740
program and change it so it does the

44
00:02:07.740 --> 00:02:10.640
computing you wanted to do but what is

45
00:02:10.640 --> 00:02:12.450
the source code well every program

46
00:02:12.450 --> 00:02:13.550
typically will have to

47
00:02:13.550 --> 00:02:16.730
forms there's the form that you can read

48
00:02:16.730 --> 00:02:19.100
and you can understand if you know the

49
00:02:19.100 --> 00:02:21.290
programming language that's the source

50
00:02:21.290 --> 00:02:24.500
that's what programmers write and change

51
00:02:24.500 --> 00:02:25.940
then there's the executable which is a

52
00:02:25.940 --> 00:02:28.250
bunch of numbers which even a programmer

53
00:02:28.250 --> 00:02:30.410
can figure out if all you get is the

54
00:02:30.410 --> 00:02:32.810
executable it's a horrible pain in the

55
00:02:32.810 --> 00:02:35.330
neck to figure out what it does and even

56
00:02:35.330 --> 00:02:38.270
harder to change it so to give you the

57
00:02:38.270 --> 00:02:41.600
real possibility to study and change it

58
00:02:41.600 --> 00:02:42.880
they've got to give you the source code

59
00:02:42.880 --> 00:02:46.190
that's a requirement well with those two

60
00:02:46.190 --> 00:02:49.820
freedoms each user separately can make a

61
00:02:49.820 --> 00:02:52.100
copy and start changing it and make it

62
00:02:52.100 --> 00:02:53.750
do what she wants

63
00:02:53.750 --> 00:02:57.650
that's individual control but what if

64
00:02:57.650 --> 00:02:59.390
you're not a programmer you look at the

65
00:02:59.390 --> 00:03:01.640
source code and you don't understand it

66
00:03:01.640 --> 00:03:04.820
individual control isn't enough

67
00:03:04.820 --> 00:03:07.700
we also need collective control which

68
00:03:07.700 --> 00:03:09.260
means any group of users are free to

69
00:03:09.260 --> 00:03:11.780
work together to adapt the program to

70
00:03:11.780 --> 00:03:14.210
what they want of course in the group

71
00:03:14.210 --> 00:03:16.430
some of them are programmers they're the

72
00:03:16.430 --> 00:03:18.830
ones who actually write the changes but

73
00:03:18.830 --> 00:03:20.450
they're doing it as part of the group

74
00:03:20.450 --> 00:03:23.200
for what the group wants course the

75
00:03:23.200 --> 00:03:25.340
group doesn't have to be everybody so

76
00:03:25.340 --> 00:03:27.770
others can use it some other way they're

77
00:03:27.770 --> 00:03:30.620
all free to do that so collective

78
00:03:30.620 --> 00:03:32.630
control requires two more essential

79
00:03:32.630 --> 00:03:34.970
freedoms freedom to is the freedom to

80
00:03:34.970 --> 00:03:37.450
redistribute exact copies to make the

81
00:03:37.450 --> 00:03:39.290
copies and then give them away or sell

82
00:03:39.290 --> 00:03:42.500
them when you wish and freedom three is

83
00:03:42.500 --> 00:03:44.420
similar but it's for your modified

84
00:03:44.420 --> 00:03:46.550
versions you're free to make copies and

85
00:03:46.550 --> 00:03:48.320
then give them or sell them when you

86
00:03:48.320 --> 00:03:49.100
wish

87
00:03:49.100 --> 00:03:51.500
so we do have these freedoms that it's

88
00:03:51.500 --> 00:03:53.200
free software the users control the

89
00:03:53.200 --> 00:03:55.700
program but if any of those freedoms is

90
00:03:55.700 --> 00:03:58.940
missing then the users don't control the

91
00:03:58.940 --> 00:04:01.400
program instead the program controls the

92
00:04:01.400 --> 00:04:04.400
users and the developer controls the

93
00:04:04.400 --> 00:04:07.790
program so that means this program is an

94
00:04:07.790 --> 00:04:11.120
instrument of unjust power for its

95
00:04:11.120 --> 00:04:15.800
developer / the users that means the

96
00:04:15.800 --> 00:04:18.730
users don't have freedom that's non-free

97
00:04:18.730 --> 00:04:20.570
proprietary software which we got to get

98
00:04:20.570 --> 00:04:21.410
rid of

99
00:04:21.410 --> 00:04:23.720
well when you've got proprietary

100
00:04:23.720 --> 00:04:26.380
software what happens sometimes

101
00:04:26.380 --> 00:04:30.100
program snoops on the user sometimes it

102
00:04:30.100 --> 00:04:34.300
tracks the user sometimes it restricts

103
00:04:34.300 --> 00:04:37.900
the user and stop users from doing what

104
00:04:37.900 --> 00:04:39.700
they want to do you can see that the

105
00:04:39.700 --> 00:04:41.200
blu-ray is your enemy

106
00:04:41.200 --> 00:04:44.860
um sometimes the software remotely

107
00:04:44.860 --> 00:04:48.190
deletes books as Amazon did with 1984

108
00:04:48.190 --> 00:04:54.310
but sometimes the developer compels

109
00:04:54.310 --> 00:04:58.540
users to install a harmful upgrade by

110
00:04:58.540 --> 00:05:00.190
threatening to take away other

111
00:05:00.190 --> 00:05:03.460
functionality if it's not installed as

112
00:05:03.460 --> 00:05:05.860
Sony did and sometimes they can even

113
00:05:05.860 --> 00:05:08.560
forcibly change the software at a

114
00:05:08.560 --> 00:05:11.380
distance as Microsoft can with windows

115
00:05:11.380 --> 00:05:13.750
through the universal back door

116
00:05:13.750 --> 00:05:17.350
I'm so sometimes they even sabotage

117
00:05:17.350 --> 00:05:19.930
users as Microsoft does when it tells

118
00:05:19.930 --> 00:05:23.860
the NSA about bugs in windows so it can

119
00:05:23.860 --> 00:05:26.350
use them to attack people's computers

120
00:05:26.350 --> 00:05:28.930
well what you get is basically with

121
00:05:28.930 --> 00:05:32.110
proprietary software the owner has power

122
00:05:32.110 --> 00:05:35.500
over the users and takes advantage of

123
00:05:35.500 --> 00:05:37.450
this power putting in those various

124
00:05:37.450 --> 00:05:40.600
malicious functionalities to hurt the

125
00:05:40.600 --> 00:05:43.300
users of course they don't do this

126
00:05:43.300 --> 00:05:45.460
because they're Satanist they're doing

127
00:05:45.460 --> 00:05:48.340
it just for money for greed they have

128
00:05:48.340 --> 00:05:51.160
various ways that they can profit from

129
00:05:51.160 --> 00:05:54.430
having this power over users which does

130
00:05:54.430 --> 00:05:56.890
not make it even the tiniest bit less

131
00:05:56.890 --> 00:05:59.950
evil but they have no shame about it

132
00:05:59.950 --> 00:06:02.200
they have conferences where they talk

133
00:06:02.200 --> 00:06:04.540
about the latest ways they can take

134
00:06:04.540 --> 00:06:06.850
advantage of users through the power

135
00:06:06.850 --> 00:06:10.210
they have basically proprietary software

136
00:06:10.210 --> 00:06:14.260
which in is now from almost all the

137
00:06:14.260 --> 00:06:15.940
users of proprietary software they're

138
00:06:15.940 --> 00:06:19.210
using proprietary malware its software

139
00:06:19.210 --> 00:06:20.500
for suckers

140
00:06:20.500 --> 00:06:23.560
so how do us how do you stop being the

141
00:06:23.560 --> 00:06:27.100
victim formerly you have to stop using

142
00:06:27.100 --> 00:06:28.930
computers but not anymore

143
00:06:28.930 --> 00:06:30.820
now you can come join us in the free

144
00:06:30.820 --> 00:06:36.460
world that we've built but in 1983 i can

145
00:06:36.460 --> 00:06:38.620
announce i would develop a completely

146
00:06:38.620 --> 00:06:39.840
free software up

147
00:06:39.840 --> 00:06:44.160
rating system called GNU in 1992 we had

148
00:06:44.160 --> 00:06:46.380
almost finished but one piece was

149
00:06:46.380 --> 00:06:49.270
missing the Kernel Linux or vaults in

150
00:06:49.270 --> 00:06:50.370
that year

151
00:06:50.370 --> 00:06:53.190
freed his Kernel Linux which filled the

152
00:06:53.190 --> 00:06:56.190
last gap and gave us the first complete

153
00:06:56.190 --> 00:06:58.470
system you could run on a pc GNU plus

154
00:06:58.470 --> 00:07:04.290
Linux so unfortunately having freedom at

155
00:07:04.290 --> 00:07:06.390
one more point doesn't guarantee you'll

156
00:07:06.390 --> 00:07:08.940
keep it there are over a thousand

157
00:07:08.940 --> 00:07:11.880
different variants of GNU/Linux called

158
00:07:11.880 --> 00:07:14.880
distributions a few of them are entirely

159
00:07:14.880 --> 00:07:17.700
free software most of them have non-free

160
00:07:17.700 --> 00:07:19.620
software added because they are

161
00:07:19.620 --> 00:07:21.990
maintained by people who aren't

162
00:07:21.990 --> 00:07:23.880
concerned about freedom they rather and

163
00:07:23.880 --> 00:07:25.770
convenience but at the cost of freedom

164
00:07:25.770 --> 00:07:29.490
so you have to check which is a free

165
00:07:29.490 --> 00:07:32.550
distro to keep your freedom sometimes

166
00:07:32.550 --> 00:07:34.470
requires a sacrifice sometimes a big

167
00:07:34.470 --> 00:07:38.640
sacrifice as at Lexington sometimes but

168
00:07:38.640 --> 00:07:41.580
but in our campaign they tend to be

169
00:07:41.580 --> 00:07:45.270
little sacrifices anybody with a little

170
00:07:45.270 --> 00:07:46.740
bit of maturity can make these

171
00:07:46.740 --> 00:07:49.590
sacrifices for instance you want

172
00:07:49.590 --> 00:07:51.660
applications but some of them are

173
00:07:51.660 --> 00:07:55.360
non-free if you want freedom you got it do without them

174
00:07:55.360 --> 00:07:57.840
so there may be some inconvenience is

175
00:07:57.840 --> 00:08:00.120
you have to suffer for your freedom sake

176
00:08:00.120 --> 00:08:04.830
then many websites send non-free

177
00:08:04.830 --> 00:08:07.680
programs written in JavaScript to the

178
00:08:07.680 --> 00:08:09.990
users browser if you don't want to run

179
00:08:09.990 --> 00:08:11.940
non-free programs you should install

180
00:08:11.940 --> 00:08:15.490
libre jas which blocks keeps out

181
00:08:15.490 --> 00:08:18.450
non-free javascript and sometimes

182
00:08:18.450 --> 00:08:21.780
servers will offer to do your computing

183
00:08:21.780 --> 00:08:24.510
they say send us all your data obviously

184
00:08:24.510 --> 00:08:25.800
for suckers

185
00:08:25.800 --> 00:08:28.240
then the server does the computing and

186
00:08:28.240 --> 00:08:30.550
sends you back the results but you're

187
00:08:30.550 --> 00:08:32.130
not supposed to think about what's

188
00:08:32.130 --> 00:08:34.920
happening because it's a cloud and you

189
00:08:34.920 --> 00:08:37.380
don't see what's going on

190
00:08:37.380 --> 00:08:38.860
well you should look it's

191
00:08:38.860 --> 00:08:41.490
software-as-a-service as a software

192
00:08:41.490 --> 00:08:44.290
substitute and it takes away control of

193
00:08:44.290 --> 00:08:48.630
your computing so a large fraction of

194
00:08:48.630 --> 00:08:51.330
the world's web servers are running do /

195
00:08:51.330 --> 00:08:53.890
lanoxin other free software but i think the

196
00:08:53.890 --> 00:08:55.450
most important computers

197
00:08:55.450 --> 00:08:58.240
to put freedom in our your computer's

198
00:08:58.240 --> 00:09:01.370
not company's web servers they deserve

199
00:09:01.370 --> 00:09:04.690
freedom also but above all its people

200
00:09:04.690 --> 00:09:07.570
that deserve freedom so we need to

201
00:09:07.570 --> 00:09:11.290
advance and to do that we have to cross

202
00:09:11.290 --> 00:09:13.930
obstacles one of them is there are big

203
00:09:13.930 --> 00:09:15.700
companies that make a lot of money by

204
00:09:15.700 --> 00:09:18.500
having control over users and they don't

205
00:09:18.500 --> 00:09:20.500
want to let us advance we have to

206
00:09:20.500 --> 00:09:22.750
overcome their opposition

207
00:09:22.750 --> 00:09:25.240
another is that the mainstream media

208
00:09:25.240 --> 00:09:27.820
don't talk about free software they have

209
00:09:27.820 --> 00:09:30.860
a term that they use to bury these

210
00:09:30.860 --> 00:09:33.680
ethical issues they say open source

211
00:09:33.680 --> 00:09:35.930
instead now

212
00:09:35.930 --> 00:09:37.870
it talks about more or less the same

213
00:09:37.870 --> 00:09:41.620
programs but with different ideas where

214
00:09:41.620 --> 00:09:44.590
free software activists say this is a

215
00:09:44.590 --> 00:09:46.330
matter of right and wrong users deserve

216
00:09:46.330 --> 00:09:48.760
freedom we demand freedom the people say

217
00:09:48.760 --> 00:09:50.740
open source data once say that

218
00:09:50.740 --> 00:09:53.830
so instead they say let the users change

219
00:09:53.830 --> 00:09:55.970
the software and redistribute it and

220
00:09:55.970 --> 00:09:58.180
they'll make the code better they'll fix

221
00:09:58.180 --> 00:09:59.170
some bugs

222
00:09:59.170 --> 00:10:01.900
it may be true but it's a less important issue if

223
00:10:01.900 --> 00:10:03.190
we want to keep our freedom

224
00:10:03.190 --> 00:10:05.260
we've got to talk about freedom so say

225
00:10:05.260 --> 00:10:07.450
free software and you're helping us

226
00:10:07.450 --> 00:10:09.880
every time another obstacle is that lots

227
00:10:09.880 --> 00:10:12.820
of schools teach non-free software which

228
00:10:12.820 --> 00:10:15.500
is basically like teaching the kids to

229
00:10:15.500 --> 00:10:17.830
smoke tobacco it's implanting dependence

230
00:10:17.830 --> 00:10:19.630
which is the opposite of what school

231
00:10:19.630 --> 00:10:22.690
should do a school should prepare

232
00:10:22.690 --> 00:10:27.110
citizens to live in a strong capable

233
00:10:27.110 --> 00:10:30.110
independent cooperating and free society

234
00:10:30.110 --> 00:10:33.520
which means teaching free software in

235
00:10:33.520 --> 00:10:35.770
the school but there's another reason to

236
00:10:35.770 --> 00:10:38.740
do that for education some kids want to

237
00:10:38.740 --> 00:10:40.850
become programmers they're curious they

238
00:10:40.850 --> 00:10:42.760
wantto know how the programs work well

239
00:10:42.760 --> 00:10:44.120
the one who's studying a free software

240
00:10:44.120 --> 00:10:46.550
can understand it the one who's studying

241
00:10:46.550 --> 00:10:48.670
a non-free program can't learn anything

242
00:10:48.670 --> 00:10:52.240
because the knowledge in the non-free

243
00:10:52.240 --> 00:10:55.420
program is withheld denied to the

244
00:10:55.420 --> 00:10:57.800
students so to uphold the spirit of

245
00:10:57.800 --> 00:10:59.830
Education the school should make sure

246
00:10:59.830 --> 00:11:01.870
its programs are free but there's an

247
00:11:01.870 --> 00:11:04.540
even more important reason schools

248
00:11:04.540 --> 00:11:06.880
should teach the spirit of goodwill

249
00:11:06.880 --> 00:11:09.790
the habit of helping other people so the

250
00:11:09.790 --> 00:11:12.370
class should say if you bring a program

251
00:11:12.370 --> 00:11:14.950
to class just as if you bring cookies to

252
00:11:14.950 --> 00:11:15.730
class

253
00:11:15.730 --> 00:11:17.230
you've got to share it with everyone

254
00:11:17.230 --> 00:11:19.870
else can't keep it to yourself you gotta

255
00:11:19.870 --> 00:11:22.270
share the source code so other people

256
00:11:22.270 --> 00:11:24.820
can learn so don't bring any proprietary

257
00:11:24.820 --> 00:11:26.830
software to this class

258
00:11:26.830 --> 00:11:29.920
the school has to set a good example by

259
00:11:29.920 --> 00:11:32.740
following its own rule should bring only

260
00:11:32.740 --> 00:11:35.620
free software to class except as a

261
00:11:35.620 --> 00:11:39.700
reverse engineering exercise another

262
00:11:39.700 --> 00:11:42.350
obstacle is there's hardware we don't

263
00:11:42.350 --> 00:11:43.990
know how to write free software for

264
00:11:43.990 --> 00:11:46.270
because they won't tell us how to use

265
00:11:46.270 --> 00:11:48.850
the hardware that shocking they want to

266
00:11:48.850 --> 00:11:51.100
sell you the product and they won't tell

267
00:11:51.100 --> 00:11:52.300
you how to use it

268
00:11:52.300 --> 00:11:54.820
they say here's a non-free program you

269
00:11:54.820 --> 00:11:57.250
can use run it and shut up

270
00:11:57.250 --> 00:12:00.910
don't bother us well how do we find out

271
00:12:00.910 --> 00:12:02.770
how to run that hardware with reverse

272
00:12:02.770 --> 00:12:05.890
engineering you gotta study all those

273
00:12:05.890 --> 00:12:07.450
zeroes and ones to figure out what they

274
00:12:07.450 --> 00:12:10.660
really do and write down how to use that

275
00:12:10.660 --> 00:12:12.610
hardware so someone else can write the

276
00:12:12.610 --> 00:12:15.730
free program to do it it's hard work but

277
00:12:15.730 --> 00:12:17.620
it can be done if you want to make a big

278
00:12:17.620 --> 00:12:19.990
technical contribution that's what you

279
00:12:19.990 --> 00:12:24.130
should do each new area activity of life

280
00:12:24.130 --> 00:12:27.520
can bring with it new human rights that

281
00:12:27.520 --> 00:12:29.890
are necessary and the human rights

282
00:12:29.890 --> 00:12:32.860
depend on each other if you lose one it

283
00:12:32.860 --> 00:12:35.800
becomes harder to maintain the others so

284
00:12:35.800 --> 00:12:38.830
nowadays computing is so important in

285
00:12:38.830 --> 00:12:41.140
society that the freedoms of free

286
00:12:41.140 --> 00:12:44.170
software are among the human rights that

287
00:12:44.170 --> 00:12:47.290
society must establish and protect us

288
00:12:47.290 --> 00:12:49.660
how to help

289
00:12:49.660 --> 00:12:51.860
well you can write free software you can

290
00:12:51.860 --> 00:12:55.540
organize groups to campaign and persuade

291
00:12:55.540 --> 00:12:57.350
schools and governments to move to free

292
00:12:57.350 --> 00:12:59.740
software you can help other people when

293
00:12:59.740 --> 00:13:01.930
they have trouble using free software or

294
00:13:01.930 --> 00:13:05.170
help them install it you can say free

295
00:13:05.170 --> 00:13:06.980
software and spread the philosophical

296
00:13:06.980 --> 00:13:10.900
ideas moving to free software is the

297
00:13:10.900 --> 00:13:13.270
first step in the liberation of cyberspace

298
00:13:13.270 --> 00:13:15.160
but of course we also use the internet

299
00:13:15.160 --> 00:13:17.200
we need other freedoms they're like

300
00:13:17.200 --> 00:13:19.400
network neutrality and

301
00:13:19.400 --> 00:13:22.910
putting an end to surveillance of people

302
00:13:22.910 --> 00:13:24.640
in general
