EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.24.12

TechBytes Episode 70: Richard Stallman on How Browsers and Social Networking Sites Facilitate Surveillance

Posted in TechBytes at 1:03 am by Dr. Roy Schestowitz

Techbytes 2012

Direct download as Ogg (0:10:19, 4.2 MB)

Summary: The second part of our interview with Richard Stallman covers social networks and Web browsers

FURTHER to this interview with Richard Stallman (about UEFI) I spoke to him about another area of technology which is less to do with software and more to do with civil rights. Here is the transcript.


Dr. Roy Schestowitz: Obviously, quite famously, the FSF has made a statement about Facebook and my question was, what is your take on Google Plus? I know you’ve stated that in your Web site very briefly. And also, are there any centralised platforms that you actually deem benign?

Richard StallmanDr. Richard Stallman: Well, the first question is, well, the FSF doesn’t talk about Facebook too much. It’s a different issue from the Free software issue. So, I’m concerned with other issues of freedom besides that of Free versus proprietary software. So, I disapprove of Facebook because it collects a lot of personal information and I don’t think it’s good for anything to do that.

“I urge you not to use such communication systems which demand to know who you really are.”When I give a speech, at the beginning I ask people, “please don’t put a photos of me in Facebook.” And now I explain why. When you put a photo with people in it in Facebook, Facebooks asks people — asks users — to enter the names of those people. In other words, that photo gives Facebook an opportunity to do ad surveillance of those people. Those [can't make out the word] the victim of having a photo put in Facebook. So, I would suggest that if you are friends with somebody that you treat that someone well by not putting photos of that person in Faceebook. And and in any case, I ask people not to put photos of me in Facebook. Now, there are many other bad things Facebook does. See stallman.org/facebook.html for a list of quite a few.

But what about Google Plus? Well, from what I know, which is not everything, Google Plus does some of these bad things but not all. One bad thing that they both do is require people to give their real names. Now, Google Plus says that in some cases we’re wiling to publish a pseudonym but they demand to know the person’s real name. Well, I think that’s enough reason not to use it. I urge you not to use such communication systems which demand to know who you really are. Because if they do that, they’re basically one more eye of Big Brother.

[...]

I don’t go around trying to keep track of these things. Twitter might be okay. You got to be careful how you use it. First of all, it is possible to use Twitter without running non-Free software. It wasn’t easy to make an account, but apparently it could be done through their mobile version of the site. The problem was, the regular Twitter site tries to make you run non-Free JavaScript programs. And you will notice that if you have installed the LibreJS extension of Firefox, that’s a GNU package whose purpose is to enable you to avoid running non-Free JavaScript programs and also to make it easy to complain to the Webmasters about the non-Free JavaScript programs. But it is possible to work around that, as actually sending and viewing tweets, it’s not so hard to avoid using non-Free software. So, and Twitter doesn’t require people to give their real names and if you make an effort you can avoid sending in your geographical location or anything like that, which of course is a really dumb thing to do as certain protesters, dissidents in the US have discovered. So, maybe that’s enough to make it okay. Now, Twitter the company, is doing something else that’s bad — something that Facebook (and I think Twitter is doing this, I know Facebook and Google do it) and this is the “Like” button. In Facebook’s case it’s called the “Like” button. And you find this in lots of pages, where if you visit one of those pages that means Facebook is getting information about your browsing even if you’re not a Facebook user. And Google has “1+” button and they do the same thing. And I think Twitter also has such kind of button that you would find in various pages. We are going to release a browser modified to block all those.

I think in practice one of the issues is many of the browsers these days have actually got some surveillance built in and one of the usual excuses these days is security, so they try to prevent phishing scams and things like such that are absolute; I think since Internet Explorer version 7 and Google Chrome and other browsers by default they will track the users and leave a trail, or at least provide the corporate maker of the browser, with a list with pages you visit, so the other releases…

“…Google can forcibly impose software changes and the user can’t say no.”Those are non-Free programs. Internet Explorer is non-Free and Google Chrome is non-Free. Not only that, Google Chrome has a universal back door, which is another way of saying auto-update; basically it means that Google can forcibly impose software changes and the user can’t say no. This is the same thing that Microsoft has in Windows, so Microsoft can also impose software changes. Any malicious feature that’s not in the program today could be remotely installed tomorrow. So, once a program has a universal back door, you must consider it not merely malware but universal malware.


More insights from Stallman are to be published in the coming days.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: Facebook Google MSIE Chrome GNU FSF

Download:

Ogg Theora

Past shows in this series:

Show overview Show title
Episode 66: Tim and Roy TechBytes Episode 66: First of the Second Series
Episode 67: Tim and Roy TechBytes Episode 67: Nokia Down, Android Up
Episode 68: Roy TechBytes Episode 68: Solo With Patents, Apple Bans, and Android World Domination
Episode 69: Roy and Richard Stallman TechBytes Episode 69: Richard Stallman on Restricted Boot (UEFI), Coreboot, GRUB, and Boot Freedom
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. The EFF Back to Tackling Software Patents, Not Just Patent Trolls

    Electronic Frontier Foundation lawyers start targeting large companies that exploit patents for intimidation and extortion, not just patent trolling



  2. Microsoft Wants to Devour the Competition (Linux), Devour People's Data

    Refuting the "new Microsoft" propaganda and some ludicrous concept that Microsoft is now "playing nice"



  3. Benoît Battistelli Thinks 'President' is Above the Law, Decides to Ignore the Court's Ruling

    Staff of the EPO is given yet more reasons to protest tomorrow at the British Consulate, for the so-called 'President' of the EPO reminds everyone of the very raison d'être for the protest -- a vain disregard for the rule of law



  4. Links 24/2/2015: Xfce 4.12 a Week Away, GNOME 3.16 Previewed

    Links for the day



  5. Links 23/2/2015: Ubuntu Kylin 14.04.2 LTS, Cinnamon 2.6 Previews

    Links for the day



  6. IRC Proceedings: February 8th - February 21st, 2015





  7. The EPO's Sham 'Internal Investigation' of EPO Vice-President Željko Topić's Affairs

    The EPO never investigated the Željko Topić affair, it only pretends to have investigated (one small aspect, i.e. cherry-picking) using a Benoît Battistelli-controlled group



  8. Links 21/2/2015: GNOME 3.15.90, Google Wins Android Lawsuit

    Links for the day



  9. Microsoft AstroTurfing War on GNU/Linux is Still Going On, But Hidden Better, Uses API as Instrument of Lock-in

    The corruptible press continues to describe blatant attacks (Embrace, Extend, Extinguish) against GNU/Linux and Free software as Microsoft 'embracing' Open Source



  10. Lenovo's Superfish Scandal is Spyware on Top of Spyware (Microsoft Windows), the Problem is Inherently Proprietary Software

    Shifting focus to the root problem, which is neither Lenovo nor its laptops but the non-free programs installed on hardware



  11. Benoît Battistelli Once Again Threatens EPO Staff That 'Dares' to Protest, Battistelli Exploits Terror Attacks to Pretend to Respect Free Speech

    The European Patent Office (EPO) President, Benoît Battistelli, reportedly started threatening -- as before -- staff that decides to exercise the right to assemble and protest against abuses, including the abuses of President Battistelli himself



  12. Links 20/2/2015: Android Studio v1.1, GDB 7.9

    Links for the day



  13. Links 20/2/2015: Bloomberg Joins Linux Foundation, ClearOS Community 6.6.0

    Links for the day



  14. The Chartered Institute of Patent Attorneys Slams the European Patent Office for Structural Failings

    An important letter which we overlooked while writing yesterday's 4 articles about the European Patent Office (EPO); yet another key stakeholder complains



  15. Links 19/2/2015: Hewlett-Packard on Cumulus Linux, Previews of GNOME 3.16 Beta

    Links for the day



  16. Techrights Under Attack Again, Shortly After Important EPO Articles

    Techrights highlights a pattern that is months old; Site faces availability issues shortly after reports about the European Patent Office and its abuses



  17. EPO Staff Protests Against Benoît Battistelli’s Lowering of Patents Quality (Scope Expansion and Software Patents for Profit)

    A protest in Munich in less than 6 days will target Mr. Sean Dennehey, who has helped Battistelli cover up his abuses and crush legitimate critics, whom he deemed illegal opposition as if the EPO is an authoritarian regime as opposed to a public service which taxpayers are reluctantly (but forcibly) funding



  18. Breaking: European Patent Office Sued by Its Own Staff in The Hague, Must Unblock Staff's Voices

    The crooked management of the European Patent Office (EPO) gets in legal trouble after repeated attempts to cover up abuses and suppress criticism



  19. Željko Topić's History in SIPO Leaves a Legacy of Alleged DZIV Vehicles (Bribes), Authorship Abuses, and Intimidation Against Reporters

    Another deep look at Željko Topić's background in Croatia, preceding his very notorious appointment to the EPO where he now serves as Benoît Battistelli's most controversial attack dog



  20. The Old Obsession With Patent Trolls Continues to Distract From Debate About Software Patenting

    A roundup of recent coverage about monopolies on algorithms in the United States



  21. Links 19/2/2015: 64-bit ARM Linux, Chinese New Year

    Links for the day



  22. Links 18/2/2015: Linux Report, FlightGear 3.4

    Links for the day



  23. EPO Scandals: The Story So Far

    An overview of articles about mischief, misconduct and breach of laws at the EPO



  24. Links 17/2/2015: TripleO, Pivotal

    Links for the day



  25. Links 17/2/2015: SystemD 219, Frugalware 2.0 (Rigel) Released

    Links for the day



  26. Željko Peratović Slammed for Whitewashing Željko Topić After Publishing Important Piece on Behalf of Key Sources

    Response from Ivan Kabalin to Zeljko Peratovic's so-called "apology" which is both mysterious and seemingly inadequate as it does nothing to actually explain what was wrong (if anything)



  27. Benoît Battistelli Has Made Oversight of European Patent Office Absolutely Impossible





  28. Microsoft Already Killed Nokia, Don't Let It Kill Android Players Too

    Microsoft's strategy against Android mirrors the company's evil strategy that derailed MeeGo and Nokia



  29. Intel Continues to Attack Software Freedom Through UEFI

    The Trojan horse that Microsoft uses to cement its monopoly on desktops and laptops (making it hard or impossible to install and run GNU/Linux) is also being misused to block Coreboot



  30. Links 16/2/2015: Netrunner 15, Bridge Linux

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts