EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.24.13

TechBytes Episode 78: Richard Stallman Speaks About Surveillance in the Post-Leaks Era

Posted in TechBytes at 6:39 am by Dr. Roy Schestowitz

Richard Stallman on Snowden, NSA, etc.

Techbytes 2013

Direct download as Ogg (00:08:15, 5.9 MB)

Summary: The first part of a series about privacy

TODAY we officially begin a series of interviews with Dr. Richard Stallman, as promised last week. Stallman was proven to be right on the issues of privacy and freedom as more information was being shown for everyone to see how surveillance is used to control users’ behaviour and distort/impede communications in some cases. As more evidence came to light, showing in concrete form what a lot of people already knew but could not always prove, there was a lot to be discussed not hypothetically but realistically.

This is the first part of many and the transcript follows (some parts were too incomprehensible due to low recording quality, so we duly apologise for inaccuracies).


Dr. Roy S. Schestowitz: As I said before, I think the plan was mostly to focus on things that we hadn’t touched before and primarily things to do with privacy. I think we were — and many people were — advocating for freedom in technology were proven to be correct in the sense that on the issue of privacy and freedom everything seems to be very symbiotic and I think in recent weeks we found that more and more people have woken up to the fact that they need to assure they can control their software.

Richard StallmanDr. Richard M. Stallman: It’s not just about what happens in your computer. With Free software you control what happens in your computer, but of course there are other systems of snooping. The NSA is setting up snooping that we have been reading about recently. They don’t work through software in your computer. So, what this shows is, a) they have {users must have} control over the software in your computer; b) we need to work politically to make sure that the software that’s not in our computer — the systems that are not ours — are nonetheless not being used to snoop on us.

RSS: I think information is increasingly being used to change behaviour in people and also to distort the ways of communication between entities and I think that routers, for example, play a role in the way in which we interact with computers, so I wonder what your take is on the [snooping] in routers, many of them [are] Cisco ones.

“Of course encryption in itself doesn’t disguise who we are talking to and it’s been played out that if the government knows who knows who, then it is a tremendous start on breaking any dissident movement.”RMS: Ed Snowden, I think, said that the NSA takes control of routers in order to monitor Internet traffic in other countries.

RSS: It is actually proven to be the case and any interested person who researched this subject before would know that Cisco was working with the Chinese government to enable things like sending E-mail port back to communication and such things, so we do know that there is a degree of collusion between them. I think we’ll touch on this later when we’re just thinking the possibility of back doors. But I think it’s more evident now that it comes to light, showing in concrete terms what we already know was probably happening all these years.

RMS: There are many routers you can get that you can then install free software into. So if we are talking about your router, then yeah, you should put Free software into it. But when you talk to other [incomprehensible] it’s critical to ask first if they are not yours. And some of them will belong to companies that might very well be collaborating with surveillance. And Free software is not going to fix that problem, because if that company which [incomprehensible] for its switch/routers was to collaborate with the NSA, it is going to collaborate with the NSA or the Chinese government or whatever. So, Free software means you can control over the software or what your computer is doing or your computers are doing, but it doesn’t necessarily mean that the other organisations you deal with are going to respect your privacy.

RSS: Unless of course we use encryption, for example.

RMS: Yes. Of course encryption in itself doesn’t disguise who we are talking to and it’s been played out that if the government knows who knows who, then it is a tremendous start on breaking any dissident movement.


The next part will be published in a few days.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: gnu fsf richardstallman

Download:

Ogg Theora

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

4 Comments

  1. Needs Sunlight said,

    June 24, 2013 at 8:49 am

    Gravatar

    It was a little short and the sound quality of the recording is rather unfortunate. Was it a lossy codec transcoded to another lossy codec?

    Dr. Roy Schestowitz Reply:

    The recording was done with a microphone over landline and the volume badly adjusted. I tried to improve that.

  2. Needs Sunlight said,

    June 24, 2013 at 9:32 am

    Gravatar

    About the topic, it would be useful to know specifically which router hardware is most able to use Free Software, and also which Free Software is best suited to which sorts of networking. Yes, there is stuff out there, but it is pretty much under the radar nothing I can recall seeing has mentioned L2 or L3 routing using Linux or BSD. Given the cost of Cisco systems, in some cases you could probably hire a full-timer to hack in C on the OS and customize your set up using Free Software and still come out ahead in both performance and cost.

  3. Michael said,

    June 24, 2013 at 11:12 am

    Gravatar

    Do you have this available as an MP3 so more people can hear it?

What Else is New


  1. The EPO's Dutch Scandal Leaves Battistelli and His Cronies on the Run

    EPO management is making concessions and issues statements which admit defeat, allowing the staff union to continue its activities



  2. Microsoft Won't Let People Wipe (Off) Windows But Happily Wipes Android, Wipes Android Apps Through Cyanogen and Blackmailed 'Partners'

    Microsoft's obscene double-standards leave Android and Linux between a rock and a hard place



  3. Links 26/3/2015: GNOME 3.16 Officially Released

    Links for the day



  4. Links 25/3/2015: India Moving to Free Software

    Links for the day



  5. Another Reason to Boycott UEFI: Back Doors or Crackers

    UEFI makes computers more prone to infections, according to some security experts



  6. The EPO's Administrative Council is Under Increased Pressure to Rein in and to Finally Stop Benoît Battistelli

    The EPO's Administrative Council (AC) is about to have a meeting, so the Member States' delegations are urged to call for action



  7. IRC Proceedings: February 22nd - March 21st, 2015

    Many IRC logs



  8. The Latest Microsoft Attacks on GNU/Linux and Free/Libre Software

    Microsoft is still hiding behind the façade of 'love' whilst actively attacking GNU/Linux and Free software from many directions



  9. Attempts to Disrupt Android by Pushing Microsoft Software Into It (Using Patent Blackmail and Cyanogen)

    Microsoft's Android coup d'état is succeeding owing to public apathy and poor comprehension of what Microsoft really is up to, partly due to media misdirection



  10. Links 24/3/2015: WebKitGTK+ 2.8.0, Black Lab Linux 6.5

    Links for the day



  11. Concerns Over Željko Topić's Alleged Powerful Links in Croatian Diplomacy

    Rikard Frgačić explains the powerful connections acquired though Ivan Šimonović, who is himself connected to EPO Vice-President Željko Topić



  12. Benoît Battistelli's EPO Comes Under Fire From Prominent Figures Who Are Key EPO Stakeholders, Expect Battistelli to Resign 'in the Longer Term'

    The ‘reign of terror’ which is primarily attributed to Battistelli and his cronies may be about to end; the Luxembourg parliament approves the Unified Patent Court



  13. Benoît Battistelli's EPO is Under Attack From French Politicians Yet Again

    More EPO interventions -- this time from France -- target Benoît Battistelli over his abuses and take it up to Eurocrats for political actions



  14. Bribes and Extortion Help Turn Android (Linux-powered) Into 'Microsoft Android'

    A strategy involving harassment and bribes drives large Android players into Microsoft's arms (PRISM and lock-in), much to Google's (and users') detriment and beyond regulators' range of visibility



  15. Microsoft-connected Black Duck Software Created by Microsoft Marketing Man as an Anti-GPL Operation, Admits the Management

    Black Duck "was founded [on] the idea ... to keep GPL-licensed code out of corporate codebases entirely," according to a new report



  16. Links 23/3/2015: Linux 4.0 RC5, Kubuntu Celebrates Ten Years

    Links for the day



  17. Microsoft Admits Lying (or Deceiving) About the Cost of Vista 10

    After much hype in the press about Windows being 'free' it turns out that Microsoft just lied yet again, leaving that lingering perception that Windows is as inexpensive as GNU/Linux



  18. Politics of Blackmail at the EPO

    Comments serve to highlight the role of bribes (or contrariwise blackmail), as allegedly exercised by the current management of the European Patent Office



  19. Benoît Battistelli's EPO Comes Under Attack From the British

    A British MEP criticises Battistelli and the management of the European Patent Office (EPO) while Baroness Lucy Neville-Rolfe, UK Minister for Intellectual Property, gets closer to Battistelli in a tactless effort to improve relations



  20. The Royal Norwegian Department of Labour on the Right of European Patent Office (EPO) Workers to Strike

    The role of bureaucrats from Norway in defending (or not) the rights of EPO workers -- rights that the EPO's management is actively trying to deny and punish for



  21. Michael Silver Back to Acting as Gartner's Microsoft Agent, Promoting Vista 10 Based on False Promises

    Vista 10 in the headlines as its marketing propaganda zones in on false perceptions around cost, aided in part by longtime foes of GNU/Linux such as Gartner, especially its Microsoft-embedded elements (Michael Silver and co-workers)



  22. Despite Media Propaganda About Security, Microsoft Windows Remains the Least Secure Operating System, by Design

    Amid highly misleading security-centric reports that rely on Microsoft's bogus number of vulnerabilities (Microsoft already admitted hiding many of them) Techrights presents recent news about Windows 'security'



  23. Canonical Goes to Bed With Company That Sues Linux Using Software Patents and Copyrights (Through SCO)

    Despite Microsoft's continued assault on GNU/Linux, Canonical is foolish enough to give Microsoft control over many Ubuntu instances



  24. Links 22/3/2015: GNOME 3.16 Shaping Up, LibrePlanet 2015

    Links for the day



  25. Microsoft Hates Linux - Part VI - Propaganda Wars Against Free Software Facilitated While Media Control is Secured and Abused

    How Microsoft systematically lies to the public, including decision-makers and officials who can be tricked into choosing proprietary software, thinking it is in fact "open"



  26. Microsoft Hates Linux - Part V - Dumping and Surveillance to Counter GNU/Linux Insurgence

    Microsoft makes false claims about future versions of Windows (with more surveillance) becoming 'free' in order to stop migrations to GNU/Linux



  27. Microsoft Hates Linux - Part IV - Deleting, Attacking Android/Linux From Within

    Microsoft 'loves' Linux so much that it is trying to get on top of Linux and then delete Linux



  28. Microsoft Hates Linux - Part III - Abducting the Competition (Android)

    How Microsoft tried to destroy Android using a coup d'état approach, just shortly before getting caught, then retreating and rewriting the public record



  29. Microsoft Hates Linux - Part II - Patent Lawsuits Against Android/Linux Still Going On, New Ones Filed

    Microsoft and Intellectual Ventures are suing Android companies using software patents while some Android vendors settle by becoming slaves of Microsoft



  30. Microsoft Hates Linux - Part I - The UEFI Attack on GNU/Linux

    Microsoft's highly abusive tactics against GNU/Linux live on in UEFI form, dispelling any myths that someone may still cling onto regarding a 'reformed' Microsoft


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts