EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.15.13

TechBytes Episode 82: Richard Stallman on Data Protection, Collective Responsibility as Tyrannical Tool, and Encryption of Data

Posted in TechBytes at 2:45 am by Dr. Roy Schestowitz

Techbytes 2013

Direct download as Ogg (00:09:58, 7.4 MB)

Summary: Stallman speaks about security, privacy, networks, and the NSA

TODAY’S part (fifth in this series of interviews) deals with several different topics that Stallman rarely speaks about publicly. The full transcript follows.


Dr. Roy S. Schestowitz: The next bunch of things I’d like to speak about is the data, showing whole data security, I mean, security from the point of view of the user, not security from the point of view of, you know, “national security”, which could mean just about anything.

Richard StallmanDr. Richard M. Stallman: I understand.

RSS: The repositioning of the datacentres and the location of datacentres that companies are selecting — what role do you think that plays in privacy?

RMS: Well, if you’re going to deal with a company and it’s going to get some personal information about you and that company’s servers are hosted by a US company — whether in the US or not — then that means that the US government can get all your information.

If a country wants to provide data protection to its citizens, part of their data protection must include not permitting that data to be searched in any way as part of the company’s operations, to have [...] fully reliable and cooperating data protection. So for instance, a European company should not be allowed to host its data on an Amazon server.

“…the encryption of a network hub is not something that you can depend on for your own privacy because, you know, if other people are getting on the network hub, they can listen to your packets too, so if you want to maintain your privacy, you do that with something else like communicating with SSH.”
      –Richard Stallman
RSS: There was one case way back in 2008 or so, several of us European people and people in the FFII were trying to encourage the European Commission not to put Google Analytics in its Web site. That was a public service Web site which was providing, using JavaScript, a helluva lot of details about the European citizens accessing the site to a US company. I don’t think that’s being addressed sufficiently, even now a lot of the servers…

RMS: Well, you’re certainly right and I would suggest that if a Web page is set up so that it will provide information [to] these companies, that should be treated as legally equivalent to the case where the operator of that Web page explicitly sent the same data to [these companies] and of course in Europe that would bring the European data protection rules into play and that would say, “no, you can’t send this data to Google Analytics or to some advertising network or anyone.”

RSS: I want to also ask you about encryption. I’m not sure to what degree you’re into, into all these — I suppose this is an area that enthusiasts in the field of security are very much into — but several of us people are trying to find reliable encryption, ubiquitous encryption method…

RMS: Well, I can help you find that. I know how to use the GNU Privacy Guard. However, in order to use that you’ve got to have somebody’s public key. So that’s why I was wondering if when I go to the UK we might meet and then can I could get your public key.

RSS: We’ll probably come to it later, but in the UK we have this big scandal right now about spying on diplomats in the G8 summit and that’s probably something that Russia — I read about it today — Russia is apparently going to take some legal action over it as well as the NSA leaks. There was spying on people using, basically honeypots as access points, as a way in which it would connect to a wireless access point and of course even if people are using E-mail with SSL/TLS, I’m not sure to what degree this is safe. We know WPA — WPA2 even — is crackble. And…

RMS: Well, okay, the point is, the encryption of a network hub is not something that you can depend on for your own privacy because, you know, if other people are getting on the network hub, they can listen to your packets too, so if you want to maintain your privacy, you do that with something else like communicating with SSH.

Now, the relevance of encryption on the network hub — that’s not just a way of controlling who can use it. It’s very important for people to maintain Wi-Fi networks without any kind of password, because if you don’t, then you’re becoming an enforcer in the war on sharing. One way to resist the application of unjust laws such as the Digital Economy Act is by not having a key on your Wi-Fi network.

RSS: That increases the pressure through liability claims, so…

“Collective responsibility is the policy that says, if you don’t help keep everyone else subjected, we’ll punish you.”
      –Richard Stallman
RMS: Of course, collective responsibility is the tool of tyrants. Collective responsibility is the policy that says, if you don’t help keep everyone else subjected, we’ll punish you. Right now the UK government is using the system of collective responsibility to divide people and turn everybody into an enforcer against everybody else, and that’s why it’s people’s duty to refuse to do it.

RSS: And I suppose the same…

RMS: …Wi-Fi that works without passwords, so that they refuse to enforce the system of unjust control on everyone else.

RSS: I totally agree with you and the same was said about the solidarity when it comes to encrypting E-mail. We should make it a standard thing to encrypt our E-mails although, to tell you the truth, I mean, all the encryption methods are based upon industry standards that are accepted at the other end of the line, so when you send somebody an E-mail you have to make sure they have the same decryption methods upon which…

RMS: Right. That’s why it’s difficult, in practice, to encrypt all our E-mails. We can encrypt E-mail with people that we know and have arranged to exchange keys with. But the other thing to point out is that encrypting E-mail doesn’t disguise any of the metadata, so the NSA can still track who sends E_mail to whom, even if the contents are encrypted.

RSS: And I suppose with all the mathematicians at the NSA — they seem to be hiring quite a few very skilled people who can do analysis on the encryption methods and…

RMS: They’ve been doing that since 19…

RSS: Fifty?

RMS: 1949 or so.

RSS: I think the NSA was only founded in 19…

RMS: Well, it wasn’t then called the NSA, but it doesn’t matter. You know, details like where it’s put don’t matter.


Later today I’ll be meeting Stallman in Oxford to get some video interviews done with him. This time the audio quality will be vastly better.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: gnu fsf richardstallman

Download:

Ogg Theora

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Süddeutsche Zeitung Says Talking Helps While EPO Management Back-stabs Other Side of the Table

    German media gives the impression that there is peace and harmony now that Benoît Battistelli and his circle of power speaks to staff, but nothing is said about simultaneous (albeit covert) attacks against that staff



  2. Large Corporations Call the Shots in US Patent Reform

    A reminder of where we stand on the issue of patent 'reform' in the US and who is controlling or shaping it



  3. Microsoft Puts Proprietary Windows and Hyper-V Inside the Free Software-Centric OpenStack

    OpenStack, which celebrates rapid growth in this month's event in Canada, is facing a proprietarisation threat from Microsoft



  4. Microsoft's Secret Lobbying, Bullying, and the Long History of Blackmailing Politicians Around the World

    British media covers Microsoft's abuse in the UK, but there are many similar incidents, and not just in the UK



  5. Frankfurter Allgemeine Zeitung on Benoît Battistelli and Four EPO Suicides

    German press article from April 2015 (with translations)



  6. Links 24/5/2015: CrossOver 14.1.3, NTFS-3G Vulnerability

    Links for the day



  7. Links 23/5/2015: Fedora 22 to May 26th, Netflix in SteamOS

    Links for the day



  8. The Patents Production 'Industry' (Patent Lawyers) Still Fights Hard to Salvage Software Patents

    A review of recent writings about software patents and patents on business methods in the United States, demonstrating that patent lawyers have gotten very vocal and sneaky (trying to evade the rules)



  9. Patents as a Marketing Strategy: USPTO Now Part of the Advertising Industry

    The existence of publicity patents, or patents whose sole purpose is to advertise some products, serves to discredit the US patent office, which was originally set up to promote science and technology



  10. Microsoft Blackmails and Extorts British Politicians Over Open Standards and Free Software-Leaning Policies

    Microsoft's digital imperialism in the UK getting defended using blackmail, reminding a lot of Brits that Microsoft is just as evil as ever before



  11. Microsoft Gives Another Bug a Name, This Time Logjam™

    The Microsoft crowd is good only at marketing, even when it comes to small bugs in software



  12. Links 22/5/2015: Fedora 22 Final Release is Near, Canonical IPO Considered

    Links for the day



  13. More Utter Shame Unveiled at Battistelli's EPO: Intimidation Tactics With Help From 'Control Risks'

    The unaccountable thugs who run the EPO have hired London-based spooks to help silence their opposition and their critics



  14. GNU/Linux Still Under Attack From Apple and Microsoft, Patents Remain the Weapon of Choice

    A timely reminder of the importance of patent matters, for they are being used to eliminate the zero-cost advantage of Free/libre software and make it more proprietary, privacy-infringing, and user-hostile (as a result of blackmail)



  15. Gartner Group and NASSCOM: Will Lie for FUD, on Behalf of Microsoft and Proprietary Software

    Some of the latest arguments against Free/libre software turn out to be arriving from couriers of Microsoft and its agenda



  16. Windows is a Franchise in Demise, Don't Believe the Hype

    Ongoing propaganda about Vista 10, 'cloud', and other buzzwords or brands are put in perspective



  17. Links 21/5/2015: Fedora 22 RC2, CERN Chooses OpenStack

    Links for the day



  18. Microsoft is Again Showing Its Hatred of Free/Open Source Software by Lobbying the Indian Government to Drop a Rational National Policy

    Microsoft decides to attack Free/Open Source software (FOSS) in India, where the corporate media is very much complicit in misleading the public



  19. Links 20/5/2015: Containers, OpenStack, and EXT4 Corruption

    Links for the day



  20. The PATENT Act, Distraction of Trolls, and Lobbying for Software Patents by Protectionists

    Only large corporations and their lawyers are able to formally change the US patent system through public officials and politicians, despite recent rulings from very high courts



  21. Corporate Media and Friends of Microsoft Are Still Lying About the Cost of Vista 10

    In a desperate effort to beat operating systems that are Free (libre) and free (gratis), such as GNU/Linux or Android, Microsoft shores up the illusion of 'free' (gratis) Windows



  22. Links 19/5/2015: Linux 4.1 RC4, Thunderbird 31.7.0, OpenStack Event

    Links for the day



  23. Links 18/5/2015: Russia Chooses Jolla, Many New Distro Releases, Meizu Devices

    Links for the day



  24. Even Converting an Image to Greyscale is Now a Patent

    Simple mathematics becoming patented as Fujifilm claims 'ownership' of photographic conversion to greyscale



  25. Grooming of the World's Biggest Patent Troll, Nathan Myhrvold of Microsoft and Intellectual Ventures

    UCLA and Microsoft-linked media are framing big thugs as heroes, doing a great disservice to both academia and journalism



  26. The EPO's Fight to Bring Software Patents Into Europe is One Step Closer to a 'Victory' (for Multinationals)

    Opposition to the Unified Patent Court (UPC) is being crushed and Italy is one of the latest actors to have fallen in the battle



  27. Microsoft's 'Former' Staff Continues With His Anti-Google Rhetoric at CBS

    A Microsoft intern, who has moved on to journalism, is still showing his affinity for Microsoft with apologetics and spin



  28. More of Microsoft's False Claims About Cost of Vista 10 and More Layoffs

    Vista 10 is still being marketed using lies and Microsoft may be going down the same route as Nokia



  29. Microsoft Remotely Bricks -- Intentionally -- Xbox One

    Microsoft is showing off its kill switches, kills consoles of people whom it doesn't like



  30. IRC Proceedings: May 3rd - May 16th, 2015

    Many IRC logs


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts