EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.15.13

TechBytes Episode 82: Richard Stallman on Data Protection, Collective Responsibility as Tyrannical Tool, and Encryption of Data

Posted in TechBytes at 2:45 am by Dr. Roy Schestowitz

Techbytes 2013

Direct download as Ogg (00:09:58, 7.4 MB)

Summary: Stallman speaks about security, privacy, networks, and the NSA

TODAY’S part (fifth in this series of interviews) deals with several different topics that Stallman rarely speaks about publicly. The full transcript follows.


Dr. Roy S. Schestowitz: The next bunch of things I’d like to speak about is the data, showing whole data security, I mean, security from the point of view of the user, not security from the point of view of, you know, “national security”, which could mean just about anything.

Richard StallmanDr. Richard M. Stallman: I understand.

RSS: The repositioning of the datacentres and the location of datacentres that companies are selecting — what role do you think that plays in privacy?

RMS: Well, if you’re going to deal with a company and it’s going to get some personal information about you and that company’s servers are hosted by a US company — whether in the US or not — then that means that the US government can get all your information.

If a country wants to provide data protection to its citizens, part of their data protection must include not permitting that data to be searched in any way as part of the company’s operations, to have [...] fully reliable and cooperating data protection. So for instance, a European company should not be allowed to host its data on an Amazon server.

“…the encryption of a network hub is not something that you can depend on for your own privacy because, you know, if other people are getting on the network hub, they can listen to your packets too, so if you want to maintain your privacy, you do that with something else like communicating with SSH.”
      –Richard Stallman
RSS: There was one case way back in 2008 or so, several of us European people and people in the FFII were trying to encourage the European Commission not to put Google Analytics in its Web site. That was a public service Web site which was providing, using JavaScript, a helluva lot of details about the European citizens accessing the site to a US company. I don’t think that’s being addressed sufficiently, even now a lot of the servers…

RMS: Well, you’re certainly right and I would suggest that if a Web page is set up so that it will provide information [to] these companies, that should be treated as legally equivalent to the case where the operator of that Web page explicitly sent the same data to [these companies] and of course in Europe that would bring the European data protection rules into play and that would say, “no, you can’t send this data to Google Analytics or to some advertising network or anyone.”

RSS: I want to also ask you about encryption. I’m not sure to what degree you’re into, into all these — I suppose this is an area that enthusiasts in the field of security are very much into — but several of us people are trying to find reliable encryption, ubiquitous encryption method…

RMS: Well, I can help you find that. I know how to use the GNU Privacy Guard. However, in order to use that you’ve got to have somebody’s public key. So that’s why I was wondering if when I go to the UK we might meet and then can I could get your public key.

RSS: We’ll probably come to it later, but in the UK we have this big scandal right now about spying on diplomats in the G8 summit and that’s probably something that Russia — I read about it today — Russia is apparently going to take some legal action over it as well as the NSA leaks. There was spying on people using, basically honeypots as access points, as a way in which it would connect to a wireless access point and of course even if people are using E-mail with SSL/TLS, I’m not sure to what degree this is safe. We know WPA — WPA2 even — is crackble. And…

RMS: Well, okay, the point is, the encryption of a network hub is not something that you can depend on for your own privacy because, you know, if other people are getting on the network hub, they can listen to your packets too, so if you want to maintain your privacy, you do that with something else like communicating with SSH.

Now, the relevance of encryption on the network hub — that’s not just a way of controlling who can use it. It’s very important for people to maintain Wi-Fi networks without any kind of password, because if you don’t, then you’re becoming an enforcer in the war on sharing. One way to resist the application of unjust laws such as the Digital Economy Act is by not having a key on your Wi-Fi network.

RSS: That increases the pressure through liability claims, so…

“Collective responsibility is the policy that says, if you don’t help keep everyone else subjected, we’ll punish you.”
      –Richard Stallman
RMS: Of course, collective responsibility is the tool of tyrants. Collective responsibility is the policy that says, if you don’t help keep everyone else subjected, we’ll punish you. Right now the UK government is using the system of collective responsibility to divide people and turn everybody into an enforcer against everybody else, and that’s why it’s people’s duty to refuse to do it.

RSS: And I suppose the same…

RMS: …Wi-Fi that works without passwords, so that they refuse to enforce the system of unjust control on everyone else.

RSS: I totally agree with you and the same was said about the solidarity when it comes to encrypting E-mail. We should make it a standard thing to encrypt our E-mails although, to tell you the truth, I mean, all the encryption methods are based upon industry standards that are accepted at the other end of the line, so when you send somebody an E-mail you have to make sure they have the same decryption methods upon which…

RMS: Right. That’s why it’s difficult, in practice, to encrypt all our E-mails. We can encrypt E-mail with people that we know and have arranged to exchange keys with. But the other thing to point out is that encrypting E-mail doesn’t disguise any of the metadata, so the NSA can still track who sends E_mail to whom, even if the contents are encrypted.

RSS: And I suppose with all the mathematicians at the NSA — they seem to be hiring quite a few very skilled people who can do analysis on the encryption methods and…

RMS: They’ve been doing that since 19…

RSS: Fifty?

RMS: 1949 or so.

RSS: I think the NSA was only founded in 19…

RMS: Well, it wasn’t then called the NSA, but it doesn’t matter. You know, details like where it’s put don’t matter.


Later today I’ll be meeting Stallman in Oxford to get some video interviews done with him. This time the audio quality will be vastly better.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: gnu fsf richardstallman

Download:

Ogg Theora

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 1/9/2014: Poettering on systemd, ITNews on DBMSs

    Links for the day



  2. Moving Away From Windows to GNU/Linux and the Abandonment of Windows as the Modest Proposal These Days

    Morale of GNU/Linux and an embrace of GNU/Linux is very high, despite recent propaganda from Microsoft MVPs and boosters (primarily security-themed and Munich-themed FUD)



  3. Korean Press Slams Microsoft Over Patent Extortion Against Linux/Android as New Abuses Resurface

    Harsh words from the national press of South Korea as Nokia's role in Microsoft's anti-Linux tactics becomes more apparent



  4. More Good News About Patents and Their Demise in the United States

    A roundup of news about software patents and patent trolls in the land where these thrive



  5. Links 31/8/2014: Linux 3.12.27, Akademy 2014

    Links for the day



  6. Links 30/8/2014: Jailhouse 0.1, *buntu 14.10 Beta

    Links for the day



  7. Links 28/8/2014: Many New Games, CTO of Red Hat Steps Down

    Links for the day



  8. We Are Gradually Winning the Battle Against Software Patents

    The once-elusive war on software patents is finally leading to some breakthrough and even the Federal Circuit reinforces the trend of software patents' demise



  9. Free/Open Source Software (FOSS) Companies Versus FOSS Moles (VMware, Sonatype, Xamarin)

    A look at three entities which pretend to be pro-FOSS but are actually FOSS-hostile and very much determined to replace FOSS with proprietary software



  10. Links 27/8/2014: GNU/Linux in Space, China, LinuxCon

    Links for the day



  11. FUD Against Google and FOSS Security Amid Microsoft Windows Security Blunders

    In the age of widespread fraud due to Microsoft Windows with its back doors there is an attempt to shift focus to already-fixed flaws/deficiencies in competitors of Microsoft



  12. Microsoft Spin Watch: IDG Turns to More Microsoft Propaganda, Hires Microsoft Boosters

    Media in Microsoft's pocket is telling Microsoft's lies and deceives the public for Microsoft's bottom line



  13. Microsoft's Massive Tax Evasion Becomes Better Known

    A new report about Microsoft's admission that it plays dirty tricks with tax (sometimes using moles in government) is increasing awareness of Microsoft's criminal aspects



  14. Links 25/8/2014: China's Linux Revolution Imminent

    Links for the day



  15. Links 24/8/2014: GNU/Linux Specialisation and Benchmarks

    Links for the day



  16. Links 23/8/2014: GNU/Linux Growth

    Links for the day



  17. Microsoft-Funded Attacks on Android Security and Patent/Copyright

    A look back at examples of people who smear Android and are receiving (or received) money from Microsoft



  18. Blowback in Chile and Munich After Microsoft Intervention

    Microsoft's attacks on the digital sovereignty of countries involves lobbying, corruption, an attack on standards (e.g. ODF), an attack on FOSS policies, and even an attack on accurate reporting (truth itself)



  19. The End of Microsoft is Nigh

    A look back at a tough year for Microsoft and a not-so-promising future



  20. Links 22/8/2014: Linux Foundation LFCS, LFCE

    Links for the day



  21. UPS Burned by Microsoft Windows, Gives Away Massive Number of Credit Card Details

    UPS is the latest victim of Microsoft's shoddy back door with software on top of it (Windows); attempts to blame FOSS for data compromise actually divert attention from the real culprit, which is proprietary software



  22. Microsoft's Funding of ALEC and Other Systemic Corruption

    Microsoft role in writing of laws by proxy, via groups such as ALEC



  23. Microsoft is Still Preying on British Taxpayers, Playing Politics

    Some news from the UK showing how Microsoft uses politics to extract money out of taxpayers, irrespective of their preferences



  24. Microsoft's Patent Troll Intellectual Ventures is Collapsing as 20% of Staff Laid Off

    More good news regarding the demise of patents as Microsoft's leading patent proxy is collapsing more rapidly than anyone ever imagined and software patents too are collectively doubted



  25. Links 21/8/2014: Conferences of Linux Foundation, Elephone Emerges

    Links for the day



  26. Links 20/8/2014: Linux Event, GNOME Milestone

    Links for the day



  27. Corruption Watch: Microsoft Lobbying Designed to Kill Chile's Free Software Policy and Promote Microsoft With Subsidies, More Dirty Tricks Emerge in Munich

    icrosoft is systematically attacking migrations to GNU, Linux and Free software, using dirty tricks, as always



  28. Vista 8 Such a Disaster That Even Microsoft Cannot Cope With It, Vapourware Tactics Start Early

    Microsoft's Windows-powered services are failing and Windows gets bricked by Microsoft patches, whereupon we are seeing yet more of Microsoft's vapourware tactics (focusing in imaginary, non-existent versions of Windows)



  29. On BlackBerry and Other Patent Trolls

    A roundup regarding patent trolls, starting with the bigger and latest joiner, BlackBerry's new patents apparatus



  30. Links 19/8/2014: Humble Jumbo Bundle 2 Betrayal, Mercedes-Benz Runs GNU/Linux

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts