1210 lines
22 KiB
WebVTT
1210 lines
22 KiB
WebVTT
WEBVTT
|
|
|
|
1
|
|
00:00:11.100 --> 00:00:15.360
|
|
free software is the first battle in the
|
|
|
|
2
|
|
00:00:15.360 --> 00:00:17.360
|
|
liberation of cyberspace
|
|
|
|
3
|
|
00:00:17.360 --> 00:00:20.080
|
|
who controls your computer
|
|
|
|
4
|
|
00:00:20.080 --> 00:00:22.440
|
|
is it you or is it some
|
|
|
|
5
|
|
00:00:22.440 --> 00:00:25.600
|
|
big company that's really controlling it
|
|
|
|
6
|
|
00:00:25.830 --> 00:00:28.610
|
|
well what is a computer a computer is a
|
|
|
|
7
|
|
00:00:28.610 --> 00:00:32.660
|
|
universal machine it will do any
|
|
|
|
8
|
|
00:00:32.660 --> 00:00:35.640
|
|
computation you wanted to because you
|
|
|
|
9
|
|
00:00:35.640 --> 00:00:37.770
|
|
give it a program that says what the
|
|
|
|
10
|
|
00:00:37.770 --> 00:00:40.460
|
|
computation is that you want so the
|
|
|
|
11
|
|
00:00:40.460 --> 00:00:42.510
|
|
computer only knows how to get out and
|
|
|
|
12
|
|
00:00:42.510 --> 00:00:44.430
|
|
instruction and do it and get add
|
|
|
|
13
|
|
00:00:44.430 --> 00:00:46.320
|
|
another instruction and do it
|
|
|
|
14
|
|
00:00:46.320 --> 00:00:48.890
|
|
the program has the instructions it says
|
|
|
|
15
|
|
00:00:48.890 --> 00:00:52.280
|
|
what to do and so you by writing the
|
|
|
|
16
|
|
00:00:52.280 --> 00:00:53.870
|
|
right program you can make it do
|
|
|
|
17
|
|
00:00:53.870 --> 00:00:56.760
|
|
anything well almost anything
|
|
|
|
18
|
|
00:00:56.760 --> 00:00:59.480
|
|
um so who gives the instructions to your
|
|
|
|
19
|
|
00:00:59.480 --> 00:01:01.890
|
|
computer you might think it's obeying
|
|
|
|
20
|
|
00:01:01.890 --> 00:01:05.480
|
|
your instructions when really it's
|
|
|
|
21
|
|
00:01:05.480 --> 00:01:08.760
|
|
obeying somebody else first and you only
|
|
|
|
22
|
|
00:01:08.760 --> 00:01:11.100
|
|
as much as that company wants it too
|
|
|
|
23
|
|
00:01:11.100 --> 00:01:14.640
|
|
will let it listen to you with software
|
|
|
|
24
|
|
00:01:14.640 --> 00:01:16.380
|
|
there are two possibilities either the
|
|
|
|
25
|
|
00:01:16.380 --> 00:01:19.470
|
|
users control the program or the program
|
|
|
|
26
|
|
00:01:19.470 --> 00:01:22.740
|
|
controls the users it's inevitably one
|
|
|
|
27
|
|
00:01:22.740 --> 00:01:23.850
|
|
or the other
|
|
|
|
28
|
|
00:01:23.850 --> 00:01:26.580
|
|
so in order for the users to control the
|
|
|
|
29
|
|
00:01:26.580 --> 00:01:28.790
|
|
program they need the four essential
|
|
|
|
30
|
|
00:01:28.790 --> 00:01:32.670
|
|
freedoms and that's the definition of
|
|
|
|
31
|
|
00:01:32.670 --> 00:01:36.900
|
|
free software free software respects the
|
|
|
|
32
|
|
00:01:36.900 --> 00:01:39.000
|
|
users freedom and community now we often
|
|
|
|
33
|
|
00:01:39.000 --> 00:01:41.460
|
|
call it libra using the french or
|
|
|
|
34
|
|
00:01:41.460 --> 00:01:43.400
|
|
spanish word pronounce it as you like
|
|
|
|
35
|
|
00:01:43.400 --> 00:01:45.810
|
|
the point is that's what we mean we
|
|
|
|
36
|
|
00:01:45.810 --> 00:01:47.790
|
|
don't mean it's gratis we're not talking
|
|
|
|
37
|
|
00:01:47.790 --> 00:01:49.970
|
|
about price we're concerned with your
|
|
|
|
38
|
|
00:01:49.970 --> 00:01:53.430
|
|
freedom and we sometimes say free /
|
|
|
|
39
|
|
00:01:53.430 --> 00:01:56.720
|
|
libre to show that so freedom zeros the
|
|
|
|
40
|
|
00:01:56.720 --> 00:01:59.150
|
|
freedom to run the program as you wish
|
|
|
|
41
|
|
00:01:59.150 --> 00:02:02.490
|
|
for whatever purpose freedom one is the
|
|
|
|
42
|
|
00:02:02.490 --> 00:02:04.500
|
|
freedom to study the source code of the
|
|
|
|
43
|
|
00:02:04.500 --> 00:02:07.740
|
|
program and change it so it does the
|
|
|
|
44
|
|
00:02:07.740 --> 00:02:10.640
|
|
computing you wanted to do but what is
|
|
|
|
45
|
|
00:02:10.640 --> 00:02:12.450
|
|
the source code well every program
|
|
|
|
46
|
|
00:02:12.450 --> 00:02:13.550
|
|
typically will have to
|
|
|
|
47
|
|
00:02:13.550 --> 00:02:16.730
|
|
forms there's the form that you can read
|
|
|
|
48
|
|
00:02:16.730 --> 00:02:19.100
|
|
and you can understand if you know the
|
|
|
|
49
|
|
00:02:19.100 --> 00:02:21.290
|
|
programming language that's the source
|
|
|
|
50
|
|
00:02:21.290 --> 00:02:24.500
|
|
that's what programmers write and change
|
|
|
|
51
|
|
00:02:24.500 --> 00:02:25.940
|
|
then there's the executable which is a
|
|
|
|
52
|
|
00:02:25.940 --> 00:02:28.250
|
|
bunch of numbers which even a programmer
|
|
|
|
53
|
|
00:02:28.250 --> 00:02:30.410
|
|
can figure out if all you get is the
|
|
|
|
54
|
|
00:02:30.410 --> 00:02:32.810
|
|
executable it's a horrible pain in the
|
|
|
|
55
|
|
00:02:32.810 --> 00:02:35.330
|
|
neck to figure out what it does and even
|
|
|
|
56
|
|
00:02:35.330 --> 00:02:38.270
|
|
harder to change it so to give you the
|
|
|
|
57
|
|
00:02:38.270 --> 00:02:41.600
|
|
real possibility to study and change it
|
|
|
|
58
|
|
00:02:41.600 --> 00:02:42.880
|
|
they've got to give you the source code
|
|
|
|
59
|
|
00:02:42.880 --> 00:02:46.190
|
|
that's a requirement well with those two
|
|
|
|
60
|
|
00:02:46.190 --> 00:02:49.820
|
|
freedoms each user separately can make a
|
|
|
|
61
|
|
00:02:49.820 --> 00:02:52.100
|
|
copy and start changing it and make it
|
|
|
|
62
|
|
00:02:52.100 --> 00:02:53.750
|
|
do what she wants
|
|
|
|
63
|
|
00:02:53.750 --> 00:02:57.650
|
|
that's individual control but what if
|
|
|
|
64
|
|
00:02:57.650 --> 00:02:59.390
|
|
you're not a programmer you look at the
|
|
|
|
65
|
|
00:02:59.390 --> 00:03:01.640
|
|
source code and you don't understand it
|
|
|
|
66
|
|
00:03:01.640 --> 00:03:04.820
|
|
individual control isn't enough
|
|
|
|
67
|
|
00:03:04.820 --> 00:03:07.700
|
|
we also need collective control which
|
|
|
|
68
|
|
00:03:07.700 --> 00:03:09.260
|
|
means any group of users are free to
|
|
|
|
69
|
|
00:03:09.260 --> 00:03:11.780
|
|
work together to adapt the program to
|
|
|
|
70
|
|
00:03:11.780 --> 00:03:14.210
|
|
what they want of course in the group
|
|
|
|
71
|
|
00:03:14.210 --> 00:03:16.430
|
|
some of them are programmers they're the
|
|
|
|
72
|
|
00:03:16.430 --> 00:03:18.830
|
|
ones who actually write the changes but
|
|
|
|
73
|
|
00:03:18.830 --> 00:03:20.450
|
|
they're doing it as part of the group
|
|
|
|
74
|
|
00:03:20.450 --> 00:03:23.200
|
|
for what the group wants course the
|
|
|
|
75
|
|
00:03:23.200 --> 00:03:25.340
|
|
group doesn't have to be everybody so
|
|
|
|
76
|
|
00:03:25.340 --> 00:03:27.770
|
|
others can use it some other way they're
|
|
|
|
77
|
|
00:03:27.770 --> 00:03:30.620
|
|
all free to do that so collective
|
|
|
|
78
|
|
00:03:30.620 --> 00:03:32.630
|
|
control requires two more essential
|
|
|
|
79
|
|
00:03:32.630 --> 00:03:34.970
|
|
freedoms freedom to is the freedom to
|
|
|
|
80
|
|
00:03:34.970 --> 00:03:37.450
|
|
redistribute exact copies to make the
|
|
|
|
81
|
|
00:03:37.450 --> 00:03:39.290
|
|
copies and then give them away or sell
|
|
|
|
82
|
|
00:03:39.290 --> 00:03:42.500
|
|
them when you wish and freedom three is
|
|
|
|
83
|
|
00:03:42.500 --> 00:03:44.420
|
|
similar but it's for your modified
|
|
|
|
84
|
|
00:03:44.420 --> 00:03:46.550
|
|
versions you're free to make copies and
|
|
|
|
85
|
|
00:03:46.550 --> 00:03:48.320
|
|
then give them or sell them when you
|
|
|
|
86
|
|
00:03:48.320 --> 00:03:49.100
|
|
wish
|
|
|
|
87
|
|
00:03:49.100 --> 00:03:51.500
|
|
so we do have these freedoms that it's
|
|
|
|
88
|
|
00:03:51.500 --> 00:03:53.200
|
|
free software the users control the
|
|
|
|
89
|
|
00:03:53.200 --> 00:03:55.700
|
|
program but if any of those freedoms is
|
|
|
|
90
|
|
00:03:55.700 --> 00:03:58.940
|
|
missing then the users don't control the
|
|
|
|
91
|
|
00:03:58.940 --> 00:04:01.400
|
|
program instead the program controls the
|
|
|
|
92
|
|
00:04:01.400 --> 00:04:04.400
|
|
users and the developer controls the
|
|
|
|
93
|
|
00:04:04.400 --> 00:04:07.790
|
|
program so that means this program is an
|
|
|
|
94
|
|
00:04:07.790 --> 00:04:11.120
|
|
instrument of unjust power for its
|
|
|
|
95
|
|
00:04:11.120 --> 00:04:15.800
|
|
developer / the users that means the
|
|
|
|
96
|
|
00:04:15.800 --> 00:04:18.730
|
|
users don't have freedom that's non-free
|
|
|
|
97
|
|
00:04:18.730 --> 00:04:20.570
|
|
proprietary software which we got to get
|
|
|
|
98
|
|
00:04:20.570 --> 00:04:21.410
|
|
rid of
|
|
|
|
99
|
|
00:04:21.410 --> 00:04:23.720
|
|
well when you've got proprietary
|
|
|
|
100
|
|
00:04:23.720 --> 00:04:26.380
|
|
software what happens sometimes
|
|
|
|
101
|
|
00:04:26.380 --> 00:04:30.100
|
|
program snoops on the user sometimes it
|
|
|
|
102
|
|
00:04:30.100 --> 00:04:34.300
|
|
tracks the user sometimes it restricts
|
|
|
|
103
|
|
00:04:34.300 --> 00:04:37.900
|
|
the user and stop users from doing what
|
|
|
|
104
|
|
00:04:37.900 --> 00:04:39.700
|
|
they want to do you can see that the
|
|
|
|
105
|
|
00:04:39.700 --> 00:04:41.200
|
|
blu-ray is your enemy
|
|
|
|
106
|
|
00:04:41.200 --> 00:04:44.860
|
|
um sometimes the software remotely
|
|
|
|
107
|
|
00:04:44.860 --> 00:04:48.190
|
|
deletes books as Amazon did with 1984
|
|
|
|
108
|
|
00:04:48.190 --> 00:04:54.310
|
|
but sometimes the developer compels
|
|
|
|
109
|
|
00:04:54.310 --> 00:04:58.540
|
|
users to install a harmful upgrade by
|
|
|
|
110
|
|
00:04:58.540 --> 00:05:00.190
|
|
threatening to take away other
|
|
|
|
111
|
|
00:05:00.190 --> 00:05:03.460
|
|
functionality if it's not installed as
|
|
|
|
112
|
|
00:05:03.460 --> 00:05:05.860
|
|
Sony did and sometimes they can even
|
|
|
|
113
|
|
00:05:05.860 --> 00:05:08.560
|
|
forcibly change the software at a
|
|
|
|
114
|
|
00:05:08.560 --> 00:05:11.380
|
|
distance as Microsoft can with windows
|
|
|
|
115
|
|
00:05:11.380 --> 00:05:13.750
|
|
through the universal back door
|
|
|
|
116
|
|
00:05:13.750 --> 00:05:17.350
|
|
I'm so sometimes they even sabotage
|
|
|
|
117
|
|
00:05:17.350 --> 00:05:19.930
|
|
users as Microsoft does when it tells
|
|
|
|
118
|
|
00:05:19.930 --> 00:05:23.860
|
|
the NSA about bugs in windows so it can
|
|
|
|
119
|
|
00:05:23.860 --> 00:05:26.350
|
|
use them to attack people's computers
|
|
|
|
120
|
|
00:05:26.350 --> 00:05:28.930
|
|
well what you get is basically with
|
|
|
|
121
|
|
00:05:28.930 --> 00:05:32.110
|
|
proprietary software the owner has power
|
|
|
|
122
|
|
00:05:32.110 --> 00:05:35.500
|
|
over the users and takes advantage of
|
|
|
|
123
|
|
00:05:35.500 --> 00:05:37.450
|
|
this power putting in those various
|
|
|
|
124
|
|
00:05:37.450 --> 00:05:40.600
|
|
malicious functionalities to hurt the
|
|
|
|
125
|
|
00:05:40.600 --> 00:05:43.300
|
|
users of course they don't do this
|
|
|
|
126
|
|
00:05:43.300 --> 00:05:45.460
|
|
because they're Satanist they're doing
|
|
|
|
127
|
|
00:05:45.460 --> 00:05:48.340
|
|
it just for money for greed they have
|
|
|
|
128
|
|
00:05:48.340 --> 00:05:51.160
|
|
various ways that they can profit from
|
|
|
|
129
|
|
00:05:51.160 --> 00:05:54.430
|
|
having this power over users which does
|
|
|
|
130
|
|
00:05:54.430 --> 00:05:56.890
|
|
not make it even the tiniest bit less
|
|
|
|
131
|
|
00:05:56.890 --> 00:05:59.950
|
|
evil but they have no shame about it
|
|
|
|
132
|
|
00:05:59.950 --> 00:06:02.200
|
|
they have conferences where they talk
|
|
|
|
133
|
|
00:06:02.200 --> 00:06:04.540
|
|
about the latest ways they can take
|
|
|
|
134
|
|
00:06:04.540 --> 00:06:06.850
|
|
advantage of users through the power
|
|
|
|
135
|
|
00:06:06.850 --> 00:06:10.210
|
|
they have basically proprietary software
|
|
|
|
136
|
|
00:06:10.210 --> 00:06:14.260
|
|
which in is now from almost all the
|
|
|
|
137
|
|
00:06:14.260 --> 00:06:15.940
|
|
users of proprietary software they're
|
|
|
|
138
|
|
00:06:15.940 --> 00:06:19.210
|
|
using proprietary malware its software
|
|
|
|
139
|
|
00:06:19.210 --> 00:06:20.500
|
|
for suckers
|
|
|
|
140
|
|
00:06:20.500 --> 00:06:23.560
|
|
so how do us how do you stop being the
|
|
|
|
141
|
|
00:06:23.560 --> 00:06:27.100
|
|
victim formerly you have to stop using
|
|
|
|
142
|
|
00:06:27.100 --> 00:06:28.930
|
|
computers but not anymore
|
|
|
|
143
|
|
00:06:28.930 --> 00:06:30.820
|
|
now you can come join us in the free
|
|
|
|
144
|
|
00:06:30.820 --> 00:06:36.460
|
|
world that we've built but in 1983 i can
|
|
|
|
145
|
|
00:06:36.460 --> 00:06:38.620
|
|
announce i would develop a completely
|
|
|
|
146
|
|
00:06:38.620 --> 00:06:39.840
|
|
free software up
|
|
|
|
147
|
|
00:06:39.840 --> 00:06:44.160
|
|
rating system called GNU in 1992 we had
|
|
|
|
148
|
|
00:06:44.160 --> 00:06:46.380
|
|
almost finished but one piece was
|
|
|
|
149
|
|
00:06:46.380 --> 00:06:49.270
|
|
missing the Kernel Linux or vaults in
|
|
|
|
150
|
|
00:06:49.270 --> 00:06:50.370
|
|
that year
|
|
|
|
151
|
|
00:06:50.370 --> 00:06:53.190
|
|
freed his Kernel Linux which filled the
|
|
|
|
152
|
|
00:06:53.190 --> 00:06:56.190
|
|
last gap and gave us the first complete
|
|
|
|
153
|
|
00:06:56.190 --> 00:06:58.470
|
|
system you could run on a pc GNU plus
|
|
|
|
154
|
|
00:06:58.470 --> 00:07:04.290
|
|
Linux so unfortunately having freedom at
|
|
|
|
155
|
|
00:07:04.290 --> 00:07:06.390
|
|
one more point doesn't guarantee you'll
|
|
|
|
156
|
|
00:07:06.390 --> 00:07:08.940
|
|
keep it there are over a thousand
|
|
|
|
157
|
|
00:07:08.940 --> 00:07:11.880
|
|
different variants of GNU/Linux called
|
|
|
|
158
|
|
00:07:11.880 --> 00:07:14.880
|
|
distributions a few of them are entirely
|
|
|
|
159
|
|
00:07:14.880 --> 00:07:17.700
|
|
free software most of them have non-free
|
|
|
|
160
|
|
00:07:17.700 --> 00:07:19.620
|
|
software added because they are
|
|
|
|
161
|
|
00:07:19.620 --> 00:07:21.990
|
|
maintained by people who aren't
|
|
|
|
162
|
|
00:07:21.990 --> 00:07:23.880
|
|
concerned about freedom they rather and
|
|
|
|
163
|
|
00:07:23.880 --> 00:07:25.770
|
|
convenience but at the cost of freedom
|
|
|
|
164
|
|
00:07:25.770 --> 00:07:29.490
|
|
so you have to check which is a free
|
|
|
|
165
|
|
00:07:29.490 --> 00:07:32.550
|
|
distro to keep your freedom sometimes
|
|
|
|
166
|
|
00:07:32.550 --> 00:07:34.470
|
|
requires a sacrifice sometimes a big
|
|
|
|
167
|
|
00:07:34.470 --> 00:07:38.640
|
|
sacrifice as at Lexington sometimes but
|
|
|
|
168
|
|
00:07:38.640 --> 00:07:41.580
|
|
but in our campaign they tend to be
|
|
|
|
169
|
|
00:07:41.580 --> 00:07:45.270
|
|
little sacrifices anybody with a little
|
|
|
|
170
|
|
00:07:45.270 --> 00:07:46.740
|
|
bit of maturity can make these
|
|
|
|
171
|
|
00:07:46.740 --> 00:07:49.590
|
|
sacrifices for instance you want
|
|
|
|
172
|
|
00:07:49.590 --> 00:07:51.660
|
|
applications but some of them are
|
|
|
|
173
|
|
00:07:51.660 --> 00:07:55.360
|
|
non-free if you want freedom you got it do without them
|
|
|
|
174
|
|
00:07:55.360 --> 00:07:57.840
|
|
so there may be some inconvenience is
|
|
|
|
175
|
|
00:07:57.840 --> 00:08:00.120
|
|
you have to suffer for your freedom sake
|
|
|
|
176
|
|
00:08:00.120 --> 00:08:04.830
|
|
then many websites send non-free
|
|
|
|
177
|
|
00:08:04.830 --> 00:08:07.680
|
|
programs written in JavaScript to the
|
|
|
|
178
|
|
00:08:07.680 --> 00:08:09.990
|
|
users browser if you don't want to run
|
|
|
|
179
|
|
00:08:09.990 --> 00:08:11.940
|
|
non-free programs you should install
|
|
|
|
180
|
|
00:08:11.940 --> 00:08:15.490
|
|
libre jas which blocks keeps out
|
|
|
|
181
|
|
00:08:15.490 --> 00:08:18.450
|
|
non-free javascript and sometimes
|
|
|
|
182
|
|
00:08:18.450 --> 00:08:21.780
|
|
servers will offer to do your computing
|
|
|
|
183
|
|
00:08:21.780 --> 00:08:24.510
|
|
they say send us all your data obviously
|
|
|
|
184
|
|
00:08:24.510 --> 00:08:25.800
|
|
for suckers
|
|
|
|
185
|
|
00:08:25.800 --> 00:08:28.240
|
|
then the server does the computing and
|
|
|
|
186
|
|
00:08:28.240 --> 00:08:30.550
|
|
sends you back the results but you're
|
|
|
|
187
|
|
00:08:30.550 --> 00:08:32.130
|
|
not supposed to think about what's
|
|
|
|
188
|
|
00:08:32.130 --> 00:08:34.920
|
|
happening because it's a cloud and you
|
|
|
|
189
|
|
00:08:34.920 --> 00:08:37.380
|
|
don't see what's going on
|
|
|
|
190
|
|
00:08:37.380 --> 00:08:38.860
|
|
well you should look it's
|
|
|
|
191
|
|
00:08:38.860 --> 00:08:41.490
|
|
software-as-a-service as a software
|
|
|
|
192
|
|
00:08:41.490 --> 00:08:44.290
|
|
substitute and it takes away control of
|
|
|
|
193
|
|
00:08:44.290 --> 00:08:48.630
|
|
your computing so a large fraction of
|
|
|
|
194
|
|
00:08:48.630 --> 00:08:51.330
|
|
the world's web servers are running do /
|
|
|
|
195
|
|
00:08:51.330 --> 00:08:53.890
|
|
lanoxin other free software but i think the
|
|
|
|
196
|
|
00:08:53.890 --> 00:08:55.450
|
|
most important computers
|
|
|
|
197
|
|
00:08:55.450 --> 00:08:58.240
|
|
to put freedom in our your computer's
|
|
|
|
198
|
|
00:08:58.240 --> 00:09:01.370
|
|
not company's web servers they deserve
|
|
|
|
199
|
|
00:09:01.370 --> 00:09:04.690
|
|
freedom also but above all its people
|
|
|
|
200
|
|
00:09:04.690 --> 00:09:07.570
|
|
that deserve freedom so we need to
|
|
|
|
201
|
|
00:09:07.570 --> 00:09:11.290
|
|
advance and to do that we have to cross
|
|
|
|
202
|
|
00:09:11.290 --> 00:09:13.930
|
|
obstacles one of them is there are big
|
|
|
|
203
|
|
00:09:13.930 --> 00:09:15.700
|
|
companies that make a lot of money by
|
|
|
|
204
|
|
00:09:15.700 --> 00:09:18.500
|
|
having control over users and they don't
|
|
|
|
205
|
|
00:09:18.500 --> 00:09:20.500
|
|
want to let us advance we have to
|
|
|
|
206
|
|
00:09:20.500 --> 00:09:22.750
|
|
overcome their opposition
|
|
|
|
207
|
|
00:09:22.750 --> 00:09:25.240
|
|
another is that the mainstream media
|
|
|
|
208
|
|
00:09:25.240 --> 00:09:27.820
|
|
don't talk about free software they have
|
|
|
|
209
|
|
00:09:27.820 --> 00:09:30.860
|
|
a term that they use to bury these
|
|
|
|
210
|
|
00:09:30.860 --> 00:09:33.680
|
|
ethical issues they say open source
|
|
|
|
211
|
|
00:09:33.680 --> 00:09:35.930
|
|
instead now
|
|
|
|
212
|
|
00:09:35.930 --> 00:09:37.870
|
|
it talks about more or less the same
|
|
|
|
213
|
|
00:09:37.870 --> 00:09:41.620
|
|
programs but with different ideas where
|
|
|
|
214
|
|
00:09:41.620 --> 00:09:44.590
|
|
free software activists say this is a
|
|
|
|
215
|
|
00:09:44.590 --> 00:09:46.330
|
|
matter of right and wrong users deserve
|
|
|
|
216
|
|
00:09:46.330 --> 00:09:48.760
|
|
freedom we demand freedom the people say
|
|
|
|
217
|
|
00:09:48.760 --> 00:09:50.740
|
|
open source data once say that
|
|
|
|
218
|
|
00:09:50.740 --> 00:09:53.830
|
|
so instead they say let the users change
|
|
|
|
219
|
|
00:09:53.830 --> 00:09:55.970
|
|
the software and redistribute it and
|
|
|
|
220
|
|
00:09:55.970 --> 00:09:58.180
|
|
they'll make the code better they'll fix
|
|
|
|
221
|
|
00:09:58.180 --> 00:09:59.170
|
|
some bugs
|
|
|
|
222
|
|
00:09:59.170 --> 00:10:01.900
|
|
it may be true but it's a less important issue if
|
|
|
|
223
|
|
00:10:01.900 --> 00:10:03.190
|
|
we want to keep our freedom
|
|
|
|
224
|
|
00:10:03.190 --> 00:10:05.260
|
|
we've got to talk about freedom so say
|
|
|
|
225
|
|
00:10:05.260 --> 00:10:07.450
|
|
free software and you're helping us
|
|
|
|
226
|
|
00:10:07.450 --> 00:10:09.880
|
|
every time another obstacle is that lots
|
|
|
|
227
|
|
00:10:09.880 --> 00:10:12.820
|
|
of schools teach non-free software which
|
|
|
|
228
|
|
00:10:12.820 --> 00:10:15.500
|
|
is basically like teaching the kids to
|
|
|
|
229
|
|
00:10:15.500 --> 00:10:17.830
|
|
smoke tobacco it's implanting dependence
|
|
|
|
230
|
|
00:10:17.830 --> 00:10:19.630
|
|
which is the opposite of what school
|
|
|
|
231
|
|
00:10:19.630 --> 00:10:22.690
|
|
should do a school should prepare
|
|
|
|
232
|
|
00:10:22.690 --> 00:10:27.110
|
|
citizens to live in a strong capable
|
|
|
|
233
|
|
00:10:27.110 --> 00:10:30.110
|
|
independent cooperating and free society
|
|
|
|
234
|
|
00:10:30.110 --> 00:10:33.520
|
|
which means teaching free software in
|
|
|
|
235
|
|
00:10:33.520 --> 00:10:35.770
|
|
the school but there's another reason to
|
|
|
|
236
|
|
00:10:35.770 --> 00:10:38.740
|
|
do that for education some kids want to
|
|
|
|
237
|
|
00:10:38.740 --> 00:10:40.850
|
|
become programmers they're curious they
|
|
|
|
238
|
|
00:10:40.850 --> 00:10:42.760
|
|
wantto know how the programs work well
|
|
|
|
239
|
|
00:10:42.760 --> 00:10:44.120
|
|
the one who's studying a free software
|
|
|
|
240
|
|
00:10:44.120 --> 00:10:46.550
|
|
can understand it the one who's studying
|
|
|
|
241
|
|
00:10:46.550 --> 00:10:48.670
|
|
a non-free program can't learn anything
|
|
|
|
242
|
|
00:10:48.670 --> 00:10:52.240
|
|
because the knowledge in the non-free
|
|
|
|
243
|
|
00:10:52.240 --> 00:10:55.420
|
|
program is withheld denied to the
|
|
|
|
244
|
|
00:10:55.420 --> 00:10:57.800
|
|
students so to uphold the spirit of
|
|
|
|
245
|
|
00:10:57.800 --> 00:10:59.830
|
|
Education the school should make sure
|
|
|
|
246
|
|
00:10:59.830 --> 00:11:01.870
|
|
its programs are free but there's an
|
|
|
|
247
|
|
00:11:01.870 --> 00:11:04.540
|
|
even more important reason schools
|
|
|
|
248
|
|
00:11:04.540 --> 00:11:06.880
|
|
should teach the spirit of goodwill
|
|
|
|
249
|
|
00:11:06.880 --> 00:11:09.790
|
|
the habit of helping other people so the
|
|
|
|
250
|
|
00:11:09.790 --> 00:11:12.370
|
|
class should say if you bring a program
|
|
|
|
251
|
|
00:11:12.370 --> 00:11:14.950
|
|
to class just as if you bring cookies to
|
|
|
|
252
|
|
00:11:14.950 --> 00:11:15.730
|
|
class
|
|
|
|
253
|
|
00:11:15.730 --> 00:11:17.230
|
|
you've got to share it with everyone
|
|
|
|
254
|
|
00:11:17.230 --> 00:11:19.870
|
|
else can't keep it to yourself you gotta
|
|
|
|
255
|
|
00:11:19.870 --> 00:11:22.270
|
|
share the source code so other people
|
|
|
|
256
|
|
00:11:22.270 --> 00:11:24.820
|
|
can learn so don't bring any proprietary
|
|
|
|
257
|
|
00:11:24.820 --> 00:11:26.830
|
|
software to this class
|
|
|
|
258
|
|
00:11:26.830 --> 00:11:29.920
|
|
the school has to set a good example by
|
|
|
|
259
|
|
00:11:29.920 --> 00:11:32.740
|
|
following its own rule should bring only
|
|
|
|
260
|
|
00:11:32.740 --> 00:11:35.620
|
|
free software to class except as a
|
|
|
|
261
|
|
00:11:35.620 --> 00:11:39.700
|
|
reverse engineering exercise another
|
|
|
|
262
|
|
00:11:39.700 --> 00:11:42.350
|
|
obstacle is there's hardware we don't
|
|
|
|
263
|
|
00:11:42.350 --> 00:11:43.990
|
|
know how to write free software for
|
|
|
|
264
|
|
00:11:43.990 --> 00:11:46.270
|
|
because they won't tell us how to use
|
|
|
|
265
|
|
00:11:46.270 --> 00:11:48.850
|
|
the hardware that shocking they want to
|
|
|
|
266
|
|
00:11:48.850 --> 00:11:51.100
|
|
sell you the product and they won't tell
|
|
|
|
267
|
|
00:11:51.100 --> 00:11:52.300
|
|
you how to use it
|
|
|
|
268
|
|
00:11:52.300 --> 00:11:54.820
|
|
they say here's a non-free program you
|
|
|
|
269
|
|
00:11:54.820 --> 00:11:57.250
|
|
can use run it and shut up
|
|
|
|
270
|
|
00:11:57.250 --> 00:12:00.910
|
|
don't bother us well how do we find out
|
|
|
|
271
|
|
00:12:00.910 --> 00:12:02.770
|
|
how to run that hardware with reverse
|
|
|
|
272
|
|
00:12:02.770 --> 00:12:05.890
|
|
engineering you gotta study all those
|
|
|
|
273
|
|
00:12:05.890 --> 00:12:07.450
|
|
zeroes and ones to figure out what they
|
|
|
|
274
|
|
00:12:07.450 --> 00:12:10.660
|
|
really do and write down how to use that
|
|
|
|
275
|
|
00:12:10.660 --> 00:12:12.610
|
|
hardware so someone else can write the
|
|
|
|
276
|
|
00:12:12.610 --> 00:12:15.730
|
|
free program to do it it's hard work but
|
|
|
|
277
|
|
00:12:15.730 --> 00:12:17.620
|
|
it can be done if you want to make a big
|
|
|
|
278
|
|
00:12:17.620 --> 00:12:19.990
|
|
technical contribution that's what you
|
|
|
|
279
|
|
00:12:19.990 --> 00:12:24.130
|
|
should do each new area activity of life
|
|
|
|
280
|
|
00:12:24.130 --> 00:12:27.520
|
|
can bring with it new human rights that
|
|
|
|
281
|
|
00:12:27.520 --> 00:12:29.890
|
|
are necessary and the human rights
|
|
|
|
282
|
|
00:12:29.890 --> 00:12:32.860
|
|
depend on each other if you lose one it
|
|
|
|
283
|
|
00:12:32.860 --> 00:12:35.800
|
|
becomes harder to maintain the others so
|
|
|
|
284
|
|
00:12:35.800 --> 00:12:38.830
|
|
nowadays computing is so important in
|
|
|
|
285
|
|
00:12:38.830 --> 00:12:41.140
|
|
society that the freedoms of free
|
|
|
|
286
|
|
00:12:41.140 --> 00:12:44.170
|
|
software are among the human rights that
|
|
|
|
287
|
|
00:12:44.170 --> 00:12:47.290
|
|
society must establish and protect us
|
|
|
|
288
|
|
00:12:47.290 --> 00:12:49.660
|
|
how to help
|
|
|
|
289
|
|
00:12:49.660 --> 00:12:51.860
|
|
well you can write free software you can
|
|
|
|
290
|
|
00:12:51.860 --> 00:12:55.540
|
|
organize groups to campaign and persuade
|
|
|
|
291
|
|
00:12:55.540 --> 00:12:57.350
|
|
schools and governments to move to free
|
|
|
|
292
|
|
00:12:57.350 --> 00:12:59.740
|
|
software you can help other people when
|
|
|
|
293
|
|
00:12:59.740 --> 00:13:01.930
|
|
they have trouble using free software or
|
|
|
|
294
|
|
00:13:01.930 --> 00:13:05.170
|
|
help them install it you can say free
|
|
|
|
295
|
|
00:13:05.170 --> 00:13:06.980
|
|
software and spread the philosophical
|
|
|
|
296
|
|
00:13:06.980 --> 00:13:10.900
|
|
ideas moving to free software is the
|
|
|
|
297
|
|
00:13:10.900 --> 00:13:13.270
|
|
first step in the liberation of cyberspace
|
|
|
|
298
|
|
00:13:13.270 --> 00:13:15.160
|
|
but of course we also use the internet
|
|
|
|
299
|
|
00:13:15.160 --> 00:13:17.200
|
|
we need other freedoms they're like
|
|
|
|
300
|
|
00:13:17.200 --> 00:13:19.400
|
|
network neutrality and
|
|
|
|
301
|
|
00:13:19.400 --> 00:13:22.910
|
|
putting an end to surveillance of people
|
|
|
|
302
|
|
00:13:22.910 --> 00:13:24.640
|
|
in general
|