SlideShare a Scribd company logo
1 of 28
The FreedomBox project Stefano Maffulli 2011 June 21 st , San Francisco (CA)
 
 
government
Content owners
Data miners
Network operators
platforms
Advertising
http://www.flickr.com/photos/oceanflynn/315385916/
The free email
The aquarium
This shouldn't happen
 
Powered by freedom Services that improve privacy of communication
 
 
Technical committee ,[object Object]
Bdale Garbee, Open Source and Linux Chief Technologist at Hewlett-Packard
Sam Hartman, former Chief Technologist at the MIT Kerberos Consortium and IETF Security Area Director
Sascha Meinrath, Director of the New America Foundation's Open Technology Initiative
Rob Savoye, long-time GNU hacker, Gnash lead developer, and winner of the 2010 award for the Advancement of Free Software
Matt Zimmerman, former Canonical CTO
What will it do ,[object Object]
Secure backup
Network neutrality protection
Safe anonymous publication
Home network security

More Related Content

What's hot

Crypto-Book: Document leakage
Crypto-Book: Document leakageCrypto-Book: Document leakage
Crypto-Book: Document leakage
mahan9
 

What's hot (10)

Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...
 
Crypto-Book: Document leakage
Crypto-Book: Document leakageCrypto-Book: Document leakage
Crypto-Book: Document leakage
 
Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.
 

Similar to 2011 06-freedombox-balug

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
oiwan
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminar
Smit Patil
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.
BarCamp Lithuania
 

Similar to 2011 06-freedombox-balug (20)

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
 
Introduction To Open Source
Introduction To Open SourceIntroduction To Open Source
Introduction To Open Source
 
The future of the internet: version 4
The future of the internet: version 4The future of the internet: version 4
The future of the internet: version 4
 
Free Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesFree Software Movement and Open Source Communities
Free Software Movement and Open Source Communities
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
GNU turns 30
GNU turns 30GNU turns 30
GNU turns 30
 
Glyn moody - Free software's golden age
Glyn moody - Free software's golden ageGlyn moody - Free software's golden age
Glyn moody - Free software's golden age
 
History of Internet
History of Internet History of Internet
History of Internet
 
Glyn Moody - open question
Glyn Moody - open questionGlyn Moody - open question
Glyn Moody - open question
 
Open Source Software Version 6
Open Source Software Version 6Open Source Software Version 6
Open Source Software Version 6
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminar
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminar
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
Open Source Software Storyboard Ver 8
Open Source Software Storyboard Ver 8Open Source Software Storyboard Ver 8
Open Source Software Storyboard Ver 8
 
Open Source Software Storyboard Ver9
Open Source Software Storyboard Ver9Open Source Software Storyboard Ver9
Open Source Software Storyboard Ver9
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
 
Open Source Software Presentation
Open Source Software PresentationOpen Source Software Presentation
Open Source Software Presentation
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.
 

More from Stefano Maffulli

etica e creatività nel mondo digitale
etica e creatività nel mondo digitaleetica e creatività nel mondo digitale
etica e creatività nel mondo digitale
Stefano Maffulli
 

More from Stefano Maffulli (7)

How to Maximize Effectiveness of Developers Contributing to Free Software
How to Maximize Effectiveness of Developers Contributing to Free SoftwareHow to Maximize Effectiveness of Developers Contributing to Free Software
How to Maximize Effectiveness of Developers Contributing to Free Software
 
How Big Companies Contribute to OpenStack
How Big Companies Contribute to OpenStackHow Big Companies Contribute to OpenStack
How Big Companies Contribute to OpenStack
 
The lessons of Open Source for the Open Cloud
The lessons of Open Source for the Open CloudThe lessons of Open Source for the Open Cloud
The lessons of Open Source for the Open Cloud
 
Growing the OpenStack International Community
Growing the OpenStack International CommunityGrowing the OpenStack International Community
Growing the OpenStack International Community
 
Designing An Agile Community Program: Funambol Code Sniper v. 2
Designing An Agile Community Program: Funambol Code Sniper v. 2Designing An Agile Community Program: Funambol Code Sniper v. 2
Designing An Agile Community Program: Funambol Code Sniper v. 2
 
Etica nella società digitale
Etica nella società digitaleEtica nella società digitale
Etica nella società digitale
 
etica e creatività nel mondo digitale
etica e creatività nel mondo digitaleetica e creatività nel mondo digitale
etica e creatività nel mondo digitale
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

2011 06-freedombox-balug

Editor's Notes

  1. I would like you to imagine the corners of the world where things don't turn out well for people that dare not to agree with power. And they rely on the Internet as the technological tool to enable their freedom of speech, their freedom to express their political views, their freedom to protest and get a better place to live and work in. http://www.fotopedia.com/items/flickr-3629119935
  2. Keep those images in mind when I tell you that we have 4 forces doing anything they can to eliminate these freedoms on the net. http://www.flickr.com/photos/96884693@N00/5658644927/
  3. we have governments deeply concerned about the possible loss of control that comes from the freedom to tell stories any way we want and escape the framing that power puts around things http://www.flickr.com/photos/wallyg/3664384371/
  4. we have content owners who believe that their bits are sacred and the possibility that those bits may be copied justifies controlling the net down to each endpoint and down to every eyeball and every eardrum http://www.flickr.com/photos/soerenpeters/1151601662/
  5. we have data miners, the industry of the future, their job is to know what you want before you know it so that they can sell you to somebody. All that is required is to read your email, check every party that you go to, check every conversations you have with your friends. And they have arranged to make this possible. http://www.flickr.com/photos/scobleizer/4870003098/
  6. we have network operators that are transforming the end-to-end network (as described by Lessig) into the “everything must come to us” and “all your life are belong to us!” http://www.flickr.com/photos/titanas/3596049112/
  7. among the four, we have platforms, devices that won't let you remove the banner from a page, won't let you skip an ad, won't let you share a song, lend a book or even speak your mind. The internet as we have designed it and experienced is being changed. it's being monitored, measured, watched by people for other people that will answer a subpoena if they get one. http://www.flickr.com/photos/the-meir/5026552048/l
  8. You may think that you're not a revolutionary in a remote corner of the globe, these things are not about you. We living around the golden gate, in the golden plated Silicon Valley, we have our own set of issues with this architecture of the Internet. Advertising in the 20th century was a random activity. You threw things out and hoped they worked. Advertising in the 21st century is an exquisitely precise activity. You wait for a guy to want something and then you send him advertisements about what he wants and it works like magic. http://s0.geograph.org.uk/geophotos/02/38/81/2388102_74d0d02c.jpg
  9. It started before Google, they perfected search. Search offers a service, for free: it crawls and gathers information around the web, centralizes everything in order to analyze the data and design correlations between words, pages, people. All designed in order to serve you advertising.
  10. And there is email, free for you at the cost of being spied: companies whose main purpose is to scan and analyze your email to know more about you so that they can tell you what you want to buy before you even know it. What costs them a penny to run given the current cost of storage makes them millions selling you. You've turned into their product. http://www.flickr.com/photos/notoriousxl/3030271346
  11. Facebook is the next step: it's “I will give you free web hosting and some PHP tools and you get spying for free all the time”. And it works. There was no architectural reason really. Facebook is the Web but instead of being spread, a collection of hyperlinked documents, intelligence at the edges of the net, is an aquarium and we're happy to be watched swimming in it. That’s a very poor way to deliver those services. They are grossly overpriced at “spying all the time”. They are not technically innovative. They depend upon an architecture subject to misuse and the business model that supports them is subject to misuse. There isn’t any other business model for them. This is bad.
  12. This shouldn't happen. I’m not suggesting it should be illegal. It should be obsolete. We’re technologists, we should fix it. We've built the components of that aquarium, we can build an ocean where we are in control of where we go, what we do.
  13. We made free software for over 20 years, we have made all the tools we need to fix the net. We can put anonimity back in the net. Change the routers and spread the intelligence back to the edges. We can make technology work for us. http://www.flickr.com/photos/anynonymoose/2588253456/
  14. FreedomBox is software in a box. Oour software will provide services to people and businesses that will improve the privacy of their communication.
  15. We have made software that can encrypt/decrypt email and store in a place where a search warrant is necessary in order to get it We made software that can provide the equivalent of skype that is free voip with a higher level of privacy than Skype owned by Microsoft can possibly provide We made distributed social networking to keep in touch with your friends and family, that offers you ways to share that don't require you to provide information into a centralized database owned by a fool. http://www.flickr.com/photos/makelessnoise/195088755/
  16. The nature of the hardware is a series of small server capable of running on batteries. and enable your home network to run in a smarter way. Instead of running a dumb wireless router we envision a product that you can plug into a socket and, automatically, you'll have a router that cares about your privacy. Marvell® Sheeva™ Core Embedded CPU @1.2 GHz 2 GB on board micro-SD SDRAM: 512MB 16bit DDR2 @800 MHz 2 x Gigabit Ethernet 10/100/1000 Mbps 2 x USB 2.0 ports (Host) 1 x eSATA 2.0 port- 3Gbps SATAII 1 x SD Socket for user expansion/application WiFi: 802.11 b/g Bluethooth: BT2.1 + EDR Digital out: S/PDIF with fiber optics inteface Stereo headphone out, Mic in http://www.flickr.com/photos/andypiper/5450609876/
  17. we have a nucleus of experienced developers Jacob Appelbaum, from the Tor project Bdale Garbee, Open Source and Linux Chief Technologist at Hewlett-Packard Sam Hartman, former Chief Technologist at the MIT Kerberos Consortium and IETF Security Area Director Sascha Meinrath, Director of the New America Foundation's Open Technology Initiative Rob Savoye, long-time GNU hacker, Gnash lead developer, and winner of the 2010 award for the Advancement of Free Software Matt Zimmerman, former Canonical CTO We'll soon have a prototype
  18. The objective is to enable two users, Jane and Ken, to exchange their private information (vcard, GPG keys) and establish a high degree of digital trust by simply scanning a QRcode. The updated status of 'trust' can be then transmitted back from the phone to their respective FreedomBoxes, securing future communication between Jane and Ken.
  19. we'll have to make it easy for any ordinary person to run it, not more difficult than operating the smartphones that we all carry in our pockets. So you can put it in any place you like where if somebody wants to know what's in it they can get a warrant. We're actively looking for UX designers. If you know a talented designer that wants to contribute her expertise or you know of institutions that may be interested in financing the development of the UI of FreedomBox let us know. This is the challenge. http://ninaturns40.blogs.com/nina_turns_40/2005/08 /good_things_abo.html
  20. The FreedomBox will be useful in the parts of the world where governments are oppressing their citizens. In these places and here at home we want to go to people with great social networking, updates automatically, software so strong you couldn’t knock it over it you kicked it, used in hundreds of millions of servers all over the planet doing a wonderful job. We can do that. That requires us to do only the stuff we’re really really good at http://www.flickr.com/photos/zenashots/5459794919/
  21. We need to re-architect services in the Net. We need to re-distribute services back towards the edge. We need to go from an architecture of centralization like this one
  22. … to one made of people. We need to de-virtualize the servers where our life is stored and we need to restore some autonomy to you as the owner of the server. This is technical challenge for social reason. It’s a frontier for technical people to explore. There is enormous social pay-off for exploring it. http://www.flickr.com/photos/luc/1804295568/
  23. Contacts details