Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
A Proto-FreedomBox 2011.0918 Nick Daly <nick.m.daly@gmail.com> GPG:  0x4C682009 (2009.1024 - 2011.1024) GPG:  0x0928D23A (...
What's a FreedomBox? <ul><li>Eben Moglen   proposed a challenge : What will it take to produce a computer network that all...
Not how most people use it. </li></ul>
The Standard Problems <ul><li>A few intermediaries handle most Internet communications: </li><ul><li>Google   (Gmail, Goog...
Facebook   (FacebookChat, Skype)
Microsoft   (Live Mail, MSN) </li></ul><li>Intermediaries &quot;track&quot; and &quot;bubble&quot; you. </li></ul>Bubble: ...
Tracking People <ul><li>We're freely giving away more information to private companies than is available through a search ...
Google identifies  57 signals  about you every time you search,  when you're not logged in .  You share a lot more in Face...
What Happens? <ul><li>Unique, private, identifying information is  sold to advertising partners  who resell that informati...
Other stuff? </li></ul></ul>
You're Really... <ul><li>Sharing more than you mean to share.
Nothing more than a number, the  ultimate captive audience.
Upcoming SlideShare
Loading in …5
×

Grant 2011.0918

565 views

Published on

Grant presentation given at a Sunday Soup granting event (SundaySoup.org), describing the necessity of the FreedomBox project (FreedomBoxFoundation.org), requesting funding for a DreamPlug to prototype server build.

Presentation is given at a very high level, without getting into the technical details.

Published in: Technology
  • Login to see the comments

  • Be the first to like this

Grant 2011.0918

  1. 1. A Proto-FreedomBox 2011.0918 Nick Daly <nick.m.daly@gmail.com> GPG: 0x4C682009 (2009.1024 - 2011.1024) GPG: 0x0928D23A (2011.0827 - 2014.0826)
  2. 2. What's a FreedomBox? <ul><li>Eben Moglen proposed a challenge : What will it take to produce a computer network that allows people to communicate privately, securely, and freely? </li></ul><ul><li>Isn't the Internet already that network?
  3. 3. Not how most people use it. </li></ul>
  4. 4. The Standard Problems <ul><li>A few intermediaries handle most Internet communications: </li><ul><li>Google (Gmail, Google+, GoogleDocs, GoogleTalk, YouTube)
  5. 5. Facebook (FacebookChat, Skype)
  6. 6. Microsoft (Live Mail, MSN) </li></ul><li>Intermediaries &quot;track&quot; and &quot;bubble&quot; you. </li></ul>Bubble: Filter out data you're not interested in, censoring alternative viewpoints.
  7. 7. Tracking People <ul><li>We're freely giving away more information to private companies than is available through a search warrant.
  8. 8. Google identifies 57 signals about you every time you search, when you're not logged in . You share a lot more in Facebook, by using it . </li></ul><ul><li>We're unintentionally redefining the concept of &quot;privacy&quot;. </li></ul>
  9. 9. What Happens? <ul><li>Unique, private, identifying information is sold to advertising partners who resell that information to anyone interested. </li></ul><ul><li>Identifying information is just waiting to be stolen , including: </li><ul><li>Name and email
  10. 10. Other stuff? </li></ul></ul>
  11. 11. You're Really... <ul><li>Sharing more than you mean to share.
  12. 12. Nothing more than a number, the ultimate captive audience.
  13. 13. At risk of torture, for your private thoughts.
  14. 14. Categorized in over 400 ways , including: household income range, age range,political leaning, and gender and age of children in the household, as well as interests in topics including religion, the Bible, gambling, tobacco, adult entertainment and &quot;get rich quick&quot; offers.
  15. 15. The list goes on. </li></ul>
  16. 16. What Can We Do? <ul><li>Take control of your privacy, personal freedoms, and information!
  17. 17. Be your own: </li><ul><li>Social Network
  18. 18. Blog Server
  19. 19. Email Server
  20. 20. Network Censorship Circumventer
  21. 21. Anonymous Publication Tool
  22. 22. File Server </li></ul><li>Use the FreedomBox! Anyone can use it! </li></ul>
  23. 23. Where're We Now? <ul><li>It's not yet as easy as it should be. </li><ul><li>The project's still in design and development. </li></ul></ul><ul><li>I'm building an unofficial, self-configuring, system: </li></ul><ul>In Progress: BitTorrent Tracker, blog server, project server, and Tor server. </ul><ul>Complete: Anomaly detection, firewall config, IM server, incoming email, outgoing email, and a web server. </ul>
  24. 24. Pirates and Murderers! <ul><li>This work doesn't help the evil people on the internet.
  25. 25. They already use more advanced, secure systems and networks.
  26. 26. People, not technological faults, bring down these networks. </li></ul>
  27. 27. Grant <ul><li>Used for: </li><ul><li>Buying a domain name for a year.
  28. 28. Buying a DreamPlug . </li></ul></ul><ul><li>Meets needs: </li></ul><ul><ul><li>Field-testing on real hardware.
  29. 29. Publicizing with a self-evident running example.
  30. 30. Keeping project momentum high. </li></ul></ul>
  31. 31. Next Steps <ul><li>I need to: </li><ul><li>By 10/2: Finish building the automatic-self-configuration.
  32. 32. By 10/2: Publish it.
  33. 33. Ongoing: Standardize and polish it. </li></ul><li>You can: </li><ul><li>Get involved!
  34. 34. Get on the mailing list!
  35. 35. Use privacy and freedom respecting services until the FreedomBox is ready! </li></ul></ul>
  36. 36. References All the links above :)

×