SlideShare a Scribd company logo
1 of 28
The FreedomBox project Stefano Maffulli 2011 June 21 st , San Francisco (CA)
 
 
government
Content owners
Data miners
Network operators
platforms
Advertising
http://www.flickr.com/photos/oceanflynn/315385916/
The free email
The aquarium
This shouldn't happen
 
Powered by freedom Services that improve privacy of communication
 
 
Technical committee ,[object Object]
Bdale Garbee, Open Source and Linux Chief Technologist at Hewlett-Packard
Sam Hartman, former Chief Technologist at the MIT Kerberos Consortium and IETF Security Area Director
Sascha Meinrath, Director of the New America Foundation's Open Technology Initiative
Rob Savoye, long-time GNU hacker, Gnash lead developer, and winner of the 2010 award for the Advancement of Free Software
Matt Zimmerman, former Canonical CTO
What will it do ,[object Object]
Secure backup
Network neutrality protection
Safe anonymous publication
Home network security

More Related Content

What's hot

Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkFlaskdata.io
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Alexandra Deschamps-Sonsino
 
Crypto-Book: Document leakage
Crypto-Book: Document leakageCrypto-Book: Document leakage
Crypto-Book: Document leakagemahan9
 
Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.News Feather
 

What's hot (10)

Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...
 
Crypto-Book: Document leakage
Crypto-Book: Document leakageCrypto-Book: Document leakage
Crypto-Book: Document leakage
 
Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.
 

Similar to FreedomBox Project Supports Privacy and Security

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpoliticsoiwan
 
The future of the internet: version 4
The future of the internet: version 4The future of the internet: version 4
The future of the internet: version 4Jon Lebkowsky
 
Free Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesFree Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesHaggen So
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the InternetJon Lebkowsky
 
Glyn moody - Free software's golden age
Glyn moody - Free software's golden ageGlyn moody - Free software's golden age
Glyn moody - Free software's golden ageglynmoody
 
Glyn Moody - open question
Glyn Moody - open questionGlyn Moody - open question
Glyn Moody - open questionglynmoody
 
Open Source Software Version 6
Open Source Software Version 6Open Source Software Version 6
Open Source Software Version 6Henry Briggs
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminarSmit Patil
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminarSmit Patil
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxmahendrarm2112
 
Open Source Software Storyboard Ver 8
Open Source Software Storyboard Ver 8Open Source Software Storyboard Ver 8
Open Source Software Storyboard Ver 8Henry Briggs
 
Open Source Software Storyboard Ver9
Open Source Software Storyboard Ver9Open Source Software Storyboard Ver9
Open Source Software Storyboard Ver9Henry Briggs
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent Mwando
 
Open Source Software Presentation
Open Source Software PresentationOpen Source Software Presentation
Open Source Software PresentationHenry Briggs
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.BarCamp Lithuania
 

Similar to FreedomBox Project Supports Privacy and Security (20)

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
 
Introduction To Open Source
Introduction To Open SourceIntroduction To Open Source
Introduction To Open Source
 
The future of the internet: version 4
The future of the internet: version 4The future of the internet: version 4
The future of the internet: version 4
 
Free Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesFree Software Movement and Open Source Communities
Free Software Movement and Open Source Communities
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
GNU turns 30
GNU turns 30GNU turns 30
GNU turns 30
 
Glyn moody - Free software's golden age
Glyn moody - Free software's golden ageGlyn moody - Free software's golden age
Glyn moody - Free software's golden age
 
History of Internet
History of Internet History of Internet
History of Internet
 
Glyn Moody - open question
Glyn Moody - open questionGlyn Moody - open question
Glyn Moody - open question
 
Open Source Software Version 6
Open Source Software Version 6Open Source Software Version 6
Open Source Software Version 6
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminar
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminar
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
Open Source Software Storyboard Ver 8
Open Source Software Storyboard Ver 8Open Source Software Storyboard Ver 8
Open Source Software Storyboard Ver 8
 
Open Source Software Storyboard Ver9
Open Source Software Storyboard Ver9Open Source Software Storyboard Ver9
Open Source Software Storyboard Ver9
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
 
Open Source Software Presentation
Open Source Software PresentationOpen Source Software Presentation
Open Source Software Presentation
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.
 

More from Stefano Maffulli

How to Maximize Effectiveness of Developers Contributing to Free Software
How to Maximize Effectiveness of Developers Contributing to Free SoftwareHow to Maximize Effectiveness of Developers Contributing to Free Software
How to Maximize Effectiveness of Developers Contributing to Free SoftwareStefano Maffulli
 
How Big Companies Contribute to OpenStack
How Big Companies Contribute to OpenStackHow Big Companies Contribute to OpenStack
How Big Companies Contribute to OpenStackStefano Maffulli
 
The lessons of Open Source for the Open Cloud
The lessons of Open Source for the Open CloudThe lessons of Open Source for the Open Cloud
The lessons of Open Source for the Open CloudStefano Maffulli
 
Growing the OpenStack International Community
Growing the OpenStack International CommunityGrowing the OpenStack International Community
Growing the OpenStack International CommunityStefano Maffulli
 
Designing An Agile Community Program: Funambol Code Sniper v. 2
Designing An Agile Community Program: Funambol Code Sniper v. 2Designing An Agile Community Program: Funambol Code Sniper v. 2
Designing An Agile Community Program: Funambol Code Sniper v. 2Stefano Maffulli
 
Etica nella società digitale
Etica nella società digitaleEtica nella società digitale
Etica nella società digitaleStefano Maffulli
 
etica e creatività nel mondo digitale
etica e creatività nel mondo digitaleetica e creatività nel mondo digitale
etica e creatività nel mondo digitaleStefano Maffulli
 

More from Stefano Maffulli (7)

How to Maximize Effectiveness of Developers Contributing to Free Software
How to Maximize Effectiveness of Developers Contributing to Free SoftwareHow to Maximize Effectiveness of Developers Contributing to Free Software
How to Maximize Effectiveness of Developers Contributing to Free Software
 
How Big Companies Contribute to OpenStack
How Big Companies Contribute to OpenStackHow Big Companies Contribute to OpenStack
How Big Companies Contribute to OpenStack
 
The lessons of Open Source for the Open Cloud
The lessons of Open Source for the Open CloudThe lessons of Open Source for the Open Cloud
The lessons of Open Source for the Open Cloud
 
Growing the OpenStack International Community
Growing the OpenStack International CommunityGrowing the OpenStack International Community
Growing the OpenStack International Community
 
Designing An Agile Community Program: Funambol Code Sniper v. 2
Designing An Agile Community Program: Funambol Code Sniper v. 2Designing An Agile Community Program: Funambol Code Sniper v. 2
Designing An Agile Community Program: Funambol Code Sniper v. 2
 
Etica nella società digitale
Etica nella società digitaleEtica nella società digitale
Etica nella società digitale
 
etica e creatività nel mondo digitale
etica e creatività nel mondo digitaleetica e creatività nel mondo digitale
etica e creatività nel mondo digitale
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

FreedomBox Project Supports Privacy and Security

Editor's Notes

  1. I would like you to imagine the corners of the world where things don't turn out well for people that dare not to agree with power. And they rely on the Internet as the technological tool to enable their freedom of speech, their freedom to express their political views, their freedom to protest and get a better place to live and work in. http://www.fotopedia.com/items/flickr-3629119935
  2. Keep those images in mind when I tell you that we have 4 forces doing anything they can to eliminate these freedoms on the net. http://www.flickr.com/photos/96884693@N00/5658644927/
  3. we have governments deeply concerned about the possible loss of control that comes from the freedom to tell stories any way we want and escape the framing that power puts around things http://www.flickr.com/photos/wallyg/3664384371/
  4. we have content owners who believe that their bits are sacred and the possibility that those bits may be copied justifies controlling the net down to each endpoint and down to every eyeball and every eardrum http://www.flickr.com/photos/soerenpeters/1151601662/
  5. we have data miners, the industry of the future, their job is to know what you want before you know it so that they can sell you to somebody. All that is required is to read your email, check every party that you go to, check every conversations you have with your friends. And they have arranged to make this possible. http://www.flickr.com/photos/scobleizer/4870003098/
  6. we have network operators that are transforming the end-to-end network (as described by Lessig) into the “everything must come to us” and “all your life are belong to us!” http://www.flickr.com/photos/titanas/3596049112/
  7. among the four, we have platforms, devices that won't let you remove the banner from a page, won't let you skip an ad, won't let you share a song, lend a book or even speak your mind. The internet as we have designed it and experienced is being changed. it's being monitored, measured, watched by people for other people that will answer a subpoena if they get one. http://www.flickr.com/photos/the-meir/5026552048/l
  8. You may think that you're not a revolutionary in a remote corner of the globe, these things are not about you. We living around the golden gate, in the golden plated Silicon Valley, we have our own set of issues with this architecture of the Internet. Advertising in the 20th century was a random activity. You threw things out and hoped they worked. Advertising in the 21st century is an exquisitely precise activity. You wait for a guy to want something and then you send him advertisements about what he wants and it works like magic. http://s0.geograph.org.uk/geophotos/02/38/81/2388102_74d0d02c.jpg
  9. It started before Google, they perfected search. Search offers a service, for free: it crawls and gathers information around the web, centralizes everything in order to analyze the data and design correlations between words, pages, people. All designed in order to serve you advertising.
  10. And there is email, free for you at the cost of being spied: companies whose main purpose is to scan and analyze your email to know more about you so that they can tell you what you want to buy before you even know it. What costs them a penny to run given the current cost of storage makes them millions selling you. You've turned into their product. http://www.flickr.com/photos/notoriousxl/3030271346
  11. Facebook is the next step: it's “I will give you free web hosting and some PHP tools and you get spying for free all the time”. And it works. There was no architectural reason really. Facebook is the Web but instead of being spread, a collection of hyperlinked documents, intelligence at the edges of the net, is an aquarium and we're happy to be watched swimming in it. That’s a very poor way to deliver those services. They are grossly overpriced at “spying all the time”. They are not technically innovative. They depend upon an architecture subject to misuse and the business model that supports them is subject to misuse. There isn’t any other business model for them. This is bad.
  12. This shouldn't happen. I’m not suggesting it should be illegal. It should be obsolete. We’re technologists, we should fix it. We've built the components of that aquarium, we can build an ocean where we are in control of where we go, what we do.
  13. We made free software for over 20 years, we have made all the tools we need to fix the net. We can put anonimity back in the net. Change the routers and spread the intelligence back to the edges. We can make technology work for us. http://www.flickr.com/photos/anynonymoose/2588253456/
  14. FreedomBox is software in a box. Oour software will provide services to people and businesses that will improve the privacy of their communication.
  15. We have made software that can encrypt/decrypt email and store in a place where a search warrant is necessary in order to get it We made software that can provide the equivalent of skype that is free voip with a higher level of privacy than Skype owned by Microsoft can possibly provide We made distributed social networking to keep in touch with your friends and family, that offers you ways to share that don't require you to provide information into a centralized database owned by a fool. http://www.flickr.com/photos/makelessnoise/195088755/
  16. The nature of the hardware is a series of small server capable of running on batteries. and enable your home network to run in a smarter way. Instead of running a dumb wireless router we envision a product that you can plug into a socket and, automatically, you'll have a router that cares about your privacy. Marvell® Sheeva™ Core Embedded CPU @1.2 GHz 2 GB on board micro-SD SDRAM: 512MB 16bit DDR2 @800 MHz 2 x Gigabit Ethernet 10/100/1000 Mbps 2 x USB 2.0 ports (Host) 1 x eSATA 2.0 port- 3Gbps SATAII 1 x SD Socket for user expansion/application WiFi: 802.11 b/g Bluethooth: BT2.1 + EDR Digital out: S/PDIF with fiber optics inteface Stereo headphone out, Mic in http://www.flickr.com/photos/andypiper/5450609876/
  17. we have a nucleus of experienced developers Jacob Appelbaum, from the Tor project Bdale Garbee, Open Source and Linux Chief Technologist at Hewlett-Packard Sam Hartman, former Chief Technologist at the MIT Kerberos Consortium and IETF Security Area Director Sascha Meinrath, Director of the New America Foundation's Open Technology Initiative Rob Savoye, long-time GNU hacker, Gnash lead developer, and winner of the 2010 award for the Advancement of Free Software Matt Zimmerman, former Canonical CTO We'll soon have a prototype
  18. The objective is to enable two users, Jane and Ken, to exchange their private information (vcard, GPG keys) and establish a high degree of digital trust by simply scanning a QRcode. The updated status of 'trust' can be then transmitted back from the phone to their respective FreedomBoxes, securing future communication between Jane and Ken.
  19. we'll have to make it easy for any ordinary person to run it, not more difficult than operating the smartphones that we all carry in our pockets. So you can put it in any place you like where if somebody wants to know what's in it they can get a warrant. We're actively looking for UX designers. If you know a talented designer that wants to contribute her expertise or you know of institutions that may be interested in financing the development of the UI of FreedomBox let us know. This is the challenge. http://ninaturns40.blogs.com/nina_turns_40/2005/08 /good_things_abo.html
  20. The FreedomBox will be useful in the parts of the world where governments are oppressing their citizens. In these places and here at home we want to go to people with great social networking, updates automatically, software so strong you couldn’t knock it over it you kicked it, used in hundreds of millions of servers all over the planet doing a wonderful job. We can do that. That requires us to do only the stuff we’re really really good at http://www.flickr.com/photos/zenashots/5459794919/
  21. We need to re-architect services in the Net. We need to re-distribute services back towards the edge. We need to go from an architecture of centralization like this one
  22. … to one made of people. We need to de-virtualize the servers where our life is stored and we need to restore some autonomy to you as the owner of the server. This is technical challenge for social reason. It’s a frontier for technical people to explore. There is enormous social pay-off for exploring it. http://www.flickr.com/photos/luc/1804295568/
  23. Contacts details