1 00:00:05,568 --> 00:00:07,570 I have discussed this problem with several people 2 00:00:07,570 --> 00:00:09,030 of human rights and internet protocols 3 00:00:09,030 --> 00:00:10,364 and the most common response was 4 00:00:10,364 --> 00:00:11,407 "what? 5 00:00:11,407 --> 00:00:12,283 it's obvious 6 00:00:12,283 --> 00:00:14,280 there's no relationship between human rights 7 00:00:14,280 --> 00:00:15,244 and internet protocols 8 00:00:15,244 --> 00:00:17,121 it’s completely different things 9 00:00:17,121 --> 00:00:19,120 how can there be any connection?” 10 00:00:19,120 --> 00:00:22,418 The IETF has made a big thing 11 00:00:22,418 --> 00:00:24,503 of not being a political organization. 12 00:00:24,503 --> 00:00:26,500 Being an engineering organization. 13 00:00:26,500 --> 00:00:28,174 There are quite a few people in the IETF 14 00:00:28,174 --> 00:00:30,509 that would prefer not to get into politics. 15 00:00:30,885 --> 00:00:32,845 The Internet started as a military 16 00:00:32,887 --> 00:00:34,180 and academic network 17 00:00:34,180 --> 00:00:36,180 with a limited number of users 18 00:00:36,180 --> 00:00:37,892 therefore, it was implicit 19 00:00:37,892 --> 00:00:39,435 that users could trust each other 20 00:00:39,435 --> 00:00:41,479 and that they shared the same objectives. 21 00:00:41,812 --> 00:00:43,470 This was its foundation. 22 00:00:43,939 --> 00:00:45,941 The underlying protocols of the internet 23 00:00:45,941 --> 00:00:48,861 IP, TCP, HTTP, DNS 24 00:00:48,861 --> 00:00:49,904 all of these protocols 25 00:00:49,904 --> 00:00:51,614 are enabling protocols 26 00:00:51,697 --> 00:00:53,032 that allow to do whatever you want 27 00:00:53,115 --> 00:00:54,909 and so you see this wonderful flowering of 28 00:00:55,117 --> 00:00:56,077 of innovation 29 00:00:56,077 --> 00:00:57,828 of new ways of communicating. 30 00:00:58,412 --> 00:00:59,914 The functioning of the internet 31 00:00:59,914 --> 00:01:01,457 is dependent upon standards. 32 00:01:01,749 --> 00:01:04,085 To build the first connection between computers 33 00:01:04,085 --> 00:01:05,503 and have them talk to each other 34 00:01:05,503 --> 00:01:07,296 the Network Control Protocol 35 00:01:07,296 --> 00:01:08,297 NCP 36 00:01:08,297 --> 00:01:09,423 was developed. 37 00:01:09,423 --> 00:01:11,634 It was later on replaced by the more efficient 38 00:01:11,634 --> 00:01:13,385 Transmission Control Protocol 39 00:01:13,385 --> 00:01:14,428 TCP 40 00:01:14,428 --> 00:01:17,014 which confirms that sent messages are received. 41 00:01:17,348 --> 00:01:18,265 On top of that 42 00:01:18,599 --> 00:01:20,351 files are cut into little parts 43 00:01:20,351 --> 00:01:21,310 packets 44 00:01:21,310 --> 00:01:24,063 which allows for more efficient traffic handling. 45 00:01:24,063 --> 00:01:25,648 with this two innovations 46 00:01:25,648 --> 00:01:27,640 packet switching and TCP 47 00:01:27,640 --> 00:01:29,640 the modern internet was born. 48 00:01:31,195 --> 00:01:32,655 Since the internet is a network 49 00:01:32,655 --> 00:01:34,198 made up of other networks 50 00:01:34,198 --> 00:01:35,699 the biggest challenge has been 51 00:01:35,699 --> 00:01:37,159 defining open standards 52 00:01:37,159 --> 00:01:38,410 that allow this networks 53 00:01:38,410 --> 00:01:40,410 to communicate with each other. 54 00:01:41,789 --> 00:01:43,124 A vibrant city needs 55 00:01:43,124 --> 00:01:44,708 well engineered infrastructure 56 00:01:44,708 --> 00:01:46,752 to keep it growing and running smoothly 57 00:01:46,752 --> 00:01:48,170 that’s why we need the 58 00:01:48,170 --> 00:01:50,297 Internet Engineering Task Force 59 00:01:50,297 --> 00:01:52,424 a global organization of volunteers 60 00:01:52,424 --> 00:01:54,760 collaborating to design standards 61 00:01:54,760 --> 00:01:56,345 that provide the infrastructure 62 00:01:56,345 --> 00:01:57,930 for innovation on the Internet. 63 00:01:57,930 --> 00:02:00,724 It's critically important to have global standards. 64 00:02:01,267 --> 00:02:02,720 And one of the reasons the IETF 65 00:02:02,720 --> 00:02:05,062 and organizations like the IETF 66 00:02:05,062 --> 00:02:06,522 are important 67 00:02:06,605 --> 00:02:09,060 where it’s voluntary expert based. 68 00:02:09,316 --> 00:02:11,060 The IETF is open. 69 00:02:11,360 --> 00:02:13,060 Open participation. 70 00:02:13,060 --> 00:02:14,446 Open processes 71 00:02:14,446 --> 00:02:15,739 and open standards. 72 00:02:15,739 --> 00:02:17,533 It’s interesting because the IETF community 73 00:02:17,533 --> 00:02:19,994 is very heavily biased towards 74 00:02:20,202 --> 00:02:20,786 you know 75 00:02:20,786 --> 00:02:21,787 white male 76 00:02:21,787 --> 00:02:22,580 middle class 77 00:02:22,580 --> 00:02:23,873 American engineers. 78 00:02:25,291 --> 00:02:27,543 The people who work on the standards are 79 00:02:28,586 --> 00:02:30,713 sincerely striving for 80 00:02:31,797 --> 00:02:33,549 doing the right thing technically 81 00:02:34,133 --> 00:02:35,540 and in a sense they have to do that because 82 00:02:35,540 --> 00:02:37,803 if they do the wrong thing technically it won’t work. 83 00:02:38,345 --> 00:02:40,181 And so, for the most part 84 00:02:40,181 --> 00:02:41,682 issues of human rights 85 00:02:41,682 --> 00:02:43,100 or ethics in general 86 00:02:43,309 --> 00:02:44,685 are a distraction to them. 87 00:02:44,810 --> 00:02:46,270 IETF is not the protocol police. 88 00:02:47,771 --> 00:02:49,732 all of this control, what happens in the world. 89 00:02:51,734 --> 00:02:53,527 I've been in a space dealing with 90 00:02:54,153 --> 00:02:55,946 data-brokers 91 00:02:55,946 --> 00:02:59,366 and third party surveillors of consumers 92 00:02:59,366 --> 00:03:01,035 for so many years. 93 00:03:01,535 --> 00:03:03,030 Like twenty years ago 94 00:03:03,030 --> 00:03:05,080 we brought together a group of data-brokers 95 00:03:05,080 --> 00:03:06,498 to find out what they're doing 96 00:03:06,498 --> 00:03:08,417 and how much they know about consumers 97 00:03:08,417 --> 00:03:11,253 and I remember so well that of their representative said 98 00:03:14,465 --> 00:03:16,050 Lawrence Lessig said "code is law" 99 00:03:16,425 --> 00:03:19,303 and the code that people write for the Internet 100 00:03:19,303 --> 00:03:21,300 is determined in large part 101 00:03:21,300 --> 00:03:22,598 by what we do in the IETF. 102 00:03:26,435 --> 00:03:27,353 Twenty years ago 103 00:03:27,353 --> 00:03:29,521 we brought together a group of data-brokers 104 00:03:29,521 --> 00:03:30,981 to find out what they're doing 105 00:03:30,981 --> 00:03:32,733 and how much they know about consumers 106 00:03:32,733 --> 00:03:34,068 and I remember so well 107 00:03:34,068 --> 00:03:35,778 that one of their representative said 108 00:03:35,778 --> 00:03:37,655 "you know, the secret to our business 109 00:03:37,655 --> 00:03:39,650 is not so much how much we know, 110 00:03:39,650 --> 00:03:41,650 but just make sure the consumers don't know about it”. 111 00:03:54,255 --> 00:03:55,422 It soon became clear 112 00:03:55,422 --> 00:03:57,800 that the Internet was no longer a trusted space. 113 00:03:58,092 --> 00:03:59,051 The insecurities 114 00:03:59,051 --> 00:04:01,095 inherent in a network based on trust 115 00:04:01,095 --> 00:04:03,090 were being increasingly exploited. 116 00:04:09,395 --> 00:04:10,938 The Internet works because we have 117 00:04:10,980 --> 00:04:12,314 machinery that's designed 118 00:04:13,857 --> 00:04:15,818 that implements particular ideas 119 00:04:15,818 --> 00:04:16,860 particular protocols 120 00:04:16,860 --> 00:04:19,363 particular rules, about how communications work. 121 00:04:19,780 --> 00:04:22,199 And if you do something that violates those rules 122 00:04:22,199 --> 00:04:23,826 your communication won’t work. 123 00:04:23,826 --> 00:04:25,160 We now need to think 124 00:04:25,160 --> 00:04:27,079 what the future internet should look like 125 00:04:27,079 --> 00:04:28,289 what we want to keep 126 00:04:28,289 --> 00:04:30,207 and what we want to leave behind. 127 00:04:39,717 --> 00:04:40,801 Technologists 128 00:04:40,801 --> 00:04:43,012 particularly at the IETF 129 00:04:43,012 --> 00:04:44,847 you guys are the ones 130 00:04:44,847 --> 00:04:47,391 who really have led the charge. 131 00:04:47,391 --> 00:04:49,390 the Internet doesn't belong to us 132 00:04:49,390 --> 00:04:51,390 the Internet doesn't belong to governments 133 00:04:51,854 --> 00:04:53,856 the Internet belongs to the user. 134 00:04:55,524 --> 00:04:57,109 If you want to do something about this 135 00:04:57,109 --> 00:04:58,736 you probably ought to do it pretty quickly 136 00:04:59,778 --> 00:05:02,573 that because Carnivore is not the only way 137 00:05:02,573 --> 00:05:04,241 in which this is going to happen. 138 00:05:04,491 --> 00:05:08,662 Does the NSA collect any type of data at all, 139 00:05:08,662 --> 00:05:11,832 on millions or hundreds of millions of Americans? 140 00:05:12,291 --> 00:05:13,083 No, sir. 141 00:05:14,043 --> 00:05:15,044 It does not? 142 00:05:15,210 --> 00:05:16,628 I, sit in my desk, 143 00:05:16,628 --> 00:05:19,715 certainly had the authorities to wiretap anyone 144 00:05:20,132 --> 00:05:22,259 from you or your accountant 145 00:05:22,259 --> 00:05:24,250 to a federal judge, to even the president 146 00:05:24,250 --> 00:05:25,471 if I had a personal email. 147 00:05:25,471 --> 00:05:27,806 This slide shows when each of those services 148 00:05:27,806 --> 00:05:29,725 were added to the PRISM program. 149 00:05:29,725 --> 00:05:31,720 And this slide shows the kinds 150 00:05:31,720 --> 00:05:33,720 of data the NSA have access to. 151 00:05:34,021 --> 00:05:35,939 By the end of the 1990s 152 00:05:35,939 --> 00:05:38,942 the FBI had created an Internet surveillance system 153 00:05:38,942 --> 00:05:40,940 to carry out targeted monitoring of 154 00:05:40,940 --> 00:05:42,940 people's email and browsing behavior. 155 00:05:43,280 --> 00:05:44,940 It was called Carnivore. 156 00:05:44,940 --> 00:05:47,576 It was carnivore, that pushed the IETF 157 00:05:47,576 --> 00:05:49,578 to take a position on privacy. 158 00:05:50,871 --> 00:05:53,123 A 29-year-old intelligence contractor 159 00:05:53,123 --> 00:05:55,334 has revealed himself to be the source 160 00:05:55,376 --> 00:05:57,002 that exposed two major 161 00:05:57,002 --> 00:05:59,755 US government intelligence gathering programs. 162 00:06:00,839 --> 00:06:01,840 The IETF 163 00:06:01,840 --> 00:06:04,301 now has a standard on privacy and security. 164 00:06:04,593 --> 00:06:07,221 Known as RFC 7258 165 00:06:07,221 --> 00:06:09,220 the standard states that: 166 00:06:09,220 --> 00:06:10,849 “IETF standards 167 00:06:10,849 --> 00:06:12,351 already provide mechanisms 168 00:06:12,351 --> 00:06:14,269 to protect Internet communications 169 00:06:14,353 --> 00:06:15,479 and there are guidelines 170 00:06:15,479 --> 00:06:17,470 for applying these in protocol design. 171 00:06:17,815 --> 00:06:19,233 But those standards generally 172 00:06:19,233 --> 00:06:21,568 do not address Pervasive Monitoring, 173 00:06:21,568 --> 00:06:24,238 the confidentiality of protocol metadata, 174 00:06:24,238 --> 00:06:26,073 countering traffic analysis, 175 00:06:26,073 --> 00:06:27,533 or data minimization. 176 00:06:27,533 --> 00:06:28,826 In all cases, 177 00:06:28,826 --> 00:06:30,327 there will remain 178 00:06:30,327 --> 00:06:32,320 some privacy-relevant information 179 00:06:32,320 --> 00:06:35,124 that is inevitably disclosed by protocols. 180 00:06:37,084 --> 00:06:38,585 We can set up communications protocols 181 00:06:38,585 --> 00:06:40,587 that anyone can use 182 00:06:41,255 --> 00:06:42,580 but if anyone can use them 183 00:06:42,580 --> 00:06:43,924 and by using them 184 00:06:43,924 --> 00:06:45,801 you are effectively surveilled 185 00:06:45,801 --> 00:06:47,261 or you can be impersonated, 186 00:06:47,261 --> 00:06:49,638 or you can be censored. 187 00:06:50,889 --> 00:06:53,434 If those protocols leave those options open 188 00:06:53,434 --> 00:06:55,430 then our society basically is saying we don't 189 00:06:55,430 --> 00:06:58,021 we're okay with those outcomes. 190 00:06:58,021 --> 00:07:00,020 If you design the protocols in such a way that 191 00:07:00,020 --> 00:07:01,483 they are resistant to surveillance, 192 00:07:01,483 --> 00:07:02,651 resistant to censorship, 193 00:07:02,651 --> 00:07:04,278 resistant to impersonation, 194 00:07:04,278 --> 00:07:06,270 then that’s a way of I think, 195 00:07:06,270 --> 00:07:08,270 saying we as a society value 196 00:07:08,270 --> 00:07:09,074 these other features. 197 00:07:09,074 --> 00:07:11,070 Different 198 00:07:12,494 --> 00:07:13,704 tracks in technology 199 00:07:13,704 --> 00:07:15,706 might result in different 200 00:07:15,998 --> 00:07:16,874 implications. 201 00:07:16,874 --> 00:07:18,542 Like, if you choose this path 202 00:07:19,293 --> 00:07:21,420 for the future evolution of the Internet 203 00:07:21,420 --> 00:07:22,713 then this is going to affect 204 00:07:23,046 --> 00:07:24,006 in this way. 205 00:07:24,006 --> 00:07:25,299 If you choose another path, 206 00:07:25,299 --> 00:07:26,758 it's going to have a different effect. 207 00:07:30,721 --> 00:07:32,431 The IETF does have shared values 208 00:07:32,431 --> 00:07:33,015 for sure. 209 00:07:33,015 --> 00:07:36,018 You know, the idea of 210 00:07:37,728 --> 00:07:38,562 you know, I mean, 211 00:07:38,562 --> 00:07:40,063 you might hear old-timers talk about 212 00:07:40,063 --> 00:07:42,060 rough consensus and running code. 213 00:07:42,357 --> 00:07:44,401 I would say that they're based on shared values. 214 00:07:44,401 --> 00:07:46,069 I wouldn't say that everyone agrees 215 00:07:46,069 --> 00:07:47,488 on what those shared values are. 216 00:07:53,827 --> 00:07:56,788 Enabling communication, I think is probably 217 00:07:56,788 --> 00:07:58,780 the positive guiding force 218 00:07:58,780 --> 00:08:00,780 behind all the stuff we do here. 219 00:08:01,126 --> 00:08:02,127 Since day one 220 00:08:02,127 --> 00:08:04,338 the IETF has taken a very strong 221 00:08:04,338 --> 00:08:06,330 position on connectivity 222 00:08:06,330 --> 00:08:08,330 “the community believes that the goal is connectivity, 223 00:08:08,330 --> 00:08:10,330 the tool is the Internet Protocol 224 00:08:10,330 --> 00:08:12,330 and the intelligence is end-to-end 225 00:08:12,330 --> 00:08:14,014 rather than hidden in the network". 226 00:08:14,306 --> 00:08:16,308 Less than half of the world's population 227 00:08:16,308 --> 00:08:17,601 is connected to the Internet, 228 00:08:17,601 --> 00:08:19,600 soon many more people will come online. 229 00:08:19,600 --> 00:08:21,600 Will they be able to trust 230 00:08:21,600 --> 00:08:23,600 the infrastructure, while global interests 231 00:08:23,600 --> 00:08:25,600 in the network are growing? 232 00:08:25,600 --> 00:08:28,362 What will the Internet of the future look like? 233 00:08:28,362 --> 00:08:30,906 I think, the importance of the Internet 234 00:08:30,906 --> 00:08:32,157 is its openness 235 00:08:32,157 --> 00:08:35,452 is the fact, as I have said in Spanish, 236 00:08:35,452 --> 00:08:36,912 we call it “la plaza pública” 237 00:08:36,912 --> 00:08:38,205 it’s the public space 238 00:08:38,205 --> 00:08:40,200 and it is precisely that public space 239 00:08:40,200 --> 00:08:42,200 to mingle, to interact, to relate, 240 00:08:42,200 --> 00:08:43,585 what makes it so important. 241 00:08:43,627 --> 00:08:46,880 How can we ensure the Internet is an open and free place, 242 00:08:46,880 --> 00:08:49,091 for both new and existing users? 243 00:08:49,091 --> 00:08:51,090 How can we ensure all users 244 00:08:51,090 --> 00:08:52,844 can access information 245 00:08:52,844 --> 00:08:54,840 and express themselves freely? 246 00:08:56,056 --> 00:08:58,350 In the area of freedom of expression, 247 00:08:58,350 --> 00:09:00,936 I think that a lot of advocacy groups 248 00:09:00,936 --> 00:09:03,272 and politicians, and scholars, 249 00:09:03,272 --> 00:09:05,270 are rightly focusing on the area of content 250 00:09:05,270 --> 00:09:06,817 and usage of information, 251 00:09:07,109 --> 00:09:09,319 but I fear that what's being missed here 252 00:09:09,319 --> 00:09:12,406 is more of the infrastructural area 253 00:09:12,406 --> 00:09:14,400 that we sometimes take for granted. 254 00:09:14,908 --> 00:09:16,618 We talk maybe more about 255 00:09:17,619 --> 00:09:19,079 right to privacy 256 00:09:19,413 --> 00:09:21,832 than right to free association, 257 00:09:21,832 --> 00:09:23,830 and relatively, and track association. 258 00:09:40,976 --> 00:09:42,561 I think if you have connectivity 259 00:09:42,561 --> 00:09:44,560 you have freedom of expression, pretty much, right? 260 00:09:44,560 --> 00:09:46,560 A lot of the censorship that happens, 261 00:09:47,399 --> 00:09:49,026 happens by limiting connectivity 262 00:09:49,026 --> 00:09:49,943 to what you can connect to. 263 00:09:50,569 --> 00:09:54,865 The Syrian Internet has just gone down 100%. 264 00:09:54,865 --> 00:09:55,657 In Irak. 265 00:09:55,657 --> 00:09:56,366 In Sudan. 266 00:09:56,408 --> 00:09:57,951 How is it even possible 267 00:09:57,951 --> 00:09:59,950 to cut off an entire country 268 00:09:59,950 --> 00:10:01,204 from the Internet? 269 00:10:02,789 --> 00:10:03,950 Governments deciding that 270 00:10:03,950 --> 00:10:05,950 they are going to cut off Internet services 271 00:10:05,950 --> 00:10:07,002 to their citizens, 272 00:10:07,002 --> 00:10:09,796 they do this for a variety of political reasons, 273 00:10:09,796 --> 00:10:11,790 but it’s not just happening in 274 00:10:11,790 --> 00:10:14,009 areas where there are repressive governments, 275 00:10:14,009 --> 00:10:16,303 we had an example recently in the United States 276 00:10:16,303 --> 00:10:18,300 before a protest was scheduled to happen. 277 00:10:18,972 --> 00:10:20,932 towards action shutting down 278 00:10:20,932 --> 00:10:24,394 the Internet and phone system at four stations. 279 00:10:24,645 --> 00:10:26,980 Nobody should be able to block 280 00:10:27,522 --> 00:10:29,691 the transmission for what you want to express, 281 00:10:29,691 --> 00:10:30,817 by any technical means. 282 00:10:30,817 --> 00:10:32,810 If you added a concept that involved 283 00:10:32,810 --> 00:10:34,810 the ease of expression, 284 00:10:36,448 --> 00:10:39,159 so that connectivity is not just about consumption 285 00:10:39,242 --> 00:10:40,118 but also expression, 286 00:10:40,535 --> 00:10:41,620 then I think you would be there. 287 00:10:51,755 --> 00:10:54,299 Content agnosticism suggests that 288 00:10:54,299 --> 00:10:57,177 the people who are passing on your message 289 00:10:57,177 --> 00:10:59,596 or the parties, the mechanisms that pass on your message, 290 00:10:59,596 --> 00:11:02,432 are fine with whatever the message is. 291 00:11:02,432 --> 00:11:04,430 So they are not going to discriminate on 292 00:11:04,430 --> 00:11:05,894 the basis of the content of the message. 293 00:11:06,144 --> 00:11:07,979 The Iranian government said on Friday 294 00:11:07,979 --> 00:11:09,648 that it is to expand what it calls 295 00:11:09,648 --> 00:11:11,191 smart filtering of the Internet, 296 00:11:11,191 --> 00:11:14,653 a policing of censoring undesirable content on websites, 297 00:11:14,653 --> 00:11:16,863 without banning them completely, as it used to, 298 00:11:17,489 --> 00:11:19,366 and this process will continue gradually, 299 00:11:19,366 --> 00:11:21,952 until the plan is implemented on all networks. 300 00:11:23,662 --> 00:11:25,414 That’s a very obvious example, 301 00:11:25,414 --> 00:11:28,917 it also happens at a less obvious example of infrastructure, 302 00:11:28,917 --> 00:11:31,253 areas that are hidden to the public, 303 00:11:31,253 --> 00:11:33,588 but never the less make decisions about 304 00:11:33,588 --> 00:11:35,580 freedom of expression. 305 00:11:35,580 --> 00:11:36,800 One example of that, 306 00:11:36,800 --> 00:11:39,720 and probably the best example that I can say just off the cuff is 307 00:11:39,720 --> 00:11:41,720 what happened to Wikileaks 308 00:11:41,720 --> 00:11:43,181 after the Cablegate incident. 309 00:11:43,181 --> 00:11:45,767 Wikileaks has been blocked by the United States. 310 00:11:45,767 --> 00:11:47,760 The company that was providing domain 311 00:11:47,760 --> 00:11:50,272 name hosting services, called EveryDNS, 312 00:11:50,272 --> 00:11:52,691 made a decision to stop resolving 313 00:11:52,691 --> 00:11:54,690 the domain name wikileaks.org 314 00:11:54,690 --> 00:11:56,361 into its binary address. 315 00:11:56,611 --> 00:11:59,072 Wikileaks has been blocked by the United States. 316 00:11:59,072 --> 00:12:02,826 In retaliation for the exposure of information 317 00:12:02,826 --> 00:12:04,161 about US policy. 318 00:12:04,161 --> 00:12:06,705 Wikileaks shawn light on war crimes 319 00:12:06,705 --> 00:12:08,700 committed by US troops 320 00:12:08,700 --> 00:12:10,700 in Irak and Afghanistan. 321 00:12:10,700 --> 00:12:12,700 People of the United States and the world, 322 00:12:12,700 --> 00:12:13,962 have a right to know 323 00:12:13,962 --> 00:12:16,465 what the US government is doing. 324 00:12:18,383 --> 00:12:20,260 Still, there's the problem of surveillance. 325 00:12:20,260 --> 00:12:22,846 I mean, it's some sort of 326 00:12:23,972 --> 00:12:27,309 giving everyone a printing press to print paper, 327 00:12:27,309 --> 00:12:31,104 but then you murder at random 328 00:12:31,104 --> 00:12:33,100 some people who distribute the newspaper. 329 00:12:33,100 --> 00:12:34,483 But the other thing that I’m missing is 330 00:12:34,483 --> 00:12:36,480 the ability to say what you want in private. 331 00:12:36,480 --> 00:12:39,070 Last week, The Guardian disclosed 332 00:12:39,070 --> 00:12:41,573 perhaps the most sweeping surveillance program 333 00:12:41,573 --> 00:12:43,033 that’s ever been publicly disclosed. 334 00:12:43,033 --> 00:12:45,030 The US National Security Agency 335 00:12:45,030 --> 00:12:46,578 had intercepted the communications. 336 00:12:56,338 --> 00:12:58,632 If we try to build our technologies 337 00:12:58,632 --> 00:13:00,630 to make censorship and monitoring 338 00:13:00,630 --> 00:13:02,630 as difficult as we can, 339 00:13:02,630 --> 00:13:04,630 or at least make it 340 00:13:04,630 --> 00:13:06,014 more expensive to do. 341 00:13:06,014 --> 00:13:08,010 The uses of the protocol 342 00:13:08,010 --> 00:13:10,010 are abuses of the protocol 343 00:13:10,010 --> 00:13:12,010 could harm user rights. 344 00:13:12,270 --> 00:13:13,396 They developed this tool, 345 00:13:13,396 --> 00:13:16,066 they sell it to governments, regardless of 346 00:13:16,066 --> 00:13:18,610 if they're going to be using it against journalists, 347 00:13:18,610 --> 00:13:20,610 or they're going to be using it against activists, 348 00:13:20,610 --> 00:13:22,610 or they're going to be using it against 349 00:13:22,610 --> 00:13:23,532 regular citizens. 350 00:13:24,115 --> 00:13:25,992 Exactly what we do. 351 00:13:27,160 --> 00:13:28,620 If it exposes 352 00:13:28,620 --> 00:13:30,497 lots of extra information 353 00:13:30,497 --> 00:13:32,490 that makes it easier to censor traffic 354 00:13:32,490 --> 00:13:34,490 for example 355 00:13:34,490 --> 00:13:36,490 that’s problematic, and so 356 00:13:36,490 --> 00:13:38,490 keeping protocol 357 00:13:38,490 --> 00:13:41,174 information leakage minimal 358 00:13:41,174 --> 00:13:44,219 is important, not only for privacy 359 00:13:44,261 --> 00:13:46,513 but also for free expression. 360 00:13:46,513 --> 00:13:48,510 I’m not sure how I could write 361 00:13:48,510 --> 00:13:50,510 technology 362 00:13:51,518 --> 00:13:54,437 that makes censorship harder 363 00:13:54,437 --> 00:13:58,692 and makes monitoring harder, 364 00:13:58,692 --> 00:14:00,690 that doesn't make hate-speech easier. 365 00:14:17,335 --> 00:14:19,254 As a technical definition of freedom of expression? 366 00:14:20,338 --> 00:14:21,464 I have to think about it. 367 00:14:22,424 --> 00:14:23,884 Freedom of expression 368 00:14:23,884 --> 00:14:25,880 through unimpeded connectivity 369 00:14:25,880 --> 00:14:27,880 was a founding feature of the Internet 370 00:14:27,880 --> 00:14:29,222 and it remains essential 371 00:14:29,222 --> 00:14:31,558 for the future development of communication. 372 00:14:32,934 --> 00:14:33,852 Help us ensure 373 00:14:33,852 --> 00:14:35,850 the Internet remains collaborative 374 00:14:35,850 --> 00:14:37,105 and decentralized. 375 00:14:37,105 --> 00:14:39,100 For the benefit of today’s users, 376 00:14:39,100 --> 00:14:41,100 and the users of tomorrow. 377 00:14:41,651 --> 00:14:43,100 We need to make, and ensure, 378 00:14:43,100 --> 00:14:45,100 that rights considerations are part 379 00:14:45,100 --> 00:14:47,657 of the future development of the internet protocols. 380 00:14:47,908 --> 00:14:49,650 How do you think we can define 381 00:14:49,650 --> 00:14:51,650 and protect human rights on a technical level? 382 00:14:53,663 --> 00:14:54,539 Tell us how, 383 00:14:54,539 --> 00:14:56,530 or even better, join us!