glyn moody - free software's golden age

Download Glyn moody - Free software's golden age

If you can't read please download the document

Upload: glynmoody

Post on 14-Jun-2015

576 views

Category:

Technology


2 download

DESCRIPTION

Open source has not only taken over most fields of computing, its methodology has spread to many other domains too. So are there any big challenges left for the next generation of coders? Edward Snowden's revelations indicate what needs to be done: adding strong crypto to a new generation of free software programs that give us back our freedom.

TRANSCRIPT

  • 1. free software'sgolden ageglyn moody

2. 30+ years of free software Richard Stallman (born 1953) hacker at MIT's AI Lab free operating system GNU project 1983 "GNU's Not Unix" GNU General Public Licence written constitution for hackers 3. 20+ years of Linux Linus Torvalds (born December1969) "I'm doing a (free) operatingsystem (just a hobby, won't be bigand professional like gnu)" - 25August 1991 Linux 0.01 (10 users)- September1991 Linux 0.12 (100s users) - January1992 Linux 1.0 (100,000s users) - March1994 4. 15+ years of open source Freeware Summit April 1998 Richard Stallman not invited avoid ambiguity of "freesoftware" "freeware", "sourceware", "freedsoftware", "open source" suggested by Christine Peterson,Foresight Institute Open Source Definition other licences 5. free/libre/open sourcesoftware won Internet the Web itself is open source Apache, nginx, BIND, Sendmail supercomputers 93% of top 500 supercomputers runLinux smartphones 80% run Android embedded/Internet of Things 6. what is free software? a philosophy (Richard Stallman) the freedom to run the program asyou wish, for any purpose. the freedom to study how theprogram works, and change it so itdoes your computing as you wish. the freedom to redistribute copiesso you can help your neighbour. the freedom to distribute copiesof your modified versions toothers. 7. what is open source? a methodology (Linus Torvalds) Net-based open to everyone liberal licence collaborative modular produces better code, morequickly, that spreads morerapidly open innovation 8. open methodology open content open access open data open science open government open hardware open everything... 9. open content Wikipedia (2001) Creative Commons licences (2001) social media sharing Blogger, Tumblr Facebook, vKontakte Twitter, Google+, Sina Weibo YouTube, Dailymotion, Vimeo Flickr, Instagram WhatsApp, Snapchat, Viber, WeChat,Tencent QQ 10. open access arXiv preprint repository 16 August 1991 - 9 days before 1stannouncement of Linux Paul Ginsparg knew of Richard Stallman knew free software, used it Public Library of Science (PLOS) August 2001 inspired by arXiv public genome databases 11. open data Human Genome Project (1990) collaborative open genomic data Bermuda Principles (1996): rapidrelease of data into public domain OpenStreetMap (2004) collaborative open map data inspired by Wikipedia open journalism bellingcat.com (2014) "open source" information 12. open science chemistry: Blue Obelisk "driven by a belief in OpenSource, Open Standards and OpenData, expressed in code, data,algorithms, specifications,tutorials, demonstrations,articles" mathematics: Gowers's Polymath astronomy: Galaxy Zoo 100,000 people classified 900,000galaxies 13. open hardware Arduino (2005) single-board microcontroller forinteractive projects open source cars open source 3D printer - RepRap self-replicating open source code open source hardware 14. open everything open source wellness shoes open politics (crowdsourcing) Icelandic constitution Finnish copyright reform open money Bitcoin Core (MIT licence) 15. what's left? what's the biggest challenge inthe world of computers today? hint: *not* the desktop what's the biggest *threat* inthe world of computers that needscountering? hint: ask Edward Snowden 16. what Snowden told us the bad news NSA/GCHQ/BND/etc. watch*everything* we do online, all thetime, and store key aspects of it the good news "Encryption works. Properlyimplemented strong crypto systemsare one of the few things that youcan rely on." what is "properly implemented"? 17. crypto must be open Bruce Schneier "In the cryptography world, weconsider open source necessary forgood security; we have fordecades. Public security is alwaysmore secure than proprietarysecurity. It's true forcryptographic algorithms, securityprotocols, and security sourcecode. For us, open source isn'tjust a business model; it's smartengineering practice." 18. open crypto software the next big challenge is to stopsurveillance by building opencrypto into *everything* 3 main categories connectivity communications content 19. encrypted connectivity Virtual Private Network (VPN) OpenVPN The Onion Router TOR Hidden Services mesh networks Commotion - uses mobile phones,computers, other wireless devices FabFi - uses off-the-shelfelectronics 20. encrypted communications OpenPGP, Pretty Easy Privacy email MailPile, Pixelated chat Cryptocat, Off The Record (OTR) mobile software whispersystems (Shuttleworthfunded) - RedPhone, TextSecure mobile system ind.ie 21. encrypted content FreeNet decentralised distributed datastore Opennet mode (users connect toarbitrary other users) Darknet mode (users connect onlyto "friends" with whom theypreviously exchanged public keys) GNUnet decentralized, peer-to-peernetworking 22. the next golden age all the programs discussed aboveare free software anyone can join project anyone can study them, use asbasis of new projects first golden age of open sourcegave us an open world now time to build a free one 23. get [email protected]@glynmoody on Twitter@glynmoody on identi.ca+glynmoody on Google+opendotdotdot.blogspot.com