WEBVTT

00:00.000 --> 00:12.000
So, the next speaker is Macdog, and he's going to talk about privacy, and so many of these

00:12.000 --> 00:14.000
in a post-quantum-mopen world.

00:14.000 --> 00:17.000
Can everybody hear me?

00:17.000 --> 00:18.000
Good.

00:18.000 --> 00:20.000
Who is Macdog?

00:20.000 --> 00:24.000
I've been about a long time, but I'm not even going to worry about this slide.

00:24.000 --> 00:27.000
You can read about it later.

00:27.000 --> 00:32.000
But I want to talk about kings and surfs.

00:32.000 --> 00:35.000
A king is a sovereign.

00:35.000 --> 00:37.000
You people in Europe know a lot about that.

00:37.000 --> 00:42.000
We had a little trouble with him, a person named King George, while back.

00:42.000 --> 00:45.000
But kings tell this surfs what to do.

00:45.000 --> 00:48.000
You know, the king owns the land, the king owns everything.

00:48.000 --> 00:54.000
The king tells the surfs when to farm, how much taxes to pay them and stuff like that.

00:54.000 --> 00:58.000
You get buried, and the surfs own nothing.

00:58.000 --> 01:03.000
Now, here in the United States, or in the United States, we don't know that much about kings,

01:03.000 --> 01:06.000
but we do know about slaves.

01:06.000 --> 01:09.000
And in the slave, when you're a slave, you own nothing.

01:09.000 --> 01:13.000
You know, you don't even, you told who to marry when to have children.

01:13.000 --> 01:20.000
You don't have any food except that the master gives you slaves own nothing.

01:21.000 --> 01:25.000
When you are close to his company, you and the masters.

01:25.000 --> 01:29.000
You tell people where to put their software when to update their software.

01:29.000 --> 01:33.000
When their hardware is obsolete, Windows 10.

01:33.000 --> 01:39.000
How many people can use your software and when to retire your software, Windows XP?

01:39.000 --> 01:44.000
Do you realize that there are over 12 million people still using Windows XP?

01:44.000 --> 01:46.000
Yeah, they can't get rid of it.

01:46.000 --> 01:48.000
They can't go onto something else.

01:48.000 --> 01:50.000
They don't have the device drivers for their hardware,

01:50.000 --> 01:53.000
and they don't have the applications for the software.

01:53.000 --> 01:57.000
And so they're stuck still using Windows XP.

01:57.000 --> 02:01.000
So close to his users or software slaves.

02:01.000 --> 02:05.000
An open source is really not much better.

02:05.000 --> 02:07.000
It's great for developers.

02:07.000 --> 02:09.000
It's great for companies.

02:09.000 --> 02:15.000
You can develop things faster because you have these large blocks of software that you can go and use.

02:15.000 --> 02:19.000
You can integrate and change to meet your needs.

02:19.000 --> 02:22.000
That makes it efficient for you.

02:22.000 --> 02:26.000
But for the end user, you're still a lot of time stuck.

02:26.000 --> 02:32.000
Because all you get is the binary from the company that uses the open source.

02:32.000 --> 02:37.000
And so many of the determinants of closed source still apply.

02:38.000 --> 02:46.000
Free done software is the path which is stolen when you've got them drunk enough with lament.

02:46.000 --> 02:52.000
That it was, you made a mistake calling it free software because everybody thinks it's grottas software.

02:52.000 --> 02:54.000
You know, in English we have this problem.

02:54.000 --> 02:57.000
Free is in freedom and free is in grottas.

02:57.000 --> 03:01.000
A lot of other countries and languages have it much better.

03:02.000 --> 03:11.000
And when you have free software, you can put it wherever you want because you have the source code that you can compile for the architecture that you need.

03:11.000 --> 03:15.000
You can upgrade the software when you want to.

03:15.000 --> 03:18.000
And for as many users as you want.

03:18.000 --> 03:21.000
And some people say, well, Matt, I don't have the expertise to do that.

03:21.000 --> 03:24.000
You know, I'm a business person or whatever.

03:24.000 --> 03:30.000
But you have all the ingredients and you can go out and hire somebody who does have the expertise.

03:30.000 --> 03:33.000
To help your solve your problem.

03:33.000 --> 03:37.000
So now it becomes a business question for you.

03:37.000 --> 03:48.000
Is it worthwhile to live with what I have or do I spend the money to hire the expertise in order to get what I need?

03:48.000 --> 03:51.000
But business people really hate the word freedom.

03:51.000 --> 03:54.000
Politicians hate it too.

03:54.000 --> 03:59.000
They don't like anything about freedom because that means that their customers can go off to a different way.

03:59.000 --> 04:03.000
No off to a different, no vendor.

04:03.000 --> 04:05.000
With freedom comes choice.

04:05.000 --> 04:08.000
And with freedom comes competition.

04:08.000 --> 04:12.000
But what business people like is the word control.

04:12.000 --> 04:16.000
When they have the control of their business.

04:16.000 --> 04:20.000
So you go out to talk to a business person about using free software.

04:20.000 --> 04:25.000
You say, hey, you know, don't talk to nothing about the freedom part.

04:25.000 --> 04:27.000
Think about the control part.

04:27.000 --> 04:29.000
And they'll be much more likely to have it.

04:29.000 --> 04:34.000
Now, in other words, it was being up lately as sovereignty.

04:34.000 --> 04:36.000
I can't count the number of times.

04:36.000 --> 04:37.000
You're at Boston.

04:37.000 --> 04:39.000
I've heard the word sovereignty.

04:39.000 --> 04:43.000
You know, and we think about it as country and country sovereignty.

04:43.000 --> 04:46.000
We want to keep the data in our own country as sovereign.

04:46.000 --> 04:48.000
Under our own laws as sovereign.

04:48.000 --> 04:49.000
Okay.

04:49.000 --> 04:54.000
And I have to thank Donald Trump for bringing this to the forefront.

04:54.000 --> 04:57.000
Yeah, right.

04:57.000 --> 05:02.000
But now the rest of the world needs sovereignty, okay?

05:02.000 --> 05:06.000
But it's not just a sovereignty of the data like we've been hearing about for years,

05:06.000 --> 05:09.000
but the sovereignty of the software.

05:09.000 --> 05:13.000
Where does a company reside at owns the software?

05:13.000 --> 05:16.000
Do they reside in California like a lot of them do?

05:16.000 --> 05:19.000
Do they reside in the state of Washington like a lot of them do?

05:19.000 --> 05:22.000
And can the United States government come along and say,

05:22.000 --> 05:26.000
no, Cuba can't use your software.

05:26.000 --> 05:30.000
I ran, can't use your software.

05:30.000 --> 05:36.000
Or the international court can't use your software and I'm going to turn it off.

05:36.000 --> 05:38.000
You can't live with that.

05:38.000 --> 05:39.000
You can't live with that.

05:39.000 --> 05:42.000
And sovereignty goes to also the design chain,

05:42.000 --> 05:49.000
the manufacturing supply chain of your hardware and your software.

05:50.000 --> 05:53.000
The users need to have control.

05:53.000 --> 05:55.000
And now there's one more consideration.

05:55.000 --> 05:58.000
I haven't heard talked about a lot in this thing.

05:58.000 --> 06:00.000
It's quantum computing.

06:00.000 --> 06:02.000
It is coming.

06:02.000 --> 06:07.000
You know, and we need to take all the data which we've been encrypting for all these years,

06:07.000 --> 06:11.000
using our nice encryption techniques based on prime numbers.

06:11.000 --> 06:16.000
And we need to fix that because when quantum computing is here,

06:16.000 --> 06:19.000
they're going to be able to decrypt using brute force.

06:19.000 --> 06:25.000
These prime number, you know, algorithms in about 15 seconds.

06:25.000 --> 06:28.000
And this also includes our VPNs.

06:28.000 --> 06:32.000
There are algorithms out there now, which I'm going to say are quantum,

06:32.000 --> 06:36.000
I'm not going to say quantum proof because I don't believe anything is proof.

06:36.000 --> 06:38.000
But they're quantum resistant.

06:38.000 --> 06:42.000
And we need to use these algorithms.

06:42.000 --> 06:45.000
And we need to move towards multi-factor authentication.

06:45.000 --> 06:49.000
We can't post our posted notes up on our screen anymore,

06:49.000 --> 06:51.000
with our password on it.

06:51.000 --> 06:52.000
Okay.

06:52.000 --> 06:54.000
And we can't even use passphrases,

06:54.000 --> 07:00.000
and we thought we're pretty good because they're susceptible.

07:00.000 --> 07:03.000
And we don't have plenty of time to do this because,

07:03.000 --> 07:06.000
oh, it's mad dog, quantum computing is 10 years,

07:06.000 --> 07:10.000
no, no, five years, no, two years away.

07:10.000 --> 07:15.000
No, because the problem is there are people going around stealing the data today,

07:15.000 --> 07:20.000
and when quantum computing comes, they're going to decrypt it tomorrow.

07:20.000 --> 07:25.000
And the secrets that you have in there are going to be just as effective,

07:25.000 --> 07:29.000
just as valuable when they can decrypt it.

07:29.000 --> 07:32.000
So we need to start doing this now.

07:32.000 --> 07:35.000
Okay. You need to go back to your organizations to say,

07:35.000 --> 07:37.000
the algorithms exist.

07:37.000 --> 07:39.000
Let's start doing the work to do it.

07:39.000 --> 07:44.000
This is just like Y2K, only worse, because with Y2K, you simply stop.

07:44.000 --> 07:47.000
Okay.

07:47.000 --> 07:52.000
We also need to work on encrypted VPNs, we call them QPNs,

07:52.000 --> 07:54.000
because while your VPN is going,

07:54.000 --> 07:57.000
the quantum computers are going to be able to decrypt it,

07:57.000 --> 07:59.000
they're going to be able to get the keys,

07:59.000 --> 08:04.000
and they're going to be able to tap in to your VPN.

08:05.000 --> 08:09.000
So what cloud do you use now, and under whose laws

08:09.000 --> 08:14.000
there's been a lot of talk in the opening keynotes of stuff about migration,

08:14.000 --> 08:17.000
and all the stuff that's going on. Great.

08:17.000 --> 08:20.000
I was doing this 20 years ago.

08:20.000 --> 08:23.000
20 years ago, I was talking about the United States

08:23.000 --> 08:25.000
and the fact you can't trust it.

08:25.000 --> 08:26.000
Okay.

08:26.000 --> 08:28.000
And I didn't even have Trump at that time.

08:28.000 --> 08:32.000
You were still doing his apprentice program.

08:32.000 --> 08:37.000
But you also have to look at your supply chain for your hardware.

08:37.000 --> 08:39.000
What chipset do they use?

08:39.000 --> 08:41.000
Where is it made?

08:41.000 --> 08:46.000
And I can tell you stories about people and certain agencies

08:46.000 --> 08:49.000
that dare not say their name, but they only have three letters in them,

08:49.000 --> 08:54.000
who can go in and they can make a chip that looks exactly like the chip

08:54.000 --> 08:57.000
that you think you're using, but it's not.

08:57.000 --> 09:00.000
And they will intercept your board,

09:00.000 --> 09:04.000
and they will replace that chip, and they'll send it on its way.

09:04.000 --> 09:07.000
And now you've got a chip that they can crack into.

09:07.000 --> 09:10.000
If you think I'm kidding you, I am not.

09:10.000 --> 09:11.000
Okay.

09:11.000 --> 09:14.000
You also have to look at things that you said your boot code.

09:14.000 --> 09:15.000
You should boot code trust it.

09:15.000 --> 09:18.000
You need to be able to look all the way down.

09:18.000 --> 09:21.000
And again, you say, I don't have the expertise to do that.

09:21.000 --> 09:24.000
My mom and dad doesn't have the expertise to do that,

09:24.000 --> 09:28.000
but this is why we need a community of trusted people

09:28.000 --> 09:32.000
to look at it and find it when it's there.

09:32.000 --> 09:36.000
And today, thank God, we have freedom software.

09:36.000 --> 09:40.000
And today, thank God, we have the RISFIVE project.

09:40.000 --> 09:43.000
It was started at the University of California, Berkeley,

09:43.000 --> 09:47.000
to give us the same BSD code, a lot of us depend on.

09:47.000 --> 09:49.000
And now they've moved it to Switzerland.

09:49.000 --> 09:51.000
Why did they do that?

09:51.000 --> 09:53.000
I wonder why.

09:53.000 --> 09:54.000
Okay?

09:54.000 --> 09:56.000
They had their reasons.

09:57.000 --> 09:59.000
But we need software and clouds.

09:59.000 --> 10:04.000
Clouds where you need them and clouds that are built for security first.

10:04.000 --> 10:08.000
By the very definition, the clouds we used today are not secure.

10:08.000 --> 10:11.000
Because the first thing you have to do is to log into them.

10:11.000 --> 10:15.000
That means that they're visible to the bad people

10:15.000 --> 10:18.000
and they're visible to you.

10:18.000 --> 10:22.000
And you need to have them in the location where you want them.

10:22.000 --> 10:25.000
And you need to have the software under your control.

10:25.000 --> 10:29.000
So, I am consultant for a company.

10:29.000 --> 10:31.000
I'm wearing their badge here.

10:31.000 --> 10:33.000
Q Sentinel, A.G.

10:33.000 --> 10:35.000
They're located in Switzerland.

10:35.000 --> 10:37.000
They have a data center.

10:37.000 --> 10:39.000
There's a hardened data center in Switzerland.

10:39.000 --> 10:43.000
They have missed approved quantum encryption.

10:43.000 --> 10:45.000
They have open source.

10:45.000 --> 10:46.000
They use next cloud.

10:46.000 --> 10:49.000
And they have, and they're going to be using, I think,

10:49.000 --> 10:52.000
Udu as the ERP system.

10:52.000 --> 10:56.000
They have end-to-end security and sovereign AI.

10:56.000 --> 10:58.000
What do I mean by sovereign AI?

10:58.000 --> 11:04.000
If you use AI, the model that you keep applying your questions against

11:04.000 --> 11:06.000
learns from your questions.

11:06.000 --> 11:11.000
But that model is shared typically amongst lots of people.

11:11.000 --> 11:15.000
So, in effect, those people can find out the information that you're putting,

11:15.000 --> 11:20.000
that you're giving it, teaching this model from AI.

11:20.000 --> 11:25.000
sovereign AI is one that has the model that sits isolated from everybody else.

11:25.000 --> 11:30.000
When you query it, you don't give any of your information to anybody else.

11:30.000 --> 11:33.000
You're a control of the AI.

11:33.000 --> 11:35.000
You can create your own AI models.

11:35.000 --> 11:39.000
But those are only seen by you.

11:39.000 --> 11:42.000
And it's less than simple to your own data center.

11:42.000 --> 11:45.000
So, if you have a data center in your country,

11:45.000 --> 11:50.000
we basically create a container that can be plopped onto a

11:50.000 --> 11:54.000
Lidic system, Red Hat, Susa, a Debian.

11:54.000 --> 12:03.000
And that can become this whole system for doing secure, sovereign cloud.

12:03.000 --> 12:05.000
Now, that was the product.

12:05.000 --> 12:06.000
I'm going to move away from that now.

12:06.000 --> 12:09.000
I'm going to talk about a community cloud.

12:09.000 --> 12:12.000
In the year 2010, a man by the name of Ebon,

12:12.000 --> 12:15.000
in Oakland, who was a law professor at Columbia University.

12:15.000 --> 12:16.000
You may know him.

12:16.000 --> 12:19.000
He wrote the GPL version 3.

12:19.000 --> 12:22.000
Ebon is very concerned about security and privacy.

12:22.000 --> 12:26.000
And so, he started a project called FreedomBox.org.

12:26.000 --> 12:32.000
It is a tiny little server that sits on a single-port computer,

12:32.000 --> 12:33.000
like this one.

12:33.000 --> 12:36.000
This is a lab of door as part of the Kineena's Lucas project,

12:36.000 --> 12:41.000
which I started back in 2012 to allow Brazil to design a complete

12:41.000 --> 12:49.000
computer, design, manufacture, set up supply lines and things like that in Brazil

12:49.000 --> 12:51.000
and in Latin America.

12:51.000 --> 12:53.000
It's an open-source design.

12:53.000 --> 12:54.000
It's available.

12:54.000 --> 12:57.000
But FreedomBox can also work on Raspberry Pi.

12:57.000 --> 13:01.000
It can also work on a bigal bones.

13:01.000 --> 13:05.000
It can work on lots of different little single-port computers.

13:05.000 --> 13:10.000
And you can also do backup from the little computer that plugs in your house

13:10.000 --> 13:12.000
and runs at your house.

13:12.000 --> 13:15.000
And you can send the data to a friend's system.

13:15.000 --> 13:17.000
Many miles away.

13:17.000 --> 13:19.000
So, in case it's a fire, a flood or earthquake,

13:19.000 --> 13:22.000
or military comes into your house.

13:22.000 --> 13:24.000
You have your status safe there.

13:24.000 --> 13:26.000
It supports on top of this,

13:26.000 --> 13:28.000
Fediverse DiParty Software.

13:28.000 --> 13:32.000
So, diaspora and all of the things that we can reply

13:32.000 --> 13:35.000
social software sits on top of this.

13:35.000 --> 13:37.000
And all of this software, by and away,

13:37.000 --> 13:40.000
is available in Debian releases.

13:40.000 --> 13:42.000
So, it's easy to install.

13:42.000 --> 13:45.000
It's easy to get going.

13:45.000 --> 13:48.000
Now, with all of that, we have one last factor.

13:48.000 --> 13:49.000
The one last thing that's missing.

13:49.000 --> 13:52.000
And that's multi-factor authentication.

13:52.000 --> 13:55.000
We need to get people to be serious about this, right?

13:55.000 --> 13:58.000
Everybody knows, log in name, password.

13:58.000 --> 13:59.000
You know, cat.

13:59.000 --> 14:00.000
Okay, there's my password.

14:00.000 --> 14:01.000
Great.

14:01.000 --> 14:03.000
But that's not good enough.

14:04.000 --> 14:07.000
Then we went to multiple, then we went to phrases.

14:07.000 --> 14:09.000
You know, past phrases.

14:09.000 --> 14:11.000
Still not good enough, because people can sit there

14:11.000 --> 14:13.000
and watch which you're typing.

14:13.000 --> 14:16.000
We need to have something that's really secure

14:16.000 --> 14:17.000
and multi-secure.

14:17.000 --> 14:19.000
So, my laptop right here.

14:19.000 --> 14:23.000
I can't, this is my laptop, but my laptop right there.

14:23.000 --> 14:29.000
I type in my password, but you also have to have my hardware key,

14:29.000 --> 14:32.000
which I have to plug into it before I can.

14:32.000 --> 14:34.000
Use it.

14:34.000 --> 14:38.000
And then, if I go to a library, for example,

14:38.000 --> 14:40.000
and I'm using a library computer,

14:40.000 --> 14:43.000
I can use this key to access my Google account,

14:43.000 --> 14:46.000
if I went to, or any other thing which has

14:46.000 --> 14:52.000
recognizes the standard software that goes with this.

14:52.000 --> 14:55.000
You know, you can do fingerprint.

14:55.000 --> 14:58.000
I don't like facial recognition because my beard is here

14:58.000 --> 15:00.000
and it hides most of my face.

15:01.000 --> 15:04.000
But geographical oriented time oriented day,

15:04.000 --> 15:06.000
oriented all these type of things,

15:06.000 --> 15:08.000
or multi-factor authentication.

15:08.000 --> 15:11.000
If you do get it hardware key, you really need to.

15:11.000 --> 15:14.000
Because if you lose one or stolen,

15:14.000 --> 15:17.000
you need to have the other one along with your mother,

15:17.000 --> 15:19.000
or in a safety deposit box,

15:19.000 --> 15:22.000
because you're not going to be able to get into your system.

15:22.000 --> 15:25.000
And you need to have it have a standard, like,

15:25.000 --> 15:29.000
or two, so where's the cost of wide variety of cloud projects

15:29.000 --> 15:32.000
and operating systems and things like that?

15:32.000 --> 15:36.000
And I like it to have an open design for two reasons.

15:36.000 --> 15:38.000
It has to be inspectable.

15:38.000 --> 15:40.000
You have to be able to look at it and make sure

15:40.000 --> 15:42.000
that there's nothing hidden in this.

15:42.000 --> 15:45.000
And it has to have a long life.

15:45.000 --> 15:49.000
So, I've been working with a company called SolarKeys.com.

15:49.000 --> 15:53.000
In 2001, they came out with a very nice key set.

15:53.000 --> 15:56.000
They were hit by COVID, they were hit by supply chain issues,

15:56.000 --> 15:58.000
and stuff like that, so they kind of fell behind,

15:58.000 --> 16:00.000
but they're starting to get back up again.

16:00.000 --> 16:02.000
It is a secure key.

16:02.000 --> 16:05.000
They also have a hacker version, so you can do your own work,

16:05.000 --> 16:06.000
and you can hack your own code,

16:06.000 --> 16:08.000
and stuff to put it into the key if you want to.

16:08.000 --> 16:12.000
And then you can tighten it down to lock it down.

16:12.000 --> 16:14.000
It is vital to compliant.

16:14.000 --> 16:18.000
It works on a wide variety of different operating systems and applications.

16:18.000 --> 16:20.000
With that, I'm done.

16:20.000 --> 16:22.000
Any questions?

16:22.000 --> 16:23.000
Yes, sir.

16:23.000 --> 16:28.000
I'm just going to let you slide to the subordinate.

16:28.000 --> 16:30.000
How do you see identity?

16:30.000 --> 16:32.000
What person will date to identity?

16:32.000 --> 16:36.000
Does that mean you sort of like, when you see the brighter?

16:36.000 --> 16:38.000
Well, again.

16:38.000 --> 16:42.000
Oh, let me see if I can repeat it.

16:42.000 --> 16:46.000
With sovereignty, what do I see about, I'm sorry, you say it again?

16:47.000 --> 16:52.000
Okay.

16:52.000 --> 16:56.000
So, in the secure Sentinel, it's really for a company, a corporation,

16:56.000 --> 17:01.000
and one of the things about huge Sentinel is that it's invisible from the outside,

17:01.000 --> 17:07.000
because it uses the QPN to communicate between the cloud and devices.

17:07.000 --> 17:11.000
So you have a systems administrator who actually sets up the accounts,

17:11.000 --> 17:14.000
sets up the devices, makes that connection.

17:15.000 --> 17:18.000
It's not the device that connects to the cloud.

17:18.000 --> 17:20.000
It's a cloud that connects to the device.

17:20.000 --> 17:27.000
That this is obviously for company and institutional sovereignty.

17:27.000 --> 17:31.000
And that is where freedom box comes in.

17:31.000 --> 17:35.000
For your personal stuff, keep it on freedom box.

17:35.000 --> 17:39.000
And freedom box can either be your own personal server,

17:39.000 --> 17:42.000
or it could be a community server,

17:42.000 --> 17:46.000
if you add the Fediver style party software when top of it.

17:46.000 --> 17:47.000
Okay.

17:47.000 --> 17:50.000
But that's where you keep your personal stuff to my things.

17:50.000 --> 17:53.000
Cat pictures, you can still send this to Google.

17:53.000 --> 17:56.000
Just keep sending this, cat pictures to Google,

17:56.000 --> 18:01.000
send them to Elon Musk, I'd like them to be in a day with cat pictures.

18:01.000 --> 18:06.000
Next question.

18:06.000 --> 18:07.000
Okay.

18:07.000 --> 18:08.000
Thank you very much.

18:09.000 --> 18:13.000
Thank you very much.

