SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Free as in freedom.
The importance of FOSS
in the surveillance era
Avv. Giovanni Battista Gallus
LL.M. Ph.d. ISO 27001 Lead Auditor
2
The “Circolo dei Giuristi Telematici", founded
in 1998, is the oldest Italian association of
“cyberlawyers”
Very active mailing list, with many members,
including attorneys, in-house lawyers,
consultants, law professors and forensics
experts.
More information (Italian only):
info@giuristitelematici.net
http://www.giuristitelematici.it
@CircoloGT
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
Exactly one year ago...
@gbgallusAvv. Giovanni Battista Gallus
(Council of Europe
Commissioner for human
rights)
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
"Even though the prime minister has declared that "there are presently no
plans to attack [Tor-type] anonimizaton", we expect that the coming laws
(for instance the one extending for another 3 months the state of
emergency) might include anti-strong crypto provisions, either directly
in the law project or through amendments during the Parliamentary
deliberation. We consider that this is the most critical issue on the
agenda of digital issues stricto sensu (the rest belonging to the no
less worrying domain of general tramping on fundamental rigths).”
Philippe Agrain, La Quadrature du Net
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
Simplified
workflow for the
war on terror
May be
used by
terrorists
X
(device,
infrastructure,
software...)
BAN!!! OK!
START
STOP
Yes No
@gbgallusAvv. Giovanni Battista Gallus
Should we ban all
black Seat?
@gbgallusAvv. Giovanni Battista Gallus
What about Ford
F250 and Toyota
pickup trucks?
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
By NicoBZH from Saint Etienne - Loire, France [CC BY-
SA 2.0, via Wikimedia Commons
Let me be crystal clear:
Weakening encryption or taking
it away harms good people who
are using it for the right reason
Tim Cook
16 January 2016 (Encryption in France)
France may prohibit strong encryption.
If that happens, I may be unable ever to
go to France again.
RMS
Very unlikely allies ...
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
●
If we can't have a
backdoor or ban
encryption, we'll use ...
@gbgallusAvv. Giovanni Battista Gallus
●
"The easiest way for someone to
eavesdrop on your communications
isn’t to intercept them in transit
anymore; it’s to hack your computer.
And there’s a lot of government
hacking going on.”
Bruce Schneier, Data and Goliath,
2015
@gbgallusAvv. Giovanni Battista Gallus
●
The
“Bundestrojaner”
(aka State Trojan)
Photo by Leralle
@gbgallusAvv. Giovanni Battista Gallus
●
UK Draft Investigatory
powers bill
@gbgallusAvv. Giovanni Battista Gallus
●
Food for thoughts
It is a lie that the state of emergency
protects democracy. Historians do
know that it is the opposite.
The state of emergency is the
device which has been used by
totalitarian regimes in Europe
Giorgio Agamben, Le Monde
@gbgallusAvv. Giovanni Battista Gallus
●
Food for thoughts
The "security" they talk about does not aim at
preventing terrostist act (which is really
difficult [...]), but rather to establish a
widespread and limitless controll on the
population (that's why they are so focused on
the total control of citizens' data, including
full access to the content of any device)
Giorgio Agamben, Le Monde
@gbgallusAvv. Giovanni Battista Gallus
What can we do?
Ludovic Hirlimann
@gbgallusAvv. Giovanni Battista Gallus
●
Develop secure SW
"The real problem is that few
developers learn how to develop
secure software, even though nearly
all programs are under attack
(because they connect to the Internet
or take data from the Internet)”
David A. Wheeler
How to Prevent the next Heartbleed
@gbgallusAvv. Giovanni Battista Gallus
●
Use a standard FLOSS
license
"I believe that much more code
review and many more contributions
would occur if OpenSSL used a
standard widely-used license.”
David A. Wheeler
How to Prevent the next Heartbleed
@gbgallusAvv. Giovanni Battista Gallus
●
What can we do?
Fight the FUD!
Become active citizens, and raise
awareness
Develop better & simpler tools
Support all advocacy groups which are
fighting the costly battle for
fundamental rights
@gbgallusAvv. Giovanni Battista Gallus
By NicoBZH from Saint Etienne - Loire, France [CC BY-
SA 2.0, via Wikimedia Commons
He who sacrifices [free software] freedom for 
security deserves neither
Benjamin Franklin meets RMS
@gbgallusAvv. Giovanni Battista Gallus
Questions?Questions?
@gbgallusAvv. Giovanni Battista Gallus
●
Thank you
Avv. Giovanni Battista Gallus
gallus@array.eu @gbgallus
Unless stated otherwise,
all texts are distributed
under a Creative Commons
Attribution – non
commercial – sharealike
3.0 Unported license

Contenu connexe

Similaire à Importance of FOSS Surveillance Era

Trojans and criminal investigation: is it possibile to find a balance with fu...
Trojans and criminal investigation: is it possibile to find a balance with fu...Trojans and criminal investigation: is it possibile to find a balance with fu...
Trojans and criminal investigation: is it possibile to find a balance with fu...Giovanni Battista Gallus
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb GhallabFahmi Albaheth
 
How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...Moldova ICT Summit
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital eraCHEMISTRY AGENCY
 
How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot GlobalTechCouncil
 
We Are Social: Curiosity Stop #7
We Are Social: Curiosity Stop #7We Are Social: Curiosity Stop #7
We Are Social: Curiosity Stop #7We Are Social
 
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGESTGOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGESTSteven Rhyner
 
Controlling Anarchy in the Ecosystem: Centralized Content for the Internet o...
Controlling Anarchy in the Ecosystem:  Centralized Content for the Internet o...Controlling Anarchy in the Ecosystem:  Centralized Content for the Internet o...
Controlling Anarchy in the Ecosystem: Centralized Content for the Internet o...Tomas Puig
 
Dell jort kollerie
Dell jort kollerieDell jort kollerie
Dell jort kollerieBigDataExpo
 
Robotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentationRobotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentationGiovanni Battista Gallus
 
Google in China
Google in China Google in China
Google in China guestfbc5d4
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and techMomokoImamura
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentationguestfbc5d4
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)Gerd Leonhard
 
The future of internet
The future of internetThe future of internet
The future of internetpsp710
 
Panama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital AgePanama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital AgeOnline News Association
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 

Similaire à Importance of FOSS Surveillance Era (20)

Trojans and criminal investigation: is it possibile to find a balance with fu...
Trojans and criminal investigation: is it possibile to find a balance with fu...Trojans and criminal investigation: is it possibile to find a balance with fu...
Trojans and criminal investigation: is it possibile to find a balance with fu...
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot
 
We Are Social: Curiosity Stop #7
We Are Social: Curiosity Stop #7We Are Social: Curiosity Stop #7
We Are Social: Curiosity Stop #7
 
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGESTGOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
 
Controlling Anarchy in the Ecosystem: Centralized Content for the Internet o...
Controlling Anarchy in the Ecosystem:  Centralized Content for the Internet o...Controlling Anarchy in the Ecosystem:  Centralized Content for the Internet o...
Controlling Anarchy in the Ecosystem: Centralized Content for the Internet o...
 
Dell jort kollerie
Dell jort kollerieDell jort kollerie
Dell jort kollerie
 
Robotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentationRobotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentation
 
Google in China
Google in China Google in China
Google in China
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentation
 
Take Down
Take DownTake Down
Take Down
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
 
The future of internet
The future of internetThe future of internet
The future of internet
 
Panama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital AgePanama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital Age
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 

Plus de Giovanni Battista Gallus

Presentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di TorinoPresentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di TorinoGiovanni Battista Gallus
 
Free/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issuesFree/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issuesGiovanni Battista Gallus
 
I droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallusI droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallusGiovanni Battista Gallus
 
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista GallusPresentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista GallusGiovanni Battista Gallus
 
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...Giovanni Battista Gallus
 
Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Giovanni Battista Gallus
 

Plus de Giovanni Battista Gallus (10)

Presentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di TorinoPresentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di Torino
 
Free/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issuesFree/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issues
 
Gallus presentazione droni_cortina
Gallus presentazione droni_cortinaGallus presentazione droni_cortina
Gallus presentazione droni_cortina
 
I droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallusI droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallus
 
Ijf14 tutela fonti_anonime_gallus
Ijf14 tutela fonti_anonime_gallusIjf14 tutela fonti_anonime_gallus
Ijf14 tutela fonti_anonime_gallus
 
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista GallusPresentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
 
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
 
Presentazione_linuxday
Presentazione_linuxdayPresentazione_linuxday
Presentazione_linuxday
 
Gallus oristano 25.2.12
Gallus oristano 25.2.12Gallus oristano 25.2.12
Gallus oristano 25.2.12
 
Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008
 

Dernier

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 

Dernier (20)

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 

Importance of FOSS Surveillance Era

  • 1. Free as in freedom. The importance of FOSS in the surveillance era Avv. Giovanni Battista Gallus LL.M. Ph.d. ISO 27001 Lead Auditor
  • 2. 2 The “Circolo dei Giuristi Telematici", founded in 1998, is the oldest Italian association of “cyberlawyers” Very active mailing list, with many members, including attorneys, in-house lawyers, consultants, law professors and forensics experts. More information (Italian only): info@giuristitelematici.net http://www.giuristitelematici.it @CircoloGT
  • 5. @gbgallusAvv. Giovanni Battista Gallus Exactly one year ago...
  • 6. @gbgallusAvv. Giovanni Battista Gallus (Council of Europe Commissioner for human rights)
  • 11. @gbgallusAvv. Giovanni Battista Gallus "Even though the prime minister has declared that "there are presently no plans to attack [Tor-type] anonimizaton", we expect that the coming laws (for instance the one extending for another 3 months the state of emergency) might include anti-strong crypto provisions, either directly in the law project or through amendments during the Parliamentary deliberation. We consider that this is the most critical issue on the agenda of digital issues stricto sensu (the rest belonging to the no less worrying domain of general tramping on fundamental rigths).” Philippe Agrain, La Quadrature du Net
  • 13. @gbgallusAvv. Giovanni Battista Gallus Simplified workflow for the war on terror May be used by terrorists X (device, infrastructure, software...) BAN!!! OK! START STOP Yes No
  • 14. @gbgallusAvv. Giovanni Battista Gallus Should we ban all black Seat?
  • 15. @gbgallusAvv. Giovanni Battista Gallus What about Ford F250 and Toyota pickup trucks?
  • 17. @gbgallusAvv. Giovanni Battista Gallus By NicoBZH from Saint Etienne - Loire, France [CC BY- SA 2.0, via Wikimedia Commons Let me be crystal clear: Weakening encryption or taking it away harms good people who are using it for the right reason Tim Cook 16 January 2016 (Encryption in France) France may prohibit strong encryption. If that happens, I may be unable ever to go to France again. RMS Very unlikely allies ...
  • 19. @gbgallusAvv. Giovanni Battista Gallus ● If we can't have a backdoor or ban encryption, we'll use ...
  • 20. @gbgallusAvv. Giovanni Battista Gallus ● "The easiest way for someone to eavesdrop on your communications isn’t to intercept them in transit anymore; it’s to hack your computer. And there’s a lot of government hacking going on.” Bruce Schneier, Data and Goliath, 2015
  • 21. @gbgallusAvv. Giovanni Battista Gallus ● The “Bundestrojaner” (aka State Trojan) Photo by Leralle
  • 22. @gbgallusAvv. Giovanni Battista Gallus ● UK Draft Investigatory powers bill
  • 23. @gbgallusAvv. Giovanni Battista Gallus ● Food for thoughts It is a lie that the state of emergency protects democracy. Historians do know that it is the opposite. The state of emergency is the device which has been used by totalitarian regimes in Europe Giorgio Agamben, Le Monde
  • 24. @gbgallusAvv. Giovanni Battista Gallus ● Food for thoughts The "security" they talk about does not aim at preventing terrostist act (which is really difficult [...]), but rather to establish a widespread and limitless controll on the population (that's why they are so focused on the total control of citizens' data, including full access to the content of any device) Giorgio Agamben, Le Monde
  • 25. @gbgallusAvv. Giovanni Battista Gallus What can we do? Ludovic Hirlimann
  • 26. @gbgallusAvv. Giovanni Battista Gallus ● Develop secure SW "The real problem is that few developers learn how to develop secure software, even though nearly all programs are under attack (because they connect to the Internet or take data from the Internet)” David A. Wheeler How to Prevent the next Heartbleed
  • 27. @gbgallusAvv. Giovanni Battista Gallus ● Use a standard FLOSS license "I believe that much more code review and many more contributions would occur if OpenSSL used a standard widely-used license.” David A. Wheeler How to Prevent the next Heartbleed
  • 28. @gbgallusAvv. Giovanni Battista Gallus ● What can we do? Fight the FUD! Become active citizens, and raise awareness Develop better & simpler tools Support all advocacy groups which are fighting the costly battle for fundamental rights
  • 29. @gbgallusAvv. Giovanni Battista Gallus By NicoBZH from Saint Etienne - Loire, France [CC BY- SA 2.0, via Wikimedia Commons He who sacrifices [free software] freedom for  security deserves neither Benjamin Franklin meets RMS
  • 30. @gbgallusAvv. Giovanni Battista Gallus Questions?Questions?
  • 31. @gbgallusAvv. Giovanni Battista Gallus ● Thank you Avv. Giovanni Battista Gallus gallus@array.eu @gbgallus Unless stated otherwise, all texts are distributed under a Creative Commons Attribution – non commercial – sharealike 3.0 Unported license