Bestand wählen
Merken

Embedded freedom roundtable

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
I'm OK but unfortunately I am the speaker was actually you're going to give the talk that was on the schedule got ill and had to cancel last minute and luckily we actually have all which is working with the Replicant project had submitted some similar talk so since it was so short notice it was hard to prepare for a talk so we actually decided to do a round table also after stemming from below it me and this since both of them
represent slightly different ends of the spectrum in their approach to the problems and issues created by binary blobs and the issues we all suffer from it because of them but the idea is to have a few a sort of a round-table getting feedback from you guys also thinking about ideas thinking how maybe we can improve things by pressuring manufacturers more to actually release their source code or at least help us to get their devices running without having to get through extensive licensing expenses recompiles for just making the hardware more accessible to people of firsthand that ball explain his years and have a few projects in mind that our helping with it and then we'll move on to garrison and then will their comments discussions by these and was 0 this goes the right things that I so what I've been doing now for the past 4 years at replicants is mostly and replacing on non-free of blobs which are usually libraries and programs that's all or in a way of drivers because they are they relate to the holder directly and they are needed to actually give the holder features to work so those those pieces of our software that usually non-free on many different platforms and devices and what I've been doing entropic and on this to understand how these words and try to write for softer replacements for those I'm in the meantime also that involves with the Free Software Foundation arm to evaluate various and embedded devices so that I would just arises in a few different types of them so here you have mobile and non-mobile devices of and I've been working mobile devices of was replicants and so with that efforts of projects we've been looking at and non mobile devices such as single board computers so that means that the most famous uh 1 of those would be the Raspberry Pi but they are actually really a crazy amount of all the boards and that all computers as well and that's all more or less interesting for softer freedom so other looking at those in trying to find out exactly how they perform was free software and what what can we do in the free world and what is not just watching all what would do we need to rights of free software support for so this has been very interesting because and from that's very global view of the situation we are I was it'll reduces C a few major problems that we have today on regarding freedom on under the devices so long they're all billable max which which all areas where free software is just on just not there yet especially on graphics acceleration drivers and you use on and advice is a situation there are artists and a few years back it was a it was a real problem now thankfully we have virtually initiatives large uh freed rental and Lima and a few others and there are trying to come up with 3 drivers for graph deceleration of for a long time and for many platforms especially those the most of the 1 norm which is the poetry off from imagination tech for that we we don't have any results for support and but that's a real problem so that's a kind of a bottleneck that we have and that makes it very hard to use those under devices uh with free software in the free world and another very important issue and that 3 but for facing today is the fact that the early in the blue chain you in you have and voters which are which are all but that's visitors softer that's executed before the operating system starts before the year an external salts and those with voters I'm on many platforms than non-free and uh that that's a problem obviously but we do we would think yeah we could still understand how it works and replace them the problem is that we for various reasons especially to be able to run angiograms manufacturers has have been on enforcing said checks on those which has a it means events from the other piece of software is that is that is installed on the device has numeric signature which is then just the usual signature that you do is duty GM in this is the very very something and and their and their their their and the whole of will actually each section the signature and improve refused to boot if the the bootloader is not signed with the manufacturer's key in the private key and obviously the private keys private so we don't have any access to it so even if we were to rise and a free software Bouchard and we could not install it on the device and that's so
that's a very big issue for lots of different and so I'm talking about the sort of freedom here in the general meaning the way that Richard Stallman and talked about the 4 basic freedom of results that I think we all know about on the really the idea here is here and artists regarding my work is to me and to to to take that's ideal that's I mean it's it's an idea would be to try to push it as far as possible and try to have for free software you know everywhere that we can
so that that that's why I'm not
interested in those things and obviously they're all many underlying reasons especially if interested in security and privacy you definitely want and to have subterranean because with non-free software you you can't really trust of what's going on so this is why you know we've been doing all this in the the reserve there is really a lot of work to do there and so if you wanna come join in in our privative another view of the situation so here I am I that from different point of the spectrum where we have been taking in mostly open space technology and trying to ship a device with its which is the next challenge from when you had to have Nigel stack so um the real challenge is becomes is yes still bootloader center because close but you have to memorize modern mobile device in terms the software the you getting on its OK so the same Android phone it's typical an advert open source uh delivering than it is to ChIP-seq manufactures modifications to this and then still ODM as in the device makers modifications to its and between all that it becomes a huge licensing mass which is what we see from outside so that our approach has been to build that that yes we have hops uh we would like to ship because we would like to continue going to a Duke good open source that but at the same time if you have to um comments device makers to apply things in different ways you have to have good relationship with them which means volume and it means basically that you shipping love devices so this and I'll angle on the topic and but then the question is is where where where where bobo where does limit Gulf course that anything they can be a source should be obvious what I'd like to what uh but is time using the guns with mobile this very cutting edge u a device that has hardware from 2 years ago he sees no longer have remotely a syllable is 1 made just now with existing hardware us so what we did was stepped we um we have this the restrained where using the existing blocks from go at this this whole pool in a stack but it works and the gives us to shipping device uh where did that allows us to have more open source on top of that and but the thing is that and even if uh you go to China for exam 1 you to get a device made you go to a node and they often don't even understand licensing conditions that the decode they have a son of so it also becomes a matter of education and making people understand how this ecosystem works and even on uh we make him into looked at the moment and even on uh device where you would anticipate that you will be able to used to global so travel like listless like for example mess up you usually find these things in packages as in that you come that comes with support become so commercial support if you have a problem with deep GPU time on a GPU or you go in and the you block of a support request if you wanna win over so stack dismissal mean that you can get in can response so in that vein we've gone with what we know works with this particular kit because Mr. covers a generic case but for every single device that might be tiny tiny modification to that make the device actually work so I think there may be a steadfast of all what kind of difficulties to DUC and the making devices today that are sufficiently open source and free and especially with the technologies like you you where he if I had secure which can be both good and bad at same time for free software of the the all of the work of the the on it's is yeah and as far as I know there are 2 versions of the same over there is a nearly 1 and what they call the max I think the division and the new does have until graphics instead of the all there was only a 1 I think and they also allowed to run a free bias which is called what's there is an effort to port and so on and that's that's kind of nice yeah that's that's a good example of the Hey of yeah it shows that we can actually do something rights her and her candidates and another good example especially regarding so secure words and there are how effective it about uh single checks which all real problem but if we look at the from books from Google they have a very interesting security approach which is on that instead of necessary of taking the signature of of the 1st word voted to ensure that was modified they put it in a read-only memory and that that's that that can give grant you that it's not being modified so that it's safe and so you know there is no over its tutoring effect on if we trust that Google's including which and it's in the 1st place but what what's really good about it is that's in the the users can actually on that change its but they need physical access the device usually you they all required to open the case and are and you just remove a screw and that's and that's the physical contact that's not you know me and if you remove that's the agenda you can actually refashion the chip which is no longer really and that's a very interesting approach because for most customers is going to bring sufficient security and for for the people you is just 1 screw way to to be able to free advice so that's I think that's a pretty interesting approach so this that the hapless which for sample executable is always interesting but um have the middle then you come down to something like a security and privacy and I travel a lot to China and I tell to you as a times and it might be that my devices we stripped away June customs and I might have some pilot data on my device and it might be that by just having hapless which take these which then suddenly the protection that I thought I had it on my own signing keys is suddenly got so that's the kind the evil matrix as well as you have to watch out for as well I like to go to Boston and as you know phones get lost in sometimes I don't want my call the company data only my personal data my pictures to be still so is it should about finding a good balance and that you have this challenge with tap among we want to have a device that focus on privacy security and things like that but at the same time we need to find some balance between that and and openness and actual being able to hack freedom of brain systems on the the the you're seeing learning about the law on secure what and devices that the would only a all assigned along with images all 4 sunny phones we are providing the all the way born unlock your bootloader angry and would any unsigned all software only by providing us your e-mail address you will receive the Idris India might you would receive the code to unlock your form all our 2nd us the program it's still all now providing on all points almost completely open source environment for those those forms you all have binaries only for no more than and for display which is under no everything else it's open source and the code it's law that we use its will will without any by cheese soul that can can be done for every phone starting all with as manufacturers manufactured from 2014 and so all the new ones everything that will come out will have this feature for thanks the the so the the the the so just a quick look around so office it's great to be able to unlock the Bush alluded to run whatever
channel you want someone to system 1 and for people like cyanide among which is a community and would version of it's it's really necessary for them else it just it can't work but really well when I was talking about 4 that's too much earlier stage like I was looking at replacing the booklet in so having its and you know not so not being checked against of it is
1 that some that's on on many platforms especially in certain know which using a lot of Qualcomm platforms and those only exist in versions that do check the signatures and there are also the other chips are there something the owner of the ones that exist version that did not have those a text so on those you can have free referred as an attorney in the new board and the 2nd 1 is possible as well and now I know that for instance the Freescale ironists chips are as far as I know there is no version that Texas signatures so it's this in so what is 1 yes no yeah that that's what I wanted to what is known as well as all the pull from and platforms all these the yeah I don't they had no I know but then it's so that the whole question is about selecting good platforms and that are in uh in in Andhra devices so many areas important platforms i slot a vast majority really and those platforms all coming from our point of view of the full from the emphasis on view this is a fertile flow large we are going to do anything at all good with that's because if we can't have a free before the regents we can't do anything it's it's this fall semester the and so I suppose what are the questions I would have thought about the sequence of software that's reading through to a device and freedom associated with it is that what's the goal all of freeing of the software is the girl to free software as a goal in its own right you hinted that privacy and security home and the fact that the bootloader being provided for you is a mechanism by which you cannot be sure of the privacy and security however before the belated boots the the how there is picked buy by a lot mistaken the modem and the kind of the point being that ultimately down the down the hardware chain there's gonna be areas where you physically are going to be running burned-in commands and it's going be provided under going to be at the level of sophistication that you call realistically verify them without incredibly sophisticated analysis techniques that can realistically beyond our capabilities so I'm just kind of interesting in look the objective of some of these things up and if you're looking at privacy and security when
you access the control of the manufacturers in century yeah well they're all on generous situated on a general menu many different things to really true to understand so in that 1st of all the positive that the the the position of my personal position the position of the Free Software Foundation is that you cannot achieve privacy and security without free software if even if your bootloader is assigned an even if the for the manufacture it means that it's safe for us it doesn't mean at all that it's a few things about it perhaps as a back door but you can't replace that's how we see so that's the that's the thing that's just not good for security for us from our point of view and then there is also some about the model on some platforms especially on Qualcomm platforms and so again we don't have all the documentation about that but we have strong reasons to believe that Qualcomm the modern is basically in charge of everything it basically controls the CPU on which under it is running so that this is and this is why we think tough call comes even worse because there is no way that's only going to get out of the group of the model and going to be there and since it's running on software so anyway because it's all to replace and sign as well so you even if we even if we want to do it would be the same problem so those platforms call them further flows and we just don't work in them but and all the farms Ahmed homage in different ways the there are many examples of the result chips that don't have modems inside and this way you know that the modem doesn't have control of the CPU because there is no modern when you buy Wi-Fi only tell that there was no more than 1 so that's that's 1 of the problem messages about and so on devices where you have a model that is separate from the CPU we try to find out how it's connected between 0 and how 1 is right in between the other 2 figure welcome the modern access around each and modified can access storage can modify it that's really what we're trying to find out and it's hauled because obviously on the weekends you know which and so we know for sure because we don't we don't have stem in its 1st of all if any of before we had some of them and in some cases we do because sometimes the beach so we just we just see those but then what how can we know for sure that's the didn't decide around there until the condition to hide stuff we gems are we going to trace through the PCB you know the printed circuit board it's it's a it's insane there large often a different name is uh it would require learning you know in technical war so it's just to Hobbes so what we do is that that's we when we have proof that so and that's the links between the model and the CPU implies that the mother has uh a lot of control over the rest of the device we just say we know it's bad but when we didn't find such proof we can say we cannot say is good we can only say maybe it's good we don't we don't know for sure that is that but that's not a very good situation for for privacy and security that's why really a traffic and so we have a page that is called recommendation and there is a red box that says if you will doing something that is really serious life for a journalist working on some sensitive areas you should not use the phone at all because the chance trust that the model is not the interests of the just as simple as that so but but I think the challenge is also I'll get to you afterwards so much of the challenge is also that we moving to a more advanced technologies uh let's say I think it's uh in media they have an LTL LTE modem which is software-based radio which take becomes incredibly mall interesting from a piracy point of view because you can't really know what it's sending at what point because deep down you can't could get a trust any components on the shell have made them yourself and that's not happening today and so a becomes wet does he becomes a question of OK so how much price difference in practice uh um price which different between air fairly Privacy Aware phone versus 1 that a typical customer by underpricing difference so um I think that if you're looking at what's happening in China with 2 new is a scene makers like me get expect from except they completely different Codex to its open source of anything in the in the 1st place and that means that it's going to be even harder because these forms are going to be cheap to so it's going to be in people's uh people's supermarkets that can on by so I have to say the least we all screwed yeah you have a question about privacy and security on small 20 so and I was wondering because and I don't know how to use feature speech of my talking and is bit because I know it's
not disabled by default on board smart phone and the 1 I want to know if you ever and the advice to a stop the rotation I mean also talking because I know that even if you fall in so you should it is still talking you Saul it dependence on the model but I'm I begin by what I do is that it's so I just want to ask this question for us ever the question that I don't know if you if you have already an answer to this 1 so this answer is probably don't scare you um if you really want to disable tracking in mobile device you should not be using the mobile otherwise at all an if we're looking for example at the U. S. this a set of legal requirements for mobile phones which called the 9 1 1 which is still in the case that you go into some kind of uh um situation where you have to call 9 1 1 it has to be able to look locate you and is that it has a GPS which in many cases is located inside the modem then it has to give up whatever form and location you have or you by still tells and this along with the telephone network so while that's very nice settings towards disabling tracking of mobile devices in some situations they I don't actually work the but the sort of a typical things like for example you don't want to live in application and access to location it might be that it doesn't allow you access to your location but it might also be that he does it at your application that looks instead of the Wi-Fi networks around you and then you can your location pretty well and has anyway so it becomes really hard to not being tracked yeah the yeah there's some ideas look like that's ritual someone also proposes a directional antenna to only directives of 1 tower so that it could not triangular Jew that's an idea perhaps it works and maybe a Faraday cage and also provide reliable isolation on I like the idea that's by removing the battery and everything is also we should be that way but maybe you will find out in the near future that it's not the case on on but we do read all the the leached from Edward Snowden's so perhaps there is something that it's there we don't know but their own in any case so it's true that CS of models are required to send their location and just when asked to in the it's it's wearing is an on the 2nd we also trying to to provide direction we're not doing a chance that some of the things I wanted to but to provide a transition about how to reliably part of the modern because when you have a device on where the electrical control of the of the modern is something you know that we have power over if it's just if it's just a chip that reconstructs to turn off the electrical line that would be a reliable way to make sure that the model is off and that's all there is no for the tracking going on but then again that's only possible if the modernists are clearly separate from the CPU which for instance in quote from platforms is not the case at all so I'm on some platforms that could be possible and we could I guess and yeah reliably tests whether that's the case a lot so there is some work to well the question is also that despite the fact that your modem my people at all for lecture the cut off it doesn't mean that you could for example have a small wireless chipset in wireless charging chips inside the mode so part of battle from some kind of wireless charging but the question also becomes who signed he in practice so if we have sign off on so in this they can deal with it that's the heart of pressing time there's a man's amount of data being collected by because companies and um I've been reading a book recently which is called the Internet is not the answer and that I this really can recommend people to reach because it you shows that can approach toward static I in fact a little like the 1st industrial age we have a lot of big towns that that owned land and everything and if you noticing how the international election everybody's collecting data about you so maybe that's the 1st thing that you wish you could print people from all big companies from click too much data about you because it turns out that all humans surprisingly predictable and if you have a little bit of data on yeah on American my name is survival and from 1 of its and we're making open-source cover both and but now we're talking about 3 so that and of the benefits everything to be open source and 2 maybe look up edit the thing is that the but I would like to share or experience with that China's manufacturers because there was such talk in the beginning of the chain is my effectors hide the specs they belong to Q the book augmentation patients we we work with the wants and his company since 2012 and we also started all the same at the beginning it us a very i have to understand how this company what's with all the commendation released chips but nobody cares for support of things and what what we will use that this is a highly competitive market you care for wind or of the export bait enhance the so your brother they always work with the cutting edge technology use something new enters the market based on immediately work on this and they found a way for these the products quickly how mobile commentation they make reference designed for the factors so the factors that don't put any error and the development they they just get the design and names they they start producing governments forms if you opened all these Chinese phones or tablets basically there with the same problem of different design and site just different but is still used and little so this is impossible for for the western company Western company what they will be made the also some of them alright 6 thousand pages user manuals the communication protocol of the rule of this fact a reading youth and after 1 year of they they designed something with this process of this simple impossible in China will be you fuels 1 year yield on so many things because your enable C 6 weeks the 6 month whole-plant Europe rather than paying the profit goal break otherwise you're you're just selling come and please understood that they don't the case of all or but they do distillation of
intentional so most of these binary block ebay by from other companies they even don't know what this insight so the cell uh we we have a problem for them doing call for both and I'm describing my problems will be a genetic and his sense we fix which is to be named said that extract so they're buying this from other companies and they mated with decision emitting declared their hands and so they would develop a of this this is how it was intended and this is not because they don't want to really the cells they don't have and I think we have will be always seemed position tool kit up after them because but the problem is that but by the time you make mobile source that I have send open everything this world will be obsolete and nobody will be using so what is the positive experience when effectively this tennis company they didn't care about support the they 2 of the because they have been very very small customer but we are making open source designs which people can use to modify in my they on this that's and all we must but seeing that the interest of these chips which we are using can order events continue after this six-month for instance 2 years later nobody's using tablet with their a temporal system but people books these impulses so in many many different projects and they keep fairly soul they'll learn about open source bring them more money at and spare the life of the problem and this is I I I just feel held a 3rd of their their attitude they based on perspective profiles because for them this is more money and I think we should educate fold these GP-LVM labels in things that the respective false will bring them more money more business and then they will they will blow everything properly and we will not be the interposition put it was using the binary blobs and and the limits of evil there was an all smoke all the become Leonardo member and they they make the most and update forbidden new this ship that 8 8 he there is the reducing could all 3 point then we devised the and and everything In say property so this is really we have some help to educate them and to show them that this will bring them more business and more money this is the only way you can convince China's manufacturer prospect bubble sort of simple blue right property the the unserviceable and I really want to say thanks a lot for what you doing other limits it's really that's and I correct in assuming that the Chinese manufacturer talking about is a winner yeah right I mean so it's very interesting to see how those Asian and shit manufactures react to free software and there is actually a very interesting blog posts from Andrew Huron who is better known as Benny and he wrote of an article called arising from growing guide to open source where he describes known how it's going on at the in you know before those should factions especially with the example of a very cheap phone and it's something incredibly interesting to read because that it shows on the cultural difference there is between those in Asian manufacturers that's I don't like you said the cutting edge and they really want to know I did a done as fast as possible so that's why so what when we get so scared and read always stencils been when we do you you can see that the code the code is written like as fast as possible instead of in clean and they're all all that stuff and obviously they don't provide support for anything so I really hope that we can mean somewhat pressure these companies to do better and if that's what you're trying to do things a lot because that's really what that the work that is needed on for these companies and that's you know that's the samples were to and obviously I'm making them understand that's uh yes we have interests in their platforms and if they decided to go away and you know a little bit more it would be beneficial for know both board is really so so so may well 1 question about 1 1 thing about the bat code use that average consumer and sh the factor they don't give a shit if it's male architected the architecture of cold to say the least if you get a working product out it's working mostly in bulky and so on OK that's a quality thing Howlett and by the same diving creative P and the ways we do in the mistake that and I don't know if in kindergarten you are you have asked to go into a chicken farm of seeing how uh animals slaughtered to make food and I think we should really take a lesson to also try to make these devices and it see how it's made go to the factories get experience and we've been lucky because we have people in yellow that has led to make devices people uh when they're looking up here for example and budget is really to understand how to approach these companies you have to understand how it's made how the culture is working get relationships and maybe spend a couple of months in Taiwan notions and web and just let's come back some of the stuff that's community for um personally I feel that's uh from a kind of freedom and software perspective it's probably better to offer as free as solution as possible to as many people as possible rather than a totally free solution to almost no people so I'd just like to kind of suggests that that's that's personally how I would approach the problem because I think that provides at a level of data privacy and level of awareness of software and so the when I think about approaching this problem I be think about it that's been the approach I think taking to throw that have come into many response um uh 1 of the kind of things that get start happening in in China is model different it's basically that at some that is for example the vendors all about social responsibility how a phantom material so that kind of stuff if it can happen in the hardware level it should be possible to happen on software level as well but it takes a movement to take strong support it takes people that refuse to buy things because they are using glitzy clearly label or whatever all the actual furnace that that would be the only possible in I mean are so to know when this question just rapidly out of it to get better the natural point of and having more users and a little less so freedom versus the opposites it's it's what Firefox so
as I have been doing and that the planning and when you talk about the 5 1st of all as developers they say we want to have as many
people as possible using a device and so that we can bring change and bring freedom and you know have leverage followed the able to with a good good amount of users be able to change things and so that some that that's 1 way to reach a sort of freedom which is not the director of emitted from the freeway and it's I mean it's really it's so it's always interesting discussion to have what is going to work best uh is it better to compromise at 1st to get a lot of users and then the situation because you you in a position where you do have leverage because you have a lot of users that something that can work on the long term met obviously for on for the Free Software Foundation it's not acceptable to say and that's what we agreed that your freedom is denied and that's it it's not something they can do but I do understand the argument that's maybe in the long it's better to go gradually in you it makes sense so I would say I fully agree to it but it does make sense the the the question the them jointly now a few months
ago and and I deal with
Chinese manufacture some wiki basis let's say that said n enough for some people it from someplace is talking about freedom it's like if you are not to the US and you tell them how qualities to have all live and both fellows walking around where they want to do so were they don't understand they did only thing so uh you can you have to we we tried to bring them into free so the world based on pure uh concepts like time-to-market uh associate to support that life cycle devices for help we we try to final can of arguments that they can understand and they do understand this is very well they have very good and that to beyond their the cultural difference but approaching them from the from the freedom point of view it's completely is completely nonsense and have when they get beaten or over the social media uh by these kind of arguments it's very hard to understand for them and because they they work very hard to get the best possible products all there at the lowest price they they sell them they get crazy successful at it and here we are a whole bunch of people telling them that they're not doing the right things I have been a context that it's simply com it's is completely useless i plan the our job is somehow to try amino acid side effect to try to bring them into the side of of the story that I I'm not saying that we should not be them with this arguments on its and I'm not saying that of course I'm just saying that it's not the kind of arguments they should be and they will be listening to what they will to all the arguments that are from many other points of view as powerful as those ones and make sense from many other points of view and as the they are they are some of the companies we're working with are making huge progress In time frames in which Western companies have me server the just because they have up all very powerful in strong a business point of view and the absolutely crazy efficient in what they're doing so when you talk to them about efficiency is when you read they really start to talk about when you talk about the cost reduction in three year period is true that they just think about the next year but some of those companies have been around enough to understand that there they need to also start thinking in terms of those arguments work very well act surveillance and privacy you know those terms on P the western world related concepts talking to them with these arguments in our experience works poorly the
is word relationship the while I would say I disagree with your own it's just that's in opposition in the free suffer from nations position with talking about software freedom that's what we interested in I'm not saying that's we should go and talk to those chip manufacturers and try to convince them that freedom is important some wants I know they're are going to be sensible to that and we're not we're not really even seriously thinking about its Ms. so that's why we're doing it so yeah maybe the all other approaches to have and that will lead to true that's to that confusion and that is what we want to but some but yeah but then again it's really that's that's a complex question of how to trick them into the doing them what we want and for the reasons that say will listen to that that's something very interesting to discuss so
I'm I'm sorry I really have managed to fill the our actually so I'm really happy about that but I think we have some quite interesting points of view we got some more education for ourselves also about how we could maybe make decisions that would help us to improve this freedom but thank you very much and thank you all understand and all of you that Jets Lewis
Public-Key-Kryptosystem
Resultante
Rückkopplung
Subtraktion
Abstimmung <Frequenz>
Freeware
Extrempunkt
Unrundheit
Computerunterstütztes Verfahren
Systemplattform
Punktspektrum
Graphikprozessor
Einplatinen-Computer
Software
Reelle Zahl
Netzbetriebssystem
Datentyp
Datenreplikation
Programmbibliothek
Maßerweiterung
Optimierung
Sichtenkonzept
Hardware
Graph
Booten
Freier Parameter
Mobiles Internet
Quellcode
Elektronische Unterschrift
Quick-Sort
Ereignishorizont
Scheduling
Verkettung <Informatik>
Druckertreiber
Flächeninhalt
Rechter Winkel
Projektive Ebene
Garbentheorie
Normalvektor
Schlüsselverwaltung
Tabelle <Informatik>
Resultante
Arithmetisches Mittel
Stallman, Richard
Subtraktion
Software
Ideal <Mathematik>
Quick-Sort
Matrizenrechnung
Punkt
Freeware
Momentenproblem
Extrempunkt
Datensichtgerät
Adressraum
Versionsverwaltung
Gesetz <Physik>
Binärcode
Raum-Zeit
Eins
Vorzeichen <Mathematik>
Hacker
E-Mail
Hardware
Sichtenkonzept
Winkel
Computersicherheit
Mobiles Internet
Güte der Anpassung
Systemaufruf
Ruhmasse
Quellcode
Humanoider Roboter
p-Block
Software Development Kit
Arithmetisches Mittel
Rechter Winkel
Konditionszahl
Decodierung
Programmierumgebung
Schlüsselverwaltung
Subtraktion
Mathematisierung
Abgeschlossene Menge
Term
Punktspektrum
Division
Code
Bildschirmmaske
Knotenmenge
Software
Endogene Variable
Stichprobenumfang
Inverser Limes
Spezifisches Volumen
Optimierung
Bildgebendes Verfahren
Datenmissbrauch
Schaltwerk
Booten
Open Source
Physikalisches System
Fokalpunkt
Office-Paket
Summengleichung
Offene Menge
Wort <Informatik>
Resultante
Punkt
Nabel <Mathematik>
Freeware
Gruppenkeim
Versionsverwaltung
Homepage
Eins
Übergang
Figurierte Zahl
Kraftfahrzeugmechatroniker
Hardware
Sichtenkonzept
Computersicherheit
Güte der Anpassung
Systemaufruf
Kontextbezogenes System
Elektronische Unterschrift
Modem
Entscheidungstheorie
Arithmetisches Mittel
Verkettung <Informatik>
Rechter Winkel
Konditionszahl
Beweistheorie
Message-Passing
Instantiierung
Folge <Mathematik>
Subtraktion
Quader
Ortsoperator
Sprachsynthese
Zentraleinheit
Systemplattform
Whiteboard
Demoszene <Programmierung>
Informationsmodellierung
Bildschirmmaske
Software
Zusammenhängender Graph
Speicher <Informatik>
Analysis
Videospiel
Datenmissbrauch
Booten
Open Source
Softwarepiraterie
Binder <Informatik>
Datenfluss
Objekt <Kategorie>
Flächeninhalt
Hypermedia
Gamecontroller
Bit
Punkt
Prozess <Physik>
Web log
Familie <Mathematik>
Kartesische Koordinaten
Euler-Winkel
Drehung
Binärcode
Service provider
Übergang
Internetworking
Homepage
Richtung
Vorzeichen <Mathematik>
Benutzerhandbuch
Kontrollstruktur
Elektronischer Programmführer
Schnitt <Graphentheorie>
Default
Metropolitan area network
ATM
Hardware
Datennetz
Kategorie <Mathematik>
Mobiles Internet
Temporale Logik
Profil <Aerodynamik>
Systemaufruf
Quellcode
p-Block
Kontextbezogenes System
Biprodukt
Ereignishorizont
Software Development Kit
Teilbarkeit
Entscheidungstheorie
Modem
Arithmetisches Mittel
Druckverlauf
Erweiterte Realität <Informatik>
Verkettung <Informatik>
Menge
Rechter Winkel
Netz <Graphische Darstellung>
Projektive Ebene
URL
Smartphone
Fehlermeldung
Lesen <Datenverarbeitung>
Instantiierung
Subtraktion
Web Site
Ortsoperator
Gruppenoperation
Zellularer Automat
Zentraleinheit
Systemplattform
Whiteboard
Code
Überlagerung <Mathematik>
Benutzerbeteiligung
Bildschirmmaske
Weg <Topologie>
Informationsmodellierung
Perspektive
Software
Endogene Variable
Stichprobenumfang
Inverser Limes
Softwareentwickler
Drei
Hilfesystem
Leistung <Physik>
Videospiel
Datenmissbrauch
Antwortfunktion
Open Source
Schlussregel
Physikalisches System
Quick-Sort
Tablet PC
Mereologie
Gamecontroller
Faktor <Algebra>
Kommunikationsprotokoll
Parametersystem
Ortsoperator
Güte der Anpassung
Mathematisierung
Automatische Handlungsplanung
Softwareentwickler
Term
Quick-Sort
Soundverarbeitung
Assoziativgesetz
Videospiel
Parametersystem
Datenmissbrauch
Subtraktion
Sichtenkonzept
Punkt
Rahmenproblem
Kontextbezogenes System
Biprodukt
Frequenz
Term
Ordnungsreduktion
Eins
Arithmetische Folge
Prozess <Informatik>
Hypermedia
Basisvektor
Dreiecksfreier Graph
COM
Hilfesystem
Leistung <Physik>
Punkt
Sichtenkonzept
Ortsoperator
Software
Wort <Informatik>
Entscheidungstheorie
PCMCIA

Metadaten

Formale Metadaten

Titel Embedded freedom roundtable
Untertitel Replaces the cancelled talk: Freedom Embedded: Devices that Respect their Users
Alternativer Titel Embedded - Embedded Freedom Roundtable
Serientitel FOSDEM 2015
Autor Kocialkowski, Paul
Munk, Carsten
Lizenz CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34372
Herausgeber FOSDEM VZW
Erscheinungsjahr 2016
Sprache Englisch
Produktionsjahr 2015

Inhaltliche Metadaten

Fachgebiet Informatik

Ähnliche Filme

Loading...
Feedback