Why Device Neutrality is important for Free Software?
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 287 | |
Author | ||
Contributors | ||
License | CC Attribution 2.0 Belgium: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/56836 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Boom (sailing)Control flowInternetworkingOpen setOpen sourceSoftwarePresentation of a groupDigital rights managementProjective planeSelf-organizationTerm (mathematics)Power (physics)Context awarenessGame controller.NET FrameworkEvent horizonOrder (biology)FreewareImplementationRouter (computing)CASE <Informatik>Greatest elementMultiplication signEmailWeb serviceContent (media)Line (geometry)Different (Kate Ryan album)Logic gateMereologyRoutingDiagramComputer animation
02:43
Personal area networkPresentation of a groupTask (computing)Computer programLaptopVideo gameInternetworkingInsertion lossNetwork operating systemTablet computerIntegrated development environmentNumberVirtual machineTelecommunicationGame controllerEndliche ModelltheorieComputerComplex (psychology)SoftwareComputer hardwareComputer animationMeeting/Interview
03:50
Open sourceSmartphoneWordMaß <Mathematik>Right angleConcentricData storage deviceDistortion (mathematics)Physical systemCASE <Informatik>Integrated development environmentLevel (video gaming)GoogolContrast (vision)Computer hardwareNumbering schemeSound effectSmartphoneCategory of beingOperating systemPrisoner's dilemmaDifferent (Kate Ryan album)Proper mapNumberMobile appSoftwareMobile WebOperator (mathematics)Android (robot)Web serviceoutputDiagram
05:42
Web serviceInformation privacyGoogolIntegrated development environmentTerm (mathematics)Form (programming)System callOperating systemInstance (computer science)Information securityData storage deviceMobile appSoftwareComplete metric spaceNegative numberComputer animation
06:27
SoftwareControl flowDevice driverInstallation artWeb browserWeb serviceStandard deviationPower (physics)Connected spaceRoutingInstallation artTerm (mathematics)Gateway (telecommunications)Functional (mathematics)Exterior algebraWeb browserPhysical systemSystem callDevice driverInternet forumGroup actionInternetworkingGoogolPoint (geometry)Web serviceStandard deviationData storage deviceMultiplication sign1 (number)Different (Kate Ryan album)ECosSoftwareRadical (chemistry)Portable communications deviceInternet service providerXMLComputer animation
07:41
SoftwareGame controllerPower (physics)Web serviceNetwork topologyRight angleFinite-state machineCore dumpDistortion (mathematics)Computer animation
08:15
Digital photographyMathematical analysisComputer networkControl flowInternet service providerWeb serviceSoftwareContent (media)Similarity (geometry)Computer hardwareComputing platformRadical (chemistry)Link (knot theory)Content (media).NET FrameworkOpen setIntegrated development environmentTheory of relativityGame controllerRight anglePower (physics)InternetworkingSoftwareData transmissionDistortion (mathematics)State observerElement (mathematics)In-System-Programmierung1 (number)Term (mathematics)PhysicalismMobile appGateway (telecommunications)Web serviceInternet service providerComputing platformSimilarity (geometry)Proxy serverMathematical analysisTelecommunicationAxiom of choiceComputer hardwareExterior algebraRadical (chemistry)Closed setDeterminantEngineering physicsSpeciesMixed realityOperator (mathematics)Extreme programmingSpeech synthesisConnected spaceComputer animation
11:05
Router (computing)Control flowComputerFlow separationPhysical systemAxiom of choiceComponent-based software engineeringTelecommunicationSoftwareGame controllerRouter (computing)Cartesian coordinate system.NET FrameworkComputer hardwarePerspective (visual)NP-hardStandard deviationCycle (graph theory)Open setFocus (optics)Point (geometry)Instance (computer science)Computer animation
12:22
SoftwareOperations researchSystem programmingStandard deviationDevice driverCodeRepository (publishing)Computer hardwareInterface (computing)Control flowExterior algebraPower (physics)Web serviceGame controllerOperating systemSoftwareHeat transferResultantSoftware development kitLimit (category theory)Installation artFreewarePoint (geometry)Information securityInformation privacyPhysical systemSound effectFunctional (mathematics)Open sourceDevice driverCore dumpNumberFiber bundleMobile appInternet service providerPortable communications deviceOpen setInterface (computing)Standard deviationOcean currentIntegrated development environmentData storage deviceSmartphoneTraffic reportingDirection (geometry)Different (Kate Ryan album)Principal idealPlastikkarteComputerClosed setString (computer science)Cross-correlationLatent heatComputer hardwareCentralizer and normalizer1 (number)Key (cryptography)Operator (mathematics)CodeData integrityRepository (publishing)
16:21
Open sourceStandard deviationPhase transitionBoom (sailing)Sound effectOnline help.NET FrameworkMobile appImplementationFreewareRegulator geneElement (mathematics)Exception handlingSoftware frameworkSoftwareDigital electronicsRouter (computing)Flow separationStandard deviationPhase transitionPortable communications deviceSpeciesPerspective (visual)Data storage devicePhysical systemGoodness of fitWeb browserPrincipal idealInheritance (object-oriented programming)Instance (computer science)Computer animation
18:43
BitPhysical systemSoftwareAndroid (robot)Computer animationMeeting/Interview
19:14
Android (robot)Run-time systemDialectElement (mathematics)outputPairwise comparisonProjective planeFreewareFunctional (mathematics)Physical systemOpen sourceSoftware developerSource codeIntegrated development environmentSoftwareGoogolMeeting/Interview
20:28
Source codeKernel (computing)SoftwarePhysical lawAndroid (robot)Meeting/Interview
21:11
Procedural programmingWritingPresentation of a groupInterpreter (computing)ImplementationPhysical lawMixed realityReading (process)Arithmetic progressionMultiplication signCodePortable communications deviceTorus1 (number)Standard deviationAuthorizationDigital electronicsSoftwareProcess (computing)Perspective (visual)Meeting/Interview
23:40
Digital electronicsSound effectAuthorizationInternetworkingImplementationSelf-organizationPhysical lawSoftwareFreewareMeeting/Interview
24:53
Physical lawFreewareOperating systemPlanningGame controllerSoftwareInformation securityDigital mediaMeeting/Interview
25:21
System administratorINTEGRALDevice driverParameter (computer programming)Information securityData integrityDigital mediaInformation privacyOffice suitePresentation of a groupMeeting/Interview
26:18
Physical lawLatent heatMathematicsMeeting/Interview
26:47
.NET FrameworkThresholding (image processing)Goodness of fitData structureRule of inferenceRegulator geneStandard deviationInformation privacyMeeting/Interview
28:01
Meeting/InterviewComputer animation
Transcript: English(auto-generated)
00:09
Hello, I am Lucas LaSotta and welcome to my presentation Why Device Neutrality is Important for Free Software. I work as a legal project manager at the Free Software Foundation Europe.
00:22
Today, I will introduce you to an important topic concerning our freedom to choose and use devices and how the concept of device neutrality can help us safeguarding control over them. But first, let me thank the FOSTA organizers for their hard work in making this event happen.
00:43
I'm also very grateful for the policy and legal dev room managers for the opportunity to talk about this fundamental topic for our digital freedom. This talk is a follow-up from last year when I had the opportunity to contextualize router freedom in the light of net neutrality debate and the implementation in the European Union.
01:02
In case you have any questions regarding this presentation, we will have enough time for Q&A, but you are also welcome to drop me a line. My email is displayed now on the bottom of this slide. Okay, so this talk aims to introduce the concept
01:22
of device neutrality as a policy term and explain the practical consequences for the free software community. In order to do so, first, we need to understand how big techs exercise their power over end users and how they distort competition on device markets
01:40
by blocking installation of third party software, locking users down and increasing switching costs, which hamper individual freedom and fair competition. Then we will discuss how the rationale behind the policy terms as net neutrality can provide us with insights to start dealing with such monopolies.
02:02
For that, the term gatekeeper will be instrumental. We will learn that such monopolies could be broken by allowing end users to bypass the gatekeepers to access third party software, content and services on their devices. Device neutrality would translate in this context
02:21
as safeguarding software freedom devices, protecting end users from blocking and allowing end users to recover control over their data. In the end of this presentation, we will inform what has been done for device neutrality and the next steps as many challenges await us in the future.
02:45
So let's get started. What do you see in this picture? Well, digital devices are a present reality in all aspects of life. Use them for work, communication, entertainment and internet access. Such devices are powerful machines,
03:01
allowing us to have access to incredible amount of features and perform an infinite number of tasks. Our tablets, phones, laptops, and other connected devices are general purpose computers. It means we can potentially run any software we want to make full use of the hardware. However, our experience as end users
03:23
has been pushed away from this freedom while you use more and more devices, the number of such equipment on which we cannot run programs we want is exponentially increasing. The consequences is loss of user control over technology. Due to complex digital environments,
03:42
manufacture and regulatory lock-in and marked monopolization, users' freedom has been gradually reduced. What is happening in the market for smartphones, phones for example, is paradigmatic. While the number of people using smartphones has achieved incredible high levels,
04:03
the number of operating system provided remains stuck. We took this chart only as example, but it shows how concentrated the market is. In Europe and indeed across the world, there are in fact just two dominant mobile operating systems, Android and iOS.
04:21
Both of them are proprietary. Android born free software, but after the Google acquisition in 2005, the company has developed more and more apps on the proprietary schemes that have trapped users into a restrictive environment. The Google Play Store, the mobile application store
04:41
and Google Play services are proprietary. While Android runs on hardware from different device manufacturers, whether under a license for Google or not, the case with Apple is even worse with the hardware being bundled with the operating system. It is interesting to note however,
05:01
that the hardware market remains competitive with several manufacturers around the world. But as we know, the hardware alone is dysfunctional without an operating system. The main issue is that in contrast to the hardware scenario, there are significant network effects at the operating system because companies are more inclined to produce software
05:23
for an operating system with a large user base and consumers are more likely to adopt such an operating system. This colossal market concentration leads to serious distortions and abuse on how these companies treat end users.
05:45
For instance, the term wallet garden is an euphemism to denote the complete submission of end users to a digital environment controlled by a company. While Apple and Google dominate almost completely the operating system and App Store markets,
06:01
users are trapped into these companies' terms of services. These very few firms have strong commercial incentives to restrict users to their App Stores, which they misrepresent as being, for example, for technical, security, privacy and other reasons. The negative consequences for software freedom,
06:22
individual autonomy and digital sovereignty are obvious. Why we call companies such Google and Apple gatekeepers? These firms controlling devices may perform a gatekeeper function in the same way that a provider of internet access
06:42
connection controls a gateway to the internet. This is referred by scholars to a termination monopoly. Such companies seek to intermediate between different groups of users in a way which means users have no alternative route to other services, software and devices.
07:03
In very general terms, gatekeepers achieve this power by restricting software freedom by limiting users to install operating systems, browsers, App Stores, drivers, and et cetera. Locking devices down by controlling pre-installed apps,
07:24
hindering interoperability and applying preparatory standards. Increasing switching costs by restricting users on ecosystems, tying devices to online accounts and services, and hampering data portability.
07:43
At this point, you can already perceive how bad the situation is. The great oligopoly we are now facing is not a technological issue, but a political one. Software freedom, individual autonomy, consumer welfare, and digital sovereignty are all backslash by commercial interests
08:01
of a few giant companies. The challenge now is to find ways to disintermediate the power of gatekeepers to reestablish competition on the markets and end user control over devices. Corey Doctorow, in his excellent book, How to Destroy Surveillance Capitalism,
08:23
recognized that the size of giant tech companies give them power to cause such distortion on the markets and users' rights. For him, the impact of dominance far exceeds the impact of manipulation and should be central to any analysis
08:40
and any remedies we seek. User freedoms, including the ones relating to free software, depend on a political and economical environment in which they can exercise their free choice when using their device without being stuck on closed environments under control of gatekeepers.
09:03
And here, the concept of open internet and net neutrality can provide us with some basic elements for dealing with that. When we analyze the terms in which the public debates around net neutrality in the 2000s in the US and in 2010s in Europe have developed,
09:22
we identify some similarities in relation to fair competition on digital markets we are facing with gatekeepers today. Net neutrality originated from observation that there was little competition between internet services providers, which gave those ISPs market power
09:41
and made them powerful gateways for consumers' access. By then, the conclusion achieved was that since the value of the network is located on its extremities, ISPs should not influence access to the content, service, and communication. The transmission of data packages should be neutral.
10:03
Since normally users use only one physical network for internet connections, neutrality obligations should be applied to all ISPs, not only to the dominant ones. As we will see further, device neutrality borrows some of these concepts and seek to apply them to gatekeepers.
10:25
Similarly to what net neutrality imposed on ISPs, device neutrality aims to prevent discrimination of the services or apps by platforms or hardware companies exercising gatekeeper control. Therefore, what is desired for end users
10:41
is that they should be able to bypass device gatekeepers to access 30-part software and services. Device neutrality is understood as a policy term, which the main goal are resolving the termination monopoly on devices and safeguarding users with alternatives to reach software and content within their devices.
11:06
Software freedom is dependent on how freely users can run software in their devices. Therefore, it is insufficient that gatekeepers do not interfere with users' choices and activities.
11:21
Users must be free to use operating system and applications of their choice and hence remove the applications they do not want. Since its genesis, DevSFE has been working to put control over technology in the hands of end users. Along the years, we have gained experience with several dedicated activities
11:42
focused on how users can keep their control over devices. For instance, the demands of our newest campaign, upcycling Android, although concentrated in sustainability, intersects with several components of device neutrality as the freedom to install and run software in general purposes computers
12:00
and full interoperability based on open standards. Other successive activities like router freedom and radio lockdown refer to the hardware layer of net neutrality principles. Such activities relate with what could be considered the first step for device neutrality from the perspective of telecommunications law.
12:24
Nevertheless, we want to consolidate the necessary principles to empower users to regain control of their devices. We believe such principles are fundamental for a fair, competitive and conceptual digital market. For us, device neutrality relates
12:42
to safeguarding software freedom in devices, protecting users from vendor lock-in and regaining control over data in devices. Free software and open standards are key to achieve these goals. So let's talk more on each one of these principles.
13:01
As we discussed before, blocking end users' freedom to install, run and uninstall software on their devices is a central source of gatekeepers' control. Although gatekeepers may argue that installing 30-part software could be potentially harmful to users due to security, data integrity and privacy concerns, in fact, commercial interests are the main drive
13:22
to lock users in. Instead, regaining control over devices requires safeguarding software freedom. We therefore defend that users should have the ability to install and uninstall any software, including operating system and app stores.
13:41
Besides, gatekeepers should provide to third-party software the same access privilege as the pre-installed ones. This may sound common knowledge for the free software community, but it's far from being current commercial practice by gatekeepers.
14:04
Keeping users in very restrictive environments is another key source of gatekeeper control. Users can only access and use different services if their devices can interact and communicate with other devices and services.
14:21
Companies such as Apple exercise direct control over their customers by locking them into a very limited number of proprietary alternatives that operate within the same interoperable ecosystem. This results in less freedom for users and increasing of switching costs.
14:41
We therefore defend that gatekeepers should provide interoperability based on open standards, open drivers, and open hardware. Besides, providers of operating systems should make available specification for APIs and functionalities invoked by third-party apps.
15:01
Equally important, device should not be bundled with app stores and online accounts. Gatekeepers should permit third-party app stores and code repositories in their devices. Last but not least, we believe that breaking monopolies over devices necessarily requires importing users
15:22
to control their own data on equipment. Our smartphones, smartwatches, and computers are very personal equipment, which accumulate a large amount of personal and non-personal data that we care about. Such data constitutes a switching cost that taken together can be decisive for users
15:40
to exercise their freedom to change devices, especially if this includes switching between operating systems. We think the importance of the correlation between data and software tends to grow. We therefore advocate for data portability, and users should easily transfer personal data from apps, operating systems, and devices.
16:03
And most importantly, gatekeepers should be bound to open standards and common interfaces for data transfer. Facilitating data portability contributes to more user control over data and facilitates competition among device solutions.
16:23
At this point, you may be thinking that all these principles sound quite utopianistic or far-fetched, but this is not true. We are very happy to report that device neutrality got attention from policymakers in Europe and was included in the Digital Markets Act,
16:41
the European Union's largest initiative to regulate gatekeepers in digital markets. We will have an interesting talk about DMA on this Dev Room, so I will not give you many details, but enough to say that device neutrality principles were included in the text voted by the European Parliament, except interoperability based on open standards.
17:03
We are optimistic that the principles will survive the trilogues phase and remain in the final text. From the regulatory perspective, however, device neutrality is a very complex issue. Differently from net neutrality, which focuses on the network layer and ISPs,
17:23
device neutrality encompasses the regulation of several elements of devices as operating systems, browsers, app stores, as well as interoperability and data portability. We therefore need a framework for free software and device neutrality that would allow us
17:41
to monitor the DMA implementation and to make it rules effective. Net neutrality obligations, although simple to implement, are taking years to be properly applied in the European countries. For instance, our router freedom activity is all about devices from the perspective, from this perspective,
18:01
and has been running for several years now. Nevertheless, we remain confident that we can make a difference and change our digital future for the better. Our activities focused on device will continue to run and will develop further the implementation of device neutrality in Europe.
18:23
So if you stayed with me until now, thank you very much for the attention, and please join us and support our work with a donation. Your help enable us and our work for empowering you to control your devices.
18:40
Thank you very much. Most people would choose an Android phone over iPhone
19:00
because they believe it to be free software, not proprietary. Can you talk a little bit more about why you view Android as effectively a proprietary system? Yes, and hello, everybody, and thanks for being here, and thanks also for the question, the support.
19:20
Yeah, Android was born open source, was born free software, and has been developed by a large community. And Google joined the project in the beginning of 2000 and became its main contributor.
19:44
And in 2000, passing the years, Google started to develop new functionalities, and these new functionalities, these new functions, these elements of the Android ecosystem was being distributed on the proprietary license.
20:00
But unfortunately, this functionality, these elements, they were not introduced back to the regional free software environment ecosystem. And therefore, what people are receiving today in their phones are proprietary elements. So therefore, I could make this comparison
20:25
between with iOS. Yeah, I couldn't agree with you more, and the thing I would add to that is, even though the kernel of Android is Linux, we see so many GPL violations on Android, it's so common that most users who get Android devices
20:41
don't get the source code to the Linux software that's on there, that's been prioritized too. And so I really appreciate you flagging this issue and bringing it up. We're getting a lot of questions, and you and I were also talking before about the question of what the legislative answer to this is. What laws around the world and in Europe
21:02
can really hold gatekeepers accountable and change the ecosystem in some real way? I'm very happy to watch Torrio's presentation today, and he gave an amazing introduction
21:20
to the digital market stack. And the whole concept of it. And well, I think policymakers, they are concerned about the size of these tech giants. And as I put in my presentation, as one of quote from Corey's doctor of,
21:41
say that size is a big issue. So what they are doing to the market, they are monopolizing it, and they are doing whatever they want. And that's the main issue. So the Digital Marks Act tries to give already some obligations.
22:01
As Torrio also mentioned, and answering already one of the questions here saying what gatekeepers are already violating some law. The thing is, all this issue has been tackled from the perspective of competition law. And competition authorities around the world have been imposing huge fines.
22:20
We saw that fines that are surpassing billions of euros and dollars. But even so, all these procedures, these competition procedures, they take a lot of time. And usually they start after already some, well, some unfair commercial practice has been already developed and being practiced on the market.
22:43
And therefore we need to put something before a practice could be implemented on the market. And the Digital Marks Act is all about that. We have been involved in the LHS.TV process and following up what are the principles that have been included in the dos and don'ts.
23:02
And so these principles that we are advocating, like software freedom in devices, interoperability, so no vendor lock-in and data portability have been included. Of course, not 100%. There are some problems with interoperability, which was not defined by open standards.
23:23
But I think we are making a great progress there. And, but also, as I said in my presentation, this issue is very complex and the implementation of DMA will be a matter for further discussion in the coming years. That's my big question.
23:41
I have it written down right here in my notes when I watched your talk, it says, will the Digital Markets Act actually work and bring device neutrality? As written, do you believe it will work and will have the utopia of device neutrality when the DMA is in effect? Well, I want to believe so
24:01
because this is a new competition too. And I think this is a very bold initiative to start tackling this problem, not as the traditional way as we have been seeing since the 90s, considering these internet issues only a matter of competition law, but indeed we need a new competition too.
24:20
And this too, I think it's a novel thingy. And I really look forward to the implementation. We'll have to work together with the Commission. We will have to work together with organizations that will try to push this forward in national courts,
24:42
within national competition authorities. But I remain optimistic. There will be a lot of work ahead, but I remain optimistic today. So, Mick 32 is asking a question that I think that almost everyone who's not a free software activist is going to ask.
25:00
The companies that put these devices together, they argue that they can't give the user more access and more control to change their operating system because of security reasons. What is your plan and how are we going to respond to that when the law start saying that?
25:20
I think this is a wonderful question. And this week we have been seeing some news on the media that the Biden administration shared some concerns on DMA saying that they're targeting US companies and US companies they're saying that it will, yes,
25:42
represent a risk for security, but we do not share this concern. I think disarguments of security, privacy, data integrity should be taken with a grain of salt because in fact, the main driver behind these arguments are commercial interests.
26:00
And as we saw in the last presentation, there was in the beginning of 2000, manual saying how to lock in your customers. So I think using such arguments on security and integrity is one of these arguments to lock users in. Yeah, I think that most FASM attendees
26:20
are going to agree with you. And we all have a lot of work to do in our respective countries to convince our leaders to agree with you. And that bleeds us to the last question. The DMA is a EU specific law. Will the EU have enough clout and ability to affect the worldwide ecosystem? Can the EU really make big changes around the world
26:43
by being the leaders in this area? Yeah, this is a very hard question to answer. Well, taking, I think I will take two examples.
27:01
The first one was the debate on net neutrality in the US and start in the beginning of 2000. And then in middle of 2010, we had the regulation on net neutrality in the EU. And now this subject, we reached a consensus in the EU on net neutrality.
27:21
The other thing is about data protection. We also passed this novel legislation in the EU about data protection. So I think the DMA can set the bar for other countries to look for and say, now we have the bar, perhaps we can surpass the bar and make some structure rules.
27:41
And I hope so, for an example, I still think that the threshold for gatekeepers is too high. I would like to have a lower threshold for gatekeepers, but definitely it's a good start for conversation, good start for lobbying on other countries to say, yeah, now we have a standard and perhaps we can do it better.
28:01
Thank you so much for being here. I'd like to ask everybody to come join the room to ask you more questions and they can actually join this chat if they click over to the room, that'll be in the main channel briefly. Thank you so much for your talk.