Cory Doctorow is an activist in favor of liberalizing copyright laws, a proponent of the Creative Commons, and a celebrated author of many science fiction books that revolve around the same ideals for which he fights. He is also the co-editor of the popular site Boing Boing.\n\n\nDoctorow will be attending SCaLE 14x later this week to deliver a keynote presentation. I spoke with him by phone to discuss his upcoming talk. Following is the edited version of that conversation.\n\n\nIs this your first SCaLE appearance?\n\n\nBack in 1999, I think (I'm not very sure of the year), I went to SoCal LUG, which I believe is the precursor to SCaLE, so I think I have been to one of the predecessors of this event.\n\n\n\n\n\n \nAlso on CIO.com:\n\nReview: Graylog delivers open source log management for the dedicated do-it-yourselfer\n9 MongoDB success stories\n10 products that big tech companies have open-sourced recently\n\n\n\n\n\nWhat will be the focus on your talk?\n\n\nI will be talking about the same material that I work on at the Electronic Frontier Foundation (EFF), which relates to the way the old and fairly obscure copyright law has become more and more urgent not just in the realm of free software but in realm of software in general.\n\n\nWe do have our \u2018free desktop,\u2019 but are we still far from what the Free Software Foundation envisioned?\n\n\nI think the free software advocates are accustomed to thinking that the world is divided into the proprietary and free code. And the duty of people who are interested in free code is to try and marginalize the proprietary code by some combination of starting businesses that provide free code, by getting laws passed that mandate free code in certain circumstances, or by promulgating normative or moral messages about free code, explaining to people why free code is morally or ethically preferable.\n\n\nThat is the normal analysis, but I don\u2019t think it\u2019s valid anymore because what\u2019s happening is that the Digital Millennium Copyright Act (DMCA) and its international analogues, which exist on the lawbooks of virtually every American trading partner, have created a new layers of super proprietary code.\n\n\nAs soon as you add a digital lock or technical protection measure to a piece of technology it becomes illegal to remove that, for many reasons. Just think about the GNU project: Richard Stallman and his colleagues decided that there is a need for a feature by feature clone of UNIX and all of its sub-utilities and you should be able to communicate with proprietary UNIX systems and do things like SSH from one machine to another even if the client you are using is open but the daemon you are talking to is closed. The idea is that you can still log in, but if the client had a handshake that has some measures of DRM, that code could have never been written.\n\n\nSo if you care about free and open source software there is a new risk on the horizon that\u2019s much scarier than the mere risk of firms and governments deploying a proprietary code. It\u2019s this super proprietariness.\n\n\nWhat incentives do companies have for deploying such measures?\n\n\nThere are really good commercial reasons that firms are opting into these proprietary measures, these digital locks, because that gives them a lot more economic control over their products. Once you add a digital lock to your offering, you can control all those parts that can be connected to it.\n\n\nThink about Apple TV. Apple gets to decide which outputs its hardware can talk to so that it can extract rent and charge money for the privilege of talking to its device. That represents the secondary revenue stream.\n\n\nThen Apple can make agreements with its partners. It can tell Netflix "if you authorize us to use cryptographic keys to decode your movies we will promise you that we will never authorize a program that will allow our device to talk to a DVR so no one will ever record a Netflix stream if it comes through this." With this Apple created another revenue stream. And then they get yet another revenue stream because they can control the parts, the features and the consumable. As we see in things like 3D printers where companies control which brand of filament can be used. Now they can charge a premium for such products or license them to 3rd parties to collect more rent from that.\n\n\nSo more and more firms are doing that and they are doing it in context, they are not just limiting themselves to traditional computing applications.\n\n\nWhat risk does it pose to users?\n\n\nAs the IoT spreads out -- this is your car, your house, medical implants, and so on -- the risk that you are not being able to control those devices is becoming sharper as well. What\u2019s even worse is that the laws that protect these devices also protect them from reverse engineering. It's a crime to report a defect in these devices. If you discover a flaw in the device that might let an attacker compromise its user, it becomes a crime to report that because that same flaw might be used by a jailbreaker to figure out how to flash a firmware on it. So all these devices have become more widespread, more potentially deadly, and ubiquitous. There is also reservoir of vulnerabilities that you are not allowed to discuss. I think this is existential threat to our future.\n\n\nIn my talk at SCaLE 14x, I want the attendees to be thinking more critically about these issues that are more urgent than whether its proprietary or not.\n\n\nRecently EFF and other organizations managed to get exemptions to DMCA section 1201. Are these measures adequate to protect users?\n\n\nThey are pretty inadequate. The problem with 1201 exemptions is that you have to renew them every 3 years. And they only cover usage and not tools. So you have the right to use a jailbreaking tool on your iPhone, but there is no right to make that tool. Since most people can\u2019t write their own tools, they end up downloading some random code from the Internet, written by people who can\u2019t be held accountable for it because what they are doing is illegal already.\n\n\nThis is dangerous as users are installing unverified software on their devices with root access. That software can be used for malicious activities, like recording videos of private moments or even accessing their bank details and selling their house. There have been many such reported cyber attacks in London and New York, aimed at selling homes from underneath people by capturing bank details and other personally identifiable information.\n\n\nPeople should be able to access trusted sources to find such tools instead of risking their sensitive data by using random code. By letting people make those tools, you protect people from running unverified code from an anonymous source that can cause serious harm. So it\u2019s important from security and other dimensions. So the exemptions are inadequate.\n\n\nWe also notice lack of common sense when it comes to copyright laws and DRM...like if there is a song playing in the background, your personal video on YouTube is subject to takedown? Do people doing this lack common sense or is something else at play?\n\n\nThere are a lot of reasons why people made those rules, sometimes there are well intentioned and sometimes there are not; they are short sighted.\n\n\nThe reason they are perpetuated is that they concentrate benefits in the hands of few people and they diffuse cost across many, many people. It's analogous to pollution: if I dump my pollution in a river used by many people, I save a lot of money and everyone pays a little cost to filter that water or find water somewhere else. Because I have a lot of benefit and you only have a little loss it is not rational for you to fight me and I will fight harder to keep doing what I am doing than you would fight to stop me. Because I have more to gain than you have to lose.\n\n\nThat\u2019s the classic corruption problem that recurs in many cases. This is the core problem we have with good policy.\n\n\nImagine there is an activity there is a fine for, let\u2019s say pollution. If the fine is less than the profit, then it\u2019s understood that firms will pollute and continue polluting for so long as the fine they pay is less than the profit they make. So it's not like people don\u2019t understand. It\u2019s a profitable policy and there are concentrated benefits, and the firms those receive those benefits lobby for the expansion of those policies.\n\n\nHave you dealt with these issues in your fiction?\n\n\nI have certainly written works where I tried analogies to the absurdity of the rules. I have written a novel Pirate Cinema where they tried to show how these policies are really about profits for a very small number of firms at the expense of a larger community that includes the same artist that it supposed to be benefitting from it.\n\n\nMr Robot is getting rave reviews from the technical world. I finished the series recently and loved it for the story, character development and very accurate representation of technology. Have you seen it?\n\n\nYes, I have seen it and I think it\u2019s extraordinary. I think they have captured much of the excitement of code. In general I railed against filmmakers or cinematic depictions of code that treated code as a metaphor, rather than actually try to engage what it could and couldn\u2019t do.\n\n\nI always felt like code is really, genuinely interesting in itself -- things that you can do with code, especially crypto, is interesting. You don\u2019t require imaginary contextual properties or capacities \u00a0in order to make it interesting.\n\n\nWhat will be the most pressing issue in the future?\n\n\nGosh, I don\u2019t really know. I don't pretend to be able to predict.\n\n\nIn terms of things that I know I should be doing now because I see them coming and I want a response ready. one is how to avoid section 1201 of DMCA and its analogs around the world. The other is how to make use of privacy and crypto technologies because the real problem with the cloud is that it's not designed with any privacy in mind. In fact, it\u2019s designed to maximize how much information you leak into it. So at one point you have the Computer Fraud and Abuse Act (CFAA) and DMCA problem, because writing your own endpoint is potentially illegal in more than one way.\n\n\nBut I think from now on we are going to get a lot more breaches. The breaches that we saw last year - Ashley Madison, Office of Personnel Management, Vtech - were just the tremors and not earthquakes.\n\n\nThere are going to be some really huge breaches. Just look at the size of the databases ad brokers have; it\u2019s much scarier than just your Google searches. Google is pretty secure; they won\u2019t get breached. They might breach to the NSA, but no one is going to take a terabyte of Google data and stick it up on the Internet. I feel pretty good about it.\n\n\nIn fact if you are working with a non-governmental organization (NGO) in the former Soviet Union and you are worried about the government invading your stuff then using the Google suite is probably a good idea. It\u2019s not a good idea if you are worried about the US government invading your stuff. But if you are worried about other governments invading your stuff then the Google suite is very good product.\n\n\nBut there are going to be these big breaches. So from now on every couple of weeks, several million people will show up at the doors of privacy advocates and say, "Hey, you were right all along, now what do we do?" And we need answers for it, we need tools for it. We need usable stuff that they can use to do what they wanted while keeping them secure. That\u2019s the thing we are going to have to do.\n\n\nYou used to be a Mac OS X user then you moved to Linux. What do you use these days?\n\n\nSitting here talking to you, I am using a Lenovo ThinkPad X250 running Ubuntu 15.04 and next to me is a Purism 12\u201d that\u2019s running Ubuntu 15.10.\n\n\nYou don\u2019t use the Long Term Support (LTS) edition of Ubuntu?\n\n\nI don\u2019t use LTS. I generally want more cutting edge features. I am actually trying to figure out what kind of hardware I am going to use. I find a touchpad without physical buttons hard to use. Thinkpads have started to move away from it for couple of versions so that leaves me with some of the Thinkpads. But I found x240 and x250 not nearly rugged enough for my use. I killed one of each in less than a year.\n\n\nWhat do you do with your hardware to wear it out so fast?\n\n\nI travel like crazy. It\u2019s always in a bag getting bounced around. I think Thinkpads, from x60 to x230 were so rugged, beautiful and brilliant. Their IBM Global Services warranties were amazing. Once I was in Mumbai, India and a technician came and fixed it on my desk for free, within 24 hours of filing the complaint, even though I bought the laptop in London. I have not used their warranty for a while, but Lenovo bought IBM Global Services, so I worry is it\u2019s not as good as it was.\n\n\nIn a recent report EFF praised Apple for protecting people\u2019s privacy? Would you reconsider using Macs or iPhones?\n\n\nNo, because although they have done something good in that domain, remember the thing that Apple and Google didn\u2019t do was change the defaults. I am capable of changing that default. \u00a0I don\u2019t use Gmail; I have my own mail server that's not hosted on Google. So I don\u2019t need to know if my data on Google is secure or not as I don\u2019t use Google\u2019s cloud.\n\n\nWhen it comes to hardware, what I am more interested in is whether I can get open hardware in a phone and install my own firmware on it. So it\u2019s transparent. It\u2019s backdoors are at least liable to inspection without risking prosecution and felony for DMCA violation. I get Nexus devices, I am talking to you on Nexus 5x and have installed CyanogenMod on it.