프리덤 박스 파운데이션에서 전하는 프로젝트 뉴스
이 페이지는 지난 모든 뉴스 아이템들을 저장하고 있습니다.
프로젝트와 관련된 최신 뉴스를 받아보시는 가장 좋은 방법은 저희의 [RSS]피드 (http://www.freedomboxfoundation.org/index.rss) 혹은 [아톰] 피드 (http://www.freedomboxfoundation.org/index.atom) 를 구독하시는 것입니다.
언론 보도 혹은 다른 문의 사항과 관련하여 연락을 취하고 싶으신 분은 저희 Contact 페이지를 참조해주시기 바랍니다.
FreedomBox v0.3 Released!
January 21, 2015
Hi folks, I'm proud to announce that FreedomBox version 0.3 has been released! This release comes ten months after the previous, 0.2 release.
The FreedomBox version 0.3 is available here:
Before using, you should verify the image's signature, see https://wiki.debian.org/FreedomBox/Download for further instructions:
$ gpg --keyserver hkp://pool.sks-keyservers.net --recv-keys 0x36C361440C9BC971
$ gpg --fingerprint 0x36C361440C9BC971
pub 4096R/0C9BC971 2011-11-12 Key fingerprint = BCBE BD57 A11F 70B2 3782 BC57 36C3 6144 0C9B C971 uid Sunil Mohan Adapa <sunil@...> sub 4096R/4C1D4B57 2011-11-12
$ gpg --verify freedombox-unstable_2015-01-15_beaglebone-armhf-card.tar.bz2.sig freedombox-unstable_2015-01-15_beaglebone-armhf-card.tar.bz2
(Replace the file names with the version you download.)
Thanks to the many folks who helped put this release together and especially Sunil and Petter who are regularly building and publishing updated images.
More information on this release is available on the wiki:
Major FreedomBox 0.3 Changes:
Add BeagleBone support. We now have images for BeagleBone, RaspberryPi, VirtualBox i386/amd64, and DreamPlug.
Ability to enable and use Tor Hidden Services. Works with Ejabberd/JWChat and ownCloud services.
Enable Tor obfsproxy with scramblesuit.
Drop well-known root password (an account with sudo capabilities still exists for now but will be removed soon).
Switch to unstable as suite of choice for easier development.
Newer images are built with systemd by default (due to Debian change).
Install and operate firewall automatically (uses firewalld).
Major restructuring of Plinth UI using Python3, Django web development framework and Bootstrap3. Code quality is much better and UI is more polished.
Introduced packaging framework in Plinth UI for on-demand application installation.
Many bug fixes and cleanups.
Unfortunately, some known issues do exist:
- ownCloud requires removing /etc/owncloud/config.php after installation for Plinth to enable it properly.
However, other known issues have already been fixed upstream:
etckeeper commit doesn't work during first-run.
Wi-Fi AP isn't automatically available on Dreamplug. The interface needs to be created manually.
Please discuss, test, and enjoy. Please also join us on the mailing list, IRC, or on the monthly progress calls:
Happy hacking, Nick
FreedomBox version 0.2
For those of you who have not heard through the mailing list or in the project's IRC channel (#freedombox on http://www.oftc.net/), FreedomBox has reached the 0.2 release. This second release is still intended for developers but represents a significant maturation of the components we have discussed here in the past and a big step forward for the project as a whole.
Plinth, our user interface tool, is now connected to a number of running systems on the box including PageKite, an XMPP chat server, local network administration if you want to use the FreedomBox as a home router, and some diagnostic and general system configuration tools. Plinth also has support for downloading and installing ownCloud.
Additionally, the 0.2 release installs Tor and configures it as a bridge. This default configuration does not actually send any of your traffic through Tor or allow those sending traffic over Tor to enter the public net using your connection. Acting as a bridge simply moves data around within the Tor network, much like adding an additional participant to a game of telephone. The more bridges there are in the Tor network, the harder it is to track where that traffic actually comes from.
Availability and reach
As discussed previously, one of the ways we are working to improve privacy and security for computer users is by making the tools we include in FreedomBox available outside of particular FreedomBox images or hardware. We are working towards that goal by adding the software we use to the Debian community Linux distribution upon which the FreedomBox is built. I am happy to say that Plinth, PageKite, ownCloud, as well as our internal box configuration tool freedombox-setup are now all available in the Jessie version of Debian.
In addition to expanding the list of tools available in Debian we have also expanded the range of Freedom-maker, the tool that builds full images of FreedomBox to deploy directly onto machines like our initial hardware target the DreamPlug. Freedom-maker can now build images for DreamPlug, the VirtualBox blend of virtual machines, and the RaspberryPi. Now developers can test and contribute to FreedomBox using anything from a virtual machine to one of the more than two million RaspberryPis out there in the world.
Work has really been speeding up on the FreedomBox in 2014 and significant work has been done on new cryptographic security tools for a 0.3 release. As always, the best places to find out more are the wiki, the mailing list and the IRC channel.
I am pleased to announce our first FreedomBox software release. The FreedomBox 0.1 image is available here (.torrent) (sha512sum: 867f5bf462102daef82a34165017b9e67ed8e09116fe46edd67730541bbfb731083850ab5e28ee40bdbc5054cb64e4d0e46a201797f27e0b8f0d2881ef083b40).
This 0.1 version is primarily a developer release, which means that it focuses on architecture and infrastructure rather than finish work. The exception to this is privoxy-freedombox, the web proxy discussed in previous updates, which people can begin using right now to make their web browsing more secure and private and which will very soon be available on non-FreedomBox systems. More information on that tool at the end of this post.
What have we accomplished? This first release completes a number of important milestones for the project.
- Full hardware support in Debian A big part of the vision for the FreedomBox project revolves around the "Boxs", tiny plug servers that are capable of running full size computing loads cheaply and with little use of electricity. In many respects these are wireless routers given the brains of a smart phone. If you want to change the software on a router or smart phone today you normally need to worry about bootloader images, custom roms, and a whole collection of specialized build and install tools. We wanted to the FreedomBox to move beyond this fragmented environment and, with the help of some embedded device experts, we have managed to make our development hardware into a fully supported Debian platform. That means that anyone with a device can install Debian on it just like a laptop or desktop computer. This support is very important for ensuring that the work we do on the FreedomBox is as portable and reusable as possible.
- Basic software tools selected There is a lot of great free software out there to choose from and we put a lot of thought into which elements would be included in our basic tool kit. This includes the user interface system "plinth" that I outlined in a recent kickstarter update as well as basic cryptography tools like gpg and a one named "monkeysphere" that leverages gpg as an authentication tool. All of these are now bundled together and installed on the release image. This common working environment will simplify development going forward.
- Box-to-box communication design Some goals of the FreedomBox can be accomplished with one user and one FreedomBox but many, like helping someone route around repressive government firewalls, will require groups of people and groups of boxes working together. One of our greatest architectural challenges has been finding a way for boxes to communicate securely without so slowing down or breaking network access as to make the system unpleasant to use. We have now outlined and built the first version of our proposed solution: Freedom-buddy. Freedom-buddy uses the world class TOR network so that boxes can find each other regardless of location or restrictive firewall and then allows the boxes to negotiate secure direct connections to each other for actually sending large or time sensitive data. We believe this blended approach will be most effective at improving the security and usability of personal-server communications and all the services we plan to build into those servers.
- Web cleaning Our first service, a piece of software you can use today to start making your web browsing more secure and private, is called "privoxy-freedombox". This software combines the functionality of the Adblock Plus ad blocker, the Easy Privacy filtering list, and the (HTTPS Everywhere](https://www.eff.org/https-everywhere) website redirection plugin into a single piece of software to run on your FreedomBox. Combining these different plugins into software for your FreedomBox means that you can use them with almost any browser or mobile device using a standard web proxy connection. Because of our focus on building the FreedomBox as part of Debian this software will soon be available to anyone running a Debian system regardless of whether you are using our target DreamPlug hardware, a laptop, or a large rack server somewhere. As you read this packages should already be available in the Raspbian repositories, which is the optimized version of Debian used on the Raspberry Pi hardware. Hopefully we will get that onto the main Debian mirrors over the next month; if you are interested in building it for yourself in the meantime, the source is available from gitorious. As we build additional components for the FreedomBox we will continue to work on making them widely available.
- What is next? As you may have seen, our Project Lead, Bdale Garbee, is about to begin a well earned early retirement from his long time role as Open Source & Linux Chief Technologist at Hewlett-Packard. Over the coming month Bdale and the rest of the Foundation team will be putting together plans for the next stage of FreedomBox development and the road to a 1.0 release. News and updates will follow at freedomboxfoundation.org (rss).
Wow. Thanks to everybody who showed up in New York to hack on the FreedomBox and other projects. This event was a bit of an experiment. Instead of doing a FreedomBox Hackfest, we opened the event to other projects that share our goals of private, free communication. We were lucky enough to get developers who work on Guardian, Access, Tor, CryptoCat, Commotion Wireless, EFF, TrackMeNot and other initiatives. The resulting cross-pollination of skills and ideas pushed all of these projects forward with speed and focus!
While all the projects hit impressive milestones this week, it was FreedomBox that had the most activity. Here's what we did:
Boruch Baum, Daniel Howe and James Vasile worked on validating the regexes in freedombox-privoxy. That package is much closer to stable now. Boruch and Daniel did the heavy lifting. They took a problem that had, frankly, stymied us, and put in the attention and research to get it moving again.
Ariel and James brainstormed the user experience on first boot. Ariel made a series of slides detailing requirements in this area, which means we now have a roadmap for first boot.
Bryan Newbold hacked a configuration management solution into Plinth so now the front end can talk to the system. He and James are making a demo module for documentation.
Nick Daly added a command-line interface to FreedomBuddy. This interface can be used to query the FreedomBuddy service, and will be pushed to the public repository by the end of the week, with the next weekly image. The interface currently depends on the HTTP(S) interface, which is a limitation that will soon be removed.
Nick and Simo Sorce began implementing a self-configuring OpenVPN system using the FreedomBuddy's command-line interface. That will also be available by the end of the week.
Nick internationalized the FreedomBox UI with help from several other folks. Work will be completed in the next few weeks to support Python's standard approach to internationalization, GetText.
Pablo Arcuri started internationalizing FreedomBuddy to include a Spanish translation. It may soon also have a Farsi translation.
Nick and Nadim Kobeissi considered, and ultimately rejected, including CryptoCat on the default FreedomBox image, because of its reliance on PHP. Nadim is building a CryptoCat 2.0 that will be based on XMPP. When that is ready, we'll integrate it as FreedomBox's secure chat solution.
James explored browser fingerprint munging in freedombox-privoxy using advice from Eva Galperin. He concluded that this is a task better left to a browser plugin and might start speccing that plugin.
James discussed thread modeling methodologies with Matt Hollingsworth and started nudging FreedomBuddy toward a more defined and explicit threat model.
This hackfest was an unqualified success. Big thanks to our partners, ISC (especially Ray Short), OpenITP and ISOC-NY for pooling resources to pull it off! Thanks also to Elizabeth Boylan, who managed logistics and never once complained about our disorganization. Ian Sullivan worked his usual behind-the-scenes magic. Dragana Kaurin organized the people and the reporting and stipends. And Willie Theaker provided key support in arranging for people, food and supplies to always be in the right place at the right time.
FreedomBox, OpenITP, InformSec and ISOC-NY have partnered up to host a circumvention tools hackfest in NYC right before HOPE. We've got four days to plan, code and learn! If you want to hack on anti-censorship or anti-surveillance tools, bring your project, bring your skills and bring your friends. This event will be focused on writing code and solving design problems. We won't have any long presentations (there will be enough of those at HOPE), though we will have lightning talks and will give away a door prize or two.
Where: Columbia Law School, Jerome Greene Hall, 116th and Amsterdam
When: July 9 - 12, 10 am
Who: Privacy and free communication hackers like you
Please RSVP to kaurin at openitp.org and tell us what you plan to work on, what kind of projects and people you hope to meet, and which days you will join us.
Feel free to repost this invite or to link to it.
Some modest travel stipends are available for amazing projects. Email James Vasile (james at openitp.org) about those.
Some projects we know will attend: Commotion Wireless, Cryptocat, Guardian Project, the Lantern Project, and Access.
If you are looking for lodging, take a look at this list of nearby hotels. If you want a hostel, there's one on 103rd and Amsterdam.
Big thanks to our partners, all of whom are contributing crucial support and resources.
The FreedomBox Hackfest at Columbia University was a huge success. We hosted 25 people of diverse talents and interests. Some folks came to learn, acquire DreamPlugs and do a guided install of Bdale Garbee's FreedomMaker. Others took up parts of the (task list)[http://freedomboxfoundations.org]. We learned a lot about the boxes, ideas for routing, data modeling, and security concerns. Lots of people pitched in on the tasks list, and descriptions of that work are below. Most importantly, we had a lot of fun meeting each other and collaborating. If you are interested in any of it, please ask about it on the discussion list, especially if you want to help!
Huge thanks to everybody that participated. Many people came by just to learn about the FreedomBox, talk about their use cases and offer encouragement. That activity is very helpful, and we appreciated the fresh perspective.
We intend to do more hackfests, perhaps in more cities in the near future. This weekend was a great success in progress, bug squashing, design, and first-draft implementation of key FreedomBox infrastructure.
Thanks again to everybody and especially to Columbia University, Elizabeth Boylan, and ISOC-NY for logistical and material support.
Progress and Activities
Nick Daly, Issac Wilder, Ian Sullivan and I fleshed out my earlier, nascent Port Santiago work (more about that below) and implemented some basic FreedomBox discovery and connection functionality. Nick and Issac also sketched out a DHT scheme (codenamed Neruda) for finding boxes. Nick and Issac each did presentations on the routing issue. Joly Macfie from ISOC-NY took video of those presentations and will get them online this week.
Nick and Ian iterated hard on paired boxes (a dedicated, hard-coded, factory-set proxy server and client connection) as a way to roll out freedom to small numbers of people stuck behind national firewalls. We now have paired boxes that locate each other on the network and proxy for each other!
Barbara Mack came to us with expertise in data model-ling, and she spent her time doing deep thinking on the person model and how it connects to the rest of the FreedomBox.
BoxySean installed FreedomBox on a GuruPlug and updated the Wiki with details on how to do that more easily. There are a lot of GuruPlugs out there, and his work is a big help.
BoxySean and Brian Newbold started work on configuring the FreedomBox as a wifi router and connecting that up to Plinth for UI. They identified some FreedomMaker bugs. BoxySean updated the list on those bugs and we've been following up on closing them.
A team of people (most notably Marcus and Tyrone) from the FreedomTower project explored ways the FreedomBox can be added to their mobile internet stations to provide Free communication services to people connecting to the net via those stations.
Sean O'Brien familiarized himself with Plinth and intends to contributing to the router front-end setup effort.
David Garson dropped knowledge on configuration systems and virtual machines as test beds.
I updated Plinth with a new template featuring some design work by Robert Martinez (about which I will say more in a separate update).
I updated Plinth with a new template and chased down some bugs. Boxysean explored Plinth's bugs as well, albeit involuntarily. We'll have patches on those shortly.
There is a problem we have been referring to as the "magic routing problem". It is the question of how two FreedomBoxes find each other on the internet and establish communication, even if one or both boxes are firewalled and neither is findable via DNS. We called it "magic routing" because we hadn't started to design the routing system and so we had to assume it happened by magic.
Our solution to this problem is to piggyback on the Tor network. Hidden services rely on Tor for routing and discoverability. The system works quite well and the Tor project does excellent work at maintaining that system and strengthening it against attack.
Nick Daly and Ian Sullivan built a simple server that listens on a local port and is reachable from the outside world by a Tor hidden service. It accepts authenticated queries and responds with information. For example, it can give your IP address to friends you trust.
To avoid burdening the Tor network and also to avoid the delays associated with using Tor, Port Santiago will allow two FreedomBoxes to decide on a faster (though less anonymous) method of communication. Subsequent communication will happen on that channel.
Right now, we are using Santiago to discover a FreedomBox's IP address for the creation of encrypted proxy tunnels. This will allow a FreedomBox to provide uncensored, unmonitored internet access to a friend who is stuck behind a national or corporate firewall.
Nick did the heavy lifting on this work with help from Ian Sullivan and in consultation with many of the Hackfest participants. Nick's documentation and code will be up on github soon.
Port Santiago lets FreedomBoxes provide some basic information via a Tor hidden service, but users need a way to find out the onion addresses of their friend's services. The most obvious way to do this is with distributed hash tables (we also considered less obvious methods that piggyback on existing infrastructure, like bit.ly links). Issac and I planned out the DHT, how to access it, the data structures, and API. We are calling this system Neruda.
Neruda will allow users to take a GPG key and look up a user's Santiago onion address. Issac Wilder is speccing this out and coding it.
One benefit of reaching Santiago via a Tor onion address is that FreedomBoxes do not need to update Neruda very often. Even if your IP address changes, your onion address shouldn't. Updating your Neruda record is a rare event and it is acceptable to refresh Neruda's tables relatively infrequently. This might allow us to devote fewer resources to it.
FreedomBoxes are going to make a lot of use of GPG to authenticate identity and sometimes to encrypt data as well. To strengthen the web of trust, we did some key signing and also introduced some participants to gpg, generated keys and taught key management.
FreedomBox Hackfest in NYC on Presidents' Day Weekend
We're having a hackfest and you should join us!
It's in New York on February 18th, 19th and 20th. There are a lot of places we might make progress. Some easy ideas:
- streamline the install process
- improve documentation
- turn the box into a wireless router
- setup monkeysphere for proxies/VPN/tunnels
- finalize the privoxy settings
- work on building a central communications system around tor hidden services
This will be fun for people of all skills and experience. A day of pizza, beer and throwing bits against the box will make for great progress.
If you would like to help (or even if you just want to come by to say hi), please email email@example.com. If you have ideas for discrete tasks that might be tackled with a couple days of cooperation, please do join us.
Enhanced Privacy and Security for Web Browsing
One thing many people agree the FreedomBox should do is web filtering for privacy and ad-removal. Toward that end, the FreedomBox will act as a web proxy to clean up and protect web traffic.
We have a first draft version of privoxy up on git. It upgrades your web traffic to prefer ssl encryption whereever it can. It also strips tracking software from web pages to give you greater privacy and anonymity as you surf.
If you are a privoxy user, please do give this package a test run and report any problems on the issue tracker. We are working on upstreaming these changes to the privoxy project, and in the mean time, you can make a debian package quite easily from the git repository.
Further work will include writing a script to test all the https-everywhere rules and discard the ones that are broken. As well as one to periodically check for new regexes. Anybody who wants to contribute to writing that is welcome to jump on in!
More details about this part of FreedomBox can be found on our code page.
FreedomBox Wins Ashoka Changemakers Competition
The FreedomBox Foundation has won the Ashoka Changemakers Competition in the "Citizen Media" Category! This event was decided by a public vote, which means it was your help that pushed us over the top. Thank you to everybody who voted and helped spread the word. This community continues to work together in amazing ways.
Ashoka will award us $5,000, which we will use to fund further development of the FreedomBox. One of our goals is raising awareness of the need for privacy-respecting technology, and participating in the competition allowed us to present the FreedomBox to a lot of people who had never heard of it before. On that basis alone, this competition was worthwhile for the FreedomBox.
Congratulations to all the other winners and finalists. Ashoka spotlighted many good projects working toward freedom and open access to communications technology. FreedomBox will surely cross paths with those projects again.
Vote for FreedomBox in Ashoka Changemaker's Competition
The FreedomBox has made it to the final round in Ashoka's Changemakers competition and now things will come down to a public vote! We already won the Early Entrant's prize when we first put in our application. And a strong showing in the voting would put the project in a strong position for a Fellowship that would fund significant project work. Please take a moment to [vote for us](http://www.changemakers.com/citizenmedia?utm_source=contacts-enthus&utm_medium=email-others&utm_content=vote&utm_campaign=citizenmedia)! (Scroll all the way down.) Signup might be required, though they've assured me they won't spam you. If you're on Facebook, You can also [vote via your Facebook account](https://apps.facebook.com/changemakers/citizenmedia), which is easier, faster and fraught with privacy implications. And please spread the word. A few moments of help could mean a lot to moving this project forward.
What Is A Distributed Social Network?
J David Eisenberg made an excellent comic introduction to distributed social networks. For anybody who isn't quite sure why the FreedomBox is important, that's a fun and non-technical way to explain it.
Elevate and ContactCon
James Vasile attended Douglas Rushkoff's ContactCon to promote the FreedomBox. Thanks to Douglas Rushkoff and Venessa Miemis for inviting us to present and producing the event! My talk there was The FreedomBox in 4 Minutes. He didn't just go to talk, the FreedomBox project won a prize at ContactCon, too! We'll have a full announcement about that soon.
James headed straight from ContactCon to Austria's Elevate festival. While there, he hopped over to MAMA/Hacklab in Zagreb and also presented the FreedomBox in Ljubljana. Elevate was packed with great technology, media and arts events. Many thanks to Daniel Erlacher for the invitation and to Elevate for their donation to the FreedomBox Foundation. James's Elevate talk was called Freedom Out of the Box.
FreedomBox at LinuxConf North America
FreedomBox Foundation's founder Eben Moglen and Tech Leader Bdale Garbee will be attending the next Linux Conference North America in Vancouver, Aug 17-19. This year's edition marks the 20th anniversary of Linux kernel, a major milestone for the community.
Bdale Garbee will speak on Wed Aug 17th at 3pm in Plaza B.
- Freedom, Out of the Box! by Bdale Garbee
a status update on the development of "FreedomBox", a personal server running a free software operating system and free applications, designed to create and preserve personal privacy by providing a secure platform upon which federated social networks can be constructed.
Prof. Eben Moglen will speak at the panel 20 years of Linux right after Bdale's speech and he will available also during other social events. Follow us on identi.ca/twitter to get last minute announcements.
IRC Chatlog 2011-08-15 15:00UTC
FreedomBox IRC meeting on Aug 15
FreedomBox Foundation will host a one hour meeting on IRC with executive director James Vasile and tech leader Bdale Garbee on August 15th.
You'll be able to ask questions about the advancement of the project, the challenges it is facing and the opportunities that are being tapped.
Update: read the log of the conversation here.
FreedomBox Update After DebConf
Many hackers involved in FreedomBox had the chance to meet in Banja Luka at DebConf11. Bdale Garbee gave a speech highlighting the status of the development. The full recording of the session is available on Debian's site. If you already know the basic of FreedomBox project, skip to minute 33 to hear the latest development and the next steps.
Interesting talks for FreedomBox at DebConf
There are going to be lots of interesting occasions to learn about FreedomBox and start hacking on the system during Debian's DebConf 2011, starting officially on July 24th.
We have selected a few talks related directly or indirectly to FreedomBox from the full agenda:
- FreedomBox Progress Report: Using Debian to Create and Preserve Freedom, by Bdale Garbee
- ARM BoF:Porting, news and discussions, by Steve McIntyre
- Delivering Multi-Platform Applications:Build on Debian, run anywhere, by Bdale Garbee
- Debian as though cryptographic authentication mattered, by Daniel Kahn Gillmor
- Bootstrapable Debian: Cyclic dependencies, staged builds and cross-compiling, by Wookey
- Blending Debian: Debian Pure Blends as a way to structurise the project, by Andreas Tille
- Distributed Naming BoF, by Daniel Kahn Gillmor
- Debian dErivatives eXchange (DEX) BoF, by Stefano Zacchiroli
All the talks will be streamed live and there will always be an IRC channel live to ask questions to the speakers. Stay tuned for more details, follow @freedomboxfndn on Identi.ca.
A lot of people have been asking for an update, which is a good indication that we need to update folks more often.
Bdale Garbee will be at DebConf11. He and Clint Adams will be running a hackfest. If you are going to be there (a lot of FreedomBoxers are also Debian devs), please track him down and ask him any question you have about the box. His answers will be thoughtful and perhaps surprising.
I'm told the smart phone high five has been the subject of some fevered hacking. Stefano Maffulli organized hacking on that in small community events and it is starting to produce useful work. Now to get that code in to a gittable place!
The need for a roadmap is clear. Everywhere I go people want a framework into which they can start putting their work. The TAC is pondering that and I hope we will have it shortly. In the short term, Bdale and the TAC are working on a build release. This will be a basic build system on top of which we can start putting packages. It will give us all a common reference point to hack from.
The mailing list is a hotbed of development discussion. Jonas Smedegaard is a one-man packaging machine (I hear he'll be at DebConf too!), and that's a huge step. Others projects, like PageKite are building pieces that we hope can be integrated into FreedomBox soon. Debian-style development is chaotic. There are too many ideas to take them all, but before this is through, I think we'll have considered every possible combination of software. I hope that shortly some of those discussions will result in meta-packages that configure combinations of software to work nicely together.
Speaking of configuration, we are thinking hard about a configuration process and model. With the many possible package configurations, each with its own method of storing configuration and state, handling conflicts (as well as expert-user tweaks made outside the normal interface) will be difficult. We have some design ideas for that structure, but I sense this is an area where we will adopt somebody else's design rather than invent anything new.
Administratively, we've assembled the Foundation pieces. We have a board. Yesterday, the board converted me from a presumptuous volunteer into the executive director. I don't think that changes what I will do except it allows me to do more of it and I can feel a little more comfortable making statements about what the Foundation is up to.
We have done a lot of work with Marvell and Global Scale. Helping the box manufacturers streamline license compliance is a big task, but we've been making real progress. Clint identified some parts of the Dream Plug that didn't build properly or for which the true source wasn't available. After some dialog with upstream, we're getting all that source. The next step is helping upstream publish that code in a routine way.
Stefano and I have been searching for UX and human interface designers who might help us with one of the most difficult parts of this project. Eben Moglen, Ian Sullivan, Bdale and I have had many phone conversations about how the user configures the box. We agree it needs as few buttons as possible. We agree it needs sane defaults as well as expert modes. We agree it listens on port 80 but also talks to your phone. Beyond that, we agree we need expert help.
We have had offers of help from hacker spaces in California and Texas! We would like to connect with as many hacker spaces as possible. Stefano and I are trying to make a hackfest-in-a-box kit and hack spaces are the perfect place to deploy those kits. If you are involved in a hack space and can pull some awesome geeks together for a night of fun, I want to talk to you.
That's the update. More soon.
Best regards, James Vasile
Scholar and Internet Guru Yochai Benkler Joins FreedomBox Board
FreedomBox Foundation is pleased to announce the latest addition to its Board of Directors, Harvard University law professor Yochai Benkler. The notable scholar and social scientist is the author of the influential works Coase's Penguin and The Wealth of Networks, as well as his newest book, The Penguin and the Leviathan: How Cooperation Triumphs over Self-Interest.
"We're excited to have Yochai on board. He will provide insight into the most important challenge of the FreedomBox, that is, understanding how this technology can fit seamlessly into the daily lives of people," said Eben Moglen, president of the foundation.
FreedomBox Foundation is a non-profit project with the mission of developing a network device and open source software that protects privacy, anonymity and security on the Internet, a cause to which Benkler is personally and professionally dedicated. "The FreedomBox will change the way people talk to each other on the Internet," he said. "We are giving people control over their digital lives by protecting these basic human rights." The long-range goal of the project is to make "Freedom Boxes" available to the average consumer.
Benkler is the Berkman Professor of Entrepreneurial Legal Studies at Harvard, and co-director of the Berkman Center for Internet and Society. Since the 1990s, he has enlightened the world about innovation and collaboration in the digital commons as well as information production and freedom in the networked economy and society.
Benkler's forward-thinking books and other socially-engaged works have earned him many awards, including the Electronic Frontier Foundation's Pioneer Award, the Ford Foundation Visionaries Award, the Public Knowledge's IP3 Award and the Donald McGannon Award for Social and Ethical Relevance in Communications Policy Research. The Financial Times has cited his work as "perhaps the best work yet about the fast moving, enthusiast-driven Internet."
Benkler joins a growing board of well-respected free and open source software veterans, which boasts the help of former Debian Project Leader Bdale Garbee in addition to Moglen, founding director of the Software Freedom Law Center. Board members, all volunteers, play an active role in technical development, administration and fundraising. Benkler has advised a range of national and international communications and intellectual property regulators and policy makers, and his work can be freely accessed at benkler.org.
FreedomBox Foundation was started by Moglen and staff from the Software Freedom Law Center as an organizational home for the various community development efforts that are already building freedom box systems. "Freedom boxes, smart devices whose engineered purpose is to work together to facilitate free communication among people safely and securely beyond the ambition of the strongest power to penetrate, can make freedom of thought and information a permanent, ineradicable feature of the net that holds our souls," said Moglen.
Source: FreedomBox Foundation
For immediate release
July 5, 2011
Contact: James Vasile, 212-461-1906, firstname.lastname@example.org
Eben Moglen video at Internet Evolution
While at Personal Democracy Forum last week, Eben was interviewed by Nicole Ferraro of Internet Evolution. The first part of that video, focusing on defining what the FreedomBox is, has now been put online here: Internet Evolution.
Further videos still to come next week.
Introducing the Technical Advisory Committee
As the community continues to push the FreedomBox from idea towards reality, it is time to expand our technical leadership team. We are happy to announce the formation of a technical advisory committee to help coordinate and guide the development efforts of this project. This advisory committee is already underway, with an initial membership of industry leaders including:
Bdale Garbee, Open Source & Linux Chief Technologist at Hewlett-Packard,
Jacob Appelbaum from the Tor project,
Sam Hartman, former Chief Technologist at the MIT Kerberos Consortium and IETF Security Area Director,
Sascha Meinrath, Director of the New America Foundation's Open Technology Initiative,
Rob Savoye, long-time GNU hacker, Gnash lead developer, and winner of the 2010 award for the Advancement of Free Software
Matt Zimmerman, former Canonical CTO
We'll be hearing more from the TAC over the coming weeks and months. Anyone interested in following the activity of the advisory committee as it happens is welcome to check out the public archives of their email list at http://lists.freedomboxfoundation.org/s/arc/tac (the list is for TAC members, so please do not attempt to subscribe). If you want to talk to the TAC in real time, they can be found in
freedombox-tac on irc.oftc.net.
How We're Going To Do This
I want to thank all the generous and dedicated contributors who made our Kickstarter "0 to 60 in 30 days" campaign a resounding success. More than 1,000 contributors took us from 0 to almost 90 in those 30 days, and we are grateful to each of your for your support. We will do our best to justify your confidence.
Your donations will allow us to begin to coordinate contributions by volunteers from every corner of the Free World. Together, we will work to make our shared vision a reality.
Ours is a large undertaking with many moving parts. We at the FreedomBox Foundation are here to help communicate, facilitate, and spread the FreedomBox project around the world. We plan to administer the effort based on four organizational pillars:
- Functional software development and integration;
- User experience design, implementation and integration;
- Communications and fund-raising; and
- Industry relations
Each of these pillars will be led by an advisory committee, with all activities coordinated by a small full-time staff at the FreedomBox Foundation.
Advisory Committee membership will evolve, as developers and others who commit themselves heavily to the project step up. Initial nominations reflecting early commitments by leaders in our community will be announced shortly. Bdale and I have begun contacting initial members of the Technical Advisory Committee that Bdale will chair. Once assembled, that Committee's first activity will be to lead the public development of an initial road-map.
More announcements concerning process and schedule will appear here soon. In addition to our financial contributors, I want to thank also the wiki editors and mailing list writers who have contributed so many good ideas and so much positive energy to launch us on this adventure together.
We've completed our Community Angel round of Kickstarter funding, and I want to thank everybody who donated, spread the word, evangelized and joined the discussion. It is amazing to see a worldwide community coalesce around supporting Freedom and developing this technology.
Current Activity and Plans
We are still searching for a community relations facilitator. We have a number of resumes and are starting to do some interviews. It's a slow process, and more great people apply every day.
We continue to seek further funding to fill out the rest of our budget.
We've started to brainstorm a roadmap at http://wiki.debian.org/FreedomBox/UserRequirements/BrainStorm. I took the results of that page and am boiling it down to essential project goals. That will be published for a round of community hacking, which will help us define exactly what this project intends to do within the broad mandate of FreedomBox possibilities.
Bdale Garbee is slowly enfolding the large amount of technical work ahead of us into his grasp. As the technical advisory committee gets up to steam and a roadmap coheres, we will start to make real progress.
I attended Libre Planet and spent a weekend waving the FreedomBox flag and inviting people to join our growing effort. It was a wonderful weekend. I encourage anybody attending conferences to do lightning talks about the project. There's a lot to talk about and the response will be terrific.
Our translation team is now over 50-strong and making short work of our existing media page. It has been a great deal of effort undertaken with grace and good humor. Thanks to all who have helped! If you want to join the fun, sign up to the translation list and introduce yourself.
We plan to form further teams around non-technical aspects of this project. These teams will manage documentation, user support, public outreach, conferences and the like.
One of the things we offered Kickstarter donors was a T-shirt. We are thus soliciting T-shirt designs. The theme of the shirt is Community Angels. It would be good to involve our logo, which was designed by Luka Marčetić.
The chosen design will be printed on t-shirts that we will give to donors. Of course, if your design is chosen, we will cover you in thanks and make sure you get a shirt too. I will also buy you a beer next time we meet.
Send designs in a free file format to email@example.com before April 15. Vector graphics preferred.
Thanks again to everybody involved and interested in this project! Your support is what makes this work. If you want a more interactive discussion than this announcement, sign up to our development list. or join us in #freedombox on oftc.net.
Best regards, James
"리브레 플래닛 (Libre Planet)" 후기
저는 이번 주말에 보스턴에서 열렸던 "리브레 플래닛 (Libre Planet)"에 참가하였습니다. 제가 참여한 목적은 프리덤 박스의 홍보였습니다. 저는 사람들에게 프리덤 박스가 실제로 존재한다는 것을 알리기 시작하였고, 후에 복도에서 만난 사람들은 프리덤 박스에 대해 엄청난 관심을 보였습니다. 예상한대로, FSF (Free Software Foundation) 관계자들은 너무나 좋은 아이디어들을 다수 보유하고 있었습니다. 어떻게 프리덤 박스 프로젝트를 시작해야 할 것인지 뿐만 아니라, 이와 같은 스코프 (scope)를 가지고 있는 프리덤 박스 프로젝트를 실제로 어떻게 조직해야 하는지에 대한 아이디어들도 보유하고 있었습니다.
많은 수의 사람들이 이 프로젝트와 관련된 자원봉사를 하는 것에 관심을 보였습니다. 저는 조만간 이러한 분들을 IRC와 이메일 토론 (email discussion)에서 뵙고 싶습니다. 특히, 롭 사보이 (Rob Savoy), 는 프리덤 박스의 개발과 관련하여 저희 모두에게 무엇인가를 가르쳐 줄 수 있는 뛰어난 인재라는 생각이 들었습니다.
저는 프리덤 박스 파운데이션을 위해 텔레컨퍼런스를 할 수 있는 시설들을 확보하는데 약간의 성과를 거두었습니다. IRC도 아주 훌륭합니다. 그러나, 저희는 여러 곳에서 시행할 수 있는 그룹 음성 통화 (group voice calls) 를 필요로 할 것입니다. 저는, 필요할 때 전화 통화를 녹음하여 기록을 할 수 있도록 해주는 아이템의 개발을, 제가 "해야할 일"의 목록에 추가하였습니다.
저는 몇몇의 경험이 풍부한 프리 소프트웨어의 전문가들과 집중적으로 이야기를 나누었습니다. 그들은 야심찬 프로젝트들을 실행시켜서 이름을 알린 하드코어 해커들이었습니다. 저는 그들 중 몇명에게, 저희의 프리덤 박스 프로젝트가 그들이 자신들의 에너지를 투입해야 할 프로젝트라는 것에 동의하게 만들었다고 생각합니다. 따라서 조만간 그들 중 몇 분이 저희와 같이 활동을 하시는 것을 여러분은 보시게 될 것입니다.
저는 오랜 기간 동안 그녀가 속한 커뮤니티를 발전시킨 경험이 있는 한 여성분을 초대했었습니다. 그러나 지금은 그녀가 하는 일이 너무 많기 때문에, 저희는 나중에 그녀를 다시 만날 계획입니다.
저는 프리덤 박스와 유사한 속성을 지닌 거대 프로젝트였던 "OLPC" 혹은 "OpenMoko"에 참여하였던 사람들과도 대화를 나누었습니다. 저는 그와 같은 거대 프로젝트들이 실행되는 동안, 잘된 점들과 잘못된 점들에 관한 흥미있는 그리고 솔직한 이야기들을 들을 수 있었습니다. 몇몇 의견들을 전달할 가치가 충분히 있는 의견들이었습니다. 그 의견들은 다음과 같습니다:
첫번째, OLPC는 그것을 사용하는 엔드 유저들 (end user) 과 그것의 인터페이스에 관한 테스트를 너무 늦게 시행하였다. 저는 이 테스트가 더 일직 시행되었어야 한다고 말하는 사람들을 여러명 만날 수 있었습니다. 따라서 프리덤 박스는 가급적 빠른 시기에, 목표로 설정한 엔드 유저들을 프리덤 박스 디자인 프로세스에 참여시켜야 합니다.
두번째, OLPC에는, 프로젝트의 한쪽 영역이 차고 넘쳐서 다른쪽 영역까지 확대될 수 있도록 요구하는 엄청난 조건들이 있었습니다. 인터페이스가 문맹자에 의해서도 사용가능 하도록 만들어져야 한다는 조건에 의해 많은 창조적인 디자인들이 개발되기는 하였으나, 그것으로 인해 다른 임무들이 힘들어지는 역효과를 낳기도 하였습니다.
세번째, OpenMoko 에 참여하였던 사람들은 많은 시간을 배포 (distribution)에 사용하였습니다. 그것은 그들의 플렛폼에 필요한 수없이 많은 데비안 패키지들을 포장하고 리컴파일링 (recompiling) 하는데 시간을 보낸 것을 의미합니다. 이것에 많은 자원을 투입하였는데, 그것의 성과는 미미했습니다. 따라서, 프리덤 박스는 결코 데비안에 바탕을 둔 배포를 하여서는 안됩니다 또한, 이미 존재하고 있는 패키지들에 상당부분 의지하는 데비안 에 바탕을 둔 프로젝트가 되어서도 안됩니다.
"메시 네트워킹"을 실현시키는 것은 힘든 일입니다. 제가 만나본 그 어떤 사람도 메시 네트워킹에 정통한 사람을 알지 못하였습니다. 저는 조만간 메시 네트워킹과 관련하여 저명한 사람들을 모두 모아서 토론을 가질 예정입니다. 이 토론을 통해 저희는, 저희가 협력을 통해 가장 유망한 네트워크를 구축할 가능성이 있는지를 알아볼 것입니다.
마이클 스톤 (Michael Stone)은 헤일마이어의 교리문답 (Heilmeyer's Catechism) <"http://www.cs.umbc.edu/~finin/home/heilmeyerCatechism.html"> 을 강조하였습니다. 그 교리문답은 유익한 것이었습니다.
이와 같이 훌륭한 컨퍼런스를 개최한 FSF (Free Software Foundation)의 매트 리 (Matt Lee)에게 정말 감사드립니다. 또한 저를 도와주시고 도시를 구경시켜주신 뎁 니콜슨 (Deb Nicholson)에게 감사드립니다. 그녀는 프리덤 박스 프로젝트에 어떻게 하면 더 많은 사람들을 참여시킬 수 있는지에 대해 좋은 아이디어들을 많이 가지고 있었습니다.
프리덤 박스 파운데이션은 이 프로젝트를 굳건히 확립시키기 위해 필요한 조치들을 취하고 있습니다. 그 첫번째 단계는, 프로젝트를 성공적인 것으로 만들기 위해, 커뮤니티의 프로젝트 관련 논의를 촉진하는 것인니다. 그 목표를 달성하기 위하여, 저희는 "커뮤니티 관계 관리자"를 채용할 계획입니다. 이 광고가 그러한 일을 할 수 있는 사람에게 전달될 수 있도록 도움을 주시기 바랍니다.
저희 프리덤 박스 파운데이션은 프리덤 박스 프로젝트와 관련하여 지역사회의 논의를 활성화 시키고, 언론 보도 등의 업무를 담당할 의욕 있고, 재능 있으며, 자유에 관심이 많은 인재를 채용하고자 합니다. 채용될 경우, 담당하시게 될 업무는 다음과 같습니다. 공공 혹은 언론 보도 등과 관련하여 외부와 연락 취하기, 프로젝트와 관련된 이벤트 기획하기, 저희의 소셜 네트워크 관리하기, 그리고 지속적으로 저희의 메세지를 전달하기 입니다.
커뮤니티 관계 형성, 언론 혹은 PR과 관련된 업무 경험이 있으시면 환영합니다. 특히 프리 소프트웨어 커뮤니티와 관련된 업무 경험이 있으실 경우 더 환영합니다. 소셜 미디어와 관련된 업무 경험이 있으실 경우 특히 우대 해드립니다. 만약 있으실 경우에는 "프로파일" 혹은 "계정이름"을 저희에게 알려주시기 바랍니다. 그러면 저희가 여러분의 과거 업무 성과와 현재 상황에서 어떻게 여러분의 능력이 활용되어 질 수 있는지를 모색하도록 하겠습니다. 자신이 생각하기에, 프리덤박스가 지금 이순간 자신의 시간을 투자해야할 가장 중요한 일이면, 당신은 저희가 만나보고 싶은 사람입니다.
효율성과 재정적 자원을 극대화 시키기 위해서, 채용이 되시는 분은 프리덤 박스 파운데이션(FreedomBox Foundation)과 소프트웨어 프리덤 법률 센터 (Software Freedom Law Center) 두 기관 모두와 일을 하게 (그리고 연봉도 수령하게) 될 것입니다.
이력서를 "오픈 파일 (open file)" (플래인 텍스트 선호) 형식으로 보내주시기 바랍니다. 보내주실 주소는 "firstname.lastname@example.org" 입니다. 연봉은 경험과 이 프로젝트를 하시는데 투입하실 시간에 따라 추후 협의 하겠습니다.
저는, 저희의 기금 마련 캠페인인 Kickstarter "[프리덤 박스 파운데이션이 30일내에 도약할 수 있게 60K (60,000) 모금 하기] (http://www.kickstarter.com/projects/721744279/push-the-freedombox-foundation-from-0-to-60-in-30/)"가 모금 목표 금액인 $60,000 을, 모금 마감일보다 25일 일찍 달성하였다는 소식을 전해드릴 수 있어서 기쁨니다. 저희의 이와 같은 이른 목표달성을 가능하게 하였던 가장 큰 기부는 블레인 쿡(Blaine Cook) 에 의해 이루어졌습니다. 그는 트위터의 전 수석 아키텍트(architect)였습니다. 이와 같은 그의 행위는 분명 저희에게 자신감을 심어주었습니다. 뿐만 아니라, 저희는 이렇게 일찍 목표금액 모금 달성에 도움을 주기 위해서 저희 프로젝트에 기부금을 내주신 모든 분들께 감사를 드리고 싶습니다. 그리고, 모든 분들이 계속해서 이 프로젝트를 지켜봐 주셨으면 합니다.
프로젝트를 위해 보내주신 뜨거운 성원에 감사드립니다. 그리고 전세계에 걸쳐있는 다양한 커뮤니티들에 속하신 분들께서 보여주신 관심에 감사드립니다. 프로젝트와 관련해서 해야 될 일들이 정말 많은 상황에서 저희와 뜻을 같이 해주시는 분들이 이렇게 많이 계시다는 것을 알게 된 것은 정말 기분좋은 일입니다. 같은 선상에서, 저희의 프로젝트의 조직과 가까운 미래에 관한 계획에 관해 알아보시기 위해서는 홈페이지에 관심을 가져주시기 바랍니다. 그 밖에도 오늘 내로 FAQ 등을 비롯한 관련 소식들이 파운데이션의 홈페이지 에 실릴 예정입니다.
프리덤 박스 파운데이션은 이제 전세계에 퍼져 있는 커뮤니티들과 협력하기 위한 노력을 하기 시작하였습니다. 저희는 전세계에 퍼져있는 모든 사람들과 그 사람들의 언어로 소통을 하고자 합니다. 이것이 저희가 프리덤 박스의 초기 단계에서부터 "번역"을 삽입하려고 하는 이유입니다.
저희의 자료 대부분이 비디오 자료이기 때문에, 번역을 하기 위한 첫번째 단계는 "번역표기"입니다. 만약 여러분이 영어를 하실 수 있으시고, 더 넓은 계층에 이러한 메세지가 전파되는데 도움이 되기를 바라시면, 저희의페이지에 들리셔서 어떠한 자료들이 번역표기를 필요로 하는지 살펴보시기 바랍니다.
만약 영어 이외에 다른 언어를 구사하실 수 있으시면, 저희는 번역에 있어 여러분의 도움을 필요로 합니다. 저희는 프로젝트와 관련된 자료들을 훌륭히 번역하기 위해 다양한 언어들을 사용하는 그룹들을 조직하고 있습니다. 홈페이지에 게시된 각종 비디오들, 방대한 웹 페이지들, 뉴스 보도 자료들 등이 그 대상들입니다. 만약 관심이 있으실 경우, email@example.com 로 이메일을 주시거나, 저희의 페이지에 들어오셔서 더 많은 사항들에 관해 살펴보시기 바랍니다.
저희는 이와 같은 연대를 최대한 쉽게 만들기 위해, 메일링 리스트와 다른 커뮤니케이션 도구들을 제공할 것입니다. 그러나 이와 같은 모든 작업들은 여러분의 도움을 필요로 합니다.
프리덤 박스 파운데이션으로 이메일을 보내주시기 바랍니다. 주소는 firstname.lastname@example.org 입니다. 어떠한 언어를 구사하실 수 있으신지를 저희에게 알려주시면, 저희가 팀을 조직하도록 하겠습니다.
오픈 소스계의 베테랑인 비델 가비 (Bdale Garbee)님께서 저희 프리덤 박스 파운데이션 이사회 멤버가 되셨습니다.
NEW YORK, March 10, 2011-- The FreedomBox Foundation, based here, today announced that Bdale Garbee has agreed to join the Foundation's board of directors and chair its technical advisory committee. In that role, he will coordinate development of the FreedomBox and its software.
가비 (Garbee)는 프리 소프트웨어 커뮤니티에서 오랫동안 지도자이자 개발자로 활동을 하여왔습니다. 그는 휴렛 팩커드 (Hewlett Packard)에서 오픈소스와 리눅스 관련 수석 테크놀로지스트 (Chief Technologist)로 활동하고 있습니다. 또한 그는 데비안 (Debian) 기술 위원회 (Technical committee)의 위원장으로 활동을 하고 있고, 데비안 GNU/Linux 의 보급 혹은 다른 프로젝트들과 관련된 재정적 후원을 하는 있는 비영리 기구인 "공익을 위한 소프트웨어 (Software in the Public Interest)"의 대표이기도 합니다.
프리덤 박스 파운데이션 (FreedomBox Foundation)의 디렉터인 에벤 모글렌 (Eben Moglen)교수님은 "비델 (Bdale)은 프리 소프트웨어 커뮤니티에서 개발자 겸 리더로서 최고의 역량을 발휘해 왔습니다. 그는 프리덤박스의 기술적인 분야를 담당할 최적의 인물입니다."라고 말했습니다.
가비 (Garbee)는 "이와 같이 열성적인 커뮤니티와 함께 이번 프로젝트에 참여할 수 있게 되어서 매우 기쁩니다. 장기적으로 봤을 때, 이 프로젝트는 제가 현재 하고 있는 일들 중에 가장 중요한 일이 될 것으로 확신합니다."라고 말했습니다.
The Foundation's formation was announced in Brussels on February 4, and it is actively seeking funds; it recently raised more than $80,000 in less than fifteen days on Kickstarter.
프리덤 박스 파운데이션에 관하여
프리덤 박스 프로젝트는 프리 소트프웨어 운동의 일환입니다. 이 프로젝트는 작은 컴퓨터의 보급이 핵심인데, 이 작은 컴퓨터를 통해 각 개인들은, 자신의 자유, 익명성, 안전을 컨트롤 할 수 있게 될 것입니다. 이것은 각 개인들이 정부의 감시, 상업적인 기업들의 추적, 그리고 강압적인 인터넷 서비스 프로바이더 (Internet Service Provider) 들로부터 안전하게 될 수 있다는 것을 의미합니다.
에벤 모글렌 (Eben Moglen) 교수님은 현재 콜롬비아 로스쿨 (Columbia Law School)의 교수이시며, 델라웨어 (Delaware)에 설립된 비영리 기구인 프리덤 박스 파운데이션 (FreedomBox Foundation)의 설립 책임자이십니다. 현재 프리덤 박스 파운데이션은 501(c)(3) 지위를 얻기 위한 신청을 한 상태입니다. 프리덤 박스 파운데이션은 프리덤 박스의 개발을 지원하고 있고, 프리덤 박스가 전세계적으로 보급되도록 지원하고 있습니다.
추가적인 정보를 원하시는 분은 이안 설리번 (Ian Sullivan)에게 연락을 주시기 바랍니다. 이메일 email@example.com 혹은 홈페이지 http://freedomboxfoundation.org 를 참조하시기 바랍니다.
오늘은 저희 재단과 저희 프로젝트를 알리는 각종 "언론 보도"와 관련하여 뜻깊은 날이었습니다. 저희는 짐 드와이어 (Jim Dwyer)기자를 통해 뉴욕 타임즈 에 저희와 관련된 기사를 실으면서 하루를 시작하였습니다. (빅 브라더가 당신을 찾지 못하게 인터넷을 분산시키자). 또한 오후에는 :
- [월 스트리트 저널] (http://blogs.wsj.com/digits/2011/02/16/freedom-box-needs-a-good-user-interface/) (훌륭한 유저 인터페이스를 필요로 하는 프리덤 박스)
- 지 디 넷 (프리덤 박스: 순차적으로 인터넷 서버들을 자유로이 해방시키다)
- 테크 프레지던트 (이집트, 오프 스위치, 그리고 유약한 인터넷)
- 뉴욕 옵저버 (논쟁: 미국인들이 자기 스스로 서버를 소유하는 날이 올 수 있을 것인가?)
- 뉴 유럽 (에벤 모글렌: 자유로운 세계는 프리 소프트웨어를 필요로 한다)
- 그리고 심지어는 법률 잡지인 [ABA 저널]에도 (http://www.abajournal.com/news/article/law_prof_urges_work_on_freedom_box_to_decentralize_the_internet/) (법학 교수, 인터넷의 중앙집중을 방지하기 위해 "프리덤 박스"와 관련된 일에 박차를 가하다),라는 기사가 실렸습니다.
이와 같은 언론의 기사들, 그리고 트위터와 identi.ca 에 게재된 글들은, 앞으로 저희가 하여야 할 일들과 관련된 중요한 요소들을 많이 지적하고 있습니다. 저희는 이와 같은 지적들에 대한 적절한 해결책을 가까운 시일 내에 제시하고자 합니다. 이와 같은 행위는, 저희의 재단을 공고히 하고, 저희의 공적활동을 확대해나가는 일이기도 합니다. 저희의 활동과 관련하여 관심이 있으신 분들은, 지속적으로 관심을 가져 주시기 바랍니다.
The process of getting from idea to an organization and from organization to living, breathing, functioning reality can be long and difficult. It has taken the foundation almost a full year to move from idea to organization and events around the world are making it clear we can't wait another year before getting freedom boxes off of the technical design board and into people's lives. So we're making a break for it and trying to get off the ground in one big push via Kickstarter.
We're calling it "Push the FreedomBox Foundation from 0 to 60 in 30 days" and we're asking for your help to do just that.
Eben has estimated that the work of pulling all the software components necessary for a freedom box together and building them into one system can be done with $500,000. We're not trying to raise all of that money here. We just need enough funds to get off the ground and to demonstrate the size and determination of our community. That is the best motivator for everyone involved with the project, and the kickstarter pledge rewards are pretty cool too, so please do check it out.