SlideShare a Scribd company logo
1 of 31
Download to read offline
Free as in freedom.
The importance of FOSS
in the surveillance era
Avv. Giovanni Battista Gallus
LL.M. Ph.d. ISO 27001 Lead Auditor
2
The “Circolo dei Giuristi Telematici", founded
in 1998, is the oldest Italian association of
“cyberlawyers”
Very active mailing list, with many members,
including attorneys, in-house lawyers,
consultants, law professors and forensics
experts.
More information (Italian only):
info@giuristitelematici.net
http://www.giuristitelematici.it
@CircoloGT
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
Exactly one year ago...
@gbgallusAvv. Giovanni Battista Gallus
(Council of Europe
Commissioner for human
rights)
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
"Even though the prime minister has declared that "there are presently no
plans to attack [Tor-type] anonimizaton", we expect that the coming laws
(for instance the one extending for another 3 months the state of
emergency) might include anti-strong crypto provisions, either directly
in the law project or through amendments during the Parliamentary
deliberation. We consider that this is the most critical issue on the
agenda of digital issues stricto sensu (the rest belonging to the no
less worrying domain of general tramping on fundamental rigths).”
Philippe Agrain, La Quadrature du Net
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
Simplified
workflow for the
war on terror
May be
used by
terrorists
X
(device,
infrastructure,
software...)
BAN!!! OK!
START
STOP
Yes No
@gbgallusAvv. Giovanni Battista Gallus
Should we ban all
black Seat?
@gbgallusAvv. Giovanni Battista Gallus
What about Ford
F250 and Toyota
pickup trucks?
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
By NicoBZH from Saint Etienne - Loire, France [CC BY-
SA 2.0, via Wikimedia Commons
Let me be crystal clear:
Weakening encryption or taking
it away harms good people who
are using it for the right reason
Tim Cook
16 January 2016 (Encryption in France)
France may prohibit strong encryption.
If that happens, I may be unable ever to
go to France again.
RMS
Very unlikely allies ...
@gbgallusAvv. Giovanni Battista Gallus
@gbgallusAvv. Giovanni Battista Gallus
●
If we can't have a
backdoor or ban
encryption, we'll use ...
@gbgallusAvv. Giovanni Battista Gallus
●
"The easiest way for someone to
eavesdrop on your communications
isn’t to intercept them in transit
anymore; it’s to hack your computer.
And there’s a lot of government
hacking going on.”
Bruce Schneier, Data and Goliath,
2015
@gbgallusAvv. Giovanni Battista Gallus
●
The
“Bundestrojaner”
(aka State Trojan)
Photo by Leralle
@gbgallusAvv. Giovanni Battista Gallus
●
UK Draft Investigatory
powers bill
@gbgallusAvv. Giovanni Battista Gallus
●
Food for thoughts
It is a lie that the state of emergency
protects democracy. Historians do
know that it is the opposite.
The state of emergency is the
device which has been used by
totalitarian regimes in Europe
Giorgio Agamben, Le Monde
@gbgallusAvv. Giovanni Battista Gallus
●
Food for thoughts
The "security" they talk about does not aim at
preventing terrostist act (which is really
difficult [...]), but rather to establish a
widespread and limitless controll on the
population (that's why they are so focused on
the total control of citizens' data, including
full access to the content of any device)
Giorgio Agamben, Le Monde
@gbgallusAvv. Giovanni Battista Gallus
What can we do?
Ludovic Hirlimann
@gbgallusAvv. Giovanni Battista Gallus
●
Develop secure SW
"The real problem is that few
developers learn how to develop
secure software, even though nearly
all programs are under attack
(because they connect to the Internet
or take data from the Internet)”
David A. Wheeler
How to Prevent the next Heartbleed
@gbgallusAvv. Giovanni Battista Gallus
●
Use a standard FLOSS
license
"I believe that much more code
review and many more contributions
would occur if OpenSSL used a
standard widely-used license.”
David A. Wheeler
How to Prevent the next Heartbleed
@gbgallusAvv. Giovanni Battista Gallus
●
What can we do?
Fight the FUD!
Become active citizens, and raise
awareness
Develop better & simpler tools
Support all advocacy groups which are
fighting the costly battle for
fundamental rights
@gbgallusAvv. Giovanni Battista Gallus
By NicoBZH from Saint Etienne - Loire, France [CC BY-
SA 2.0, via Wikimedia Commons
He who sacrifices [free software] freedom for 
security deserves neither
Benjamin Franklin meets RMS
@gbgallusAvv. Giovanni Battista Gallus
Questions?Questions?
@gbgallusAvv. Giovanni Battista Gallus
●
Thank you
Avv. Giovanni Battista Gallus
gallus@array.eu @gbgallus
Unless stated otherwise,
all texts are distributed
under a Creative Commons
Attribution – non
commercial – sharealike
3.0 Unported license

More Related Content

Similar to Free as in freedom. The importance of FOSS in the surveillance era

Google in China
Google in China Google in China
Google in China
guestfbc5d4
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentation
guestfbc5d4
 
The future of internet
The future of internetThe future of internet
The future of internet
psp710
 

Similar to Free as in freedom. The importance of FOSS in the surveillance era (20)

Trojans and criminal investigation: is it possibile to find a balance with fu...
Trojans and criminal investigation: is it possibile to find a balance with fu...Trojans and criminal investigation: is it possibile to find a balance with fu...
Trojans and criminal investigation: is it possibile to find a balance with fu...
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot
 
We Are Social: Curiosity Stop #7
We Are Social: Curiosity Stop #7We Are Social: Curiosity Stop #7
We Are Social: Curiosity Stop #7
 
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGESTGOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
GOOGLE FAILURE, ETHEREUM LEAPS, ECB GIVEOUT IN COINTELEGRAPH DAILY DIGEST
 
Controlling Anarchy in the Ecosystem: Centralized Content for the Internet o...
Controlling Anarchy in the Ecosystem:  Centralized Content for the Internet o...Controlling Anarchy in the Ecosystem:  Centralized Content for the Internet o...
Controlling Anarchy in the Ecosystem: Centralized Content for the Internet o...
 
Dell jort kollerie
Dell jort kollerieDell jort kollerie
Dell jort kollerie
 
Robotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentationRobotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentation
 
Google in China
Google in China Google in China
Google in China
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentation
 
Take Down
Take DownTake Down
Take Down
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
 
The future of internet
The future of internetThe future of internet
The future of internet
 
Panama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital AgePanama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital Age
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 

More from Giovanni Battista Gallus

Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008
Giovanni Battista Gallus
 

More from Giovanni Battista Gallus (10)

Presentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di TorinoPresentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di Torino
 
Free/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issuesFree/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issues
 
Gallus presentazione droni_cortina
Gallus presentazione droni_cortinaGallus presentazione droni_cortina
Gallus presentazione droni_cortina
 
I droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallusI droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallus
 
Ijf14 tutela fonti_anonime_gallus
Ijf14 tutela fonti_anonime_gallusIjf14 tutela fonti_anonime_gallus
Ijf14 tutela fonti_anonime_gallus
 
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista GallusPresentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
 
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
 
Presentazione_linuxday
Presentazione_linuxdayPresentazione_linuxday
Presentazione_linuxday
 
Gallus oristano 25.2.12
Gallus oristano 25.2.12Gallus oristano 25.2.12
Gallus oristano 25.2.12
 
Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008
 

Recently uploaded

Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
Airst S
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 

Recently uploaded (20)

Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 

Free as in freedom. The importance of FOSS in the surveillance era

  • 1. Free as in freedom. The importance of FOSS in the surveillance era Avv. Giovanni Battista Gallus LL.M. Ph.d. ISO 27001 Lead Auditor
  • 2. 2 The “Circolo dei Giuristi Telematici", founded in 1998, is the oldest Italian association of “cyberlawyers” Very active mailing list, with many members, including attorneys, in-house lawyers, consultants, law professors and forensics experts. More information (Italian only): info@giuristitelematici.net http://www.giuristitelematici.it @CircoloGT
  • 5. @gbgallusAvv. Giovanni Battista Gallus Exactly one year ago...
  • 6. @gbgallusAvv. Giovanni Battista Gallus (Council of Europe Commissioner for human rights)
  • 11. @gbgallusAvv. Giovanni Battista Gallus "Even though the prime minister has declared that "there are presently no plans to attack [Tor-type] anonimizaton", we expect that the coming laws (for instance the one extending for another 3 months the state of emergency) might include anti-strong crypto provisions, either directly in the law project or through amendments during the Parliamentary deliberation. We consider that this is the most critical issue on the agenda of digital issues stricto sensu (the rest belonging to the no less worrying domain of general tramping on fundamental rigths).” Philippe Agrain, La Quadrature du Net
  • 13. @gbgallusAvv. Giovanni Battista Gallus Simplified workflow for the war on terror May be used by terrorists X (device, infrastructure, software...) BAN!!! OK! START STOP Yes No
  • 14. @gbgallusAvv. Giovanni Battista Gallus Should we ban all black Seat?
  • 15. @gbgallusAvv. Giovanni Battista Gallus What about Ford F250 and Toyota pickup trucks?
  • 17. @gbgallusAvv. Giovanni Battista Gallus By NicoBZH from Saint Etienne - Loire, France [CC BY- SA 2.0, via Wikimedia Commons Let me be crystal clear: Weakening encryption or taking it away harms good people who are using it for the right reason Tim Cook 16 January 2016 (Encryption in France) France may prohibit strong encryption. If that happens, I may be unable ever to go to France again. RMS Very unlikely allies ...
  • 19. @gbgallusAvv. Giovanni Battista Gallus ● If we can't have a backdoor or ban encryption, we'll use ...
  • 20. @gbgallusAvv. Giovanni Battista Gallus ● "The easiest way for someone to eavesdrop on your communications isn’t to intercept them in transit anymore; it’s to hack your computer. And there’s a lot of government hacking going on.” Bruce Schneier, Data and Goliath, 2015
  • 21. @gbgallusAvv. Giovanni Battista Gallus ● The “Bundestrojaner” (aka State Trojan) Photo by Leralle
  • 22. @gbgallusAvv. Giovanni Battista Gallus ● UK Draft Investigatory powers bill
  • 23. @gbgallusAvv. Giovanni Battista Gallus ● Food for thoughts It is a lie that the state of emergency protects democracy. Historians do know that it is the opposite. The state of emergency is the device which has been used by totalitarian regimes in Europe Giorgio Agamben, Le Monde
  • 24. @gbgallusAvv. Giovanni Battista Gallus ● Food for thoughts The "security" they talk about does not aim at preventing terrostist act (which is really difficult [...]), but rather to establish a widespread and limitless controll on the population (that's why they are so focused on the total control of citizens' data, including full access to the content of any device) Giorgio Agamben, Le Monde
  • 25. @gbgallusAvv. Giovanni Battista Gallus What can we do? Ludovic Hirlimann
  • 26. @gbgallusAvv. Giovanni Battista Gallus ● Develop secure SW "The real problem is that few developers learn how to develop secure software, even though nearly all programs are under attack (because they connect to the Internet or take data from the Internet)” David A. Wheeler How to Prevent the next Heartbleed
  • 27. @gbgallusAvv. Giovanni Battista Gallus ● Use a standard FLOSS license "I believe that much more code review and many more contributions would occur if OpenSSL used a standard widely-used license.” David A. Wheeler How to Prevent the next Heartbleed
  • 28. @gbgallusAvv. Giovanni Battista Gallus ● What can we do? Fight the FUD! Become active citizens, and raise awareness Develop better & simpler tools Support all advocacy groups which are fighting the costly battle for fundamental rights
  • 29. @gbgallusAvv. Giovanni Battista Gallus By NicoBZH from Saint Etienne - Loire, France [CC BY- SA 2.0, via Wikimedia Commons He who sacrifices [free software] freedom for  security deserves neither Benjamin Franklin meets RMS
  • 30. @gbgallusAvv. Giovanni Battista Gallus Questions?Questions?
  • 31. @gbgallusAvv. Giovanni Battista Gallus ● Thank you Avv. Giovanni Battista Gallus gallus@array.eu @gbgallus Unless stated otherwise, all texts are distributed under a Creative Commons Attribution – non commercial – sharealike 3.0 Unported license