Bitcoin Tree



Plant the Seed.
Make the tree grow!
You'll never enjoy it's shadow!
But you joice knowing the next generations to come,
Will thrive under it's Legacy...





CypherPunk Movement

THE CYPHERPUNK MOVEMENT

Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s.

Cryptography for the People

Encryption was primarily used for military purposes before the 1970s. People at that time were living in an analog world. Few had computers and even fewer could imagine a technology that would connect almost every human being on the planet – the internet.

Two publications brought cryptography into the open, namely the โ€œData Encryption Standardโ€ published by the US Government, and a paper called โ€œNew Directions in Cryptographyโ€ by Dr. Whitfield Diffie and Dr. Martin Hellman, published in 1976.

Dr. David Chaum started writing on topics such as anonymous digital cash and pseudonymous reputation systems in the 1980s, such as the ones described in โ€œSecurity without Identification: Transaction Systems to make Big Brother Obsoleteโ€. This was the first step toward the digital currencies we see today.

The Cypherpunks

We walk on shoulders of Giants!
Hughes, May, Back, Finney, Gilmore, Szabo

It wasnโ€™t until 1992 that a group of cryptographers in the San Francisco Bay area started meeting up on a regular basis to discuss their work and related ideas. They built a basis for years of cryptographic research to come.

Besides their regular meetings, they also started the Cypherpunk mailing list in which they discussed many ideas including those which led to the birth of Bitcoin.

In late 1992 Eric Hughes, one of the first cypherpunks, wrote โ€œA Cypherpunkโ€™s Manifestoโ€ laying out the ideals and vision of the movement.

Note: We encourage you to read A Cypherpunkโ€™s Manifesto. The Manifesto is just as relevant today as it was in 1992. This short read takes only a few minutes of your time. Itโ€™s astonishing to see how much foresight the early members had when most people didnโ€™t even think about computers yet.


A Cypherpunksโ€™s Manifesto

An excerpt from the Manifesto:

โ€œPrivacy is necessary for an open society in the electronic age.

Privacy is not secrecy.

A private matter is something one doesnโ€™t want the whole world to know, but a secret matter is something one doesnโ€™t want anybody to know.

Privacy is the power to selectively reveal oneself to the world.โ€

โ€œPrivacy in an open society also requires cryptography.

If I say something, I want it heard only by those for whom I intend it.

If the content of my speech is available to the world, I have no privacy.

To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy.โ€

โ€œWe must defend our own privacy if we expect to have any.

We must come together and create systems which allow anonymous transactions to take place.

People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers.

The technologies of the past did not allow for strong privacy, but electronic technologies do.โ€

โ€œWe the Cypherpunks are dedicated to building anonymous systems.

We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.โ€


Electronic Cash

Although you might have just heard about this movement for the first time, you have most definitely benefitted from the efforts of some of their members in building Tor, BitTorrent, SSL, and PGP encryption. It should not surprise you that many concepts and ideas that originated from this group led to the emergence of cryptocurrencies.

In 1997, Dr. Adam Back created HashCash, which he proposed as a measure against spam. A little later, in 1998, Wei Dai published his idea for b-money and conceived the ideas of Proof-of-Work and Proof-of-Stake to achieve consensus across a distributed network. In 2005 Nick Szabo published a proposal for Bit Gold. There was no cap on the maximum supply but he introduced the idea to value each unit of Bit Gold by the amount of computational work that went into producing it. Although this is not how cryptocurrencies are valued, the price of production (comprised of hardware and electricity cost) plays a role in the pricing of these digital assets.

In 2008, Satoshi Nakamoto released the Bitcoin white paper, citing and building upon HashCash and b-money. Citations from his early communications and parts of his white paper, such as the following on privacy, suggest Nakamoto was close to the cypherpunk movement.

โ€œThe traditional banking model achieves a level of privacy by limiting access to information to the parties involved and the trusted third party. The necessity to announce all transactions publicly precludes this method, but privacy can still be maintained by breaking the flow of information in another place: by keeping public keys anonymous. The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone. This is similar to the level of information released by stock exchanges, where the time and size of individual trades, the โ€˜tapeโ€™, is made public, but without telling who the parties were.โ€

Technology did not enable strong privacy prior to the 20th century, but neither did it enable affordable mass surveillance. We believe in the human right to privacy and work towards enabling anyone who wishes to claim his or her privacy to do so. We see a cryptocurrency with selective privacy as a good step in the right direction of reclaiming our privacy.





Running bitcoin – Hal Finney


Wonder In Peace Bright Mind

Join Honorary Chair Fran Finney and the Running Bitcoin Challenge Committee as we honor legendary cypher punk, Hal Finney.

This is THE EVENT that combines Hal Finney’s love of running and Bitcoin and is raising funds and awareness to help defeat ALS, which ultimately claimed his life in 2014.

You are challenged to run (or walk, roll, or hike) the equivalent of a half marathon — cumulatively or all at once — by the end of January 10, 2023.

From wherever you are, spread the word about Bitcoin, participate in a healthy activity, feel good about doing your part to defeat ALS, and start the year off right


Hal Finney, one of the earliest bitcoin contributors, died eight years ago from complications of nervous system disease amyotrophic lateral sclerosis (ALS).

His spouse, Fran Finney, is now organizing a half marathon to raise funds for ALS research via bitcoin.



The โ€œRunning Bitcoin Challengeโ€ is set to take place between Jan. 1 and Jan. 10. The timing of the occasion leads up to the anniversary of Hal Finneyโ€™s โ€œRunning bitcoinโ€ tweet, in which Finney famously disclosed he was deploying a Bitcoin node.

There is no set location โ€” participants can choose to join anywhere they wish. Players are encouraged to either run, walk, roll or hike the equivalent of a half marathon (Halโ€™s favorite distance) either in one go or over the entire 10-day period.

Donors contributing at least $100 will receive an official shirt with the half marathonโ€™s logo, while the eventโ€™s top 25 fundraisers will get a Hal Finney collectible signed by his wife.

As of Wednesday morning, the event has already managed to secure nearly $10,000 in bitcoin donations.

An advocate of cryptography and digital privacy, Finney was the recipient of the first-ever bitcoin transfer from the networkโ€™s pseudonymous creator Satoshi Nakamoto.

The bitcoin community often suspected Finney was Nakamoto, a claim he consistently denied. He reportedly found out about his condition in 2009 and decided to move away from the project.

Halโ€™s name is high in the Bitcoin pantheon as one of the first people to voice support for Satoshi Nakamotoโ€™s invention and for being the first person to receive a Bitcoin transaction from Satoshi.

He was, for a time, considered one of the top contenders on the list of potential Satoshis himself (many in blockchain who reject Dr. Craig Wrightโ€™s statements still falsely believe Finney to be Bitcoinโ€™s real creator).

Hal, who referred to himself as a โ€œcypherpunk,โ€ was a cryptographic activist who went from developing video games to working on the Pretty Good Privacy (PGP) project in the 1990s. He described his PGP work as โ€œdedicated to the goal of making Big Brother obsolete.โ€

PGP creator Phil Zimmerman hired Hal as his first employee when PGP became PGP Corporation in the early 2000s. He described Hal as a โ€œgregarious manโ€ who loved skiing and long-distance running.

Despite gradual paralysis that eventually forced him to stop working, Hal continued to code software and follow the Bitcoin project.

Almost as famous as his 2009 tweet is his โ€œBitcoin and meโ€ post on BitcoinTalk.org in March 2013, the last heโ€™d ever make.

Itโ€™s a long post, and Hal was โ€œessentially paralyzedโ€ at the time, using an eye tracker to type. Forum stats show the post has been read over 278,000 times.

โ€œWhen Satoshi announced the first release of the software, I grabbed it right away,โ€ he wrote. โ€œI think I was the first person besides Satoshi to run bitcoin. I mined block 70-something, and I was the recipient of the first bitcoin transaction when Satoshi sent ten coins to me as a test.

I carried on an email conversation with Satoshi over the next few days, mostly me reporting bugs and him fixing them.โ€

Hal himself always denied being Satoshi Nakamoto, adding later that heโ€™d sold most of the Bitcoins he mined (at pre-2014 prices) to pay for his treatments. He also mentioned putting some in a safe deposit box for his children.

โ€œAnd, of course, the price gyrations of bitcoins are entertaining to me.

I have skin in the game.

But I came by my bitcoins through luck, with little credit to me.

I lived through the crash of 2011.

So Iโ€™ve seen it before.

Easy come, easy go.โ€

Hal Finney

www.runningbitcoin.us

Admiration and great Respect


With ๐Ÿงก

Bitcoin WhitePaper Day

Bitcoin – A Peer-to-Peer
Electronic Cash System

Itโ€™s bitcoin White Paper Day.

The mailing list was hosted by Metzdow and run by a group of cypherpunks who shared ideas on creating a kind of digital currency and payment system. Satoshi shared the whitepaper in a message that read, โ€œBitcoin P2P e-cash paper,โ€ which outlined the main properties of the system.


“Bitcoin P2P e-cash paper
Satoshi Nakamoto satoshi at vistomail.com
Fri Oct 31 14:10:00 EDT 2008
Previous message: Fw: SHA-3 lounge
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
I’ve been working on a new electronic cash system that’s fully
peer-to-peer, with no trusted third party.

The paper is available at:
http://www.bitcoin.org/bitcoin.pdf

The main properties:
Double-spending is prevented with a peer-to-peer network.
No mint or other trusted parties.
Participants can be anonymous.
New coins are made from Hashcash style proof-of-work.
The proof-of-work for new coin generation also powers the
network to prevent double-spending.

Bitcoin: A Peer-to-Peer Electronic Cash System

Abstract. A purely peer-to-peer version of electronic cash would
allow online payments to be sent directly from one party to another
without the burdens of going through a financial institution.
Digital signatures provide part of the solution, but the main
benefits are lost if a trusted party is still required to prevent
double-spending. We propose a solution to the double-spending
problem using a peer-to-peer network. The network timestamps
transactions by hashing them into an ongoing chain of hash-based
proof-of-work, forming a record that cannot be changed without
redoing the proof-of-work. The longest chain not only serves as
proof of the sequence of events witnessed, but proof that it came
from the largest pool of CPU power. As long as honest nodes control
the most CPU power on the network, they can generate the longest
chain and outpace any attackers. The network itself requires
minimal structure. Messages are broadcasted on a best effort basis,
and nodes can leave and rejoin the network at will, accepting the
longest proof-of-work chain as proof of what happened while they
were gone.

Full paper at:
http://www.bitcoin.org/bitcoin.pdf

Satoshi Nakamoto

———————————————————————
The Cryptography Mailing List
Unsubscribe by sending “unsubscribe cryptography” to majordomo at metzdowd.com”


Source:
https://www.metzdowd.com/pipermail/cryptography/2008-October/014810.html


The pseudonymous Bitcoin creator disclosed that they had been working on a new electronic cash system that uses a Proof-of-Work (PoW) consensus algorithm that required no trusted third party. Although the document met mixed reactions, it was the beginning of what is known today as blockchain technology.

A couple of months after the release, the Bitcoin network was launched, with the first block mined on January 3, 2009. About eight days later, Hal Finney received the first transaction of 10 BTC from Nakamoto, after which he posted a legendary tweet that read:

In the 14 years since that day, bitcoinโ€™s value rose from zero to a peak of $68,990 last November and was hovering above $20,000 on Monday, according to CoinDesk data. The cryptocurrency currently has a market capitalization of over $390 billion. It also inspired the creation of more than 20,000 different cryptocurrencies currently in circulation, while bitcoin remains the largest by market cap.

Over the years, several people have been rumored to be Nakamoto, including early bitcoin contributor Hal Finney, cryptographer Nick Szabo, physicist Dorian Nakamoto and even Teslaโ€™s chief executive Elon Musk, who all denied the claims.

Satoshiโ€™s identity is still a mystery, but Finney was well-known for his contribution to the creation of Bitcoin. He worked hand-in-hand with Nakamoto to find and fix bugs in Bitcoinโ€™s underlying infrastructure. Before his death in 2014, Finney shared a detailed story about his journey with Bitcoin

About a year after the launch of Bitcoin, the cryptocurrency went on to record its first real-world commercial use case when a Florida man spent 10,000 BTC to purchase two large Papa Johnโ€™s pizzas on May 22, 2010.

Although the coins were worth $41 at prices back then, at todayโ€™s price, the transaction is worth more than $200 million. To commemorate the event, the Bitcoin community celebrates Bitcoin Pizza Day every year on May 22.


Bitcoin / bitcoin / blockchain




Controlled Supply

Bitcoin

“A fixed money supply, or a supply altered only in accord with objective and calculable criteria, is a necessary condition to a meaningful just price of money.”

Fr. Bernard W. Dempsey, S.J. (1903-1960)

In a centralized economy, currency is issued by a central bank at a rate that is supposed to match the growth of the amount of goods that are exchanged so that these goods can be traded with stable prices. The monetary base is controlled by a central bank. In the United States, the Fed increases the monetary base by issuing currency, increasing the amount banks have on reserve or by a process called Quantitative Easing.

In a fully decentralized monetary system, there is no central authority that regulates the monetary base. Instead, currency is created by the nodes of a peer-to-peer network.

The Bitcoin generation algorithm defines, in advance, how currency will be created and at what rate. Any currency that is generated by a malicious user that does not follow the rules will be rejected by the network and thus is worthless.


Currency with Finite Supply


Block reward halving
Controlled supply

Bitcoins are created each time a user discovers a new block. The rate of block creation is adjusted every 2016 blocks to aim for a constant two week adjustment period (equivalent to 6 per hour.)

The number of bitcoins generated per block is set to decrease geometrically, with a 50% reduction every 210,000 blocks, or approximately four years. The result is that the number of bitcoins in existence will not exceed slightly less than 21 million.

Speculated justifications for the unintuitive value “21 million” are that it matches a 4-year reward halving schedule; or the ultimate total number of Satoshis that will be mined is close to the maximum capacity of a 64-bit floating point number. Satoshi has never really justified or explained many of these constants.

Cumulated bitcoin supply

This decreasing-supply algorithm was chosen because it approximates the rate at which commodities like gold are mined. Users who use their computers to perform calculations to try and discover a block are thus called Miners.





First Time/Small Miner

First time/Small miner reference
for getting started.

If you want to start mining here is what you need… and what you need to know.

This is written for home miners/small farms, but can be used as a guideline for most operations. Use this as a reference for what you need to research, or what questions you need to ask before jumping in.

What you need to mine can be broken down into the following categories:

  • Hardware
  • Electricity
  • Location
  • Internet connection
  • Information

Mining BITCOIN is done exclusively with dedicated BITCOIN mining hardware based on ASICs: https://en.wikipedia.org/wiki/Application-specific_integrated_circuit .

You CAN NOT meaningfully mine bitcoin today with CPU, GPU or even FPGAs. Bitcoin difficulty adapts to match the amount of mining done on the network and has reached levels trillions of times too high to mine meaningfully with PCs, laptops, tablets, phones, webpages, javascript, GPUs, and even generalised SHA hardware.

Even if you combined all the computers in the world, including all known supercomputer, you would not even approach 0.1% of the bitcoin hashrate today.

There isn’t any point attempting to mine bitcoin with CPU or GPU even in the interests of learning as it shares almost nothing with how bitcoin is mined with ASICs and will not teach you anything.

Hardware

Asic Miner:

Here is a list of the companies currently manufacturing Miners for public purchase.

Each one has their Pro’s and Con’s it is up to you to do your research and decide what is best for you.

A few points to consider while researching are :

  • efficiency
  • reliability
  • warranty period/policy
  • power draw

Each company has a different way of handling warranty repairs, depending on your situation and the policy repairs can become cost prohibitive. I will touch more on efficiency and power draw in the electricity section.

โ€ข Current list of competitive hardware

Power supply: You will need to purchase a power supply to run your miners. You will find ATX and Server grade PSU’s, the latter being preferred for mining BTC. 

When it comes to selecting a PSU purchase something with a capacity 25% higher than your miner is rated to draw. This will have you operating within the 80% rule.(explained further in the electricity section)

EX. Miner draws 1000 PSU should be able to provide 1250W.

** Many current generation miners are now being manufactured with Integrated PSU. Again do your research to see if your unit comes with or without. Generally you will still need to source a power cable.**

Auxilliaries – Avalon miners require an external controller, 1 per 20 miners. You may have to run additional fans for intake and exhaust depending on your location.

PSU’s can be purchased large enough to run 2 Miners; or the opposite 1 Miner fed by 2 PSU’s. Ensure the PSU you have selected will have the correct amount of PCI-E connectors required to operate your miner(s)

You can also find a large supply of used miners and PSU’s. Again it’s up to you to do your research as these often are a no return transaction.

Electricity

Follow all local codes and regulations

This is the number 1 factor in whether mining is right for you. As discussed with Miners being a 24/7 machine drawing power those costs will make it cost prohibitive for some people to mine. You need to be aware of what your costs/kWh are and run the numbers.

This will be done in a profitability calculator. This is just an example of 1 there are many out there.

( Miner usage in kW ) * ( Hours run per day ) 24 * ( Cost/kWh ) = Cost per Day to Operate

( Ideally less than the FIAT value of BTC mined )

The second part to the electrical requirements of mining is the available service; written for North America.

You will need to figure out the amperage you can spare, what circuits and receptacles you have in place, are you setting up on 220V or 110V. You will need to make sure that you have the right cord end for your PSU to match the receptacle, picking the wrong one can cost you a few days of mining if it has to be shipped.

If you can try and set up on a 220V circuit for 2 reasons :

– You will pull half the amps, and it is more efficient.

– Doing so requires 2 breaker spaces in your panel. Breaker sizing will depend on how many miners you plan to run. Here is the formula for calculating amps.

Watts / Voltage = Amps

Here is where you will bring the 80% rule back into play by sizing the continuous miner load to 80% of the breaker rating. 12 Amps on a 15 Amp breaker, 16 Amps max on a 20 Amp breaker, 24 Amps on a 30 amp breaker.

If/when you increase the amount of miners you are running you may want to look into PDU’s, as opposed to more receptacles. 

Location

This is something that is often overlooked to the headache and frustration of many would be miners. These machines are loud and hot .
You essentially have an electric heater that also uses an industrial fan to keep it from melting itself. This space will need to have the electrical requirements as discussed previously.

So make sure you have a space that is well ventilated with a plan to exhaust heat, and bring in fresh dust free air. I say this as using AC to cool the room will eat into your profits and may even make mining unprofitable.

The noise issue is a consideration you can sort out depending on whats available. (garage, basement, remote building)

Both of these issues can be handled with hosting, which is further explained in the information section.

Internet connection

Some miner setups have the option to use wifi. It is advisable to use a wired connection where available. This will provide a more stable connection and ensure you are submitting the expected amount of shares which is directly related to your payouts.

Please note that mining uses a negligible amount of bandwidth, and will not affect your other internet usage.

Information

You can use this information in this post as a good baseline to get you going. In addition to this you will want to research network difficulty; this readjusts every 2016 blocks to maintain a 10 minute block time on average. While this can go down it generally increases.

Solo or Pool?

You can solo mine but this is essentially a lottery even as a large scale miner. Should you chose this you can check this out as a starting point.

solo.ckpool.org 1% fee solo mining USA/DE 250 blocks solved!

Odds are most of you will join a pool. I will only say that it is in your best interest to mine at a pool that pays transaction fees (miner rewards). Then you will want to consider the fees associated with the pool.

When it comes to these pools you want them to be large enough that they are getting at least 1 block every Difficulty adjustment period. Larger pools will offer smaller rewards paid out more frequently, and vice versa.





Anarchy Legacy

A Crypto Anarchistโ€™s Legacy

Airfoil Dec 20, 2018

Timothy May on the cover of the second issue of Wired magazine with 2 fellow cypherpunks

Sadly, this past week we lost an icon that helped to spur the cypherpunk movement. Timothy May, who wrote The Crypto Anarchist Manifesto in 1988, lauched a movement that is still very prominent today.

For the uninitiated, a Crypto-Anarchist focuses on subverting the current laws and using new technologies to the benefit of the common man.

In the original manifesto, May says crypto-anarchy focuses on โ€œencryption, digital money, anonymous networks, digital pseudonyms, zero-knowledge, reputations, information markets, black markets, collapse of governmentsโ€.

The manifesto was written just before the first crypto wars began during the early 1990โ€™s.

The governments of the world fiercely opposed the general public using cryptographic encryption protocols.

The idea that a normal citizen could completely hide what they say in an electronic message was their biggest concern.

The governments cited national security as a concern (Weโ€™ve heard this excuse used many times before).

Tim May was embroiled in the center of this alongside his group of fellow cypherpunks.

RSA Security, a leading computer securty company founded by world-renowned cryptologists, created this poster against a hardware chip that used a US-government supplied encryption standard

The legislation of the anti-encryption laws would also affect payment processing technology. There was a large push back from tech companies that would have to deal with these issues first-hand.

The crypto wars of the 1990โ€™s ended with the concession from the government that encryption was readily available around the world.

The public had won their first bout against the government surveillance state. Alongside the public, you had the cypherpunks and large tech companies that were all fighting a common threat.

There was not much of an issue in terms of encryption for quite a few more years.

Every few years afterward, the idea of backdoors into encryption schemes were brought up but nothing ever came about these new ideations.

The Crypto Wars Redux

The expansion of computational power and development of more efficient processing equipment closed the gap as to who can gain access to encryption software.

The widespread availabilty of software/hardware that can perform these cryptographic calculations involved in encryption and the ease of use has made it possible for the layman to encrypt their own personal messages, video calls,emails, and notes.

Encrypting an email with someone who has never imported a key to their keyring, or generated their own PGP public/private key pair is a thing of the past.

Many of the services that exist today offer these solutions out of the box. The process has become much easier for all parties involved.

Anyone that is now using this technology benefits from this on a privacy and security level.

With all parties benefitting, the leviathan rears its head once more. Australia has passed an anti-encryption bill that will force large tech companies to allow the Australian government to obtain hardware access(citing national security as a major reason).

Outrage has spilled out of the larger tech companies. The end-to-end zero knowledge messaging/calling app, Signal, has taken a stand against this bill.

This sounds very similar to the issues Tim May was battling with during the early days of the First Crypto War.

The cypherpunks came out on top and Iโ€™m sure this legislation will face a similar fate.

Mayโ€™s Impact on the World

The imprint that Timothy May left on the world is profound. The mass adoption of encryption as well as cryptocurrencies shows just how far ahead of the times he was.

May urged the importance of privacy.

He insisted on the use of encryption to keep your communications private.

Currently on a majority of mobile phones there are applications that provide encrypted communications. Whatsapp uses the Signal protocol which was developed by cypherpunk Moxie Marlinspike.

The rise of cryptocurrencies is an ideal that May was very hopeful for.

May did come out against the anti-privacy issues of bitcoin.

There are projects that offer solutions for this privacy debate.

Much of the developer-base of these certain cryptocurrencies have their foundation based in the cypherpunk tradition.

The Cryptocurrencies that aim for a privacy by default mechanism are monero and the soon to launch GRIN which uses the Mimblewimble Protocol (To see an extremely entertaining introduction to the GRIN project via talk-to-text chat for privacy preservation, listen to the creator of Grin).

Zcash is moving in the direction of private by default and the superior cryptography of the ZK range proofs will help to create a very private cryptocurrency.

Cody WIlson and Amir Taaki who worked on projects focused on the crypto-anarchic tradition including Dark Wallet and Defense Distributed

The impact Tim May made on the world by helping to create a social movement shows the importance and strength of his ideals.

He has impacted a generation of people that are growing up in the digital age.

He influenced builders in the 21st century.

You have people creating new currencies, exposing government surveillance on a national scale, circumventing the broken bueracratic system by creating their own markets, anonymous internet protocols, as well as making encryption applicable to the common man (You can find a list of prominent cypherpunks here and also here).

There isnโ€™t enough that can be said about the applications in which he believed could positively affect us.

May was cognizant of the encroaching all-seeing eye of the state but I believe we are in much better shape now than weโ€™ve ever been.

There may be negative news about what we currently face as individuals, from the unprecedented surveillance of the Snowden leaks to the aforementioned Australian anti-encryption bill, but looking at the grand scheme of our daily lives, these tools and their functions have helped to create a much better day than May could have imagined in 1988.

He was a proponent for the industriousness of human nature to outpace the slow moving regulation that would try to bog down any progress.

You can listen here to what he thought people/creators should do when they develop ground breaking technology.

Arise, you have nothing to lose but your barbed wire fences!

Timothy C. May – “The Crypto Anarchist Manifesto”

Shared with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š

Arise…

Timothy C. May

Arise, you have nothing to lose but your barbed wired fences!

Timothy C. May

Wonder In Peace bright mind!

Thanks for the guidance and wisdom!

The world will never know how much they owe you!

โœŒ & ๐Ÿ’š


Shared with ๐Ÿ’š by Free Spirit
โœŒ & ๐Ÿ’š



Vires In Numeris

Vires In Numeris

” It isnโ€™t obvious that the world had to work this way.

But somehow the universe smiles on encryption.โ€

Julian Assange

Nobody yet knows for sure if the universeโ€™s smile is genuine or not.

It is possible that our assumption of mathematical asymmetries is wrong and we find that P actually equals NP, or we find surprisingly quick solutions to specific problems which we currently assume to be hard.

If that should be the case, cryptography as we know it will cease to exist, and the implications would most likely change the world beyond recognition.

โ€œVires in Numerisโ€

=

โ€œStrength in Numbersโ€

epii

Vires in numeris is not only a catchy motto used by bitcoiners.

The realization that there is an unfathomable strength to be found in numbers is a profound one.

Understanding this, and the inversion of existing power balances which it enables changed my view of the world and the future which lies ahead of us.

One direct result of this is the fact that you donโ€™t have to ask anyone for permission to participate in Bitcoin.

There is no page to sign up, no company in charge, no government agency to send application forms to.

Simply generate a large number and you are pretty much good to go.

The central authority of account creation is mathematics.

And God only knows who is in charge of that.

Elliptic curve examples (cc-by-sa Emmanuel Boutet)

Bitcoin is built upon our best understanding of reality.

While there are still many open problems in physics, computer science, and mathematics, we are pretty sure about some things.

That there is an asymmetry between finding solutions and validating the correctness of these solutions is one such thing.

That computation needs energy is another one.

In other words: finding a needle in a haystack is harder than checking if the pointy thing in your hand is indeed a needle or not.

And finding the needle takes work.

The vastness of Bitcoinโ€™s address space is truly mind-boggling.

The number of private keys even more so. It is fascinating how much of our modern world boils down to the improbability of finding a needle in an unfathomably large haystack.

I am now more aware of this fact than ever.

Bitcoin taught me that there is strength in numbers.

Shared with ๐Ÿ’š by Free SpiritโœŒ & ๐Ÿ’š

Crypto Anarchy and Virtual Communities

Crypto Anarchy and Virtual Communities

Timothy C. May

December 1994

Extended Abstract

” The combination of strong, unbreakable public key cryptography and virtual network communities in cyberspace will produce interesting and profound changes in the nature of economic and social systems.

Crypto anarchy is the cyberspatial realization of anarcho-capitalism, transcending national boundaries and freeing individuals to make the economic arrangements they wish to make consensually.

Strong cryptography, exemplified by RSA (a public key algorithm) and PGP (Pretty Good Privacy), provides encryption that essentially cannot be broken with all the computing power in the universe.

This ensures security and privacy. Public key cryptography is rightly considered to be a revolution.

Digital mixes, or anonymous remailers, use crypto to create untraceable e-mail, which has many uses. (Numerous anonymous remailers, in several countries, are now operating. Message traffic is growing exponentially.)

Digital pseudonyms, the creation of persistent network personas that cannot be forged by others and yet which are unlinkable to the “true names” of their owners, are finding major uses in ensuring free speech, in allowing controversial opinions to be aired, and in providing for economic transactions that cannot be blocked by local governments.

The technology being deployed by the Cypherpunks and others, means their identities, nationalities, and even which continents they are on are untraceable — unless they choose to reveal this information.

This alters the conventional “relationship topology” of the world, allowing diverse interactions without external governmental regulation, taxation, or interference.

Digital cash, untraceable and anonymous (like real cash), is also coming, though various technical and practical hurdles remain.

“Swiss banks in cyberspace” will make economic transactions much more liquid and much less subject to local rules and regulations.

Tax avoidance is likely to be a major attraction for many.

An example of local interest to Monte Carlo might be the work underway to develop anonymous, untraceable systems for “cyberspace casinos.”

While not as attractive to many as elegant casinos, the popularity of “numbers games” and bookies in general suggests a opportunity to pursue.

Data havens and information markets are already springing up, using the methods described to make information retrievable anonymously and untraceably.

Governments see their powers eroded by these technologies, and are taking various well-known steps to try to limit the use of strong crypto by their subjects.

The U.S. has several well-publicized efforts, including the Clipper chip, the Digital Telephony wiretap law, and proposals for “voluntary” escrow of cryptographic keys.

Cypherpunks and others expect these efforts to be bypassed. Technology has let the genie out of the bottle.

Crypto anarchy is liberating individuals from coercion by their physical neighborsโ€”who cannot know who they are on the Netโ€”and from governments.

For libertarians, strong crypto provides the means by which government will be avoided.

The presentation will describe how several of these systems work, briefly, and will outline the likely implications of this combination of crypto anarchy and virtual cyberspace communities.

1. Introduction

This paper describes the combination of two major technologies:

Strong Crypto: including encryption, digital signatures, digital cash, digital mixes (remailers), and related technologies.

Cyberspatial Virtual Communities: including networks, anonymous communications, MUDs and MOOs, and “Multiverse”-type virtual realities.

This paper describes the combination of two major technologies:

These areas have generally remained separate, at least in published papers.

Certainly the developers of cyberspace systems, such as MUDs, MOOs, and Habitat-like systems, appreciate the importance of cryptography for user authentication, overall security, and certainly for (eventual) digital purchase of services.

But for the most part the combination of these two areas has been the province of the science fiction writer, notably writers such as Vernor Vinge, William Gibson, Bruce Sterling, and Orson Scott Card.

The “Cypherpunks” group, a loose, anarchic mailing list and group of hackers, was formed by several of us in 1992 as a group to make concrete some of the abstract ideas often presented at conferences.

We’ve had some successes, and some failures.

The Cypherpunks group also appeared at a fortuitous time, as PGP was becoming popular, as Wired magazine appeared (they featured us on the cover of their second issue), and as the publicity (hype?) about the Information Superhighway and the World Wide Web reached a crescendo.

The site ftp.csua.berkeley.edu has a number of essays and files, including crypto files, in the directory pub/cypherpunks. I have also written/ compiled a very large 1.3 MB FAQ on these issues, the Cyphernomicon, available at various sites, including my ftp directory, ftp.netcom.com, in the directory pub/tc/tcmay.

The Cypherpunks group is also a pretty good example of a “virtual community.” Scattered around the world, communicating electronically in matters of minutes, and seeming oblivious to local laws, the Cypherpunks are indeed a community, and a virtual one. Many members use pseudonyms, and use anonymous remailers to communicate with the list. The list itself thus behaves as a “message pool,” a place where information of all sort may be anonymous depositedโ€”and anonymous received (since everyone sees the entire list, like a newspaper, the intended recipient is anonymized).

Legal Caveat: Consult your local laws before applying any of the methods described here.

In some jurisdictions, it may be illegal to even read papers like this (seriously).

In particular, I generally won’t be giving ftp site addresses for copies of PGP, remailer access, digital cash systems, etc.

These are well-covered in more current forums, e.g., sci.crypt or talk.politics.crypto, and there are some unresolved issues about whether giving the address of such sites constitutes (or “aids and abets”) violation of various export and munitions laws (crypto is considered a munition in the U.S. and probably elsewhere….some nations consider a laser printer to be a munitions item!).

2. Modern Cryptography

The past two decades have produced a revolution in cryptography (crypto, for short) the science of the making of ciphers and codes.

Beyond just simple ciphers, useful mainly for keeping communications secret, modern crypto includes diverse tools for authentication of messages, for digital timestamping of documents, for hiding messages in other documents (steganography), and even for schemes for digital cash.

Public key cryptography, the creation of Diffie and Hellman, has dramatically altered the role of crypto.

Coming at the same time as the wholesale conversion to computer networks and worldwide communications, it has been a key element of security, confidence, and success.

The role of crypto will only become more important over the coming decades.

Pretty Good Privacy, PGP, is a popular version of the algorithm developed by Rivest, Shamir, and Adleman, known of course as RSA.

The RSA algorithm was given a patent in the U.S., though not in any European countries, and is licensed commercially.

These tools are described in detail in various texts and Conference proceedings, and are not the subject of this paper.

The focus here is on the implications of strong crypto for cyberspace, especially on virtual communities.

Mention should be made of the role of David Chaum in defining the key concepts here.

In several seminal papers, Chaum introduced the ideas of using public key cryptography methods for anonymous, untraceable electronic mail, for digital money systems in which spender identity is not revealed, and in schemes related to these. (I make no claims of course that Chaum agrees with my conclusions about the political and socioeconomic implications of these results.)

3. Virtual Communities

Notes: cyberspace, Habitat, VR, Vinge, etc. Crypto holds up the “walls” of these cyberspatial realities. Access control, access rights, modification privileges.

Virtual communities are the networks of individuals or groups which are not necessarily closely-connected geographically.

The “virtual” is meant to imply a non-physical linking, but should not be taken to mean that these are any less community-like than are conventional physical communities.

Examples include churches, service organizations, clubs, criminal gangs, cartels, fan groups, etc.

The Catholic Church and the Boy Scouts are both examples of virtual communities which span the globe, transcend national borders, and create a sense of allegiance, of belonging, and a sense of “community.”

Likewise, the Mafia is a virtual community (with its enforcement mechanisms, its own extra-legal rules, etc.)

Lots of other examples: Masons, Triads, Red Cross, Interpol, Islam, Judaism, Mormons, Sindero Luminoso, the IRA, drug cartels, terrorist groups, Aryan Nation, Greenpeace, the Animal Liberation Front, and so on.

There are undoubtedly many more such virtual communities than there are nation-states, and the ties that bind them are for the most part much stronger than are the chauvinist nationalism emotions.

Any group in which the common interests of the group, be it a shared ideology or a particular interest, are enough to create a cohesive community.

Corporations are another prime example of a virtual community, having scattered sites, private communication channels (generally inaccessible to the outside world, including the authorities), and their own goals and methods.

In fact, many “cyberpunk” (not cypherpunk) fiction authors make a mistake, I think, in assuming the future world will be dominated by transnational megacorporate “states.”

In fact, corporations are just one exampleโ€”of manyโ€”of such virtual communities which will be effectively on a par with nation-states.

(Note especially that any laws designed to limit use of crypto cause immediate and profound problems for corporations-countries like France and the Philippines, which have attempted to limit the use of crypto, have mostly been ignored by corporations. Any attempts to outlaw crypto will produce a surge of sudden “incorporations,” thus gaining for the new corporate members the aegis of corporate privacy.)

In an academic setting, “invisible colleges” are the communities of researchers.

These virtual communities typically are “opaque” to outsiders.

Attempts to gain access to the internals of these communities are rarely successful. Law enforcement and intelligence agencies (such as the NSA in the U.S., Chobetsu in Japan, SDECE in France, and so on, in every country) may infiltrate such groups and use electronic surveillance (ELINT) to monitor these virtual communities. Not surprisingly, these communities are early adopters of encryption technology, ranging from scrambled cellphones to full-blown PGP encryption.[6]

The use of encryption by “evil” groups, such as child pornographers, terrorists, abortionists, abortion protestors, etc., is cited by those who wish to limit civilian access to crypto tools.

We call these the “Four Horseman of the Infocalypse,” as they are so often cited as the reason why ordinary citizen-units of the nation-state are not to have access to crypto.

This is clearly a dangerous argument to make, for various good reasons.

The basic right of free speech is the right to speak in a language one’s neighbors or governing leaders may not find comprehensible: encrypted speech.

There’s not enough space here to go into the many good arguments against a limit on access to privacy, communications tools, and crypto.

The advent of full-featured communications systems for computer-mediated virtual communities will have even more profound implications.

MUDs and MOOs (multi-user domains, etc.) and 3D virtual realities are one avenue, and text-centric Net communications are another. (Someday, soon, they’ll merge, as described in Vernor Vinge’s prophetic 1980 novella, True Names.)

4. Observability and Surveillance

An interesting way to view issues of network visibility is in terms of the “transparency” of nodes and links between nodes.

Transparent means visible to outsiders, perhaps those in law enforcement or the intelligence community.

Opaque mean not transparent, not visible. A postcard is transparent, a sealed letter is opaque.

PGP inventor Phil Zimmermann has likened the requirement for transparency to being ordered to use postcards for all correspondence, with encryption the equivalent of an opaque envelope (envelopes can be opened, of course, and long have been).

Transparent links and nodes are the norm in a police state, such as the U.S.S.R., Iraq, China, and so forth. Communications channels are tapped, and private use of computers is restricted. (This is becoming increasingly hard to do, even for police states; many cite the spread of communications options as a proximate cause of the collapse of communism in recent years.)

There are interesting “chemistries” or “algebras” of transparent vs. opaque links and nodes.

What happens if links must be transparent, but nodes are allowed to be opaque? (The answer: the result is as if opaque links and nodes were allowed, i.e., full implications of strong crypto.

Hence, any attempt to ban communications crypto while still allowing private CPUs to exist….)

If Alice and Bob are free to communicate, and to choose routing paths, then Alice can use “crypto arbitrage” (a variation on the term, “regulatory arbitrage,” the term Eric Hughes uses to capture this idea of moving transactions to other jurisdictions) to communicate with sitesโ€”perhaps in other countriesโ€”that will perform as she wishes.

This can mean remailing, mixing, etc. As an example, Canadian citizens who are told they cannot access information on the Homolka-Teale murder case (a controversial case in which the judge has ordered the media in Canada, and entering Canada, not to discuss the gory details) nevertheless have a vast array of options, including using telnet, gopher, ftp, the Web, etc., to access sites in many other countries–or even in no country in particular.

Most of the consequences described here arise from this chemistry of links and nodes: unless nearly all node and links are forced to be transparent, including links to other nations and the nodes in those nations, then the result is that private communication can still occur. Crypto anarchy results.

5. Crypto Anarchy

“The Net is an anarchy.”

This truism is the core of crypto anarchy.

No central control, no ruler, no leader (except by example, reputation), no “laws.”

No single nation controls the Net, no administrative body sets policy. The Ayatollah in Iran is as powerless to stop a newsgroupโ€”alt.wanted.moslem.women or alt.wanted.moslem.gay come to mindโ€”he doesn’t like as the President of France is as powerless to stop, say, the abuse of French in soc.culture.french. Likewise, the CIA can’t stop newsgroups, or sites, or Web pages, which give away their secrets.

At least not in terms of the Net itself…what non-Net steps might be taken is left as an exercise for the paranoid and the cautious.

This essential anarchy is much more common than many think.

Anarchyโ€”the absence of a ruler telling one what to doโ€”is common in many walks of life: choice of books to read, movies to see, friends to socialize with, etc.

Anarchy does not mean complete freedomโ€”one can, after all, only read the books which someone has written and had publishedโ€”but it does mean freedom from external coercion.

Anarchy as a concept, though, has been tainted by other associations.

First, the “anarchy” here is not the anarchy of popular conception: lawlessness, disorder, chaos, and “anarchy.”

Nor is it the bomb-throwing anarchy of the 19th century “black” anarchists, usually associated with Russia and labor movements.

Nor is it the “black flag” anarchy of anarcho-syndicalism and writers such as Proudhon.

Rather, the anarchy being spoken of here is the anarchy of “absence of government” (literally, “an arch,” without a chief or head).

This is the same sense of anarchy used in “anarchocapitalism,” the libertarian free market ideology which promotes voluntary, uncoerced economic transactions. 

I devised the term crypto anarchy as a pun on crypto, meaning “hidden,” on the use of “crypto” in combination with political views (as in Gore Vidal’s famous charge to William F. Buckley: “You crypto fascist!”), and of course because the technology of crypto makes this form of anarchy possible.

The first presentation of this was in a 1988 “Manifesto,” whimsically patterned after another famous manifesto.

Perhaps a more popularly understandable term, such as “cyber liberty,” might have some advantages, but crypto anarchy has its own charm, I think.

And anarchy in this sense does not mean local hierarchies don’t exist, nor does it mean that no rulers exist. Groups outside the direct control of local governmental authorities may still have leaders, rulers, club presidents, elected bodies, etc. Many will not, though.

Politically, virtual communities outside the scope of local governmental control may present problems of law enforcement and tax collection. (Some of us like this aspect.)

Avoidance of coerced transactions can mean avoidance of taxes, avoidance of laws saying who one can sell to and who one can’t, and so forth.

It is likely that many will be unhappy that some are using cryptography to avoid laws designed to control behavior.

National borders are becoming more transparent than ever to data.

A flood of bits crosses the borders of most developed countriesโ€”phone lines, cables, fibers, satellite up/downlinks, and millions of diskettes, tapes, CDs, etc.

Stopping data at the borders is less than hopeless.

Finally, the ability to move data around the world at will, the ability to communicate to remote sites at will, means that a kind of “regulatory arbitrage” can be used to avoid legal roadblocks.

For example, remailing into the U.S. from a site in the Netherlands…whose laws apply? (If one thinks that U.S. laws should apply to sites in the Netherlands, does Iraqi law apply in the U.S.? And so on.)

This regulatory arbitrage is also useful for avoiding the welter of laws and regulations which operations in one country may face, including the “deep pockets” lawsuits so many in the U.S. face.

Moving operations on the Net outside a litigious jurisdiction is one step to reduce this business liability. Like Swiss banks, but different.

6. True Names and Anonymous Systems

Something needs to be said about the role of anonymity and digital pseudonyms.

This is a topic for an essay unto itself, of course.

Are true names really needed? Why are they asked for? Does the nation-state have any valid reason to demand they be used?

People want to know who they are dealing with, for psychological/evolutionary reasons and to better ensure traceability should they need to locate a person to enforce the terms of a transaction.

The purely anonymous person is perhaps justifiably viewed with suspicion.

And yet pseudonyms are successful in many cases.

And we rarely know whether someone who presents himself by some name is “actually” that person.

Authors, artists, performers, etc., often use pseudonyms.

What matters is persistence, and nonforgeability.

Crypto provides this.

On the Cypherpunks list, well-respected digital pseudonyms have appeared and are thought of no less highly than their “real” colleagues are.

The whole area of digitally-authenticated reputations, and the “reputation capital” that accumulates or is affected by the opinions of others, is an area that combines economics, game theory, psychology, and expectations.

A lot more study is needed.

It is unclear if governments will move to a system of demanding “Information Highway Driver’s Licenses,” figuratively speaking, or how systems like this could ever be enforced. (The chemistry of opaque nodes and links, again.)

7. Examples and Uses

It surprises many people that some of these uses are already being intensively explored.

Anonymous remailers are used by tens of thousands of persons-and perhaps abused.

And of course encryption, via RSA, PGP, etc., is very common in some communities. (Hackers, Net users, freedom fighters, white separatists, etc….I make no moral judgments here about those using these methods).

Remailers are a good example to look at in more detail. There are two current main flavors of remailers:

“Cypherpunk”-style remailers, which process text messages to redirect mail to another sites, using a command syntax that allows arbitrary nesting of remailing (as many sites as one wishes), with PGP encryption at each level of nesting.

“Julf”-style remailer(s), based on the original work of Karl Kleinpaste and operated/maintained by Julf Helsingius, in Finland.

No encryption, and only one such site at present. (This system has been used extensively for messages posted to the Usenet, and is basically successful. The model is based on operator trustworthiness, and his location in Finland, beyond the reach of court orders and subpoenas from most countries.)

The Cypherpunks remailers currently number about 20, with more being added every month. There is no reason not to expect hundreds of such remailers in a few years.

One experimental “information market” is BlackNet, a system which appeared in 1993 and which allows fully-anonymous, two-way exchanges of information of all sorts.

There are reports that U.S. authorities have investigated this because of its presence on networks at Defense Department research labs. Not much they can do about it, of course, and more such entities are expected.

(The implications for espionage are profound, and largely unstoppable. Anyone with a home computer and access to the Net or Web, in various forms, can use these methods to communicate securely, anonymously or pseudonymously, and with little fear of detection. “Digital dead drops” can be used to post information obtained, far more securely than the old physical dead drops…no more messages left in Coke cans at the bases of trees on remote roads.)

Whistleblowing is another growing use of anonymous remailers, with folks fearing retaliation using remailers to publicly post information. (Of course, there’s a fine line between whistleblowing, revenge, and espionage.)

Data havens, for the storage and marketing of controversial information is another area of likely future growth.

Nearly any kind of information, medical, religious, chemical, etc., is illegal or proscribed in one or more countries, so those seeking this illegal information will turn to anonymous messaging systems to accessโ€”and perhaps purchase, with anonymous digital cashโ€”this information.

This might include credit data bases, deadbeat renter files, organ bank markets, etc. (These are all things which have various restrictions on them in the U.S., for example….one cannot compile credit data bases, or lists of deadbeat renters, without meeting various restrictions.

A good reason to move them into cyberspace, or at least outside the U.S., and then sell access through remailers.)

Matching buyers and sellers of organs is another such market. A huge demand (life and death), but various laws tightly controlling such markets.

Digital cash efforts. A lot has been written about digital cash.

David Chaum’s company, DigiCash, has the most interesting technology, and has recently begun market testing.

Stefan Brands may or may not have a competing system which gets around some of Chaum’s patents. (The attitude crypto anarchists might take about patents is another topic for discussion. Suffice it to say that patents and other intellectual property issues continue to have relevance in the practical world, despite erosion by technological trends.)

Credit card-based systems, such as the First Virtual system, are not exactly digital cash, in the Chaumian sense of blinded notes, but offer some advantages the market may find useful until more advanced systems are available.

I expect to see many more such experiments over the next several years, and some of them will likely be market successes.

8. Commerce and Colonization of Cyberspace

How will these ideas affect the development of cyberspace?

“You can’t eat cyberspace” is a criticism often levelled at argument about the role of cyberspace in everyday life.

The argument made is that money and resources “accumulated” in some future (or near-future) cyberspatial system will not be able to be “laundered” into the real world.

Even such a prescient thinker as Neal Stephenson, in Snow Crash, had his protagonist a vastly wealthy man in “The Multiverse,” but a near-pauper in the physical world.

This is implausible for several reasons.

First, we routinely see transfers of wealth from the abstract world of stock tips, arcane consulting knowledge, etc., to the real world. “Consulting” is the operative word.

Second, a variety of means of laundering money, via phony invoices, uncollected loans, art objects, etc., are well-known to those who launder money…these methods, and more advanced ones to come, are likely to be used by those who wish their cyberspace profits moved into the real world.

(Doing this anonymously, untraceably, is another complication. There may be methods of doing this–proposals have looked pretty solid, but more work is needed.)

The World Wide Web is growing at an explosive pace. Combined with cryptographically-protected communication and digital cash of some form (and there are several being tried), this should produce the long-awaited colonization of cyberspace.

Most Net and Web users already pay little attention to the putative laws of their local regions or nations, apparently seeing themselves more as members of various virtual communities than as members of locally-governed entities.

This trend is accelerating.

Most importantly, information can be bought and sold (anonymously, too) and then used in the real world.

There is no reason to expect that this won’t be a major reason to move into cyberspace.

9. Implications

I’ve touched on the implications in several places.

Many thoughtful people are worried about some of the possibilities made apparent by strong crypto and anonymous communication systems.

Some are proposing restrictions on access to crypto tools. The recent debate in the U.S. over “Clipper” and other key escrow systems shows the strength of emotions on this issue.

Abhorrent markets may arise. For example, anonymous systems and untraceable digital cash have some obvious implications for the arranging of contract killings and such. (The greatest risk in arranging such hits is that physical meetings expose the buyers and sellers of such services to stings. Crypto anarchy lessens, or even eliminates, this risk, thus lowering transaction costs. The risks to the actual triggermen are not lessened, but this is a risk the buyers need not worry about. Think of anonymous escrow services which hold the digital money until the deed is done. Lots of issues here. It is unfortunate that this area is so little-discussed….people seem to have an aversion for exploring the logical consequences in such areas.)

The implications for corporate and national espionage have already been touched upon.

Combined with liquid markets in information, this may make secrets much harder to keep. (Imagine a “Digital Jane’s,” after the military weapons handbooks, anonymously compiled and sold for digital money, beyond the reach of various governments which don’t want their secrets told.)

New money-laundering approaches are of course another area to explore.

Something that is inevitable is the increased role of individuals, leading to a new kind of elitism.

Those who are comfortable with the tools described here can avoid the restrictions and taxes that others cannot.

If local laws can be bypassed technologically, the implications are pretty clear.

The implications for personal liberty are of course profound.

No longer can nation-states tell their citizen-units what they can have access to, not if these citizens can access the cyberspace world through anonymous systems.

10. How Likely?

I am making no bold predictions that these changes will sweep the world anytime soon.

Most people are ignorant of these methods, and the methods themselves are still under development.

A wholesale conversion to “living in cyberspace” is just not in the cards, at least not in the next few decades.

But to an increasingly large group, the Net is reality.

It is where friends are made, where business is negotiated, where intellectual stimulation is found.

And many of these people are using crypto anarchy tools. Anonymous remailers, message pools, information markets.

Consulting via pseudonyms has begun to appear, and should grow. (As usual, the lack of a robust digital cash system is slowing things down.

Can crypto anarchy be stopped?

Although the future evolution in unclear, as the future almost always is, it seems unlikely that present trends can be reversed:

Dramatic increases in bandwidth and local, privately-owned computer power.

Exponential increase in number of Net users.

Explosion in “degrees of freedom” in personal choices, tastes, wishes, goals.

Inability of central governments to control economies, cultural trends, etc.

The Net is integrally tied to economic transactions, and no country can afford to “disconnect” itself from it. (The U.S.S.R. couldn’t do it, and they were light-years behind the U.S., European, and Asian countries. And in a few more years, no hope of limiting these tools at all, something the U.S. F.B.I. has acknowledged.

Technological Inevitability: These tools are already in widespread use, and only draconian steps to limit access to computers and communications channels could significantly impact further use. (Scenarios for restrictions on private use of crypto.)

As John Gilmore has noted, “the Net tends to interpret censorship as damage, and routes around it.” This applies as well to attempts to legislate behavior on the Net. (The utter impossibility of regulating the worldwide Net, with entry points in more than a hundred nations, with millions of machines, is not yet fully recognized by most national governments. They still speak in terms of “controlling” the Net, when in fact the laws of one nation generally have little use in other countries.)

Digital money in its various forms is probably the weakest link at this point. Most of the other pieces are operational, at least in basic forms, but digital cash is (understandably) harder to deploy. Hobbyist or “toy” experiments have been cumbersome, and the “toy” nature is painfully obvious. It is not easy to use digital cash systems at this time (“To use Magic Money, first create a client…”), especially as compared to the easily understood alternatives.[14] People are understandably reluctant to entrust actual money to such systems. And it’s not yet clear what can be bought with digital cash (a chicken or egg dilemma, likely to be resolved in the next several years).

And digital cash, digital banks, etc., are a likely target for legislative moves to limit the deployment of crypto anarchy and digital economies. Whether through banking regulation or tax laws, it is not likely that digital money will be deployed easily. “Kids, don’t try this at home!” Some of the current schemes may also incorporate methods for reporting transactions to the tax authorities, and may include “software key escrow” features which make transactions fully or partly visible to authorities.

11. Conclusions

Strong crypto provides new levels of personal privacy, all the more important in an era of increased surveillance, monitoring, and the temptation to demand proofs of identity and permission slips. Some of the “credentials without identity” work of Chaum and others may lessen this move toward a surveillance society.

The implications are, as I see it, that the power of nation-states will be lessened, tax collection policies will have to be changed, and economic interactions will be based more on personal calculations of value than on societal mandates.

Is this a Good Thing? Mostly yes. Crypto anarchy has some messy aspects, of this there can be little doubt. From relatively unimportant things like price-fixing and insider trading to more serious things like economic espionage, the undermining of corporate knowledge ownership, to extremely dark things like anonymous markets for killings.

But let’s not forget that nation-states have, under the guise of protecting us from others, killed more than 100 million people in this century alone. Mao, Stalin, Hitler, and Pol Pot, just to name the most extreme examples. It is hard to imagine any level of digital contract killings ever coming close to nationstate barbarism. (But I agree that this is something we cannot accurately speak about; I don’t think we have much of a choice in embracing crypto anarchy or not, so I choose to focus on the bright side.)

It is hard to argue that the risks of anonymous markets and tax evasion are justification for worldwide suppression of communications and encryption tools. People have always killed each other, and governments have not stopped this (arguably, they make the problem much worse, as the wars of this century have shown).

Also, there are various steps that can be taken to lessen the risks of crypto anarchy impinging on personal safety.

Strong crypto provides a technological means of ensuring the practical freedom to read and write what one wishes to. (Albeit perhaps not in one’s true name, as the nation-state-democracy will likely still try to control behavior through majority votes on what can be said, not said, read, not read, etc.) And of course if speech is free, so are many classes of economic interaction that are essentially tied to free speech.

A phase change is coming. Virtual communities are in their ascendancy, displacing conventional notions of nationhood. Geographic proximity is no longer as important as it once was.

A lot of work remains. Technical cryptography still hasn’t solved all problems, the role of reputations (both positive and negative) needs further study, and the practical issues surrounding many of these areas have barely been explored.

We will be the colonizers of cyberspace.

12. Acknowledgments

My thanks to my colleagues in the Cypherpunks group, all 700 of them, past or present. Well over 100 megabytes of list traffic has passed through he Cypherpunks mailing list, so there have been a lot of stimulating ideas. But especially my appreciation goes to Eric Hughes, Sandy Sandfort, Duncan Frissell, Hal Finney, Perry Metzger, Nick Szabo, John Gilmore, Whit Diffie, Carl Ellison, Bill Stewart, and Harry Bartholomew. Thanks as well to Robin Hanson, Ted Kaehler, Keith Henson, Chip Morningstar, Eric Dean Tribble, Mark Miller, Bob Fleming, Cherie Kushner, Michael Korns, George Gottlieb, Jim Bennett, Dave Ross, Gayle Pergamit, andโ€”especiallyโ€”the late Phil Salin. Finally, thanks for valuable discussions, sometimes brief, sometimes long, with Vernor Vinge, David Friedman, Rudy Rucker, David Chaum, Kevin Kelly, and Steven Levy.

Source:

https://nakamotoinstitute.org/virtual-communities/#ref10

Shared with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š