Totalitarian Governments..

Totalitarianismย is aย form of governmentย andย political systemย that prohibits all opposition parties, outlaws individual opposition to theย stateย and its claims, and exercises an extremely high degree of control and regulation over public and private life.

It is regarded as the most extreme and complete form ofย authoritarianism.

In totalitarian states,ย political powerย is often held byย autocrats, such asย  dictatorsย  andย absolute monarchs, who employ all-encompassing campaigns in whichย propagandaย is broadcast by state-controlledย mass mediaย in order to control the citizenry.

It remains a useful word but the old 1950s theory was considered to be outdated by the 1980s,and is defunct among scholars.

The proposed concept gained prominent influence in Western anti-communist andย McCarthyistย political discourse during theย Cold Warย era as a tool to convert pre-World War IIanti-fascismย into post-warย anti-communism.


Leaders who have been described as totalitarian rulers, from left to right and top to bottom in picture, includeย Joseph Stalin, formerย General Secretary of the Communist Party of the Soviet Union;ย Adolf Hitler, formerย Fรผhrerย ofย Nazi Germany;ย Augusto Pinochet, formerย Presidentย ofย Chile;ย Mao Zedong, formerย Chairman of the Communist Party of China;ย Benito Mussolini, formerย Duceย ofย Fascist Italy; andย Kim Il-sung, theย Eternal President of the Republicย ofย North Korea

As aย political ideologyย in itself, totalitarianism is a distinctly modernistย  phenomenon, and it has very complex historical roots. Philosopherย Karl Popperย traced its roots toย Plato,ย Georg Wilhelm Friedrich Hegel‘s conception of theย state, and the political philosophy ofย Karl Marx, although Popper’s conception of totalitarianism has been criticized in academia, and remains highly controversial.

Other philosophers and historians such asย Theodor W. Adornoย andย Max Horkheimerย trace the origin of totalitarian doctrines to theย Age of Enlightenment, especially to theย anthropocentristย idea that:

“Man has become the master of the world, a master unbound by any links to nature, society, and history.”

In the 20th century, the idea of absolute state power was first developed byย Italian Fascists, and concurrently in Germany by a jurist andย Naziย academic namedย Carl Schmittย during theย Weimar Republicย in the 1920s.

Benito Mussolini, the founder of Italian Fascism, defined fascism as such: “Everything within the state, nothing outside the state, nothing against the state.”

Schmitt used the termย Totalstaatย (lit.โ€‰’Total state’) in his influential 1927 work titledย The Concept of the Political, which described the legal basis of an all-powerful state.

Totalitarian regimes are different from otherย authoritarianย regimes, as the latter denotes a state in which the single power holder, usually an individual dictator, a committee, aย military junta, or an otherwise small group of political elites, monopolizes political power.

A totalitarian regime may attempt to control virtually all aspects of social life, including the economy, the education system, arts, science, and the private lives and morals of citizens through the use of an elaborate ideology. It can also mobilize the whole population in pursuit of its goals.

Definition

Totalitarian regimes are often characterized by extremeย political repression, to a greater extent than those of authoritarian regimes, under an undemocratic government, widespreadย personality cultismย around the person or the group which is in power, absoluteย control over the economy, large-scaleย censorshipย andย mass surveillanceย systems, limited or non-existentย freedom of movementย (the freedom to leave the country), and the widespread usage ofย state terrorism.

Other aspects of a totalitarian regime include the extensive use ofย internment camps, an omnipresentย secret police, practices ofย religious persecutionย orย racism, the imposition ofย theocraticย rule orย state atheism, the common use ofย death penaltiesย andย show trials, fraudulent elections (if they took place), the possible possession ofย weapons of mass destruction, a potential for state-sponsoredย mass murdersย andย genocides, and the possibility of engaging in aย war, orย colonialismย against other countries, which is often followed byย annexationย of their territories.

Historianย Robert Conquestย describes a totalitarian state as a state which recognizes no limit on its authority in any sphere of public or private life and extends that authority to whatever length it considers feasible.

Totalitarianism is contrasted withย authoritarianism. According to Radu Cinpoes, an authoritarian state is “only concerned with political power, and as long as it is not contested it gives society a certain degree of liberty.”

Cinpoes writes that authoritarianism “does not attempt to change the world and human nature.”

In contrast,ย Richard Pipesย stated that the officially proclaimedย ideologyย “penetrating into the deepest reaches of societal structure, and the totalitarian government seeks to completely control the thoughts and actions of its citizens.”

Carl Joachim Friedrichย wrote that “[a] totalist ideology, a party reinforced by aย secret police, and monopolistic control of industrial mass society are the three features of totalitarian regimes that distinguish them from other autocracies.”



Visualization of the AES round function

Advanced Encryption Standard

Theย Advanced Encryption Standardย (AES), also known by its original nameย Rijndaelย (Dutch pronunciation:ย [หˆrษ›indaหl]), is a specification for theย encryptionย of electronic data established by the U.S.ย National Institute of Standards and Technologyย (NIST) in 2001.

AES is a variant of the Rijndaelย block cipher developed by twoย  Belgianย  cryptographers, Vincent Rijmenย andย Joan Daemen, who submitted a proposalto NIST during theย AES selection process.

Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

AES has been adopted by theย U.S. government. It supersedes theย Data Encryption Standardย (DES), which was published in 1977.

The algorithm described by AES is aย symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

In the United States, AES was announced by the NIST as U.S.ย FIPSย PUB 197 (FIPS 197) on November 26, 2001.

This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the most suitable.

AES is included in theย ISO/IECย 18033-3ย  standard. AES became effective as a U.S. federal government standard on May 26, 2002, after approval by the U.S.ย Secretary of Commerce.

AES is available in many different encryption packages, and is the first (and only) publicly accessibleย cipherย approved by the U.S.ย National Security Agencyย (NSA) forย top secretย information when used in an NSA approved cryptographic module.



Andreas M. Antonopoulosย (born 1972 in London) is a British-Greek Bitcoinย advocate, tech entrepreneur, and author.

He is a host on theย Speaking of Bitcoinย podcastย (formerly calledย Let’s Talk Bitcoin!) and a teaching fellow for theย M.Sc.ย Digital Currencies at theย University of Nicosia.

Antonopoulos was born in 1972 in London, UK, and moved to Athens, Greece during theย Greek Junta.

He spent his childhood there, and at the age of 17 returned to the UK.

Antonopoulos obtained his degrees inย Computer scienceย and Data Communications, Networks and Distributed Systems fromย University College London.

Books


All Credit goes to Andreas M. Antonopoulos


Shared with ๐Ÿ’š & Admiration by Free Spirit

โœŒ & ๐Ÿ’š


BitHouse with ๐Ÿ’š


Arise…

Timothy C. May

Arise, you have nothing to lose but your barbed wired fences!

Timothy C. May

Wonder In Peace bright mind!

Thanks for the guidance and wisdom!

The world will never know how much they owe you!

โœŒ & ๐Ÿ’š


Shared with ๐Ÿ’š by Free Spirit
โœŒ & ๐Ÿ’š



B-Money

Web Dai – B-Money

I am fascinated by Tim May's crypto-anarchy. 

Unlike the communities
traditionally associated with the word "anarchy", in a crypto-anarchy the
government is not temporarily destroyed but permanently forbidden and
permanently unnecessary.

It's a community where the threat of violence is
impotent because violence is impossible, and violence is impossible because its participants cannot be linked to their true names or physical locations.
ย 
Until now it's not clear, even theoretically, how such a community could operate.

A community is defined by the cooperation of its participants, and efficient cooperation requires a medium of exchange (money) and a way to enforce contracts.

Traditionally these services have been provided by the government or government sponsored institutions and only to legal entities.

In this article I describe a protocol by which these services can be provided to and by untraceable entities.
ย 
I will actually describe two protocols. The first one is impractical,because it makes heavy use of a synchronous and unjammable anonymous
broadcast channel. However it will motivate the second, more practical protocol.

In both cases I will assume the existence of an untraceable network, where senders and receivers are identified only by digital
pseudonyms (i.e. public keys) and every messages is signed by its sender
and encrypted to its receiver.
ย 
In the first protocol, every participant maintains a (seperate) database of how much money belongs to each pseudonym. These accounts collectively define the ownership of money, and how these accounts are updated is the subject of this protocol.
ย 
1. The creation of money. Anyone can create money by broadcasting the
solution to a previously unsolved computational problem. The only
conditions are that it must be easy to determine how much computing effort
it took to solve the problem and the solution must otherwise have no
value, either practical or intellectual. The number of monetary units
created is equal to the cost of the computing effort in terms of a
standard basket of commodities. For example if a problem takes 100 hours
to solve on the computer that solves it most economically, and it takes 3
standard baskets to purchase 100 hours of computing time on that computer
on the open market, then upon the broadcast of the solution to that
problem everyone credits the broadcaster's account by 3 units.
ย 
2. The transfer of money. If Alice (owner of pseudonym K_A) wishes to
transfer X units of money to Bob (owner of pseudonym K_B), she broadcasts
the message "I give X units of money to K_B" signed by K_A.
ย 
Upon the broadcast of this message, everyone debits K_A's account by X units and
credits K_B's account by X units, unless this would create a negative
balance in K_A's account in which case the message is ignored.
ย 
3. The effecting of contracts. A valid contract must include a maximum
reparation in case of default for each participant party to it. It should
also include a party who will perform arbitration should there be a
dispute. All parties to a contract including the arbitrator must broadcast
their signatures of it before it becomes effective. Upon the broadcast of
the contract and all signatures, every participant debits the account of
each party by the amount of his maximum reparation and credits a special
account identified by a secure hash of the contract by the sum the maximum
reparations. The contract becomes effective if the debits succeed for
every party without producing a negative balance, otherwise the contract
is ignored and the accounts are rolled back. A sample contract might look
like this:
ย 
K_A agrees to send K_B the solution to problem P before 0:0:0 1/1/2000.
K_B agrees to pay K_A 100 MU (monetary units) before 0:0:0 1/1/2000. K_C
agrees to perform arbitration in case of dispute. K_A agrees to pay a
maximum of 1000 MU in case of default. K_B agrees to pay a maximum of 200
MU in case of default. K_C agrees to pay a maximum of 500 MU in case of
default.
ย 
4. The conclusion of contracts. If a contract concludes without dispute,
each party broadcasts a signed message "The contract with SHA-1 hash H
concludes without reparations." or possibly "The contract with SHA-1 hash
H concludes with the following reparations: ..." Upon the broadcast of all
signatures, every participant credits the account of each party by the
amount of his maximum reparation, removes the contract account, then
credits or debits the account of each party according to the reparation
schedule if there is one.
ย 
5. The enforcement of contracts. If the parties to a contract cannot agree
on an appropriate conclusion even with the help of the arbitrator, each
party broadcasts a suggested reparation/fine schedule and any arguments or
evidence in his favor. Each participant makes a determination as to the
actual reparations and/or fines, and modifies his accounts accordingly.
ย 
In the second protocol, the accounts of who has how much money are kept by
a subset of the participants (called servers from now on) instead of
everyone. These servers are linked by a Usenet-style broadcast channel.

The format of transaction messages broadcasted on this channel remain the
same as in the first protocol, but the affected participants of each
transaction should verify that the message has been received and
successfully processed by a randomly selected subset of the servers.
ย 
Since the servers must be trusted to a degree, some mechanism is needed to
keep them honest. Each server is required to deposit a certain amount of
money in a special account to be used as potential fines or rewards for
proof of misconduct. Also, each server must periodically publish and
commit to its current money creation and money ownership databases. Each
participant should verify that his own account balances are correct and
that the sum of the account balances is not greater than the total amount
of money created. This prevents the servers, even in total collusion, from
permanently and costlessly expanding the money supply. New servers can
also use the published databases to synchronize with existing servers.
ย 
The protocol proposed in this article allows untraceable pseudonymous
entities to cooperate with each other more efficiently, by providing them
with a medium of exchange and a method of enforcing contracts. The
protocol can probably be made more efficient and secure, but I hope this
is a step toward making crypto-anarchy a practical as well as theoretical
possibility.
ย 
-------
ย 
Appendix A: alternative b-money creation
ย 
One of the more problematic parts in the b-money protocol is money
creation. This part of the protocol requires that all of the account
keepers decide and agree on the cost of particular computations.
Unfortunately because computing technology tends to advance rapidly and
not always publicly, this information may be unavailable, inaccurate, or
outdated, all of which would cause serious problems for the protocol.
ย 
So I propose an alternative money creation subprotocol, in which account
keepers (everyone in the first protocol, or the servers in the second
protocol) instead decide and agree on the amount of b-money to be created
each period, with the cost of creating that money determined by an
auction. Each money creation period is divided up into four phases, as
follows:
ย 
1. Planning. The account keepers compute and negotiate with each other to
determine an optimal increase in the money supply for the next period.

Whether or not the account keepers can reach a consensus, they each
broadcast their money creation quota and any macroeconomic calculations
done to support the figures.
ย 
2. Bidding. Anyone who wants to create b-money broadcasts a bid in the
form of <x, y> where x is the amount of b-money he wants to create, and y
is an unsolved problem from a predetermined problem class. Each problem in
this class should have a nominal cost (in MIPS-years say) which is
publicly agreed on.
ย 
3. Computation. After seeing the bids, the ones who placed bids in the
bidding phase may now solve the problems in their bids and broadcast the
solutions.
ย 
4. Money creation. Each account keeper accepts the highest bids (among
those who actually broadcasted solutions) in terms of nominal cost per
unit of b-money created and credits the bidders' accounts accordingly

http://www.weidai.com/bmoney.txt

Shared with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š

BitAddress

Open Source JavaScript Client-Side Bitcoin Wallet Generator

A Bitcoin wallet is as simple as a single pairing of a Bitcoin address with its corresponding Bitcoin private key. Such a wallet has been generated for you in your web browser and is displayed above.

To safeguard this wallet you must print or otherwise record the Bitcoin address and private key. It is important to make a backup copy of the private key and store it in a safe location. This site does not have knowledge of your private key. If you are familiar with PGP you can download this all-in-one HTML page and check that you have an authentic version from the author of this site by matching the SHA256 hash of this HTML with the SHA256 hash available in the signed version history document linked on the footer of this site. If you leave/refresh the site or press the “Generate New Address” button then a new private key will be generated and the previously displayed private key will not be retrievable. Your Bitcoin private key should be kept a secret. Whomever you share the private key with has access to spend all the bitcoins associated with that address. If you print your wallet then store it in a zip lock bag to keep it safe from water. Treat a paper wallet like cash.

Add funds to this wallet by instructing others to send bitcoins to your Bitcoin address.

Check your balance by going to blockchain.info or blockexplorer.com and entering your Bitcoin address.

Spend your bitcoinsย by going to blockchain.info and sweep the full balance of your private key into your account at their website. You can also spend your funds by downloading one of the popular bitcoin p2p clients and importing your private key to the p2p client wallet. Keep in mind when you import your single key to a bitcoin p2p client and spend funds your key will be bundled with other private keys in the p2p client wallet. When you perform a transaction your change will be sent to another bitcoin address within the p2p client wallet. You must then backup the p2p client wallet and keep it safe as your remaining bitcoins will be stored there. Satoshi advised that one should never delete a wallet.

Source:

https://www.bitaddress.org/

โœŒ & ๐Ÿ’š