Crypto-anarchism
Encyclopedia
Crypto-anarchism expounds the use of strong public-key cryptography
Public-key cryptography
Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private...

 to bring about privacy
Privacy
Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively...

 and freedom
Freedom (political)
Political freedom is a central philosophy in Western history and political thought, and one of the most important features of democratic societies...

. It was described by Vernor Vinge
Vernor Vinge
Vernor Steffen Vinge is a retired San Diego State University Professor of Mathematics, computer scientist, and science fiction author. He is best known for his Hugo Award-winning novels and novellas A Fire Upon the Deep , A Deepness in the Sky , Rainbows End , Fast Times at Fairmont High ...

 as a cyberspatial realization of anarchism
Anarchism
Anarchism is generally defined as the political philosophy which holds the state to be undesirable, unnecessary, and harmful, or alternatively as opposing authority in the conduct of human relations...

. Crypto-anarchists aim to create cryptographic software that can be used to evade prosecution and harassment while sending and receiving information in computer network
Computer network
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information....

s. Timothy C. May
Timothy C. May
Timothy C. May, better known as Tim May, is a technical and political writer, and was an electronic engineer and senior scientist at Intel in the company's early history...

 wrote about crypto anarchism in Cyphernomicon
Cyphernomicon
"The Cyphernomicon" is a document written by Timothy C. May in 1994 for the Cypherpunks electronic mailing list, outlining some ideas behind, and the effects of, crypto-anarchism...

:
Using such software, the association between the identity
Identity (social science)
Identity is a term used to describe a person's conception and expression of their individuality or group affiliations . The term is used more specifically in psychology and sociology, and is given a great deal of attention in social psychology...

 of a certain user or organisation and the pseudonym they use is difficult to find, unless the user reveals the association. It is difficult to say which country's laws will be ignored, as even the location of a certain participant is unknown. In a sense, the encrypted anonymous networks (the "cipherspace
Cipherspace
Cipherspace or cypherspace is the encrypted equivalent to cyberspace. Examples of cipherspaces include Freenet, I2P, Tor, and some anonymous mail-forwarding services....

") can be regarded as an independent lawless territory or as an autonomous zone
Permanent Autonomous Zone
A Permanent autonomous zone is a community that is autonomous from the generally recognized government or authority structure in which it is embedded...

. However, participants may in theory voluntarily create new laws using smart contracts or, if the user is pseudonymous
Pseudonymity
Pseudonymity is a word derived from pseudonym, meaning 'false name', and anonymity, meaning unknown or undeclared source, describing a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names...

, depend on online reputation.

Motives

One motive of crypto-anarchists is to defend against surveillance
Computer surveillance
Computer surveillance is the act of performing surveillance of computer activity, and of data stored on a hard drive or being transferred over the Internet....

 of computer networks communication. Crypto-anarchists try to protect against things like telecommunications data retention
Telecommunications data retention
In the field of telecommunications, data retention generally refers to the storage of call detail records of telephony and internet traffic and transaction data by governments and commercial organisations...

, the NSA warrantless surveillance controversy
NSA warrantless surveillance controversy
The NSA warrantless surveillance controversy concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency as part of the war on terror...

, Room 641A
Room 641A
Room 641A is an intercept facility operated by AT&T for the U.S. National Security Agency, beginning in 2003. Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T...

 and FRA among other things. Crypto-anarchists consider the development and use of cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

 to be the main defense against such problems, as opposed to political action.

A second concern is evasion of censorship
Censorship
thumb|[[Book burning]] following the [[1973 Chilean coup d'état|1973 coup]] that installed the [[Military government of Chile |Pinochet regime]] in Chile...

, particularly Internet censorship
Internet censorship
Internet censorship is the control or suppression of the publishing of, or access to information on the Internet. It may be carried out by governments or by private organizations either at the behest of government or on their own initiative...

, on the grounds of freedom of expression. The programs used by crypto-anarchists often make it possible to both publish and read information off the internet or other computer networks anonymously. Tor
Tor (anonymity network)
Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis...

, I2P
I2P
I2P is a mixed-license, free and open source project building an anonymous network .The network is a simple layer that applications can use to anonymously and securely send...

, Freenet
Freenet
Freenet is a decentralized, censorship-resistant distributed data store originally designed by Ian Clarke. According to Clarke, Freenet aims to provide freedom of speech through a peer-to-peer network with strong protection of anonymity; as part of supporting its users' freedom, Freenet is free and...

 and many similar networks allow for anonymous "hidden" webpages only accessible by users of these programs. This helps whistleblowers and political opposition in oppressive nations to spread their information.

Thirdly, the technical challenge in developing these cryptographic systems is tremendous, which interests some programmers into joining the projects.

Crypto-anarchism and laws

Crypto-anarchists argue that without the ability to encrypt messages, personal information and private life would be seriously damaged. A ban on cryptography is equal to the eradication of secrecy of correspondence
Secrecy of correspondence
The secrecy of correspondence ) or literally translated as secrecy of letters, is a fundamental legal principle enshrined in the constitutions of several European countries. It guarantees that the content of sealed letters is never revealed and letters in transit are not opened by government...

. They argue that only a draconian police-state would criminalize cryptography. In spite of this, it is already illegal to use it in some countries, and export laws are restrictive in others. Citizens in the United Kingdom
United Kingdom
The United Kingdom of Great Britain and Northern IrelandIn the United Kingdom and Dependencies, other languages have been officially recognised as legitimate autochthonous languages under the European Charter for Regional or Minority Languages...

 must, upon request, give passwords for decryption of personal systems to authorities. Failing to do this can result in imprisonment for up to two years, without evidence of other criminal activity.

As processing power increases, this legislative key-surrender tactic can be circumvented using automatic rekeying of secure channels through rapid generation of new, unrelated public and private keys at short intervals. Following rekeying, the old keys can be deleted, rendering previously-used keys inaccessible to the end-user, and thus removing the user's ability to disclose the old key, even if they are willing to do so. Technologies enabling this sort of rapidly rekeyed encryption include public-key cryptography
Public-key cryptography
Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private...

, hardware PRNGs, perfect forward secrecy
Perfect forward secrecy
In an authenticated key-agreement protocol that uses public key cryptography, perfect forward secrecy is the property that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future.Forward...

, and opportunistic encryption
Opportunistic encryption
Opportunistic Encryption refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise falling back to unencrypted communications. This method requires no pre-arrangement between the two systems.Opportunistic encryption can be used to...

. The only way to stop this sort of cryptography is to ban it completely — and any such ban would be unenforceable for any government that is not totalitarian, as it would result in massive invasions of privacy, such as blanket permission for physical searches of all computers at random intervals.

To truly enforce a ban on the use of cryptography is probably impossible, as cryptography itself can be used to hide even the existence of encrypted messages (see steganography
Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...

). It is also possible to encapsulate
Encapsulation (networking)
In computer networking, encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects....

 messages encrypted with illegal strong cryptography inside messages encrypted with legal weak cryptography, thus making it difficult and uneconomical for outsiders to notice the use of illegal encryption.

The usage of strong cryptography and anonymizing computer networks makes it difficult to detect any trespassing of the laws.

Plausible deniability

Crypto-anarchism relies heavily on plausible deniability
Plausible deniability
Plausible deniability is, at root, credible ability to deny a fact or allegation, or to deny previous knowledge of a fact. The term most often refers to the denial of blame in chains of command, where upper rungs quarantine the blame to the lower rungs, and the lower rungs are often inaccessible,...

 to avoid censorship. Crypto-anarchists create this deniability by sending encrypted messages to interlinked proxies
Proxy server
In computer networks, a proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server...

 in computer networks. With the message a payload of routing information is bundled. The message is encrypted with each one of the proxies and the receiver public keys. Each node can only decrypt its own part of the message, and only obtain the information intended for itself. That is, which node is the next hop in the chain. Thus, it is impossible for any node in the chain to know anything else but the previous and next node in the chain or what information they are carrying to the receiver as those parts of the information are hidden. The receiver also does not know who the sender is, except perhaps by another destination, digital signature
Digital signature
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit...

 or something similar. Who originally sent the information and who is the intended receiver is considered infeasible to detect. See onion routing
Onion routing
Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Like someone unpeeling an onion, each onion router removes a layer of encryption to uncover routing instructions, and...

 for more information.

Thus, with multiple layers of encryption, it is effectively impossible to know who is connected to any particular service or pseudonym. Because summary punishment for crimes is mostly illegal, it is impossible to stop any potential criminal activity in the network without enforcing a ban on strong cryptography.

Deniable encryption
Deniable encryption
In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it. Such convincing denials may or may not be genuine. For example, although suspicions might exist that the data is...

 and anonymizing networks can be used to avoid being detected while sharing illegal or sensitive information, that users are too afraid to share without any protection of their identity. It could be anything from anti-state propaganda
Propaganda
Propaganda is a form of communication that is aimed at influencing the attitude of a community toward some cause or position so as to benefit oneself or one's group....

, reports of abuse, whistleblowing, and reports from political dissidents.

Anonymous trading

Untraceable, privately issued electronic money
Electronic money
Electronic money is money or scrip that is only exchanged electronically. Typically, this involves the use of computer networks, the internet and digital stored value systems...

 and anonymous Internet banking
Anonymous internet banking
Anonymous Internet banking is the proposed use of strong financial cryptography to make electronic bank secrecy possible. The bank issues currency in the form of electronic tokens that can be converted on presentation to the bank to some other currency...

 exists in these networks. Digital Monetary Trust
Digital Monetary Trust
Digital Monetary Trust was an anonymous internet banking system using electronic money.It consisted of a three-layered computer system. Its function was to abstract the identity of the account owner from the accounts. That is, the account holders transfer money into the DMT network, which becomes...

 and Yodelbank were examples of two such anonymous banks that were later put offline by their creators. eCache
ECache
eCache is an anonymous bank operating through interfaces in the Tor network. The bank issues cryptographic certificates, digital bearer certificates, that can be exchanged among the bank's users. The certificates can be bought and sold for real money through the bank. The owners and operators of...

 is a bank currently operating in the Tor
Tor (anonymity network)
Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis...

 network, and Pecunix
Pecunix
Pecunix is a digital gold currency founded in 2002 by Simon Davis. Similar to competing systems such as e-gold, Pecunix allows for the instant transfer of gold between user accounts....

 is an anonymous (submitting personal information when opening an account is optional) gold bank operating on the Internet.

Ukash
Ukash
Ukash is a brand of SmartVoucher Ltd and was created in 2005 to provide online cash-payment services. It is available in 33 countries, through payment terminals in retail outlets across Europe, South Africa, South America, Canada and Australia and it is also issued online from the company’s website...

 is an e-money network. Cash in amounts up to £500/€750 can be swapped for a 19-digit Ukash voucher in payment terminals and retail outlets. Bitcoin
Bitcoin
Bitcoin is a decentralized, peer-to-peer network over which users make transactions that are tracked and verified through this network. The word Bitcoin also refers to the digital currency implemented as the currency medium for user transactions over this network...

 is a currency generated by peer-to-peer networked computers that maintain a communal record of all transactions within the system that can be used in a crypt-anarchic context.

Bitcoin
Bitcoin
Bitcoin is a decentralized, peer-to-peer network over which users make transactions that are tracked and verified through this network. The word Bitcoin also refers to the digital currency implemented as the currency medium for user transactions over this network...

 is a P2P Digital Currency offering high degree of anonymity.

Anonymous trading is easier to achieve for information services that can be provided over the Internet. Providing physical products is more difficult as the anonymity is more easily broken when crossing into the physical world. Untraceable money makes it possible to ignore some of the law
Law
Law is a system of rules and guidelines which are enforced through social institutions to govern behavior, wherever possible. It shapes politics, economics and society in numerous ways and serves as a social mediator of relations between people. Contract law regulates everything from buying a bus...

s of the physical world, as the laws cannot be enforced without knowing people's physical identities. For instance, tax on income for online services provided via the crypto-anarchists networks can be avoided if no government knows the identity of the service provider.

Linguistics

The "crypto" in crypto-anarchism should not be confused with the use of the prefix "crypto-" to indicate an ideology or system with an intentionally concealed or obfuscated "true nature". For example, some would use the term "crypto-fascist" to describe an individual or organization that holds fascist views and subscribes to fascist doctrine but conceals their agenda so long as these doctrines remain socially unacceptable. However, Timothy C. May
Timothy C. May
Timothy C. May, better known as Tim May, is a technical and political writer, and was an electronic engineer and senior scientist at Intel in the company's early history...

's "Cyphernomicon
Cyphernomicon
"The Cyphernomicon" is a document written by Timothy C. May in 1994 for the Cypherpunks electronic mailing list, outlining some ideas behind, and the effects of, crypto-anarchism...

" indicates that the term "crypto-anarchist" was partially intended as a pun
Pun
The pun, also called paronomasia, is a form of word play which suggests two or more meanings, by exploiting multiple meanings of words, or of similar-sounding words, for an intended humorous or rhetorical effect. These ambiguities can arise from the intentional use and abuse of homophonic,...

 on this usage, even though he did not intend to conceal his beliefs or agenda.

See also

  • Cypherpunk
    Cypherpunk
    A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change.Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography...

  • Crypto-currency
  • Darknet (file sharing)
  • Data haven
    Data haven
    A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data. Data havens are locations with legal environments that are friendly to the concept of a computer network freely holding data and even protecting its content and associated information...

    s
  • Digital gold currency
    Digital gold currency
    Digital gold currency is a form of electronic money based on ounces of gold. It is a kind of representative money, like a US paper gold certificate at the time that these were exchangeable for gold on demand. The typical unit of account for such currency is the gold gram or the troy ounce,...

  • Hacktivism
    Hacktivism
    Hacktivism is the use of computers and computer networks as a means of protest to promote political ends. The term was first coined in 1994 by a member of the Cult of the Dead Cow hacker collective named Omega...

  • Infoanarchism
    Infoanarchism
    Infoanarchism is an umbrella term for various groups of people who are opposed to forms of intellectual property, such as copyright and patents. The term was coined in a TIME Magazine article called "The Infoanarchist" in July 2000. The article was about Ian Clarke, known as the original designer...

  • Jim Bell
    Jim Bell
    James Dalton Bell is an American crypto-anarchist who created the idea of arranging for anonymously-sponsored assassination payments via the Internet, which he called "assassination politics". Since the publication of the "Assassination Politics" essay, Bell was targeted by the federal government...

  • Technological utopianism
    Technological utopianism
    Technological utopianism refers to any ideology based on the belief that advances in science and technology will eventually bring about a utopia, or at least help to fulfill one or another utopian ideal...



External links

  • The Cyphernomicon by Timothy C. May
    Timothy C. May
    Timothy C. May, better known as Tim May, is a technical and political writer, and was an electronic engineer and senior scientist at Intel in the company's early history...

  • A Declaration of the Independence of Cyberspace by John Perry Barlow
    John Perry Barlow
    John Perry Barlow is an American poet and essayist, a retired Wyoming cattle rancher, and a cyberlibertarian political activist who has been associated with both the Democratic and Republican parties. He is also a former lyricist for the Grateful Dead and a founding member of the Electronic...

  • The Crypto Anarchist Manifesto by Timothy C. May
    Timothy C. May
    Timothy C. May, better known as Tim May, is a technical and political writer, and was an electronic engineer and senior scientist at Intel in the company's early history...

    (PDF version from Invisible Molotov)
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK