80 lines
3.8 KiB
Plaintext
80 lines
3.8 KiB
Plaintext
![]() |
The Crypto Anarchist Manifesto
|
|||
|
|
|||
|
Timothy C. May
|
|||
|
tcmay@netcom.com
|
|||
|
|
|||
|
|
|||
|
A specter is haunting the modern world, the specter of crypto
|
|||
|
anarchy.
|
|||
|
|
|||
|
Computer technology is on the verge of providing the ability for
|
|||
|
individuals and groups to communicate and interact with each other
|
|||
|
in a totally anonymous manner. Two persons may exchange
|
|||
|
messages, conduct business, and negotiate electronic contracts
|
|||
|
without ever knowing the True Name, or legal identity, of the other.
|
|||
|
Interactions over networks will be untraceable, via extensive re-
|
|||
|
routing of encrypted packets and tamper-proof boxes which
|
|||
|
implement cryptographic protocols with nearly perfect assurance
|
|||
|
against any tampering. Reputations will be of central importance, far
|
|||
|
more important in dealings than even the credit ratings of today.
|
|||
|
These developments will alter completely the nature of government
|
|||
|
regulation, the ability to tax and control economic interactions, the
|
|||
|
ability to keep information secret, and will even alter the nature of
|
|||
|
trust and reputation.
|
|||
|
|
|||
|
The technology for this revolution--and it surely will be both a social
|
|||
|
and economic revolution--has existed in theory for the past decade.
|
|||
|
The methods are based upon public-key encryption, zero-knowledge
|
|||
|
interactive proof systems, and various software protocols for
|
|||
|
interaction, authentication, and verification. The focus has until now
|
|||
|
been on academic conferences in Europe and the U.S., conferences
|
|||
|
monitored closely by the National Security Agency. But only recently
|
|||
|
have computer networks and personal computers attained sufficient
|
|||
|
speed to make the ideas practically realizable. And the next ten
|
|||
|
years will bring enough additional speed to make the ideas
|
|||
|
economically feasible and essentially unstoppable. High-speed
|
|||
|
networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band
|
|||
|
transmitters, multi-MIPS personal computers, and encryption chips
|
|||
|
now under development will be some of the enabling technologies.
|
|||
|
|
|||
|
The State will of course try to slow or halt the spread of this
|
|||
|
technology, citing national security concerns, use of the technology
|
|||
|
by drug dealers and tax evaders, and fears of societal disintegration.
|
|||
|
Many of these concerns will be valid; crypto anarchy will allow
|
|||
|
national secrets to be trade freely and will allow illicit and stolen
|
|||
|
materials to be traded. An anonymous computerized market will
|
|||
|
even make possible abhorrent markets for assassinations and
|
|||
|
extortion. Various criminal and foreign elements will be active users
|
|||
|
of CryptoNet. But this will not halt the spread of crypto anarchy.
|
|||
|
|
|||
|
Just as the technology of printing altered and reduced the power of
|
|||
|
medieval guilds and the social power structure, so too will
|
|||
|
cryptologic methods fundamentally alter the nature of corporations
|
|||
|
and of government interference in economic transactions. Combined
|
|||
|
with emerging information markets, crypto anarchy will create a
|
|||
|
liquid market for any and all material which can be put into words
|
|||
|
and pictures. And just as a seemingly minor invention like barbed
|
|||
|
wire made possible the fencing-off of vast ranches and farms, thus
|
|||
|
altering forever the concepts of land and property rights in the
|
|||
|
frontier West, so too will the seemingly minor discovery out of an
|
|||
|
arcane branch of mathematics come to be the wire clippers which
|
|||
|
dismantle the barbed wire around intellectual property.
|
|||
|
|
|||
|
Arise, you have nothing to lose but your barbed wire fences!
|
|||
|
|
|||
|
|
|||
|
--
|
|||
|
..........................................................................
|
|||
|
Timothy C. May | Crypto Anarchy: encryption, digital money,
|
|||
|
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
|
|||
|
408-688-5409 | knowledge, reputations, information markets,
|
|||
|
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
|
|||
|
Higher Power: 2^756839 | PGP Public Key: by arrangement.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|