textfiles/internet/anarchy

989 lines
40 KiB
Plaintext
Raw Permalink Blame History

Crypto Anarchy and Virtual Communities
Timothy C. May
535 Monterey Drive
Aptos, CA 95003 U.S.A.
tcmay@netcom.com
Extended Abstract
The combination of strong, unbreakable public key
cryptography and virtual network communities in
cyberspace will produce interesting and profound
changes in the nature of economic and social sys-
tems. Crypto anarchy is the cyberspatial realization
of anarcho-capitalism, transcending national
boundaries and freeing individuals to make the
economic arrangements they wish to make consen-
sually.
Strong cryptography, exemplified by RSA (a public
key algorithm) and PGP (Pretty Good Privacy), pro-
vides encryption that essentially cannot be broken
with all the computing power in the universe. This
ensures security and privacy. Public key cryptogra-
phy is rightly considered to be a revolution.
Digital mixes, or anonymous remailers, use crypto to
create untraceable e-mail, which has many uses.
(Numerous anonymous remailers, in several coun-
tries, are now operating. Message traffic is growing
exponentially.)
Digital pseudonyms, the creation of persistent net-
work personas that cannot be forged by others and
yet which are unlinkable to the "true names" of their
owners, are finding major uses in ensuring free
speech, in allowing controversial opinions to be
aired, and in providing for economic transactions
that cannot be blocked by local governments. The
technology being deployed by the Cypherpunks
and others, means their identities, nationalities, and
even which continents they are on are untraceable--
unless they choose to reveal this information. This
alters the conventional "relationship topology" of
the world, allowing diverse interactions without
external governmental regulation, taxation, or in-
terference
Digital cash, untraceable and anonymous (like real
cash), is also coming, though various technical and
practical hurdles remain. "Swiss banks in cyber-
space" will make economic transactions much more
liquid and much less subject to local rules and reg-
ulations. Tax avoidance is likely to be a major at-
traction for many. An example of local interest to
Monte Carlo might be the work underway to devel-
op anonymous, untraceable systems for "cyber-
space casinos." While not as attractive to many as
elegant casinos, the popularity of "numbers games"
and bookies in general suggests a opportunity to
pursue.
Data havens and information markets are already
springing up, using the methods described to make
information retrievable anonymously and untrace-
ably.
Governments see their powers eroded by these
technologies, and are taking various well-known
steps to try to limit the use of strong crypto by their
subjects. The U.S. has several well-publicized ef-
forts, including the Clipper chip, the Digital Tele-
phony wiretap law, and proposals for "voluntary"
escrow of cryptographic keys. Cypherpunks and
others expect these efforts to be bypassed. Technol-
ogy has let the genie out of the bottle. Crypto anar-
chy is liberating individuals from coercion by their
physical neighbors--who cannot know who they
are on the Net--and from governments. For libertar-
ians, strong crypto provides the means by which
government will be avoided.
The presentation will describe how several of these
systems work, briefly, and will outline the likely im-
plications of this combination of crypto anarchy
and virtual cyberspace communities.
1.Introduction
This paper describes the combination of two major
technologies:
<EFBFBD>.Strong Crypto: including encryption, digi-
tal signatures, digital cash, digital mixes (re-
mailers), and related technologies.
<EFBFBD>.Cyberspatial Virtual Communities: includ-
ing networks, anonymous communications,
MUDs and MOOs, and "Multiverse"-type vir-
tual realities.
These areas have generally remained separate, at
least in published papers. Certainly the developers
of cyberspace systems, such as MUDs, MOOs, and
Habitat-like systems, appreciate the importance of
cryptography for user authentication, overall secu-
rity, and certainly for (eventual) digital purchase of
services. But for the most part the combination of
these two areas has been the province of the science
fiction writer, notably writers such as Vernor Vinge,
William Gibson, Bruce Sterling, and Orson Scott
Card.
The "Cypherpunks" group, a loose, anarchic mail-
ing list and group of hackers, was formed by sever-
al of us in 1992 as a group to make concrete some of
the abstract ideas often presented at conferences.
We've had some successes, and some failures. [1]
The Cypherpunks group also appeared at a fortu-
itous time, as PGP was becoming popular, as Wired
magazine appeared (they featured us on the cover
of their second issue), and as the publicity (hype?)
about the Information Superhighway and the
World Wide Web reached a crescendo.
The site ftp.csua.berkeley.edu has a number of es-
says and files, including crypto files, in the directo-
ry pub/cypherpunks. I have also written/
compiled a very large 1.3 MB FAQ on these issues,
the Cyphernomicon, available at various sites, in-
cluding my ftp directory, ftp.netcom.com, in the di-
rectory pub/tc/tcmay.
The Cypherpunks group is also a pretty good ex-
ample of a "virtual community." Scattered around
the world, communicating electronically in matters
of minutes, and seeming oblivious to local laws, the
Cypherpunks are indeed a community, and a virtu-
al one. Many members use pseudonyms, and use
anonymous remailers to communicate with the list.
The list itself thus behaves as a "message pool," a
place where information of all sort may be anony-
mous deposited--and anonymous received (since
everyone sees the entire list, like a newspaper, the
intended recipient is anonymized).
Legal Caveat: Consult your local laws before apply-
ing any of the methods described here. In some ju-
risdictions, it may be illegal to even read papers like
this (seriously). In particular, I generally won't be
giving ftp site addresses for copies of PGP, remailer
access, digital cash systems, etc. These are well-cov-
ered in more current forums, e.g., sci.crypt or
talk.politics.crypto, and there are some unresolved is-
sues about whether giving the address of such sites
constitutes (or "aids and abets") violation of various
export and munitions laws (crypto is considered a
munition in the U.S. and probably else-
where....some nations consider a laser printer to be
a munitions item!).
2.Modern Cryptography
The past two decades have produced a revolution
in cryptography (crypto, for short) the science of
the making of ciphers and codes. Beyond just sim-
ple ciphers, useful mainly for keeping communica-
tions secret, modern crypto includes diverse tools
for authentication of messages, for digital time-
stamping of documents, for hiding messages in
other documents (steganography), and even for
schemes for digital cash.
Public key cryptography, the creation of Diffie and
Hellman, has dramatically altered the role of cryp-
to. Coming at the same time as the wholesale con-
version to computer networks and worldwide
communications, it has been a key element of secu-
rity, confidence, and success. The role of crypto will
only become more important over the coming de-
cades.
Pretty Good Privacy, PGP, is a popular version of
the algorithm developed by Rivest, Shamir, and
Adleman, known of course as RSA. The RSA algo-
rithm was given a patent in the U.S., though not in
any European countries, and is licensed commer-
cially. [2]
These tools are described in detail in various texts
and Conference proceedings, and are not the sub-
ject of this paper. [3] The focus here is on the impli-
cations of strong crypto for cyberspace, especially
on virtual communities.
Mention should be made of the role of David
Chaum in defining the key concepts here. In several
seminal papers (for example, [4] [5]), Chaum intro-
duced the ideas of using public key cryptography
methods for anonymous, untraceable electronic
mail, for digital money systems in which spender
identity is not revealed, and in schemes related to
these. (I make no claims of course that Chaum
agrees with my conclusions about the political and
socioeconomic implications of these results.)
3.Virtual Communities
Notes: cyberspace, Habitat, VR, Vinge, etc. Crypto
holds up the "walls" of these cyberspatial realities.
Access control, access rights, modification privileg-
es.
Virtual communities are the networks of individu-
als or groups which are not necessarily closely-con-
nected geographically. The "virtual" is meant to
imply a non-physical linking, but should not be tak-
en to mean that these are any less community-like
than are conventional physical communities.
Examples include churches, service organizations,
clubs, criminal gangs, cartels, fan groups, etc. The
Catholic Church and the Boy Scouts are both exam-
ples of virtual communities which span the globe,
transcend national borders, and create a sense of al-
legiance, of belonging, and a sense of "community."
Likewise, the Mafia is a virtual community (with its
enforcement mechanisms, its own extra-legal rules,
etc.) Lots of other examples: Masons, Triads, Red
Cross, Interpol, Islam, Judaism, Mormons, Sindero
Luminoso, the IRA, drug cartels, terrorist groups,
Aryan Nation, Greenpeace, the Animal Liberation
Front, and so on. There are undoubtedly many
more such virtual communities than there are na-
tion-states, and the ties that bind them are for the
most part much stronger than are the chauvinist na-
tionalism emotions. Any group in which the com-
mon interests of the group, be it a shared ideology
or a particular interest, are enough to create a cohe-
sive community.
Corporations are another prime example of a virtu-
al community, having scattered sites, private com-
munication channels (generally inaccessible to the
outside world, including the authorities), and their
own goals and methods. In fact, many "cyberpunk"
(not cypherpunk) fiction authors make a mistake, I
think, in assuming the future world will be domi-
nated by transnational megacorporate "states." In
fact, corporations are just one example--of many--of
such virtual communities which will be effectively
on a par with nation-states. (Note especially that
any laws designed to limit use of crypto cause im-
mediate and profound problems for corporations--
countries like France and the Philippines, which
have attempted to limit the use of crypto, have
mostly been ignored by corporations. Any attempts
to outlaw crypto will produce a surge of sudden
"incorporations," thus gaining for the new corpo-
rate members the aegis of corporate privacy.)
In an academic setting, "invisible colleges" are the
communities of researchers.
These virtual communities typically are "opaque"
to outsiders. Attempts to gain access to the internals
of these communities are rarely successful. Law en-
forcement and intelligence agencies (such as the
NSA in the U.S., Chobetsu in Japan, SDECE in
France, and so on, in every country) may infiltrate
such groups and use electronic surveillance
(ELINT) to monitor these virtual communities. Not
surprisingly, these communities are early adopters
of encryption technology, ranging from scrambled
cellphones to full-blown PGP encryption. [8]
The use of encryption by "evil" groups, such as
child pornographers, terrorists, abortionists, abor-
tion protestors, etc., is cited by those who wish to
limit civilian access to crypto tools. We call these the
"Four Horseman of the Infocalypse," as they are so
often cited as the reason why ordinary citizen-units
of the nation-state are not to have access to crypto.
This is clearly a dangerous argument to make, for
various good reasons. The basic right of free speech
is the right to speak in a language one's neighbors
or governing leaders may not find comprehensible:
encrypted speech. There's not enough space here to
go into the many good arguments against a limit on
access to privacy, communications tools, and cryp-
to.
The advent of full-featured communications sys-
tems for computer-mediated virtual communities
will have even more profound implications. MUDs
and MOOs (multi-user domains, etc.) and 3D virtu-
al realities are one avenue, and text-centric Net
communications are another. (Someday, soon,
they'll merge, as described in Vernor Vinge's pro-
phetic 1980 novella, True Names.)
4.Observability and Surveil-
lance
An interesting way to view issues of network visi-
bility is in terms of the "transparency" of nodes and
links between nodes. Transparent means visible to
outsiders, perhaps those in law enforcement or the
intelligence community. Opaque mean not trans-
parent, not visible. A postcard is transparent, a
sealed letter is opaque. PGP inventor Phil Zimmer-
mann has likened the requirement for transparency
to being ordered to use postcards for all correspon-
dence, with encryption the equivalent of an opaque
envelope (envelopes can be opened, of course, and
long have been).
Transparent links and nodes are the norm in a po-
lice state, such as the U.S.S.R., Iraq, China, and so
forth. Communications channels are tapped, and
private use of computers is restricted. (This is be-
coming increasingly hard to do, even for police
states; many cite the spread of communications op-
tions as a proximate cause of the collapse of com-
munism in recent years.)
There are interesting "chemistries" or "algebras" of
transparent vs. opaque links and nodes. What hap-
pens if links must be transparent, but nodes are al-
lowed to be opaque? (The answer: the result is as if
opaque links and nodes were allowed, i.e., full im-
plications of strong crypto. Hence, any attempt to
ban communications crypto while still allowing
private CPUs to exist....)
If Alice and Bob are free to communicate, and to
choose routing paths, then Alice can use "crypto ar-
bitrage" (a variation on the term, "regulatory arbi-
trage," the term Eric Hughes uses to capture this
idea of moving transactions to other jurisdictions)
to communicate with sites--perhaps in other coun-
tries--that will perform as she wishes. This can
mean remailing, mixing, etc. As an example, Cana-
dian citizens who are told they cannot access infor-
mation on the Homolka-Teale murder case (a
controversial case in which the judge has ordered
the media in Canada, and entering Canada, not to
discuss the gory details) nevertheless have a vast
array of options, including using telnet, gopher, ftp,
the Web, etc., to access sites in many other coun-
tries--or even in no country in particular.
Most of the consequences described here arise from
this chemistry of links and nodes: unless nearly all
node and links are forced to be transparent, includ-
ing links to other nations and the nodes in those na-
tions, then the result is that private communication
can still occur. Crypto anarchy results.
5.Crypto Anarchy
"The Net is an anarchy." This truism is the core of
crypto anarchy. No central control, no ruler, no
leader (except by example, reputation), no "laws."
No single nation controls the Net, no administra-
tive body sets policy. The Ayatollah in Iran is as
powerless to stop a newsgroup--alt.wanted.mos-
lem.women or alt.wanted.moslem.gay come to mind--
he doesn't like as the President of France is as pow-
erless to stop, say, the abuse of French in soc.cul-
ture.french. Likewise, the CIA can't stop
newsgroups, or sites, or Web pages, which give
away their secrets. At least not in terms of the Net
itself...what non-Net steps might be taken is left as
an exercise for the paranoid and the cautious.
This essential anarchy is much more common than
many think. Anarchy--the absence of a ruler telling
one what to do--is common in many walks of life:
choice of books to read, movies to see, friends to so-
cialize with, etc. Anarchy does not mean complete
freedom--one can, after all, only read the books
which someone has written and had published--but
it does mean freedom from external coercion. Anar-
chy as a concept, though, has been tainted by other
associations.
First, the "anarchy" here is not the anarchy of popu-
lar conception: lawlessness, disorder, chaos, and
"anarchy." Nor is it the bomb-throwing anarchy of
the 19th century "black" anarchists, usually associ-
ated with Russia and labor movements. Nor is it the
"black flag" anarchy of anarcho-syndicalism and
writers such as Proudhon. Rather, the anarchy be-
ing spoken of here is the anarchy of "absence of
government" (literally, "an arch," without a chief or
head).
This is the same sense of anarchy used in "anarcho-
capitalism," the libertarian free market ideology
which promotes voluntary, uncoerced economic
transactions. [6] I devised the term crypto anarchy as
a pun on crypto, meaning "hidden," on the use of
"crypto" in combination with political views (as in
Gore Vidal's famous charge to William F. Buckley:
"You crypto fascist!"), and of course because the
technology of crypto makes this form of anarchy
possible. The first presentation of this was in a 1988
"Manifesto," whimsically patterned after another
famous manifesto. [7] Perhaps a more popularly
understandable term, such as "cyber liberty," might
have some advantages, but crypto anarchy has its
own charm, I think.
And anarchy in this sense does not mean local hier-
archies don't exist, nor does it mean that no rulers
exist. Groups outside the direct control of local gov-
ernmental authorities may still have leaders, rulers,
club presidents, elected bodies, etc. Many will not,
though.
Politically, virtual communities outside the scope of
local governmental control may present problems
of law enforcement and tax collection. (Some of us
like this aspect.) Avoidance of coerced transactions
can mean avoidance of taxes, avoidance of laws
saying who one can sell to and who one can't, and
so forth. It is likely that many will be unhappy that
some are using cryptography to avoid laws de-
signed to control behavior.
National borders are becoming more transparent
than ever to data. A flood of bits crosses the borders
of most developed countries--phone lines, cables,
fibers, satellite up/downlinks, and millions of dis-
kettes, tapes, CDs, etc. Stopping data at the borders
is less than hopeless.
Finally, the ability to move data around the world at
will, the ability to communicate to remote sites at
will, means that a kind of "regulatory arbitrage" can
be used to avoid legal roadblocks. For example, re-
mailing into the U.S. from a site in the Nether-
lands...whose laws apply? (If one thinks that U.S.
laws should apply to sites in the Netherlands, does
Iraqi law apply in the U.S.? And so on.)
This regulatory arbitrage is also useful for avoiding
the welter of laws and regulations which opera-
tions in one country may face, including the "deep
pockets" lawsuits so many in the U.S. face. Moving
operations on the Net outside a litigious jurisdic-
tion is one step to reduce this business liability. Like
Swiss banks, but different.
6.True Names and Anonymous
Systems
Something needs to be said about the role of ano-
nymity and digital pseudonyms. This is a topic for
an essay unto itself, of course.
Are true names really needed? Why are they asked
for? Does the nation-state have any valid reason to
demand they be used?
People want to know who they are dealing with, for
psychological/evolutionary reasons and to better
ensure traceability should they need to locate a per-
son to enforce the terms of a transaction. The purely
anonymous person is perhaps justifiably viewed
with suspicion.
And yet pseudonyms are successful in many cases.
And we rarely know whether someone who pre-
sents himself by some name is "actually" that per-
son. Authors, artists, performers, etc., often use
pseudonyms. What matters is persistence, and non-
forgeability. Crypto provides this.
On the Cypherpunks list, well-respected digital
pseudonyms have appeared and are thought of no
less highly than their "real" colleagues are.
The whole area of digitally-authenticated reputa-
tions, and the "reputation capital" that accumulates
or is affected by the opinions of others, is an area
that combines economics, game theory, psychology,
and expectations. A lot more study is needed.
It is unclear if governments will move to a system
of demanding "Information Highway Driver's Li-
censes," figuratively speaking, or how systems like
this could ever be enforced. (The chemistry of
opaque nodes and links, again.)
7.Examples and Uses
It surprises many people that some of these uses are
already being intensively explored. Anonymous re-
mailers are used by tens of thousands of persons--
and perhaps abused. [13] And of course encryption,
via RSA, PGP, etc., is very common in some com-
munities. (Hackers, Net users, freedom fighters,
white separatists, etc....I make no moral judgments
here about those using these methods).
Remailers are a good example to look at in more de-
tail. There are two current main flavors of remailers:
1."Cypherpunk"-style remailers, which process
text messages to redirect mail to another sites, using
a command syntax that allows arbitrary nesting of
remailing (as many sites as one wishes), with PGP
encryption at each level of nesting.
2."Julf"-style remailer(s), based on the original
work of Karl Kleinpaste and operated/maintained
by Julf Helsingius, in Finland. No encryption, and
only one such site at present. (This system has been
used extensively for messages posted to the Usenet,
and is basically successful. The model is based on
operator trustworthiness, and his location in Fin-
land, beyond the reach of court orders and subpoe-
nas from most countries.)
The Cypherpunks remailers currently number
about 20, with more being added every month.
There is no reason not to expect hundreds of such
remailers in a few years.
One experimental "information market" is Black-
Net, a system which appeared in 1993 and which al-
lows fully-anonymous, two-way exchanges of
information of all sorts. There are reports that U.S.
authorities have investigated this because of its
presence on networks at Defense Department re-
search labs. Not much they can do about it, of
course, and more such entities are expected.
(The implications for espionage are profound, and
largely unstoppable. Anyone with a home comput-
er and access to the Net or Web, in various forms,
can use these methods to communicate securely,
anonymously or pseudonymously, and with little
fear of detection. "Digital dead drops" can be used
to post information obtained, far more securely
than the old physical dead drops...no more messag-
es left in Coke cans at the bases of trees on remote
roads.)
Whistleblowing is another growing use of anony-
mous remailers, with folks fearing retaliation using
remailers to publicly post information. (Of course,
there's a fine line between whistleblowing, revenge,
and espionage.)
Data havens, for the storage and marketing of con-
troversial information is another area of likely fu-
ture growth. Nearly any kind of information,
medical, religious, chemical, etc., is illegal or pro-
scribed in one or more countries, so those seeking
this illegal information will turn to anonymous
messaging systems to access--and perhaps pur-
chase, with anonymous digital cash--this informa-
tion. This might include credit data bases, deadbeat
renter files, organ bank markets, etc. (These are all
things which have various restrictions on them in
the U.S., for example....one cannot compile credit
data bases, or lists of deadbeat renters, without
meeting various restrictions. A good reason to
move them into cyberspace, or at least outside the
U.S., and then sell access through remailers.)
Matching buyers and sellers of organs is another
such market. A huge demand (life and death), but
various laws tightly controlling such markets.
Digital cash efforts. A lot has been written about
digital cash. [14] [15] David Chaum's company,
DigiCash, has the most interesting technology, and
has recently begun market testing. Stefan Brands
may or may not have a competing system which
gets around some of Chaum's patents. (The attitude
crypto anarchists might take about patents is anoth-
er topic for discussion. Suffice it to say that patents
and other intellectual property issues continue to
have relevance in the practical world, despite ero-
sion by technological trends.)
Credit card-based systems, such as the First Virtual
system, are not exactly digital cash, in the Chaumi-
an sense of blinded notes, but offer some advantag-
es the market may find useful until more advanced
systems are available.
I expect to see many more such experiments over
the next several years, and some of them will likely
be market successes.
8.Commerce and Colonization
of Cyberspace
How will these ideas affect the development of cy-
berspace?
"You can't eat cyberspace" is a criticism often lev-
elled at argument about the role of cyberspace in
everyday life. The argument made is that money
and resources "accumulated" in some future (or
near-future) cyberspatial system will not be able to
be "laundered" into the real world. Even such a pre-
scient thinker as Neal Stephenson, in Snow Crash,
had his protagonist a vastly wealthy man in "The
Multiverse," but a near-pauper in the physical
world.
This is implausible for several reasons. First, we
routinely see transfers of wealth from the abstract
world of stock tips, arcane consulting knowledge,
etc., to the real world. "Consulting" is the operative
word. Second, a variety of means of laundering
money, via phony invoices, uncollected loans, art
objects, etc., are well-known to those who launder
money...these methods, and more advanced ones to
come, are likely to be used by those who wish their
cyberspace profits moved into the real world.
(Doing this anonymously, untraceably, is another
complication. There may be methods of doing
this--proposals have looked pretty solid, but more
work is needed.)
The World Wide Web is growing at an explosive
pace. Combined with cryptographically-protected
communication and digital cash of some form (and
there are several being tried), this should produce
the long-awaited colonization of cyberspace.
Most Net and Web users already pay little attention
to the putative laws of their local regions or nations,
apparently seeing themselves more as members of
various virtual communities than as members of lo-
cally-governed entities. This trend is accelerating.
Most importantly, information can be bought and
sold (anonymously, too) and then used in the real
world. There is no reason to expect that this won't
be a major reason to move into cyberspace.
9.Implications
I've touched on the implications in several places.
Many thoughtful people are worried about some of
the possibilities made apparent by strong crypto
and anonymous communication systems. Some are
proposing restrictions on access to crypto tools. The
recent debate in the U.S. over "Clipper" and other
key escrow systems shows the strength of emotions
on this issue.
Abhorrent markets may arise. For example, anony-
mous systems and untraceable digital cash have
some obvious implications for the arranging of con-
tract killings and such. (The greatest risk in arrang-
ing such hits is that physical meetings expose the
buyers and sellers of such services to stings. Crypto
anarchy lessens, or even eliminates, this risk, thus
lowering transaction costs. The risks to the actual
triggermen are not lessened, but this is a risk the
buyers need not worry about. Think of anonymous
escrow services which hold the digital money until
the deed is done. Lots of issues here. It is unfortu-
nate that this area is so little-discussed....people
seem to have an aversion for exploring the logical
consequences in such areas.)
The implications for corporate and national espio-
nage have already been touched upon. Combined
with liquid markets in information, this may make
secrets much harder to keep. ((Imagine a "Digital
Jane's," after the military weapons handbooks,
anonymously compiled and sold for digital money,
beyond the reach of various governments which
don't want their secrets told.)
New money-laundering approaches are of course
another area to explore.
Something that is inevitable is the increased role of
individuals, leading to a new kind of elitism. Those
who are comfortable with the tools described here
can avoid the restrictions and taxes that others can-
not. If local laws can be bypassed technologically,
the implications are pretty clear.
The implications for personal liberty are of course
profound. No longer can nation-states tell their cit-
izen-units what they can have access to, not if these
citizens can access the cyberspace world through
anonymous systems.
10.How Likely?
I am making no bold predictions that these changes
will sweep the world anytime soon. Most people
are ignorant of these methods, and the methods
themselves are still under development. A whole-
sale conversion to "living in cyberspace" is just not
in the cards, at least not in the next few decades.
But to an increasingly large group, the Net is reality.
It is where friends are made, where business is ne-
gotiated, where intellectual stimulation is found.
And many of these people are using crypto anarchy
tools. Anonymous remailers, message pools, infor-
mation markets. Consulting via pseudonyms has
begun to appear, and should grow. (As usual, the
lack of a robust digital cash system is slowing
things down.
Can crypto anarchy be stopped? Although the fu-
ture evolution in unclear, as the future almost al-
ways is, it seems unlikely that present trends can be
reversed:
<EFBFBD>.Dramatic increases in bandwidth and local,
privately-owned computer power.
<EFBFBD>.Exponential increase in number of Net us-
ers.
<EFBFBD>.Explosion in "degrees of freedom" in per-
sonal choices, tastes, wishes, goals.
<EFBFBD>.Inability of central governments to control
economies, cultural trends, etc. [9]
<EFBFBD>.The Net is integrally tied to economic
transactions, and no country can afford to "dis-
connect" itself from it. (The U.S.S.R. couldn't do
it, and they were light-years behind the U.S.,
European, and Asian countries. And in a few
more years, no hope of limiting these tools at
all, something the U.S. F.B.I. has acknowl-
edged. [11]
Technological Inevitability: These tools are already
in widespread use, and only draconian steps to lim-
it access to computers and communications chan-
nels could significantly impact further use.
(Scenarios for restrictions on private use of crypto.)
As John Gilmore has noted, "the Net tends to inter-
pret censorship as damage, and routes around it."
This applies as well to attempts to legislate behav-
ior on the Net. (The utter impossibility of regulating
the worldwide Net, with entry points in more than
a hundred nations, with millions of machines, is not
yet fully recognized by most national governments.
They still speak in terms of "controlling" the Net,
when in fact the laws of one nation generally have
little use in other countries.)
Digital money in its various forms is probably the
weakest link at this point. Most of the other pieces
are operational, at least in basic forms, but digital
cash is (understandably) harder to deploy. Hobby-
ist or "toy" experiments have been cumbersome,
and the "toy" nature is painfully obvious. It is not
easy to use digital cash systems at this time ("To use
Magic Money, first create a client..."), especially as
compared to the easily understood alternatives.
[12] People are understandably reluctant to entrust
actual money to such systems. And it's not yet clear
what can be bought with digital cash (a chicken or
egg dilemma, likely to be resolved in the next sev-
eral years).
And digital cash, digital banks, etc., are a likely tar-
get for legislative moves to limit the deployment of
crypto anarchy and digital economies. Whether
through banking regulation or tax laws, it is not
likely that digital money will be deployed easily.
"Kids, don't try this at home!" Some of the current
schemes may also incorporate methods for report-
ing transactions to the tax authorities, and may in-
clude "software key escrow" features which make
transactions fully or partly visible to authorities.
11.Conclusions
Strong crypto provides new levels of personal pri-
vacy, all the more important in an era of increased
surveillance, monitoring, and the temptation to de-
mand proofs of identity and permission slips. Some
of the "credentials without identity" work of
Chaum and others may lessen this move toward a
surveillance society.
The implications are, as I see it, that the power of
nation-states will be lessened, tax collection policies
will have to be changed, and economic interactions
will be based more on personal calculations of val-
ue than on societal mandates.
Is this a Good Thing? Mostly yes. Crypto anarchy
has some messy aspects, of this there can be little
doubt. From relatively unimportant things like
price-fixing and insider trading to more serious
things like economic espionage, the undermining
of corporate knowledge ownership, to extremely
dark things like anonymous markets for killings.
But let's not forget that nation-states have, under
the guise of protecting us from others, killed more
than 100 million people in this century alone. Mao,
Stalin, Hitler, and Pol Pot, just to name the most ex-
treme examples. It is hard to imagine any level of
digital contract killings ever coming close to nation-
state barbarism. (But I agree that this is something
we cannot accurately speak about; I don't think we
have much of a choice in embracing crypto anarchy
or not, so I choose to focus on the bright side.)
It is hard to argue that the risks of anonymous mar-
kets and tax evasion are justification for world-
wide suppression of communications and encryp-
tion tools. People have always killed each other,
and governments have not stopped this (arguably,
they make the problem much worse, as the wars of
this century have shown).
Also, there are various steps that can be taken to
lessen the risks of crypto anarchy impinging on
personal safety. [10]
Strong crypto provides a technological means of en-
suring the practical freedom to read and write what
one wishes to. (Albeit perhaps not in one's true
name, as the nation-state-democracy will likely still
try to control behavior through majority votes on
what can be said, not said, read, not read, etc.) And
of course if speech is free, so are many classes of
economic interaction that are essentially tied to free
speech.
A phase change is coming. Virtual communities are
in their ascendancy, displacing conventional no-
tions of nationhood. Geographic proximity is no
longer as important as it once was.
A lot of work remains. Technical cryptography still
hasn't solved all problems, the role of reputations
(both positive and negative) needs further study,
and the practical issues surrounding many of these
areas have barely been explored.
We will be the colonizers of cyberspace.
12.Acknowledgments
My thanks to my colleagues in the Cypherpunks
group, all 700 of them, past or present. Well over
100 megabytes of list traffic has passed through he
Cypherpunks mailing list, so there have been a lot
of stimulating ideas. But especially my appreciation
goes to Eric Hughes, Sandy Sandfort, Duncan Fris-
sell, Hal Finney, Perry Metzger, Nick Szabo, John
Gilmore, Whit Diffie, Carl Ellison, Bill Stewart, and
Harry Bartholomew. Thanks as well to Robin Han-
son, Ted Kaehler, Keith Henson, Chip Morningstar,
Eric Dean Tribble, Mark Miller, Bob Fleming, Che-
rie Kushner, Michael Korns, George Gottlieb, Jim
Bennett, Dave Ross, Gayle Pergamit, and--especial-
ly--the late Phil Salin. Finally, thanks for valuable
discussions, sometimes brief, sometimes long, with
Vernor Vinge, David Friedman, Rudy Rucker, Dav-
id Chaum, Kevin Kelly, and Steven Levy.
13.References and Notes
1.The Cypherpunks group was mainly formed
by Eric Hughes, Tim May, and John Gilmore. It be-
gan both physical meetings, in the Bay Area and
elsewhere, and virtual meetings on an unmoderat-
ed mailing list. The name was provided by Judith
Milhon, as a play on the "cyberpunk" genre and the
British spelling of cipher. The mailing list can be
subscribed to by sending the single message sub-
scribe cypherpunks in the body of a message to major-
domo@toad.com. Expect at least 50 messages a day.
About 600 subscribers in many countries are pres-
ently on the list. Some are pseudonyms.
2. RSA Data Security Inc., Redwood Shores, Cal-
ifornia, is the license administrator. Contact them
for details.
3. Many crypto texts exist. A good introduction is
Bruce Schneier's Applied Cryptography, John Wiley
and Sons, 1994. This text includes pointers to many
other sources. The "Crypto" Proceedings (Advances
in Cryptology, Springer-Verlag, annually) are essen-
tial references. The annual Crypto conference in
Santa Barbara, and the Eurocrypt and Auscrypt
conferences, are where most crypto results are pre-
sented.
4.David Chaum, "Untraceable Electronic Mail,
Return Addresses, and Digital Pseudonyms,"
Comm. ACM 24, 2, February 1981, pp. 84-88.
Cypherpunks-style remailers are a form of
Chaum's "digital mixes," albeit far from ideal.
5.David Chaum, "Security without Identification:
Transaction Systems to make Big Brother Obso-
lete," Comm. ACM 28, 10, October 1985. This is an
early paper on digital cash...be sure to consult more
recent papers.
6.David Friedman, The Machinery of Freedom, 2nd
edition. A leading theoretician of anarcho-capital-
ism. (Hayek was another.)
7.Tim May, The Crypto Anarchist Manifesto, July
1988, distributed on the Usenet and on various
mailing lists.
8.The political opposition in Myan Mar--former-
ly Burma--is using Pretty Good Privacy running on
DOS laptops in the jungles for communications
amongst the rebels, according to Phil Zimmer-
mann, author of PGP. This life-and-death usage un-
derscores the role of crypto.
9.See Kevin Kelly's Out of Control, 1994, for a dis-
cussion of how central control is failing, and how
the modern paradigm is one of market mecha-
nisms, personal choice, and technological empow-
erment.
10.Robin Hanson and David Friedman have writ-
ten extensively about scenarios for dealing with the
threats of extortionists, would-be assassins, etc. I
am hoping some of their work gets published
someday. (Much of the discussion was in 1992-3, on
the "Extropians" mailing list.)
11.During the "Digital Telephony Bill" debate, an
FBI official said that failure to mandate wiretap ca-
pabilities within the next 18 months would make it
all moot, as the cost would rise beyond any reason-
able budget (currently $500 million for retrofit
costs).
12."Magic Money" was an experimental imple-
mentation of Chaum's digital cash system. It was
coded by "Pr0duct Cypher," a pseudonymous
member of the Cypherpunks list--none of us knows
his real identity, as he used remailers to communi-
cate with the list, and digitally signed his posts.
Many of us found it too difficult to use, which is
more a measure of the deep issues involved in us-
ing digital analogs (no pun intended) to real, phys-
ical money.
13.Abuse, according to some views, of remailers is
already occurring. A Cypherpunks-type remailer
was used to post a proprietary hash function of
RSA Data Security, Inc. to the Usenet. (Let me has-
ten to add that it was not a remailer I operate, or
have control over, etc.)
14.article on digital cash, The Economist, 26 No-
vember 1994. pp. 21-23.
15. article on digital cash, Steven Levy, Wired. De-
cember 1994.