HOME

TheInfoList



OR:

Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and
economic freedom Economic freedom, or economic liberty, is the ability of people of a society to take economic actions. This is a term used in economic and policy debates as well as in the philosophy of economics. One approach to economic freedom comes from the l ...
, the adherents of which use
cryptographic software Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over ...
for confidentiality and security while sending and receiving information over
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
s. In his 1988 "Crypto Anarchist Manifesto", Timothy C. May introduced the basic principles of crypto-anarchism, encrypted exchanges ensuring total anonymity, total freedom of speech, and total freedom to trade. In 1992, he read the text at the founding meeting of the cypherpunk movement.


Terminology

"Crypto-" comes from the
Ancient Greek Ancient Greek includes the forms of the Greek language used in ancient Greece and the ancient world from around 1500 BC to 300 BC. It is often roughly divided into the following periods: Mycenaean Greek (), Dark Ages (), the Archaic p ...
''κρυπτός'' kruptós, meaning "hidden" or "secret". This is a different use of the prefix than that employed in words like '
crypto-fascist Crypto-fascism is the secret support for, or admiration of, fascism or trends very closely related to the ideology. The term is used to imply that an individual or group keeps this support or admiration hidden to avoid political persecution or ...
' or '
crypto-Jew Crypto-Judaism is the secret adherence to Judaism while publicly professing to be of another faith; practitioners are referred to as "crypto-Jews" (origin from Greek ''kryptos'' – , 'hidden'). The term is especially applied historically to Sp ...
' where it indicates that the identity itself is concealed from the world; rather, many crypto-anarchists are open about their anarchism and promotion of tools based in
cryptology Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
.


Motives

One motive of crypto-anarchists is to defend against surveillance of computer networks communication. Crypto-anarchists try to protect against government mass surveillance, such as
PRISM Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary ...
, ECHELON,
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
,
telecommunications data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The differen ...
, the
NSA warrantless surveillance controversy The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
,
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its ...
, the FRA and so on. Crypto-anarchists consider the development and use of
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
to be the main defense against such problems.


Anonymous trading

Bitcoin is a currency generated and secured by peer-to-peer networked devices that maintain a communal record of all transactions within the system that can be used in a crypto-anarchic context. Adrian Chen, writing for ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid d ...
'', says the idea behind bitcoin can be traced to ''The Crypto Anarchist Manifesto''. Silk Road was an example of an illegal drug market on which bitcoin was the only accepted currency.
Assassination Market An assassination market is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they "guess" the date accurately. Thi ...
was a
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
-based darknet market operated by a self-described crypto-anarchist going by the pseudonym Kuwabatake Sanjuro. In ''The Cyphernomicon'', Timothy C. May suggests that crypto-anarchism qualifies as a form of anarcho-capitalism: Another quote in ''The Cyphernomicon'' defines crypto-anarchism. Under the title "What is Crypto Anarchy?", May writes:


See also

* Jim Bell — originator of the idea of assassination politics *
Cypherpunk A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal g ...
*
Technolibertarianism Technolibertarianism (sometimes referred to as cyberlibertarianism) is a political philosophy with roots in the Internet's early hacker cypherpunk culture in Silicon Valley in the early 1990s and in American libertarianism. The philosophy focuses ...


Notes

;Works cited *


Further reading

* * * {{Libertarianism, state=autocollapse Computer law Applications of cryptography