Crypto-anarchists
   HOME

TheInfoList



OR:

Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
,
political freedom Political freedom (also known as political autonomy or political agency) is a central concept in history and political thought and one of the most important features of democratic societies.Hannah Arendt, "What is Freedom?", ''Between Past and F ...
, and
economic freedom Economic freedom, or economic liberty, is the ability of people of a society to take economic actions. This is a term used in economic and policy debates as well as in the philosophy of economics. One approach to economic freedom comes from the l ...
, the adherents of which use
cryptographic software Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over t ...
for confidentiality and security while sending and receiving information over
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
s. In his 1988 "Crypto Anarchist Manifesto", Timothy C. May introduced the basic principles of crypto-anarchism, encrypted exchanges ensuring total
anonymity Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
, total
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recogni ...
, and total freedom to trade. In 1992, he read the text at the founding meeting of the cypherpunk movement.


Terminology

"Crypto-" comes from the
Ancient Greek Ancient Greek includes the forms of the Greek language used in ancient Greece and the ancient world from around 1500 BC to 300 BC. It is often roughly divided into the following periods: Mycenaean Greek (), Dark Ages (), the Archaic peri ...
''κρυπτός'' kruptós, meaning "hidden" or "secret". This is a different use of the prefix than that employed in words like '
crypto-fascist Crypto-fascism is the secret support for, or admiration of, fascism or trends very closely related to the ideology. The term is used to imply that an individual or group keeps this support or admiration hidden to avoid political persecution or ...
' or '
crypto-Jew Crypto-Judaism is the secret adherence to Judaism while publicly professing to be of another faith; practitioners are referred to as "crypto-Jews" (origin from Greek ''kryptos'' – , 'hidden'). The term is especially applied historically to Sp ...
' where it indicates that the identity itself is concealed from the world; rather, many crypto-anarchists are open about their anarchism and promotion of tools based in
cryptology Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
.


Motives

One motive of crypto-anarchists is to defend against
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
of computer networks communication. Crypto-anarchists try to protect against government
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
, such as
PRISM Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary ...
,
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
,
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
,
telecommunications data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different ...
, the
NSA warrantless surveillance controversy The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
,
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its ...
, the
FRA A friar is a member of one of the mendicant orders founded in the twelfth or thirteenth century; the term distinguishes the mendicants' itinerant apostolic character, exercised broadly under the jurisdiction of a superior general, from the ol ...
and so on. Crypto-anarchists consider the development and use of
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
to be the main defense against such problems.


Anonymous trading

Bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
is a currency generated and secured by peer-to-peer networked devices that maintain a communal record of all transactions within the system that can be used in a crypto-anarchic context. Adrian Chen, writing for ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'', says the idea behind bitcoin can be traced to ''The Crypto Anarchist Manifesto''.
Silk Road The Silk Road () was a network of Eurasian trade routes active from the second century BCE until the mid-15th century. Spanning over 6,400 kilometers (4,000 miles), it played a central role in facilitating economic, cultural, political, and reli ...
was an example of an illegal drug market on which bitcoin was the only accepted currency.
Assassination Market An assassination market is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they "guess" the date accurately. This ...
was a
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
-based
darknet market A darknet market is a commercial website on the dark web that operates via darknets such as Tor or I2P. They function primarily as black markets, selling or brokering transactions involving drugs, cyber-arms, weapons, counterfeit currency, stole ...
operated by a self-described crypto-anarchist going by the pseudonym Kuwabatake Sanjuro. In ''The Cyphernomicon'', Timothy C. May suggests that crypto-anarchism qualifies as a form of
anarcho-capitalism Anarcho-capitalism (or, colloquially, ancap) is an anti-statist, libertarian, and anti-political philosophy and economic theory that seeks to abolish centralized states in favor of stateless societies with systems of private property enforce ...
: Another quote in ''The Cyphernomicon'' defines crypto-anarchism. Under the title "What is Crypto Anarchy?", May writes:


See also

*
Jim Bell James Dalton Bell (born 1958) is an American crypto-anarchist who created the idea of arranging for anonymously sponsored assassination payments via the Internet, which he called "assassination politics". He was imprisoned on felony charges of ...
— originator of the idea of assassination politics *
Cypherpunk A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal g ...
*
Technolibertarianism Technolibertarianism (sometimes referred to as cyberlibertarianism) is a political philosophy with roots in the Internet's early hacker cypherpunk culture in Silicon Valley in the early 1990s and in American libertarianism. The philosophy focuses ...


Notes

;Works cited *


Further reading

* * * {{Libertarianism, state=autocollapse Computer law Applications of cryptography