HOME

TheInfoList



OR:

Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
,
political freedom Political freedom (also known as political autonomy or political agency) is a central concept in history and political thought and one of the most important features of democratic societies.Hannah Arendt, "What is Freedom?", ''Between Past and F ...
, and
economic freedom Economic freedom, or economic liberty, is the ability of people of a society to take economic actions. This is a term used in economic and policy debates as well as in the philosophy of economics. One approach to economic freedom comes from the l ...
, the adherents of which use
cryptographic software Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over t ...
for confidentiality and security while sending and receiving information over
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
s. In his 1988 "Crypto Anarchist Manifesto", Timothy C. May introduced the basic principles of crypto-anarchism, encrypted exchanges ensuring total
anonymity Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
, total
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recogni ...
, and total freedom to trade. In 1992, he read the text at the founding meeting of the cypherpunk movement.


Terminology

"Crypto-" comes from the
Ancient Greek Ancient Greek includes the forms of the Greek language used in ancient Greece and the ancient world from around 1500 BC to 300 BC. It is often roughly divided into the following periods: Mycenaean Greek (), Dark Ages (), the Archaic pe ...
''κρυπτός'' kruptós, meaning "hidden" or "secret". This is a different use of the prefix than that employed in words like ' crypto-fascist' or '
crypto-Jew Crypto-Judaism is the secret adherence to Judaism while publicly professing to be of another faith; practitioners are referred to as "crypto-Jews" (origin from Greek ''kryptos'' – , 'hidden'). The term is especially applied historically to Sp ...
' where it indicates that the identity itself is concealed from the world; rather, many crypto-anarchists are open about their anarchism and promotion of tools based in cryptology.


Motives

One motive of crypto-anarchists is to defend against
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
of computer networks communication. Crypto-anarchists try to protect against government
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
, such as PRISM,
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
, Tempora,
telecommunications data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The differen ...
, the
NSA warrantless surveillance controversy The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
, Room 641A, the
FRA A friar is a member of one of the mendicant orders founded in the twelfth or thirteenth century; the term distinguishes the mendicants' itinerant apostolic character, exercised broadly under the jurisdiction of a superior general, from the o ...
and so on. Crypto-anarchists consider the development and use of
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
to be the main defense against such problems.


Anonymous trading

Bitcoin Bitcoin (abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
is a currency generated and secured by peer-to-peer networked devices that maintain a communal record of all transactions within the system that can be used in a crypto-anarchic context. Adrian Chen, writing for ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'', says the idea behind bitcoin can be traced to ''The Crypto Anarchist Manifesto''.
Silk Road The Silk Road () was a network of Eurasian trade routes active from the second century BCE until the mid-15th century. Spanning over 6,400 kilometers (4,000 miles), it played a central role in facilitating economic, cultural, political, and rel ...
was an example of an illegal drug market on which bitcoin was the only accepted currency. Assassination Market was a Tor-based
darknet market A darknet market is a commercial website on the dark web that operates via darknets such as Tor or I2P. They function primarily as black markets, selling or brokering transactions involving drugs, cyber-arms, weapons, counterfeit currency, sto ...
operated by a self-described crypto-anarchist going by the pseudonym Kuwabatake Sanjuro. In ''The Cyphernomicon'', Timothy C. May suggests that crypto-anarchism qualifies as a form of
anarcho-capitalism Anarcho-capitalism (or, colloquially, ancap) is an anti-statist, libertarian, and anti-political philosophy and economic theory that seeks to abolish centralized states in favor of stateless societies with systems of private property en ...
: Another quote in ''The Cyphernomicon'' defines crypto-anarchism. Under the title "What is Crypto Anarchy?", May writes:


See also

*
Jim Bell James Dalton Bell (born 1958) is an American crypto-anarchist who created the idea of arranging for anonymously sponsored assassination payments via the Internet, which he called "assassination politics". He was imprisoned on felony charges of ...
— originator of the idea of assassination politics *
Cypherpunk A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal g ...
* Technolibertarianism


Notes

;Works cited *


Further reading

* * * {{Libertarianism, state=autocollapse Computer law Applications of cryptography