Create 04-Goals-and-Ideology.md
Chapter 04 unformatted
This commit is contained in:
parent
8ef39d4bd4
commit
f18279c7f2
604
04-Goals-and-Ideology/04-Goals-and-Ideology.md
Normal file
604
04-Goals-and-Ideology/04-Goals-and-Ideology.md
Normal file
@ -0,0 +1,604 @@
|
||||
4. Goals and Ideology -- Privacy, Freedom, New Approaches
|
||||
|
||||
4.1. copyright
|
||||
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
|
||||
1994-09-10, Copyright Timothy C. May. All rights reserved.
|
||||
See the detailed disclaimer. Use short sections under "fair
|
||||
use" provisions, with appropriate credit, but don't put your
|
||||
name on my words.
|
||||
|
||||
4.2. SUMMARY: Goals and Ideology -- Privacy, Freedom, New Approaches
|
||||
4.2.1. Main Points
|
||||
4.2.2. Connections to Other Sections
|
||||
- Crypto Anarchy is the logical outgrowth of strong crypto.
|
||||
4.2.3. Where to Find Additional Information
|
||||
- Vernor Vinge's "True Names"
|
||||
- David Friedman's "Machinery of Freedom"
|
||||
4.2.4. Miscellaneous Comments
|
||||
- Most of the list members are libertarians, or leaning in
|
||||
that direction, so the bias toward this is apparent.
|
||||
- (If there's a coherent _non_-libertarian ideology, that's
|
||||
also consistent with supporting strong crypto, I'm not sure
|
||||
it's been presented.)
|
||||
|
||||
4.3. Why a Statement of Ideology?
|
||||
4.3.1. This is perhaps a controversial area. So why include it? The
|
||||
main reason is to provide some grounding for the later
|
||||
comments on many issues.
|
||||
4.3.2. People should not expect a uniform ideology on this list.
|
||||
Some of us are anarcho-capitalist radicals (or "crypto
|
||||
anarchists"), others of us are staid Republicans, and still
|
||||
others are Wobblies and other assored leftists.
|
||||
|
||||
4.4. "Welcome to Cypherpunks"
|
||||
4.4.1. This is the message each new subscriber to the Cypherpunks
|
||||
lists gets, by Eric Hughes:
|
||||
4.4.2. "Cypherpunks assume privacy is a good thing and wish there
|
||||
were more of it. Cypherpunks acknowledge that those who want
|
||||
privacy must create it for themselves and not expect
|
||||
governments, corporations, or other large, faceless
|
||||
organizations to grant them privacy out of beneficence.
|
||||
Cypherpunks know that people have been creating their own
|
||||
privacy for centuries with whispers, envelopes, closed doors,
|
||||
and couriers. Cypherpunks do not seek to prevent other
|
||||
people from speaking about their experiences or their
|
||||
opinions.
|
||||
|
||||
"The most important means to the defense of privacy is
|
||||
encryption. To encrypt is to indicate the desire for privacy.
|
||||
But to encrypt with weak cryptography is to indicate not too
|
||||
much desire for privacy. Cypherpunks hope that all people
|
||||
desiring privacy will learn how best to defend it.
|
||||
|
||||
"Cypherpunks are therefore devoted to cryptography.
|
||||
Cypherpunks wish to learn about it, to teach it, to implement
|
||||
it, and to make more of it. Cypherpunks know that
|
||||
cryptographic protocols make social structures. Cypherpunks
|
||||
know how to attack a system and how to defend it.
|
||||
Cypherpunks know just how hard it is to make good
|
||||
cryptosystems.
|
||||
|
||||
"Cypherpunks love to practice. They love to play with public
|
||||
key cryptography. They love to play with anonymous and
|
||||
pseudonymous mail forwarding and delivery. They love to play
|
||||
with DC-nets. They love to play with secure communications
|
||||
of all kinds.
|
||||
|
||||
"Cypherpunks write code. They know that someone has to write
|
||||
code to defend privacy, and since it's their privacy, they're
|
||||
going to write it. Cypherpunks publish their code so that
|
||||
their fellow cypherpunks may practice and play with it.
|
||||
Cypherpunks realize that security is not built in a day and
|
||||
are patient with incremental progress.
|
||||
|
||||
"Cypherpunks don't care if you don't like the software they
|
||||
write. Cypherpunks know that software can't be destroyed.
|
||||
Cypherpunks know that a widely dispersed system can't be shut
|
||||
down.
|
||||
|
||||
"Cypherpunks will make the networks safe for privacy." [Eric
|
||||
Hughes, 1993-07-21 version]
|
||||
|
||||
4.5. "Cypherpunks Write Code"
|
||||
4.5.1. "Cypherpunks write code" is almost our mantra.
|
||||
4.5.2. This has come to be a defining statement. Eric Hughes used it
|
||||
to mean that Cypherpunks place more importance in actually
|
||||
changing things, in actually getting working code out, than
|
||||
in merely talking about how things "ought" to be.
|
||||
- Eric Hughes statement needed here:
|
||||
- Karl Kleinpaste, author of one of the early anonymous
|
||||
posting services (Charcoal) said this about some proposal
|
||||
made: "If you've got serious plans for how to implement
|
||||
such a thing, please implement it at least skeletally and
|
||||
deploy it. Proof by example, watching such a system in
|
||||
action, is far better than pontification about it."
|
||||
[Karl_Kleinpaste@cs.cmu.edu, news.admin.policy, 1994-06-30]
|
||||
4.5.3. "The admonition, "Cypherpunks write code," should be taken
|
||||
metaphorically. I think "to write code" means to take
|
||||
unilateral effective action as an individual. That may mean
|
||||
writing actual code, but it could also mean dumpster diving
|
||||
at Mycrotronx and anonymously releasing the recovered
|
||||
information. It could also mean creating an offshore digital
|
||||
bank. Don't get too literal on us here. What is important
|
||||
is that Cypherpunks take personal responsibility for
|
||||
empowering themselves against threats to privacy." [Sandy
|
||||
Sandfort, 1994-07-08]
|
||||
4.5.4. A Cypherpunks outlook: taking the abstractions of academic
|
||||
conferences and making them concrete
|
||||
- One thing Eric Hughes and I discussed at length (for 3 days
|
||||
of nearly nonstop talk, in May, 1992) was the glacial rate
|
||||
of progress in converting the cryptographic primitive
|
||||
operations of the academic crypto conferences into actual,
|
||||
workable code. The basic RSA algorithm was by then barely
|
||||
available, more than 15 years after invention. (This was
|
||||
before PGP 2.0, and PGP 1.0 was barely available and was
|
||||
disappointing, with RSA Data Security's various products in
|
||||
limited niches.) All the neat stuff on digital cash, DC-
|
||||
Nets, bit commitment, olivioius transfer, digital mixes,
|
||||
and so on, was completely absent, in terms of avialable
|
||||
code or "crypto ICs" (to borrow Brad Cox's phrase). If it
|
||||
took 10-15 years for RSA to really appear in the real
|
||||
world, how long would it take some of the exciting stuff to
|
||||
get out?
|
||||
- We thought it would be a neat idea to find ways to reify
|
||||
these things, to get actual running code. As it happened,
|
||||
PGP 2.0 appeared the week of our very first meeting, and
|
||||
both the Kleinpaste/Julf and Cypherpunks remailers were
|
||||
quick, if incomplete, implementations of David Chaum's 1981
|
||||
"digital mixes." (Right on schedule, 11 years later.)
|
||||
- Sadly, most of the abstractions of cryptology remain
|
||||
residents of academic space, with no (available)
|
||||
implementations in the real world. (To be sure, I suspect
|
||||
many people have cobbled-together versions of many of these
|
||||
things, in C code, whatever. But their work is more like
|
||||
building sand castles, to be lost when they graduate or
|
||||
move on to other projects. This is of course not a problem
|
||||
unique to cryptology.)
|
||||
- Today, various toolkits and libraries are under
|
||||
development. Henry Strickland (Strick) is working on a
|
||||
toolkit based on John Ousterhout's "TCL" system (for Unix),
|
||||
and of course RSADSI provides RSAREF. Pr0duct Cypher has
|
||||
"PGP Tools." Other projects are underway. (My own longterm
|
||||
interest here is in building objects which act as the
|
||||
cryptography papers would have them act...building block
|
||||
objects. For this, I'm looking at Smalltalk of some
|
||||
flavor.)
|
||||
- It is still the case that most of the modern crypto papers
|
||||
discuss theoretical abstractions that are _not even close_
|
||||
to being implemented as reusable, robust objects or
|
||||
routines. Closing the gap between theoretical papers and
|
||||
practical realization is a major Cypherpunk emphasis.
|
||||
4.5.5. Prototypes, even if fatally flawed, allow for evolutionary
|
||||
learning and improvement. Think of it as engineering in
|
||||
action.
|
||||
|
||||
4.6. Technological empowerment
|
||||
4.6.1. (more needed here....)
|
||||
4.6.2. As Sandy Sandfort notes, "The real point of Cypherpunks is
|
||||
that it's better to use strong crypto than weak crypto or no
|
||||
crypto at all. Our use of crypto doesn't have to be totally
|
||||
bullet proof to be of value. Let *them* worry about the
|
||||
technicalities while we make sure they have to work harder
|
||||
and pay more for our encrypted info than they would if it
|
||||
were in plaintext." [S.S. 1994-07-01]
|
||||
|
||||
4.7. Free Speech Issues
|
||||
4.7.1. Speech
|
||||
- "Public speech is not a series of public speeches, but
|
||||
rather one's own
|
||||
words spoken openly and without shame....I desire a society
|
||||
where all may speak freely about whatever topic they will.
|
||||
I desire that all people might be able to choose to whom
|
||||
they wish to speak and to whom they do not wish to speak.
|
||||
I desire a society where all people may have an assurance
|
||||
that their words are directed only at those to whom they
|
||||
wish. Therefore I oppose all efforts by governments to
|
||||
eavesdrop and to become unwanted listeners." [Eric Hughes,
|
||||
1994-02-22]
|
||||
- "The government has no right to restrict my use of
|
||||
cryptography in any way. They may not forbid me to use
|
||||
whatever ciphers I may like, nor may they require me to use
|
||||
any that I do not like." [Eric Hughes, 1993-06-01]
|
||||
4.7.2. "Should there be _any_ limits whatsoever on a person's use of
|
||||
cryptography?"
|
||||
- No. Using the mathematics of cryptography is merely the
|
||||
manipulation of symbols. No crime is involved, ipso facto.
|
||||
- Also, as Eric Hughes has pointed out, this is another of
|
||||
those questions where the normative "should" or "shouldn't"
|
||||
invokes "the policeman inside." A better way to look at is
|
||||
to see what steps people can take to make any question of
|
||||
"should" this be allowed just moot.
|
||||
- The "crimes" are actual physical acts like murder and
|
||||
kidnapping. The fact that crypto may be used by plotters
|
||||
and planners, thus making detection more difficult, is in
|
||||
no way different from the possibility that plotters may
|
||||
speak in an unusual language to each other (ciphers), or
|
||||
meet in a private home (security), or speak in a soft voice
|
||||
when in public (steganography). None of these things should
|
||||
be illegal, and *none of them would be enforceable* except
|
||||
in the most rigid of police states (and probably not even
|
||||
there).
|
||||
- "Crypto is thoughtcrime" is the effect of restricting
|
||||
cryptography use.
|
||||
4.7.3. Democracy and censorship
|
||||
- Does a community have the right to decide what newsgroups
|
||||
or magazines it allows in its community? Does a nation have
|
||||
the right to do the same? (Tennessee, Iraq, Iran, France.
|
||||
Utah?)
|
||||
- This is what bypasses with crypto are all about: taking
|
||||
these majoritarian morality decisions out of the hands of
|
||||
the bluenoses. Direct action to secure freedoms.
|
||||
|
||||
4.8. Privacy Issues
|
||||
4.8.1. "Is there an agenda here beyond just ensuring privacy?"
|
||||
- Definitely! I think I can safely say that for nearly all
|
||||
political persuasions on the Cypherpunks list. Left, right,
|
||||
libertarian, or anarchist, there's much more to to strong
|
||||
crypto than simple privacy. Privacy qua privacy is fairly
|
||||
uninteresting. If all one wants is privacy, one can simply
|
||||
keep to one's self, stay off high-visibility lists like
|
||||
this, and generally stay out of trouble.
|
||||
- Many of us see strong crypto as the key enabling technology
|
||||
for a new economic and social system, a system which will
|
||||
develop as cyberspace becomes more important. A system
|
||||
which dispenses with national boundaries, which is based on
|
||||
voluntary (even if anonymous) free trade. At issue is the
|
||||
end of governments as we know them today. (Look at
|
||||
interactions on the Net--on this list, for example--and
|
||||
you'll see many so-called nationalities, voluntary
|
||||
interaction, and the almost complete absence of any "laws."
|
||||
Aside from their being almost no rules per se for the
|
||||
Cypherpunks list, there are essentially no national laws
|
||||
that are invokable in any way. This is a fast-growing
|
||||
trend.)
|
||||
+ Motivations for Cypherpunks
|
||||
- Privacy. If maintaining privacy is the main goal, there's
|
||||
not much more to say. Keep a low profile, protect data,
|
||||
avoid giving out personal information, limit the number
|
||||
of bank loans and credit applications, pay cash often,
|
||||
etc.
|
||||
- Privacy in activism.
|
||||
+ New Structures. Using cryptographic constructs to build
|
||||
new political, economic, and even social structures.
|
||||
- Political: Voting, polling, information access,
|
||||
whistleblowing
|
||||
- Economic: Free markets, information markets, increased
|
||||
liquidity, black markets
|
||||
- Social: Cyberspatial communities, True Names
|
||||
- Publically inspectable algorithms always win out over
|
||||
private, secret algorithms
|
||||
4.8.2. "What is the American attitude toward privacy and
|
||||
encryption?"
|
||||
+ There are two distinct (and perhaps simultaneously held)
|
||||
views that have long been found in the American psyche:
|
||||
- "A man's home is his castle." "Mind your own business."
|
||||
The frontier and Calvinist sprit of keeping one's
|
||||
business to one's self.
|
||||
- "What have you got to hide?" The nosiness of busybodies,
|
||||
gossiping about what others are doing, and being
|
||||
suspicious of those who try too hard to hide what they
|
||||
are doing.
|
||||
+ The American attitude currently seems to favor privacy over
|
||||
police powers, as evidenced by a Time-CNN poll:
|
||||
- "In a Time/CNN poll of 1,000 Americans conducted last
|
||||
week by Yankelovich Partners, two-thirds said it was more
|
||||
important to protect the privacy of phone calls than to
|
||||
preserve the ability of police to conduct wiretaps. When
|
||||
informed about the Clipper Chip, 80% said they opposed
|
||||
it." [Philip Elmer-Dewitt, "Who Should Keep the Keys,"
|
||||
_TIME_, 1994-03-04.]
|
||||
- The answer given is clearly a function of how the question
|
||||
is phrased. Ask folks if they favor "unbreakable
|
||||
encryption" or "fortress capabilities" for terrorists,
|
||||
pedophiles, and other malefactors, and they'll likely give
|
||||
a quite different answer. It is this tack now being taken
|
||||
by the Clipper folks. Watch out for this!
|
||||
- Me, I have no doubts.
|
||||
- As Perry Metzger puts it, "I find the recent disclosures
|
||||
concerning U.S. Government testing of the effects of
|
||||
radiation on unknowing human subjects to be yet more
|
||||
evidence that you simply cannot trust the government with
|
||||
your own personal safety. Some people, given positions of
|
||||
power, will naturally abuse those positions, often even if
|
||||
such abuse could cause severe injury or death. I see little
|
||||
reason, therefore, to simply "trust" the U.S. government --
|
||||
and given that the U.S. government is about as good as they
|
||||
get, its obvious that NO government deserves the blind
|
||||
trust of its citizens. "Trust us, we will protect you"
|
||||
rings quite hollow in the face of historical evidence.
|
||||
Citizens must protect and preserve their own privacy -- the
|
||||
government and its centralized cryptographic schemes
|
||||
emphatically cannot be trusted." [P.M., 1994-01-01]
|
||||
4.8.3. "How is 1994 like 1984?"
|
||||
- The television ad for Clipper: "Clipper--why 1994 _will_ be
|
||||
like 1984"
|
||||
+ As Mike Ingle puts it:
|
||||
- 1994: Wiretapping is privacy
|
||||
Secrecy is openness
|
||||
Obscurity is security
|
||||
4.8.4. "We anticipate that computer networks will play a more and
|
||||
more important role in many parts of our lives. But this
|
||||
increased computerization brings tremendous dangers for
|
||||
infringing privacy. Cypherpunks seek to put into place
|
||||
structures which will allow people to preserve their privacy
|
||||
if they choose. No one will be forced to use pseudonyms or
|
||||
post anonymously. But it should be a matter of choice how
|
||||
much information a person chooses to reveal about himself
|
||||
when he communicates. Right now, the nets don't give you
|
||||
that much choice. We are trying to give this power to
|
||||
people." [Hal Finney, 1993-02-23]
|
||||
4.8.5. "If cypherpunks contribute nothing else we can create a real
|
||||
privacy advocacy group, advocating means of real self-
|
||||
empowerment, from crypto to nom de guerre credit cards,
|
||||
instead of advocating further invasions of our privacy as the
|
||||
so-called privacy advocates are now doing!" [Jim Hart, 1994-
|
||||
09-08]
|
||||
|
||||
4.9. Education Issues
|
||||
4.9.1. "How can we get more people to use crypto?"
|
||||
- telling them about the themes of Cypherpunks
|
||||
- surveillance, wiretapping, Digital Telephony, Clipper, NSA,
|
||||
FinCEN, etc....these things tend to scare a lot of folks
|
||||
- making PGP easier to use, better integration with mailers,
|
||||
etc.
|
||||
- (To be frank, convincing others to protect themselves is
|
||||
not one of my highest priorities. Then why have I written
|
||||
this megabyte-plus FAQ? Good question. Getting more users
|
||||
is a general win, for obvious reasons.)
|
||||
4.9.2. "Who needs to encrypt?"
|
||||
+ Corporations
|
||||
- competitors...fax transmissions
|
||||
+ foreign governments
|
||||
- Chobetsu, GCHQ, SDECE, Mossad, KGB
|
||||
+ their own government
|
||||
- NSA intercepts of plans, investments
|
||||
+ Activist Groups
|
||||
- Aryan Nation needs to encrypt, as FBI has announced their
|
||||
intent to infiltrate and subvert this group
|
||||
- RU-486 networks
|
||||
- Amnesty International
|
||||
+ Terrorists and Drug Dealers
|
||||
- clearly are clueless at times (Pablo Escobar using a
|
||||
cellphone!)
|
||||
- Triads, Russian Mafia, many are becoming crypto-literate
|
||||
- (I've been appoached-'nuff said)
|
||||
+ Doctors, lawyers, psychiatrists, etc.
|
||||
- to preserve records against theft, snooping, casual
|
||||
examination, etc.
|
||||
- in many cases, a legal obligation has been attached to
|
||||
this (notably, medical records)
|
||||
- the curious situation that many people are essentially
|
||||
_required_ to encrypt (no other way to ensure standards
|
||||
are met) and yet various laws exists to limit
|
||||
encryption...ITAR, Clipper, EES
|
||||
- (Clipper is a partial answer, if unsatisfactory)
|
||||
4.9.3. "When should crypto be used?"
|
||||
- It's an economic matter. Each person has to decide when to
|
||||
use it, and how. Me, I dislike having to download messages
|
||||
to my home machine before I can read them. Others use it
|
||||
routinely.
|
||||
|
||||
4.10. Libertarian Issues
|
||||
4.10.1. A technological approach to freedom and privacy:
|
||||
- "Freedom is, practically, given as much (or more) by the
|
||||
tools we can build to protect it, as it is by our ability
|
||||
to convince others who violently disagree with us not to
|
||||
attack us. On the Internet we have tools like anon
|
||||
remailers and PGP that give us a great deal of freedom
|
||||
from coercion even in the midst of censors. Thus, these
|
||||
tools piss off fans of centralized information control, the
|
||||
defenders of the status quo, like nothing else on the
|
||||
Internet." [<an50@desert.hacktic.nl> (Nobody), libtech-
|
||||
l@netcom.com, 1994-06-08]
|
||||
+ Duncan Frissell, as usual, put it cogently:
|
||||
- "If I withhold my capital from some country or enterprise
|
||||
I am not threatening to kill anyone. When a "Democratic
|
||||
State" decides to do something, it does so with armed
|
||||
men. If you don't obey, they tend to shoot....[I]f
|
||||
technological change enhances the powers of individuals,
|
||||
their power is enhanced no matter what the government
|
||||
does.
|
||||
|
||||
"If the collective is weakened and the individual
|
||||
strengthened by the fact that I have the power of cheap
|
||||
guns, cars, computers, telecoms, and crypto then the
|
||||
collective has been weakened and we should ease the
|
||||
transition to a society based on voluntary rather than
|
||||
coerced interaction.
|
||||
|
||||
"Unless you can figure out a new, improved way of
|
||||
controlling others; you have no choice." [D.F., Decline
|
||||
and Fall, 1994-06-19]
|
||||
4.10.2. "They that can give up essential liberty to obtain a little
|
||||
temporary safety deserve neither liberty nor safety."
|
||||
[Benjamin Franklin]
|
||||
4.10.3. a typical view of government
|
||||
- "As I see it, it's always a home for bullies masquerading
|
||||
as a collective defense. Sometimes it actually it actually
|
||||
has to perform its advertised defense function. Like naked
|
||||
quarks,
|
||||
purely defensive governments cannot exist. They are
|
||||
bipolar by nature, with some poles (i.e., the bullying
|
||||
part) being "more equal than others." [Sandy Sandfort, 1994-
|
||||
09-06]
|
||||
4.10.4. Sadly, several of our speculative scenarios for various laws
|
||||
have come to pass. Even several of my own, such as:
|
||||
- "(Yet Another May Prediction Realized)...The text of a
|
||||
"digital stalking bill" was just sent to Cyberia-l." [L.
|
||||
Todd Masco, 1994-08-31] (This was a joking prediction I
|
||||
made that "digital stalking" would soon be a crime; there
|
||||
had been news articles about the horrors of such
|
||||
cyberspatial stalkings, regardless of there being no real
|
||||
physical threats, so this move is not all that surprising.
|
||||
Not surprising in an age when free speech gets outlawed as
|
||||
"assault speech.")
|
||||
4.10.5. "Don't tread on me."
|
||||
4.10.6. However, it's easy to get too negative on the situation, to
|
||||
assume that a socialist state is right around the corner. Or
|
||||
that a new Hitler will come to power. These are unlikely
|
||||
developments, and not only because of strong crypto.
|
||||
Financial markets are putting constraints on how fascist a
|
||||
government can get...the international bond markets, for
|
||||
example, will quickly react to signs like this. (This is the
|
||||
theory, at least.)
|
||||
4.10.7. Locality of reference, cash, TANSTAAFL, privacy
|
||||
- closure, local computation, local benefits
|
||||
- no accounting system needed
|
||||
- markets clear
|
||||
- market distortions like rationing, coupons, quotas, all
|
||||
require centralized record-keeping
|
||||
- anything that ties economic transactions to identity
|
||||
(rationing, entitlements, insurance) implies identity-
|
||||
tracking, credentials, etc.
|
||||
+ Nonlocality also dramatically increases the opportunities
|
||||
for fraud, for scams and con jobs
|
||||
- because something is being promised for future delivery
|
||||
(the essence of many scams) and is not verifiable locally
|
||||
- because "trust" is invoked
|
||||
- Locality also fixes the "policeman inside" problem: the
|
||||
costs of decisions are borne by the decider, not by others.
|
||||
|
||||
4.11. Crypto Anarchy
|
||||
4.11.1. The Crypto Anarchy Principle: Strong crypto permits
|
||||
unbreakable encrypion, unforgeable signatures, untraceable
|
||||
electronic messages, and unlinkable pseudonomous identities.
|
||||
This ensures that some transactions and communications can be
|
||||
entered into only voluntarily. External force, law, and
|
||||
regulation cannot be applied. This is "anarchy," in the sense
|
||||
of no outside rulers and laws. Voluntary arrangements, back-
|
||||
stopped by voluntarily-arranged institutions like escrow
|
||||
services, will be the only form of rule. This is "crypto
|
||||
anarchy."
|
||||
4.11.2. crypto allows a return to contracts that governments cannot
|
||||
breach
|
||||
- based on reputation, repeat business
|
||||
- example: ordering illegal material untraceably and
|
||||
anonymously,,,governments are powerless to do anything
|
||||
- private spaces, with the privacy enforced via cryptographic
|
||||
permissions (access credentials)
|
||||
- escrows (bonds)
|
||||
4.11.3. Technological solutions over legalistic regulations
|
||||
+ Marc Ringuette summarized things nicely:
|
||||
- "What we're after is some "community standards" for
|
||||
cyberspace, and what I'm suggesting is the fairly
|
||||
libertarian standard that goes like this:
|
||||
|
||||
" Prefer technological solutions and self-protection
|
||||
solutions
|
||||
over rule-making, where they are feasible.
|
||||
|
||||
"This is based on the notion that the more rules there
|
||||
are, the more people will call for the "net police" to
|
||||
enforce them. If we can encourage community standards
|
||||
which emphasize a prudent level of self-protection, then
|
||||
we'll be able to make do with fewer rules and a less
|
||||
intrusive level of policing."[Marc Ringuette, 1993-03-14]
|
||||
+ Hal Finney has made cogent arguments as to why we should
|
||||
not become too complacent about the role of technology vis-
|
||||
a-vis politics. He warns us not to grow to confident:
|
||||
- "Fundamentally, I believe we will have the kind of
|
||||
society that most people want. If we want freedom and
|
||||
privacy, we must persuade others that these are worth
|
||||
having. There are no shortcuts. Withdrawing into
|
||||
technology is like pulling the blankets over your head.
|
||||
It feels good for a while, until reality catches up. The
|
||||
next Clipper or Digital Telephony proposal will provide a
|
||||
rude awakening." [Hal Finney, POLI: Politics vs
|
||||
Technology, 1994-01-02]
|
||||
- "The idea here is that the ultimate solution to the low
|
||||
signal-to-noise ratio on the nets is not a matter of
|
||||
forcing people to "stand behind their words". People can
|
||||
stand behind all kinds of idiotic ideas. Rather, there
|
||||
will need to be developed better systems for filtering news
|
||||
and mail, for developing "digital reputations" which can be
|
||||
stamped on one's postings to pass through these smart
|
||||
filters, and even applying these reputations to pseudonyms.
|
||||
In such a system, the fact that someone is posting or
|
||||
mailing pseudonymously is not a problem, since nuisance
|
||||
posters won't be able to get through." [Hal Finney, 1993-
|
||||
02-23]
|
||||
4.11.4. Reputations
|
||||
4.11.5. I have a moral outlook that many will find unacceptable or
|
||||
repugnant. To cut to the chase: I support the killing of
|
||||
those who break contracts, who steal in serious enough ways,
|
||||
and who otherwise commit what I think of as crimes.
|
||||
+ I don't mean this abstractly. Here's an example:
|
||||
- Someone is carrying drugs. He knows what he's involved
|
||||
in. He knows that theft is punishable by death. And yet
|
||||
he steals some of the merchandise.
|
||||
- Dealers understand that they cannot tolerate this, that
|
||||
an example must be made, else all of their employees will
|
||||
steal.
|
||||
- Understand that I'm not talking about the state doing the
|
||||
killing, nor would I do the killing. I'm just saying such
|
||||
things are the natural enforcement mechanism for such
|
||||
markets. Realpolitik.
|
||||
- (A meta point: the drug laws makes things this way.
|
||||
Legalize all drugs and the businesses would be more like
|
||||
"ordinary" businesses.)
|
||||
- In my highly personal opinion, many people, including most
|
||||
Congressrodents, have committed crimes that earn them the
|
||||
death penalty; I will not be sorry to see anonymous
|
||||
assassination markets used to deal with them.
|
||||
4.11.6. Increased espionage will help to destroy nation-state-empires
|
||||
like the U.S., which has gotten far too bloated and far too
|
||||
dependent on throwing its weight around; nuclear "terrorism"
|
||||
may knock out a few cities, but this may be a small price to
|
||||
pay to undermine totally the socialist welfare states that
|
||||
have launched so many wars this century.
|
||||
|
||||
4.12. Loose Ends
|
||||
4.12.1. "Why take a "no compromise" stance?"
|
||||
- Compromise often ends up in the death of a thousand cuts.
|
||||
Better to just take a rejectionist stance.
|
||||
- The National Rifle Association (NRA) learned this lesson
|
||||
the hard way. EFF may eventually learn it; right now they
|
||||
appear to be in the "coopted by the power center" mode,
|
||||
luxuriating in their inside-the-Beltway access to the Veep,
|
||||
their flights on Air Force One, and their general
|
||||
schmoozing with the movers and shakers...getting along by
|
||||
going along.
|
||||
- Let's not compromise on basic issues. Treat censorship as a
|
||||
problem to be routed around (as John Gilmore suggests), not
|
||||
as something that needs to be compromised on. (This is
|
||||
directed at rumblings about how the Net needs to "police
|
||||
itself," by the "reasonable" censorship of offensive posts,
|
||||
by the "moderation" of newsgroups, etc. What should concern
|
||||
us is the accomodation of this view by well-meaning civil
|
||||
liberties groups, which are apparently willing to play a
|
||||
role in this "self-policing" system. No thanks.)
|
||||
- (And since people often misunderstand this point, I'm not
|
||||
saying private companies can't set whatever policies they
|
||||
wish, that moderated newsgroups can't be formed, etc.
|
||||
Private arrangements are just that. The issue is when
|
||||
censorship is forced on those who have no other
|
||||
obligations. Government usually does this, often aided and
|
||||
abetted by corporations and lobbying groups. This is what
|
||||
we need to fight. Fight by routing around, via technology.)
|
||||
4.12.2. The inherent evils of democracy
|
||||
- To be blunt about it, I've come to despise the modern
|
||||
version of democracy we have. Every issue is framed in
|
||||
terms of popular sentiment, in terms of how the public
|
||||
would vote. Mob rule at its worst.
|
||||
- Should people be allowed to wear blue jeans? Put it to a
|
||||
vote. Can employers have a policy on blue jeans? Pass a
|
||||
law. Should health care be provided to all? Put it to a
|
||||
vote. And so on, whittling away basic freedoms and rights.
|
||||
A travesty. The tyranny of the majority.
|
||||
- De Toqueville warned of this when he said that the American
|
||||
experiment in democracy would last only until citizens
|
||||
discovered they could pick the pockets of their neighbors
|
||||
at the ballot box.
|
||||
- But maybe we can stop this nonsense. I support strong
|
||||
crypto (and its eventual form, crypto anarchy) because it
|
||||
undermines this form of democracy. It takes some (and
|
||||
perhaps many) transactions out of the realm of popularity
|
||||
contests, beyond the reach of will of the herd. (No, I am
|
||||
not arguing there will be a complete phase change. As the
|
||||
saying goes, "You can't eat cyberspace." But a lot of
|
||||
consulting, technical work, programming, etc., can in fact
|
||||
be done with crypto anarchic methods, with the money gained
|
||||
transferred in a variety of ways into the "real world."
|
||||
More on this elsewhere.)
|
||||
+ Crypto anarchy effectively allows people to pick and choose
|
||||
which laws they support, at least in cyberspatial contexts.
|
||||
It empowers people to break the local bonds of their
|
||||
majoritarian normative systems and decide for themselves
|
||||
which laws are moral and which are bullshit.
|
||||
- I happen to have faith that most people will settle on a
|
||||
relatively small number of laws that they'll (mostly)
|
||||
support, a kind of Schelling point in legal space.
|
||||
4.12.3. "Is the Cypherpunks agenda _too extreme_?"
|
||||
- Bear in mind that most of the "Cypherpunks agenda," to the
|
||||
extent we can identify it, is likely to provoke ordinary
|
||||
citizens into _outrage_. Talk of anonymous mail, digital
|
||||
money, money laundering, information markets, data havens,
|
||||
undermining authority, transnationalism, and all the rest
|
||||
(insert your favorite idea) is not exactly mainstream.
|
||||
4.12.4. "Crypto Anarchy sounds too wild for me."
|
||||
- I accept that many people will find the implications of
|
||||
crypto anarchy (which follows in turn from the existence of
|
||||
strong cryptography, via the Crypto Anarchy Principle) to
|
||||
be more than they can accept.
|
||||
- This is OK (not that you need my OK!). The house of
|
||||
Cypherpunks has many rooms.
|
Loading…
Reference in New Issue
Block a user