Create 03-Cypherpunks.md
Chapter 03 unformatted
This commit is contained in:
parent
41cb15360b
commit
f53d7e9493
603
03-Cypherpunks/03-Cypherpunks.md
Normal file
603
03-Cypherpunks/03-Cypherpunks.md
Normal file
@ -0,0 +1,603 @@
|
|||||||
|
3. Cypherpunks -- History, Organization, Agenda
|
||||||
|
|
||||||
|
3.1. copyright
|
||||||
|
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
|
||||||
|
1994-09-10, Copyright Timothy C. May. All rights reserved.
|
||||||
|
See the detailed disclaimer. Use short sections under "fair
|
||||||
|
use" provisions, with appropriate credit, but don't put your
|
||||||
|
name on my words.
|
||||||
|
|
||||||
|
3.2. SUMMARY: Cypherpunks -- History, Organization, Agenda
|
||||||
|
3.2.1. Main Points
|
||||||
|
- Cypherpunks formed in September, 1992
|
||||||
|
- formed at an opportune time, with PGP 2.0, Clipper, etc.
|
||||||
|
hitting
|
||||||
|
- early successes: Cypherpunks remailers, publicity
|
||||||
|
3.2.2. Connections to Other Sections
|
||||||
|
3.2.3. Where to Find Additional Information
|
||||||
|
- "Wired," issue 1.2, had a cover story on Cypherpunks.
|
||||||
|
- "Whole Earth Review," Summer 1993, had a long article on
|
||||||
|
crypto and Cypherpunks (included in the book "Out of
|
||||||
|
Control," by Kevin Kelly.
|
||||||
|
- "Village Voice," August 6th (?). 1993, had cover story on
|
||||||
|
"Crypto Rebels" (also reprinted in local weeklies)
|
||||||
|
- and numerous articles in various magazines
|
||||||
|
3.2.4. Miscellaneous Comments
|
||||||
|
- the best way to get a feel for the List is to simply read
|
||||||
|
it for a while; a few months should do.
|
||||||
|
|
||||||
|
3.3. The Cypherpunks Group and List
|
||||||
|
3.3.1. What is it?
|
||||||
|
+ Formal Rules, Charter, etc.?
|
||||||
|
- no formal rules or charter
|
||||||
|
- no agreed-upon mission
|
||||||
|
3.3.2. "Who are the Cypherpunks?"
|
||||||
|
- A mix of about 500-700
|
||||||
|
+ Can find out who by sending message to majordomo@toad.com
|
||||||
|
with the message body text "who cypherpunks" (no quotes, of
|
||||||
|
course).
|
||||||
|
- Is this a privacy flaw? Maybe.
|
||||||
|
- Lots of students (they have the time, the Internet
|
||||||
|
accounts). Lots of computer science/programming folks. Lots
|
||||||
|
of libertarians.
|
||||||
|
- quote from Wired article, and from "Whole Earth Review"
|
||||||
|
3.3.3. "How did the Cypherpunks group get started?"
|
||||||
|
+ History?
|
||||||
|
- Discussions between Eric Hughes and me, led to Eric's
|
||||||
|
decision to host a gathering
|
||||||
|
+ First meeting was, by coincidence, the same week that PGP
|
||||||
|
2.0 was released...we all got copies that day
|
||||||
|
- morning session on basics
|
||||||
|
- sitting on the floor
|
||||||
|
+ afternoon we played the "Crypto Game"
|
||||||
|
- remailers, digital money, information for sale, etc.
|
||||||
|
- John Gilmore offered his site to host a mailing list, and
|
||||||
|
his company's offices to hold monthly meetings
|
||||||
|
- The mailing list began almost immediately
|
||||||
|
- The Name "Cypherpunks"?
|
||||||
|
3.3.4. "Should I join the Cypherpunks mailing list?"
|
||||||
|
- If you are reading this, of course, you are most likely on
|
||||||
|
the Cypherpunks list already and this point is moot--you
|
||||||
|
may instead be asking if you should_leave_ the List!
|
||||||
|
- Only if you are prepared to handle 30-60 messages a day,
|
||||||
|
with volumes fluctuating wildly
|
||||||
|
3.3.5. "How can I join the Cypherpunk mailing list?"
|
||||||
|
- send message to "majordomo@toad.com" with a _body_ text of
|
||||||
|
"subscribe cypherpunks" (no quote marks in either, of
|
||||||
|
course).
|
||||||
|
3.3.6. "Membership?"
|
||||||
|
- about 500-700 at any given time
|
||||||
|
- many folks join, are overwhelmed, and quit
|
||||||
|
- other groups: Austin, Colorado, Boston, U.K.
|
||||||
|
3.3.7. "Why are there so many libertarians on the Cypherpunks list?"
|
||||||
|
+ The same question is often asked about the Net in general.
|
||||||
|
Lots of suggested reasons:
|
||||||
|
- A list like Cypherpunks is going to have privacy and
|
||||||
|
freedom advocates. Not all privacy advocates are
|
||||||
|
libertarians (e.g., they may want laws restricting data
|
||||||
|
collection), but many are. And libertarians naturally
|
||||||
|
gravitate to causes like ours.
|
||||||
|
- Net grew anarchically, with little control. This appeals
|
||||||
|
to free-wheeling types, used to making their own choices
|
||||||
|
and building their own worlds.
|
||||||
|
- Libertarians are skeptical of central control structures,
|
||||||
|
as are most computer programming types. They are
|
||||||
|
skeptical that a centrally-run control system can
|
||||||
|
coordinate the needs and desires of people. (They are of
|
||||||
|
course more than just "skeptical" about this.)
|
||||||
|
- In any case, there's not much of a coherent "opposition
|
||||||
|
camp" to the anarcho-capitalist, libertarian ideology.
|
||||||
|
Forgive me for saying this, my non-libertarian friends on
|
||||||
|
the list, but most non-libertarian ideologies I've seen
|
||||||
|
expressed on the list have been fragmentary, isolated, and
|
||||||
|
not coherent...comments about "how do we take care of the
|
||||||
|
poor?" and Christian fundamentalism, for example. If there
|
||||||
|
is a coherent alternative to a basically libertarian
|
||||||
|
viewpoint, we haven't seen it on the list.
|
||||||
|
- (Of course, some might say that the libertarians outshout
|
||||||
|
the alternatives...I don't think this is really so.)
|
||||||
|
3.3.8. "How did the mailing list get started?"
|
||||||
|
- Hugh Daniel, Eric Hughes, and I discussed this the day
|
||||||
|
after the first meeting
|
||||||
|
- mailing list brought together diverse interests
|
||||||
|
- How to hoin?
|
||||||
|
3.3.9. "How did Cypherpunks get so much early publicity?"
|
||||||
|
- started at the right time, just as PGP was gaining
|
||||||
|
popularity, as plans for key escrow were being laid (I
|
||||||
|
sounded an alarm in October, 1992, six months before the
|
||||||
|
Clipper announcement), and just as "Wired" was preparing
|
||||||
|
its first issue
|
||||||
|
- Kevin Kelly and Steven Levy attended some of our early
|
||||||
|
meetings, setting the stage for very favorable major
|
||||||
|
stories in "Wired" (issue 1.2, the cover story), and "Whole
|
||||||
|
Earth Review" (Summer, 1993)
|
||||||
|
- a niche for a "renegade" and "monkey-wrenching" group, with
|
||||||
|
less of a Washington focus
|
||||||
|
- publicity in "Wired," "The Whole Earth Review," "The
|
||||||
|
Village Voice"
|
||||||
|
+ Clipper bombshell occupied much of our time, with some
|
||||||
|
effect on policy
|
||||||
|
- climate of repudiation
|
||||||
|
- links to EFF, CPSR, etc.
|
||||||
|
3.3.10. "Why the name?"
|
||||||
|
- Jude Milhon nicknames us
|
||||||
|
- cypherpunkts? (by analogy with Mikropunkts, microdots)
|
||||||
|
3.3.11. "What were the early meetings like?"
|
||||||
|
- cypherspiel, Crypto Anarchy Game
|
||||||
|
3.3.12. "Where are places that I can meet other Cypherpunks?"
|
||||||
|
- physical meetings
|
||||||
|
- start your own...pizza place, classroom
|
||||||
|
+ other organizations
|
||||||
|
-
|
||||||
|
+ "These kind of meetings (DC 2600 meeting at Pentagon City
|
||||||
|
Mall, 1st Fri. of
|
||||||
|
- every month in the food court, about 5-7pm or so) might
|
||||||
|
be good places for
|
||||||
|
- local cypherpunks gatherings as well. I'm sure there
|
||||||
|
are a lot of other
|
||||||
|
- such meetings, but the DC and Baltimore ones are the
|
||||||
|
ones I know of. <Stanton McCandlish, 7 April 1994>
|
||||||
|
- (note that the DC area already meets...)
|
||||||
|
- Hackers, raves
|
||||||
|
- regional meetings
|
||||||
|
3.3.13. "Is the Cypherpunks list monitored? Has it been infiltrated?"
|
||||||
|
- Unknown. It wouldn't be hard for anyone to be monitoring
|
||||||
|
the list.
|
||||||
|
- As to infiltration, no evidence for this. No suspicious
|
||||||
|
folks showing up at the physical meetings, at least so far
|
||||||
|
as I can see. (Not a very reliable indication.)
|
||||||
|
3.3.14. "Why isn't there a recruiting program to increase the number
|
||||||
|
of Cypherpunks?"
|
||||||
|
- Good question. The mailing list reached about 500
|
||||||
|
subscribers a year or so ago and has remained relatively
|
||||||
|
constant since then; many subscribers learned of the list
|
||||||
|
and its address in the various articles that appeared.
|
||||||
|
- Informal organizations often level out in membership
|
||||||
|
because no staff exists to publicize, recruit, etc. And
|
||||||
|
size is limited because a larger group loses focus. So,
|
||||||
|
some stasis is achieved. For us, it may be at the 400-700
|
||||||
|
level. It seems unlikely that list membership would ever
|
||||||
|
get into the tens of thousands.
|
||||||
|
3.3.15. "Why have there been few real achievements in crypto
|
||||||
|
recently?"
|
||||||
|
+ Despite the crush of crypto releases--the WinPGPs,
|
||||||
|
SecureDrives, and dozen other such programs--the fact is
|
||||||
|
that most of these are straightforward variants on what I
|
||||||
|
think have been the two major product classes to be
|
||||||
|
introduced in the last several years"
|
||||||
|
- PGP, and variants.
|
||||||
|
- Remailers, and variants.
|
||||||
|
- These two main classes account for about 98% of all product-
|
||||||
|
or version-oriented debate on the Net, epitomized by the
|
||||||
|
zillions of "Where can I find PGP2.6ui for the Amiga?"
|
||||||
|
sorts of posts.
|
||||||
|
+ Why is this so? Why have these dominated? What else is
|
||||||
|
needed?
|
||||||
|
+ First, PGP gave an incredible impetus to the whole issue
|
||||||
|
of public use of crypto. It brought crypto to the masses,
|
||||||
|
or at least to the Net-aware masses. Second, the nearly
|
||||||
|
simultaneous appearance of remailers (the Kleinpaste/Julf-
|
||||||
|
style and the Cypherpunks "mix"-style) fit in well with
|
||||||
|
the sudden awareness about PGP and crypto issues. And
|
||||||
|
other simultaneous factors appeared:
|
||||||
|
- the appearance of "Wired" and its spectacular success,
|
||||||
|
in early 1993
|
||||||
|
- the Clipper chip firestorm, beginning in April 1993
|
||||||
|
- the Cypherpunks group got rolling in late 1992,
|
||||||
|
reaching public visibility in several articles in 1993.
|
||||||
|
(By the end of '93, we seemed to be a noun, as Bucky
|
||||||
|
might've said.)
|
||||||
|
+ But why so little progress in other important areas?
|
||||||
|
- digital money, despite at least a dozen reported
|
||||||
|
projects, programs (only a few of which are really
|
||||||
|
anything like Chaum's "digital cash")
|
||||||
|
- data havens, information markets, etc.
|
||||||
|
- money-laundering schemes, etc.
|
||||||
|
+ What could change this?
|
||||||
|
- Mosaic, WWW, Web
|
||||||
|
- A successful digital cash effort
|
||||||
|
|
||||||
|
3.4. Beliefs, Goals, Agenda
|
||||||
|
3.4.1. "Is there a set of beliefs that most Cypherpunks support?"
|
||||||
|
+ There is nothing official (not much is), but there is an
|
||||||
|
emergent, coherent set of beliefs which most list members
|
||||||
|
seem to hold:
|
||||||
|
* that the government should not be able to snoop into our
|
||||||
|
affairs
|
||||||
|
* that protection of conversations and exchanges is a basic
|
||||||
|
right
|
||||||
|
* that these rights may need to be secured through
|
||||||
|
_technology_ rather than through law
|
||||||
|
* that the power of technology often creates new political
|
||||||
|
realities (hence the list mantra: "Cypherpunks write
|
||||||
|
code")
|
||||||
|
+ Range of Beliefs
|
||||||
|
- Many are libertarian, most support rights of privacy,
|
||||||
|
some are more radical in apppoach
|
||||||
|
3.4.2. "What are Cypherpunks interested in?"
|
||||||
|
- privacy
|
||||||
|
- technology
|
||||||
|
- encryition
|
||||||
|
- politics
|
||||||
|
- crypto anarchy
|
||||||
|
- digital money
|
||||||
|
- protocols
|
||||||
|
3.4.3. Personal Privacy and Collapse of Governments
|
||||||
|
- There seem to be two main reasons people are drawn to
|
||||||
|
Cypherpunks, besides the general attractiveness of a "cool"
|
||||||
|
group such as ours. The first reason is _personal privacy_.
|
||||||
|
That is, tools for ensuring privacy, protection from a
|
||||||
|
surveillance society, and individual choice. This reason is
|
||||||
|
widely popular, but is not always compelling (after all,
|
||||||
|
why worry about personal privacy and then join a list that
|
||||||
|
has been identified as a "subversive" group by the Feds?
|
||||||
|
Something to think about.)
|
||||||
|
- The second major is personal liberty through reducing the
|
||||||
|
power of governments to coerce and tax. Sort of a digital
|
||||||
|
Galt's Gulch, as it were. Libertarians and
|
||||||
|
anarchocapitalists are especially drawn to this vision, a
|
||||||
|
vision which may bother conventional liberals (when they
|
||||||
|
realize strong crypto means things counter to welfare,
|
||||||
|
AFDC, antidiscrimination laws....).
|
||||||
|
- This second view is more controversial, but is, in my
|
||||||
|
opinion, what really powers the list. While others may
|
||||||
|
phrase it differently, most of us realize we are on to
|
||||||
|
something that will change--and already is changing--the
|
||||||
|
nature of the balance of power between individuals and
|
||||||
|
larger entities.
|
||||||
|
3.4.4. Why is Cypherpunks called an "anarchy"?
|
||||||
|
- Anarchy means "without a leader" (head). Much more common
|
||||||
|
than people may think.
|
||||||
|
- The association with bomb-throwing "anarchists" is
|
||||||
|
misleading.
|
||||||
|
3.4.5. Why is there no formal agenda, organization, etc.?
|
||||||
|
- no voting, no organization to administer such things
|
||||||
|
- "if it ain't broke, don't fix it"
|
||||||
|
- and it's how it all got started and evolved
|
||||||
|
- also, nobody to arrest and hassle, no nonsense about
|
||||||
|
filling out forms and getting tax exemptions, no laws about
|
||||||
|
campaign law violations (if we were a formal group and
|
||||||
|
lobbied against Senator Foo, could be hit with the law
|
||||||
|
limiting "special interests," conceivably)
|
||||||
|
3.4.6. How are projects proposed and completed?
|
||||||
|
- If an anarchy, how do things get done?
|
||||||
|
- The way most things get done: individual actions and market
|
||||||
|
decisions.
|
||||||
|
3.4.7. Future Needs for Cyberspace
|
||||||
|
+ Mark Pesci's ideas for VR and simulations
|
||||||
|
- distributed, high bandwidth
|
||||||
|
- a billion users
|
||||||
|
- spatial ideas....coordinates...servers...holographic
|
||||||
|
models
|
||||||
|
- WWW plus rendering engine = spatial VR (Library of
|
||||||
|
Congress)
|
||||||
|
- "The Labyrinth"
|
||||||
|
+ says to avoid head-mounted displays and gloves (bad for
|
||||||
|
you)
|
||||||
|
+ instead, "perceptual cybernetics".
|
||||||
|
- phi--fecks--psi (phi is external world,Fx = fects are
|
||||||
|
effectuators and sensors, psi is your internal state)
|
||||||
|
3.4.8. Privacy, Credentials without identity
|
||||||
|
3.4.9. "Cypherpunks write code"
|
||||||
|
- "Cypherpunks break the laws they don't like"
|
||||||
|
- "Don't get mad, get even. Write code."
|
||||||
|
3.4.10. Digital Free Markets
|
||||||
|
+ strong crypto changes the nature and visibility of many
|
||||||
|
economic transactionst, making it very difficult for
|
||||||
|
governments to interfere or even to enforce laws,
|
||||||
|
contracts, etc.
|
||||||
|
- thus, changes in the nature of contract enforcement
|
||||||
|
+ (Evidence that this is not hopeless can be found in
|
||||||
|
several places:
|
||||||
|
- criminal markets, where governments obviously cannot be
|
||||||
|
used
|
||||||
|
- international markets, a la "Law Merchant"
|
||||||
|
- "uttering a check"
|
||||||
|
- shopping malls in cyberspace...no identifiable national or
|
||||||
|
regional jurisdiction...overlapping many borders...
|
||||||
|
+ caveat emptor (though rating agencies, and other filter
|
||||||
|
agents, may be used by wary customers....ironically,
|
||||||
|
reputation will matter even more than it now does)
|
||||||
|
- no ability to repudiate a sale, to be an Indian giver
|
||||||
|
- in all kinds of information....
|
||||||
|
3.4.11. The Role of Money
|
||||||
|
- in monetarizing transactions, access, remailers---digital
|
||||||
|
postage
|
||||||
|
3.4.12. Reductions on taxation
|
||||||
|
- offshore entities already exempt
|
||||||
|
- tax havens
|
||||||
|
- cyberspace localization is problematic
|
||||||
|
3.4.13. Transnationalism
|
||||||
|
- rules of nations are ignored
|
||||||
|
3.4.14. Data Havens
|
||||||
|
- credit, medical, legal, renter, etc.
|
||||||
|
3.4.15. MOOs, MUDs, SVRs, Habitat cyberspaces
|
||||||
|
- "True Names" and "Snow Crash"
|
||||||
|
- What are
|
||||||
|
+ Habitat....Chip and Randy
|
||||||
|
- Lucasfilm, Fujitsu
|
||||||
|
- started as game environment...
|
||||||
|
- many-user environments
|
||||||
|
- communications bandwidth is a scarce resource
|
||||||
|
- object-oriented data representation
|
||||||
|
+ implementation platform unimportant...range of
|
||||||
|
capabilities
|
||||||
|
- pure text to Real ity Engines
|
||||||
|
- never got as far as fully populating the reality
|
||||||
|
- "detailed central planning is impossible; don't even try"
|
||||||
|
- 2-D grammar for layouts
|
||||||
|
+ "can't trust anyone"
|
||||||
|
- someone disassembled the code and found a way to make
|
||||||
|
themselves invisible
|
||||||
|
- ways to break the system (extra money)
|
||||||
|
+ future improvements
|
||||||
|
- multimedia objects, customizable objects, local turfs,
|
||||||
|
mulitple interfaces
|
||||||
|
- "Global Cyberspace Infrastructure" (Fujitsu, FINE)
|
||||||
|
+ more bandwidth means more things can be done
|
||||||
|
- B-ISDN will allow video on demand, VR, etc.
|
||||||
|
- protocol specs, Joule (secure concurrent operating
|
||||||
|
system)
|
||||||
|
- intereaction spaces, topological (not spatial)
|
||||||
|
+ Xerox, Pavel Curtis
|
||||||
|
+ LambdaMOO
|
||||||
|
- 1200 different users per day, 200 at a time, 5000 total
|
||||||
|
users
|
||||||
|
- "social virtual realities"--virtual communities
|
||||||
|
- how emergent properties emerge
|
||||||
|
- pseudo-spatial
|
||||||
|
- rooms, audio, video, multiple screens
|
||||||
|
- policing, wizards, mediation
|
||||||
|
- effective telecommuting
|
||||||
|
- need the richness of real world markets...people can sell
|
||||||
|
to others
|
||||||
|
+ Is there a set of rules or basic ideas which can form the
|
||||||
|
basis of a powerfully replicable system?
|
||||||
|
- this would allow franchises to be disctrubed around the
|
||||||
|
world
|
||||||
|
- networks of servers? distinction between server and
|
||||||
|
client fades...
|
||||||
|
- money, commercialization?
|
||||||
|
- Joule language
|
||||||
|
3.4.16. "Is personal privacy the main interest of Cypherpunks?"
|
||||||
|
- Ensuring the _right_ and the _technological feasibility_ is
|
||||||
|
more of the focus. This often comes up in two contexts:
|
||||||
|
- 1. Charges of hypocrisy because people either use
|
||||||
|
pseudonyms or, paradoxically, that they _don't_ use
|
||||||
|
pseudonyms, digital signatures
|
||||||
|
3.4.17. "Shouldn't crypto be regulated?"
|
||||||
|
- Many people make comparisons to the regulation of
|
||||||
|
automobiles, of the radio spectrum, and even of guns. The
|
||||||
|
comparison of crypto to guns is especially easy to make,
|
||||||
|
and especially dangerous.
|
||||||
|
-
|
||||||
|
+ A better comparison is "use of crypto = right to speak as
|
||||||
|
you wish."
|
||||||
|
- That is, we cannot demand that people speak in a language
|
||||||
|
or form that is easily understandable by eavesdroppers,
|
||||||
|
wiretappers, and spies.
|
||||||
|
+ If I choose to speak to my friends in Latvian, or in
|
||||||
|
Elihiuish, or in
|
||||||
|
- triple DES, that's my business. (Times of true war, as
|
||||||
|
in World War
|
||||||
|
- II, may be slightly different. As a libertarian, I'm
|
||||||
|
not advocating
|
||||||
|
- that, but I understand the idea that in times of war
|
||||||
|
speaking in code
|
||||||
|
+ is suspect. We are not in a time of war, and haven't
|
||||||
|
been.)
|
||||||
|
-
|
||||||
|
- Should we have "speech permits"? After all, isn't the
|
||||||
|
regulation of
|
||||||
|
+ speech consistent with the regulation of automobiles?
|
||||||
|
-
|
||||||
|
- I did a satirical essay along these lines a while back.
|
||||||
|
I won't
|
||||||
|
- included it here, though. (My speech permit for satire
|
||||||
|
expired and I
|
||||||
|
+ haven't had time to get it renewed.)
|
||||||
|
-
|
||||||
|
- In closing, the whole comparison of cryptography to
|
||||||
|
armaments is
|
||||||
|
- misleading. Speaking or writing in forms not readily
|
||||||
|
understandable to
|
||||||
|
- your enemies, your neighbors, your spouse, the cops, or
|
||||||
|
your local
|
||||||
|
- eavesdropper is as old as humanity.
|
||||||
|
3.4.18. Emphasize the "voluntary" nature of crypto
|
||||||
|
+ those that don't want privacy, can choose not to use crypto
|
||||||
|
- just as they can take the locks of their doors, install
|
||||||
|
wiretaps on their phones, remove their curtains so as not
|
||||||
|
to interfere with peeping toms and police surveillance
|
||||||
|
teams, etc.
|
||||||
|
- as PRZ puts it, they can write all their letters on
|
||||||
|
postcards, because they have "nothing to hide"
|
||||||
|
- what we want to make sure doesn't happen is _others_
|
||||||
|
insisting that we cannot use crypto to maintain our own
|
||||||
|
privacy
|
||||||
|
+ "But what if criminals have access to crypto and can keep
|
||||||
|
secrets?"
|
||||||
|
- this comes up over and over again
|
||||||
|
- does this mean locks should not exist, or.....?
|
||||||
|
3.4.19. "Are most Cypherpunks anarchists?"
|
||||||
|
- Many are, but probably not most. The term "anarchy" is
|
||||||
|
often misunderstood.
|
||||||
|
- As Perry Metzger puts it "Now, it happpens that I am an
|
||||||
|
anarchist, but that isn't what most people associated with
|
||||||
|
the term "cypherpunk" believe in, and it isn't fair to
|
||||||
|
paint them that way -- hell, many people on this mailing
|
||||||
|
list are overtly hostile to anarchism." [P.M., 1994-07-01]
|
||||||
|
- comments of Sherry Mayo, others
|
||||||
|
- But the libertarian streak is undeniably strong. And
|
||||||
|
libertarians who think about the failure of politics and
|
||||||
|
the implications of cryptgraphy generally come to the
|
||||||
|
anarcho-capitalist or crypto-anarchist point of view.
|
||||||
|
- In any case, the "other side" has not been very vocal in
|
||||||
|
espousing a consistent ideology that combines strong crypto
|
||||||
|
and things like welfare, entitlements, and high tax rates.
|
||||||
|
(I am not condemning them. Most of my leftist friends turn
|
||||||
|
out to believe in roughly the same things I believe
|
||||||
|
in...they just attach different labels and have negative
|
||||||
|
reactions to words like "capitalist.")
|
||||||
|
3.4.20. "Why is there so much ranting on the list?"
|
||||||
|
- Arguments go on and on, points get made dozens of times,
|
||||||
|
flaming escalates. This has gotten to be more of a problem
|
||||||
|
in recent months. (Not counting the spikes when Detweiler
|
||||||
|
was around.)
|
||||||
|
+ Several reasons:
|
||||||
|
+ the arguments are often matters of opinion, not fact, and
|
||||||
|
hence people just keep repeating their arguments
|
||||||
|
- made worse by the fact that many people are too lazy to
|
||||||
|
do off-line reading, to learn about what they are
|
||||||
|
expressing an opinion on
|
||||||
|
- since nothing ever gets resolved, decided, vote upon,
|
||||||
|
etc., the debates continue
|
||||||
|
- since anyone is free to speak up at any time, some people
|
||||||
|
will keep making the same points over and over again,
|
||||||
|
hoping to win through repetition (I guess)
|
||||||
|
+ since people usually don't personally know the other
|
||||||
|
members of the list, this promotes ranting (I've noticed
|
||||||
|
that the people who know each other, such as the Bay Area
|
||||||
|
folks, tend not to be as rude to each other...any
|
||||||
|
sociologist or psychologist would know why this is so
|
||||||
|
immediately).
|
||||||
|
+ the worst ranters tend to be the people who are most
|
||||||
|
isolated from the other members of the list community;
|
||||||
|
this is generally a well-known phenomenon of the Net
|
||||||
|
- and is yet more reason for regional Cypherpunks
|
||||||
|
groups to occasionally meet, to at least make some
|
||||||
|
social and conversational connections with folks in
|
||||||
|
their region.
|
||||||
|
- on the other hand, rudeness is often warranted; people
|
||||||
|
who assault me and otherwise plan to deprive me of my
|
||||||
|
property of deserving of death, not just insults [Don't
|
||||||
|
be worried, there are only a handful of people on this
|
||||||
|
list I would be happy to see dead, and on none of them
|
||||||
|
would I expend the $5000 it might take to buy a contract.
|
||||||
|
Of course, rates could drop.]
|
||||||
|
3.4.21. The "rejectionist" stance so many Cypherpunks have
|
||||||
|
- that compromise rarely helps when very basic issues are
|
||||||
|
involved
|
||||||
|
- the experience with the NRA trying compromise, only to find
|
||||||
|
ever-more-repressive laws passed
|
||||||
|
- the debacle with the EFF and their "EFF Digital Telephony
|
||||||
|
Bill" ("We couldn't have put this bill together without
|
||||||
|
your help") shows the corruption of power; I'm ashamed to
|
||||||
|
have ever been a member of the EFF, and will of course not
|
||||||
|
be renewing my membership.
|
||||||
|
- I have jokingly suggested we need a "Popular Front for the
|
||||||
|
Liberation of Crypto," by analogy with the PFLP.
|
||||||
|
3.4.22. "Is the Cypherpunks group an illegal or seditious
|
||||||
|
organization?"
|
||||||
|
- Well, there are those "Cypherpunk Criminal" t-shirts a lot
|
||||||
|
of us have...
|
||||||
|
- Depends on what country you're in.
|
||||||
|
- Probably in a couple of dozen countries, membership would
|
||||||
|
be frowned on
|
||||||
|
- the material may be illegal in other countries
|
||||||
|
- and many of us advocate things like using strong crypto to
|
||||||
|
avoid and evade tzxes, to bypass laws we dislike, etc.
|
||||||
|
|
||||||
|
3.5. Self-organizing Nature of Cypherpunks
|
||||||
|
3.5.1. Contrary to what people sometimes claim, there is no ruling
|
||||||
|
clique of Cypherpunks. Anybody is free to do nearly anything,
|
||||||
|
just not free to commit others to course of action, or
|
||||||
|
control the machine resources the list now runs on, or claim
|
||||||
|
to speak for the "Cypherpunks" as a group (and this last
|
||||||
|
point is unenforceable except through reptutation and social
|
||||||
|
repercussions).
|
||||||
|
3.5.2. Another reason to be glad there is no formal Cypherpunks
|
||||||
|
structure, ruling body, etc., is that there is then no direct
|
||||||
|
target for lawsuits, ITAR vioalation charges, defamation or
|
||||||
|
copyright infringement claims, etc.
|
||||||
|
|
||||||
|
3.6. Mechanics of the List
|
||||||
|
3.6.1. Archives of the Cyperpunks List
|
||||||
|
- Karl Barrus has a selection of posts at the site
|
||||||
|
chaos.bsu.edu, available via
|
||||||
|
gopher. Look in the "Cypherpunks gopher site" directory.
|
||||||
|
3.6.2. "Why isn't the list sent out in encrypted form?"
|
||||||
|
- Too much hassle, no additional security, would only make
|
||||||
|
people jump through extra hoops (which might be useful, but
|
||||||
|
probably not worth the extra hassle and ill feelings).
|
||||||
|
- "We did this about 8 years ago at E&S using DEC VMS NOTES.
|
||||||
|
We used a plain vanilla secret key algorithm and a key
|
||||||
|
shared by all legitimate members of the group. We could do
|
||||||
|
it today -- but why bother? If you have a key that
|
||||||
|
widespread, it's effectively certain that a "wrong person"
|
||||||
|
(however you define him/her) will have a copy of the key."
|
||||||
|
[Carl Ellison, Encrypted BBS?, 1993-08-02]
|
||||||
|
3.6.3. "Why isn't the list moderated?"
|
||||||
|
- This usually comes up during severe flaming episodes,
|
||||||
|
notably when Detweiler is on the list in one of his various
|
||||||
|
personnas. Recently, it has not come up, as things have
|
||||||
|
been relatively quiet.
|
||||||
|
+ Moderation will *not* happen
|
||||||
|
- nobody has the time it takes
|
||||||
|
- nobody wants the onus
|
||||||
|
+ hardly consistent with many of our anarchist leanings, is
|
||||||
|
it?
|
||||||
|
- (Technically, moderation can be viewed as "my house, my
|
||||||
|
rules, and hence OK, but I think you get my point.)
|
||||||
|
- "No, please let's not become a 'moderated' newsgroup. This
|
||||||
|
would be the end of freedom! This is similar to giving the
|
||||||
|
police more powers because crime is up. While it is a
|
||||||
|
tactic to fight off the invaders, a better tactic is
|
||||||
|
knowledge." [RWGreene@vnet.net, alt.gathering.rainbow, 1994-
|
||||||
|
07-06]"
|
||||||
|
3.6.4. "Why isn't the list split into smaller lists?"
|
||||||
|
- What do you call the list outages?
|
||||||
|
+ Seriously, several proposals to split the list into pieces
|
||||||
|
have resulted in not much
|
||||||
|
- a hardware group...never seen again, that I know of
|
||||||
|
- a "moderated cryptography" group, ditto
|
||||||
|
- a DC-Net group...ditto
|
||||||
|
- several regional groups and meeting planning groups,
|
||||||
|
which are apparently moribund
|
||||||
|
- a "Dig Lib" group...ditto
|
||||||
|
- use Rishab's comment:
|
||||||
|
+ Reasons are clear: one large group is more successful in
|
||||||
|
traffic than smaller, low-volume groups...out of sight,
|
||||||
|
out of mind
|
||||||
|
- and topics change anyway, so the need for a
|
||||||
|
"steganography" mailing list (argued vehemently for by
|
||||||
|
one person, not Romana M., by the way) fades away when
|
||||||
|
the debate shifts. And so on.
|
||||||
|
3.6.5. Critical Addresses, Numbers, etc.
|
||||||
|
+ Cypherpunks archives sites
|
||||||
|
- soda
|
||||||
|
- mirror sites
|
||||||
|
- ftp sites
|
||||||
|
- PGP locations
|
||||||
|
- Infobot at Wired
|
||||||
|
- majordomo@toad.com; "help" as message body
|
||||||
|
3.6.6. "How did the Cypherpunk remailers appear so quickly?"
|
||||||
|
- remailers were the first big win...a weekend of Perl
|
||||||
|
hacking
|
||||||
|
|
||||||
|
3.7. Publicity
|
||||||
|
3.7.1. "What kind of press coverage have the Cypherpunks gotten?"
|
||||||
|
- " I concur with those who suggest that the solution to the
|
||||||
|
ignorance manifested in many of the articles concerning the
|
||||||
|
Net is education. The coverage of the Cypherpunks of late
|
||||||
|
(at least in the Times) shows me that reasonable accuracy
|
||||||
|
is possible." [Chris Walsh, news.admin.policy, 1994-07-04]
|
||||||
|
|
||||||
|
3.8. Loose Ends
|
||||||
|
3.8.1. On extending the scope of Cypherpunks to other countres
|
||||||
|
- a kind of crypto underground, to spread crypto tools, to
|
||||||
|
help sow discord, to undermine corrupt governments (to my
|
||||||
|
mind, all governments now on the planet are intrinsically
|
||||||
|
corrupt and need to be undermined)
|
||||||
|
- links to the criminal underworlds of these countries is one
|
||||||
|
gutsy thing to consider....fraught with dangers, but
|
||||||
|
ultimately destabilizing of governments
|
||||||
|
|
||||||
|
4. Goals and Ideology -- Privacy, Freedom, New Approaches
|
||||||
|
|
||||||
|
4.1. copyright
|
||||||
|
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
|
||||||
|
1994-09-10, Copyright Timothy C. May. All rights reserved.
|
||||||
|
See the detailed disclaimer. Use short sections under "fair
|
||||||
|
use" provisions, with appropriate credit, but don't put your
|
||||||
|
name on my words.
|
Loading…
Reference in New Issue
Block a user