{"id":37291,"date":"2020-04-03T14:56:41","date_gmt":"2020-04-03T11:56:41","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=37291"},"modified":"2025-08-29T14:59:05","modified_gmt":"2025-08-29T11:59:05","slug":"what-is-crypto%e2%80%91anarchism","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/what-is-crypto%e2%80%91anarchism\/","title":{"rendered":"What is crypto\u2011anarchism?"},"content":{"rendered":"<div id=\"cards_wrapper\">\n<div class=\"single_card\">\n<p id=\"card_counter_1\" class=\"card_counter\"><span class=\"card_counter_span\">1<\/span><\/p>\n<p><strong>What is crypto\u2011anarchism? <\/strong><\/p>\n<div class=\"card_description\">Crypto\u2011anarchism is a strain of anarchism that uses cryptographically secured anonymisation technologies, digital pseudonyms and digital money to bypass state controls\u2014surveillance, censorship and taxation.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_2\" class=\"card_counter\"><span class=\"card_counter_span\">2<\/span><\/p>\n<p><strong>How did crypto\u2011anarchism emerge? <\/strong><\/p>\n<div class=\"card_description\">\n<p>In the 1940s Western intelligence agencies explored involving the recipient of a message in the encoding process. In 1973 British mathematician Clifford Cocks <a href=\"https:\/\/en.wikipedia.org\/wiki\/Clifford_Cocks\" target=\"_blank\" rel=\"noopener noreferrer\">presented<\/a> a model in which an authorised recipient could choose two giant prime numbers and multiply them to obtain a third giant number used as a public key. There was no need to hide it because computing the two original numbers was practically impossible.<\/p>\n<p>In 1977 the concept became a working model when three professors at the Massachusetts Institute of Technology (MIT)\u2014Ron Rivest, Adi Shamir and Leonard Adleman\u2014<a href=\"https:\/\/patents.google.com\/patent\/US4405829\" target=\"_blank\" rel=\"noopener noreferrer\">released<\/a> a public\u2011key cryptographic algorithm based on the computational difficulty of factoring large integers, named RSA (after their surnames).<\/p>\n<p>Researchers expected RSA to be in demand as email became widespread, providing tools to ensure the privacy of network messages and to authenticate their sources.<\/p>\n<p>After Scientific American <a href=\"https:\/\/www.scientificamerican.com\/article\/mathematical-games-1977-08\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> on RSA, the NSA concluded the algorithm could limit its ability to track communications. The agency classified it as \u201cmunitions\u201d subject to federal arms\u2011smuggling laws, requiring a special licence to distribute.<\/p>\n<p>In the 1970s, as the first working prototypes of the internet appeared, data protection in an open environment became pressing. In 1978 David Chaum, an American cryptographer and a student at the University of California, Berkeley, devised blind digital signatures\u2014a public\u2011key encryption model. Chaum\u2019s work allowed creation of databases of people who could remain anonymous while still guaranteeing the accuracy of information they provided about themselves.<\/p>\n<p>Chaum envisaged digital voting that could be verified without revealing a voter\u2019s identity, and above all digital cash. In the mid\u20111980s he created a model in which users could make payments anonymously while guaranteeing the reality of funds. A circle of cryptographers learned of his work, and within it a movement formed that advocated computer technologies as a means of abolishing the state.<\/p>\n<p>The movement\u2019s chief ideologue was Timothy May, an American cryptographer and former Intel senior scientist. In 1987 May met Philip Salin, an American economist, entrepreneur and futurist, who <a href=\"https:\/\/en.wikipedia.org\/wiki\/American_Information_Exchange\" target=\"_blank\" rel=\"noopener noreferrer\">founded<\/a> the American Information Exchange (AMiX), an online marketplace for trading data.<\/p>\n<p>May disliked the idea of an electronic venue where people could sell trivial information to each other across borders and at low fees. He imagined a global system enabling anonymous bilateral exchange of any information, akin to a corporate intelligence network. He later finalised this concept as the <a href=\"https:\/\/web.archive.org\/web\/20020730044602\/http:\/\/cypherpunks.venona.com:80\/date\/1993\/08\/msg00538.html\" target=\"_blank\" rel=\"noopener noreferrer\">BlackNet system<\/a>, which required a non\u2011governmental digital currency and the ability to make untraceable payments in it.<\/p>\n<p>In 1985 he read David Chaum\u2019s \u201cSecurity without Identification: Transaction Systems to Make Big Brother Obsolete\u201d. In the article Chaum described a system that hides a buyer\u2019s identity using cryptographic methods. Exposure to this idea prompted May to study public\u2011key cryptographic protection, first <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9A%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%81_%D0%BE%D1%82%D0%BA%D1%80%D1%8B%D0%BC_%D0%BA%D0%BB%D1%8E%D1%87%D0%BE%D0%BC\" target=\"_blank\" rel=\"noopener noreferrer\">described<\/a> by Whitfield Diffie, Ralph Merkle and Martin Hellman in 1976. May soon concluded that public\u2011key cryptography, together with networked computing, could \u201cdestroy social power structures\u201d.<\/p>\n<p>In September 1988 May wrote \u201c<a href=\"https:\/\/www.activism.net\/cypherpunk\/crypto-anarchy.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Crypto Anarchist Manifesto<\/a>\u201d, modelled on Karl Marx\u2019s \u201cCommunist Manifesto\u201d: \u201cA spectre is haunting the modern world, the spectre of crypto anarchy.\u201d According to the manifesto, information technologies will allow people to run their lives without governments, using cryptography, digital currencies and other decentralised tools.<\/p>\n<p>By May\u2019s own account, the ideological foundation of \u201cThe Crypto Anarchist Manifesto\u201d was anarcho\u2011capitalism, which emphasises voluntary transactions and free markets.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_3\" class=\"card_counter\"><span class=\"card_counter_span\">3<\/span><\/p>\n<p><strong>How did the Cypherpunks mailing list arise? <\/strong><\/p>\n<div class=\"card_description\">\n<p>In 1992 Timothy May, John Gilmore (a computer specialist and one of the founders of the Electronic Frontier Foundation) and Eric Hughes (a mathematician at the University of California, Berkeley) invited 20 close friends to an informal meeting. They discussed the most topical questions in cryptography and programming.<\/p>\n<p>Such meetings became regular and seeded a movement. A mailing list was created to attract others who shared the founders\u2019 interests and core values. Soon the list, called \u201c<a href=\"http:\/\/mailing-list-archive.cryptoanarchy.wiki\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cypherpunks<\/a>\u201d, had hundreds of subscribers testing ciphers, exchanging ideas and debating new developments. Correspondence used the latest methods at the time, such as PGP. Members debated politics, philosophy, computer science, cryptography and mathematics. In 1993 Eric Hughes published \u201c<a href=\"https:\/\/www.activism.net\/cypherpunk\/manifesto.html\" target=\"_blank\" rel=\"noopener noreferrer\">A Cypherpunk\u2019s Manifesto<\/a>\u201d, setting out the movement\u2019s key tenets:<\/p>\n<blockquote>\n<p><strong>\u201cPrivacy is necessary for an open society in the electronic age. [\u2026] Privacy in an open society requires cryptography. [\u2026] We, the cypherpunks, are dedicated to building anonymous systems. We defend our privacy with cryptography, anonymous mail forwarding systems, digital signatures, and electronic money. [\u2026] Cryptography will inevitably spread worldwide, and with it the anonymous transaction systems it makes possible.\u201d<\/strong><\/p>\n<\/blockquote>\n<p>By 1997 the mailing list had about 2,000 subscribers and 30 messages a day. In 1995 the founder of WikiLeaks, Julian Assange, <a href=\"http:\/\/mailing-list-archive.cryptoanarchy.wiki\/authors\/julian_assange_proff_at_suburbia_net_\/\" target=\"_blank\" rel=\"noopener noreferrer\">published<\/a> his first post on \u201cCypherpunks\u201d. In 2016 he released <a href=\"https:\/\/andronum.com\/index.php?dispatch=products.download_fragment2&#038;product_id=42619\" target=\"_blank\" rel=\"noopener noreferrer\">a book<\/a> about the movement titled \u201cCypherpunks: Freedom and the Future of the Internet\u201d.<\/p>\n<p>Cypherpunk and crypto\u2011anarchism are related but not identical. The term \u201ccypherpunks\u201d was first <a href=\"https:\/\/en.wikipedia.org\/wiki\/Jude_Milhon\" target=\"_blank\" rel=\"noopener noreferrer\">used<\/a> by hacker and programmer Jude Milhon to refer to a group of crypto\u2011anarchists. The term \u201ccrypto\u2011anarchists\u201d first appeared in 1993 in an <a href=\"https:\/\/www.wired.com\/1993\/02\/crypto-rebels\/\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> by Steven Levy, \u201cCrypto\u2011Rebels\u201d.<\/p>\n<p>Many writings by Timothy May and other pioneers of crypto\u2011anarchy <a href=\"http:\/\/indbooks.in\/mirror2.ru\/?page_id=882994\" target=\"_blank\" rel=\"noopener noreferrer\">were published<\/a> in 2001 in the anthology \u201cCrypto Anarchy, Cyberstates, and Pirate Utopias\u201d, edited by the American philosopher Peter Ludlow. The contributors show governance structures emerging within online communities and the rise of ideals of political sovereignty.<\/p>\n<p>Ludlow views virtual communities as laboratories for experiments in building new societies and governance structures. Many experiments will fail, he argues, but given the synergies of the networked world, new types of society and governance may emerge that surpass the traditional.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_4\" class=\"card_counter\"><span class=\"card_counter_span\">4<\/span><\/p>\n<p><strong>What are the aims of crypto\u2011anarchism? <\/strong><\/p>\n<div class=\"card_description\">\n<ul>\n<li>Protection against mass surveillance of communications on computer networks. Crypto\u2011anarchists see the development and use of cryptography as the primary means of liberation from state control.<\/li>\n<li>Elimination of censorship, especially on the internet, as contrary to freedom of expression, via Tor, I2P, Freenet and similar networks. In the crypto\u2011anarchist view, freedom from censorship helps fight corruption and lets opposition politicians spread their views. They seek to create a global \u201cInternet of Trust\u201d\u2014a crowdfunded internet service provider that uses peer\u2011to\u2011peer cellular base <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A4%D0%B5%D0%BC%D1%82%D0%BE%D1%81%D0%BE%D1%82%D0%B0\" target=\"_blank\" rel=\"noopener noreferrer\">stations<\/a> in collective ownership. This internet is fully encrypted and private: the system includes an algorithm that gives each network participant a signature and reputation according to merit.<\/li>\n<li>Creation and development of a new economy based on viable alternatives to banking systems in the form of cryptocurrencies and decentralised financial services.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_5\" class=\"card_counter\"><span class=\"card_counter_span\">5<\/span><\/p>\n<p><strong>How did crypto\u2011anarchism shape cryptocurrencies?<\/strong><\/p>\n<div class=\"card_description\">\n<p>The importance of privacy, anonymous transactions and cryptographic protection\u2014all were realised, to varying degrees, in cryptocurrencies.<\/p>\n<p>In October 2008 Satoshi Nakamoto sent the mailing list the famous <a href=\"https:\/\/bitcoin.org\/files\/bitcoin-paper\/bitcoin_ru.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">white paper<\/a> \u201cBitcoin: A Peer\u2011to\u2011Peer Electronic Cash System\u201d.<\/p>\n<p>The paper shows the influence of cypherpunks and crypto\u2011anarchists. It cites British cryptographer Adam Back and computer engineer Wei Dai. In Nakamoto\u2019s words, Bitcoin \u201cis an implementation of Wei Dai\u2019s b\u2011money proposal \u2026 and Nick Szabo\u2019s Bit gold proposal\u201d.<\/p>\n<p>Dai\u2019s own manifesto proposing b\u2011money begins: \u201cI admire Tim May\u2019s crypto\u2011anarchism.\u201d After publishing the paper, Nakamoto continued work and on January 3rd 2009 mined Bitcoin\u2019s genesis block.<\/p>\n<p>Late in life the chief ideologue of crypto\u2011anarchism, Timothy May, said the cryptocurrency industry had in effect departed from the movement\u2019s early ideals. In his last <a href=\"https:\/\/www.coindesk.com\/enough-with-the-ico-me-so-horny-get-rich-quick-lambo-crypto\" target=\"_blank\" rel=\"noopener noreferrer\">interview<\/a>, in October 2018, he criticised the drive for legal and regulatory compliance. In his view, the spirit of crypto\u2011anarchism is at odds with \u201cthe draconian \u2018know your customer\u2019 rules, anti\u2011money\u2011laundering compliance, passports, account freezes and the requirement to report \u2018suspicious activity\u2019 to the local secret police\u201d.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_6\" class=\"card_counter\"><span class=\"card_counter_span\">6<\/span><\/p>\n<p><strong>How is crypto\u2011anarchism evolving? <\/strong><\/p>\n<div class=\"card_description\">Crypto\u2011anarchism is not a single organised movement but a set of values and views shared by a wide range of people, including WikiLeaks founder Julian Assange, former CIA and NSA contractor Edward Snowden, programmers Cody Wilson and Amir Taaki, and many others. All of them embody, to varying degrees, the ideals of crypto\u2011anarchism.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_7\" class=\"card_counter\"><span class=\"card_counter_span\">7<\/span><\/p>\n<p><strong>What are examples of successful implementations of crypto\u2011anarchist ideas? <\/strong><\/p>\n<div class=\"card_description\">\n<p><a href=\"https:\/\/www.paralelnipolis.cz\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Paralelni Polis<\/em><\/a><\/p>\n<p>Paralelni Polis was founded by members of the Czech art group Ztohoven and occupies a rented three\u2011storey former factory in central Prague.<\/p>\n<p>According to its founders, it is a \u201cunique freedom \u2018think tank\u2019 focused on popularising digital freedom, cryptocurrencies, anonymisation networks and free markets\u201d.<\/p>\n<p>At the core of Paralelni Polis is the Institute of Cryptoanarchy\u2014a space for hackers and developers with tools for unfettered distribution of information on the internet and for creating a parallel decentralised economy, cryptocurrencies and other conditions for a free society in the 21st century.<\/p>\n<p>Paralelni Polis includes the Paper Hub co\u2011working space for collaborative or individual work on projects. It is open to freelancers, students and startups and combines art, the social sciences and technology.<\/p>\n<p><em>Free Republic of Liberland<\/em><\/p>\n<p>A virtual state claiming an uninhabited, disputed seven\u2011square\u2011kilometre plot on the west bank of the Danube between Croatia and Serbia.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/Cv29e25cJZE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>After borders were redrawn amid the chaos following the war in Croatia, the territory officially belonged to neither country.<\/p>\n<p>On April 13th 2015 Vit Jedli\u010dka, a Czech right\u2011libertarian and activist, announced the creation there of an independent sovereign state. It has not received diplomatic recognition from United Nations member states.<\/p>\n<p>Liberland\u2019s motto is \u201clive and let live\u201d, and its official currency is bitcoin. The state has its own Wikipedia page, website, flag and coat of arms. The chosen form of government is a republic with elements of direct democracy.<\/p>\n<p>Hundreds of people have received Liberland citizenship and over half a million have applied. According to its founder, Liberland needs maximal personal and economic freedom, to be achieved with the latest blockchain technologies.<\/p>\n<p>Follow Forklog on <a href=\"https:\/\/www.facebook.com\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> Facebook<\/a>!<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1 What is crypto\u2011anarchism? Crypto\u2011anarchism is a strain of anarchism that uses cryptographically secured anonymisation technologies, digital pseudonyms and digital money to bypass state controls\u2014surveillance, censorship and taxation. 2 How did crypto\u2011anarchism emerge? In the 1940s Western intelligence agencies explored involving recipients in the encoding process. In 1973 British mathematician Clifford Cocks presented a model for public\u2011key cryptography, later realised in 1977 as RSA by three MIT professors.<\/p>\n","protected":false},"author":1,"featured_media":37292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"2","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[2113],"tags":[2120,2114,1547,930],"class_list":["post-37291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptorium","tag-101-anonymity","tag-101-decentralization","tag-crypto-anarchism","tag-cypherpunks"],"aioseo_notices":[],"amp_enabled":true,"views":"84","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/37291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=37291"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/37291\/revisions"}],"predecessor-version":[{"id":37293,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/37291\/revisions\/37293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/37292"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=37291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=37291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=37291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}