2.13.1. "What is Crypto Anarchy?"
- Some of us believe various forms of strong cryptography
will cause the power of the state to decline, perhaps even
collapse fairly abruptly. We believe the expansion into
cyberspace, with secure communications, digital money,
anonymity and pseudonymity, and other crypto-mediated
interactions, will profoundly change the nature of
economies and social interactions.
Governments will have a hard time collecting taxes,
regulating the behavior of individuals and corporations
(small ones at least), and generally coercing folks when it
can't even tell what _continent_ folks are on!
Read Vinge's "True Names" and Card's "Ender's Game" for
some fictional inspirations. "Galt's Gulch" in cyberspace,
what the Net is rapidly becoming already.
I call this set of ideas "crypto anarchy" (or "crypto-
anarchy," as you wish) and have written about this
extensively. The magazines "Wired" (issue 1.2), "Whole
Earth Review" (Summer, 1993), and "The Village Voice" (Aug.
6th, 1993) have all carried good articles on this.
2.13.2. The Crypto Anarchist Manifesto
- a complete copy of my 1988 pastiche of the Communisto
Manifesto is included in the chapter on Crypto Anarchy.
- it needs rewriting, but for historical sake I've left it
unchanged.
- I'm proud that so much of it remains accurate.
2.13.3. "What is BlackNet?"
- BlackNet -- an experiment in information markets, using
anonymous message pools for exchange of instructions and
items. Tim May's experiment in guerilla ontology.
- BlackNet -- an experimental scheme devised by T. May to
underscore the nature of anonymous information markets.
"Any and all" secrets can be offered for sale via anonymous
mailers and message pools. The experiment was leaked via
remailer to the Cypherpunks list (not by May) and thence to
several dozen Usenet groups by Detweiler. The authorities
are said to be investigating it.
2.13.4. "What effect will crypto have on governments?"
- A huge topic, one I've been thinking about since late 1987
when it dawned on me that public key crypto and anonymous
digital cash systems, information markets, etc. meant the
end of governments as we know them. (I called this
development "crypto anarchy." Not everyone is a fan of it.
But it's coming, and fast.)
- "Putting the NSA out of business," as the NYT article put
it
- Espionage is changing. To pick one example, "digital dead
drops." Any message can be sent through an untraceable path
with remailers....and then posted in encrypted form in a
newsgroup readable in most countries, including the Former
Soviet Union. This means the old stand by of the microfilm
in a Coke can left by a certain tree on a rural road--a
method fraught with delays, dangers, and hassles--is now
passe. The same message can be send from the comfort of
one's home securely and untraceably. Even with a a digital
signature to prevent spoofing and disinformation. This spy
can be a Lockheed worker on the Aurora program, a SIGINT
officer at Woomera, or a disgruntled chip designer at
Motorola. (Yes, a countermeasure is to limit access to
personal computers, to run only standard software that has
no such crypto capability. Such embargoes may already apply
to some in sensitive positions, and may someday be a
condition of employment.)
- Money-laundering
- Tax collection. International consultants. Perpetual
tourists. Virtual corporations.
- Terrorism, assassination, crime, Triads, Yakuza, Jamaicans,
Russian Mafia...virtual networks... Aryan Nation gone
digital
2.13.5. "How quickly could something like crypto anarchy come?"
- Parts of it are happening already, though the changes in
the world are not something I take any credit for. Rather,
there are ongoing changes in the role of nations, of power,
and of the ability to coerce behaviors. When people can
drop out of systems they don't like, can move to different
legal or tax jurisdictions, then things change.
+ But a phase change could occur quickly, just as the Berlin
Wall was impregnable one day, and down the next.
- "Public anger grows quietly and explodes suddenly. T.C.
May's "phase change" may be closer than we think. Nobody
in Russia in 1985 really thought the country would fall
apart in 6 years." [Mike Ingle, 1994-01-01]
2.13.6. "Could strong crypto be used for sick and disgusting and
dangerous purposes?"
- Of course. So can locked doors, but we don't insist on an
"open door policy" (outside of certain quaint sorority and
rooming houses!) So do many forms of privacy allow
plotters, molestors, racists, etc. to meet and plot.
- Crypto is in use by the Aryan Nation, by both pro- and anti-
abortion groups, and probably by other kinds of terrorists.
Expect more uses in the future, as things like PGP continue
to spread.
- Many of us are explicity anti-democratic, and hope to use
encryption to undermine the so-called democratic
governments of the world
2.13.7. "What is the Dining Cryptographers Problem, and why is it so
important?"
+ This is dealt with in the main section, but here's David
Chaum's Abstract, from his 1988 paper"
- Abstract: "Keeping confidential who sends which messages,
in a world where any physical transmission can be traced
to its origin, seems impossible. The solution presented
here is unconditionally or cryptographically secure,
depending on whether it is based on one-time-use keys or
on public keys. respectively. It can be adapted to
address efficiently a wide variety of practical
considerations." ["The Dining Cryptographers Problem:
Unconditional Sender and Recipient Untraceability," David
Chaum, Journal of Cryptology, I, 1, 1988.]
-
- DC-nets have yet to be implemented, so far as I know, but
they represent a "purer" version of the physical remailers
we are all so familiar with now. Someday they'll have have
a major impact. (I'm a bigger fan of this work than many
seem to be, as there is little discussion in sci.crypt and
the like.)
2.13.8. "Why won't government simply ban such encryption methods?"
+ This has always been the Number One Issue!
- raised by Stiegler, Drexler, Salin, and several others
(and in fact raised by some as an objection to my even
discussing these issues, namely, that action may then be
taken to head off the world I describe)
+ Types of Bans on Encryption and Secrecy
- Ban on Private Use of Encryption
- Ban on Store-and-Forward Nodes
- Ban on Tokens and ZKIPS Authentication
- Requirement for public disclosure of all transactions
+ Recent news (3-6-92, same day as Michaelangelo and
Lawnmower Man) that government is proposing a surcharge
on telcos and long distance services to pay for new
equipment needed to tap phones!
- S.266 and related bills
- this was argued in terms of stopping drug dealers and
other criminals
- but how does the government intend to deal with the
various forms fo end-user encryption or "confusion"
(the confusion that will come from compression,
packetizing, simple file encryption, etc.)
+ Types of Arguments Against Such Bans
- The "Constitutional Rights" Arguments
+ The "It's Too Late" Arguments
- PCs are already widely scattered, running dozens of
compression and encryption programs...it is far too
late to insist on "in the clear" broadcasts, whatever
those may be (is program code distinguishable from
encrypted messages? No.)
- encrypted faxes, modem scramblers (albeit with some
restrictions)
- wireless LANs, packets, radio, IR, compressed text and
images, etc....all will defeat any efforts short of
police state intervention (which may still happen)
+ The "Feud Within the NSA" Arguments
- COMSEC vs. PROD
+ Will affect the privacy rights of corporations
- and there is much evidence that corporations are in
fact being spied upon, by foreign governments, by the
NSA, etc.
+ They Will Try to Ban Such Encryption Techniques
+ Stings (perhaps using viruses and logic bombs)
- or "barium," to trace the code
+ Legal liability for companies that allow employees to use
such methods
- perhaps even in their own time, via the assumption that
employees who use illegal software methods in their own
time are perhaps couriers or agents for their
corporations (a tenuous point)
2.13.9. "Could anonymous markets facilitate repugnant services, such
as killings for hire?"
- Yes, though there are some things which will help lessen
the full impact.
- To make this brutally concrete, here's how escrow makes
murder contracts much safer than they are today to
negotiate. Instead of one party being caught in an FBI
sting, as is so often the case when amateurs try to arrange
hits, they can use an escrow service to insulate themselves
from:
1. From being traced, because the exchanges are handled via
pseudonyms
2. From the killer taking the money and then not performing
the hit, because the escrow agent holds the money until the
murder is verified (according to some prototocol, such a
newspaper report...again, an area for more work,
thankfully).
3. From being arrested when the money is picked up, as this
is all done via digital cash.
There are some ways to reduce the popularity of this
Murder, Incorporated system. (Things I've been thinking
about for about 6 years, and which we discussed on the
Cypherpunks list and on the Extropians list.)
Next Page: 2.14 Miscellaneous
Previous Page: 2.12 Digital Cash
By Tim May, see README
HTML by Jonathan Rochkind