Share
VIDEOS 1 TO 50
Cyberpunk [1990] Documentary HD
Cyberpunk [1990] Documentary HD
Published: 2017/01/25
Channel: L33T GUY
From Cypherpunk to Blockchains
From Cypherpunk to Blockchains
Published: 2016/07/08
Channel: SatoriD
The Julian Assange Show: Cypherpunks Uncut (p.1)
The Julian Assange Show: Cypherpunks Uncut (p.1)
Published: 2012/07/29
Channel: RT
Down The Deep Dark Web (Full Documentary)
Down The Deep Dark Web (Full Documentary)
Published: 2017/11/06
Channel: Reconditus
What You Need to Know About the Cypherpunks
What You Need to Know About the Cypherpunks
Published: 2018/04/10
Channel: Crypto Tips
DEF CON 25 Crypto Village - Ryan Lackey - Cypherpunks History
DEF CON 25 Crypto Village - Ryan Lackey - Cypherpunks History
Published: 2017/10/21
Channel: DEFCONConference
Cyberpunk 2077 Teaser Trailer
Cyberpunk 2077 Teaser Trailer
Published: 2013/01/10
Channel: Cyberpunk 2077
The Julian Assange Show: Cypherpunks, Part 1 (E8, p.1)
The Julian Assange Show: Cypherpunks, Part 1 (E8, p.1)
Published: 2012/06/05
Channel: RT
Mente Materia - Cypher Punk (Feat. Bolacha Tested, Milton Aguiar Bayside Kings, Henrike Blind Pigs )
Mente Materia - Cypher Punk (Feat. Bolacha Tested, Milton Aguiar Bayside Kings, Henrike Blind Pigs )
Published: 2018/09/04
Channel: ItaKaosClan TV
The Cypherpunks Culture
The Cypherpunks Culture
Published: 2016/06/07
Channel: SatoriD
Keiser Report: Rise of Cypherpunks (E1171)
Keiser Report: Rise of Cypherpunks (E1171)
Published: 2018/01/04
Channel: RT
A Cypherpunk
A Cypherpunk's Manifesto - March 9th 1993
Published: 2018/03/09
Channel: K Ƀ
Blockchain 101 Ep 06 - What is Cypherpunk?
Blockchain 101 Ep 06 - What is Cypherpunk?
Published: 2018/05/16
Channel: Huobi Global
Hackerboxes 0027: Cypherpunk
Hackerboxes 0027: Cypherpunk
Published: 2018/02/28
Channel: grtyvr
Tezos Kathleen Breitman on cypherpunks & crypto-anarchy & world-changing potential of cryptocurrency
Tezos Kathleen Breitman on cypherpunks & crypto-anarchy & world-changing potential of cryptocurrency
Published: 2017/09/02
Channel: This Week In Startups
The Julian Assange Show: Cypherpunks Uncut (p.2)
The Julian Assange Show: Cypherpunks Uncut (p.2)
Published: 2012/07/29
Channel: RT
Unboxing and Assembly - HackerBox #0027: Cypherpunk
Unboxing and Assembly - HackerBox #0027: Cypherpunk
Published: 2018/02/03
Channel: Nick Momrik
nicholas - cypherpunk
nicholas - cypherpunk
Published: 2017/09/18
Channel: WELOVEVERYSIMPLE
Bruce Fenton - Cypherpunks and Wall Street
Bruce Fenton - Cypherpunks and Wall Street
Published: 2018/06/24
Channel: Keynote
Lecture 1: History: From the Cypherpunk Movement to JPMorgan Chase
Lecture 1: History: From the Cypherpunk Movement to JPMorgan Chase
Published: 2017/01/29
Channel: Blockchain at Berkeley
Une contre histoire de l
Une contre histoire de l'Internet - ARTe
Published: 2013/12/15
Channel: darksioul
Cypherpunk
Cypherpunk
Published: 2016/12/23
Channel: Ben Prunty - Topic
Cypher Punk
Cypher Punk
Published: 2018/09/19
Channel: Various Artists - Topic
Cypherpunks and Bitcoin by Paul Rosenberg
Cypherpunks and Bitcoin by Paul Rosenberg
Published: 2017/02/24
Channel: Brooke Royse-Mallers
CRYPTO CULTURE CYPHERPUNK MANIFESTO PRIVACY AND FREEDOM
CRYPTO CULTURE CYPHERPUNK MANIFESTO PRIVACY AND FREEDOM
Published: 2018/09/04
Channel: ChampagneCrypto
Crypto Wars - NHK Documentary 1997
Crypto Wars - NHK Documentary 1997
Published: 2014/01/19
Channel: Socrates1024
Giacomo Explains True Cypherpunk
Giacomo Explains True Cypherpunk
Published: 2017/10/17
Channel: Brian Hoffman
Cypherpunk Series: Giacomo Zucco
Cypherpunk Series: Giacomo Zucco
Published: 2018/07/16
Channel: JW Weatherman
The Julian Assange Show: Cypherpunks, Part 2 (E8, p.2)
The Julian Assange Show: Cypherpunks, Part 2 (E8, p.2)
Published: 2012/06/12
Channel: RT
Richard Boase on the History of the Cypherpunk Movement
Richard Boase on the History of the Cypherpunk Movement
Published: 2013/10/09
Channel: The LTB Network
Natalia Viana no Metropolis | Cypherpunks: liberdade e o futuro da internet
Natalia Viana no Metropolis | Cypherpunks: liberdade e o futuro da internet
Published: 2013/02/19
Channel: TV Boitempo
Jhony REACT - Mente Materia - Cypher Punk(Bolacha Tested, Milton Aguiar Bayside Kings, Henrike
Jhony REACT - Mente Materia - Cypher Punk(Bolacha Tested, Milton Aguiar Bayside Kings, Henrike
Published: 2018/09/16
Channel: McJhony
The Missing Link between Satoshi & Bitcoin: Cypherpunk Scott Stornetta
The Missing Link between Satoshi & Bitcoin: Cypherpunk Scott Stornetta
Published: 2018/09/06
Channel: Naomi Brockwell
Bitcoin History: From the Cypherpunk Movement to JPMorgan Chase
Bitcoin History: From the Cypherpunk Movement to JPMorgan Chase
Published: 2016/09/11
Channel: Blockchain at Berkeley
Интервью: Степан Гершуни о Сатоши Накамото, Бутерине и cypherpunk. Benefit Daily 18+
Интервью: Степан Гершуни о Сатоши Накамото, Бутерине и cypherpunk. Benefit Daily 18+
Published: 2018/09/17
Channel: Benefit Daily
[Lecture 2] Bitcoin to Blockchain: From Cypherpunks to JP Morgan Chase
[Lecture 2] Bitcoin to Blockchain: From Cypherpunks to JP Morgan Chase
Published: 2017/09/17
Channel: Blockchain at Berkeley
Cypherpunks and Ravencoin, with Bruce Fenton
Cypherpunks and Ravencoin, with Bruce Fenton
Published: 2018/07/18
Channel: Naomi Brockwell
Entrevista con activistas
Entrevista con activistas 'cypherpunks' (Parte 1) - Diálogos con Julian Assange (E8)
Published: 2012/06/05
Channel: RT en Español
The Acolyte - Cypherpunk
The Acolyte - Cypherpunk
Published: 2016/10/12
Channel: Xenon
Antecedentes del movimiento Cypherpunk
Antecedentes del movimiento Cypherpunk
Published: 2014/05/21
Channel: Argoff TV
DEVCON1: Dangerous Old Men: Cypherpunk
DEVCON1: Dangerous Old Men: Cypherpunk's Failure, Ethereum's Success - Vinay Gupta feat. Imogen Heap
Published: 2016/01/19
Channel: Ethereum
FutureRant - Vinay Gupta Pt 4/4 - "Cypherpunk to Cyberpunk"
FutureRant - Vinay Gupta Pt 4/4 - "Cypherpunk to Cyberpunk"
Published: 2016/08/31
Channel: World Crypto Network
Cypherpunk & Crypto Anarchism | CE Meetup
Cypherpunk & Crypto Anarchism | CE Meetup
Published: 2018/04/14
Channel: Cryptoeconomics hub
Bruce Fenton Talks Crypto History and cypherpunk, WBF NY
Bruce Fenton Talks Crypto History and cypherpunk, WBF NY
Published: 2018/06/12
Channel: Bitsonline
Project X Zone 2 English - Chapter 37: Cypher Punk
Project X Zone 2 English - Chapter 37: Cypher Punk
Published: 2016/03/16
Channel: omegaevolution
HackerZVoice - NDHXV - Where Cypherpunk Meets Organized Crime with Benjamin BROWN
HackerZVoice - NDHXV - Where Cypherpunk Meets Organized Crime with Benjamin BROWN
Published: 2017/10/28
Channel: communication HZV
Bruce Fenton Talks Blockchain Security and Cypherpunk Roots (WBF 2018)
Bruce Fenton Talks Blockchain Security and Cypherpunk Roots (WBF 2018)
Published: 2018/06/16
Channel: Bitsonline
Mike Lorrey Interview: The Cypherpunk Fathers of Bitcoin
Mike Lorrey Interview: The Cypherpunk Fathers of Bitcoin
Published: 2018/02/08
Channel: Juan Galt Crypto TV
Giacomo Explains True Cypherpunk [USA Accent]
Giacomo Explains True Cypherpunk [USA Accent]
Published: 2017/10/17
Channel: Brian Hoffman
JW Weatherman Interviews Cypherpunk Legend Timothy C May—Author of the Cyphernomicon
JW Weatherman Interviews Cypherpunk Legend Timothy C May—Author of the Cyphernomicon
Published: 2018/06/09
Channel: JW Weatherman
NEXT
GO TO RESULTS [51 .. 100]

WIKIPEDIA ARTICLE

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

A cypherpunk is any activist advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since the late 1980s.

History[edit]

Before the mailing list[edit]

Until about the 1970s, cryptography was mainly practiced in secret by military or spy agencies. However, that changed when two publications brought it out of the closet into public awareness: the US government publication of the Data Encryption Standard (DES), a block cipher which became very widely used; and the first publicly available work on public-key cryptography, by Whitfield Diffie and Martin Hellman.

The technical roots of Cypherpunk ideas have been traced back to work by cryptographer David Chaum on topics such as anonymous digital cash and pseudonymous reputation systems, described in his paper "Security without Identification: Transaction Systems to Make Big Brother Obsolete" (1985).[1]

In the late 1980s, these ideas coalesced into something like a movement.[1]

Origin of the term, and the Cypherpunks mailing list[edit]

In late 1992, Eric Hughes, Timothy C. May and John Gilmore founded a small group that met monthly at Gilmore's company Cygnus Solutions in the San Francisco Bay Area, and was humorously termed cypherpunks by Jude Milhon at one of the first meetings - derived from cipher and cyberpunk.[2] In November 2006, the word was added to the Oxford English Dictionary.[3]

The Cypherpunks mailing list was started in 1992, and by 1994 had 700 subscribers.[2] At its peak, it was a very active forum with technical discussion ranging over mathematics, cryptography, computer science, political and philosophical discussion, personal arguments and attacks, etc., with some spam thrown in. An email from John Gilmore reports an average of 30 messages a day from December 1, 1996 to March 1, 1999, and suggests that the number was probably higher earlier.[4] The number of subscribers is estimated to have reached 2000 in the year 1997.[2]

In early 1997, Jim Choate and Igor Chudov set up the Cypherpunks Distributed Remailer,[5] a network of independent mailing list nodes intended to eliminate the single point of failure inherent in a centralized list architecture. At its peak, the Cypherpunks Distributed Remailer included at least seven nodes.[6] By mid-2005, al-qaeda.net ran the only remaining node.[7] In mid 2013, following a brief outage, the al-qaeda.net node's list software was changed from Majordomo to GNU Mailman[8] and subsequently the node was renamed to cpunks.org.[9] The CDR architecture is now defunct, though the list administrator stated in 2013 that he was exploring a way to integrate this functionality with the new mailing list software.[8]

For a time, the cypherpunks mailing list was a popular tool with mailbombers,[10] who would subscribe a victim to the mailing list in order to cause a deluge of messages to be sent to him or her. (This was usually done as a prank, in contrast to the style of terrorist referred to as a mailbomber.) This precipitated the mailing list sysop(s) to institute a reply-to-subscribe system. Approximately two hundred messages a day was typical for the mailing list, divided between personal arguments and attacks, political discussion, technical discussion, and early spam.[11][12]

The cypherpunks mailing list had extensive discussions of the public policy issues related to cryptography and on the politics and philosophy of concepts such as anonymity, pseudonyms, reputation, and privacy. These discussions continue both on the remaining node and elsewhere as the list has become increasingly moribund.

Events such as the GURPS Cyberpunk raid lent weight to the idea that private individuals needed to take steps to protect their privacy. In its heyday, the list discussed public policy issues related to cryptography, as well as more practical nuts-and-bolts mathematical, computational, technological, and cryptographic matters. The list had a range of viewpoints and there was probably no completely unanimous agreement on anything. The general attitude, though, definitely put personal privacy and personal liberty above all other considerations.

Early discussion of online privacy[edit]

The list was discussing questions about privacy, government monitoring, corporate control of information, and related issues in the early 1990s that did not become major topics for broader discussion until ten years or so later. Some list participants were more radical on these issues than almost anyone else.

Those wishing to understand the context of the list might refer to the history of cryptography; in the early 1990s, the US government considered cryptography software a munition for export purposes, which hampered commercial deployment with no gain in national security, as knowledge and skill was not limited to US citizens. (PGP source code was published as a paper book to bypass these regulations and demonstrate their futility.) The US government had tried to subvert cryptography through schemes such as Skipjack and key escrow. It was also not widely known that all communications were logged by government agencies (which would later be revealed during the NSA and AT&T scandals) though this was taken as an obvious axiom by list members.

The original cypherpunk mailing list, and the first list spin-off, coderpunks, were originally hosted on John Gilmore's toad.com, but after a falling out with the sysop over moderation, the list was migrated to several cross-linked mail-servers in what was called the "distributed mailing list."[13][14] The coderpunks list, open by invitation only, existed for a time. Coderpunks took up more technical matters and had less discussion of public policy implications. There are several lists today that can trace their lineage directly to the original Cypherpunks list: the cryptography list (cryptography@metzdowd.com), the financial cryptography list (fc-announce@ifca.ai), and a small group of closed (invitation-only) lists as well.

Toad.com continued to run with the existing subscriber list, those that didn't unsubscribe, and was mirrored on the new distributed mailing list, but messages from the distributed list didn't appear on toad.com.[15] As the list faded in popularity, so too did it fade in the number of cross-linked subscription nodes.

To some extent, the cryptography list[16] acts as a successor to cypherpunks; it has many of the people and continues some of the same discussions. However, it is a moderated list, considerably less zany and somewhat more technical. A number of current systems in use trace to the mailing list, including Pretty Good Privacy, /dev/random in the Linux kernel (the actual code has been completely reimplemented several times since then) and today's anonymous remailers.

Main principles[edit]

The basic ideas can be found in A Cypherpunk's Manifesto (Eric Hughes, 1993): "Privacy is necessary for an open society in the electronic age. ... We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy ... We must defend our own privacy if we expect to have any. ... Cypherpunks write code. We know that someone has to write software to defend privacy, and ... we're going to write it."[17]

Some are or were quite senior people at major hi-tech companies and others are well-known researchers (see list with affiliations below).

The first mass media discussion of cypherpunks was in a 1993 Wired article by Steven Levy titled Crypto Rebels:

The people in this room hope for a world where an individual's informational footprints -- everything from an opinion on abortion to the medical record of an actual abortion -- can be traced only if the individual involved chooses to reveal them; a world where coherent messages shoot around the globe by network and microwave, but intruders and feds trying to pluck them out of the vapor find only gibberish; a world where the tools of prying are transformed into the instruments of privacy.

There is only one way this vision will materialize, and that is by widespread use of cryptography. Is this technologically possible? Definitely. The obstacles are political -- some of the most powerful forces in government are devoted to the control of these tools. In short, there is a war going on between those who would liberate crypto and those who would suppress it. The seemingly innocuous bunch strewn around this conference room represents the vanguard of the pro-crypto forces. Though the battleground seems remote, the stakes are not: The outcome of this struggle may determine the amount of freedom our society will grant us in the 21st century. To the Cypherpunks, freedom is an issue worth some risk.[18]

The three masked men on the cover of that edition of Wired were prominent cypherpunks Tim May, Eric Hughes and John Gilmore.

Later, Levy wrote a book, Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age,[19] covering the crypto wars of the 1990s in detail. "Code Rebels" in the title is almost synonymous with cypherpunks.

The term cypherpunk is mildly ambiguous. In most contexts it means anyone advocating cryptography as a tool for social change, social impact and expression. However, it can also be used to mean a participant in the Cypherpunks electronic mailing list described below. The two meanings obviously overlap, but they are by no means synonymous.

Documents exemplifying cypherpunk ideas include Timothy C. May's The Crypto Anarchist Manifesto (1992)[20] and The Cyphernomicon (1994),[21] A Cypherpunk's Manifesto.[17]

Privacy of communications[edit]

A very basic cypherpunk issue is privacy in communications and data retention. John Gilmore said he wanted "a guarantee -- with physics and mathematics, not with laws -- that we can give ourselves real privacy of personal communications."[22]

Such guarantees require strong cryptography, so cypherpunks are fundamentally opposed to government policies attempting to control the usage or export of cryptography, which remained an issue throughout the late 1990s. The Cypherpunk Manifesto stated "Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act."[17]

This was a central issue for many cypherpunks. Most were passionately opposed to various government attempts to limit cryptography — export laws, promotion of limited key length ciphers, and especially escrowed encryption.

Anonymity and pseudonyms[edit]

The questions of anonymity, pseudonymity and reputation were also extensively discussed.

Arguably, the possibility of anonymous speech and publication is vital for an open society, an essential requirement for genuine freedom of speech — this was the position of most cypherpunks.[citation needed] A frequently cited example was that the Federalist Papers were originally published under a pseudonym.

Censorship and monitoring[edit]

Questions of censorship and government or police monitoring were also much discussed. Generally, cypherpunks opposed both.

In particular, the US government's Clipper chip scheme for escrowed encryption of telephone conversations (encryption secure against most attackers, but breakable at need by government) was seen as anathema by many on the list. This was an issue that provoked strong opposition and brought many new recruits to the cypherpunk ranks. List participant Matt Blaze found a serious flaw[23] in the scheme, helping to hasten its demise.

Steven Schear created[when?] the warrant canary to thwart the secrecy provisions of court orders and national security letters.[citation needed] As of 2013, warrant canaries are gaining commercial acceptance.[24]

Hiding the act of hiding[edit]

An important set of discussions concerns the use of cryptography in the presence of oppressive authorities. As a result, Cypherpunks have discussed and improved steganographic methods that hide the use of crypto itself, or that allow interrogators to believe that they have forcibly extracted hidden information from a subject. For instance, Rubberhose was a tool that partitioned and intermixed secret data on a drive with fake secret data, each of which accessed via a different password. Interrogators, having extracted a password, are led to believe that they have indeed unlocked the desired secrets, whereas in reality the actual data is still hidden. In other words, even its presence is hidden. Likewise, cypherpunks have also discussed under what conditions encryption may be used without being noticed by network monitoring systems installed by oppressive regimes.

Activities[edit]

As the Manifesto says, "Cypherpunks write code";[17] the notion that good ideas need to be implemented, not just discussed, is very much part of the culture of the mailing list. John Gilmore, whose site hosted the original cypherpunks mailing list, wrote: "We are literally in a race between our ability to build and deploy technology, and their ability to build and deploy laws and treaties. Neither side is likely to back down or wise up until it has definitively lost the race."[citation needed]

Software projects[edit]

Anonymous remailers such as the Mixmaster Remailer were almost entirely a cypherpunk development. Among the other projects they have been involved in were PGP for email privacy, FreeS/WAN for opportunistic encryption of the whole net, Off-the-record messaging for privacy in Internet chat, and the Tor project for anonymous web surfing.

Hardware[edit]

In 1998, the Electronic Frontier Foundation, with assistance from the mailing list, built a $200,000 machine that could brute-force a Data Encryption Standard key in a few days.[25] The project demonstrated that DES was, without question, insecure and obsolete, in sharp contrast to the US government's recommendation of the algorithm.

Expert panels[edit]

Cypherpunks also participated, along with other experts, in several reports on cryptographic matters.

One such paper was "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security".[26] It suggested 75 bits was the minimum key size to allow an existing cipher to be considered secure and kept in service. At the time, the Data Encryption Standard with 56-bit keys was still a US government standard, mandatory for some applications.

Other papers were critical analysis of government schemes. "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption",[27] evaluated escrowed encryption proposals. Comments on the Carnivore System Technical Review.[28] looked at an FBI scheme for monitoring email.

Cypherpunks provided significant input to the 1996 National Research Council report on encryption policy, Cryptography's Role In Securing the Information Society (CRISIS).[29] This report, commissioned by the U.S. Congress in 1993, was developed via extensive hearings across the nation from all interested stakeholders, by a committee of talented people. It recommended a gradual relaxation of the existing U.S. government restrictions on encryption. Like many such study reports, its conclusions were largely ignored by policy-makers. Later events such as the final rulings in the cypherpunks lawsuits forced a more complete relaxation of the unconstitutional controls on encryption software.

Lawsuits[edit]

Cypherpunks have filed a number of lawsuits, mostly suits against the US government alleging that some government action is unconstitutional.

Phil Karn sued the State Department in 1994 over cryptography export controls[30] after they ruled that, while the book Applied Cryptography[31] could legally be exported, a floppy disk containing a verbatim copy of code printed in the book was legally a munition and required an export permit, which they refused to grant. Karn also appeared before both House and Senate committees looking at cryptography issues.

Daniel J. Bernstein, supported by the EFF, also sued over the export restrictions, arguing that preventing publication of cryptographic source code is an unconstitutional restriction on freedom of speech. He won, effectively overturning the export law. See Bernstein v. United States for details.

Peter Junger also sued on similar grounds, and won.

John Gilmore has sued US Attorneys General Ashcroft and Gonzales, arguing that the requirement to present identification documents before boarding a plane is unconstitutional.[32] These suits have not been successful to date.

Civil disobedience[edit]

Cypherpunks encouraged civil disobedience, in particular US law on the export of cryptography. Until 1996, cryptographic code was legally a munition, and until 2000 export required a permit.

In 1995 Adam Back wrote a version of the RSA algorithm for public-key cryptography in three lines of Perl[33][34] and suggested people use it as an email signature file:

#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)

Vince Cate put up a web page that invited anyone to become an international arms trafficker; every time someone clicked on the form, an export-restricted item — originally PGP, later a copy of Back's program — would be mailed from a US server to one in Anguilla. This gained overwhelming attention. There was an option to add your name to a list of such traffickers.[35][36][37]

Cypherpunk fiction[edit]

In Neal Stephenson's novel Cryptonomicon many characters are on the "Secret Admirers" mailing list. This is fairly obviously based on the cypherpunks list, and several well-known cypherpunks are mentioned in the acknowledgements. Much of the plot revolves around cypherpunk ideas; the leading characters are building a data haven which will allow anonymous financial transactions, and the book is full of cryptography. But, according to the author[38] the book's title is — in spite of its similarity — not based on the Cyphernomicon,[21] an online cypherpunk FAQ document.

Legacy[edit]

Cypherpunk achievements would later also be used on the Canadian e-wallet, the MintChip, and the creation of bitcoin. It was an inspiration for CryptoParty decades later to such an extent that the Cypherpunk Manifesto is quoted at the header of its Wiki,[39] and Eric Hughes delivered the keynote address at the Amsterdam CryptoParty on 27 August 2012.

Noteworthy cypherpunks[edit]

John Gilmore is one of the founders of the Cypherpunks mailing list, the Electronic Frontier Foundation, and Cygnus Solutions. He created the alt.* hierarchy in Usenet and is a major contributor to the GNU Project.
Julian Assange, a well-known cypherpunk who advocates for the use of cryptography to ensure privacy on the Internet

Cypherpunks list participants included many notable computer industry figures. Most were list regulars, although not all would call themselves "cypherpunks".[40] The following is a list of noteworthy cypherpunks and their achievements:

* indicates someone mentioned in the acknowledgements of Stephenson's Cryptonomicon.

References[edit]

This article incorporates material from the Citizendium article "Cypherpunk", which is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License but not under the GFDL.
  1. ^ a b Arvind Narayanan: What Happened to the Crypto Dream?, Part 1. IEEE Security & Privacy. Volume 11, Issue 2, March–April 2013, pages 75-76, ISSN 1540-7993
  2. ^ a b c d Robert Manne: The Cypherpunk Revolutionary - Julian Assange. The Monthly March, 2011, No. 65
  3. ^ ResourceShelf » Oxford English Dictionary Updates Some Entries & Adds New Words; Bada-Bing, Cypherpunk, and Wi-Fi Now in the OED
  4. ^ Please title this page. (Page 2)
  5. ^ Jim Choate: "Cypherpunks Distributed Remailer". Cypherpunks mailing list. February 1997.
  6. ^ "Cypherpunk Mailing List Information". Archived from the original on 2016-03-05. 
  7. ^ Setting Up a Filtering CDR Node for Cypherpunks
  8. ^ a b Riad S. Wahby: "back on the airwaves". Cypherpunks mailing list. July 2013.
  9. ^ Riad S. Wahby: "domain change". Cypherpunks mailing list. July 2013.
  10. ^ Re: POST: The Frightening Dangers of Moderation
  11. ^ Re: Re: Add To Your Monthly Income!!
  12. ^ Cypherpunks Date Index for 1997 04
  13. ^ Re: Sandy and the Doc
  14. ^ Newgroup - distributed mailing list on the way?
  15. ^ Switching to full traffic mode
  16. ^ "cryptography". 
  17. ^ a b c d Hughes, Eric (1993), A Cypherpunk's Manifesto 
  18. ^ Levy, Steven (May 1993). "Crypto Rebels". Wired. 
  19. ^ Levy, Steven (2001). Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age. Penguin. ISBN 0-14-024432-8. 
  20. ^ Timothy C. May (1992), The Crypto Anarchist Manifesto 
  21. ^ a b May, Timothy C. (September 10, 1994). "The Cyphernomicon: Cypherpunks FAQ and More, Version 0.666". Cypherpunks.to. Retrieved February 28, 2011.  as well as Hughes's
  22. ^ John Gilmore, home page 
  23. ^ Matt Blaze (1994), Protocol failure in the escrowed encryption standard 
  24. ^ "Apple takes strong privacy stance in new report, publishes rare "warrant canary"". Ars Technica. 
  25. ^ Electronic Frontier Foundation (1998), Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design, Electronic Frontier Foundation, ISBN 1-56592-520-3 
  26. ^ Blaze; Diffie; Rivest; Schneier; Shimomura; Thompson & Wiener (1996). http://www.schneier.com/paper-keylength.html.  Missing or empty |title= (help)
  27. ^ Hal Abelson; Ross Anderson; Steven M. Bellovin; Josh Benaloh; Matt Blaze; Whitfield Diffie; John Gilmore; Peter G. Neumann; Ronald L. Rivest; Jeffrey I. Schiller & Bruce Schneier (1998), The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption 
  28. ^ Steven Bellovin; Matt Blaze; David Farber; Peter Neumann; Eugene Spafford, Comments on the Carnivore System Technical Review 
  29. ^ Kenneth W. Dam; Herbert S. Lin, eds. (1996). Cryptography's Role In Securing the Information Society. Washington, D.C.: National Research Council. p. 688. ISBN 0-309-05475-3. LCCN 96-68943. Archived from the original on September 28, 2011. 
  30. ^ "The Applied Cryptography Case: Only Americans Can Type!". 
  31. ^ Schneier, Bruce (1996). Applied Cryptography (2nd ed.). John Wiley & Sons. ISBN 0-471-11709-9. 
  32. ^ Gilmore v. Gonzales 
  33. ^ Adam Back, export-a-crypto-system sig, web page 
  34. ^ Adam Back, post to cypherpunks list, RSA in six lines of Perl 
  35. ^ Vince Cate, ITAR Civil Disobedience (International Arms Trafficker Training Page) 
  36. ^ Zurko, Marie Ellen (1998-10-07). "Crypto policy costs the US a citizen". Electronic CIPHER: Newsletter of the IEEE Computer Society's TC on Security and Privacy (29). Retrieved 2013-10-11. 
  37. ^ Dawson, Keith (1996-05-05). "Become an international arms trafficker in one click". Tasty Bits from the Technology Front. Archived from the original on 1997-01-16. Retrieved 2013-10-11. 
  38. ^ Neal Stephenson, Cryptonomicon cypher-FAQ, archived from the original on May 28, 2010 
  39. ^ [1] Archived September 12, 2012, at the Wayback Machine.
  40. ^ "Warm Party for a Code Group". Wired. September 13, 2002. Archived from the original on March 5, 2009. 
  41. ^ a b c d e f g h i j k l Lopp, Jameson (9 April 2016). "The rise of the cypherpunks". CoinDesk. Retrieved 11 April 2016. 
  42. ^ 'Julian Assange <proff () suburbia ! net>' posts - MARC
  43. ^ a b Rodger, Will (30 November 2001). "Cypherpunks RIP". The Register. Retrieved 13 July 2016. 
  44. ^ "Officers - Open Source Club at Ohio State University". 
  45. ^ Orlowski, Andrew. "Alice, Bob and Eve too". The Register. 
  46. ^ Discourse.net | On the fringes of the public sphere
  47. ^ Franchesci-Bicchierai, Lorenzo (20 September 2014). "Egypt's New Internet Surveillance System Remains Shrouded in Mystery". Retrieved 23 September 2014. 
  48. ^ Hastings, Sean (2007). God Wants You Dead (1st ed.). Vera Verba. ISBN 0979601118. 
  49. ^ Evans, Jon (13 January 2013). "Nadia Heninger Is Watching You". Retrieved 23 September 2014. 
  50. ^ "Visa gravplats". Retrieved 28 April 2015. 
  51. ^ "Meet the virus author:Hackitat". 11 September 2012. Retrieved 28 April 2015. 
  52. ^ Mac Crypto Workshop
  53. ^ http://criticalengineering.org/en.  Missing or empty |title= (help)
  54. ^ "IFCA". 
  55. ^ Allnutt, Luke (27 November 2012). "The Woman Behind CryptoParty". Retrieved 23 September 2014. 
  56. ^ "Jillian York". Electronic Frontier Foundation. 

Further reading[edit]

External links[edit]

Disclaimer

None of the audio/visual content is hosted on this site. All media is embedded from other sites such as GoogleVideo, Wikipedia, YouTube etc. Therefore, this site has no control over the copyright issues of the streaming media.

All issues concerning copyright violations should be aimed at the sites hosting the material. This site does not host any of the streaming media and the owner has not uploaded any of the material to the video hosting servers. Anyone can find the same content on Google Video or YouTube by themselves.

The owner of this site cannot know which documentaries are in public domain, which has been uploaded to e.g. YouTube by the owner and which has been uploaded without permission. The copyright owner must contact the source if he wants his material off the Internet completely.

Powered by YouTube
Wikipedia content is licensed under the GFDL and (CC) license