A cypherpunk is one who advocates the widespread use of strong
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
and
privacy-enhancing technologies
Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their ...
as a means of effecting social and political change. The cypherpunk movement originated in the late 1980s and gained traction with the establishment of the "Cypherpunks"
electronic mailing list
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.
Mailing lists are often rented or sold. If rented, the renter agrees to use the mailing list only at contra ...
in 1992, where informal groups of activists, technologists, and
cryptographers discussed strategies to enhance individual privacy and resist state or corporate
surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
. Deeply
libertarian
Libertarianism (from ; or from ) is a political philosophy that holds freedom, personal sovereignty, and liberty as primary values. Many libertarians believe that the concept of freedom is in accord with the Non-Aggression Principle, according ...
in philosophy, the movement is rooted in principles of
decentralization
Decentralization or decentralisation is the process by which the activities of an organization, particularly those related to planning and decision-making, are distributed or delegated away from a central, authoritative location or group and gi ...
, individual autonomy, and freedom from
centralized authority. Its influence on society extends to the development of technologies that have reshaped global finance, communication, and privacy practices, such as the creation of
Bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
and other
cryptocurrencies
A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Individual coin ownership records ...
, which embody cypherpunk ideals of decentralized and censorship-resistant money.
The movement has also contributed to the mainstreaming of encryption in everyday technologies, such as secure messaging apps and privacy-focused web browsers.
History
Before the mailing list
Until about the 1970s,
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
was mainly practiced in secret by military or spy agencies. However, that changed when two publications brought it into public awareness: the first publicly available work on
public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
, by
Whitfield Diffie
Bailey Whitfield 'Whit' Diffie ForMemRS (born June 5, 1944) is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dire ...
and
Martin Hellman
Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his invention of public-key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to the ...
, and the US government publication of the
Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryp ...
(DES), a
block cipher
In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called ''blocks''. Block ciphers are the elementary building blocks of many cryptographic protocols. They are ubiquitous in the storage a ...
which became very widely used.
The technical roots of Cypherpunk ideas have been traced back to work by cryptographer
David Chaum
David Lee Chaum (born 1955) is an American computer scientist, List of cryptographers, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of Digital cur ...
on topics such as anonymous digital cash and pseudonymous reputation systems, described in his paper "Security without Identification: Transaction Systems to Make Big Brother Obsolete" (1985).
[Arvind Narayanan]
What Happened to the Crypto Dream?, Part 1
. IEEE Security & Privacy. Volume 11, Issue 2, March–April 2013, pages 75-76, ISSN 1540-7993
In the late 1980s, these ideas coalesced into something like a movement.
[
]
Etymology and the Cypherpunks mailing list
In late 1992, Eric Hughes, Timothy C. May, and John Gilmore founded a small group that met monthly at Gilmore's company Cygnus Solutions
Cygnus Solutions, originally Cygnus Support, was founded in 1989 by John Gilmore (activist), John Gilmore, Michael Tiemann and David Henkel-Wallace to provide commercial support for free software. Its tagline was: ''Making free software affordabl ...
in the San Francisco Bay Area
The San Francisco Bay Area, commonly known as the Bay Area, is a List of regions of California, region of California surrounding and including San Francisco Bay, and anchored by the cities of Oakland, San Francisco, and San Jose, California, S ...
and was humorously termed ''cypherpunks'' by Jude Milhon
Judith Milhon (March 12, 1939 – July 19, 2003), best known by her pseudonym St. Jude, was a self-taught programmer, civil rights advocate, writer, editor, advocate for women in computing, hacker and author in the San Francisco Bay Area.
Milho ...
at one of the first meetings—derived from ''cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
'' and ''cyberpunk
Cyberpunk is a subgenre of science fiction in a dystopian futuristic setting said to focus on a combination of "low-life and high tech". It features futuristic technological and scientific achievements, such as artificial intelligence and cyberwa ...
''.[ Robert Manne]
The Cypherpunk Revolutionary - Julian Assange
. The Monthly
''The Monthly'' is an Australian national magazine of politics, society and the arts, which is published eleven times per year on a monthly basis except the December/January issue. Founded in 2005, it is published by Melbourne property developer ...
March, 2011, No. 65 In November 2006, the word was added to the Oxford English Dictionary
The ''Oxford English Dictionary'' (''OED'') is the principal historical dictionary of the English language, published by Oxford University Press (OUP), a University of Oxford publishing house. The dictionary, which published its first editio ...
.
The Cypherpunks mailing list
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.
Mailing lists are often rented or sold. If rented, the renter agrees to use the mailing list only at contra ...
was started in 1992, and by 1994 had 700 subscribers. At its peak, it was a very active forum with technical discussions ranging over mathematics, cryptography, computer science, political and philosophical discussion, personal arguments and attacks, etc., with some spam
Spam most often refers to:
* Spam (food), a consumer brand product of canned processed pork of the Hormel Foods Corporation
* Spamming, unsolicited or undesired electronic messages
** Email spam, unsolicited, undesired, or illegal email messages
...
thrown in. An email from John Gilmore reports an average of 30 messages a day from December 1, 1996, to March 1, 1999, and suggests that the number was probably higher earlier. The number of subscribers is estimated to have reached 2,000 in the year 1997.
In early 1997, Jim Choate and Igor Chudov set up the Cypherpunks Distributed Remailer,[Jim Choate:]
Cypherpunks Distributed Remailer
". Cypherpunks mailing list. February 1997. a network of independent mailing list nodes intended to eliminate the single point of failure
A single point of failure (SPOF) is a part of a system that would Cascading failure, stop the entire system from working if it were to fail. The term single point of failure implies that there is not a backup or redundant option that would enab ...
inherent in a centralized list architecture. At its peak, the Cypherpunks Distributed Remailer included at least seven nodes. By mid-2005, al-qaeda.net ran the only remaining node. In mid-2013, following a brief outage, the al-qaeda.net node's list software was changed from Majordomo
A majordomo () is a person who speaks, makes arrangements, or takes charge for another. Typically, this is the highest (''major'') person of a household (''domūs'' or ''domicile'') staff, a head servant who acts on behalf of the owner of a larg ...
to GNU Mailman,[Riad S. Wahby:]
back on the airwaves
". Cypherpunks mailing list. July 2013. and subsequently the node was renamed to cpunks.org.[Riad S. Wahby:]
". Cypherpunks mailing list. July 2013. The CDR architecture is now defunct, though the list administrator stated in 2013 that he was exploring a way to integrate this functionality with the new mailing list software.[
For a time, the cypherpunks mailing list was a popular tool with mailbombers, who would subscribe a victim to the mailing list in order to cause a deluge of messages to be sent to him or her. (This was usually done as a prank, in contrast to the style of terrorist referred to as a mailbomber.) This precipitated the mailing list sysop(s) to institute a reply-to-subscribe system. Approximately two hundred messages a day was typical for the mailing list, divided between personal arguments and attacks, political discussion, technical discussion, and early spam.
The cypherpunks mailing list had extensive discussions of the public policy issues related to cryptography and on the politics and philosophy of concepts such as anonymity, pseudonyms, reputation, and privacy. These discussions continue both on the remaining node and elsewhere as the list has become increasingly moribund.
Events such as the GURPS Cyberpunk raid lent weight to the idea that private individuals needed to take steps to protect their privacy. In its heyday, the list discussed public policy issues related to cryptography, as well as more practical nuts-and-bolts mathematical, computational, technological, and cryptographic matters. The list had a range of viewpoints and there was probably no completely unanimous agreement on anything. The general attitude, though, definitely put personal privacy and personal liberty above all other considerations.
]
Early discussion of online privacy
The list was discussing questions about privacy, government monitoring, corporate control of information, and related issues in the early 1990s that did not become major topics for broader discussion until at least ten years later. Some list participants were highly radical on these issues.
Those wishing to understand the context of the list might refer to the history of cryptography; in the early 1990s, the US government considered cryptography software a munition
Ammunition, also known as ammo, is the material fired, scattered, dropped, or detonated from any weapon or weapon system. The term includes both expendable weapons (e.g., bombs, missiles, grenades, land mines), and the component parts of oth ...
for export purposes ( PGP source code was published as a paper book to bypass these regulations and demonstrate their futility). In 1992, a deal between NSA and SPA allowed export of cryptography based on 40-bit RC2 and RC4 which was considered relatively weak (and especially after SSL was created, there were many contests to break it). The US government had also tried to subvert cryptography through schemes such as Skipjack and key escrow. It was also not widely known that all communications were logged by government agencies (which would later be revealed during the NSA and AT&T scandals) though this was taken as an obvious axiom by list members.
The original cypherpunk mailing list, and the first list spin-off, ''coderpunks'', were originally hosted on John Gilmore's toad.com, but after a falling out with the sysop over moderation, the list was migrated to several cross-linked mail-servers in what was called the "distributed mailing list." The ''coderpunks'' list, open by invitation only, existed for a time. ''Coderpunks'' took up more technical matters and had less discussion of public policy implications. There are several lists today that can trace their lineage directly to the original Cypherpunks list: the cryptography list ([email protected]), the financial cryptography list ([email protected]), and a small group of closed (invitation-only) lists as well.
Toad.com continued to run with the existing subscriber list, those that didn't unsubscribe, and was mirrored on the new distributed mailing list, but messages from the distributed list didn't appear on toad.com. As the list faded in popularity, so too did it fade in the number of cross-linked subscription nodes.
To some extent, the cryptography list acts as a successor to cypherpunks; it has many of the people and continues some of the same discussions. However, it is a moderated list, considerably less zany and somewhat more technical. A number of current systems in use trace to the mailing list, including Pretty Good Privacy
Pretty Good Privacy (PGP) is an encryption software, encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for digital signature, signing, encrypting, and decrypting texts, Email, e-mail ...
, /dev/random
In Unix-like operating systems, and are special files that provide random numbers from a cryptographically secure pseudorandom number generator (CSPRNG). The CSPRNG is seeded with Entropy_(computing), entropy (a value that provides randomness) f ...
in the Linux kernel
The Linux kernel is a Free and open-source software, free and open source Unix-like kernel (operating system), kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds in 1991 and was soon adopted as the k ...
(the actual code has been completely reimplemented several times since then) and today's anonymous remailer
An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anony ...
s.
Main principles
The basic ideas can be found in
A Cypherpunk's Manifesto
' ( Eric Hughes, 1993): "Privacy is necessary for an open society in the electronic age. ... We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy ... We must defend our own privacy if we expect to have any. ... Cypherpunks write code. We know that someone has to write software to defend privacy, and ... we're going to write it."
Some are or were senior people at major hi-tech companies and others are well-known researchers (see list with affiliations below).
The first mass media discussion of cypherpunks was in a 1993 ''Wired
Wired may refer to:
Arts, entertainment, and media Music
* ''Wired'' (Jeff Beck album), 1976
* ''Wired'' (Hugh Cornwell album), 1993
* ''Wired'' (Mallory Knox album), 2017
* "Wired", a song by Prism from their album '' Beat Street''
* "Wired ...
'' article by Steven Levy
Steven Levy (born 1951) is an American journalist and editor at large for '' Wired'' who has written extensively for publications on computers, technology, cryptography, the internet, cybersecurity, and privacy. He is the author of the 1984 boo ...
titled ''Crypto Rebels'':
The three masked men on the cover of that edition of ''Wired'' were prominent cypherpunks Tim May, Eric Hughes and John Gilmore.
Later, Levy wrote a book, ''Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age'',
covering the crypto wars Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, ...
of the 1990s in detail. "Code Rebels" in the title is almost synonymous with cypherpunks.
The term ''cypherpunk'' is mildly ambiguous. In most contexts it means anyone advocating cryptography as a tool for social change, social impact and expression. However, it can also be used to mean a participant in the Cypherpunks electronic mailing list
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.
Mailing lists are often rented or sold. If rented, the renter agrees to use the mailing list only at contra ...
described below
Below may refer to:
*Earth
*Ground (disambiguation)
*Soil
*Floor
* Bottom (disambiguation)
*Less than
*Temperatures below freezing
*Hell or underworld
People with the surname
* Ernst von Below (1863–1955), German World War I general
* Fred Belo ...
. The two meanings obviously overlap, but they are by no means synonymous.
Documents exemplifying cypherpunk ideas include Timothy C. May's ''The Crypto Anarchist Manifesto'' (1992) and ''The Cyphernomicon'' (1994),[ as well as Hughes's] ''A Cypherpunk's Manifesto''.
Privacy of communications
A very basic cypherpunk issue is privacy in communications and data retention
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.
The differe ...
. John Gilmore said he wanted "a guarantee -- with physics and mathematics, not with laws -- that we can give ourselves real privacy of personal communications."
Such guarantees require strong cryptography, so cypherpunks are fundamentally opposed to government policies attempting to control the usage or export of cryptography, which remained an issue throughout the late 1990s. The ''Cypherpunk Manifesto'' stated "Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act."
This was a central issue for many cypherpunks. Most were passionately opposed to various government attempts to limit cryptography— export laws, promotion of limited key length ciphers, and especially escrowed encryption.
Anonymity and pseudonyms
The questions of anonymity
Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
, pseudonym
A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym). This also differs from a new name that entirely or legally replaces an individual's o ...
ity and reputation
The reputation or prestige of a social entity (a person, a social group, an organization, or a place) is an opinion about that entity – typically developed as a result of social evaluation on a set of criteria, such as behavior or performance.
...
were also extensively discussed.
Arguably, the possibility of anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
speech, and publication is vital for an open society and genuine freedom of speech—this is the position of most cypherpunks.
Censorship and monitoring
In general, cypherpunks opposed the censorship and monitoring from government and police.
In particular, the US government's Clipper chip scheme for escrowed encryption of telephone conversations (encryption supposedly secure against most attackers, but breakable by government) was seen as anathema
The word anathema has two main meanings. One is to describe that something or someone is being hated or avoided. The other refers to a formal excommunication by a Christian denomination, church. These meanings come from the New Testament, where a ...
by many on the list. This was an issue that provoked strong opposition and brought many new recruits to the cypherpunk ranks. List participant Matt Blaze
Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the ...
found a serious flaw in the scheme, helping to hasten its demise.
Steven Schear first suggested the warrant canary
A warrant canary is a method by which a communications service provider aims to implicitly inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The wa ...
in 2002 to thwart the secrecy provisions of court order
A court order is an official proclamation by a judge (or panel of judges) that defines the legal relationships between the parties to a hearing, a trial, an appeal or other court proceedings. Such ruling requires or authorizes the carrying o ...
s and national security letters. , warrant canaries are gaining commercial acceptance.
Hiding the act of hiding
An important set of discussions concerns the use of cryptography in the presence of oppressive authorities. As a result, Cypherpunks have discussed and improved steganographic
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
methods that hide the use of crypto itself, or that allow interrogators to believe that they have forcibly extracted hidden information from a subject. For instance, '' Rubberhose'' was a tool that partitioned and intermixed secret data on a drive with fake secret data, each of which accessed via a different password. Interrogators, having extracted a password, are led to believe that they have indeed unlocked the desired secrets, whereas in reality the actual data is still hidden. In other words, even its presence is hidden. Likewise, cypherpunks have also discussed under what conditions encryption may be used without being noticed by network monitoring
Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble. Network monitor ...
systems installed by oppressive regimes.
Activities
As the ''Manifesto'' says, "Cypherpunks write code"; the notion that good ideas need to be implemented, not just discussed, is very much part of the culture of the mailing list
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.
Mailing lists are often rented or sold. If rented, the renter agrees to use the mailing list only at contra ...
. John Gilmore, whose site hosted the original cypherpunks mailing list, wrote: "We are literally in a race between our ability to build and deploy technology, and their ability to build and deploy laws and treaties. Neither side is likely to back down or wise up until it has definitively lost the race."
Software projects
Anonymous remailers such as the Mixmaster Remailer were almost entirely a cypherpunk development. Other cypherpunk-related projects include PGP for email privacy, FreeS/WAN for opportunistic encryption
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt communications channels, otherwise falling back to unencrypted communications. This method requires no pre-arrangement between the two ...
of the whole net, Off-the-record messaging
Off-the-record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of Advanced Encryption Standard, AES symmetric-key algorithm with 128 bits key length, the Diffie–Hel ...
for privacy in Internet chat
Online chat is any direct text-, audio- or video-based (webcams), one-on-one or one-to-many (group) chat (formally also known as synchronous conferencing), using tools such as instant messengers, Internet Relay Chat (IRC), talkers and possibly ...
, and the Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
project for anonymous web surfing.
Hardware
In 1998, the Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
, with assistance from the mailing list, built a $200,000 machine
A machine is a physical system that uses power to apply forces and control movement to perform an action. The term is commonly applied to artificial devices, such as those employing engines or motors, but also to natural biological macromol ...
that could brute-force a Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryp ...
key in a few days. The project demonstrated that DES was, without question, insecure and obsolete, in sharp contrast to the US government's recommendation of the algorithm.
Expert panels
Cypherpunks also participated, along with other experts, in several reports on cryptographic matters.
One such paper was "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security". It suggested 75 bits was the ''minimum'' key size to allow an existing cipher to be considered secure and kept in service. At the time, the Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryp ...
with 56-bit keys was still a US government standard, mandatory for some applications.
Other papers were critical analysis of government schemes. "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption", evaluated escrowed encryption proposals. ''Comments on the Carnivore System Technical Review''. looked at an FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
scheme for monitoring email.
Cypherpunks provided significant input to the 1996 National Research Council report on encryption policy,
''Cryptography's Role In Securing the Information Society'' (CRISIS). This report, commissioned by the U.S. Congress in 1993, was developed via extensive hearings across the nation from all interested stakeholders, by a committee of talented people. It recommended a gradual relaxation of the existing U.S. government restrictions on encryption. Like many such study reports, its conclusions were largely ignored by policy-makers. Later events such as the final rulings in the cypherpunks lawsuits forced a more complete relaxation of the unconstitutional controls on encryption software.
Lawsuits
Cypherpunks have filed a number of lawsuits, mostly suits against the US government alleging that some government action is unconstitutional.
Phil Karn sued the State Department in 1994 over cryptography export controls after they ruled that, while the book ''Applied Cryptography'' could legally be exported, a floppy disk containing a verbatim copy of code printed in the book was legally a munition and required an export permit, which they refused to grant. Karn also appeared before both House and Senate committees looking at cryptography issues.
Daniel J. Bernstein, supported by the EFF, also sued over the export restrictions, arguing that preventing publication of cryptographic source code is an unconstitutional restriction on freedom of speech. He won, effectively overturning the export law. See ''Bernstein v. United States
''Bernstein v. United States'' was a series of court cases filed by Daniel J. Bernstein, then a mathematics Ph.D. student at the University of California, Berkeley, challenging U.S. government restrictions on the export of cryptographic sof ...
'' for details.
Peter Junger
Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption software.
The case, ''Junger v. Daley'' (6t ...
also sued on similar grounds, and won.
Civil disobedience
Cypherpunks encouraged civil disobedience, in particular, US law on the export of cryptography. Until 1997, cryptographic code was legally a munition and fell under ITAR, and the key length restrictions in the EAR was not removed until 2000.
In 1995 Adam Back wrote a version of the RSA algorithm for public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
in three lines of Perl
Perl is a high-level, general-purpose, interpreted, dynamic programming language. Though Perl is not officially an acronym, there are various backronyms in use, including "Practical Extraction and Reporting Language".
Perl was developed ...
and suggested people use it as an email signature file:
# !/bin/perl -sp0777i
Vince Cate">N*1
lK[d2%Sa2/d0$^Ixp", dc`;s/\W//g;$_=pack('H*',/((..)*)$/)
Vince Cate put up a web page that invited anyone to become an international arms trafficker; every time someone clicked on the form, an export-restricted item—originally PGP, later a copy of Back's program—would be mailed from a US server to one in Anguilla.
Cypherpunk fiction
In Neal Stephenson's novel ''Cryptonomicon
''Cryptonomicon'' is a 1999 novel by American author Neal Stephenson, set in two different time periods. One group of characters are World War II–era Allied codebreakers and tactical-deception operatives affiliated with the British Govern ...
'' many characters are on the "Secret Admirers" mailing list. This is fairly obviously based on the cypherpunks list, and several well-known cypherpunks are mentioned in the acknowledgements. Much of the plot revolves around cypherpunk ideas; the leading characters are building a data haven which will allow anonymous financial transactions, and the book is full of cryptography. But, according to the author the book's title is—in spite of its similarity—not based on the Cyphernomicon, an online cypherpunk FAQ document.
Legacy
Cypherpunk achievements would later also be used on the Canadian e-wallet, the MintChip, and the creation of bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
. It was an inspiration for CryptoParty decades later to such an extent that '' A Cypherpunk's Manifesto'' is quoted at the header of its Wiki, and Eric Hughes delivered the keynote address at the Amsterdam CryptoParty on 27 August 2012.
Notable cypherpunks
Cypherpunks list participants included many notable computer industry figures. Most were list regulars, although not all would call themselves "cypherpunks". The following is a list of noteworthy cypherpunks and their achievements:
* Marc Andreessen
Marc Lowell Andreessen ( ; born July 9, 1971) is an American businessman and former software engineer. He is the co-author of Mosaic, the first widely used web browser with a graphical user interface; co-founder of Netscape; and co-founder and ...
: co-founder of Netscape which invented SSL
* Jacob Appelbaum
Jacob Appelbaum (born April 1, 1983) is an American independent journalist, computer security researcher, artist, Hacking (innovation), hacker and teacher. Appelbaum, who earned his PhD from the Eindhoven University of Technology, first became not ...
: Former Tor Project employee, political advocate
An advocate is a professional in the field of law. List of country legal systems, Different countries and legal systems use the term with somewhat differing meanings. The broad equivalent in many English law–based jurisdictions could be a ba ...
* Julian Assange
Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of News leak, leaks from Chels ...
: WikiLeaks
WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
founder, deniable cryptography inventor, journalist; co-author of '' Underground''; author of '' Cypherpunks: Freedom and the Future of the Internet''; member of the International Subversives. Assange has stated that he joined the list in late 1993 or early 1994. An archive of his cypherpunks mailing list posts is at the Mailing List Archives.
* Derek Atkins: computer scientist, computer security expert, and one of the people who factored RSA-129
* Adam Back
Adam Back (born July 1970) is a British cryptographer and cypherpunk. He is the CEO of Blockstream, which he co-founded in 2014. He invented Hashcash, which is used in the bitcoin mining process.
Life
Back was born in London, England, in July ...
: inventor of Hashcash and of NNTP-based Eternity networks; co-founder of Blockstream
Blockstream is a blockchain (database), blockchain technology company led by co-founder Adam Back, headquartered in Victoria, British Columbia, Canada, with offices and staff worldwide. The company develops products and services for the storage an ...
* Jim Bell: author of "Assassination Politics"
* Steven Bellovin: Bell Labs researcher; later Columbia professor; Chief Technologist for the US Federal Trade Commission in 2012
* Matt Blaze
Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the ...
: Bell Labs researcher; later professor at University of Pennsylvania; found flaws in the Clipper Chip
* Eric Blossom: designer of the Starium cryptographically secured mobile phone; founder of the GNU Radio project
* Jon Callas
Jon Callas is an American computer security expert, software engineer, user experience designer, and technologist who is the co-founder and former CTO of the global encrypted communications service Silent Circle.http://www.linkedin.com/in/joncal ...
: technical lead on OpenPGP specification; co-founder and Chief Technical Officer of PGP Corporation; co-founder with Philip Zimmermann of Silent Circle
* Bram Cohen
Bram Cohen is an American computer programmer, best known as the author of the peer-to-peer (P2P) BitTorrent protocol in 2001, as well as the first file sharing program to use the protocol, also known as BitTorrent. He is also the co-founder of ...
: creator of BitTorrent
BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
* Matt Curtin: founder of Interhack Corporation; first faculty advisor of the Ohio State University
The Ohio State University (Ohio State or OSU) is a public university, public Land-grant university, land-grant research university in Columbus, Ohio, United States. A member of the University System of Ohio, it was founded in 1870. It is one ...
Open Source Club; lecturer at Ohio State University
* Hugh Daniel (deceased): former Sun Microsystems employee; manager of the FreeS/WAN project (an early and important freeware IPsec implementation)
* Jack Dorsey
Jack Patrick Dorsey (born November 19, 1976) is an American businessperson, who is a co-founder of Twitter, Inc. and its CEO during 2007–2008 and 2015–2021, as well as co-founder, principal executive officer and chairman of Block, Inc. (deve ...
: Founder of Twitter and Block.
* Suelette Dreyfus: deniable cryptography co-inventor, journalist, co-author of '' Underground''
* Hal Finney (deceased): cryptographer; main author of PGP 2.0 and the core crypto libraries of later versions of PGP; designer of RPOW
* Eva Galperin
Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation (EFF) and technical advisor for the Freedom of the Press Foundation. She is noted for her extensive work in protecting global privacy and free speech and for her ...
: malware researcher and security advocate; Electronic Frontier Foundation activist
* John Gilmore*: Sun Microsystems' fifth employee; co-founder of the Cypherpunks and the Electronic Frontier Foundation; project leader for FreeS/WAN
* Mike Godwin
Michael Wayne Godwin (born October 26, 1956) is an American attorney and author. He was the first staff counsel of the Electronic Frontier Foundation (EFF), and he created the Internet adage Godwin's law and the notion of an Internet meme. From ...
: Electronic Frontier Foundation lawyer; electronic rights advocate
* Ian Goldberg*: professor at University of Waterloo; co-designer of the off-the-record messaging protocol
* Rop Gonggrijp: founder of XS4ALL
XS4ALL was an Internet service provider (ISP) in the Netherlands. It was founded in 1993 as an offshoot of the Hacker (computer security), hackers club Hack-Tic
by Felipe Rodriquez, Rop Gonggrijp, Paul Jongsma and Cor Bosman, while based in Amster ...
; co-creator of the Cryptophone
* Matthew D. Green, influential in the development of the Zcash
Zcash is a privacy-focused cryptocurrency based on Bitcoin's codebase. It shares many similarities, such as a fixed total supply of 21 million units.
Transactions can be transparent, similar to bitcoin transactions, or they can be shielded t ...
system
* Sean Hastings: founding CEO of Havenco
HavenCo Limited was a data haven, data hosting services company, founded in 2000 to operate from Sealand, a unrecognised self-declared principality that occupies HM Fort Roughs off the coast of England.
In November 2008, operations of Haven ...
; co-author of the book ''God Wants You Dead''
* Johan Helsingius: creator and operator of Penet remailer
* Nadia Heninger
Nadia Heninger (born 1982) is an American cryptography, cryptographer, computer security expert, and Computational number theory, computational number theorist at the University of California, San Diego.
Contributions
Heninger is known for her wo ...
: assistant professor at University of Pennsylvania; security researcher
* Robert Hettinga: founder of the International Conference on Financial Cryptography; originator of the idea of Financial cryptography Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial cryptography is distinguished from traditional cryptography in that for most of recorded history, ...
as an applied subset of cryptography
* Mark Horowitz: author of the first PGP key server
* Tim Hudson: co-author of SSLeay, the precursor to OpenSSL
OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end. It is widely used by Internet servers, including the majority of HTTPS web ...
* Eric Hughes: founding member of Cypherpunks; author of '' A Cypherpunk's Manifesto''
* Peter Junger
Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption software.
The case, ''Junger v. Daley'' (6t ...
(deceased): law professor at Case Western Reserve University
* Paul Kocher: president of Cryptography Research, Inc.; co-author of the SSL 3.0 protocol
* Ryan Lackey
Ryan Donald Lackey (born March 17, 1979) is an entrepreneur and computer security professional. He was a co-founder of HavenCo, the world's first data haven, and operated BlueIraq, a communications company. He speaks at numerous conferences and ...
: co-founder of HavenCo
HavenCo Limited was a data haven, data hosting services company, founded in 2000 to operate from Sealand, a unrecognised self-declared principality that occupies HM Fort Roughs off the coast of England.
In November 2008, operations of Haven ...
, the world's first data haven
* Brian LaMacchia
Brian A. LaMacchia is a computer security specialist.
LaMacchia is currently the Executive Director of the MPC Alliance. LaMacchia was previously a Distinguished Engineer at Microsoft and headed the Security and Cryptography team within Microsof ...
: designer of XKMS; research head at Microsoft Research
* Ben Laurie
Ben Laurie is an English software engineer.
Laurie wrote Apache-SSL, the basis of most SSL-enabled versions of the Apache HTTP Server. He developed the MUD ''Gods'', which was innovative in including online creation in its endgame.
Laurie also ...
: founder of The Bunker, core OpenSSL
OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end. It is widely used by Internet servers, including the majority of HTTPS web ...
team member, Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
engineer.
* Jameson Lopp: software engineer, CTO of Casa
* Morgan Marquis-Boire: researcher, security engineer, and privacy activist
* Matt Thomlinson (phantom): security engineer, leader of Microsoft's security efforts on Windows, Azure and Trustworthy Computing, CISO at Electronic Arts
Electronic Arts Inc. (EA) is an American video game company headquartered in Redwood City, California. Founded in May 1982 by former Apple Inc., Apple employee Trip Hawkins, the company was a pioneer of the early home computer game industry ...
* Timothy C. May (deceased): former Assistant Chief Scientist at Intel; author of ''A Crypto Anarchist Manifesto'' and the '' Cyphernomicon''; a founding member of the Cypherpunks mailing list
* Jude Milhon
Judith Milhon (March 12, 1939 – July 19, 2003), best known by her pseudonym St. Jude, was a self-taught programmer, civil rights advocate, writer, editor, advocate for women in computing, hacker and author in the San Francisco Bay Area.
Milho ...
(deceased; aka "St. Jude"): a founding member of the Cypherpunks mailing list
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.
Mailing lists are often rented or sold. If rented, the renter agrees to use the mailing list only at contra ...
, credited with naming the group; co-creator of '' Mondo 2000'' magazine
* Satoshi Nakamoto
Satoshi Nakamoto ( – 26 April 2011) is the name used by the presumed pseudonymous person or persons who developed bitcoin, authored the bitcoin white paper, and created and deployed bitcoin's original reference implementation. As part of the ...
: Pseudonym for the inventor(s) of Bitcoin.
* Sameer Parekh: former CEO of C2Net and co-founder of the CryptoRights Foundation The CryptoRights Foundation, Inc. (CRF) is a 501(c)(3) non-profit organization based in San Francisco. The CryptoRights Foundation helps human rights groups and other NGOs use encryption to protect their online communications. It has contributed to ...
human rights non-profit
* Vipul Ved Prakash: co-founder of Sense/Net; author of ''Vipul's Razor''; founder of Cloudmark
* Runa Sandvik: Tor developer, political advocate
* Len Sassaman
Leonard Harris Sassaman (April 9, 1980 – July 3, 2011) was an American technologist, information privacy advocate, and the maintainer of the Mixmaster anonymous remailer code and operator of the ''randseed'' remailer. Much of his career gravi ...
(deceased): maintainer of the Mixmaster Remailer software; researcher at Katholieke Universiteit Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its main camp ...
; biopunk
Biopunk (a portmanteau of "biotechnology" or "biology" and " punk") is a subgenre of science fiction that focuses on biotechnology. It is derived from cyberpunk, but focuses on the implications of biotechnology rather than mechanical cyberware ...
* Steven Schear: creator of the warrant canary
A warrant canary is a method by which a communications service provider aims to implicitly inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The wa ...
; street performer protocol; founding member of the International Financial Cryptographer's Association and GNURadio; team member at Counterpane; former Director at data security company Cylink and MojoNation
* Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
*: well-known security author; founder of Counterpane
* Richard Stallman
Richard Matthew Stallman ( ; born March 16, 1953), also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to ...
: founder of Free Software Foundation
The Free Software Foundation (FSF) is a 501(c)(3) non-profit organization founded by Richard Stallman on October 4, 1985. The organisation supports the free software movement, with the organization's preference for software being distributed ...
, privacy advocate
* Nick Szabo
Nicholas Szabo is an American computer scientist, legal scholar, and cryptographer known for his research in smart contracts and digital currency.
Personal life
Szabo currently resides in Seattle, Washington and is married to Michelle Szabo.
...
: inventor of smart contracts
A smart contract is a computer program or a transaction protocol that is intended to automatically execute, control or document events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the re ...
; designer of bit gold
Nicholas Szabo is an American computer scientist, legal scholar, and cryptographer known for his research in smart contracts and digital currency.
Personal life
Szabo currently resides in Seattle, Washington and is married to Michelle Szabo.
...
, a precursor to Bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
* Wei Dai
Wei Dai ( zh, c=戴维 or zh, c=戴伟) is a computer engineer known for contributions to cryptography and cryptocurrencies. He developed the Crypto++ cryptographic library, created the b-money cryptocurrency system, and co-proposed the VMAC ...
: Created b-money; cryptocurrency system and co-proposed the VMAC message authentication algorithm. The smallest subunit of Ether, the wei, is named after him.
* Zooko Wilcox-O'Hearn: DigiCash
DigiCash Inc. was an electronic money corporation founded by David Chaum in 1989. DigiCash transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder. DigiCash declared bankruptcy in ...
and MojoNation developer; founder of Zcash
Zcash is a privacy-focused cryptocurrency based on Bitcoin's codebase. It shares many similarities, such as a fixed total supply of 21 million units.
Transactions can be transparent, similar to bitcoin transactions, or they can be shielded t ...
; co-designer of Tahoe-LAFS
Tahoe-LAFS (Tahoe Least-Authority File Store) is a free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. It can be used as an online backup system, or to serve as a file or Web host similar ...
* Jillian C. York: Director of International Freedom of Expression at the Electronic Frontier Foundation (EFF)
* John Young: anti-secrecy activist and co-founder of Cryptome
* Philip Zimmermann: original creator of PGP v1.0 (1991); co-founder of PGP Inc. (1996); co-founder with Jon Callas of Silent Circle
* Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs.
Born in 1983 in Elizabeth ...
: NSA whistleblower (2013); President of the Freedom of the Press Foundation
Freedom of the Press Foundation (FPF) is an American non-profit organization founded in 2012 to fund and support free speech and freedom of the press. The organization originally managed crowd-funding campaigns for independent journalistic organ ...
* indicates someone mentioned in the acknowledgements of Stephenson's ''Cryptonomicon.''
See also
* Anti-computer forensics
References
:
Further reading
*
*
{{Cryptographic software
Punk
Internet privacy