HOME

TheInfoList



OR:

A cypherpunk is any individual advocating widespread use of strong
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks
electronic mailing list A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The term is often extended to include the people subscribed to such a list, so the group of subscribers is re ...
, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.


History


Before the mailing list

Until about the 1970s,
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
was mainly practiced in secret by military or spy agencies. However, that changed when two publications brought it into public awareness: the US government publication of the
Data Encryption Standard The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cr ...
(DES), a
block cipher In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
which became very widely used, and the first publicly available work on
public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
, by Whitfield Diffie and
Martin Hellman Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his involvement with public key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to ...
. The technical roots of Cypherpunk ideas have been traced back to work by cryptographer
David Chaum David Lee Chaum (born 1955) is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertatio ...
on topics such as anonymous digital cash and pseudonymous reputation systems, described in his paper "Security without Identification: Transaction Systems to Make Big Brother Obsolete" (1985).Arvind Narayanan
What Happened to the Crypto Dream?, Part 1
. IEEE Security & Privacy. Volume 11, Issue 2, March–April 2013, pages 75-76, ISSN 1540-7993
In the late 1980s, these ideas coalesced into something like a movement.


Etymology and the Cypherpunks mailing list

In late 1992, Eric Hughes,
Timothy C. May Timothy C. May, better known as Tim May (December 21, 1951 – December 13, 2018) was an American technical and political writer, and electronic engineer and senior scientist at Intel. May was also the founder of the crypto-anarchist movement. He ...
, and
John Gilmore John Gilmore may refer to: * John Gilmore (activist) (born 1955), co-founder of the Electronic Frontier Foundation and Cygnus Solutions * John Gilmore (musician) (1931–1995), American jazz saxophonist * John Gilmore (representative) (1780–1845) ...
founded a small group that met monthly at Gilmore's company
Cygnus Solutions Cygnus Solutions, originally Cygnus Support, was founded in 1989 by John Gilmore, Michael Tiemann and David Henkel-Wallace to provide commercial support for free software. Its tagline was: ''Making free software affordable''. For years, employ ...
in the
San Francisco Bay Area The San Francisco Bay Area, often referred to as simply the Bay Area, is a populous region surrounding the San Francisco, San Pablo, and Suisun Bay estuaries in Northern California. The Bay Area is defined by the Association of Bay Area Gov ...
and was humorously termed ''cypherpunks'' by
Jude Milhon Judith udeMilhon (March 12, 1939 – July 19, 2003), in Washington D.C., best known by her pseudonym St. Jude, was a self-taught programmer, civil rights advocate, writer, editor, advocate for women in computing, hacker and author in the ...
at one of the first meetings – derived from ''
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
'' and ''
cyberpunk Cyberpunk is a subgenre of science fiction in a dystopian Futurism, futuristic setting that tends to focus on a "combination of low-life, lowlife and high tech", featuring futuristic technological and scientific achievements, such as artificial in ...
''.
Robert Manne Robert Michael Manne (born 31 October 1947) is an Emeritus Professor of politics and Vice-Chancellor's Fellow at La Trobe University, Melbourne, Australia. He is a leading Australian public intellectual. Background Robert Manne was born in Melbo ...

The Cypherpunk Revolutionary - Julian Assange
.
The Monthly ''The Monthly'' is an Australian national magazine of politics, society and the arts, which is published eleven times per year on a monthly basis except the December/January issue. Founded in 2005, it is published by Melbourne property developer ...
March, 2011, No. 65
In November 2006, the word was added to the
Oxford English Dictionary The ''Oxford English Dictionary'' (''OED'') is the first and foundational historical dictionary of the English language, published by Oxford University Press (OUP). It traces the historical development of the English language, providing a com ...
. The Cypherpunks mailing list was started in 1992, and by 1994 had 700 subscribers. At its peak, it was a very active forum with technical discussions ranging over mathematics, cryptography, computer science, political and philosophical discussion, personal arguments and attacks, etc., with some spam thrown in. An email from
John Gilmore John Gilmore may refer to: * John Gilmore (activist) (born 1955), co-founder of the Electronic Frontier Foundation and Cygnus Solutions * John Gilmore (musician) (1931–1995), American jazz saxophonist * John Gilmore (representative) (1780–1845) ...
reports an average of 30 messages a day from December 1, 1996 to March 1, 1999, and suggests that the number was probably higher earlier. The number of subscribers is estimated to have reached 2000 in the year 1997. In early 1997, Jim Choate and Igor Chudov set up the Cypherpunks Distributed Remailer,Jim Choate:
Cypherpunks Distributed Remailer
". Cypherpunks mailing list. February 1997.
a network of independent mailing list nodes intended to eliminate the
single point of failure A single point of failure (SPOF) is a part of a system that, if it fails, will stop the entire system from working. SPOFs are undesirable in any system with a goal of high availability or reliability, be it a business practice, software appl ...
inherent in a centralized list architecture. At its peak, the Cypherpunks Distributed Remailer included at least seven nodes. By mid-2005, al-qaeda.net ran the only remaining node. In mid-2013, following a brief outage, the al-qaeda.net node's list software was changed from
Majordomo A majordomo is a person who speaks, makes arrangements, or takes charge for another. Typically, this is the highest (''major'') person of a household (''domūs'' or ''domicile'') staff, a head servant who acts on behalf of the owner of a large ...
to
GNU Mailman GNU () is an extensive collection of free software (383 packages as of January 2022), which can be used as an operating system or can be used in parts with other operating systems. The use of the completed GNU tools led to the family of operat ...
,Riad S. Wahby:
back on the airwaves
". Cypherpunks mailing list. July 2013.
and subsequently the node was renamed to cpunks.org.Riad S. Wahby:

". Cypherpunks mailing list. July 2013.
The CDR architecture is now defunct, though the list administrator stated in 2013 that he was exploring a way to integrate this functionality with the new mailing list software. For a time, the cypherpunks mailing list was a popular tool with mailbombers, who would subscribe a victim to the mailing list in order to cause a deluge of messages to be sent to him or her. (This was usually done as a prank, in contrast to the style of terrorist referred to as a mailbomber.) This precipitated the mailing list sysop(s) to institute a reply-to-subscribe system. Approximately two hundred messages a day was typical for the mailing list, divided between personal arguments and attacks, political discussion, technical discussion, and early spam. The cypherpunks mailing list had extensive discussions of the public policy issues related to cryptography and on the politics and philosophy of concepts such as anonymity, pseudonyms, reputation, and privacy. These discussions continue both on the remaining node and elsewhere as the list has become increasingly moribund. Events such as the
GURPS Cyberpunk ''GURPS Cyberpunk'' is a genre toolkit for cyberpunk-themed role-playing games set in a near-future dystopia, such as that envisioned by William Gibson in his influential novel ''Neuromancer''. It was published in 1990 after a significant delay c ...
raid lent weight to the idea that private individuals needed to take steps to protect their privacy. In its heyday, the list discussed public policy issues related to cryptography, as well as more practical nuts-and-bolts mathematical, computational, technological, and cryptographic matters. The list had a range of viewpoints and there was probably no completely unanimous agreement on anything. The general attitude, though, definitely put personal privacy and personal liberty above all other considerations.


Early discussion of online privacy

The list was discussing questions about privacy, government monitoring, corporate control of information, and related issues in the early 1990s that did not become major topics for broader discussion until at least ten years later. Some list participants were highly radical on these issues. Those wishing to understand the context of the list might refer to the history of cryptography; in the early 1990s, the US government considered cryptography software a
munition Ammunition (informally ammo) is the material fired, scattered, dropped, or detonated from any weapon or weapon system. Ammunition is both expendable weapons (e.g., bombs, missiles, grenades, land mines) and the component parts of other weapo ...
for export purposes. (
PGP PGP or Pgp may refer to: Science and technology * P-glycoprotein, a type of protein * Pelvic girdle pain, a pregnancy discomfort * Personal Genome Project, to sequence genomes and medical records * Pretty Good Privacy, a computer program for the ...
source code was published as a paper book to bypass these regulations and demonstrate their futility.) In 1992, a deal between NSA and SPA allowed export of cryptography based on 40-bit RC2 and RC4 which was considered relatively weak (and especially after SSL was created, there were many contests to break it). The US government had also tried to subvert cryptography through schemes such as Skipjack and key escrow. It was also not widely known that all communications were logged by government agencies (which would later be revealed during the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
and AT&T scandals) though this was taken as an obvious axiom by list members. The original cypherpunk mailing list, and the first list spin-off, ''coderpunks'', were originally hosted on
John Gilmore John Gilmore may refer to: * John Gilmore (activist) (born 1955), co-founder of the Electronic Frontier Foundation and Cygnus Solutions * John Gilmore (musician) (1931–1995), American jazz saxophonist * John Gilmore (representative) (1780–1845) ...
's toad.com, but after a falling out with the sysop over moderation, the list was migrated to several cross-linked mail-servers in what was called the "distributed mailing list." The ''coderpunks'' list, open by invitation only, existed for a time. ''Coderpunks'' took up more technical matters and had less discussion of public policy implications. There are several lists today that can trace their lineage directly to the original Cypherpunks list: the cryptography list ([email protected]), the financial cryptography list ([email protected]), and a small group of closed (invitation-only) lists as well. Toad.com continued to run with the existing subscriber list, those that didn't unsubscribe, and was mirrored on the new distributed mailing list, but messages from the distributed list didn't appear on toad.com. As the list faded in popularity, so too did it fade in the number of cross-linked subscription nodes. To some extent, the cryptography list acts as a successor to cypherpunks; it has many of the people and continues some of the same discussions. However, it is a moderated list, considerably less zany and somewhat more technical. A number of current systems in use trace to the mailing list, including
Pretty Good Privacy Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk part ...
,
/dev/random In Unix-like operating systems, and are special files that serve as cryptographically secure pseudorandom number generators. They allow access to environmental noise collected from device drivers and other sources. typically blocked if there ...
in the
Linux kernel The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel. It was originally authored in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU ...
(the actual code has been completely reimplemented several times since then) and today's
anonymous remailer An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anonym ...
s.


Main principles

The basic ideas can be found in ''A Cypherpunk's Manifesto'' ( Eric Hughes, 1993): "Privacy is necessary for an open society in the electronic age. ... We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy ... We must defend our own privacy if we expect to have any. ... Cypherpunks write code. We know that someone has to write software to defend privacy, and ... we're going to write it." Some are or were senior people at major hi-tech companies and others are well-known researchers (see list with affiliations below). The first mass media discussion of cypherpunks was in a 1993 ''
Wired ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San Fran ...
'' article by
Steven Levy Steven Levy (born 1951) is an American journalist and Editor at Large for '' Wired'' who has written extensively for publications on computers, technology, cryptography, the internet, cybersecurity, and privacy. He is the author of the 1984 boo ...
titled ''Crypto Rebels'': The three masked men on the cover of that edition of ''Wired'' were prominent cypherpunks Tim May, Eric Hughes and
John Gilmore John Gilmore may refer to: * John Gilmore (activist) (born 1955), co-founder of the Electronic Frontier Foundation and Cygnus Solutions * John Gilmore (musician) (1931–1995), American jazz saxophonist * John Gilmore (representative) (1780–1845) ...
. Later, Levy wrote a book, ''Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age'', covering the
crypto wars Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencie ...
of the 1990s in detail. "Code Rebels" in the title is almost synonymous with cypherpunks. The term ''cypherpunk'' is mildly ambiguous. In most contexts it means anyone advocating cryptography as a tool for social change, social impact and expression. However, it can also be used to mean a participant in the Cypherpunks
electronic mailing list A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The term is often extended to include the people subscribed to such a list, so the group of subscribers is re ...
described
below Below may refer to: *Earth * Ground (disambiguation) * Soil * Floor * Bottom (disambiguation) * Less than *Temperatures below freezing * Hell or underworld People with the surname * Ernst von Below (1863–1955), German World War I general * Fr ...
. The two meanings obviously overlap, but they are by no means synonymous. Documents exemplifying cypherpunk ideas include Timothy C. May's ''The Crypto Anarchist Manifesto'' (1992) and ''The
Cyphernomicon Timothy C. May, better known as Tim May (December 21, 1951 – December 13, 2018) was an American technical and political writer, and electronic engineer and senior scientist at Intel. May was also the founder of the crypto-anarchist movement. He ...
'' (1994), as well as Hughes's ''A Cypherpunk's Manifesto''.


Privacy of communications

A very basic cypherpunk issue is privacy in communications and
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different ...
. John Gilmore said he wanted "a guarantee -- with physics and mathematics, not with laws -- that we can give ourselves real privacy of personal communications." Such guarantees require
strong cryptography Strong cryptography or cryptographically strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis. Demonstrating the resistance of any cryptographic scheme to attack is a co ...
, so cypherpunks are fundamentally opposed to government policies attempting to control the usage or export of cryptography, which remained an issue throughout the late 1990s. The ''Cypherpunk Manifesto'' stated "Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act." This was a central issue for many cypherpunks. Most were passionately opposed to various government attempts to limit cryptography — export laws, promotion of limited key length ciphers, and especially
escrowed encryption Key escrow (also known as a "fair" cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third pa ...
.


Anonymity and pseudonyms

The questions of anonymity,
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
ity and
reputation The reputation of a social entity (a person, a social group, an organization, or a place) is an opinion about that entity typically as a result of social evaluation on a set of criteria, such as behavior or performance. Reputation is a ubiquitou ...
were also extensively discussed. Arguably, the possibility of
anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
speech, and publication is vital for an open society and genuine freedom of speech — this is the position of most cypherpunks. That the
Federalist Papers ''The Federalist Papers'' is a collection of 85 articles and essays written by Alexander Hamilton, James Madison, and John Jay under the collective pseudonym "Publius" to promote the ratification of the Constitution of the United States. The ...
were originally published under a pseudonym is a commonly-cited example.


Censorship and monitoring

In general, cypherpunks opposed the censorship and monitoring from government and police. In particular, the US government's
Clipper chip The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor that was intended to "allow Federal, Sta ...
scheme for
escrowed encryption Key escrow (also known as a "fair" cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third pa ...
of telephone conversations (encryption supposedly secure against most attackers, but breakable by government) was seen as
anathema Anathema, in common usage, is something or someone detested or shunned. In its other main usage, it is a formal excommunication. The latter meaning, its ecclesiastical sense, is based on New Testament usage. In the Old Testament, anathema was a ...
by many on the list. This was an issue that provoked strong opposition and brought many new recruits to the cypherpunk ranks. List participant
Matt Blaze Matt may refer to: *Matt (name), people with the given name ''Matt'' or Matthew, meaning "gift from God", or the surname Matt *In British English, of a surface: having a non-glossy finish, see gloss (material appearance) *Matt, Switzerland, a mu ...
found a serious flaw in the scheme, helping to hasten its demise. Steven Schear first suggested the
warrant canary A warrant canary is a method by which a communications service provider aims to inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The warrant canar ...
in 2002 to thwart the secrecy provisions of
court order A court order is an official proclamation by a judge (or panel of judges) that defines the legal relationships between the parties to a hearing, a trial, an appeal or other court proceedings. Such ruling requires or authorizes the carrying out ...
s and
national security letters A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Cre ...
. , warrant canaries are gaining commercial acceptance.


Hiding the act of hiding

An important set of discussions concerns the use of cryptography in the presence of oppressive authorities. As a result, Cypherpunks have discussed and improved
steganographic Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
methods that hide the use of crypto itself, or that allow interrogators to believe that they have forcibly extracted hidden information from a subject. For instance, '' Rubberhose'' was a tool that partitioned and intermixed secret data on a drive with fake secret data, each of which accessed via a different password. Interrogators, having extracted a password, are led to believe that they have indeed unlocked the desired secrets, whereas in reality the actual data is still hidden. In other words, even its presence is hidden. Likewise, cypherpunks have also discussed under what conditions encryption may be used without being noticed by
network monitoring Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble. Network monitorin ...
systems installed by oppressive regimes.


Activities

As the ''Manifesto'' says, "Cypherpunks write code"; the notion that good ideas need to be implemented, not just discussed, is very much part of the culture of the mailing list.
John Gilmore John Gilmore may refer to: * John Gilmore (activist) (born 1955), co-founder of the Electronic Frontier Foundation and Cygnus Solutions * John Gilmore (musician) (1931–1995), American jazz saxophonist * John Gilmore (representative) (1780–1845) ...
, whose site hosted the original cypherpunks mailing list, wrote: "We are literally in a race between our ability to build and deploy technology, and their ability to build and deploy laws and treaties. Neither side is likely to back down or wise up until it has definitively lost the race."


Software projects

Anonymous remailers such as the Mixmaster Remailer were almost entirely a cypherpunk development. Among the other projects they have been involved in were
PGP PGP or Pgp may refer to: Science and technology * P-glycoprotein, a type of protein * Pelvic girdle pain, a pregnancy discomfort * Personal Genome Project, to sequence genomes and medical records * Pretty Good Privacy, a computer program for the ...
for email privacy,
FreeS/WAN FreeS/WAN, for Free Secure Wide-Area Networking, was a free software project, which implemented a reference version of the IPsec network security layer for Linux. The project goal of ubiquitous opportunistic encryption of Internet traffic ...
for
opportunistic encryption Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt communications channels, otherwise falling back to unencrypted communications. This method requires no pre-arrangement between the two ...
of the whole net,
Off-the-record messaging Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bi ...
for privacy in
Internet chat Online chat may refer to any kind of communication over the Internet that offers a real-time transmission of text messages from sender to receiver. Chat messages are generally short in order to enable other participants to respond quickly. Ther ...
, and the
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia S ...
project for anonymous web surfing.


Hardware

In 1998, the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
, with assistance from the mailing list, built a $200,000 machine that could brute-force a
Data Encryption Standard The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cr ...
key in a few days. The project demonstrated that DES was, without question, insecure and obsolete, in sharp contrast to the US government's recommendation of the algorithm.


Expert panels

Cypherpunks also participated, along with other experts, in several reports on cryptographic matters. One such paper was "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security". It suggested 75 bits was the ''minimum'' key size to allow an existing cipher to be considered secure and kept in service. At the time, the
Data Encryption Standard The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cr ...
with 56-bit keys was still a US government standard, mandatory for some applications. Other papers were critical analysis of government schemes. "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption", evaluated
escrowed encryption Key escrow (also known as a "fair" cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third pa ...
proposals. ''Comments on the Carnivore System Technical Review''. looked at an
FBI The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
scheme for monitoring email. Cypherpunks provided significant input to the 1996
National Research Council National Research Council may refer to: * National Research Council (Canada), sponsoring research and development * National Research Council (Italy), scientific and technological research, Rome * National Research Council (United States), part of ...
report on encryption policy, ''Cryptography's Role In Securing the Information Society'' (CRISIS). This report, commissioned by the U.S. Congress in 1993, was developed via extensive hearings across the nation from all interested stakeholders, by a committee of talented people. It recommended a gradual relaxation of the existing U.S. government restrictions on encryption. Like many such study reports, its conclusions were largely ignored by policy-makers. Later events such as the final rulings in the cypherpunks lawsuits forced a more complete relaxation of the unconstitutional controls on encryption software.


Lawsuits

Cypherpunks have filed a number of lawsuits, mostly suits against the US government alleging that some government action is unconstitutional.
Phil Karn Phil Karn (born October 4, 1956) is a retired American engineer from Lutherville, Maryland. He earned a bachelor's degree in electrical engineering from Cornell University in 1978 and a master's degree in electrical engineering from Carnegie Mell ...
sued the State Department in 1994 over cryptography export controls after they ruled that, while the book ''Applied Cryptography'' could legally be exported, a floppy disk containing a verbatim copy of code printed in the book was legally a munition and required an export permit, which they refused to grant. Karn also appeared before both House and Senate committees looking at cryptography issues.
Daniel J. Bernstein Daniel Julius Bernstein (sometimes known as djb; born October 29, 1971) is an American German mathematician, cryptologist, and computer scientist. He is a visiting professor at CASA at Ruhr University Bochum, as well as a research professor of ...
, supported by the
EFF EFF or eff may refer to: Politics * Economic Freedom Fighters, a South African communist political party * Economic Freedom Fund, an American political organization * Election Fighting Fund, a British suffragist organization supporting the early ...
, also sued over the export restrictions, arguing that preventing publication of cryptographic source code is an unconstitutional restriction on freedom of speech. He won, effectively overturning the export law. See ''
Bernstein v. United States ''Bernstein v. United States'' is a set of court cases brought by Daniel J. Bernstein challenging restrictions on the export of cryptography from the United States. History The case was first brought in 1995, when Bernstein was a student at ...
'' for details.
Peter Junger Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption software. The case, '' Junger v. Daley'' (6t ...
also sued on similar grounds, and won.


Civil disobedience

Cypherpunks encouraged civil disobedience, in particular, US law on the export of cryptography. Until 1997, cryptographic code was legally a munition and fall until ITAR, and the key length restrictions in the EAR was not removed until 2000. In 1995 Adam Back wrote a version of the
RSA RSA may refer to: Organizations Academia and education * Rabbinical Seminary of America, a yeshiva in New York City *Regional Science Association International (formerly the Regional Science Association), a US-based learned society *Renaissance S ...
algorithm for
public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
in three lines of
Perl Perl is a family of two High-level programming language, high-level, General-purpose programming language, general-purpose, Interpreter (computing), interpreted, dynamic programming languages. "Perl" refers to Perl 5, but from 2000 to 2019 it ...
and suggested people use it as an email signature file: #!/bin/perl -sp0777i Vince Cate">N*1 lK[d2%Sa2/d0$^Ixp", dc`;s/\W//g;$_=pack('H*',/((..)*)$/) Vince Cate put up a web page that invited anyone to become an international arms trafficker; every time someone clicked on the form, an export-restricted item — originally
PGP PGP or Pgp may refer to: Science and technology * P-glycoprotein, a type of protein * Pelvic girdle pain, a pregnancy discomfort * Personal Genome Project, to sequence genomes and medical records * Pretty Good Privacy, a computer program for the ...
, later a copy of Back's program — would be mailed from a US server to one in Anguilla.


Cypherpunk fiction

In Neal Stephenson's novel ''
Cryptonomicon ''Cryptonomicon'' is a 1999 novel by American author Neal Stephenson, set in two different time periods. One group of characters are World War II-era Allied codebreakers and tactical-deception operatives affiliated with the Government Code a ...
'' many characters are on the "Secret Admirers" mailing list. This is fairly obviously based on the cypherpunks list, and several well-known cypherpunks are mentioned in the acknowledgements. Much of the plot revolves around cypherpunk ideas; the leading characters are building a data haven which will allow anonymous financial transactions, and the book is full of cryptography. But, according to the author the book's title is — in spite of its similarity — not based on the Cyphernomicon, an online cypherpunk FAQ document.


Legacy

Cypherpunk achievements would later also be used on the Canadian e-wallet, the
MintChip MintChip is a Electronic money, digital currency that provides the underlying system to facilitate the exchange of value between consumers and merchants in real-time. It was designed to reduce the cost and risk of financial transactions. This te ...
, and the creation of
bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public di ...
. It was an inspiration for
CryptoParty CryptoParty (Crypto-Party) is a grassroots global endeavour to introduce the basics of practical cryptography such as the Tor anonymity network, I2P, Freenet, key signing parties, disk encryption and virtual private networks to the general public. ...
decades later to such an extent that the ''Cypherpunk Manifesto'' is quoted at the header of its Wiki, and Eric Hughes delivered the keynote address at the Amsterdam CryptoParty on 27 August 2012.


Notable cypherpunks

Cypherpunks list participants included many notable computer industry figures. Most were list regulars, although not all would call themselves "cypherpunks". The following is a list of noteworthy cypherpunks and their achievements: *
Marc Andreessen Marc Lowell Andreessen ( ; born July 9, 1971) is an American entrepreneur, investor, and software engineer. He is the co-author of Mosaic, the first widely used web browser; co-founder of Netscape; and co-founder and general partner of Silicon ...
: co-founder of Netscape which invented SSL *
Jacob Appelbaum Jacob Appelbaum (born 1 April 1983) is an American independent journalist, computer security researcher, artist, and hacker. He studied at the Eindhoven University of Technology and was a core member of the Tor project, a free software network ...
: Former
Tor Project Tor, short for The Onion Router, is free and open-source software for enabling Anonymity, anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relay ...
employee, political advocate *
Julian Assange Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army i ...
:
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
founder, deniable cryptography inventor, journalist; co-author of ''
Underground Underground most commonly refers to: * Subterranea (geography), the regions beneath the surface of the Earth Underground may also refer to: Places * The Underground (Boston), a music club in the Allston neighborhood of Boston * The Underground ( ...
''; author of '' Cypherpunks: Freedom and the Future of the Internet''; member of the International Subversives. Assange has stated that he joined the list in late 1993 or early 1994. An archive of his cypherpunks mailing list posts is at the Mailing List Archives. *
Derek Atkins Derek A Atkins is a computer scientist specializing in computer security. He studied electrical engineering and computer science at the Massachusetts Institute of Technology. In June 2014, he became the chief technology officer of SecureRF. At ...
: computer scientist, computer security expert, and one of the people who factored RSA-129 *
Adam Back Adam Back (born July 1970) is a British cryptographer and cypherpunk. He is the CEO of Blockstream, which he co-founded in 2014. He invented Hashcash, which is used in the Bitcoin mining process. Life Back was born in London, England, in ...
: inventor of
Hashcash Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm. Hashcash was proposed in 1997 by Ada ...
and of NNTP-based Eternity networks; co-founder of
Blockstream Blockstream is a blockchain technology company led by co-founder Adam Back, headquartered in Victoria, Canada, with offices and staff worldwide. The company develops a range of products and services for the storage and transfer of Bitcoin and oth ...
*
Jim Bell James Dalton Bell (born 1958) is an American crypto-anarchist who created the idea of arranging for anonymously sponsored assassination payments via the Internet, which he called "assassination politics". He was imprisoned on felony charges of ...
: author of "Assassination Politics" *
Steven Bellovin Steven M. Bellovin is a researcher on computer networking and security. He has been a professor in the Computer Science department at Columbia University since 2005. Previously, Bellovin was a Fellow at AT&T Labs Research in Florham Park, New Jers ...
: Bell Labs researcher; later Columbia professor; Chief Technologist for the US Federal Trade Commission in 2012 *
Matt Blaze Matt may refer to: *Matt (name), people with the given name ''Matt'' or Matthew, meaning "gift from God", or the surname Matt *In British English, of a surface: having a non-glossy finish, see gloss (material appearance) *Matt, Switzerland, a mu ...
: Bell Labs researcher; later professor at University of Pennsylvania; found flaws in the
Clipper Chip The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor that was intended to "allow Federal, Sta ...
*
Eric Blossom Eric Blossom is the founder of the GNU Radio project. GNU Radio is a free software toolkit for building software-defined radio and signal processing Signal processing is an electrical engineering subfield that focuses on analyzing, modifying ...
: designer of the Starium cryptographically secured mobile phone; founder of the
GNU Radio GNU Radio is a free software development toolkit that provides signal processing blocks to implement software-defined radios and signal-processing systems. It can be used with external RF hardware to create software-defined radios, or without ha ...
project *
Jon Callas Jon Callas is an American computer security expert, software engineer, user experience designer, and technologist who is the co-founder and former CTO of the global encrypted communications service Silent Circle.http://www.linkedin.com/in/joncall ...
: technical lead on OpenPGP specification; co-founder and Chief Technical Officer of PGP Corporation; co-founder with Philip Zimmermann of
Silent Circle Silent Circle is a German Eurodisco band formed in West Germany in 1985. The band consists of vocalist Martin Tychsen (Jo Jo Tyson), keyboardist & composer Axel Breitung, and drummer Jürgen Behrens (CC Behrens). History Silent Circle first ...
*
Bram Cohen Bram Cohen is an American computer programmer, best known as the author of the peer-to-peer (P2P) BitTorrent protocol in 2001, as well as the first file sharing program to use the protocol, also known as BitTorrent. He is also the co-founder of ...
: creator of BitTorrent *
Matt Curtin Matt Curtin (born 1973) is a computer scientist and entrepreneur in Columbus, Ohio Columbus () is the state capital and the most populous city in the U.S. state of Ohio. With a 2020 census population of 905,748, it is the 14th-most pop ...
: founder of Interhack Corporation; first faculty advisor of the
Ohio State University The Ohio State University, commonly called Ohio State or OSU, is a public land-grant research university in Columbus, Ohio. A member of the University System of Ohio, it has been ranked by major institutional rankings among the best pu ...
Open Source Club; lecturer at Ohio State University * Hugh Daniel (deceased): former Sun Microsystems employee; manager of the FreeS/WAN project (an early and important freeware
IPsec In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in ...
implementation) *
Suelette Dreyfus Suelette Dreyfus is a technology researcher, journalist, and writer. Her fields of research include information systems, digital security and privacy, the impact of technology on whistleblowing, health informatics and e-education. Her work exa ...
: deniable cryptography co-inventor, journalist, co-author of ''
Underground Underground most commonly refers to: * Subterranea (geography), the regions beneath the surface of the Earth Underground may also refer to: Places * The Underground (Boston), a music club in the Allston neighborhood of Boston * The Underground ( ...
'' * Hal Finney (deceased): cryptographer; main author of PGP 2.0 and the core crypto libraries of later versions of PGP; designer of RPOW *
Eva Galperin Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation (EFF) and technical advisor for the Freedom of the Press Foundation. She is noted for her extensive work in protecting global privacy and free speech and for her r ...
: malware researcher and security advocate; Electronic Frontier Foundation activist *
John Gilmore John Gilmore may refer to: * John Gilmore (activist) (born 1955), co-founder of the Electronic Frontier Foundation and Cygnus Solutions * John Gilmore (musician) (1931–1995), American jazz saxophonist * John Gilmore (representative) (1780–1845) ...
*: Sun Microsystems' fifth employee; co-founder of the Cypherpunks and the Electronic Frontier Foundation; project leader for FreeS/WAN *
Mike Godwin Michael Wayne Godwin (born October 26, 1956) is an American attorney and author. He was the first staff counsel of the Electronic Frontier Foundation (EFF), and he created the Internet adage Godwin's law and the notion of an Internet meme, as rep ...
: Electronic Frontier Foundation lawyer; electronic rights advocate *
Ian Goldberg Ian Avrum Goldberg (born March 31, 1973) is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL (with David Wagner), and for his role as chief scientist of Radialpoint (formerly Zero Knowledge Sys ...
*: professor at University of Waterloo; co-designer of the off-the-record messaging protocol *
Rop Gonggrijp Robbert (Rop) Valentijn Gonggrijp (born 14 February 1968) is a Dutch hacker and one of the founders of XS4ALL. Biography Gonggrijp was born in Amsterdam. While growing up in Wormer in the Dutch Zaanstreek area, he became known as a teenage hack ...
: founder of XS4ALL; co-creator of the Cryptophone *
Matthew D. Green Matthew Daniel Green (born 1976) is an American cryptographer and security technologist. Green is an Associate Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enha ...
, influential in the development of the Zcash system *
Sean Hastings Sean Hastings (born 1969) is an entrepreneur, cypherpunk author, and security expert. He is best known for being the founding CEO of HavenCo, the world's first formal data haven. Work In 1997, Hastings worked on cryptographic protocols and too ...
: founding CEO of
Havenco HavenCo Limited was a data haven, data hosting services company, founded in 2000 to operate from Sealand, a self-declared sovereign principality that occupies a man-made former World War II defensive facility originally known as Roughs Tower l ...
; co-author of the book ''God Wants You Dead'' *
Johan Helsingius Johan "Julf" Helsingius, born in 1961 in Helsinki, Finland, started and ran the Anon.penet.fi internet remailer. Background Anon.penet.fi was one of the most popular anonymous remailers, handling 10,000 messages a day. The server was the first of i ...
: creator and operator of
Penet remailer The Penet remailer () was a pseudonymous remailer operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. Its initial creation stemmed from an argument in a Finnish newsgroup over whether people should be required to tie their real na ...
*
Nadia Heninger Nadia Heninger (born 1982) is an American cryptographer, computer security expert, and computational number theorist at the University of California, San Diego. Contributions Heninger is known for her work on freezing powered-down security devic ...
: assistant professor at University of Pennsylvania; security researcher *
Robert Hettinga Robert Hettinga, is a technical and political writer with a focus on financial cryptography. Robert was well known for his postings on the Cypherpunk and e$ and e$pam mailing list and founded the Internet Bearer Underwriting Corporation (IBUC). ...
: founder of the International Conference on Financial Cryptography; originator of the idea of
Financial cryptography Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial cryptography is distinguished from traditional cryptography in that for most of recorded history, ...
as an applied subset of cryptography *
Mark Horowitz Mark A. Horowitz is the Yahoo! Founders Professor in the School of Engineering at Stanford University and holds a joint appointment in the Electrical Engineering and Computer Science department. He is a co-founder of Rambus Inc., now a techno ...
: author of the first PGP key server * Tim Hudson: co-author of SSLeay, the precursor to
OpenSSL OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping or need to identify the party at the other end. It is widely used by Internet servers, including the majority of HT ...
* Eric Hughes: founding member of Cypherpunks; author of ''
A Cypherpunk's Manifesto A, or a, is the first letter and the first vowel of the Latin alphabet, used in the modern English alphabet, the alphabets of other western European languages and others worldwide. Its name in English is ''a'' (pronounced ), plural ''aes'' ...
'' *
Peter Junger Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption software. The case, '' Junger v. Daley'' (6t ...
(deceased): law professor at Case Western Reserve University * Paul Kocher: president of Cryptography Research, Inc.; co-author of the SSL 3.0 protocol *
Ryan Lackey Ryan Donald Lackey (born March 17, 1979) is an entrepreneur and computer security professional. He was a co-founder of HavenCo, the world's first data haven, and operated BlueIraq, a communications company. He speaks at numerous conferences and ...
: co-founder of
HavenCo HavenCo Limited was a data haven, data hosting services company, founded in 2000 to operate from Sealand, a self-declared sovereign principality that occupies a man-made former World War II defensive facility originally known as Roughs Tower l ...
, the world's first
data haven A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data. Data havens are locations with legal environments that are friendly to the concept of a computer network freely holding data and even protecting ...
*
Brian LaMacchia Brian A. LaMacchia is a computer security specialist. LaMacchia was a Distinguished Engineer at Microsoft and headed the Security and Cryptography team within Microsoft Research (MSR). His team’s main project was the development of quantum-resis ...
: designer of
XKMS XML Key Management Specification (XKMS) uses the web services framework to make it easier for developers to secure inter-application communication using public key infrastructure (PKI). XML Key Management Specification is a protocol developed by ...
; research head at Microsoft Research *
Ben Laurie Ben Laurie is an English software engineer. He is currently the Director of Security at The Bunker Secure Hosting. Laurie wrote Apache-SSL, the basis of most SSL-enabled versions of the Apache HTTP Server. He developed the MUD ''Gods'', which wa ...
: founder of The Bunker, core
OpenSSL OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping or need to identify the party at the other end. It is widely used by Internet servers, including the majority of HT ...
team member,
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
engineer. *
Jameson Lopp Jameson Lopp is an American cypherpunk, software engineer, columnist, and Bitcoin advocate. Lopp is co-founder and CTO of bitcoin security provider Casa. Prior to joining Casa, Lopp served as software engineer at BitGo. Lopp has been publicly ...
: software engineer, CTO of Casa *
Morgan Marquis-Boire Morgan Marquis-Boire is a New Zealand-born hacker, journalist, and security researcher. In late 2017 he was accused of at least ten sexual assaults. He was the Director of Security at First Look Media and a contributing writer at '' The Intercep ...
: researcher, security engineer, and privacy activist * Matt Thomlinson (phantom): security engineer, leader of Microsoft's security efforts on Windows, Azure and Trustworthy Computing, CISO at
Electronic Arts Electronic Arts Inc. (EA) is an American video game company headquartered in Redwood City, California. Founded in May 1982 by Apple employee Trip Hawkins, the company was a pioneer of the early home computer game industry and promoted th ...
*
Timothy C. May Timothy C. May, better known as Tim May (December 21, 1951 – December 13, 2018) was an American technical and political writer, and electronic engineer and senior scientist at Intel. May was also the founder of the crypto-anarchist movement. He ...
(deceased): former Assistant Chief Scientist at Intel; author of ''A Crypto Anarchist Manifesto'' and the ''
Cyphernomicon Timothy C. May, better known as Tim May (December 21, 1951 – December 13, 2018) was an American technical and political writer, and electronic engineer and senior scientist at Intel. May was also the founder of the crypto-anarchist movement. He ...
''; a founding member of the Cypherpunks mailing list *
Jude Milhon Judith udeMilhon (March 12, 1939 – July 19, 2003), in Washington D.C., best known by her pseudonym St. Jude, was a self-taught programmer, civil rights advocate, writer, editor, advocate for women in computing, hacker and author in the ...
(deceased; aka "St. Jude"): a founding member of the Cypherpunks mailing list, credited with naming the group; co-creator of ''
Mondo 2000 ''Mondo 2000'' was a glossy cyberculture magazine published in California during the 1980s and 1990s. It covered cyberpunk topics such as virtual reality and smart drugs. It was a more anarchic and subversive prototype for the later-founded ' ...
'' magazine *
Vincent Moscaritolo Vincent Moscaritolo is semi-retired American computer security expert known for work in encryption applications for mobile devices. As of late, he has been prolifically writing about Raspberry Pi Projects on Substack. From 2012 to 2015, he was ...
: founder of Mac Crypto Workshop; Principal Cryptographic Engineer for
PGP Corporation PGP Corporation was a company that sold Pretty Good Privacy computer software. It was founded in 2002, and acquired by Symantec in 2010, and by Broadcom in 2019. History PGP Corporation was co-founded in June 2002 by Jon Callas and Phil Dunkelber ...
; co-founder of
Silent Circle Silent Circle is a German Eurodisco band formed in West Germany in 1985. The band consists of vocalist Martin Tychsen (Jo Jo Tyson), keyboardist & composer Axel Breitung, and drummer Jürgen Behrens (CC Behrens). History Silent Circle first ...
and 4th-A Technologies, LLC *
Satoshi Nakamoto Satoshi Nakamoto is the name used by the presumed pseudonymous person or persons who developed bitcoin, authored the bitcoin white paper, and created and deployed bitcoin's original reference implementation. As part of the implementation, Nakam ...
: Pseudonym for the inventor(s) of Bitcoin. *
Sameer Parekh Sameer Parekh ( hi, समीर परेख) is the founder of C2Net Software, Inc. While in high school in Libertyville, Illinois, he published an underground newspaper called ''The Free Journal'', promoting libertarian ideas. In 1993 Parek ...
: former CEO of
C2Net C2Net was an Internet cryptography company founded by Sameer Parekh, which was sold to Red Hat in 2000. It was best known for its Stronghold secure webserver software. Community ConneXion C2Net started out as Community ConneXion in 1994, an Int ...
and co-founder of the
CryptoRights Foundation The CryptoRights Foundation, Inc. (CRF) is a 501(c)(3) non-profit organization based in San Francisco. The CryptoRights Foundation helps human rights groups and other NGOs use encryption to protect their online communications. It has contributed to ...
human rights non-profit *
Vipul Ved Prakash Vipul Ved Prakash is a software engineer and Internet entrepreneur. He is the co-founder of anti-spam company Cloudmark, social-media search company Topsy, and open-source AI company TogetherAI. In 2013, Topsy was acquired by Apple Inc. The ...
: co-founder of Sense/Net; author of ''Vipul's Razor''; founder of Cloudmark * Runa Sandvik: Tor developer, political advocate *
Len Sassaman Leonard Harris Sassaman (April 9, 1980 – July 3, 2011) was an American technologist, information privacy advocate, and the maintainer of the Mixmaster anonymous remailer code and operator of the ''randseed'' remailer. Much of his career gravitat ...
(deceased): maintainer of the Mixmaster Remailer software; researcher at Katholieke Universiteit Leuven;
biopunk Biopunk (a portmanteau of "biotechnology" or "biology" and " punk") is a subgenre of science fiction that focuses on biotechnology. It is derived from cyberpunk, but focuses on the implications of biotechnology rather than mechanical cyberware ...
* Steven Schear: creator of the
warrant canary A warrant canary is a method by which a communications service provider aims to inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The warrant canar ...
;
street performer protocol The threshold pledge or fund and release system is a way of making a fundraising pledge as a group of individuals, often involving charitable goals or financing the provision of a public good. An amount of money is set as the goal or ''threshold' ...
; founding member of the International Financial Cryptographer's Association and
GNURadio GNU Radio is a free software development toolkit that provides signal processing blocks to implement software-defined radios and signal processing, signal-processing systems. It can be used with external Radio frequency, RF hardware to create soft ...
; team member at Counterpane; former Director at data security company Cylink and
MojoNation Mnet is software to run a peer-to-peer distributed data store for file sharing purpose. It aimed at substituting free sharing of digital resources, typical of P2P networks, with a market regulated by its own currency. Mnet is a fork of the softw ...
*
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Ce ...
*: well-known security author; founder of Counterpane *
Richard Stallman Richard Matthew Stallman (; born March 16, 1953), also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to u ...
: founder of
Free Software Foundation The Free Software Foundation (FSF) is a 501(c)(3) non-profit organization founded by Richard Stallman on October 4, 1985, to support the free software movement, with the organization's preference for software being distributed under copyleft ("s ...
, privacy advocate *
Nick Szabo Nicholas Szabo is a computer scientist, legal scholar, and cryptographer known for his research in digital contracts and digital currency. He graduated from the University of Washington in 1989 with a degree in computer science and received a J ...
: inventor of
smart contracts A smart contract is a computer program or a transaction protocol that is intended to automatically execute, control or document events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the re ...
; designer of
bit gold The bit is the most basic unit of information in computing and digital communications. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represented ...
, a precursor to
Bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public di ...
*
Wei Dai Wei Dai ( zh, c=戴伟) is a computer engineer known for contributions to cryptography and cryptocurrencies. He developed the Crypto++ cryptographic library, created the b-money cryptocurrency system, and co-proposed the VMAC message authentic ...
: Created b-money; cryptocurrency system and co-proposed the VMAC message authentication algorithm. The smallest subunit of Ether, the wei, is named after him. *
Zooko Wilcox-O'Hearn Zooko Wilcox-O'Hearn (born Bryce Wilcox; 13 May 1974 in Phoenix, Arizona), is an American Colorado-based computer security specialist, self-proclaimed cypherpunk, and CEO of the Electric Coin Company (ECC), a for-profit company leading the develo ...
:
DigiCash DigiCash Inc. was an electronic money corporation founded by David Chaum in 1989. DigiCash transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder. DigiCash declared bankruptcy i ...
and
MojoNation Mnet is software to run a peer-to-peer distributed data store for file sharing purpose. It aimed at substituting free sharing of digital resources, typical of P2P networks, with a market regulated by its own currency. Mnet is a fork of the softw ...
developer; founder of Zcash; co-designer of
Tahoe-LAFS Tahoe-LAFS (Tahoe Least-Authority File Store) is a free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. It can be used as an online backup system, or to serve as a file or Web host similar to ...
*
Jillian C. York Jillian C. York (born May 18, 1982)"Goodreads Author Profile"
John Young John Young may refer to: Academics * John Young (professor of Greek) (died 1820), Scottish professor of Greek at the University of Glasgow * John C. Young (college president) (1803–1857), American educator, pastor, and president of Centre Coll ...
: anti-secrecy activist and co-founder of
Cryptome Cryptome is an online library and 501(c)(3) private foundation created in 1996 by John Young and Deborah Natsios. The site collects information about freedom of expression, privacy, cryptography, dual-use technologies, national security, intel ...
*
Philip Zimmermann Philip R. Zimmermann (born 1954) is an American computer scientist and cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoIP encryption p ...
: original creator of PGP v1.0 (1991); co-founder of PGP Inc. (1996); co-founder with Jon Callas of
Silent Circle Silent Circle is a German Eurodisco band formed in West Germany in 1985. The band consists of vocalist Martin Tychsen (Jo Jo Tyson), keyboardist & composer Axel Breitung, and drummer Jürgen Behrens (CC Behrens). History Silent Circle first ...
* indicates someone mentioned in the acknowledgements of Stephenson's ''Cryptonomicon.''


References

:


Further reading

*
Andy Greenberg Andy Greenberg is a technology journalist serving as a senior writer at ''Wired'' magazine. He previously worked as a staff writer at ''Forbes'' magazine and as a contributor for Forbes.com. He has published the books '' This Machine Kills Secrets ...
: ''This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information''.
Dutton Adult E. P. Dutton was an American book publishing company. It was founded as a book retailer in Boston, Massachusetts, in 1852 by Edward Payson Dutton. Since 1986, it has been an imprint of Penguin Group. Creator Edward Payson Dutton (January 4, ...
2012, *{{Cite book, last=Assange, first=Julian, title=Cypherpunks: Freedom and the Future of the Internet, title-link=Cypherpunks: Freedom and the Future of the Internet, year=2012, isbn=978-1-939293-00-8, author-link=Julian Assange Punk Internet privacy