2.13.1. "What is Crypto Anarchy?" - Some of us believe various forms of strong cryptography will cause the power of the state to decline, perhaps even collapse fairly abruptly. We believe the expansion into cyberspace, with secure communications, digital money, anonymity and pseudonymity, and other crypto-mediated interactions, will profoundly change the nature of economies and social interactions. Governments will have a hard time collecting taxes, regulating the behavior of individuals and corporations (small ones at least), and generally coercing folks when it can't even tell what _continent_ folks are on! Read Vinge's "True Names" and Card's "Ender's Game" for some fictional inspirations. "Galt's Gulch" in cyberspace, what the Net is rapidly becoming already. I call this set of ideas "crypto anarchy" (or "crypto- anarchy," as you wish) and have written about this extensively. The magazines "Wired" (issue 1.2), "Whole Earth Review" (Summer, 1993), and "The Village Voice" (Aug. 6th, 1993) have all carried good articles on this. 2.13.2. The Crypto Anarchist Manifesto - a complete copy of my 1988 pastiche of the Communisto Manifesto is included in the chapter on Crypto Anarchy. - it needs rewriting, but for historical sake I've left it unchanged. - I'm proud that so much of it remains accurate. 2.13.3. "What is BlackNet?" - BlackNet -- an experiment in information markets, using anonymous message pools for exchange of instructions and items. Tim May's experiment in guerilla ontology. - BlackNet -- an experimental scheme devised by T. May to underscore the nature of anonymous information markets. "Any and all" secrets can be offered for sale via anonymous mailers and message pools. The experiment was leaked via remailer to the Cypherpunks list (not by May) and thence to several dozen Usenet groups by Detweiler. The authorities are said to be investigating it. 2.13.4. "What effect will crypto have on governments?" - A huge topic, one I've been thinking about since late 1987 when it dawned on me that public key crypto and anonymous digital cash systems, information markets, etc. meant the end of governments as we know them. (I called this development "crypto anarchy." Not everyone is a fan of it. But it's coming, and fast.) - "Putting the NSA out of business," as the NYT article put it - Espionage is changing. To pick one example, "digital dead drops." Any message can be sent through an untraceable path with remailers....and then posted in encrypted form in a newsgroup readable in most countries, including the Former Soviet Union. This means the old stand by of the microfilm in a Coke can left by a certain tree on a rural road--a method fraught with delays, dangers, and hassles--is now passe. The same message can be send from the comfort of one's home securely and untraceably. Even with a a digital signature to prevent spoofing and disinformation. This spy can be a Lockheed worker on the Aurora program, a SIGINT officer at Woomera, or a disgruntled chip designer at Motorola. (Yes, a countermeasure is to limit access to personal computers, to run only standard software that has no such crypto capability. Such embargoes may already apply to some in sensitive positions, and may someday be a condition of employment.) - Money-laundering - Tax collection. International consultants. Perpetual tourists. Virtual corporations. - Terrorism, assassination, crime, Triads, Yakuza, Jamaicans, Russian Mafia...virtual networks... Aryan Nation gone digital 2.13.5. "How quickly could something like crypto anarchy come?" - Parts of it are happening already, though the changes in the world are not something I take any credit for. Rather, there are ongoing changes in the role of nations, of power, and of the ability to coerce behaviors. When people can drop out of systems they don't like, can move to different legal or tax jurisdictions, then things change. + But a phase change could occur quickly, just as the Berlin Wall was impregnable one day, and down the next. - "Public anger grows quietly and explodes suddenly. T.C. May's "phase change" may be closer than we think. Nobody in Russia in 1985 really thought the country would fall apart in 6 years." [Mike Ingle, 1994-01-01] 2.13.6. "Could strong crypto be used for sick and disgusting and dangerous purposes?" - Of course. So can locked doors, but we don't insist on an "open door policy" (outside of certain quaint sorority and rooming houses!) So do many forms of privacy allow plotters, molestors, racists, etc. to meet and plot. - Crypto is in use by the Aryan Nation, by both pro- and anti- abortion groups, and probably by other kinds of terrorists. Expect more uses in the future, as things like PGP continue to spread. - Many of us are explicity anti-democratic, and hope to use encryption to undermine the so-called democratic governments of the world 2.13.7. "What is the Dining Cryptographers Problem, and why is it so important?" + This is dealt with in the main section, but here's David Chaum's Abstract, from his 1988 paper" - Abstract: "Keeping confidential who sends which messages, in a world where any physical transmission can be traced to its origin, seems impossible. The solution presented here is unconditionally or cryptographically secure, depending on whether it is based on one-time-use keys or on public keys. respectively. It can be adapted to address efficiently a wide variety of practical considerations." ["The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability," David Chaum, Journal of Cryptology, I, 1, 1988.] - - DC-nets have yet to be implemented, so far as I know, but they represent a "purer" version of the physical remailers we are all so familiar with now. Someday they'll have have a major impact. (I'm a bigger fan of this work than many seem to be, as there is little discussion in sci.crypt and the like.) 2.13.8. "Why won't government simply ban such encryption methods?" + This has always been the Number One Issue! - raised by Stiegler, Drexler, Salin, and several others (and in fact raised by some as an objection to my even discussing these issues, namely, that action may then be taken to head off the world I describe) + Types of Bans on Encryption and Secrecy - Ban on Private Use of Encryption - Ban on Store-and-Forward Nodes - Ban on Tokens and ZKIPS Authentication - Requirement for public disclosure of all transactions + Recent news (3-6-92, same day as Michaelangelo and Lawnmower Man) that government is proposing a surcharge on telcos and long distance services to pay for new equipment needed to tap phones! - S.266 and related bills - this was argued in terms of stopping drug dealers and other criminals - but how does the government intend to deal with the various forms fo end-user encryption or "confusion" (the confusion that will come from compression, packetizing, simple file encryption, etc.) + Types of Arguments Against Such Bans - The "Constitutional Rights" Arguments + The "It's Too Late" Arguments - PCs are already widely scattered, running dozens of compression and encryption programs...it is far too late to insist on "in the clear" broadcasts, whatever those may be (is program code distinguishable from encrypted messages? No.) - encrypted faxes, modem scramblers (albeit with some restrictions) - wireless LANs, packets, radio, IR, compressed text and images, etc....all will defeat any efforts short of police state intervention (which may still happen) + The "Feud Within the NSA" Arguments - COMSEC vs. PROD + Will affect the privacy rights of corporations - and there is much evidence that corporations are in fact being spied upon, by foreign governments, by the NSA, etc. + They Will Try to Ban Such Encryption Techniques + Stings (perhaps using viruses and logic bombs) - or "barium," to trace the code + Legal liability for companies that allow employees to use such methods - perhaps even in their own time, via the assumption that employees who use illegal software methods in their own time are perhaps couriers or agents for their corporations (a tenuous point) 2.13.9. "Could anonymous markets facilitate repugnant services, such as killings for hire?" - Yes, though there are some things which will help lessen the full impact. - To make this brutally concrete, here's how escrow makes murder contracts much safer than they are today to negotiate. Instead of one party being caught in an FBI sting, as is so often the case when amateurs try to arrange hits, they can use an escrow service to insulate themselves from: 1. From being traced, because the exchanges are handled via pseudonyms 2. From the killer taking the money and then not performing the hit, because the escrow agent holds the money until the murder is verified (according to some prototocol, such a newspaper report...again, an area for more work, thankfully). 3. From being arrested when the money is picked up, as this is all done via digital cash. There are some ways to reduce the popularity of this Murder, Incorporated system. (Things I've been thinking about for about 6 years, and which we discussed on the Cypherpunks list and on the Extropians list.)
Next Page: 2.14 Miscellaneous
Previous Page: 2.12 Digital Cash
By Tim May, see README
HTML by Jonathan Rochkind