An Intervention in Digital Economy

Total Page:16

File Type:pdf, Size:1020Kb

An Intervention in Digital Economy READER A N INTERVENTION IN DIGITAL ECONOMY FOREWORD BY SASKIA SASSEN EDITED BY GEERT LOVINK NATHANIEL TKACZ PATRICIA DE VRIES INC READER #10 MoneyLab Reader: An Intervention in Digital Economy Editors: Geert Lovink, Nathaniel Tkacz and Patricia de Vries Copy editing: Annie Goodner, Jess van Zyl, Matt Beros, Miriam Rasch and Morgan Currie Cover design: Content Context Design: Katja van Stiphout EPUB development: André Castro Printer: Drukkerij Tuijtel, Hardinxveld-Giessendam Publisher: Institute of Network Cultures, Amsterdam, 2015 ISBN: 978-90-822345-5-8 Contact Institute of Network Cultures phone: +31205951865 email: [email protected] web: www.networkcultures.org Order a copy or download this publication freely at: www.networkcultures.org/publications Join the MoneyLab mailing list at: http://listcultures.org/mailman/listinfo/moneylab_listcultures.org Supported by: Amsterdam University of Applied Sciences (Hogeschool van Amster- dam), Amsterdam Creative Industries Publishing and the University of Warwick Thanks to everyone at INC, to all of the authors for their contributions, Annie Goodner and Morgan Currie for their copy editing, and to Amsterdam Creative Industries Publishing for their financial support. This publication is licensed under Creative Commons Attribution NonCommercial ShareAlike 4.0 Unported (CC BY-NC-SA 4.0). To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/. EDITED BY GEERT LOVINK, NATHANIEL TKACZ AND PATRICIA DE VRIES INC READER #10 Previously published INC Readers The INC Reader series is derived from conference contributions and produced by the Institute of Network Cultures. They are available in print, EPUB, and PDF form. The MoneyLab Reader is the tenth publication in the series. INC Reader #9: René König and Miriam Rasch (eds), Society of the Query Reader: Reflections on Web Search, 2014. INC Reader #8: Geert Lovink and Miriam Rasch (eds), Unlike Us: Social Media Monopolies and Their Alternatives, 2013. INC Reader #7: Geert Lovink and Nathaniel Tkacz (eds), Critical Point of View: A Wikipedia Reader, 2011. INC Reader #6: Geert Lovink and Rachel Somers Miles (eds), Video Vortex Reader II: Moving Images Beyond Youtube, 2011. INC Reader #5: Scott McQuire, Meredith Martin and Sabine Niederer (eds), Urban Screens Reader, 2009. INC Reader #4: Geert Lovink and Sabine Niederer (eds), Video Vortex Reader: Responses to YouTube, 2008. INC Reader #3: Geert Lovink and Ned Rossiter (eds), MyCreativity Reader: A Critique of Creative Industries, 2007. INC Reader #2: Katrien Jacobs, Marije Janssen and Matteo Pasquinelli (eds), C’LICK ME: A Netporn Studies Reader, 2007. INC Reader #1: Geert Lovink and Soenke Zehle (eds), Incommunicado Reader, 2005. All INC Readers, and other publications like the Network Notebooks series and Theory on Demand, can be downloaded and read for free. See www.networkcultures.org/publications. INTRODUCTION Saskia Sassen When Money Becomes an Extraction Tool Rather Than Exchange Medium: Foreword to the MoneyLab Reader 9 Geert Lovink and Nathaniel Tkacz MoneyLab: Sprouting New Digital-Economic Forms 13 THE LONG GAME Keith Hart Money in the Making of World Society 19 Franco “Bifo” Berardi Is There Life Beyond Money? 32 Ralph and Stefan Heidenreich On a Post-Monetary Network Based Economy 44 Douglas Rushkoff Playability and the Search for an Open Source Economy 56 Andrew Ross Accumulation and Resistance in the 21st Century 64 FINANCIAL INTERVENTIONS Primavera De Filippi and Samer Hassan Measuring Value in the Commons-Based Ecosystem: Bridging the Gap Between the Commons and the Market 74 Pekka Piironen and Akseli Virtanen Democratizing the Power of Finance: A Discussion About Robin Hood Asset Management Cooperative with Founder Akseli Virtanen 92 Lena Rethel and Irwan Abdalloh Inculcating Ethical Behaviour in Market Transactions? The Case of the Sharia Online Trading System in Indonesia 104 CRITICAL CURRENCIES David Golumbia Bitcoin as Politics: Distributed Right-Wing Extremism 117 Beat Weber The Economic Viability of Complementary Currencies: Bound to Fail? 132 Tiziana Terranova and Andrea Fumagalli Financial Capital and the Money of the Common: The Case of Commoncoin 150 Finn Brunton Heat Exchanges 158 ECONOMIES OF IMAGINATION Max Haiven Money as a Medium of the Imagination: Art and the Currencies of Cooperation 173 Stephanie Rothenberg Reversal of Fortune: Visualizing Marketized Philanthropy 189 Paolo Cirio (W)orld Currency 198 Jim Costanzo The Free Money Movement 202 TECHNOLOGIES OF PAYMENT Bill Maurer and Lana Swartz Wild, Wild West: A View from Two Californian Schoolmarms 221 Rachel O’Dwyer Money Talks: The Enclosure of Mobile Payments 230 Erin B. Taylor Mobile Money: Financial Globalization, Alternative, or Both? 244 Eduard de Jong, Nathaniel Tkacz, and Pablo Velasco ‘Live as Friends and Count as Enemies’: On Digital Cash and the Media of Payment 257 CROWDFUNDING AND BEYOND Inge Ejbye Sørensen Go Crowdfund Yourself! Some Unintended Consequences of Crowdfunding for Documentary Film and Industry in the U.K. 268 Renée Ridgway Crowdfunding the Commons? 281 Irina Enache and Robert van Boeschoten The MoneyLab Crowdfunding Toolkit for Creatives 295 APPENDICES MoneyLab Conference 304 Author Biographies 305 CRITICAL CURRENCIES 117 Bitcoin as Politics: Distributed Right-Wing Extremism DAVID GOLUMBIA 118 READER Bitcoin as Politics: Distributed Right-Wing Extremism DAVID GOLUMBIA Theorists of science and technology have long insisted that their objects of study can and should often be construed as profoundly implicated in, and at least in part consti- tuted by, the social systems out of which they have been produced and in which they are embedded. Frequently this perspective is hard to reconcile with what look to be obvious facts of common sense: jet rockets really do enable space travel, lasers really do read and write to digital media discs, transistors really do enable miniaturized digital devices, and so on; so what point is there to declaring that these objects ‘are’ social or political, as if somehow social or political will might have altered or prevented the objects from coming into being, or enabled space travel or miniature digital devices without the relevant technological underpinning? Yet it is hard to deny that political and social contexts play significant roles in the adoption and proliferation of technical devices and methods, and the line between these roles and the literal construction and operation of technologies is at best blurry. In his famous 1980 essay ‘Do Artifacts Have Politics?’ technology scholar Langdon Winner asked us to consider whether a ‘given device might have been designed and built in such a way that it produces a set of consequences logically and temporally prior to any of its professed uses.’1 For some technologies and in some contexts, this kind of dynamic can be hard to see, and the apparently common-sense insistence that technologies develop autonomously, as it were, continually urges us to reject the idea that technologies might be in part or even largely social constructions. This is the case even when the technologies themselves, as we see in so much promotion of computational devices and methods today, are advertised as having socially beneficial effects. Technologies are neutral, this view seems to suggests, when human beings use them for ends we (whoever ‘we’ are) don’t like; they are socially embedded and the result of democratic or social power (as determined, almost exclusively, by markets or market-like aggregations) when they are used for ‘good’ purposes (again, pace the fact that what appears good from one point of view may appear not at all good from another). In many ways, the very effectiveness of technologies is used as self-justifying evidence against the view that technologies might be deeply political, especially when the politics in question might be ones ‘we’ oppose. Bitcoin (along with the other distributed ledger cryptocurrencies of which it is the best-known and most widely-used exponent) provides us with an unusually pointed example of the relationship between the social and the technical; for unlike many 1. Langdon Winner, ‘Do Artifacts Have Politics?’, Daedalus 109:1 (Winter, 1980): 125. CRITICAL CURRENCIES 119 technologies critiqued by scholars, Bitcoin is not a technology that fails, either alto- gether due to errant premises (e.g. cold fusion) or, in part, due to social pressures (e.g. the Betamax videocassette format). Bitcoin is a technology that works – that is hard to doubt. Furthermore, it is widespread and being adopted at a furious pace. Yet despite all that, Bitcoin does not work – at least not as its advocates suggest it does. Bitcoin absolutely does something, yet it does not do what many of its advocates claim it does. Bitcoin is a technology whose social and political functions far outstrip its tech- nical ones. In this sense, Bitcoin can be seen as a technical object that is structured to an unusual extent by politics. Pushing this even further, there are salient perspec- tives from which Bitcoin appears to be mostly a realization of these political concerns: that is, whatever the software itself does, what ‘Bitcoin’ as a cultural object does is to promote a politics that is visible only if one knows where to look. In this sense, we can argue that Bitcoin is politics masquerading as technology, or technology solicit- ing and promoting a very specific politics, one that despite its public prominence has trouble penetrating fully into some of the social spaces into which
Recommended publications
  • Moneylab Reader: an Intervention in Digital Economy
    READER A N INTERVENTION IN DIGITAL ECONOMY FOREWORD BY SASKIA SASSEN EDITED BY GEERT LOVINK NATHANIEL TKACZ PATRICIA DE VRIES INC READER #10 MoneyLab Reader: An Intervention in Digital Economy Editors: Geert Lovink, Nathaniel Tkacz and Patricia de Vries Copy editing: Annie Goodner, Jess van Zyl, Matt Beros, Miriam Rasch and Morgan Currie Cover design: Content Context Design: Katja van Stiphout EPUB development: André Castro Printer: Drukkerij Tuijtel, Hardinxveld-Giessendam Publisher: Institute of Network Cultures, Amsterdam, 2015 ISBN: 978-90-822345-5-8 Contact Institute of Network Cultures phone: +31205951865 email: [email protected] web: www.networkcultures.org Order a copy or download this publication freely at: www.networkcultures.org/publications Join the MoneyLab mailing list at: http://listcultures.org/mailman/listinfo/moneylab_listcultures.org Supported by: Amsterdam University of Applied Sciences (Hogeschool van Amster- dam), Amsterdam Creative Industries Publishing and the University of Warwick Thanks to everyone at INC, to all of the authors for their contributions, Annie Goodner and Morgan Currie for their copy editing, and to Amsterdam Creative Industries Publishing for their financial support. This publication is licensed under Creative Commons Attribution NonCommercial ShareAlike 4.0 Unported (CC BY-NC-SA 4.0). To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/. EDITED BY GEERT LOVINK, NATHANIEL TKACZ AND PATRICIA DE VRIES INC READER #10 Previously published INC Readers The INC Reader series is derived from conference contributions and produced by the Institute of Network Cultures. They are available in print, EPUB, and PDF form. The MoneyLab Reader is the tenth publication in the series.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center
    Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center before the Subcommittee on National Security, International Development and Monetary Policy Committee on Financial Services United States House of Representatives Dollars against Democracy: Domestic Terrorist Financing in the Aftermath of Insurrection February 25, 2021 My name is Lecia Brooks. I am chief of staff of the Southern Poverty Law Center (SPLC). Now in our 50th year, the SPLC is a catalyst for racial justice in the South and beyond, working in partnership with communities to dismantle white supremacy, strengthen intersectional movements, and advance the human rights of all people. SPLC lawyers have worked to shut down some of the nation’s most violent white supremacist groups by winning crushing, multimillion-dollar jury verdicts on behalf of their victims. We have helped dismantle vestiges of Jim Crow, reformed juvenile justice practices, shattered barriers to equality for women, children, the LGBTQ+ community, and the disabled, and worked to protect low-wage immigrant workers from exploitation. The SPLC began tracking white supremacist activity in the 1980s, during a resurgence of the Ku Klux Klan and other organized extremist hate groups. Today, the SPLC is the premier U.S. nonprofit organization monitoring the activities of domestic hate groups and other extremists. In the early 1990s, the SPLC launched its pioneering Teaching Tolerance program to provide educators with free, anti-bias classroom resources, such as classroom documentaries and lesson plans. Now renamed Learning For Justice, our program reaches millions of schoolchildren with award-winning curricula and other materials that promote understanding of our nation’s history and respect for others, helping educators create inclusive, equitable school environments.
    [Show full text]
  • Blockchain and The
    NOTES ACKNOWLEDGMENTS INDEX Notes Introduction 1. The manifesto dates back to 1988. See Timothy May, “The Crypto Anarchist Manifesto” (1992), https:// www . activism . net / cypherpunk / crypto - anarchy . html. 2. Ibid. 3. Ibid. 4. Ibid. 5. Ibid. 6. Timothy May, “Crypto Anarchy and Virtual Communities” (1994), http:// groups . csail . mit . edu / mac / classes / 6 . 805 / articles / crypto / cypherpunks / may - virtual - comm . html. 7. Ibid. 8. For example, as we wi ll describe in more detail in Chapter 1, the Bitcoin blockchain is currently stored on over 6,000 computers in eighty- nine jurisdictions. See “Global Bitcoin Node Distribution,” Bitnodes, 21 . co, https:// bitnodes . 21 . co / . Another large blockchain- based network, Ethereum, has over 12,000 nodes, also scattered across the globe. See Ethernodes, https:// www . ethernodes . org / network / 1. 9. See note 8. 10. Some blockchains are not publicly accessible (for more on this, see Chapter 1). These blockchains are referred to as “private blockchains” and are not the focus of this book. 11. See Chapter 1. 12. The Eu ro pean Securities and Market Authority, “Discussion Paper: The Dis- tributed Ledger Technology Applied to Securities Markets,” ESMA / 2016 / 773, June 2, 2016: at 17, https:// www . esma . europa . eu / sites / default / files / library / 2016 - 773 _ dp _ dlt . pdf. 213 214 NOTES TO PAGES 5–13 13. The phenomena of order without law also has been described in other con- texts, most notably by Robert Ellickson in his seminal work Order without Law (Cambridge, MA: Harvard University Press, 1994). 14. Joel Reidenberg has used the term “lex informatica” to describe rules imple- mented by centralized operators online.
    [Show full text]
  • Blueprints for 3D Handgun Take Refuge in Pirate Bay (Update) 10 May 2013, by Robert Macpherson
    Blueprints for 3D handgun take refuge in Pirate Bay (Update) 10 May 2013, by Robert Macpherson The State Department—which confirmed it has been in contact with Defense Distributed, but gave no specifics—is tasked with monitoring and licensing US arms exports through its Directorate of Defense Trade Controls. "The United States is cognizant of the potentially adverse consequences of indiscriminate arms transfers, and therefore we strictly regulate exported defense items and technologies to protect our national interests," State Department spokesman Patrick Ventrell said. But the crackdown on the Liberator clearly came too late to forestall the re-posting of its computer- A 3D printer prints an object during an exhibition in New aided design (CAD) files on The Pirate Bay, a York on April 22, 2013. Blueprints for the world's first 3D popular peer-to-peer file sharing service that has printable handgun took refuge Friday at file-sharing been linked by its critics to film and music piracy. website The Pirate Bay, upsetting a US government attempt to get them off the Internet. "Nice try blocking this fed," wrote one Pirate Bay user, utilizing a slang word for federal government, in a comments section that veered strongly in favor Virtual blueprints for the world's first 3D printable of Americans' constitutional right to own and carry handgun found a safe harbor Friday at file-sharing firearms. website The Pirate Bay, dodging a US government attempt to pull them off the Internet. Defense Distributed, a Texas nonprofit that promotes the open-source development of firearms using 3D printers, withdrew the files needed to make the single-shot Liberator at the behest of the State Department on Thursday.
    [Show full text]
  • 3D-Printing, an Additive Menace to International Security?
    UNIVERSIDAD PONTIFICIA COMILLAS Faculty of Humanities and Social Sciences Bachelor´s Degree in International Relations Final Dissertation 3D-PRINTING, AN ADDITIVE MENACE TO INTERNATIONAL SECURITY? STUDENT: MARÍA CARMEN MARTÍN PALACIOS DIRECTOR: ILEANA DANIELA SERBAN Madrid, April 2018 INDEX 1. INTRODUCTION ……………………............................................................................................................... 1 2. RESEARCH FOCUS AND SCOPE .............................................................................................................. 2 2.1. RESEARCH AIM .......................................................................................................................... 2 2.2. TERMINOLOGICAL CLARIFICATIONS ....................................................................................... .. 3 2.3. JUSTIFICATION OF THE STUDY AND OBJECTIVES …………………………………………………………………… 7 3. STATE OF THE ART ………………………………………………………………………………………………………………………….. 8 3.1. METHODOLOGY AND STRUCTURE ………………………………………………………………………………………… 9 4. RECENT HISTORY OF 3D TECHNOLOGIES ……………………………………………………………………………………… 9 4.1. GENERAL ADDITIVE MANUFACTURING TECHNIQUES …………………………………………………….. 10 5. INTERNATIONAL SECURITY AND 3D PRINTING ……………………………………………………………………………… 12 5.1. THE ORIGINS OF ADDITIVE MANUFACTURING CRIMINALITY: COUNTERFEITING…………………. 13 5.2. 3D PRINTING AND ARM MANUFACTURING ………………………………………………………………………… 14 5.3. 3D PRINTING AND WEAPONS OF MASS DESTRUCTION ………………………………………………………. 14 5.4. ADDITIVE MANUFACTURING AND GUNSMITHS: STUDY CASE
    [Show full text]
  • Blockchain, Cryptocurrency and Vulnerability to Money Laundering, Terrorist Financing and Tax Evasion
    THOMSON REUTERS Risks and rewards: Blockchain, cryptocurrency and vulnerability to money laundering, terrorist financing and tax evasion By Alma Angotti and Anne Marie Minogue, Navigant Consulting Inc. NOVEMBER 26, 2018 While blockchain technology offers transactional advantages, CRYPTOCURRENCY not everyone welcomes the opportunity it offers to transact Cryptocurrency is “a math-based, decentralized convertible in cryptocurrency. In fact, Warren Buffett, CEO of Berkshire virtual currency that is protected by cryptography.”6 Bitcoin, Hathaway, warns: “Stay away from it. It’s a mirage, basically. launched in 2009, was the first cryptocurrency to capture the In terms of cryptocurrencies, generally, I can say almost with public’s attention. It is estimated that as of May 2018, there were 1 certainty that they will come to a bad ending.” over 17 million bitcoins in circulation.7 Perhaps Buffett has misgivings about cryptocurrency because he knows that nefarious individuals can exploit blockchain’s features Regulators recognize the need to create clear and exchange cryptocurrencies to launder money, finance terrorist activity, evade taxes and make prohibited purchases. legislation to protect against the criminal use of Law enforcement is pursuing prosecution of individuals who cryptocurrency exchanged on the blockchain and transact in cryptocurrency in concert with illegal activity. to ensure it is used only for lawful activities. Regulators recognize the need to create clear legislation to protect against the criminal use of cryptocurrency exchanged on For the purposes of this discussion, cryptocurrency describes a the blockchain and to ensure it is used only for lawful activities. digital asset transacted on a blockchain, including those referred It is anticipated that regulators, law enforcement and the to as virtual currency, digital currency or cryptocurrency.
    [Show full text]
  • Cryptocurrencies: an Introduction for Policy Makers Brian Conley
    University of Washington School of Law UW Law Digital Commons Technology Law and Public Policy Clinic Centers and Programs 2015 Cryptocurrencies: An Introduction for Policy Makers Brian Conley Jeffrey Echert Andrew Fuller Heather Lewis Charlotte Lunday Follow this and additional works at: https://digitalcommons.law.uw.edu/techclinic Part of the Banking and Finance Law Commons Recommended Citation Brian Conley, Jeffrey Echert, Andrew Fuller, Heather Lewis & Charlotte Lunday, Cryptocurrencies: An Introduction for Policy Makers, (2015). Available at: https://digitalcommons.law.uw.edu/techclinic/13 This Book is brought to you for free and open access by the Centers and Programs at UW Law Digital Commons. It has been accepted for inclusion in Technology Law and Public Policy Clinic by an authorized administrator of UW Law Digital Commons. For more information, please contact [email protected]. Cryptocurrencies An Introduction for Policy Makers Prepared by Brian Conley, Jeffrey Echert, Andrew Fuller, Heather Lewis and Charlotte Lunday on behalf of the University of Washington School of Law Technology Law and Public Policy Clinic Cryptocurrencies: An Introduction for Policy Makers University of Washington School of Law Technology Policy Clinic, 2015 Acknowledgments This paper was prepared for general education purposes by students in the University of Washington School of Law’s Technology Law and Public Policy Clinic, under the guidance of Professor William Covington. The students would like to express thanks to Professor Covington for his direct assistance, as well as his efforts to connect us with industry experts. We would also like to thank the University of Washington School of Law, especially the Tech Policy Lab for allowing us to use its resources and facilities.
    [Show full text]
  • Case 2:18-Cv-03208-PD Document 16 Filed 07/31/18 Page 1 of 27
    Case 2:18-cv-03208-PD Document 16 Filed 07/31/18 Page 1 of 27 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA COMMONWEALTH OF PENNSYLVANIA, GOVERNOR TOM WOLF, ATTORNEY GENERAL JOSH SHAPIRO, and PENNSYLVANIA STATE CIVIL ACTION NO: 2:18-cv-03208-PD POLICE, AMENDED COMPLAINT Plaintiffs, v. JURY TRIAL DEMANDED DEFENSE DISTRIBUTED, DEFCAD, GHOST GUNNER and CODY WILSON, Defendants. AMENDED COMPLAINT The Commonwealth of Pennsylvania , Governor Tom Wolf, Attorney General Josh Shapiro and the Pennsylvania State Police State Police (together, Plaintiffs by and through the Attorney General, hereby file this Complaint against Defendants Defense Distributed, DEFCAD, Ghost Gunner, and Cody Wilson (together, the Defendants ) and, in support thereof, state the following: INTRODUCTION 1. The Plaintiffs bring this action with respect to the availability of 3D printed plastic guns for all Pennsylvania residents including children regardless of age, mental health status, or criminal record. 2. The 3D printed plastic guns are made available to every person for a nominal fee, by becoming These fees can be paid via different methods including, bitcoin a non-traceable form of payment. When you enroll in Defense Distributed, you Case 2:18-cv-03208-PD Document 16 Filed 07/31/18 Page 2 of 27 are not asked for proof of age, mental health status, criminal record, or a valid gun license or permit; you need only pick a username and password, and supply an email. 3. Members and others will be able to download and print an actual, working gun, immediately to their 3D printers. These gun are made from plastic that will not be detectable with the metal detectors used in school, courthouses, and other public venues.
    [Show full text]
  • Stealth Address, Ring Signatures, Monero Comparison to Zero.Cash
    Anonymous Crypto Currency Stealth Address, Ring Signatures, Monero Comparison to Zero.Cash 60 M$ Nicolas T. Courtois 17 B$ with help of Rebekah Mercer, Huanyu Ma, Mary Maller 300 M$ - University College London, UK Crypto Coin Privacy Topics $ Bitcoin vs. Monero vs. ZCash Chaum e-cash Privacy / anonymity: – for senders [Ring Signatures,ZK proofs] – for receivers [Stealth Address methods] – for the transaction amount [CT]X CT=Confidential Transactions, not studied here 2 Nicolas T. Courtois 2013-2016 PK-based currencies blockchain says: 1 coin belongs to pkA t t+1 t+2 blockchain …. ….………………. 5 Crypto Coin Privacy Pb In Bitcoin Q: Does Monero/ZCash remove this problem???? 4 Nicolas T. Courtois 2009-2016 **Bitcoin vs. Monero private key = b spend key b view key v public PK= b.G spend pub B=b.G view pub V=v.G H(PK) => 01… One Time Destination key H(r.V).G+B, R same user? PK1 PK random R=r.G 2 Tracking 0.29394 BTC 1.74582 BTC publish R with tx key v, B Transaction 1OO MNR to D21… H(PK3) H(PK4) 1.99 BTC same user? 1OO MNR to 2A7… 1OOO MNR 1OO MNR to Z93… 1OO MNR to P32… Advanced Crypto Magic 5 Commitments are used to Shield Coins: , 6 nobody can see what is inside. only the owner can open , they NEVER actually get opened 6 ZCash = a Large Scale Mixer “normal” yellow coins are “destroyed” and they exist as a mix of coins “normal” coins or “shielded” coins like in bitcoin many coins one of the coins that from many ? is on the ledger is pk_i are placed “re-born” and sent on the ledger to , but it is (via an algorithm called ) “normal” coin impossible to tell like in bitcoin which one? 5 Double Spending? cannot be done twice! S is revealed , r remains secret 6 Digital Signatures Zero-Knowledge 0.
    [Show full text]
  • Viable Regulation of 3-D Printed Pharmaceuticals
    GRAF_FORMAT_SXD2 (DO NOT DELETE) 11/22/2015 9:35 AM NOTE A HARD PILL TO SWALLOW: VIABLE REGULATION OF 3-D PRINTED PHARMACEUTICALS Victoria R. Graf* TABLE OF CONTENTS I. INTRODUCTION .................................................................... 594 II. GENERAL BACKGROUND ...................................................... 596 III. PRINTING PHARMACEUTICALS: HOW IT WORKS & CONSUMER ACCESSIBILITY.................................................. 598 IV. THE CURRENT PHARMACEUTICAL MANUFACTURING & DISTRIBUTION MODEL IN THE UNITED STATES .................. 599 V. HOW 3-D PRINTING COULD ALTER THE CURRENT U.S. PHARMACEUTICAL DISTRIBUTION CHAIN & THE POTENTIAL CHANGES IN HOW CONSUMERS OBTAIN DRUGS .................................................................................. 603 VI. REGULATORY ISSUES FOLLOWING THE ADVENT OF 3-D PRINTED FIREARMS ............................................................. 605 VIII. THE VIABILITY OF REGULATION OF 3-D PRINTED PHARMACEUTICALS UNDER CURRENT FEDERAL LAWS & REGULATIONS ...................................................................... 607 A. Regulating Pharmaceutical Software Blueprints Under Copyright Laws ................................................. 608 B. Regulating Pharmaceutical Blueprints Under * B.A., State University of New York (SUNY) at Binghamton; J.D. Candidate 2015, Albany Law School. The author would like to thank her family and friends for their support, the members of the Albany Law Journal of Science and Technology for their keen subediting skills, Meredith Dedopoulos
    [Show full text]
  • Issn 2421-4442
    ISSN 2421-4442 La Rivista semestrale Sicurezza, Terrorismo e Società intende la Sicurezza come una 10 condizione che risulta dallo stabilizzarsi e dal mantenersi di misure proattive capaci di promuovere il benessere e la qualità della vita dei cittadini e la vitalità democratica delle istituzioni; affronta il fenomeno del Terrorismo come un processo complesso, di lungo periodo, che affonda le sue radici nelle dimensioni culturale, religiosa, politica ed economica che caratterizzano i sistemi sociali; propone alla Società – quella degli studiosi e degli operatori e quella ampia di cittadini e istituzioni – strumenti di com- prensione, analisi e scenari di tali fenomeni e indirizzi di gestione delle crisi. Sicurezza, Terrorismo e Società si avvale dei contributi di studiosi, policy maker, analisti, operatori della sicurezza e dei media interessati all’ambito della sicurezza, del terrorismo e del crisis management. Essa si rivolge a tutti coloro che operano in tali settori, volendo rappresentare un momento di confronto partecipativo e aperto al dibattito. La rivista ospita contributi in più lingue, preferendo l’italiano e l’inglese, per ciascuno dei quali è pubblicato un Executive Summary in entrambe le lingue. La redazione solle- cita particolarmente contributi interdisciplinari, commenti, analisi e ricerche attenti alle principali tendenze provenienti dal mondo delle pratiche. Sicurezza, Terrorismo e Società è un semestrale che pubblica 2 numeri all’anno. Oltre ai due numeri programmati possono essere previsti e pubblicati numeri speciali.
    [Show full text]