The Cypherpunk Vision of Techno-Politics
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC. -
Cryptocurrency: the Economics of Money and Selected Policy Issues
Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary. -
A Matter of Security, Privacy and Trust
A matter of security, privacy and trust: A study of the principles and values of encryption in New Zealand Michael Dizon Ryan Ko Wayne Rumbles Patricia Gonzalez Philip McHugh Anthony Meehan Acknowledgements This study was funded by grants from the New Zealand Law Foundation and the University of Waikato. We would like to express our gratitude to our project collaborators and members of the Advisory Board – Prof Bert-Jaap Koops (Tilburg University), Prof Lyria Bennett Moses (UNSW Sydney), Prof Alana Maurushat (Western Sydney University), and Associate Professor Alex Sims (University of Auckland) – for their support as well as feedback on specific parts of this report. We would also like to thank Patricia Gonzalez, Joseph Graddy, Philip McHugh, Anthony Meehan, Jean Murray and Peter Upson for their valuable research assistance and other contributions to this study. Michael Dizon, Ryan Ko and Wayne Rumbles Principal investigators December 2019 Executive summary Cybersecurity is crucial for ensuring the safety and well-being of the general public, businesses, government, and the country as a whole. New Zealand has a reasonably comprehensive and well-grounded legal regime and strategy for dealing with cybersecurity matters. However, there is one area that deserves further attention and discussion – encryption. Encryption is at the heart of and underpins many of the technologies and technical processes used for computer and network security, but current laws and policies do not expressly cover this significant technology. The principal objective of this study is to identify the principles and values of encryption in New Zealand with a view to informing future developments of encryption- related laws and policies. -
State of the Art in Lightweight Symmetric Cryptography
State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing. -
Privacy-Enhancing Technologies for the Internet
Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley iang,daw,brewer ¡ @cs.berkeley.edu Abstract ing privacy issues on the Internet, and Section 3 provides some relevant background. We then discuss Internet pri- The increased use of the Internet for everyday activi- vacy technology chronologically, in three parts: Section 4 ties is bringing new threats to personal privacy. This pa- describes the technology of yesterday, Section 5 explains per gives an overview of existing and potential privacy- today’s technology, and Section 6 explores the technology enhancing technologies for the Internet, as well as moti- of tomorrow. Finally, we conclude in Section 7. vation and challenges for future work in this field. 2. Motivation 1. Introduction The threats to one’s privacy on the Internet are two-fold: your online actions could be (1) monitored by unauthorized Recently the Internet has seen tremendous growth, with parties and (2) logged and preserved for future access many the ranks of new users swelling at ever-increasing rates. years later. You might not realize that your personal infor- This expansion has catapulted it from the realm of academic mation has been monitored, logged, and subsequently dis- research towards new-found mainstream acceptance and in- closed; those who would compromise your privacy have no creased social relevance for the everyday individual. Yet incentive to warn you. this suddenly increased reliance on the Internet has the po- The threat of long-term storage and eventual disclosure tential to erode personal privacies we once took for granted. of personal information is especially acute on the Internet. -
An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns
An empirical analysis of smart contracts: platforms, applications, and design patterns Massimo Bartoletti and Livio Pompianu Universit`adegli Studi di Cagliari, Cagliari, Italy fbart,[email protected] Abstract. Smart contracts are computer programs that can be consis- tently executed by a network of mutually distrusting nodes, without the arbitration of a trusted authority. Because of their resilience to tamper- ing, smart contracts are appealing in many scenarios, especially in those which require transfers of money to respect certain agreed rules (like in financial services and in games). Over the last few years many plat- forms for smart contracts have been proposed, and some of them have been actually implemented and used. We study how the notion of smart contract is interpreted in some of these platforms. Focussing on the two most widespread ones, Bitcoin and Ethereum, we quantify the usage of smart contracts in relation to their application domain. We also analyse the most common programming patterns in Ethereum, where the source code of smart contracts is available. 1 Introduction Since the release of Bitcoin in 2009 [38], the idea of exploiting its enabling tech- nology to develop applications beyond currency has been receiving increasing attention [24]. In particular, the public and append-only ledger of transaction (the blockchain) and the decentralized consensus protocol that Bitcoin nodes use to extend it, have revived Nick Szabo's idea of smart contracts | i.e. pro- grams whose correct execution is automatically enforced without relying on a trusted authority [45]. The archetypal implementation of smart contracts is Ethereum [26], a platform where they are rendered in a Turing-complete lan- guage. -
Blockchain and The
NOTES ACKNOWLEDGMENTS INDEX Notes Introduction 1. The manifesto dates back to 1988. See Timothy May, “The Crypto Anarchist Manifesto” (1992), https:// www . activism . net / cypherpunk / crypto - anarchy . html. 2. Ibid. 3. Ibid. 4. Ibid. 5. Ibid. 6. Timothy May, “Crypto Anarchy and Virtual Communities” (1994), http:// groups . csail . mit . edu / mac / classes / 6 . 805 / articles / crypto / cypherpunks / may - virtual - comm . html. 7. Ibid. 8. For example, as we wi ll describe in more detail in Chapter 1, the Bitcoin blockchain is currently stored on over 6,000 computers in eighty- nine jurisdictions. See “Global Bitcoin Node Distribution,” Bitnodes, 21 . co, https:// bitnodes . 21 . co / . Another large blockchain- based network, Ethereum, has over 12,000 nodes, also scattered across the globe. See Ethernodes, https:// www . ethernodes . org / network / 1. 9. See note 8. 10. Some blockchains are not publicly accessible (for more on this, see Chapter 1). These blockchains are referred to as “private blockchains” and are not the focus of this book. 11. See Chapter 1. 12. The Eu ro pean Securities and Market Authority, “Discussion Paper: The Dis- tributed Ledger Technology Applied to Securities Markets,” ESMA / 2016 / 773, June 2, 2016: at 17, https:// www . esma . europa . eu / sites / default / files / library / 2016 - 773 _ dp _ dlt . pdf. 213 214 NOTES TO PAGES 5–13 13. The phenomena of order without law also has been described in other con- texts, most notably by Robert Ellickson in his seminal work Order without Law (Cambridge, MA: Harvard University Press, 1994). 14. Joel Reidenberg has used the term “lex informatica” to describe rules imple- mented by centralized operators online. -
Pdf-Fulltext (142
IRIE International Review of Information Ethics Vol. XY (MM/YYYY) Breilla Zanon: Transparency for institutions, privacy for individuals: the globalized citi- zen and power relations in a postmodern democracy Abstract: The aim of this article is to observe how technologies of communication, especially the Internet - allow extensive and intensive connections between several global territories and how they begin to influence the formation of demands and the organization and participation of individuals/citizens around local and global causes. For this, the below article uses Wikileaks and the cypherpunk philosophy to exemplify how information can be both used and abused in the common space of the internet, allowing new citizenship developments as well as government control strategies. Agenda: Introduction .................................................................................................................................. 56 An information paradox ................................................................................................................ 56 Wikileaks and the lesson of transparency ............................................................................................. 57 Free and controlled information: a philosophical reflection on the conduction of practices ....................... 58 Conclusion ..................................................................................................................................... 59 Author: Breilla Zanon: Federal University of Uberlândia, João Naves -
Proof of Behavior Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi, Ariane Tichit
Proof of Behavior Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi, Ariane Tichit To cite this version: Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi, Ariane Tichit. Proof of Behav- ior. The 2nd Tokenomics Conference on Blockchain Economics, Security and Protocols, Oct 2020, Toulouse, France. hal-02559573 HAL Id: hal-02559573 https://hal.archives-ouvertes.fr/hal-02559573 Submitted on 30 Apr 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License 1 Proof of Behavior 2 Paul-Marie Grollemund 3 Université Clermont Auvergne, LMBP UMR 6620, Aubière, France 4 [email protected] 1 5 Pascal Lafourcade 6 Université Clermont Auvergne, LIMOS UMR 6158, Aubière, France 7 [email protected] 8 Kevin Thiry-Atighehchi 9 Université Clermont Auvergne, LIMOS UMR 6158, Aubière, France 10 [email protected] 11 Ariane Tichit 12 Université Clermont Auvergne, Cerdi UMR 6587, Clermont-Ferrand France 13 [email protected] 14 Abstract 15 Our aim is to change the Proof of Work paradigm. Instead of wasting energy in dummy computations 16 with hash computations, we propose a new approach based on the behavior of the users. -
The Mathematics of Bitcoin Cyril Grunspan, Ricardo Pérez-Marco
The mathematics of Bitcoin Cyril Grunspan, Ricardo Pérez-Marco To cite this version: Cyril Grunspan, Ricardo Pérez-Marco. The mathematics of Bitcoin. European Mathematical Society Newsletter, 2020. hal-02486029 HAL Id: hal-02486029 https://hal.archives-ouvertes.fr/hal-02486029 Submitted on 20 Feb 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Newsletter of the EMS – Manuscript Page 1 The mathematics of Bitcoin Cyril Grunspan (De Vinci Research Center, Paris, France) Ricardo Pérez-Marco (CNRS, IMJ-PRG, Sorbonne Université, Paris, France) 1 Introduction to Bitcoin. Bitcoin is a new decentralized payment network that started operating in January 2009. This new technology was created by a pseudonymous author, or group of authors, called Satoshi Nakamoto in an article that was publically released [1] in the cypherpunk mailing list. The cypherpunks are anarchists and cryptographers that who have been concerned with personal privacy in the Internet since the 90’s. This article follows on a general presentation of Bitcoin by the second author [2]. We refer to this previous article for general background. Here we focuss on mathematics being a feature of the security and effectiveness of Bitcoin protocol. -
Bitcoin Yongdae Kim
EE817/IS893 Blockchain and Cryptocurrency Bitcoin Yongdae Kim 1 Cypherpunk v 1970년대 암호는 군과 스파이 기관의 전유물 v 1980년 경부터 큰 변화 – Data Encryption Standard (DES) by NIST – “New DirectionS in Cryptography” by Diffie-Hellman – David Chaum: ecaSh, pSeudonym, reputation, … v 1992년: Gilmore 등이 작은 그룹을 만듬 – Cypherpunk: cipher + cyberpunk, Cypherpunk mailing liSt v A Cypherpunk’S ManifeSto "Privacy iS neceSSary for an open Society in the electronic age. Privacy iS not Secrecy. A private matter iS Something one doeSn't want the whole world to know, but a Secret matter iS something one doesn't want anybody to know. Privacy is the power to selectively reveal oneSelf to the world.” – “Privacy”는 잘못된 것을 숨기는게 아님! 커텐은 집안에 나쁜게 있어서? 주목할 만한 Cypherpunk들 v Jacob Appelbaum: Tor v Paul Kocher: SSL 3.0 v Julian Assange: WikiLeaks v Moxie Marlinspike: Signal v Adam Back: Hashcash v Zooko Wilcox-O'Hearn: v Bram Cohen: BitTorrent DigiCash, Zcash v Hal Finney: PGP 2.0, v Philip Zimmermann: PGP 1.0 Reusable PoW v Matt Blaze: Clipper chip, v Tim Hudson: SSLeay, the crypto export control precursor to OpenSSL 3 Cypherpunk와 블록체인 v David Chaum (1980s) – "Security without Identification: Transaction Systems to Make Big Brother Obsolete” – Anonymous Digital Cash, Pseudonymous Reputation System v Adam Back (1997) – Hash cash: Anti-spam mechanism requiring cost to send email v Wei Dai (1998) – B-money: Enforcing contractual agreement between two anons – 1. Every participant maintain separate DB: Bitcoin – 2. deposit some money as potential fines or rewards: PoS v Hal Finney (2004) – Reusable PoW: Double spending detection was centralized v Nick Szabo (2005) – “Bit Gold”: Values based on amount of computational work – Concept of “Smart Contract” 4 What is Bitcoin? v Satoshi Nakamoto, who published the invention in 2008 and released it as open-source software in 2009. -
A Broad Evaluation of the Tor English Content Ecosystem
A Broad Evaluation of the Tor English Content Ecosystem Mahdieh Zabihimayvan Reza Sadeghi Department of Computer Science and Engineering Department of Computer Science and Engineering Kno.e.sis Research Center, Wright State University Kno.e.sis Research Center, Wright State University Dayton, OH, USA Dayton, OH, USA [email protected] [email protected] Derek Doran Mehdi Allahyari Department of Computer Science and Engineering Department of Computer Science Kno.e.sis Research Center, Wright State University Georgia Southern University Dayton, OH, USA Statesboro, GA, USA [email protected] [email protected] ABSTRACT It is an open question whether the fundamental and oen nec- Tor is among most well-known dark net in the world. It has noble essary protections that Tor provides its users is worth its cost: the uses, including as a platform for free speech and information dis- same features that protect the privacy of virtuous users also make semination under the guise of true anonymity, but may be culturally Tor an eective means to carry out illegal activities and to evade law beer known as a conduit for criminal activity and as a platform enforcement. Various positions on this question have been docu- to market illicit goods and data. Past studies on the content of mented [16, 22, 30], but empirical evidence is limited to studies that Tor support this notion, but were carried out by targeting popular have crawled, extracted, and analyzed specic subsets of Tor based domains likely to contain illicit content. A survey of past studies on the type of hosted information, such as drug tracking [12], may thus not yield a complete evaluation of the content and use of homemade explosives [20], terrorist activities [7], or forums [39].