← curriculum home module 0.2

Cypherpunk & Crypto-Anarchy

0.2 — Law After Decryption

Cypherpunk & crypto-anarchy as the migration of law from paper and guns into math, hardware, and protocol.

privacy as boundary condition crypto-anarchy as compiled anarcho-capitalism digital cash as economic court P2P comms + identity as nervous system
Lineage of proof
May · Hughes · Chaum · Szabo · Dai · Back · Finney · Satoshi · Zooko · Moxie · Perrin — each is a constraint; together they bound the design space.

0. Orientation

Cypherpunk and crypto-anarchy are not ideologies. They are a migration of law into protocol: constraints that execute.

This lecture specifies the migration across four axes:
  • Privacy as boundary condition
  • Crypto-anarchy as applied anarcho-capitalism
  • Digital cash as economic court
  • P2P identity & comms as nervous system
Orientation spine (non-negotiable primary texts)

1. Privacy as Boundary, Not Right

1.1. The Control Problem

In a fully surveilled environment: every value flow is visible, every association graph is reconstructible, every message can be profiled (read or scored). Under those conditions, “rights” are irrelevant: coercion becomes pre-emptive.

  • Without privacy, property becomes a list of targets.
  • Without privacy, speech becomes a permitted performance.
  • Without privacy, contract becomes a revocable favor.
Privacy here is the insulating layer that keeps autonomy from shorting into the environment.

1.2. Chaum: Proving Big Brother Is Optional

Chaum proves surveillance is a design choice, not a metaphysical inevitability.

  • Blind signatures (1982): a bank can sign a coin without seeing its contents; later validate and redeem without linking withdrawal to spend.
  • eCash/DigiCash (1980s–90s): validatable but unlinkable coins under proper use — strong privacy with a central issuer.
Chaum’s constraint: privacy can be mathematically enforced — but a single issuer/operator is a kill switch.

2. Crypto-Anarchy: Anarcho-Capitalism Compiled

2.1. May: Crypto as Regime Change

May frames the core transformation: strong encryption + anonymous cash + untraceable networks ⇒ the state’s informational monopoly collapses; law that depends on “knowing who/where/how much” becomes unenforceable by design.

Crypto-anarchy is not chaos: it is order under conditions where coercion cannot selectively find you.
Enforcement = what can be done to a key and its reachable infrastructure — not what can be done to a body at an address.

2.2. Hughes: Cypherpunks Write Code

Hughes articulates the imperative: privacy is selective revelation; cypherpunks write code. Protocol, not petition, is the method.

Doctrine:
  • If it doesn’t run, it doesn’t exist.
  • If it runs but depends on permission, it belongs to the adversary.
  • If it runs, survives attack, and cannot be quietly co-opted, it becomes law.

3. Digital Cash: From Central Issuer to Time-Chain

Digital cash is the motor of crypto-anarchy. Without money that follows cryptographic law rather than institutional decree, the stack collapses back into banking.

3.1. Szabo: Smart Contracts & Bit Gold

Szabo encodes two pillars: smart contracts (law as a state machine) and bit gold (property as time-stamped, cost-anchored entries without a sovereign issuer).

3.2. Wei Dai: b-money and Stateless Enforcement

Untraceable pseudonyms imply violence cannot find the economic actors. Enforcement must become economic/social/cryptographic: penalties, slashing, forfeiture, exclusion, time-locks, proofs.

3.3. Back: Hashcash and Bare Proof-of-Work

Hashcash introduces the primitive: expensive to produce, cheap to verify. Cost becomes a bearer object.

3.4. Finney: RPOW, Remailers, and First Node

RPOW extends PoW into reuse via a server anchored in secure hardware: reintroduces a trust surface, but bridges the era from remailers to a running monetary network.

3.5. Satoshi: Bitcoin as Irreversible Synthesis

Satoshi fuses Hashcash-style PoW, Szabo-like chained time-stamps, and Dai-like broadcast accounting into a peer-to-peer cash system. The ledger is public; survivability is issuer-free.

Bitcoin in this frame is a time-chain court: sacrificed energy becomes globally consistent economic history.

4. Re-Injecting Privacy: Zero-Knowledge Money

Bitcoin trades Chaum-level privacy for Chaum-free survivability. The next phase asks whether strong privacy can be restored without restoring centralization.

ZK constraint (as stated here): privacy without a mint shifts the trust surface from operator power to ceremony correctness and cryptographic assumptions.
Naming/identity constraints also bind privacy deployments (see Zooko’s triangle: r15).

5. P2P Identity & Comms: The Nervous System

5.1. Zooko’s Triangle: Naming Under Constraint

Any naming system can optimize at most two of: human-meaningful, secure/global, decentralized. Resolution is layering: keys as canonical identity; readable names as forkable local overlays.

5.2. Remailers: Breaking the Straight Line

Early remailer and mix-net designs demonstrate that routing can be separated from identity; the message graph can be broken into unlinkable segments. Communication topology is a battleground.

5.3. Signal Protocol: Industrial-Scale Encrypted Comms

Marlinspike and Perrin formalize a modern end-to-end encrypted stack: X3DH + Double Ratchet (forward secrecy, post-compromise security, async operation). Content becomes unreadable to servers; metadata remains an infrastructure reality.

Choke points: phone numbers, app stores, push infrastructure. Content can be sovereign while identity/distribution remain kill-switchable.

6. Adversarial Regime: Capture and Inversion

All primitives are deployed inside centralized dependencies: app stores, telcos, cloud providers, chain analytics, surveillance law, KYC perimeters, and large-scale graph mining.

6.1. Bitcoin as Perfect Telemetry

Protocol invariants can remain intact while the usage topology becomes enclosed by custodians and KYC gateways. A public ledger plus identity chokepoints yields near-perfect mapping of regulated flows.

6.2. Privacy Coins Under Quarantine

Delistings, stigma, reduced liquidity, narrower anonymity sets: privacy becomes a niche and therefore a target surface.

6.3. Endpoint and Supply-Chain Compromise

Protocols do not protect against compromised endpoints, coerced device access, backdoored firmware/basebands, RNG manipulation, or policy-enforced client disablement. The kill switch moves from “disable protocol” to “disable the user’s ability to run it.”

7. Crypto-Anarchy as Stack

Crypto-anarchy is a multi-layer stack of jurisdictions. Each layer has its own law, kill switches, and trade-offs.

7.1 Hardware / OS
execution law
Law: what the device will execute.
Kill switches: locked bootloaders, signed firmware, remote attestation, baseband constraints.
7.2 Network & Comms
routing law
Law: who can talk to whom, how often, with what metadata.
Kill switches: IP blacklists, DNS control, fingerprinting, protocol bans.
Specs/constraints: r18, r19, r17
7.3 Identity
signing law
Law: who can sign, own, and contract; how reputations accrete.
Kill switches: telco bindings, centralized registries, CA authorities, platform logins.
Naming constraint: r15
7.4 Money & Contract
settlement law
Law: how value moves; how obligations are enforced.
Kill switches: KYC perimeters, oracle capture, custody concentration.
Core lineage: r10, r11, r13

8. Each Thinker as Constraint

The lineage is a set of hard edges: any “perfect” design that ignores them is lying.

May
use-agnostic
Crypto-anarchy enables emancipation and abhorrent markets; “good use only” assumptions are self-deception. (r1, r2, r4)
Hughes
runs or fails
Without running code, crypto-politics is theater; privacy is implemented, not requested. (r3)
Chaum
issuer kill-switch
Strong privacy is possible; centralized issuers are political single points of failure. (r6, r5)
Szabo
TTP is a hole
Trusted third parties are security holes; property/contract need public cost-anchored registries to survive without states. (r8, r9)
Dai
no sheriff
Untraceable pseudonyms require economic/reputational enforcement; design must assume nobody can be arrested. (r10)
Back
asymmetric cost
Scarcity from asymmetric cost is real; bare PoW without governance can congeal around new power centers. (r11)
Finney
trust returns
Reusability reintroduces trust surfaces (hardware/operators); bootstrapping requires early validators willing to run first. (r12)
Satoshi
energy court
Removing issuers implies public ledgers and probabilistic finality; energy becomes arbiter where trust collapses. (r13, r14)
Zooko
naming bound
Human + secure + decentralized naming cannot be fully simultaneous without layering; privacy at scale shifts trust to ceremonies/assumptions. (r15)
Moxie & Perrin
metadata reality
Billions can have forward-secure content; if identity binds to phone numbers/app stores, coercion moves to SIMs and platforms. (r17, r18, r19)
PGP as explicit moral statement (privacy as necessity)

9. Crypto-Anarchy After the Capture

The original vision assumed open hardware, permissionless software distribution, porous perimeters, and limited inspection. The present environment flips those assumptions: locked devices, gated app stores, DPI, KYC/AML rail definitions, and AI-scale graph mining.

Final form (here):
Crypto-anarchy is the deliberate composition of tools such that coercion must pay a visible, non-trivial cost to interfere, observe, or exclude — and such that no single kill switch restores total control.
Rule-set: keys over names · proof over permission · math over decree · stacks over slogans

Resource Index (All Links)

Each resource is indexed (r1…r32). Inline chips above jump here.

Primary Text Canon (non-negotiable)
primary · MIT CSAILopen ↗
r1 — Timothy C. May: “The Crypto Anarchist Manifesto” (1988)

One-page payload: strong crypto collapses selective enforcement; black/grey markets emerge by default.

primary · Wikipediaopen ↗
r2 — May: The Cyphernomicon (1994)

Cypherpunks FAQ brain-dump: remailers, digital cash, threat models, blacknet, jurisdictional arbitrage.

primary · Wikipediaopen ↗
r3 — Eric Hughes: “A Cypherpunk’s Manifesto” (1993) (entry)

“Privacy is the power to selectively reveal oneself… Cypherpunks write code.”

primary · SNIopen ↗
r4 — May: “Cyberspace, Crypto Anarchy, and Pushing Limits”

Virtual communities, anonymous reputation, crypto-based services replacing legacy enforcement.

paper · ACMopen ↗
r5 — David Chaum: “Security Without Identification…” (1985)

Founding privacy-tech document: unlinkable credentials, anonymous payments, coercion-resistant systems.

paper · PDFopen ↗
r6 — Chaum: “Blind Signatures for Untraceable Payments” (1982)

Mechanics of Chaumian e-cash: validatable coins without linkable withdrawal↔spend.

paper/index · Wikipediaopen ↗
r7 — Chaum: Untraceable email / mixnets / digital pseudonyms (pointer)

Blueprint lineage for anonymity networks and pseudonymous messaging under surveillance.

essay · SNIopen ↗
r8 — Nick Szabo: “Shelling Out: The Origins of Money”

Money as costly signal: why digital cash must encode unforgeable sacrifice, not decree.

essay · Upcartaopen ↗
r9 — Szabo: “Trusted Third Parties Are Security Holes” (and Bit Gold pointer)

TTP dependency as structural failure; property/contract must escape centralized trust.

primary · Weidaiopen ↗
r10 — Wei Dai: “b-money”

Anonymous distributed electronic cash; enforcement via incentives and pseudonymous accounting.

paper · Hashcashopen ↗
r11 — Adam Back: “Hashcash”

Asymmetric cost primitive: expensive to produce, cheap to verify proofs.

paper · SNIopen ↗
r12 — Hal Finney: “Reusable Proofs of Work (RPOW)”

PoW tokens made reusable via a server anchored in secure hardware: utility with a trust surface.

paper · Bitcoin.orgopen ↗
r13 — Satoshi Nakamoto: “Bitcoin” (2008)

Issuer-free synthesis: PoW + chained records + P2P accounting under pseudonyms.

archive · SNIopen ↗
r14 — Nakamoto Institute Library / Satoshi archive (entry)

Curated archive for Satoshi + cypherpunk lineage texts.

constraint · Wikipediaopen ↗
r15 — Zooko’s Triangle

Naming constraint: pick two of human-meaningful, secure/global, decentralized.

paper · Tahoe-LAFSopen ↗
r16 — Tahoe-LAFS: Least-Authority File Store (design docs)

Capability-based decentralized storage: least authority as a built-in boundary.

essay · Moxieopen ↗
r17 — Moxie: “SSL and the Future of Authenticity”

Autopsy of the CA trust model; why centralized authenticity is structurally compromised.

spec · Signalopen ↗
r18 — Signal Protocol: X3DH specification

Async key agreement for E2EE messaging: the on-ramp to ratcheting security.

spec · Noiseopen ↗
r19 — Noise Protocol Framework

General handshake framework used across modern secure systems (including many P2P stacks).

essay · Zimmermannopen ↗
r20 — Phil Zimmermann: “Why I Wrote PGP”

Privacy framed as necessity and obligation under surveillance states.

Books / Anthologies / Late-stage dialogues
book · Google Scholaropen ↗
r21 — Steven Levy: Crypto (history context pointer)

Crypto wars, PGP, Chaum, cypherpunks, export controls — macro context for the primary texts.

anthology · Semantic Scholaropen ↗
r22 — Ludlow (ed.): Crypto Anarchy, Cyberstates, and Pirate Utopias (pointer)

Virtual states, crypto-anarchist speculation, early sovereignty thought (anthology context).

book/dialogue · Wikipedia (pointer)open ↗
r23 — Assange et al.: Cypherpunks: Freedom and the Future of the Internet (pointer)

Late-stage cypherpunk dialogue on mass surveillance, cryptography, and resistance framing.

index · cryptoanarchy.wikiopen ↗
r24 — cryptoanarchy.wiki (meta-index)

Concise Q&A / mapping for crypto-anarchy and cypherpunk lineage.

Films / Documentaries (operational case studies)
film · Wikipediaopen ↗
r25 — Citizenfour (2014)

Live capture of Snowden’s disclosures; mass surveillance as real substrate.

film · Wikipediaopen ↗
r26 — The Internet’s Own Boy (2014)

Information freedom, prosecutorial overreach, and the cost of challenging enclosures.

film · Wikipediaopen ↗
r27 — Death Athletic: A Dissident Architecture (2023)

Code as weapon at legal edges; crypto-anarchy under direct adversarial pressure.

High-signal video
video · YouTube playlistopen ↗
r28 — ReasonTV: “Cypherpunks Write Code” series

Bridge from May’s abstraction to present fights: crypto, gun files, speech, law destabilization.

video · YouTubeopen ↗
r29 — “David Chaum & DigiCash: The First Digital Currency”

Historical treatment of Chaum’s e-cash and why centralized operators remain kill-switches.

video · YouTubeopen ↗
r30 — Chaum/DigiCash retrospectives (same entry link)

Use as origin interview / historical context, not protocol endorsement.

Podcasts / Longform audio
pod · Tim.blogopen ↗
r31 — Tim Ferriss #244: Nick Szabo (with Naval)

Social scalability, smart contracts, institutional constraints: Szabo in longform.

audio · Bitcoin Audibleopen ↗
r32 — Bitcoin Audible: readings of primary texts (example: “Trusted Third Parties…”)

High-fidelity audio ingestion of the canonical essays.

pod · Spotifyopen ↗
r35 — TFTC: “DEATH ATHLETIC… with Jessica Solce”

Legal/technical frontiers of publishing weaponized code under adversarial scrutiny.