0.2 — Law After Decryption
Cypherpunk & crypto-anarchy as the migration of law from paper and guns into math, hardware, and protocol.
May · Hughes · Chaum · Szabo · Dai · Back · Finney · Satoshi · Zooko · Moxie · Perrin — each is a constraint; together they bound the design space.
0. Orientation
Cypherpunk and crypto-anarchy are not ideologies. They are a migration of law into protocol: constraints that execute.
- Privacy as boundary condition
- Crypto-anarchy as applied anarcho-capitalism
- Digital cash as economic court
- P2P identity & comms as nervous system
Orientation spine (non-negotiable primary texts)
1. Privacy as Boundary, Not Right
1.1. The Control Problem
In a fully surveilled environment: every value flow is visible, every association graph is reconstructible, every message can be profiled (read or scored). Under those conditions, “rights” are irrelevant: coercion becomes pre-emptive.
- Without privacy, property becomes a list of targets.
- Without privacy, speech becomes a permitted performance.
- Without privacy, contract becomes a revocable favor.
1.2. Chaum: Proving Big Brother Is Optional
Chaum proves surveillance is a design choice, not a metaphysical inevitability.
- Blind signatures (1982): a bank can sign a coin without seeing its contents; later validate and redeem without linking withdrawal to spend.
- eCash/DigiCash (1980s–90s): validatable but unlinkable coins under proper use — strong privacy with a central issuer.
2. Crypto-Anarchy: Anarcho-Capitalism Compiled
2.1. May: Crypto as Regime Change
May frames the core transformation: strong encryption + anonymous cash + untraceable networks ⇒ the state’s informational monopoly collapses; law that depends on “knowing who/where/how much” becomes unenforceable by design.
2.2. Hughes: Cypherpunks Write Code
Hughes articulates the imperative: privacy is selective revelation; cypherpunks write code. Protocol, not petition, is the method.
- If it doesn’t run, it doesn’t exist.
- If it runs but depends on permission, it belongs to the adversary.
- If it runs, survives attack, and cannot be quietly co-opted, it becomes law.
3. Digital Cash: From Central Issuer to Time-Chain
Digital cash is the motor of crypto-anarchy. Without money that follows cryptographic law rather than institutional decree, the stack collapses back into banking.
3.1. Szabo: Smart Contracts & Bit Gold
Szabo encodes two pillars: smart contracts (law as a state machine) and bit gold (property as time-stamped, cost-anchored entries without a sovereign issuer).
3.2. Wei Dai: b-money and Stateless Enforcement
Untraceable pseudonyms imply violence cannot find the economic actors. Enforcement must become economic/social/cryptographic: penalties, slashing, forfeiture, exclusion, time-locks, proofs.
3.3. Back: Hashcash and Bare Proof-of-Work
Hashcash introduces the primitive: expensive to produce, cheap to verify. Cost becomes a bearer object.
3.4. Finney: RPOW, Remailers, and First Node
RPOW extends PoW into reuse via a server anchored in secure hardware: reintroduces a trust surface, but bridges the era from remailers to a running monetary network.
3.5. Satoshi: Bitcoin as Irreversible Synthesis
Satoshi fuses Hashcash-style PoW, Szabo-like chained time-stamps, and Dai-like broadcast accounting into a peer-to-peer cash system. The ledger is public; survivability is issuer-free.
4. Re-Injecting Privacy: Zero-Knowledge Money
Bitcoin trades Chaum-level privacy for Chaum-free survivability. The next phase asks whether strong privacy can be restored without restoring centralization.
5. P2P Identity & Comms: The Nervous System
5.1. Zooko’s Triangle: Naming Under Constraint
Any naming system can optimize at most two of: human-meaningful, secure/global, decentralized. Resolution is layering: keys as canonical identity; readable names as forkable local overlays.
5.2. Remailers: Breaking the Straight Line
Early remailer and mix-net designs demonstrate that routing can be separated from identity; the message graph can be broken into unlinkable segments. Communication topology is a battleground.
5.3. Signal Protocol: Industrial-Scale Encrypted Comms
Marlinspike and Perrin formalize a modern end-to-end encrypted stack: X3DH + Double Ratchet (forward secrecy, post-compromise security, async operation). Content becomes unreadable to servers; metadata remains an infrastructure reality.
6. Adversarial Regime: Capture and Inversion
All primitives are deployed inside centralized dependencies: app stores, telcos, cloud providers, chain analytics, surveillance law, KYC perimeters, and large-scale graph mining.
6.1. Bitcoin as Perfect Telemetry
Protocol invariants can remain intact while the usage topology becomes enclosed by custodians and KYC gateways. A public ledger plus identity chokepoints yields near-perfect mapping of regulated flows.
6.2. Privacy Coins Under Quarantine
Delistings, stigma, reduced liquidity, narrower anonymity sets: privacy becomes a niche and therefore a target surface.
6.3. Endpoint and Supply-Chain Compromise
Protocols do not protect against compromised endpoints, coerced device access, backdoored firmware/basebands, RNG manipulation, or policy-enforced client disablement. The kill switch moves from “disable protocol” to “disable the user’s ability to run it.”
7. Crypto-Anarchy as Stack
Crypto-anarchy is a multi-layer stack of jurisdictions. Each layer has its own law, kill switches, and trade-offs.
7.1 Hardware / OS
execution law7.2 Network & Comms
routing law7.3 Identity
signing law8. Each Thinker as Constraint
The lineage is a set of hard edges: any “perfect” design that ignores them is lying.
May
use-agnosticHughes
runs or failsChaum
issuer kill-switchSzabo
TTP is a holeDai
no sheriffBack
asymmetric costFinney
trust returnsSatoshi
energy courtZooko
naming boundPGP as explicit moral statement (privacy as necessity)
9. Crypto-Anarchy After the Capture
The original vision assumed open hardware, permissionless software distribution, porous perimeters, and limited inspection. The present environment flips those assumptions: locked devices, gated app stores, DPI, KYC/AML rail definitions, and AI-scale graph mining.
Crypto-anarchy is the deliberate composition of tools such that coercion must pay a visible, non-trivial cost to interfere, observe, or exclude — and such that no single kill switch restores total control.
Resource Index (All Links)
Each resource is indexed (r1…r32). Inline chips above jump here.
Primary Text Canon (non-negotiable)
r1 — Timothy C. May: “The Crypto Anarchist Manifesto” (1988)
One-page payload: strong crypto collapses selective enforcement; black/grey markets emerge by default.
r2 — May: The Cyphernomicon (1994)
Cypherpunks FAQ brain-dump: remailers, digital cash, threat models, blacknet, jurisdictional arbitrage.
r3 — Eric Hughes: “A Cypherpunk’s Manifesto” (1993) (entry)
“Privacy is the power to selectively reveal oneself… Cypherpunks write code.”
r4 — May: “Cyberspace, Crypto Anarchy, and Pushing Limits”
Virtual communities, anonymous reputation, crypto-based services replacing legacy enforcement.
r5 — David Chaum: “Security Without Identification…” (1985)
Founding privacy-tech document: unlinkable credentials, anonymous payments, coercion-resistant systems.
r6 — Chaum: “Blind Signatures for Untraceable Payments” (1982)
Mechanics of Chaumian e-cash: validatable coins without linkable withdrawal↔spend.
r7 — Chaum: Untraceable email / mixnets / digital pseudonyms (pointer)
Blueprint lineage for anonymity networks and pseudonymous messaging under surveillance.
r8 — Nick Szabo: “Shelling Out: The Origins of Money”
Money as costly signal: why digital cash must encode unforgeable sacrifice, not decree.
r9 — Szabo: “Trusted Third Parties Are Security Holes” (and Bit Gold pointer)
TTP dependency as structural failure; property/contract must escape centralized trust.
r10 — Wei Dai: “b-money”
Anonymous distributed electronic cash; enforcement via incentives and pseudonymous accounting.
r11 — Adam Back: “Hashcash”
Asymmetric cost primitive: expensive to produce, cheap to verify proofs.
r12 — Hal Finney: “Reusable Proofs of Work (RPOW)”
PoW tokens made reusable via a server anchored in secure hardware: utility with a trust surface.
r13 — Satoshi Nakamoto: “Bitcoin” (2008)
Issuer-free synthesis: PoW + chained records + P2P accounting under pseudonyms.
r14 — Nakamoto Institute Library / Satoshi archive (entry)
Curated archive for Satoshi + cypherpunk lineage texts.
r15 — Zooko’s Triangle
Naming constraint: pick two of human-meaningful, secure/global, decentralized.
r16 — Tahoe-LAFS: Least-Authority File Store (design docs)
Capability-based decentralized storage: least authority as a built-in boundary.
r17 — Moxie: “SSL and the Future of Authenticity”
Autopsy of the CA trust model; why centralized authenticity is structurally compromised.
r18 — Signal Protocol: X3DH specification
Async key agreement for E2EE messaging: the on-ramp to ratcheting security.
r19 — Noise Protocol Framework
General handshake framework used across modern secure systems (including many P2P stacks).
r20 — Phil Zimmermann: “Why I Wrote PGP”
Privacy framed as necessity and obligation under surveillance states.
Books / Anthologies / Late-stage dialogues
r21 — Steven Levy: Crypto (history context pointer)
Crypto wars, PGP, Chaum, cypherpunks, export controls — macro context for the primary texts.
r22 — Ludlow (ed.): Crypto Anarchy, Cyberstates, and Pirate Utopias (pointer)
Virtual states, crypto-anarchist speculation, early sovereignty thought (anthology context).
r23 — Assange et al.: Cypherpunks: Freedom and the Future of the Internet (pointer)
Late-stage cypherpunk dialogue on mass surveillance, cryptography, and resistance framing.
r24 — cryptoanarchy.wiki (meta-index)
Concise Q&A / mapping for crypto-anarchy and cypherpunk lineage.
Films / Documentaries (operational case studies)
r25 — Citizenfour (2014)
Live capture of Snowden’s disclosures; mass surveillance as real substrate.
r26 — The Internet’s Own Boy (2014)
Information freedom, prosecutorial overreach, and the cost of challenging enclosures.
r27 — Death Athletic: A Dissident Architecture (2023)
Code as weapon at legal edges; crypto-anarchy under direct adversarial pressure.
High-signal video
r28 — ReasonTV: “Cypherpunks Write Code” series
Bridge from May’s abstraction to present fights: crypto, gun files, speech, law destabilization.
r29 — “David Chaum & DigiCash: The First Digital Currency”
Historical treatment of Chaum’s e-cash and why centralized operators remain kill-switches.
r30 — Chaum/DigiCash retrospectives (same entry link)
Use as origin interview / historical context, not protocol endorsement.
Podcasts / Longform audio
r31 — Tim Ferriss #244: Nick Szabo (with Naval)
Social scalability, smart contracts, institutional constraints: Szabo in longform.
r32 — Bitcoin Audible: readings of primary texts (example: “Trusted Third Parties…”)
High-fidelity audio ingestion of the canonical essays.
r35 — TFTC: “DEATH ATHLETIC… with Jessica Solce”
Legal/technical frontiers of publishing weaponized code under adversarial scrutiny.