CYPHERPUNK LEGACIES
Post by Rusty


The most important aspect to an individual's digital rights in the 21st 
century is encryption. And it's under threat once again. The problem--one 
common to many internet issues--is that despite its overwhelming 
importance, encryption's neither easy to fully comprehend nor does it make 
for a simple, sexy narrative.

***

"Privacy is the power to selectively reveal oneself to the world."
-- Eric Hughes, from "A Cypherpunk's Manifesto."

***

I've been combing through the Cypherpunks listserv archives from 
1992-1998, trying to glean philosophical insights into the first major 
fight over whether safe & complete encryption could be available to 
everyone on the web. Of course, cypherpunks were never a cohesive group; 
they are more of a loose confederation of folks who see encryption as a 
liberatory foundation for individual autonomy. But what an intersection of 
minds: mathematicians, programmers, engineers, lawyers, shitkickers.

The listserv grew out of a meeting of what mathematician Eric Hughes 
sarcastically dubbed Cryptology Amateurs for Social Irresponsibility 
(CASI). This invitation-only meeting took place in Hughes' home in 
Berkeley, CA. Twenty cryto activists were invited including John 
Gilmore--who had founded the Electronic Frontier Foundation with Mitch 
Kapor & John Perry Barlow only 2 years previously--& Timothy May, an 
electronic engineer who founded a crypto-anarchist movement. Many in this 
crew shared deeply libertarian beliefs in the sanctity of the individual & 
a suspicion of governmental power. According to Stephen Levy, May, 
"produced a fifty-seven page handout, along with an elaborate agenda 
including discussion of 'societal implications of cryptography,' 'voting 
networks,' and 'anonymous information markets'" (210). Participants played 
games & exchanged PGP public keys. Judith Milhon, going by the handle St. 
Jude at the time, declared at one point, "You guys are cypherpunks!" (Levy 
211). The name stuck to the group.

Hughes decided to keep the momentum going by starting the Cypherpunks 
listserv on John Gilmore's server (with the delightful domain name of 
toad.com). In a few weeks, 100 participants had joined & by 1993, the 
number mushroomed to 700 (Levy 211-2). The community connected through the 
listserv was incredibly active with multiple thought-provoking posts being 
fired off in a single day. Participants shared transcripts of lectures on 
cryptography, reading lists, manifestos, & sometimes line-by-line 
responses to each other's posts. As in much of the early internet, there 
is a freewheeling, iconoclastic tenor to their conversation, but there's 
also scientific precision & passionate belief. The cypherpunks were trying 
to give the public the tools to encryption not for personal gain, but in 
order to make the internet safer for all of us. Here in the U.S., 
cypherpunks helped fight the Crypto Wars against the FBI & the NSA, 
forcing the government to stop considering cryptographic alogorithms as 
classified munitions & seeing them as protected speech.

***

"'The world has already been taken over. You may have noticed this. We're 
just trying to get some of it back.'" 
-- Judith Milton AKA St. Jude, "Cypherpunk Movement," from an email dated 
1992-09-25

***

I'm not a programmer & my grasp of mathematics has never moved much beyond 
high school algebra so there's much in the Cypherpunks listserv that I do 
not understand. I see heated discussions about program bugs & I treat them 
like tricks in a magic show: I clap at the appropriate times, but I don't 
always grasp the inner workings. However, the emails between members 
fascinate me because they articulate a vision for a less abusive world, a 
world where individuals maintain control.

***

Reading through these archives can be eerie; cypherpunks saw how 
governments wanted shoddy encryption with back door vulnerabilities so 
that they could collect information on their citizens. As early as 1992, 
some members predicted how a government could just gather as much data as 
possible on all citizens, then retroactively examine it when needed, 
weaponizing it against individuals deemed to be threats. Look at this 
scenario that electrical engineer Keith Henson articulates in an email on 
1992-10-27

"One consequence of this proposal would be the capturing of *all* email 
traffic for (possible) subsequent decryption under a court order.  After 
all, how could you complain?  They couldn't read your messages of the last 
ten years unless they happened to get a court order.  Knowing how easy it 
is to get a pliant judge to issue an order, this would be really 
chilling."

Henson essentially predicts the NSA's post-9/11 PRISM program in which 
metadata on all Americans' calls were gathered, the very same program that 
Edward Snowden leaked to the public.

***

"You don't understand the theory of power.  Simply make the penalty for 
encryption without registry, larger than the penalty for any other crime.  
Then no crime can be hidden behind it.  It's like getting Al Capone for 
income tax evasion; if you investigate someone and they are enforcing 
privacy on their communications, you can put them in jail for life for 
that, and can stop worrying about the original suspected offense."
--John Gilmore in an email dated 1992-10-27.

***

Reading the list can also be surreal. Basic encryption programs that we 
all take for granted like PGP [Pretty Good Privacy] were considered 
illegal if they crossed U.S. borders. I'm thinking of how PGP's inventor 
Phil Zimmerman was charged with "exporting munitions without a license" in 
1993 because PGP was being used to protect the communications of 
grassroots political groups across the globe. Members in the Cypherpunks 
listserv followed Zimmerman's trial closely, of course, & debated the 
relative safety of being found by government officials with encryption 
programs. In 1994-1995, some members discussed whether U.S. Customs would 
be able to spot encryption programs on laptops. Carol Anne Braddock in a 
1995-01-01 email, writes:

"I couldn't agree with the general drift much more. The real objective is 
to get the customs officials used to the procedure of dealing the 
cryptograhic materials. Your best asset is a good feature reporter and a 
photograher. Right now, I don't think U.S. Customs is going to ask you if 
you have PGP in your PC if you leave the country, or return either. They 
should, and I'd be proud to say yes."

Bringing computer code on a plane treated like carrying a bomb! After a 
protracted battle, Zimmerman ultimately won his case. He smartly published 
PGP in a book, arguing that it was protected speech. In this way, the 
fight over encryption also became a fight over what kinds of information 
citizens are allowed to share with each other.

***

I saw this meme circulating on Mastodon the other day: DANCE LIKE NO ONE'S 
WATCHING, ENCRYPT LIKE EVERYONE IS. 

***

At its core, the Cypherpunks mailing list considers the issue of trust in 
a world that so often is lacking it. A lot of the cypherpunks saw that 
trust would be even harder to maintain in an online world because the 
difficulty of authentication. Eric Hughes proclaims in a 1992.10.06 email: 
"In the electronic world, all you have are persistent pseudonyms." Hughes 
argues that what matters in digital interactions is not trust, but rather 
persistence. In other words, I don't care who you "really" are, just that 
I know you'll consistently act in a particular way. This idea led many 
cypherpunks to ask the question: can we create an internet that does not 
require trust to operate? One can see how these early conversations would 
lead to the development of blockchain & zero knowledge architectures, or 
ledgers of interpersonal transactions that both allow anonymity, but don't 
allow manipulations in the record.  

***

The fight to protect encryption never ends. The FBI is currently pissed 
that Apple won't break the encryption on the San Bernadino shooter's 
iPhone. The Attorney General William Barr has made it quite clear that he 
views encryption with deep suspicion. And now there are various forms of 
legislation trying to attack encryption indirectly, to hold internet 
platforms liable for how users employ it.

***

My recent letter to Lindsey Graham: 

Dear Senator Graham:

I strongly urge you to reconsider pursuing the EARN IT Act legislation 
because it threatens the very existence of end-to-end encryption. While 
EARN IT's explicitly stated goal is to work against child sex abuse 
material (CSAM) on internet platforms, it actually is trying to eviscerate 
Section 230 of 1996's Communications Decency Act (CDA), which holds that 
internet platforms cannot be held liable for what users do or say. First 
of all, federal law already fights against CSAM. According to Stanford's 
Center for Internet & Society: "Federal law, specifically Chapter 110 of 
Title 18 of the U.S. Code (18 U.S.C. ยงยง 2251-2260A), already makes 
everything about CSAM a crime: producing, receiving, accessing, viewing, 
possessing, distributing, selling, importing, etc." The problem with EARN 
IT is that, in its current form, it would create a commission not elected 
by voters who would write a set of "best practices" for platforms that 
would attack one of the core American rights: the right to privacy. Many 
parts of the federal government, include the FBI & the Attorney General, 
have made it clear that they despise encryption. I believe EARN IT would 
grant both the oversight commission & the Attorney General powers to 
attack encryption in its foundational role in the communications of 
everyday, law-abiding people. I believe that this piece of legislation is 
hiding its full intent under two cloaks: trying to fight CSAM & popular 
outrage against social media companies. Senator Graham, if you truly care 
about protecting Americans & limiting the powers of our federal 
government, you will stop pursuing EARN IT.

***

These daring words from John Perry Barlow feel like a good ending. 
Certainly dramatic: "You can have my encryption algorithm when you pry my 
cold dead fingers from its private key."

***

Resources 

Zipped files of Cyberpunk listserv: 
<http://cryptome.org/cpunks/cpunks-92-98.zip>

Eric Hughes' "A Cypherpunk's Manifesto": 
<https://www.activism.net/cypherpunk/manifesto.html>

Steven Levy, Crypto: How the Code Rebels Beat the Government--Saving 
Privacy in the Digital Age, New York: Penguin, 2001. 

Riana Pfefferkorn,"The EARN IT Act: How to Ban End-to-End Encryption 
Without Actually Banning It," Stanford Center for Internet & Society. 
<https://cyberlaw.stanford.edu/blog/2020/01/earn-it-act-how-ban-end-end-encryption-without-actually-banning-it>