Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
1. Introduction
1.1. copyright
1.2. Foreword
1.3. Motivations
1.4. Who Should Read This
1.5. Comments on Style and Thoroughness
1.6. Corrections and Elaborations
1.7. Acknowledgements
1.8. Ideas and Notes (not to be printed)
1.9. Things are moving quickly in crypto and crypto policy
1.10. Notes: The Cyphernomicon: the CypherFAQ and More
2. MFAQ--Most Frequently Asked Questions
2.1. copyright
2.2. SUMMARY: MFAQ--Most Frequently Asked Questions
2.3. "What's the 'Big Picture'?"
2.4. Organizational
2.5. Crypto
2.6. PGP
2.7. Clipper
2.8. Other Ciphers and Crypto Products
2.9. Remailers and Anonymity
2.10. Surveillance and Privacy
2.11. Legal
2.12. Digital Cash
2.13. Crypto Anarchy
2.14. Miscellaneous
2.15. More Information and References
3. Cypherpunks -- History, Organization, Agenda
3.1. copyright
3.2. SUMMARY: Cypherpunks -- History, Organization, Agenda
3.3. The Cypherpunks Group and List
3.4. Beliefs, Goals, Agenda
3.5. Self-organizing Nature of Cypherpunks
3.6. Mechanics of the List
3.7. Publicity
3.8. Loose Ends
4. Goals and Ideology -- Privacy, Freedom, New Approaches
4.1. copyright
4.2. SUMMARY: Goals and Ideology -- Privacy, Freedom, New Approaches
4.3. Why a Statement of Ideology?
4.4. "Welcome to Cypherpunks"
4.5. "Cypherpunks Write Code"
4.6. Technological empowerment
4.7. Free Speech Issues
4.8. Privacy Issues
4.9. Education Issues
4.10. Libertarian Issues
4.11. Crypto Anarchy
4.12. Loose Ends
5. Cryptology
5.1. copyright
5.2. SUMMARY: Cryptology
5.3. What this FAQ Section Will Not Cover
5.4. Crypto Basics
5.5. Cryptology-Technical, Mathematical
5.6. Crypto Programs and Products
5.7. Related Ideas
5.8. The Nature of Cryptology
5.9. Practical Crypto
5.10. DES
5.11. Breaking Ciphers
5.12. Loose Ends
6. The Need For Strong Crypto
6.1. copyright
6.2. SUMMARY: The Need For Strong Crypto
6.3. General Uses of and Reasons for Crypto
6.4. Protection of Corporate and Financial Privacy
6.5. Digital Signatures
6.6. Political Uses of Crypto
6.7. Beyond Good and Evil, or, Why Crypto is Needed
6.8. Crypo Needed for Operating Systems and Networks
6.9. Ominous Trends
6.10. Loose Ends
7. PGP -- Pretty Good Privacy
7.1. copyright
7.2. SUMMARY: PGP -- Pretty Good Privacy
7.3. Introduction
7.4. What is PGP?
7.5. Importance of PGP
7.6. PGP Versions
7.7. Where to Get PGP?
7.8. How to Use PGP
7.9. Keys, Key Signings, and Key Servers
7.10. PGP Front Ends, Shells, and Tools
7.11. Other Crypto Programs And Tools
7.12. Legal Issues with PGP
7.13. Problems with PGP, Flaws, Etc.
7.14. The Future of PGP
7.15. Loose Ends
8. Anonymity, Digital Mixes, and Remailers
8.1. copyright
8.2. SUMMARY: Anonymity, Digital Mixes, and Remailers
8.3. Anonymity and Digital Pseudonyms
8.4. Reasons for Anonymity and Digital Pseudonyms (and Untraceable E-
Mail)
8.5. Untraceable E-Mail
8.6. Remailers and Digital Mixes (A Large Section!)
8.6.1. What are remailers?
8.6.2. Cypherpunks remailers compared to Julf's
8.7. Anonymous Posting to Usenet
8.8. Anonymous Message Pools, Newsgroups, etc.
8.8.1. "Why do some people use message pools?"
8.9. Legal Issues with Remailers
8.10. Cryptanalysis of Remailer Networks
8.11. Dining Cryptographers
8.12. Future Remailers
8.13. Loose Ends
9. Policy: Clipper,Key Escrow, and Digital Telephony
9.1. copyright
9.2. SUMMARY: Policy: Clipper,Key Escrow, and Digital Telephony
9.3. Introduction
9.4. Crypto Policy Issues
9.5. Motivations for Crypto Laws
9.6. Current Crypto Laws
9.7. Crypto Laws Outside the U.S.
9.8. Digital Telephony
9.9. Clipper, Escrowed Encyption Standard
9.10. Technical Details of Clipper, Skipjack, Tessera, and EES
9.11. Products, Versions -- Tessera, Skipjack, etc.
9.12. Current Status of EES, Clipper, etc.
9.13. National Information Infrastructure, Digital Superhighway
9.14. Government Interest in Gaining Control of Cyberspace
9.15. Software Key Escrow
9.16. Politics, Opposition
9.17. Legal Issues with Escrowed Encryption and Clipper
9.18. Concerns
9.19. Loose Ends
10. Legal Issues
10.1. copyright
10.2. SUMMARY: Legal Issues
10.3. Basic Legality of Encryption
10.4. Can Crypto be Banned?
10.5. Legal Issues with PGP
10.6. Legal Issues with Remailers
10.7. Legal Issues with Escrowed Encryption and Clipper
10.8. Legal Issues with Digital Cash
10.9. Legality of Digital Banks and Digital Cash?
10.10. Export of Crypto, ITAR, and Similar Laws
10.11. Regulatory Arbitrage
10.12. Crypto and Pornography
10.13. Usenet, Libel, Local Laws, Jurisdictions, etc.
10.14. Emergency Regulations
10.15. Patents and Copyrights
10.16. Practical Issues
10.17. Free Speech is Under Assault
10.18. Systems, Access, and the Law
10.19. Credentials
10.20. Escrow Agents
10.21. Loose Ends
11. Surveillance, Privacy, And Intelligence Agencies
11.1. copyright
11.2. SUMMARY: Surveillance, Privacy, And Intelligence Agencies
11.3. Surveillance and Privacy
11.4. U.S. Intelligence Agencies: NSA, FinCEN, CIA, DIA, NRO, FBI
11.5. Surveillance in Other Countries
11.6. Surveillance Methods and Technology
11.7. Surveillance Targets
11.8. Legal Issues
11.9. Dossiers and Data Bases
11.10. Police States and Informants
11.11. Privacy Laws
11.12. National ID Systems
11.13. National Health Care System Issues
11.14. Credentials
11.15. Records of all UseNet postings
11.16. Effects of Surveillance on the Spread of Crypto
11.17. Loose Ends
12. Digital Cash and Net Commerce
12.1. copyright
12.2. SUMMARY: Digital Cash and Net Commerce
12.3. The Nature of Money
12.4. Smart Cards
12.5. David Chaum's "DigiCash"
12.6. Online and Offline Clearing, Double Spending
12.7. Uses for Digital Cash
12.8. Other Digital Money Systems
12.9. Legal Issues with Digital Cash
12.10. Prospects for Digital Cash Use
12.11. Commerce on the Internet
12.12. Cypherpunks Experiments ("Magic Money")
12.13. Practical Issues and Concerns with Digital Cash
12.14. Cyberspace and Digital Money
12.15. Outlawing of Cash
12.16. Novel Opportunities
12.17. Loose Ends
13. Activism and Projects
13.1. copyright
13.2. SUMMARY: Activism and Projects
13.3. Activism is a Tough Job
13.4. Cypherpunks Projects
13.5. Responses to Our Projects (Attacks, Challenges)
13.5.1. "What are the likely attitudes toward mainstream Cypherpunks
13.6. Deploying Crypto
13.7. Political Action and Opposition
13.8. The Battle Lines are Being Drawn
13.10. Deals, the EFF, and Digital Telephony Bill
13.11. Loose ends
14. Other Advanced Crypto Applications
14.1. copyright
14.2. SUMMARY: Other Advanced Crypto Applications
14.3. Digital Timestamping
14.4. Voting
14.5. Timed-Release Crypto
14.6. Traffic Analysis
14.7. Steganography
14.8. Hiding cyphertext
14.9. 'What are tamper-responding or tamper-resistant modules?"
14.9.1. The more modern name for what used to be called "tamper-proof
14.10. Whistleblowing
14.11. Digital Confessionals
14.12. Loose Ends
15. Reputations and Credentials
15.1. copyright
15.2. SUMMARY: Reputations and Credentials
15.3. The Nature of Reputations
15.4. Reputations, Institutions
15.5. Reputation-Based Systems and Agoric Open Systems
15.6. Reputations and Evolutionary Game Theory
15.7. Positive Reputations
15.8. Practical Examples
15.9. Credentials and Reputations
15.10. Fraud and False Accusations
15.11. Loose Ends
16. Crypto Anarchy
16.1. copyright
16.2. SUMMARY: Crypto Anarchy
16.3. Introduction
16.4. The Crypto Anarchist Manifesto
16.5. Changes are Coming
16.6. Free Speech and Liberty--The Effects of Crypto
16.7. The Nature of Anarchies
16.8. The Nature of Crypto Anarchy
16.9. Uses of Crypto Anarchy
16.10. The Implications-Negative and Positive-of Crypto Anarchy
16.11. Ethics and Morality of Crypto Anarchy
16.12. Practical Problems with Crypto Anarchy
16.13. Black Markets
16.14. Money Laundering and Tax Avoidance
16.15. Intellectual Property
16.16. Markets for Contract Killings, Extortion, etc.
16.17. Persistent Institutions
16.18. Organized Crime: Triads, Yakuza, Mafia, etc.
16.19. Privately Produced Law, Polycentric Law, Anarcho-Capitalism
16.20. Libertaria in Cyberspace
16.21. Cyberspace, private spaces, enforcement of rules, and technology
16.22. Data Havens
16.23. Undermining Governments--Collapse of the State
16.24. Escrow Agents and Reputations
16.25. Predictions vs. Implications
16.26. How Crypto Anarchy Will Be Fought
16.27. How Crypto Anarchy Advocates Will Fight Back
16.28. Things that May Hide the Existence of Crypto Anarchy
16.29. The Coming Phase Change
16.30. Loose Ends
17. The Future
17.1. copyright
17.2. SUMMARY: The Future
17.3. Progress Needed
17.4. Future Directions
17.5. Net of the Future
17.6. The Effects of Strong Crypto on Society
17.7. New Software Tools and Programming Frameworks
17.8. Complexity
17.9. Crypto Standards
17.10. Crypto Research
17.11. Crypto Armageddon? Cryptageddon?
17.14. Loose Ends
18. Loose Ends and Miscellaneous Topics
18.1. copyright
18.2. SUMMARY: Loose Ends and Miscellaneous Topics
18.3. Quantum Cryptography
18.4. Chaotic Cryptography
18.5. Neural Nets and AI in Crypto
18.6. Miscellaneous Advanced Crypto Ideas
18.7. Viruses and Crypto
18.8. Making Money in Crypto
18.9. The Net
18.10. Duress Switches, Dead Man Switches
18.11. Can Encryption be Detected?
18.12. Personal Digital Assistants, Newtons, etc.
18.13. Physical Security
18.14. Attacking Governments
18.15. Cypherpunks List Issues
18.16. Tamper-Resistant Modules
18.17. Deeper Connections
18.18. Loose End Loose Ends
19. Appendices
19.1. copyright
19.2. SUMMARY: Appendices
19.3. Appendix -- Sites, Addresses, URL/Web Sites, Etc.
19.4. Appendix -- Glossary
19.5. Appendix -- Summary of Crypto Versions
19.6. Appendix -- References
19.7. Glossary Items
19.8. A comment on software versions, ftp sites, instructions, etc.
19.8.1. I regret that I can't be complete in all versions, platforms
20. README
20.1. copyright
20.2. README--BRIEF VERSION
20.3. Copyright Comments
20.4. A Few Words on the Style
20.5. How to Find Information
20.6. My Views
20.7. More detailed disclaimer
← Prev
Back
Next →
← Prev
Back
Next →