Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
1. Introduction
1.1. copyright 1.2. Foreword 1.3. Motivations 1.4. Who Should Read This 1.5. Comments on Style and Thoroughness 1.6. Corrections and Elaborations 1.7. Acknowledgements 1.8. Ideas and Notes (not to be printed) 1.9. Things are moving quickly in crypto and crypto policy 1.10. Notes: The Cyphernomicon: the CypherFAQ and More
2. MFAQ--Most Frequently Asked Questions
2.1. copyright 2.2. SUMMARY: MFAQ--Most Frequently Asked Questions 2.3. "What's the 'Big Picture'?" 2.4. Organizational 2.5. Crypto 2.6. PGP 2.7. Clipper 2.8. Other Ciphers and Crypto Products 2.9. Remailers and Anonymity 2.10. Surveillance and Privacy 2.11. Legal 2.12. Digital Cash 2.13. Crypto Anarchy 2.14. Miscellaneous 2.15. More Information and References
3. Cypherpunks -- History, Organization, Agenda
3.1. copyright 3.2. SUMMARY: Cypherpunks -- History, Organization, Agenda 3.3. The Cypherpunks Group and List 3.4. Beliefs, Goals, Agenda 3.5. Self-organizing Nature of Cypherpunks 3.6. Mechanics of the List 3.7. Publicity 3.8. Loose Ends
4. Goals and Ideology -- Privacy, Freedom, New Approaches
4.1. copyright 4.2. SUMMARY: Goals and Ideology -- Privacy, Freedom, New Approaches 4.3. Why a Statement of Ideology? 4.4. "Welcome to Cypherpunks" 4.5. "Cypherpunks Write Code" 4.6. Technological empowerment 4.7. Free Speech Issues 4.8. Privacy Issues 4.9. Education Issues 4.10. Libertarian Issues 4.11. Crypto Anarchy 4.12. Loose Ends
5. Cryptology
5.1. copyright 5.2. SUMMARY: Cryptology 5.3. What this FAQ Section Will Not Cover 5.4. Crypto Basics 5.5. Cryptology-Technical, Mathematical 5.6. Crypto Programs and Products 5.7. Related Ideas 5.8. The Nature of Cryptology 5.9. Practical Crypto 5.10. DES 5.11. Breaking Ciphers 5.12. Loose Ends
6. The Need For Strong Crypto
6.1. copyright 6.2. SUMMARY: The Need For Strong Crypto 6.3. General Uses of and Reasons for Crypto 6.4. Protection of Corporate and Financial Privacy 6.5. Digital Signatures 6.6. Political Uses of Crypto 6.7. Beyond Good and Evil, or, Why Crypto is Needed 6.8. Crypo Needed for Operating Systems and Networks 6.9. Ominous Trends 6.10. Loose Ends
7. PGP -- Pretty Good Privacy
7.1. copyright 7.2. SUMMARY: PGP -- Pretty Good Privacy 7.3. Introduction 7.4. What is PGP? 7.5. Importance of PGP 7.6. PGP Versions 7.7. Where to Get PGP? 7.8. How to Use PGP 7.9. Keys, Key Signings, and Key Servers 7.10. PGP Front Ends, Shells, and Tools 7.11. Other Crypto Programs And Tools 7.12. Legal Issues with PGP 7.13. Problems with PGP, Flaws, Etc. 7.14. The Future of PGP 7.15. Loose Ends
8. Anonymity, Digital Mixes, and Remailers
8.1. copyright 8.2. SUMMARY: Anonymity, Digital Mixes, and Remailers 8.3. Anonymity and Digital Pseudonyms 8.4. Reasons for Anonymity and Digital Pseudonyms (and Untraceable E- Mail) 8.5. Untraceable E-Mail 8.6. Remailers and Digital Mixes (A Large Section!) 8.6.1. What are remailers? 8.6.2. Cypherpunks remailers compared to Julf's 8.7. Anonymous Posting to Usenet 8.8. Anonymous Message Pools, Newsgroups, etc. 8.8.1. "Why do some people use message pools?" 8.9. Legal Issues with Remailers 8.10. Cryptanalysis of Remailer Networks 8.11. Dining Cryptographers 8.12. Future Remailers 8.13. Loose Ends
9. Policy: Clipper,Key Escrow, and Digital Telephony
9.1. copyright 9.2. SUMMARY: Policy: Clipper,Key Escrow, and Digital Telephony 9.3. Introduction 9.4. Crypto Policy Issues 9.5. Motivations for Crypto Laws 9.6. Current Crypto Laws 9.7. Crypto Laws Outside the U.S. 9.8. Digital Telephony 9.9. Clipper, Escrowed Encyption Standard 9.10. Technical Details of Clipper, Skipjack, Tessera, and EES 9.11. Products, Versions -- Tessera, Skipjack, etc. 9.12. Current Status of EES, Clipper, etc. 9.13. National Information Infrastructure, Digital Superhighway 9.14. Government Interest in Gaining Control of Cyberspace 9.15. Software Key Escrow 9.16. Politics, Opposition 9.17. Legal Issues with Escrowed Encryption and Clipper 9.18. Concerns 9.19. Loose Ends
10. Legal Issues
10.1. copyright 10.2. SUMMARY: Legal Issues 10.3. Basic Legality of Encryption 10.4. Can Crypto be Banned? 10.5. Legal Issues with PGP 10.6. Legal Issues with Remailers 10.7. Legal Issues with Escrowed Encryption and Clipper 10.8. Legal Issues with Digital Cash 10.9. Legality of Digital Banks and Digital Cash? 10.10. Export of Crypto, ITAR, and Similar Laws 10.11. Regulatory Arbitrage 10.12. Crypto and Pornography 10.13. Usenet, Libel, Local Laws, Jurisdictions, etc. 10.14. Emergency Regulations 10.15. Patents and Copyrights 10.16. Practical Issues 10.17. Free Speech is Under Assault 10.18. Systems, Access, and the Law 10.19. Credentials 10.20. Escrow Agents 10.21. Loose Ends
11. Surveillance, Privacy, And Intelligence Agencies
11.1. copyright 11.2. SUMMARY: Surveillance, Privacy, And Intelligence Agencies 11.3. Surveillance and Privacy 11.4. U.S. Intelligence Agencies: NSA, FinCEN, CIA, DIA, NRO, FBI 11.5. Surveillance in Other Countries 11.6. Surveillance Methods and Technology 11.7. Surveillance Targets 11.8. Legal Issues 11.9. Dossiers and Data Bases 11.10. Police States and Informants 11.11. Privacy Laws 11.12. National ID Systems 11.13. National Health Care System Issues 11.14. Credentials 11.15. Records of all UseNet postings 11.16. Effects of Surveillance on the Spread of Crypto 11.17. Loose Ends
12. Digital Cash and Net Commerce
12.1. copyright 12.2. SUMMARY: Digital Cash and Net Commerce 12.3. The Nature of Money 12.4. Smart Cards 12.5. David Chaum's "DigiCash" 12.6. Online and Offline Clearing, Double Spending 12.7. Uses for Digital Cash 12.8. Other Digital Money Systems 12.9. Legal Issues with Digital Cash 12.10. Prospects for Digital Cash Use 12.11. Commerce on the Internet 12.12. Cypherpunks Experiments ("Magic Money") 12.13. Practical Issues and Concerns with Digital Cash 12.14. Cyberspace and Digital Money 12.15. Outlawing of Cash 12.16. Novel Opportunities 12.17. Loose Ends
13. Activism and Projects
13.1. copyright 13.2. SUMMARY: Activism and Projects 13.3. Activism is a Tough Job 13.4. Cypherpunks Projects 13.5. Responses to Our Projects (Attacks, Challenges) 13.5.1. "What are the likely attitudes toward mainstream Cypherpunks 13.6. Deploying Crypto 13.7. Political Action and Opposition 13.8. The Battle Lines are Being Drawn 13.10. Deals, the EFF, and Digital Telephony Bill 13.11. Loose ends
14. Other Advanced Crypto Applications
14.1. copyright 14.2. SUMMARY: Other Advanced Crypto Applications 14.3. Digital Timestamping 14.4. Voting 14.5. Timed-Release Crypto 14.6. Traffic Analysis 14.7. Steganography 14.8. Hiding cyphertext 14.9. 'What are tamper-responding or tamper-resistant modules?" 14.9.1. The more modern name for what used to be called "tamper-proof 14.10. Whistleblowing 14.11. Digital Confessionals 14.12. Loose Ends
15. Reputations and Credentials
15.1. copyright 15.2. SUMMARY: Reputations and Credentials 15.3. The Nature of Reputations 15.4. Reputations, Institutions 15.5. Reputation-Based Systems and Agoric Open Systems 15.6. Reputations and Evolutionary Game Theory 15.7. Positive Reputations 15.8. Practical Examples 15.9. Credentials and Reputations 15.10. Fraud and False Accusations 15.11. Loose Ends
16. Crypto Anarchy
16.1. copyright 16.2. SUMMARY: Crypto Anarchy 16.3. Introduction 16.4. The Crypto Anarchist Manifesto 16.5. Changes are Coming 16.6. Free Speech and Liberty--The Effects of Crypto 16.7. The Nature of Anarchies 16.8. The Nature of Crypto Anarchy 16.9. Uses of Crypto Anarchy 16.10. The Implications-Negative and Positive-of Crypto Anarchy 16.11. Ethics and Morality of Crypto Anarchy 16.12. Practical Problems with Crypto Anarchy 16.13. Black Markets 16.14. Money Laundering and Tax Avoidance 16.15. Intellectual Property 16.16. Markets for Contract Killings, Extortion, etc. 16.17. Persistent Institutions 16.18. Organized Crime: Triads, Yakuza, Mafia, etc. 16.19. Privately Produced Law, Polycentric Law, Anarcho-Capitalism 16.20. Libertaria in Cyberspace 16.21. Cyberspace, private spaces, enforcement of rules, and technology 16.22. Data Havens 16.23. Undermining Governments--Collapse of the State 16.24. Escrow Agents and Reputations 16.25. Predictions vs. Implications 16.26. How Crypto Anarchy Will Be Fought 16.27. How Crypto Anarchy Advocates Will Fight Back 16.28. Things that May Hide the Existence of Crypto Anarchy 16.29. The Coming Phase Change 16.30. Loose Ends
17. The Future
17.1. copyright 17.2. SUMMARY: The Future 17.3. Progress Needed 17.4. Future Directions 17.5. Net of the Future 17.6. The Effects of Strong Crypto on Society 17.7. New Software Tools and Programming Frameworks 17.8. Complexity 17.9. Crypto Standards 17.10. Crypto Research 17.11. Crypto Armageddon? Cryptageddon? 17.14. Loose Ends
18. Loose Ends and Miscellaneous Topics
18.1. copyright 18.2. SUMMARY: Loose Ends and Miscellaneous Topics 18.3. Quantum Cryptography 18.4. Chaotic Cryptography 18.5. Neural Nets and AI in Crypto 18.6. Miscellaneous Advanced Crypto Ideas 18.7. Viruses and Crypto 18.8. Making Money in Crypto 18.9. The Net 18.10. Duress Switches, Dead Man Switches 18.11. Can Encryption be Detected? 18.12. Personal Digital Assistants, Newtons, etc. 18.13. Physical Security 18.14. Attacking Governments 18.15. Cypherpunks List Issues 18.16. Tamper-Resistant Modules 18.17. Deeper Connections 18.18. Loose End Loose Ends
19. Appendices
19.1. copyright 19.2. SUMMARY: Appendices 19.3. Appendix -- Sites, Addresses, URL/Web Sites, Etc. 19.4. Appendix -- Glossary 19.5. Appendix -- Summary of Crypto Versions 19.6. Appendix -- References 19.7. Glossary Items 19.8. A comment on software versions, ftp sites, instructions, etc. 19.8.1. I regret that I can't be complete in all versions, platforms
20. README
20.1. copyright 20.2. README--BRIEF VERSION 20.3. Copyright Comments 20.4. A Few Words on the Style 20.5. How to Find Information 20.6. My Views 20.7. More detailed disclaimer
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion