17.1 copyright
   THE  CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
   1994-09-10, Copyright Timothy C. May. All rights reserved.
   See the detailed disclaimer. Use short sections under "fair
   use" provisions, with appropriate credit, but don't put your
   name on my words.

17.2 - SUMMARY: The Future
17.2.1. Main Points
  - where things are probably going
17.2.2. Connections to Other Sections
17.2.3. Where to Find Additional Information
17.2.4. Miscellaneous Comments

17.3 - Progress Needed
17.3.1. "Why have most of the things Cypherpunks talk about *not*
  + Except for remailers and basic crypto, few of the main
     ideas talked about for so long have actually seen any kind
     of realization. There are many reasons:
   A. Difficult to achieve. Both Karl Kleinpaste and Eric
       Hughes implemented simple first-generation remailers in a
       matter of _days_, but "digital cash" and "aptical
       foddering," for example, are not quite so
       straightforward. (I am of course not taking anything away
       from Kleinpaste, Hughes, Helsingius, Finney, etc., just
       noting that redirecting mail messages--and even
       implementing PGP and things like delay, batching, etc.,
       into remailers--is a lot easier conceptually than DC-Nets
       and the like.
   B. Protocols are confusing, tough to implement. Only a tiny
       fraction of the "crypto primitives" discussed at Crypto
       Conferences, or in the various crypto books, have been
       realized as runnable code. Building blocks like "bit
       commitment" have not even--to my knowledge--been
       adequately realized as reusable code. (Certainly various
       groups, such as Chaum's, have cobbled-together things
       like bit commitment....I just don't think there's a
       consensus as to the form, and this has limited the
       ability of nonspecialists to use these "objects.")
   C. Semantic confusion as well. While it's fairly clear what
       "encrypting" or "remailing" means, just what is a
       "digital bank"? Or a "reputation server"?
   D. Interoperablity is problematic. Many platforms, many
       operating systems, many languages. Again, remailers and
       encryption work because there is a de facto lowest common
       denominator for them: the simple text block, used in e-
       mail, editors, input and output from programs, etc. That
       is, we all mostly know exactly what an ASCII text block
       is, and crypto programs are expected to know how to
       access and manipulate such blocks. This largely explains
       the success of PGP across many platforms--text blocks are
       the basic element. Ditto for Cypherpunks remialers, which
       operate on the text blocks found in most mail systems.
       The situation becomes much murkier for things like
       digital money, which are not standalone objects and are
       often multi-party protocols involving time delays,
       offline processing, etc.
   E. Lack of an economic motive. We on this list are not being
       paid to develop anything, are not assisted by anyone, and
       don't have the financial backing of corporations to
       assist us. Since much of today's "software development"
       is actually _deal-making_ and _standards negotiation_, we
       are left out of lots of things.

17.4 - Future Directions
17.4.1. "What are some future directions?"
17.4.2. The Future of the List
  + "What can be done about these situations?"
    - That is, given that the Cypherpunks list often contains
       sensitive material (see above), and given that the
       current membership list can be accessed by..... what can
       be done?
    - Move central server to non-U.S. locale
    - Or to "cyberspace" (distributed network, with no central
       server...like FidoNet)
    - subscribers can use pseudonyms, cutouts, remailers
17.4.3. What if encryption is outlawed?
  - can uuencode (and similar), to at least slow down the
     filter programs a bit (this is barely security through
     obscurity, but....)
  - underground movements?
  - will Cypherpunks be rounded up?
17.4.4. "Should Cypherpunks be more organized, more like the CPSR,
   EFF, and EPIC?"
  - Those groups largely are lobbying groups, with a staff in
     Washington supported by the membership donations of
     thousands or tens of thousands of dues-paying members. They
     perform a valuable service, of course.
  - But that is not our model, nor can it plausibly be. We were
     formed as an ad hoc group to explore crypto, were dubbed
     "Cypherpunks," and have since acted as a techno-grasssroots
     anarchy. No staff, no dues, no elections, no official rules
     and regulations, and no leadership beyond what is provided
     by the power of speech (and a slight amount of "final say"
     provided by the list maintainer Eric Hughes and the machine
     owner, John Gilmore, with support from Hugh Daniel).
  - If folks want a lobbying group, with lawyers in Washington,
     they should join the EFF and/or CPSR.
  - And we fill a niche they don't try to fill.
17.4.5. Difficult to Set Directions
  - an anarchy...no centralized control
  - emergent interests
  - everyone has some axe to grind, some temporary set of
  - little economic motivation (and most have other jobs)
17.4.6. The Heart and Soul of Cypherpunks?
  + Competing Goals:
    + Personal Privacy
      - PGP, integration with mailers
      - education
    + Reducing the Power of Institutions
      - whistelblowers group
    - Crypto Anarchy
  + Common Purposes
    + Spreading strong crypto tools and knowledge
      - PGP
    + Fighting government restrictions and regulations
      - Clipper/Skipjack fight was a unifying experience
    + Exploring new directions in cryptology
      - digital mixes, digital cash, voting
17.4.7. Possible Directions
  + Crypto Tools...make them ubiquitous "enough" so that the
     genie cannot be put back in the bottle
    - can worry about the politics later (socialists vs.
       anarchocapitalists, etc.) (Although socialists would do
       well to carefully think about the implications of
       untraceable communications, digital cash, and world-wide
       networks of consultants and workers--and what this does
       to tax collection and social spending programs--before
       they work with the libertarians and anarchocapitalists to
       bring on the Crypto Millenium.)
  + Education
    - educating the masses about crypto
    - public forums
    - this was picked by the Cambridge/MIT group as their
       special interest
  + Lobbying
    - talking to Congressional aides and committee staffers,
       attending hearings, submitting briefs on proposed
    - coordinating with EFF, CPSR, ACLU, etc.
    - this was picked by the Washington group as their special
       interest, which is compellingly appropriate (Calif. group
       is simply too far away)
  - Legal Challenges
  + mixture of legal and illegal
    - use legal tools, and illegal tools
    - fallback positions
    - enlist illegal users as customers...help it spread in
       these channels (shown to be almost uncontrollable)
17.4.8. Goals (as I see them)
  + Get strong crypto deployed in such a way as to be
     unstoppable, unrecallable
    - "fire and forget" crypto
    - genie out of the bottle
    - Note that this does _not_ necessarily that crypto be
       _widely_ deployed, though that's generally a good idea.
       It may mean seeding key sites outside the U.S. with
       strong crypto tools, with remailers, and with the other
  + Monkeywrench threats to crypto freedom.
    - economic sabotage of those who use statist contracts to
       thwart freedom (e.g., parts of AT&T)
    + direct sabotage
      - someday, viruses, HERF, etc.
17.4.9. A Vision of the Future
  - encrypted, secure, untraceable communications
  - hundreds of remailers, in many countries
  - interwoven with ordinary traffic, ensuring that any attempt
     to quash crypto would also have a dramatic effect on
  - data havens, credit, renters, etc.
  - information markets
  - ability to fight wars is hindered
  - U.S. is frantic, as its grip on the world loosens...Pax
     Americana dies
17.4.10. Key concepts are the way to handle the complexity of crypto
  - The morass of protocols, systems, and results is best
     analyzed, I think, by not losing sight of the basic
     "primitives," the things about identity, security,
     authentication, etc. that make crypto systems work the way
     they do.
  + Axiom systems, with theorems and lemmas derivable from the
    - with alternate axioms giving the equivalent of "non-
       Euclidean geometries" (in a sense, removing the physical
       identity postulate and replacing it with the "the key is
       the identity" postulate gives a new landscape of
       interactions, implications, and structures).
  - (Markets, local references, voluntary transactions, etc.)
  - (ecologies, predators, defenders, etc.)
  - (game theory, economics, etc..)

17.5 - Net of the Future
17.5.1. "What role, if any, will MUDs, MOOs, and Virtual Realities
  - "True Names," "Snow Crash," "Shockwave Rider"
  - Habitat, online services
  + the interaction is far beyond just the canonical "text
     messages" that systems like Digital Telephony are designed
     to cope with
    - where is the nexus of the message?
    - what about conferences scattered around the world, in
       multiple jurisdictions?
  - crypto = glue, mortar, building blocks
  - "rooms" = private places; issues of access control
  - Unless cops are put into these various "rooms," via a
     technology we can barely imagine today (agents?), it will
     be essentially impossible to control what happens in these
     rooms and places. Too many degrees of freedom, too many
     avenues for exchange.
  - cyberspaces, MUDs, virtual communities, private law,
     untouchable by physical governments
17.5.2. keyword-based
  - can be spoofed by including dictionaries
17.5.3. dig sig based (reputation-based)
17.5.4. pools and anonymous areas may be explicitly supported
17.5.5. better newsreaders, screens, filters
17.5.6. Switches
  - "switching fabrics"
  - ATM
  - Intel's flexible mesh interconnects, iWARP, etc.
  - all of these will make for an exponential increase in
     degrees of freedom for remailer networks (labyrinths). On-
     chip remailing is esentially what is needed for Chaum's
     mixes. ATM quanta (packets) are the next likely target for
17.5.7. "What limits on the Net are being proposed?"
  - NII
  + Holding carriers liable for content
    - e.g., suing Compuserve or Netcom
    - often done with bulletin boards
  - "We have to do something!"
  + Newspapers are complaining about the Four Horsemen of the
    - terrorists, pedophiles, drug dealers, and money
    + The "L.A. Times" opines:
      - "Designers of the new Information Age were inspired by
         noble dreams of free-flowing data as a global
         liberating force, a true democratizing agent.  Sadly,
         the crooks and creeps have also climbed aboard.  The
         time has come for much tighter computer security.
         After all, banks learned to put locks on their vaults."
         ["L.A. Times," editorial, 1994-07-13]

17.6 - The Effects of Strong Crypto on Society
17.6.1. "What will be the effects of strong crypto, ultimately, on
   the social fabric?"
  - It's hard to know for sure.
  + These effects seem likely:
    - Starvation of government tax revenues, with concommitant
       effects on welfare, spending, etc.
    - increases in espioage
    - trust issues
17.6.2. The revelations of surveillance and monitoring of citizens
   and corporations will serve to increase the use of
   encryption, at first by people with something to hide, and
   then by others. Cypherpunks are already helping by spreading
   the word of these situations.
  - a snowballing effect
  - and various government agencies will themselves use
     encryption to protect their files and their privacy
17.6.3. People making individual moral choices
  - people will make their own choices as to what to reveal,
     what they think will help world peace, or the future, or
     the dolphins, or whatever
  - and this will be a liquid market, not just souls shouting
     in the desert
  - of course, not everything will be revealed, but the "mosaic
     effect" ensures that mostly the truth will emerge
  - every government's worst fear, that it's subjects will
     decide for themselves what is secret, what is not, what can
     be told to foreigners, etc.

17.7 - New Software Tools and Programming Frameworks
17.7.1. Needed software
  - Drop-in crypto modules are a needed development. As V.
     Bontchev says, "it would be nice if disk encryption
     software allowed the user to plug in their own modules.
     This way everybody could use whatever they trust - MDC/SHA,
     MDC/MD5, DES, IDEA, whatever." [V.B., sci.crypt, 1994-07-
  + Robustness
    - Security and robustness are often at odds
    - Files that are wiped at the first hint of intrusion
       (digital flash paper), remailer sites that go down at the
       first signs of trouble, and file transmission systems
       that split files into multiple pieces--any one of which
       can be lost, thus destroying the whole transmission--are
       not exactly models of robustness.
    - Error correction usually works by decreasing entropy
       through redundancy, which is bad for crypto.
    - The military uses elaborate (and expensive) systems to
       ensure that systems do not go down, keys are not lost,
       etc. Most casual users of crypto are unwilling to take
       these steps.
    - And so keys are lost, passphrases are forgotten (or are
       written down on Post-It Notes and taped to terminals),
       and remailers are taken down when operators go on
       vacation. All very flaky and non-robust.
    - Look at how flaky mail delivery is!
    + A challenge is to create systems which are:
      - robust
      - not too complicated and labor-intensive to use
      - where redundancy does not compromise security
  + Crypto workbench
    - An overused term, perhaps, but one that captures the
       metaphor of a large set of tools, templates, programming
       aids, etc.
    + QKS and "Agents Construction Kit" (under development)
      - along with Dylan, DylanAgents, Telescript, and probably
         several other attempts to develop agent toolkits
    - Henry Strickland is using "tcl" (sort of a scripting
       language, like "perl") as a basis.
  + Software crisis
    - tools, languages, frameworks, environments, objects,
       class libraries, methods, agents, correctness,
       robustness, evolution, prototyping
    + Connections between the software crisis and cryptography
      - complex systems, complicated protocols
      - price of being "wrong" can be very high, whether it's
         an airport that can't open on time (Denver) or a
         digital bank that has its assets drained in seconds
      - agents, objects are hoped to be the "silver bullets"
    + The need for better software methodologies
      - "silver bullets"
      - failures, errors, flaws, methods
      - provably correct designs? (a la Viper)
      - It is often said that much better methodologies are
         needed for _real time programming_, due to the time-
         criticality and (probably) the difficulty of doing
         realistic testing. But surely the same should be said
         of _financial programming_, a la the banking and
         digicash schemes that interest us so much.
      - "the one aspect of software that most makes it the
         flaky industry it is is that it is unusual for
         practitioners to study the work of others.  Programmers
         don't read great programs.  Designers don't study
         outstanding designs. The consequences ... no, just look
         for yourself. [Cameron Laird, comp.software-eng, 1994-
    + Large Software Constructs
      - The software crisis becomes particularly acute when
         large systems are built, such as--to apply this to
         Cypherpunks issues--when digital money systems and
         economies are built.
17.7.2. Object-oriented tools
  + While tres trendy, some very real gains are being reported;
     more than just a buzzword, especially when combined with
     other tools:
    - frameworks, toolkits
    + dynamic languages
      - greater flexibility than with static, strongly-typed
         langueages (but also less safety, usually)
  - OpenStep, Visual Age, Visual Basic, Dylan, Telescript (more
     agent-oriented), Lisp, Smalltalk, etc
17.7.3. Protocol Ecologies
  - Behavioral simulations of agents, digital money, spoofing,
  - the world in which Alice and Bob and their crypto friends
  - defense, attack, spoofing, impersonation, theft
  - elements that are cryptographically strong (like D-H key
     exchanges), but combined in complex ways that almost have
     to be simulated to find weaknesses
  - "middle-out" instead of "top-down" (conventional, formal)
     or "bottom-up" (emergent, A-LIFE)
  - like Eurisko (Lenat), except oriented toward the domain of
     financial agents
17.7.4. Use of autonomous agents (slaves?)
  - "An advanced telecommunications environment offers a number
     of ways to protect yourself against the problems involved
     in dealing with anonymous entities in a situation in which
     there is no monopoly Government.....When one's PBX finds
     that one's call is not going through via a particular long
     distance carrier, it automatically switches to another one.
     It is easy to imagine one's intelligent agents testing
     various sorts of transaction completions and switching
     vendors when one fails. Professional checkers can supply
     information on vendor status for a fee. After all, we don't
     care if a company we are dealing with changes if its
     service is unaffected."  [Duncan Frissell, 1994-08-30]
17.7.5. Tools
  + "Languages within languages" is a standard way to go to
     implement abstractions
    - "Intermediate Design Languages" (IDLs)
    - abstract concepts: such as "engines" and "futures"
    - Lisp and Scheme have been favored languages for this
    - other languages as well: Smalltalk, Dylan
  + For crypto, this seems to be the case: abstractions
     represented as classes or objects
    - with programming then the selective subclassing
    - and sometimes gener
  + "type checking" of crypto objects is needed
    - to ensure compliance with protocols, with forms expected,
    - check messages for form, removal of sigs, etc. (analogous
       to checking a letter before mailing for proper
       addressing, for stamp, sealing, etc.)
    - much of the nonrobustness of mail and crypto comes from
       the problems with exception handling--things that a human
       involved might be able to resolve, in conventional mail
    - "dead letter department"?
    - Note: In the "Crypto Anarchy Game" we played in
       September, 1992, many sealed messages were discarded for
       being in the wrong form, lacking the remailer fee that
       the remailer required, etc. Granted, human beings make
       fairly poor maintainers of complex constraints....a lot
       of people just kept forgetting to do what was needed. A
       great time was had by all.
17.7.6. "What programming framework features are needed?"
  - What follows are definitely my opnions, even more my own
     opinions than most of what I've written. Many people will
  + Needed:
    - Flexibility over speed
    - Rapid prototyping, to add new features
    - Evolutionary approaches
    - Robustness (provably correct would be nice, but...)
17.7.7. Frameworks, Tools, Capabilities
  - Nearly all the cutting-edge work in operating systems, from
     "mutually suspicious cooperating processes" to "deadlock"
     to "persistence," show up in the crypto areas we are
  + Software of the Net vs. Software to Access the Net
    - The Net--is current form adequate?
    - Software for Accessing the Net
  + OpenDoc and OLE
    - components working together, on top of various operating
       systems, on top of various hardware platforms
  + Persistent Object Stores
    - likely to be needed for the systems we envision
    - robust, so that one's "money" doesn't evaporate when a
       system is rebooted!
    - interesting issues here...
    - CORBA. OpenDoc, OLE II, SOM, DOE, Gemstone, etc.
  + Programming Frameworks
    - Dynamic languages may be very useful when details are
       fuzzy, when the ideas need exploration (this is not a
       call for nondeterminism, for random futzing around, but a
       recognition that the precise, strongly-typed approach of
       some languages may be less useful than a rich,
       exploratory environment. This fits with the "ecology"
       point of view.
  + Connectivity
    - needs to be more robust, not flaky the way current e-mail
    - handshakes, agents, robust connections
    - ATM, SONET, agents, etc....the "Net of the Future"

17.8 - Complexity
17.8.1. The shifting sands of modern, complex systems
  - lots of cruft, detail...changing..related to the "software
     crisis"...the very flexibilty of modern software systems
     promotes the frequent changing of features and behaviors,
     thus playing hob with attempts of others to understand the
     structure...evolution in action
  - humans who use these systems forget how the commands work,
     where things are stored, how to unsubscribe from lists,
     etc. (This is just one reason the various sub-lists of our
     list have seldom gotten much traffic: people use what they
     are most used to using, and forget the rest.)
  - computer agents (scripts, programs) which use these systems
     often "break" when the underlying system changes. A good
     example of this are the remailer sites, and scripts to use
     them. As remailer sites go up and down, as keys change, as
     other things change, the scripts must change to keep pace.
  - This very document is another example. Scattered throughout
     are references to sites, programs, sources, etc. As time
     goes by, more and more of them will (inevitably) become
     obsolete. (My hope is that enough of the pointers will
     point to still-extant things so as to make the pointers
     remain useful. And I'll try to update/correct the bad
17.8.2. "Out of Control"
  - Kevin Kelly's book
  - inability to have precise control, and how this is
     consistent with evolution, emergent properties, limits of
     formal models
  - crypto, degrees of freedom
  + imagine nets of the near future
    - ten-fold increase in sites, users, domains
    - ATM switching fabrics..granularity of transactions
       changes...convergence of computing and communications...
    + distributed computation ( which, by the way, surely needs
       crypto security!)
      - Joule, Digital Silk Road
    - agents, etc.
  + can't control the distribution of information
    + As with the Amateur Action BBS case, access can't be
      - "The existance of gateways and proxy servers means that
         there is no effective way to determine where any
         information you make accessible will eventually end up.
         Somebody in, say, Tennessee can easily get at an FTP
         site in California through a proxy in Switzerland.
         Even detailed information about what kind of
         information is considered contraband in every
         jurisdiction in the world won't help, unless every
         *gateway* in the world has it and uses it as well."
         [Stephen R. Savitzky, comp.org.eff.talk, 1994-08-08]
17.8.3. A fertile union of cryptology, game theory, economics, and
  + crypto has long ignored economics, except peripherally, as
     an engineering issue (how long encryption takes, etc.)
    - in particular, areas of reputation, risk, etc. have not
       been treated as central idea...perhaps proper for
       mathematical algorithm work
    - but economics is clearly central to the systems being
       planned...digital cash, data havens, remailers, etc.
  + why cash works so well...locality of reference, immediate
     clearing of transactions, forces computations down to
     relevant units
    - reduces complaints, "he made me do it" arguments...that
       is, increases self-responsibility...caveat emptor
  + game theory
    + ripe for treatment of "Alice and Bob" sorts of
       situations, in which agents with different agendas are
       interacting and competing
      - "defecting" as in Prisoner's Dilemma
      - payoff matrices for various behaviors
  - evolutionary game theory
  - evolutionary learning, genetic algorithms/programmming
  - protocol ecologies

17.9 - Crypto Standards
17.9.1. The importance of standards
  - a critical role
  + Part of standards is validation, test suites, etc.
    - validating the features and security of a remailer,
       through pings, tests, performance tests, reliability,
    - thus imposing a negative hit on those who fail
    + There are many ways to do this standards testing
      - market reports (as with commercial chips, software)
      - "seals of approval" (especially convenient with digital

17.10 - Crypto Research
17.10.1. Academic research continues to increase
17.10.2. "What's the future of crypto?"
  - Predicting the future is notoriously difficult. IBM didn't
     think many computers would ever be sold, Western Union
     passed on the chance to buy Bell's telephone patents. And
     so on. The future is always cloudy, the past is always
     clear and obvious.
  - We'll know in 30 years which of our cypherpunkish and
     cryptoanarchist predictions came to pass--and which didn't.
17.10.3. Ciphers are somewhat like knots...the right sequence of moves
   unties them, the wrong sequence only makes them more tangled.
   ("Knot theory" is becoming a hot topic in math and physics
   (work of Vaughn Jones, string theory, etc.) and I suspect
   there are some links between knot theory and crypto.)
17.10.4. Game theory, reputations, crypto -- a lot to be done here
  - a missing link, an area not covered in academic cryptology
  - distributed trust models, collusion, cooperation,
     evolutionary game theory, ecologies, systems
17.10.5. More advanced areas, newer approaches
  + some have suggested quasigroups, Latin squares, finite
     automata, etc. Quasigroups are important in the IDEA
     cipher, and in some DES work. (I won't speculate furher
     about an area I no almost nothing about....I'd heard of
     semigroups, but not quasigroups.)
    - "The "Block Mixing Transform" technology which I have
       been promoting on sci.crypt for much of this spring and
       summer is a Latin square technology.  (This was part of
       my "Large Block DES" project, which eventually produced
       the "Fenced DES" cipher as a possible DES
       upgrade.)....Each of the equations in a Block Mixing
       Transform is the equation for a Latin square.  The
       multiple equations in such a transform together represent
       orthogonal Latin squares. [Terry Ritter, sci.crypt, 1994-
  + But what about for public key uses? Here's something Perry
     Metzger ran across:
    - ""Finte Automata, Latin arrays, and Cryptography" by Tao
       Renji, Institute of Software, Academia Sinica, Beijing.
       This (as yet unpublished) paper covers several
       fascinating topics, including some very fast public key
       methods -- unfortunately in too little detail. Hopefully
       a published version will appear soon..." [P.M.,
       sci.crypt, 1994-08-14]
17.10.6. Comments on crypto state of the art today vs. what is likely
   to be coming
  - Perry Metzger comments on today's practical difficulties:
     "...can the difference between "crypto can be transforming
     when the technology matures" and "crypto is mature now" be
     that unobvious?....One of the reasons I'm involved with the
     IETF IPSP effort is because the crypto stuff has to be
     transparent and ubiquitous before it is going to be truly
     useful -- in its current form its just junk. Hopefully,
     later versions of PGP will also interface well with the new
     standards being developed for an integrated secure message
     body type in MIME. (PGP also requires some sort of scalable
     and reverse mapable keyid system -- the current keyids are
     not going to allow key servers to scale in a distributed
     manner.) Yes, I've seen the shell scripts and the rest, and
     they really require too much effort for most people -- and
     at best, once you have things set up, you can now securely
     read some email at some sites. I know that for myself,
     given that I read a large fraction of my mail while working
     at clients, where I emphatically do not trust the hardware,
     every encrypted message means great inconvenience,
     regardless." [Perry Metzger, 1994-08-25]

17.11 - Crypto Armageddon? Cryptageddon?
17.11.1. "Will there be a "Waco in cyberspace"?"
  - while some of us are very vocal here, and are probably
     known to the authorities, this is not generally the case.
     Many of the users of strong crypto will be discreet and
     will not give outward appearances of being code-using
     crypto anarchist cultists.
17.11.2. Attacks to come
  - "You'll see these folks attacking anonymous remailers,
     cryptography, psuedonymous accounts, and other tools  of
     coercion-free expression and information  interchange on
     the net, ironically often in the name of promoting
     "commerce".  You'll hear them rant and rave about
     "criminals" and "terrorists", as if they even had a good
     clue about the laws of the thousands  of jurisdictions
     criss-crossed by the Internet, and as if their own attempts
     to enable coercion bear no resemblance to the practice of
     terrorism.  The scary thing is, they  really think they
     have a good idea about what all those laws should be, and
     they're perfectly willing to shove it down our throats,
     regardless of the vast diversity of culture, intellectual,
     political, and legal opinion on the planet."
     [ (Nobody),  libtech-l@netcom.com,
  + why I'm not sanguine about Feds
    - killing Randy Weaver's wife and son from a distance,
       after trumped-up weapons charges
    - burning alive the Koresh compound, on trumped-up charges
       of Satanism, child abuse, and wife-insulting
    - seizures of boats, cars, etc., on "suspicion" of
       involvement with drugs

17.12 - "The Future's So Bright, I Gotta Wear Shades"
17.12.1. Despite the occasionally gloomy predictions, things look
   pretty good.No guarantees, of course, but trends that are
   favorable. No reason for us to rest, though.
17.12.2. Duncan Frissell puts it this way:
  - "Trade is way up.  Wealth is way up.  International travel
     is way up. Migration is way up.  Resource prices are the
     lowest in human history.  Communications costs are way
     down.  Electronics costs are way down.  We are in a zero or
     negative inflation environment.  The quantity and quality
     of  goods and services offered on the markets is at an all-
     time high.  The percentage of the world's countries headed
     by dictators is the lowest it's ever been.
     "What all this means is that political philosophies that
     depend on force of arms to push people into line,  will
     increasingly fail to work.  Rich people with choices will,
     when  coerced, tend to change their investments and
     business affairs into a friendlier form or to move to a
     friendlier  environment.  Choice is real.  If choices
     exist, they will be made.  An ever higher proportion of the
     world's people will be "rich" in wealth and choice as the
     years go on.
     "Only a political philosophy that depends on the uncoerced
     cooperation of very  different people has a chance of
     functioning in  the future." [Duncan Frissell, 1994-09-09]

17.13 - "Will cryptography really bring on the Millenium?"
17.13.1. Yes. And cats will move in with dogs,  Snapple will rain from
   the sky, and P will be shown unequal to NP.
17.13.2. Seriously, the implications of strong privacy, of
   cyberspatial economies, and of borders becoming transparent
   are enormous. The way governments do business is already
   changing, and this will change things even more dramatically.
   The precise form may be unpredictable, but certain end states
   are fairly easy to predict in broad brush strokes.
17.13.3. "How do we know the implications of crypto are what I've
  - We can't know the future.
  - Printing, railroads, electrification
17.13.4. "When will it all happen? When will strong crypto really
   begin to have a major effect on the economy?"
  + Stages:
    - The Prehistoric Era. Prior to 1975. NSA and other
       intelligence agencies controlled most crypto work.
       Cryptography seen as a hobby. DES just starting to be
       deployed by banks and financial institutions.
    - The Research Era. 1975-1992. Intense interest in public
       key discovery, in various protocols. Start of several
       "Crypto" conferences. Work on digital money, DC-Nets,
       timestamping, etc.
    - The Activism Era. 1992--?? (probably 1998). PGP 2.0
       released. Cypherpunks formed. Clipper announced--meets
       firestorm of protest. EFF, CPSR, EPIC, other groups.
       "Wired" starts publication. Digital Telelphony, other
       bills. Several attempts to start crypto businesses are
       made...most founder.
    - The Transition Era. After about 1999. Businesses start.
       Digital cash needed for Net transactions. Networks and
       computers fast enough to allow more robust protocols. Tax
       havens flourish. "New Underworld Order" (credit to Claire
       Sterling) flourishes.
  - It is premature to expect that the current environment--
     technological and regulatory--will be beneficial to the
     type of strong crypto we favor. Too many pieces are
     missing. Several more advances are needed. A few more
     failures are also needed (gulp!) to show better how not to
17.13.5. "But will crypto anarchy actually happen?"
  - To a growing extent, it already is happening. Look at the
     so-called illegal markets, the flows of drug money around
     the world, the transfer of billions of dollars a day on
     mere "chop marks," and the thriving trade in banned items.
  - "Grey and black capitalism is already a major component of
     international cash flows....Once adequate user friendly
     software is available, the internet will accellerate this
     already existing trend....Crypto anarchy is merely the
     application of modern tools to assist covert capitalism."
     [James Donald, 1994-08-29]
  - There are arguments that a Great Crackdown is coming, that
     governments will shut down illegal markets, will stop
     strong crypto, will force underground economies
     aboveground. This is doubtful--it's been tried for the past
     several decades (or more). Prohibition merely made crime
     more organized; ditto for the War on (Some) Drugs.
17.13.6. "Has the point of no return been passed on strong crypto?"
  - Actually, I think that in the U.S. at least, the point was
     passed decades ago, possibly a century or more ago, and
     that any hope of controlling strong crypto and private
     communication evaporated long ago. Abuses by the FBI in
     wiretapping Americans, and reports of NSA monitoring of
     domestic communications notwithstanding, it is

17.14 - Loose Ends
17.14.1. firewalls, virtual perimeters, swIPe-type encrypted tunnels,
   an end to break-ins,
17.14.2. "What kind of encryption will be used with ATM?"
  - (ATM = Asynchronous Transfer Mode, not Automated Teller
  - some reports that NSA is developing standards for ATM
17.14.3. Shapes of things to come, maybe....(laws of other countries)
  + India has a fee schedule for BBS operators, e.g., they have
     to pay $50,000 a year to operate a bulletin board! (This
     sounds like the urban legend about the FCC planning a modem
     tax, but maybe it's true.)
    - "The Forum for Rights to Electronic Expression (FREE) has
       been formed in India as a body dedicated to extending
       fundamental rights to the electronic domain....FREE owes
       its creation to an attack on Indian datacom by the Indian
       government, in the form of exorbitant licence fees (a
       minimum Rs. 1.5 million = US$50,000 each year for a BBS,
       much higher for e-mail)." [amehta@doe.ernet.in (Dr. Arun
       Mehta), forwarded by Phil Agre, comp.org.cpsr.talk, 1994-
    - for more info: ftp.eff.org
17.14.4. Cyberspace will need better protection
  - to ensure spoofing and counterfeiting is reduced (recall
     Habitat's problems with people figuring out the loopholes)