4.1 copyright
   THE  CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
   1994-09-10, Copyright Timothy C. May. All rights reserved.
   See the detailed disclaimer. Use short sections under "fair
   use" provisions, with appropriate credit, but don't put your
   name on my words.

4.2 - SUMMARY: Goals and Ideology -- Privacy, Freedom, New Approaches
 4.2.1. Main Points
 4.2.2. Connections to Other Sections
  - Crypto Anarchy is the logical outgrowth of strong crypto.
 4.2.3. Where to Find Additional Information
  - Vernor Vinge's "True Names"
  - David Friedman's "Machinery of Freedom"
 4.2.4. Miscellaneous Comments
  - Most of the list members are libertarians, or leaning in
     that direction, so the bias toward this is apparent.
  - (If there's a coherent _non_-libertarian ideology, that's
     also consistent with supporting strong crypto, I'm not sure
     it's been presented.)

4.3 - Why a Statement of Ideology?
 4.3.1. This is perhaps a controversial area. So why include it? The
   main reason is to provide some grounding for the later
   comments on many issues.
 4.3.2. People should not expect a uniform ideology on this list.
   Some of us are anarcho-capitalist radicals (or "crypto
   anarchists"), others of us are staid Republicans, and still
   others are Wobblies and other assored leftists.

4.4 - "Welcome to Cypherpunks"
 4.4.1. This is the message each new subscriber to the Cypherpunks
   lists gets, by Eric Hughes:
 4.4.2. "Cypherpunks assume privacy is a good thing and wish there
   were more of it.  Cypherpunks acknowledge that those who want
   privacy must create it for themselves and not expect
   governments, corporations, or other large, faceless
   organizations to grant them privacy out of beneficence.
   Cypherpunks know that people have been creating their own
   privacy for centuries with whispers, envelopes, closed doors,
   and couriers.  Cypherpunks do not seek to prevent other
   people from speaking about their experiences or their
   "The most important means to the defense of privacy is
   encryption. To encrypt is to indicate the desire for privacy.
   But to encrypt with weak cryptography is to indicate not too
   much desire for privacy. Cypherpunks hope that all people
   desiring privacy will learn how best to defend it.
   "Cypherpunks are therefore devoted to cryptography.
   Cypherpunks wish to learn about it, to teach it, to implement
   it, and to make more of it.  Cypherpunks know that
   cryptographic protocols make social structures.  Cypherpunks
   know how to attack a system and how to defend it.
   Cypherpunks know just how hard it is to make good
   "Cypherpunks love to practice.  They love to play with public
   key cryptography.  They love to play with anonymous and
   pseudonymous mail forwarding and delivery.  They love to play
   with DC-nets.  They love to play with secure communications
   of all kinds.
   "Cypherpunks write code.  They know that someone has to write
   code to defend privacy, and since it's their privacy, they're
   going to write it.  Cypherpunks publish their code so that
   their fellow cypherpunks may practice and play with it.
   Cypherpunks realize that security is not built in a day and
   are patient with incremental progress.
   "Cypherpunks don't care if you don't like the software they
   write. Cypherpunks know that software can't be destroyed.
   Cypherpunks know that a widely dispersed system can't be shut
   "Cypherpunks will make the networks safe for privacy." [Eric
   Hughes, 1993-07-21 version]

4.5 - "Cypherpunks Write Code"
 4.5.1. "Cypherpunks write code" is almost our mantra.
 4.5.2. This has come to be a defining statement. Eric Hughes used it
   to mean that Cypherpunks place more importance in actually
   changing things, in actually getting working code out, than
   in merely talking about how things "ought" to be.
  - Eric Hughes statement needed here:
  - Karl Kleinpaste, author of one of the early anonymous
     posting services (Charcoal) said this about some proposal
     made: "If you've got serious plans for how to implement
     such a thing, please implement it at least skeletally and
     deploy it.  Proof by example, watching such a system in
     action, is far better than pontification about it."
     [Karl_Kleinpaste@cs.cmu.edu, news.admin.policy, 1994-06-30]
 4.5.3. "The admonition, "Cypherpunks write code," should be taken
   metaphorically.  I think "to write code" means to take
   unilateral effective action as an individual.  That may mean
   writing actual code, but it could also mean dumpster diving
   at Mycrotronx and anonymously releasing the recovered
   information.  It could also mean creating an offshore digital
   bank.  Don't get too literal on us here.  What is important
   is that Cypherpunks take personal responsibility for
   empowering themselves against threats to privacy." [Sandy
   Sandfort, 1994-07-08]
 4.5.4. A Cypherpunks outlook: taking the abstractions of academic
   conferences and making them concrete
  - One thing Eric Hughes and I discussed at length (for 3 days
     of nearly nonstop talk, in May, 1992) was the glacial rate
     of progress in converting the cryptographic primitive
     operations of the academic crypto conferences into actual,
     workable code. The basic RSA algorithm was by then barely
     available, more than 15 years after invention. (This was
     before PGP 2.0, and PGP 1.0 was barely available and was
     disappointing, with RSA Data Security's various products in
     limited niches.) All the neat stuff on digital cash, DC-
     Nets, bit commitment, olivioius transfer, digital mixes,
     and so on, was completely absent, in terms of avialable
     code or "crypto ICs" (to borrow Brad Cox's phrase). If it
     took 10-15 years for RSA to really appear in the real
     world, how long would it take some of the exciting stuff to
     get out?
  - We thought it would be a neat idea to find ways to reify
     these things, to get actual running code. As it happened,
     PGP 2.0 appeared the week of our very first meeting, and
     both the Kleinpaste/Julf and Cypherpunks remailers were
     quick, if incomplete, implementations of David Chaum's 1981
     "digital mixes." (Right on schedule, 11 years later.)
  - Sadly, most of the abstractions of cryptology remain
     residents of academic space, with no (available)
     implementations in the real world. (To be sure, I suspect
     many people have cobbled-together versions of many of these
     things, in C code, whatever. But their work is more like
     building sand castles, to be lost when they graduate or
     move on to other projects. This is of course not a problem
     unique to cryptology.)
  - Today, various toolkits and libraries are under
     development. Henry Strickland (Strick) is working on a
     toolkit based on John Ousterhout's "TCL" system (for Unix),
     and of course RSADSI provides RSAREF. Pr0duct Cypher has
     "PGP Tools." Other projects are underway. (My own longterm
     interest here is in building objects which act as the
     cryptography papers would have them act...building block
     objects. For this, I'm looking at Smalltalk of some
  - It is still the case that most of the modern crypto papers
     discuss theoretical abstractions that are _not even close_
     to being implemented as reusable, robust objects or
     routines. Closing the gap between theoretical papers and
     practical realization is a major Cypherpunk emphasis.
 4.5.5. Prototypes, even if fatally flawed, allow for evolutionary
   learning and improvement. Think of it as engineering in

4.6 - Technological Empowerment
 4.6.1. (more needed here....)
 4.6.2. As Sandy Sandfort notes, "The real point of Cypherpunks is
   that it's better to use strong crypto than weak crypto or no
   crypto at all.  Our use of crypto doesn't have to be totally
   bullet proof to be of value.  Let *them* worry about the
   technicalities while we make sure they have to work harder
   and pay more for our encrypted info than they would if it
   were in plaintext." [S.S. 1994-07-01]

4.7 - Free Speech Issues
 4.7.1. Speech
  - "Public speech is not a series of public speeches, but
     rather one's own
     words spoken openly and without shame....I desire a society
     where all may speak freely about whatever topic they will.
     I desire that all people might be able to choose to whom
     they wish to speak and to whom they do not wish to speak.
     I desire a society where all people may have an assurance
     that their words are directed only at those to whom they
     wish.  Therefore I oppose all efforts by governments to
     eavesdrop and to become unwanted listeners." [Eric Hughes,
  - "The government has no right to restrict my use of
     cryptography in any way.  They may not forbid me to use
     whatever ciphers I may like, nor may they require me to use
     any that I do not like." [Eric Hughes, 1993-06-01]
 4.7.2. "Should there be _any_ limits whatsoever on a person's use of
  - No. Using the mathematics of cryptography is merely the
     manipulation of symbols. No crime is involved, ipso facto.
  - Also, as Eric Hughes has pointed out, this is another of
     those questions where the normative "should" or "shouldn't"
     invokes "the policeman inside." A better way to look at is
     to see what steps people can take to make any question of
     "should" this be allowed just moot.
  - The "crimes" are actual physical acts like murder and
     kidnapping. The fact that crypto may be used by plotters
     and planners, thus making detection more difficult, is in
     no way different from the possibility that plotters may
     speak in an unusual language to each other (ciphers), or
     meet in a private home (security), or speak in a soft voice
     when in public (steganography). None of these things should
     be illegal, and *none of them would be enforceable* except
     in the most rigid of police states (and probably not even
  - "Crypto is thoughtcrime" is the effect of restricting
     cryptography use.
 4.7.3. Democracy and censorship
  - Does a community have the right to decide what newsgroups
     or magazines it allows in its community? Does a nation have
     the right to do the same? (Tennessee, Iraq, Iran, France.
  - This is what bypasses with crypto are all about: taking
     these majoritarian morality decisions out of the hands of
     the bluenoses. Direct action to secure freedoms.

4.8 - Privacy Issues
 4.8.1. "Is there an agenda here beyond just ensuring privacy?"
  - Definitely! I think I can safely say that for nearly all
     political persuasions on the Cypherpunks list. Left, right,
     libertarian, or anarchist, there's much more to to strong
     crypto than simple privacy. Privacy qua privacy is fairly
     uninteresting. If all one wants is privacy, one can simply
     keep to one's self, stay off high-visibility lists like
     this, and generally stay out of trouble.
  - Many of us see strong crypto as the key enabling technology
     for a new economic and social system, a system which will
     develop as cyberspace becomes more important. A system
     which dispenses with national boundaries, which is based on
     voluntary (even if anonymous) free trade. At issue is the
     end of governments as we know them today. (Look at
     interactions on the Net--on this list, for example--and
     you'll see many so-called nationalities, voluntary
     interaction, and the almost complete absence of any "laws."
     Aside from their being almost no rules per se for the
     Cypherpunks list, there are essentially no national laws
     that are invokable in any way. This is a fast-growing
  + Motivations for Cypherpunks
    - Privacy. If maintaining privacy is the main goal, there's
       not much more to say. Keep a low profile, protect data,
       avoid giving out personal information, limit the number
       of bank loans and credit applications, pay cash often,
    - Privacy in activism.
    + New Structures. Using cryptographic constructs to build
       new political, economic, and even social structures.
      - Political: Voting, polling, information access,
      - Economic: Free markets, information markets, increased
         liquidity, black markets
      - Social: Cyberspatial communities, True Names
  - Publically inspectable algorithms always win out over
     private, secret algorithms
 4.8.2. "What is the American attitude toward privacy and
  + There are two distinct (and perhaps simultaneously held)
     views that have long been found in the American psyche:
    - "A man's home is his castle." "Mind your own business."
       The frontier and Calvinist sprit of keeping one's
       business to one's self.
    - "What have you got to hide?" The nosiness of busybodies,
       gossiping about what others are doing, and being
       suspicious of those who try too hard to hide what they
       are doing.
  + The American attitude currently seems to favor privacy over
     police powers, as evidenced by a Time-CNN poll:
    - "In a Time/CNN poll of 1,000 Americans conducted last
       week by Yankelovich Partners, two-thirds said it was more
       important to protect the privacy of phone calls than to
       preserve the ability of police to conduct wiretaps. When
       informed about the Clipper Chip, 80% said they opposed
       it." [Philip Elmer-Dewitt, "Who Should Keep the Keys,"
       _TIME_, 1994-03-04.]
  - The answer given is clearly a function of how the question
     is phrased. Ask folks if they favor "unbreakable
     encryption" or "fortress capabilities" for terrorists,
     pedophiles, and other malefactors, and they'll likely give
     a quite different answer. It is this tack now being taken
     by the Clipper folks. Watch out for this!
  - Me, I have no doubts.
  - As Perry Metzger puts it, "I find the recent disclosures
     concerning U.S. Government testing of the effects of
     radiation on unknowing human subjects to be yet more
     evidence that you simply cannot trust the government with
     your own personal safety. Some people, given positions of
     power, will naturally abuse those positions, often even if
     such abuse could cause severe injury or death. I see little
     reason, therefore, to simply "trust" the U.S. government --
     and given that the U.S. government is about as good as they
     get, its obvious that NO government deserves the blind
     trust of its citizens. "Trust us, we will protect you"
     rings quite hollow in the face of historical evidence.
     Citizens must protect and preserve their own privacy -- the
     government and its centralized cryptographic schemes
     emphatically cannot be trusted." [P.M., 1994-01-01]
 4.8.3. "How is 1994 like 1984?"
  - The television ad for Clipper: "Clipper--why 1994 _will_ be
     like 1984"
  + As Mike Ingle puts it:
    - 1994: Wiretapping is privacy
             Secrecy is openness
             Obscurity is security
 4.8.4. "We anticipate that computer networks will play a more and
   more important role in many parts of our lives.  But this
   increased computerization brings tremendous dangers for
   infringing privacy.  Cypherpunks seek to put into place
   structures which will allow people to preserve their privacy
   if they choose.  No one will be forced to use pseudonyms or
   post anonymously. But it should be a matter of choice how
   much information a person chooses to reveal about himself
   when he communicates.  Right now, the nets don't give you
   that much choice.  We are trying to give this power to
   people."  [Hal Finney, 1993-02-23]
 4.8.5. "If cypherpunks contribute nothing else we can create a real
   privacy advocacy group, advocating means of real self-
   empowerment, from crypto to nom de guerre credit cards,
   instead of advocating further invasions of our privacy as the
   so-called privacy advocates are now doing!" [Jim Hart, 1994-

4.9 - Education Issues
 4.9.1. "How can we get more people to use crypto?"
  - telling them about the themes of Cypherpunks
  - surveillance, wiretapping, Digital Telephony, Clipper, NSA,
     FinCEN, etc....these things tend to scare a lot of folks
  - making PGP easier to use, better integration with mailers,
  - (To be frank, convincing others to protect themselves is
     not one of my highest priorities.  Then why have I written
     this megabyte-plus FAQ? Good question. Getting more users
     is a general win, for obvious reasons.)
 4.9.2. "Who needs to encrypt?"
  + Corporations
    - competitors...fax transmissions
    + foreign governments
      - Chobetsu, GCHQ, SDECE, Mossad, KGB
    + their own government
      - NSA intercepts of plans, investments
  + Activist Groups
    - Aryan Nation needs to encrypt, as FBI has announced their
       intent to infiltrate and subvert this group
    - RU-486 networks
    - Amnesty International
  + Terrorists and Drug Dealers
    - clearly are clueless at times (Pablo Escobar using a
    - Triads, Russian Mafia, many are becoming crypto-literate
    - (I've been appoached-'nuff said)
  + Doctors, lawyers, psychiatrists, etc.
    - to preserve records against theft, snooping, casual
       examination, etc.
    - in many cases, a legal obligation has been attached to
       this  (notably, medical records)
    - the curious situation that many people are essentially
       _required_ to encrypt (no other way to ensure standards
       are met) and yet various laws exists to limit
       encryption...ITAR, Clipper, EES
    - (Clipper is a partial answer, if unsatisfactory)
 4.9.3. "When should crypto be used?"
  - It's an economic matter. Each person has to decide when to
     use it, and how. Me, I dislike having to download messages
     to my home machine before I can read them. Others use it

4.10 - Libertarian Issues
4.10.1. A technological approach to freedom and privacy:
  - "Freedom is, practically, given as much (or more) by the
     tools we can build to protect it, as it is by our ability
     to convince others who violently disagree with us not to
     attack us.  On the Internet we have tools like anon
     remailers and PGP that give us a great deal of freedom
     from coercion even in the midst of censors. Thus, these
     tools piss off fans of centralized information control, the
     defenders of the status quo, like nothing else on the
     Internet."  [ (Nobody),  libtech-
     l@netcom.com, 1994-06-08]
  + Duncan Frissell, as usual, put it cogently:
    - "If I withhold my capital from some country or enterprise
       I am not  threatening to kill anyone.  When a "Democratic
       State" decides to do something, it does so with armed
       men.  If you don't obey, they tend to shoot....[I]f
       technological change enhances the powers of individuals,
       their power is enhanced no matter what the government
       "If the collective is weakened and the individual
       strengthened by the fact that I have the power of cheap
       guns, cars, computers, telecoms, and crypto then the
       collective has been weakened and we should ease the
       transition to a society based on voluntary rather than
       coerced interaction.
       "Unless you can figure out a new, improved way of
       controlling others; you have no choice." [D.F., Decline
       and Fall, 1994-06-19]
4.10.2.  "They that can give up essential liberty to obtain a little
   temporary safety deserve neither liberty nor safety."
   [Benjamin Franklin]
4.10.3. a typical view of government
  - "As I see it, it's always a home for bullies masquerading
     as a collective defense.  Sometimes it actually it actually
     has to perform its advertised defense function.  Like naked
     purely defensive governments cannot exist.  They are
     bipolar by nature, with some poles (i.e., the bullying
     part) being "more equal than others." [Sandy Sandfort, 1994-
4.10.4. Sadly, several of our speculative scenarios for various laws
   have come to pass. Even several of my own, such as:
  - "(Yet Another May Prediction Realized)...The text of a
     "digital stalking bill" was just sent to Cyberia-l." [L.
     Todd Masco, 1994-08-31] (This was a joking prediction I
     made that "digital stalking" would soon be a crime; there
     had been news articles about the horrors of such
     cyberspatial stalkings, regardless of there being no real
     physical threats, so this move is not all that surprising.
     Not surprising in an age when free speech gets outlawed as
     "assault speech.")
4.10.5. "Don't tread on me."
4.10.6. However, it's easy to get too negative on the situation, to
   assume that a socialist state is right around the corner. Or
   that a new Hitler will come to power. These are unlikely
   developments, and not only because of strong crypto.
   Financial markets are putting constraints on how fascist a
   government can get...the international bond markets, for
   example, will quickly react to signs like this. (This is the
   theory, at least.)
4.10.7. Locality of reference, cash, TANSTAAFL, privacy
  - closure, local computation, local benefits
  - no accounting system needed
  - markets clear
  - market distortions like rationing, coupons, quotas, all
     require centralized record-keeping
  - anything that ties economic transactions to identity
     (rationing, entitlements, insurance) implies identity-
     tracking, credentials, etc.
  + Nonlocality also dramatically increases the opportunities
     for fraud, for scams and con jobs
    - because something is being promised for future delivery
       (the essence of many scams) and is not verifiable locally
    - because "trust" is invoked
  - Locality also fixes the "policeman inside" problem: the
     costs of decisions are borne by the decider, not by others.

4.11 - Crypto Anarchy
4.11.1. The Crypto Anarchy Principle: Strong crypto permits
   unbreakable encrypion, unforgeable signatures, untraceable
   electronic messages, and unlinkable pseudonomous identities.
   This ensures that some transactions and communications can be
   entered into only voluntarily. External force, law, and
   regulation cannot be applied. This is "anarchy," in the sense
   of no outside rulers and laws. Voluntary arrangements, back-
   stopped by voluntarily-arranged institutions like escrow
   services, will be the only form of rule. This is "crypto
4.11.2. crypto allows a return to contracts that governments cannot
  - based on reputation, repeat business
  - example: ordering illegal material untraceably and
     anonymously,,,governments are powerless to do anything
  - private spaces, with the privacy enforced via cryptographic
     permissions (access credentials)
  - escrows (bonds)
4.11.3. Technological solutions over legalistic regulations
  + Marc Ringuette summarized things nicely:
    - "What we're after is some "community standards" for
       cyberspace, and what I'm suggesting is the fairly
       libertarian standard that goes like this:
       "    Prefer technological solutions and self-protection
           over rule-making, where they are feasible.
       "This is based on the notion that the more rules there
       are, the more people will call for the "net police" to
       enforce them.  If we can encourage community standards
       which emphasize a prudent level of self-protection, then
       we'll be able to make do with fewer rules and a less
       intrusive level of policing."[Marc Ringuette, 1993-03-14]
  + Hal Finney has made cogent arguments as to why we should
     not become too complacent about the role of technology vis-
     a-vis politics. He warns us not to grow to confident:
    - "Fundamentally, I believe we will have the kind of
       society that most people want.  If we want freedom and
       privacy, we must persuade others that these are worth
       having.  There are no shortcuts.  Withdrawing into
       technology is like pulling the blankets over your head.
       It feels good for a while, until reality catches up.  The
       next Clipper or Digital Telephony proposal will provide a
       rude awakening." [Hal Finney, POLI: Politics vs
       Technology, 1994-01-02]
  - "The idea here is that the ultimate solution to the low
     signal-to-noise ratio on the nets is not a matter of
     forcing people to "stand behind their words".  People can
     stand behind all kinds of idiotic ideas.  Rather, there
     will need to be developed better systems for filtering news
     and mail, for developing "digital reputations" which can be
     stamped on one's postings to pass through these smart
     filters, and even applying these reputations to pseudonyms.
     In such a system, the fact that someone is posting or
     mailing pseudonymously is not a problem, since nuisance
     posters won't be able to get through."  [Hal Finney, 1993-
4.11.4. Reputations
4.11.5. I have a moral outlook that many will find unacceptable or
   repugnant. To cut to the chase: I support the killing of
   those who break contracts, who steal in serious enough ways,
   and who otherwise commit what I think of as crimes.
  + I don't mean this abstractly. Here's an example:
    - Someone is carrying drugs. He knows what he's involved
       in. He knows that theft is punishable by death. And yet
       he steals some of the merchandise.
    - Dealers understand that they cannot tolerate this, that
       an example must be made, else all of their employees will
  - Understand that I'm not talking about the state doing the
     killing, nor would I do the killing. I'm just saying such
     things are the natural enforcement mechanism for such
     markets. Realpolitik.
  - (A meta point: the drug laws makes things this way.
     Legalize all drugs and the businesses would be more like
     "ordinary" businesses.)
  - In my highly personal opinion, many people, including most
     Congressrodents, have committed crimes that earn them the
     death penalty; I will not be sorry to see anonymous
     assassination markets used to deal with them.
4.11.6. Increased espionage will help to destroy nation-state-empires
   like the U.S., which has gotten far too bloated and far too
   dependent on throwing its weight around; nuclear "terrorism"
   may knock out a few cities, but this may be a small price to
   pay to undermine totally the socialist welfare states that
   have launched so many wars this century.

4.12 - Loose Ends
4.12.1. "Why take a "no compromise" stance?"
  - Compromise often ends up in the death of a thousand cuts.
     Better to just take a rejectionist stance.
  - The National Rifle Association (NRA) learned this lesson
     the hard way. EFF may eventually learn it; right now they
     appear to be in the "coopted by the power center" mode,
     luxuriating in their inside-the-Beltway access to the Veep,
     their flights on Air Force One, and their general
     schmoozing with the movers and shakers...getting along by
     going along.
  - Let's not compromise on basic issues. Treat censorship as a
     problem to be routed around (as John Gilmore suggests), not
     as something that needs to be compromised on. (This is
     directed at rumblings about how the Net needs to "police
     itself," by the "reasonable" censorship of offensive posts,
     by the "moderation" of newsgroups, etc. What should concern
     us is the accomodation of this view by well-meaning civil
     liberties groups, which are apparently willing to play a
     role in this "self-policing" system. No thanks.)
  - (And since people often misunderstand this point, I'm not
     saying private companies can't set whatever policies they
     wish, that moderated newsgroups can't be formed, etc.
     Private arrangements are just that. The issue is when
     censorship is forced on those who have no other
     obligations. Government usually does this, often aided and
     abetted by corporations and lobbying groups. This is what
     we need to fight. Fight by routing around, via technology.)
4.12.2. The inherent evils of democracy
  - To be blunt about it, I've come to despise the modern
     version of democracy we have. Every issue is framed in
     terms of popular sentiment, in terms of how the public
     would vote. Mob rule at its worst.
  - Should people be allowed to wear blue jeans? Put it to a
     vote. Can employers have a policy on blue jeans? Pass a
     law. Should health care be provided to all? Put it to a
     vote. And so on, whittling away basic freedoms and rights.
     A travesty. The tyranny of the majority.
  - De Toqueville warned of this when he said that the American
     experiment in democracy would last only until citizens
     discovered they could pick the pockets of their neighbors
     at the ballot box.
  - But maybe we can stop this nonsense. I support strong
     crypto (and its eventual form, crypto anarchy) because it
     undermines this form of democracy. It takes some (and
     perhaps many) transactions out of the realm of popularity
     contests, beyond the reach of will of the herd. (No, I am
     not arguing there will be a complete phase change. As the
     saying goes, "You can't eat cyberspace." But a lot of
     consulting, technical work, programming, etc., can in fact
     be done with crypto anarchic methods, with the money gained
     transferred in a variety of ways into the "real world."
     More on this elsewhere.)
  + Crypto anarchy effectively allows people to pick and choose
     which laws they support, at least in cyberspatial contexts.
     It empowers people to break the local bonds of their
     majoritarian normative systems and decide for themselves
     which laws are moral and which are bullshit.
    - I happen to have faith that most people will settle on a
       relatively small number of laws that they'll (mostly)
       support, a kind of Schelling point in legal space.
4.12.3. "Is the Cypherpunks agenda _too extreme_?"
  - Bear in mind that most of the "Cypherpunks agenda," to the
     extent we can identify it, is likely to provoke ordinary
     citizens into _outrage_. Talk of anonymous mail, digital
     money, money laundering, information markets, data havens,
     undermining authority, transnationalism, and all the rest
     (insert your favorite idea) is not exactly mainstream.
4.12.4. "Crypto Anarchy sounds too wild for me."
  - I accept that many people will find the implications of
     crypto anarchy (which follows in turn from the existence of
     strong cryptography, via the Crypto Anarchy Principle) to
     be more than they can accept.
  - This is OK (not that you need my OK!). The house of
     Cypherpunks has many rooms.