CYPHERPUNK LEGACIES
Post by Rusty


The most important aspect to an individual's digital rights in the 21st
century is encryption. And it's under threat once again. The problem--one
common to many internet issues--is that despite its overwhelming
importance, encryption's neither easy to fully comprehend nor does it make
for a simple, sexy narrative.

***

"Privacy is the power to selectively reveal oneself to the world."
-- Eric Hughes, from "A Cypherpunk's Manifesto."

***

I've been combing through the Cypherpunks listserv archives from
1992-1998, trying to glean philosophical insights into the first major
fight over whether safe & complete encryption could be available to
everyone on the web. Of course, cypherpunks were never a cohesive group;
they are more of a loose confederation of folks who see encryption as a
liberatory foundation for individual autonomy. But what an intersection of
minds: mathematicians, programmers, engineers, lawyers, shitkickers.

The listserv grew out of a meeting of what mathematician Eric Hughes
sarcastically dubbed Cryptology Amateurs for Social Irresponsibility
(CASI). This invitation-only meeting took place in Hughes' home in
Berkeley, CA. Twenty cryto activists were invited including John
Gilmore--who had founded the Electronic Frontier Foundation with Mitch
Kapor & John Perry Barlow only 2 years previously--& Timothy May, an
electronic engineer who founded a crypto-anarchist movement. Many in this
crew shared deeply libertarian beliefs in the sanctity of the individual &
a suspicion of governmental power. According to Stephen Levy, May,
"produced a fifty-seven page handout, along with an elaborate agenda
including discussion of 'societal implications of cryptography,' 'voting
networks,' and 'anonymous information markets'" (210). Participants played
games & exchanged PGP public keys. Judith Milhon, going by the handle St.
Jude at the time, declared at one point, "You guys are cypherpunks!" (Levy
211). The name stuck to the group.

Hughes decided to keep the momentum going by starting the Cypherpunks
listserv on John Gilmore's server (with the delightful domain name of
toad.com). In a few weeks, 100 participants had joined & by 1993, the
number mushroomed to 700 (Levy 211-2). The community connected through the
listserv was incredibly active with multiple thought-provoking posts being
fired off in a single day. Participants shared transcripts of lectures on
cryptography, reading lists, manifestos, & sometimes line-by-line
responses to each other's posts. As in much of the early internet, there
is a freewheeling, iconoclastic tenor to their conversation, but there's
also scientific precision & passionate belief. The cypherpunks were trying
to give the public the tools to encryption not for personal gain, but in
order to make the internet safer for all of us. Here in the U.S.,
cypherpunks helped fight the Crypto Wars against the FBI & the NSA,
forcing the government to stop considering cryptographic alogorithms as
classified munitions & seeing them as protected speech.

***

"'The world has already been taken over. You may have noticed this. We're
just trying to get some of it back.'"
-- Judith Milton AKA St. Jude, "Cypherpunk Movement," from an email dated
1992-09-25

***

I'm not a programmer & my grasp of mathematics has never moved much beyond
high school algebra so there's much in the Cypherpunks listserv that I do
not understand. I see heated discussions about program bugs & I treat them
like tricks in a magic show: I clap at the appropriate times, but I don't
always grasp the inner workings. However, the emails between members
fascinate me because they articulate a vision for a less abusive world, a
world where individuals maintain control.

***

Reading through these archives can be eerie; cypherpunks saw how
governments wanted shoddy encryption with back door vulnerabilities so
that they could collect information on their citizens. As early as 1992,
some members predicted how a government could just gather as much data as
possible on all citizens, then retroactively examine it when needed,
weaponizing it against individuals deemed to be threats. Look at this
scenario that electrical engineer Keith Henson articulates in an email on
1992-10-27

"One consequence of this proposal would be the capturing of *all* email
traffic for (possible) subsequent decryption under a court order.  After
all, how could you complain?  They couldn't read your messages of the last
ten years unless they happened to get a court order.  Knowing how easy it
is to get a pliant judge to issue an order, this would be really
chilling."

Henson essentially predicts the NSA's post-9/11 PRISM program in which
metadata on all Americans' calls were gathered, the very same program that
Edward Snowden leaked to the public.

***

"You don't understand the theory of power.  Simply make the penalty for
encryption without registry, larger than the penalty for any other crime.
Then no crime can be hidden behind it.  It's like getting Al Capone for
income tax evasion; if you investigate someone and they are enforcing
privacy on their communications, you can put them in jail for life for
that, and can stop worrying about the original suspected offense."
--John Gilmore in an email dated 1992-10-27.

***

Reading the list can also be surreal. Basic encryption programs that we
all take for granted like PGP [Pretty Good Privacy] were considered
illegal if they crossed U.S. borders. I'm thinking of how PGP's inventor
Phil Zimmerman was charged with "exporting munitions without a license" in
1993 because PGP was being used to protect the communications of
grassroots political groups across the globe. Members in the Cypherpunks
listserv followed Zimmerman's trial closely, of course, & debated the
relative safety of being found by government officials with encryption
programs. In 1994-1995, some members discussed whether U.S. Customs would
be able to spot encryption programs on laptops. Carol Anne Braddock in a
1995-01-01 email, writes:

"I couldn't agree with the general drift much more. The real objective is
to get the customs officials used to the procedure of dealing the
cryptograhic materials. Your best asset is a good feature reporter and a
photograher. Right now, I don't think U.S. Customs is going to ask you if
you have PGP in your PC if you leave the country, or return either. They
should, and I'd be proud to say yes."

Bringing computer code on a plane treated like carrying a bomb! After a
protracted battle, Zimmerman ultimately won his case. He smartly published
PGP in a book, arguing that it was protected speech. In this way, the
fight over encryption also became a fight over what kinds of information
citizens are allowed to share with each other.

***

I saw this meme circulating on Mastodon the other day: DANCE LIKE NO ONE'S
WATCHING, ENCRYPT LIKE EVERYONE IS.

***

At its core, the Cypherpunks mailing list considers the issue of trust in
a world that so often is lacking it. A lot of the cypherpunks saw that
trust would be even harder to maintain in an online world because the
difficulty of authentication. Eric Hughes proclaims in a 1992.10.06 email:
"In the electronic world, all you have are persistent pseudonyms." Hughes
argues that what matters in digital interactions is not trust, but rather
persistence. In other words, I don't care who you "really" are, just that
I know you'll consistently act in a particular way. This idea led many
cypherpunks to ask the question: can we create an internet that does not
require trust to operate? One can see how these early conversations would
lead to the development of blockchain & zero knowledge architectures, or
ledgers of interpersonal transactions that both allow anonymity, but don't
allow manipulations in the record.

***

The fight to protect encryption never ends. The FBI is currently pissed
that Apple won't break the encryption on the San Bernadino shooter's
iPhone. The Attorney General William Barr has made it quite clear that he
views encryption with deep suspicion. And now there are various forms of
legislation trying to attack encryption indirectly, to hold internet
platforms liable for how users employ it.

***

My recent letter to Lindsey Graham:

Dear Senator Graham:

I strongly urge you to reconsider pursuing the EARN IT Act legislation
because it threatens the very existence of end-to-end encryption. While
EARN IT's explicitly stated goal is to work against child sex abuse
material (CSAM) on internet platforms, it actually is trying to eviscerate
Section 230 of 1996's Communications Decency Act (CDA), which holds that
internet platforms cannot be held liable for what users do or say. First
of all, federal law already fights against CSAM. According to Stanford's
Center for Internet & Society: "Federal law, specifically Chapter 110 of
Title 18 of the U.S. Code (18 U.S.C. ยงยง 2251-2260A), already makes
everything about CSAM a crime: producing, receiving, accessing, viewing,
possessing, distributing, selling, importing, etc." The problem with EARN
IT is that, in its current form, it would create a commission not elected
by voters who would write a set of "best practices" for platforms that
would attack one of the core American rights: the right to privacy. Many
parts of the federal government, include the FBI & the Attorney General,
have made it clear that they despise encryption. I believe EARN IT would
grant both the oversight commission & the Attorney General powers to
attack encryption in its foundational role in the communications of
everyday, law-abiding people. I believe that this piece of legislation is
hiding its full intent under two cloaks: trying to fight CSAM & popular
outrage against social media companies. Senator Graham, if you truly care
about protecting Americans & limiting the powers of our federal
government, you will stop pursuing EARN IT.

***

These daring words from John Perry Barlow feel like a good ending.
Certainly dramatic: "You can have my encryption algorithm when you pry my
cold dead fingers from its private key."

***

Resources

Zipped files of Cyberpunk listserv:
<http://cryptome.org/cpunks/cpunks-92-98.zip>

Eric Hughes' "A Cypherpunk's Manifesto":
<https://www.activism.net/cypherpunk/manifesto.html>

Steven Levy, Crypto: How the Code Rebels Beat the Government--Saving
Privacy in the Digital Age, New York: Penguin, 2001.

Riana Pfefferkorn,"The EARN IT Act: How to Ban End-to-End Encryption
Without Actually Banning It," Stanford Center for Internet & Society.
<https://cyberlaw.stanford.edu/blog/2020/01/earn-it-act-how-ban-end-end-encryption-without-actually-banning-it>