Cyphernomicon Index
Cyphernomicon 16.27

Crypto Anarchy:
How Crypto Anarchy Advocates Will Fight Back


  16.27.1. Bypassing restrictions on commercial encryption packages by
            not making them "commercial"
           - public domain
           - freely distributed
           - after all, the basic algorithms are simple and don't really
              deserve patent protection: money will not be made by the
              originators of the code, but by the actual providers of
              services (for transmission and storage of packets)
  16.27.2. Noise and signals are often indistinguishable
           - as with the LSB audio signal approach...unless the
              government outlaws live recordings or dubs on digital
              systems...
  16.27.3. Timed-release files (using encryption) will be used to hide
            files, to ensure that governments cannot remove material they
            don't like
           - easier said than done
  16.27.4. Legal approaches will also be taken: fundamental
            constitutional issues
           - privacy, free speech, free association
  16.27.5. The Master Plan to Fight Restrictions on Encryption
           + "Genie out of the bottle" strategy: deploy crypto widely
             - intertwined with religions, games, whistleblower groups,
                and other uses that cannot easily just be shut down
             - scattered in amongst many other activities
           - Media attention: get media to report on value of
              encryption, privacy, etc.
           + Diffusion, confusion, and refusion
             - Diffuse the use by scattering it around
             - Confuse the issue by fake religions, games, other uses
             - Refuse to cooperate with the government
           - Free speech arguments: calling the discussions free speech
              and forcing the government to prove that the free speech is
              actually an economic transaction
           + links with religions, corporations, etc.
             - private meetings protected
             - voting systems


Next Page: 16.28 Things that May Hide the Existence of Crypto Anarchy
Previous Page: 16.26 How Crypto Anarchy Will Be Fought

By Tim May, see README

HTML by Jonathan Rochkind