SlideShare a Scribd company logo
1 of 11
CRYPTO-ANARCHISM!
BECAUSE INFORMATION WANTS TO
FUCK YOUR SHIT UP
Crypto-Anarchy

Anonymity / Pseudonymity

Crypto-society / cipherspace

Information in the Open

Publicity & Privacy
History & Theory
                                   http://en.wikipedia.org/
                                   wiki/
                                   Darknet_(file_sharing)

                                   Darknets started as
                                   net works that weren’t
                                   on Arpanet


 Timothy C. May - Cyphernomicon

 Eric Hughes - A Cypherpunk’s Manifesto

 Darknets

 Freenet
“Free” as in “Speech”

"I worry about my child and the Internet all the
time, even though she's too young to have
logged on yet. Here's what I worry about. I worry
that 10 or 15 years from now, she will come to
me and say 'Daddy, where were you when they
took freedom of the press away from the
Internet?'"
—Mike Godwin, Electronic Frontier Foundation
Practice                     http://en.wikipedia.org/wiki/
                             Tor_(anonymity_net work)

                             http://en.wikipedia.org/wiki/I2P

                             http://www.irongeek.com/i.php?
                             page=videos/getting-started-with-the-
                             i2p-darknet
Freenet
                             Garlic routing is a variant of onion routing that
                             encrypts multiple messages together to make it
The Onion Router (Tor)       more difficult for attackers to perform traffic
                             analysis.


I2P / Garlic routing

  eepSites

  iMule (eDonkey/kademlia)

  I2Phex (gnutella)

  BitTorrent

Comparisons
The Onion Router (TOR)




Tor: Onion-based routing that acts as a proxy
layer between the client computer and the Tor
network (middlemen encrypted data transfers)

Privoxy
http://en.wikipedia.org/wiki/
                Onion_routing


Onion routing   Patented by the US Navy

                Onion routers reroute messages in an
                unpredictable path

                Anonymity can be retained even
                with compromised intermediate
                routers

                Unlinkability - eavesdropper cannot
                easily determine both the sender and
                receiver

                Generally slow
Cryptoanarchism in
                                       http://

Action                                 www.irishtimes.com/
                                       newspaper/finance/

                                       http://iansbrain.com/
                                       2009/06/15/tor-and-
                                       the-iranian-election/




2009 Iranian Election protests: The Iran Curtain

Privacy is not Secrecy

Slippery slope of privacy erosion

The boiling frog
Information in the Open
Wikileaks            Wikileaks states that its "primary interest
                     is in exposing oppressive regimes in          "in response to the
                     Asia, the former Soviet bloc, Sub-            attempted suppression,
                     Saharan Africa and the Middle East, but       Wikileaks will release
  Authenticity & Consensus
                     we also expect to be of assistance to         several thousand additional
                     people of all regions who wish to reveal      pages of Scientology
                     unethical behavior in their governments       material next week"

  "The simplest and most effective countermeasure is a
                     and corporations."


  worldwide community of informed users and editors
  who can scrutinize and discuss leaked documents."

Activism on the public record

  Pittsburg G-20 protests on Twitter

Chilling Effects                                                      2003 incident in which
                                                                      Barbra Streisand
                                                                      unsuccessfully attempted to

Streisand Effect                                                      sue photographer Kenneth
                                                                      Adelman and Pictopia.com
                                                                      for US$50 million in an
                                                                      attempt to have the aerial
“Information Wants to
Be Free”                                               Stewart Brand at the first
                                                       Hackers' Conference in
                                                       1984
                                                       Stallman—founder of the
                                                       GNU Project and the Free
“On the one hand information wants to be expensive, because
                                                       Software Foundation

it's so valuable. The right information in the right place just
changes your life. On the other hand, information wants to be
free, because the cost of getting it out is getting lower and
lower all the time. So you have these two fighting against each
other.” —Stewart Brand

“I believe that all generally useful information should be free.
By 'free' I am not referring to price, but rather to the freedom to
copy the information and to adapt it to one's own uses... When
information is generally useful, redistributing it makes humanity
wealthier no matter who is distributing and no matter who is
receiving.” —Richard Stallman
Mirrors & Copyability

Mirrors & Copyability: Zero Cost

Streisand Effect

  De-CSS

  Scientology

  etc. ad infinitum!

More Related Content

What's hot

Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation dri_ireland
 
Women Who Tech Video Activism
Women Who Tech Video ActivismWomen Who Tech Video Activism
Women Who Tech Video ActivismShirley Sexton
 
It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...Brianna Laugher
 
Introduction to Anonymous
Introduction to AnonymousIntroduction to Anonymous
Introduction to AnonymousTom Tresser
 

What's hot (6)

Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation
 
Video Activism
Video ActivismVideo Activism
Video Activism
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Women Who Tech Video Activism
Women Who Tech Video ActivismWomen Who Tech Video Activism
Women Who Tech Video Activism
 
It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...
 
Introduction to Anonymous
Introduction to AnonymousIntroduction to Anonymous
Introduction to Anonymous
 

Similar to Cryptoanarchism

Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyMathias Klang
 
Pedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaPedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaMathias Klang
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & TechnologyMathias Klang
 
Debating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeDebating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeMathias Klang
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercionMarc Smith
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Philip Sheldrake
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020Jayna Mistry
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webPaul Brooks
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 

Similar to Cryptoanarchism (20)

Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media Society
 
Pedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaPedagogical Challenges of Social Media
Pedagogical Challenges of Social Media
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
 
Debating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeDebating the networked society: technical roots of social change
Debating the networked society: technical roots of social change
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Dark Web
Dark WebDark Web
Dark Web
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Cryptoanarchism

  • 2. Crypto-Anarchy Anonymity / Pseudonymity Crypto-society / cipherspace Information in the Open Publicity & Privacy
  • 3. History & Theory http://en.wikipedia.org/ wiki/ Darknet_(file_sharing) Darknets started as net works that weren’t on Arpanet Timothy C. May - Cyphernomicon Eric Hughes - A Cypherpunk’s Manifesto Darknets Freenet
  • 4. “Free” as in “Speech” "I worry about my child and the Internet all the time, even though she's too young to have logged on yet. Here's what I worry about. I worry that 10 or 15 years from now, she will come to me and say 'Daddy, where were you when they took freedom of the press away from the Internet?'" —Mike Godwin, Electronic Frontier Foundation
  • 5. Practice http://en.wikipedia.org/wiki/ Tor_(anonymity_net work) http://en.wikipedia.org/wiki/I2P http://www.irongeek.com/i.php? page=videos/getting-started-with-the- i2p-darknet Freenet Garlic routing is a variant of onion routing that encrypts multiple messages together to make it The Onion Router (Tor) more difficult for attackers to perform traffic analysis. I2P / Garlic routing eepSites iMule (eDonkey/kademlia) I2Phex (gnutella) BitTorrent Comparisons
  • 6. The Onion Router (TOR) Tor: Onion-based routing that acts as a proxy layer between the client computer and the Tor network (middlemen encrypted data transfers) Privoxy
  • 7. http://en.wikipedia.org/wiki/ Onion_routing Onion routing Patented by the US Navy Onion routers reroute messages in an unpredictable path Anonymity can be retained even with compromised intermediate routers Unlinkability - eavesdropper cannot easily determine both the sender and receiver Generally slow
  • 8. Cryptoanarchism in http:// Action www.irishtimes.com/ newspaper/finance/ http://iansbrain.com/ 2009/06/15/tor-and- the-iranian-election/ 2009 Iranian Election protests: The Iran Curtain Privacy is not Secrecy Slippery slope of privacy erosion The boiling frog
  • 9. Information in the Open Wikileaks Wikileaks states that its "primary interest is in exposing oppressive regimes in "in response to the Asia, the former Soviet bloc, Sub- attempted suppression, Saharan Africa and the Middle East, but Wikileaks will release Authenticity & Consensus we also expect to be of assistance to several thousand additional people of all regions who wish to reveal pages of Scientology unethical behavior in their governments material next week" "The simplest and most effective countermeasure is a and corporations." worldwide community of informed users and editors who can scrutinize and discuss leaked documents." Activism on the public record Pittsburg G-20 protests on Twitter Chilling Effects 2003 incident in which Barbra Streisand unsuccessfully attempted to Streisand Effect sue photographer Kenneth Adelman and Pictopia.com for US$50 million in an attempt to have the aerial
  • 10. “Information Wants to Be Free” Stewart Brand at the first Hackers' Conference in 1984 Stallman—founder of the GNU Project and the Free “On the one hand information wants to be expensive, because Software Foundation it's so valuable. The right information in the right place just changes your life. On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two fighting against each other.” —Stewart Brand “I believe that all generally useful information should be free. By 'free' I am not referring to price, but rather to the freedom to copy the information and to adapt it to one's own uses... When information is generally useful, redistributing it makes humanity wealthier no matter who is distributing and no matter who is receiving.” —Richard Stallman
  • 11. Mirrors & Copyability Mirrors & Copyability: Zero Cost Streisand Effect De-CSS Scientology etc. ad infinitum!

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n