• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Idelto

Cryptocurrency news website

  • About
  • Monthly analysis
    • August 2019
    • July 2019
    • June 2019
  • Bitcoin/Ethereum
  • How to invest in cryptocurrencies
  • News

PGP

How To Lock And Protect Away Secret Files With GNU Privacy Guard

13/05/2022 by Idelto Editor

Users can take advantage of the cryptographic protection offered by GPG to secure files and data that they want to keep well under wraps.

In this guide, I will explain the options at your disposal for encrypting files using open-source software on a Linux, Mac, or Windows computer. You can then transport this digital information across distance and time, to yourself or others.

The program “GNU Privacy Guard” (GPG) an open-source version of PGP (Pretty Good Privacy), allows:

  1. Encryption using a password.
  2. Secret messaging using public/private key cryptography
  3. Message/Data authentication (using digital signatures and verification)
  4. Private key authentication (used in Bitcoin)

Option One

Option one is what I’ll be demonstrating below. You can encrypt a file using any password you like. Any person with the password can then unlock (decrypt) the file to view it. The problem is, how do you send the password to someone in a secure way? We’re back to the original problem.

Option Two

Option two solves this dilemma (how-to here). Instead of locking the file with a password, we can lock it with someone’s public key — that “someone” is the intended recipient of the message. The public key comes from a corresponding private key, and the private key (which only the “someone” has) is used to unlock (decrypt) the message. With this method, no sensitive (unencrypted) information is ever sent. Very nice!

The public key is something that can be distributed over the internet safely. Mine is here, for example. They are usually sent to keyservers. Keyservers are like nodes that store public keys. They keep and synchronize copies of peoples’ public keys. Here’s one:

Ubuntu Keyserver

You can enter my email and find my public key in the result. I’ve also stored it here and you can compare what you found on the server.

Option Three

Option three is not about secret messages. It is about checking that a message has not been altered during its delivery. It works by having someone with a private key sign some digital data. The data can be a letter or even software. The process of signing creates a digital signature (a large number derived from the private key and the data that’s getting signed). Here’s what a digital signature looks like:

It’s a text file that begins with a “begin” signal, and ends with an “end” signal. In between is a bunch of text that actually encodes an enormous number. This number is derived from the private key (a giant number) and the data (which is actually always a number also; all data is zeros and ones to a computer).

Anyone can verify that the data has not been changed since the original author signed it by taking the:

  1. Public key
  2. Data
  3. Signature

The output to the query will be TRUE or FALSE. TRUE means that the file you downloaded (or message) has not been modified since the developer signed it. Very cool! FALSE means that the data has changed or the wrong signature is being applied.

Option Four

Option four is like option three, except that instead of checking if the data has not been modified, then TRUE will mean that the signature was produced by the private key associated with the public key offered. In other words, the person who signed has the private key to the public key that we have.

Interestingly, this is all that Craig Wright would have to do to prove he is Satoshi Nakamoto. He doesn’t have to actually spend any coins.

We already have the addresses (similar to public keys) that are owned by Satoshi. Craig can then produce a signature with his private key to those addresses, combined with any message such as “I really am Satoshi, haha!” and we can then combine the message, the signature, and the address, and get a TRUE result if he is Satoshi, and a CRAIG_WRIGHT_IS_A_LIAR_AND_A_FRAUD result if he isn’t.

Option Three And Four — The Difference.

It’s actually a matter of what you trust. If you trust that the sender owns the private key to the public key you have, then verification checks that the message has not changed.

If you don’t trust the private key / public key relationship, then verification is not about the message changing, but the key relationship.

It’s one or the other for a FALSE result.

If you get a TRUE result, then you know that BOTH the key relationship is valid, AND the message is unaltered since the signature was produced.

Get GPG For Your Computer

GPG already comes with Linux operating systems. If you are unfortunate enough to be using a Mac, or God forbid a Windows computer, then you’ll need to download software with GPG. Instructions to download and how to use it on those operating systems can be found here.

You don’t need to use any of the graphical components of the software, everything can be done from the command line.

Encrypting Files With A Password

Create the secret file. This can be a simple text file, or a zip file containing many files, or an archive file (tar). Depending on how sensitive the data is, you might consider creating the file on an air-gapped computer. Either a desktop computer built with no WiFi components, and never to be connected to the internet by cable, or you can build a Raspberry Pi Zero v1.3 very cheaply, with instructions here.

Using a terminal (Linux/Mac) or CMD.exe (Windows), change your working directory to wherever you put the file. If that makes no sense, search the internet and in five minutes you can learn how to navigate the file system specific to your operating system (search: “YouTube navigating file system command prompt” and include your operating system’s name).

From the correct directory, you can encrypt the file (“file.txt” for example) like this:

gpg -c file.txt

That’s “gpg”, a space, “-c”, a space, and then the name of the file.

You’ll then be prompted for a password. This will encrypt the new file. If you’re using GPG Suite on the Mac, notice the “Save in Keychain” is checked by default (see below). You might want to not save this password if it’s particularly sensitive.

Whichever OS you use, the password will be saved for 10 minutes to the memory. You can clear it like this:

gpg-connect-agent reloadagent /bye

Once your file is encrypted, the original file will remain (unencrypted), and a new file will be created. You must decide if you will delete the original or not. The new file’s name will be the same as the original but there’ll be a “.gpg” at the end. For example, “file.txt” will create a new file called “file.txt.gpg”. You can then rename the file if you wish, or you could have named the file by adding extra options in the command above, like this:

gpg -c –output MySecretFile.txt file.txt

Here, we have “gpg”, a space, “-c”, a space, “–output”, a space, the filename you want, a space, the name of the file you are encrypting.

It’s a good idea to practice decrypting the file. This is one way:

gpg file.txt.gpg

This is just “gpg”, a space, and the name of the encrypted file. You don’t need to put any options.

The GPG program will guess what you mean and will attempt to decrypt the file. If you do this immediately after encrypting the file, you may not be prompted for a password because the password is still in the computer’s memory (for 10 minutes). Otherwise, you’ll need to enter the password (GPG calls it a passphrase).

You will notice with the “ls” command (Mac/Linux) or “dir” command (Windows), that a new file has been created in your working directory, without the “.gpg” extension. You can read it from the command prompt with (Mac/Linux):

cat file.txt

Another way to decrypt the file is with this command:

gpg -d file.txt.gpg

This is the same as before but with a “-d” option as well. In this case, a new file is not created, but the contents of the file are printed to the screen.

You can also decrypt the file and specify the output file’s name like this:

gpg -d –output file.txt file.txt.gpg

Here we have “gpg”, a space, “-d” which is not strictly required, a space, “–output”, a space, the name of the new file we want, a space, and finally the name of the file we are decrypting.

Sending The Encrypted File

You can now copy this file to a USB drive, or email it. It is encrypted. Nobody can read it as long as the password is good (long and complicated enough) and can’t be cracked.

You could send this message to yourself in another country by storing it in email or the cloud.

Some silly people have stored their Bitcoin private keys to the cloud in an unencrypted state, which is ridiculously risky. But if the file containing Bitcoin private keys is encrypted with a strong password, it’s safer. This is especially true if it’s not called “Bitcoin_Private_Keys.txt.gpg” – Don’t do that!

WARNING: It’s important to understand that in no way am I encouraging you to put your Bitcoin private key information on a computer (hardware wallets were created to allow you to never need to do this). What I am explaining here is for special cases, under my guidance. My students in the mentorship program will know what they are doing and will only use an air-gapped computer, and know all the potential risks and problems, and ways to avoid them. Please don’t type seed phrases into a computer unless you are a security expert and know exactly what you are doing, and don’t blame me if your bitcoin is stolen!

The encrypted file can also be sent to another person, and the password can be sent separately, perhaps with a different communication device. This is the simpler, and less secure way, compared to option two explained at the beginning of this guide.

There are actually all sorts of ways you can construct the delivery of a secret message across distance and time. If you know these tools, think hard and carefully about all the risks and scenarios, a good plan can be made. Or, I am available to assist.

Good luck, and happy Bitcoining!

This is a guest post by Arman The Parman. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

Filed Under: Bitcoin Magazine, Cryptography, encryption, English, Feature, GPG, Marty's Bent, PGP, privacy, security, technical

These Basic Privacy Tools Can Help Anyone Avoid Surveillance On The Open Internet

09/02/2022 by Idelto Editor

As the resurgence of the EARN IT Act shows, we’re all in need of tools for communicating privately online — particularly Bitcoiners.

With the Eliminating Abusive and Rampant Neglect of Interactive Technologies (EARN IT) Act, two U.S. senators have reintroduced a surveillance bill that could have major impacts on privacy and free speech, turning the offering of encryption services into legal risk territory for service providers.

While the censorship of free speech is already flourishing on public platforms such as Twitter, the EARN IT act would enforce the transmission of all communication between users in plain text format, transforming our inboxes into searchable data mines. But here’s the good news: there are numerous ways to encrypt our communication by ourselves.

“Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.”

–John Perry Barlow, “Declaration Of Independence Of Cyberspace,” 1996

The EARN IT Act, first proposed in 2020, seeks to amend section 230 of the Communications Act of 1934, which originally regarded radio and telephone communication, granting service providers immunity from civil lawsuits for removing inappropriate content.

The Communications Act of 1934 was first overhauled with the Telecommunications Act of 1996, which included the Communications Decency Act, aiming to regulate indecency and obscenity on the internet, such as pornographic material. Section 230 of the Communications Decency Act protects service providers from legal proceedings regarding content issued via their platforms by stating that service providers are not to be understood as publishers. It is this section which the EARN IT Act attempts to alter, putting more responsibility on website operators and service providers.

Under the guise of stopping the distribution of child pornography, the EARN IT Act would render the deployment of end-to-end encryption and other encryption services as punishable acts, which would affect messaging services such as Signal, WhatsApp and Telegram’s Secret Chats, as well as web hosting services such as Amazon Web Services, pressuring service providers to scan all communication for inappropriate material.

If the EARN IT Act is passed, our inboxes will turn into fully-searchable databases, leaving no room for private conversation. While it may be possible to forbid end-to-end encryption as a service, can the banning of the use of end-to-end encryption be deemed unconstitutional by infringing on our right of the freedom of speech, as encryption is nothing but another way to communicate with each other in the form of written text?

While it is unclear whether the EARN IT Act will pass at the time of writing, it is clear that the regulation of speech is a tedious and close-to-senseless endeavor on behalf of governments, as it is impossible to stop the spread of words without divulging toward a totalitarian superstate. We can all use encryption to stay private in our communication, ranging from easy-to-use cyphers to military grade encryption mechanisms.

Circumventing The Twitter Police With Cyphertext

Anyone who isn’t careful in their communication on public platforms such as Twitter has probably spent a fair share of time in the ominous “Twitter jail”: preventing them from posting on the platform for defined periods of time as a consequence of saying things the Twitter algorithm found inappropriate. An easy way to circumvent surveillance and, consequently, censorship by the Twitter police is ROT13 encryption.

ROT13 is an easy form of encryption which circumvents the readability of Twitter’s policing mechanisms by rotating letters by 13 places, initially used to hide the punchlines of jokes on Usenet.

Want to express your opinion on COVID-19 without getting punished by the Twitter algo? Rotate the letters of what you’d like to write by 13 places, making your text readable for anyone who knows that you’re using ROT13 encryption, while causing the Twitter algorithm to detect nothing but gibberish in what you wrote. For example: “COVID SUCKS” turns into “PBIVQ FHPXF.” ROT13 encryption can be translated via free online service providers such as rot13.com, or by hand via the board below.

While ROT13 is not deemed a secure form of encryption, as anyone may be able to decipher what has been written, it is a fun and easy way to get used to protecting one’s communication on the open internet. It is also possible to come up with one’s own encryption mechanisms, such as rotating letters seven instead of 13 places.

Source

Circumventing Location Detection With Where39

When we communicate our location via unencrypted messengers such as iMessage or Telegram, we are also leaking our location to anyone who gets their hands on the contents of our inboxes. Services such as Google Maps automatically detect locations in our written text, and are able to form patterns of our movements. If you’d like to meet someone without revealing your location to Googlezon MacCrapple, you should obviously leave your phone at home, but need to find a way to communicate your meeting place without being detected as a meeting place from the get go.

Ben Arc’s Where39 is an easy way to encrypt meeting places in plain text communication by assigning every square meter in the world with four words. Originally building on the service What Three Words, Arc’s version uses the most distributed word list in the world which every Bitcoiner has heard of in one way or another, as it is also used to generate our passphrases: the BIP39 word list.

For example, if I wanted to meet a friend for coffee at Francis Place, on the corner of Edinburgh Drive near Clayton University in St. Louis, Missouri,, I’d text them “Rapid Thing Carry Kite.” My coffee date could then look up the location via the Where39 map, without the plain text being detected as an address.

Encrypting Messages To Dedicated Recipients With PGP

When texting with friends, we assume that our messages are only read by us as the senders, and our counterparties as the receivers. Unfortunately, when messages are sent via unencrypted messengers, anyone with access to the servers or one of the sending or receiving parties’ devices may read these messages as well.

As the EARN IT act makes it incredibly risky for service providers to offer in-app encryption mechanisms, this is where PGP comes into play for anyone wanting to keep their messages private: Military-grade encryption which can only be deciphered by those holding the private key to decipher communications.

PGP, short for Pretty Good Privacy, was invented by Phil Zimmerman in 1991, and has seen its fair share of government combating in the past. With PGP, we assign ourselves secret keys used to encrypt and decrypt messages, so that only those in control of the secret keys are able to read what we have written. This way, I can copy/paste an encrypted message into any unencrypted messenger, while keeping it unreadable for third-party adversaries.

Here’s an example of an encrypted message I have sent to a friend via Telegram, which is only readable for the person holding the secret key to decrypt it:

—–BEGIN PGP MESSAGE—–

hQIMA0Y84L8CE6YzAQ/9GzF8eO0sj+2QJ9CNn8p7IJfA+iCB1IbUFQwQkiefxoQe

K7XXVKX2V9HnOMaQH66VuweqGqq8TVqUVil4xvHfWOiX/ytvQC3D9zaEz3hsX8qB

WFVAQL37wBAMSjefb73VqnV7Fiz5K5rWzxT5IdimICpHEkei7PQ2ccy4hGnBWh3z

f4HWBMruO3U4Lf8SPAwHOJhvCSCBz0wkk6IQC9sQnzFv0bcEmZ4NvU8k/Ke6GER3

94xbJu+GEXST9CGoGZviJL+48lNwWfIrtro1rCVdqZJE/gyS557VKJXkxWj06D1U

6+2aG64ELMqvlxjbjUAVr5oumtz2WWPwRU4mVuuYq2s90ooWd0x1YqvAFsL8jJqu

jtyEQounGdHMbALRK9QBXQqEm5izxNIH4Wlrvj+OcgBBNsbyRhBV6o7IE49onVBC

PdqjDSrbk6He42DRoRrBmpaYwhEQwSsp/yRhcjJg49sDp7YHBwu9TqZGSc8/WxJx

VlLyW94dmmL7Es/hqcW+/tt35sQyasjQExXIiYNm9mDSNQg2ebMwi5+yDalwMTW5

lgrM4GMiTKjC2rMM8X1gpcfkPX+SjsN44RaCxLGwuZauBmaq6emol1OE3bGNmAri

9UMDRoV/9450e0BHz3RgPjzldLohThIAgf6OvbNIQFoc0NOlSzVZ7xpZsp6EpJjS

QwGXJ/zqRLSLncumZreunbv6Bs98zidS1cfvK5abHMgioS+2J5bSnsaxGrALkVRK

i6KJaJWcGVTBckPpfdWuPu/AzJo=

=J55a

—–END PGP MESSAGE—–

PGP will likely be the most powerful tool to circumvent the EARN IT act when it comes to keeping our communications private. To generate your own PGP keys, you first need to install the GnuPG software. This is most easily done via terminal on Linux, by running “sudo apt-get install gnupg.” Next, you generate your keys by running “gpg –gen-key” and adding an alias, like an email address to your key.

To check whether your keys have been generated, run “gpg –list-keys.” Next, you export your keys via “gpg –output public.pgp –armor –export [your alias, which you can find via gpg –list-keys]” and “–output private.pgp –armor –export [your alias, which you can find via gpg –list-keys].” Make sure to never share your private keys with anyone, and to keep the keys safely stored in a password-protected folder. Once you’ve lost access to your private keys, or to the passphrase you’ve been prompted to generate for your keys, you will not be able to access messages sent to you which are encrypted toward the keys in question.

Next, you should share your public key with people you’d like to communicate with via PGP, so that those parties can encrypt messages that are only readable by the person holding your private key (which is hopefully only you). The easiest way to do this is to upload your public key file to a public key server, such as keys.openpgp.org, via its web UI. You can also share the fingerprint of your keys in your social media profiles or on your website.

To find the fingerprint for your key, run “gpg –list-keys” again, and select the long string of letters and numbers appearing under the “pub” section. If the entire string is too long to share, for example in your Twitter bio, you can also share your short fingerprint, which consists of the last 16 characters of your fingerprint. People who’d like to send you an encrypted message can now find your public key via the terminal command “gpg –recv-keys [fingerprint].” But remember: A PGP key which you’ve retrieved online does not guarantee that this key actually belongs to the person you’re wanting to communicate with. The safest way to receive someone’s keys will always be in person.

Let’s use PGP to send an encrypted message to me. In your terminal, import my keys via “gpg –recv-keys C72B398B7C048F04.” If you’ve configured to access your keys via a different keyserver than openpgp, then run “gpg –keyserver hkps://keys.openpgp.org –recv-keys C72B398B7C048F04.” Now, run “gpg –list-keys” to check whether the key import was successful. To encrypt a message for me, run the command “gpg -ae -r [my alias, which you can find via gpg –list-keys]” and hit “enter.” Write whatever it is you’d like to share with me in plain text, such as “Hello PGP,” then end the message with “ctrl+d.” Next, a PGP message block should appear on your screen. Copy/paste this message including “BEGIN PGP MESSAGE” and “END PGP MESSAGE” into any public forum or messenger of your choice, sending an encrypted message over the open internet, only readable by its designated recipient. For example, you could now send this message to me via Twitter direct message, post it publicly on GitHub or share it in a public Telegram group of which I am a part.

Once I’ve received your message, I will send you a message back via PGP. For me to be able to send you an encrypted message back, make sure that your message includes your PGP fingerprint. The easiest way to do this is to include it in your encrypted message. When you receive an encrypted message back, you can decrypt it by running “gpg -d” in your terminal and copy/pasting the encrypted message, including “BEGIN PGP MESSAGE” and “END PGP MESSAGE.” The message should then be resolved to plain text. Et voila, you are now set to communicate in private with your counterparties over the open internet, giving law enforcement no chance to surveil the contents of your communication.

Conclusion

It can be assumed that our technocratic overlords will continue to increase pressure to deanonymize communication over the open internet in the years to come. Proposals such as the EARN IT Act will only be the first steps.

But as the cypherpunks had proven in the 1990s, encryption is speech and it is impossible to ban. As long as we resort to informing ourselves on the possibilities of private communication, there is no way for governments and big tech to stop us from cutting them out of the picture, and enacting our right to the freedom of speech across all communication channels.

Privacy notice: This article only gives an overview of encryption mechanisms for beginners. If you are dealing with sensitive data, it makes sense to inform yourself further on more secure handlings of PGP, such as managing GPG via Tor and encrypting and decrypting messages via air-gapped devices.

This is a guest post by L0la L33tz. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

Filed Under: Bitcoin Magazine, Communication, encryption, English, Feature, PGP, privacy, Regulation, surveillance, technical

The Quest For Digital Cash

13/10/2021 by Idelto Editor

How Satoshi Nakamoto’s Bitcoin project married the concepts of digital cash and digital gold and how pioneering cryptographer Adam Back continues the work of making it a better tool for freedom.

One summer day in August 2008, Adam Back got an email from Satoshi Nakamoto.

It was the first time Nakamoto had reached out to anyone about a new project that the pseudonymous programmer or group of programmers called Bitcoin. The email described a blueprint for what a group of privacy advocates known as the cypherpunks considered the Holy Grail: decentralized digital cash.

By the mid-2000s, cryptographers had for decades tried to create a digital form of paper cash with all of its bearer asset and privacy guarantees. With advances in public-key cryptography in the 1970s and blind signatures in the 1980s, “e-cash” became less of a science fiction dream read about in books like “Snowcrash” or “Cryptonomicon” and more of a possible reality.

Censorship-resistance was a key goal of digital cash, which aimed to be money beyond the reach of governments and corporations. But early projects suffered from a seemingly inescapable flaw: centralization. No matter how much cutting-edge math went into these systems, they ultimately still relied on administrators who could block certain payments or inflate the monetary supply.

More “ecash” advances occurred in the late 1990s and early 2000s, each one making a critical step forward. But before 2008, a vexing computing riddle prevented the creation of a decentralized money system: the Byzantine Generals Problem.

Imagine that you are a military commander trying to invade Byzantium hundreds of years ago during the Ottoman Empire. Your army has a dozen generals, all posted in different locations. How do you coordinate a surprise attack on the city at a certain time? What if spies break through your ranks and tell some of your generals to attack sooner, or to hold off? The entire plan could go awry.

The metaphor translates to computer science: How can individuals who are not physically with each other reach consensus without a central coordinator?

For decades, this was a major obstacle for decentralized digital cash. If two parties could not precisely agree on the state of an economic ledger, users could not know which transactions were valid, and the system could not prevent double-spending. Hence all ecash prototypes needed an administrator.

The magic solution came in the form of a mysterious post on an obscure email list on Friday, October 31, 2008, when Nakamoto shared a white paper, or concept note, for Bitcoin. The subject line was “Bitcoin P2P e-cash paper” and the author wrote, “I’ve been working on a new electronic cash system that’s fully peer-to-peer, with no trusted third party.”

Satoshi Nakamoto’s email announcing Bitcoin. Source.

To solve the Byzantine Generals Problem and issue digital money without a central coordinator, Nakamoto proposed to keep the economic ledger in the hands of thousands of individuals around the world. Each participant would hold an independent, historical, and continually-updating copy of all transactions that Nakamoto originally called a timechain. If one participant tried to cheat and “double-spend,” everyone else would know and reject that transaction.

After raising eyebrows and objections with the white paper, Nakamoto incorporated some final feedback and, a few months later on January 9, 2009, launched the first version of the Bitcoin software.

Today, each Bitcoin is worth more than $55,000. The currency boasts a daily transaction total greater than most countries’ daily GDP and a total market capitalization of more than $1 trillion. Nakamoto’s creation is used by more than 100 million people across nearly every country on earth and has been adopted by Wall Street, Silicon Valley, D.C. politicians, and even nation-states.

But in the beginning, Nakamoto needed help, and the first person they reached out to for assistance was Adam Back.

I. The Birth Of The Cypherpunks

Back was one of the cypherpunks, students of computer science and distributed systems in the 1980s and 1990s who wanted to preserve human rights like the right to associate and the right to communicate privately in the digital realm. These activists knew that technologies like the internet would eventually give enormous power to governments and believed cryptography could be the individual’s best defense.

The original cypherpunks: Tim May, Eric Hughes and John Gilmore. Source.

By the early 1990s, states realized that they were sitting on an ever-growing treasure trove of personal data from their citizens. Information was often collected for innocuous reasons. For example, your Internet Service Provider (ISP) might collect a mailing address and phone number for billing purposes — but then hand this identifying information along with your web activity to law enforcement without a warrant.

The collection and analysis of this kind of data spawned the era of digital surveillance and eavesdropping, which, two decades later, led to the intricate and highly-unconstitutional war on terror programs that would eventually be leaked to the public by the NSA whistleblower Edward Snowden.

In his 1983 book “The Rise Of The Computer State,” New York Times journalist David Burnham warned that computerized automation could lead to an unprecedented level of surveillance. He argued that in response, citizens should demand legal protections. The cypherpunks, on the other hand, thought the answer was not to lobby the government to create better policy but instead to invent and use technology that the government could not stop.

The cypherpunks harnessed cryptography to trigger social change. The idea was deceptively simple: political dissidents from across the world could gather online and work together pseudonymously and freely to challenge state power. Their call to arms was: “Cypherpunks write code.”

Once the exclusive domain of militaries and spy agencies, cryptography was brought into the public world in the 1970s through academics like Ralph Merkle, Whitfield Diffie and Martin Hellman. At Stanford University in May 1975, this trio had a eureka moment. They figured out how two people could trade private messages online without needing to trust a third party.

One year later, Diffie and Hellman published “New Directions In Cryptography,” a seminal work that laid out this private messaging system that would become key to defeating surveillance. The paper described how citizens could encrypt and send digital messages without fear of snooping governments or corporations figuring out the contents:

“In a public-key cryptosystem enciphering and deciphering are governed by distinct keys, E and D, such that computing D from E is computationally infeasible (e.g. requiring 10100 instructions). The enciphering key E can be disclosed [in a directory] without compromising the deciphering key D. This enables any user of the system to send a message to any other user enciphered in such a way that only the intended recipient is able to decipher it.”

In simple terms, Alice can have a public key that she posts online. If Bob wants to send a private message to Alice, he can look up her public key, and use it to encrypt the message. Only she can decrypt the note and read the text inside. If a third party, Carol, does not have the private key (think: password) for the message, she cannot read the contents. This simple innovation changed the entire information power balance of individuals versus governments.

When Diffie and Hellman’s paper was published, the U.S. government, through the NSA, tried to prevent the spread of its ideas, even writing a letter to a cryptography conference at the time, warning the participants that their participation might be illegal. But after activists printed hard copies of the paper and distributed them around the country, the Feds backed off.

In 1977, Diffie, Hellman, and Merkle would file U.S. patent number 4200770 for “public-key cryptography,” an invention that created the foundation for email and messaging tools like Pretty Good Privacy (PGP) and today’s popular Signal mobile app.

It was the end of government control of cryptography and the beginning of the cypherpunk revolution.

II. The List

The word “cypherpunk” did not appear in the Oxford English Dictionary until 2006, but the community began gathering much earlier.

In 1992, one year after the public release of the world wide web, early Sun Microsystems employee John Gilmore, privacy activist Eric Hughes, and former Intel engineer Timothy May started to meet up in San Francisco to discuss how cryptography could be used to preserve freedom. That same year, they launched the Cypherpunks Mailing List (or “The List” for short), where the ideas behind Bitcoin were developed and eventually published by Nakamoto 16 years later.

Eric Hughes’s email announcing The List. Source.

On “The List,” cypherpunks like May wrote about how monarchies in the late Middle Ages were disrupted by the invention of the printing press, which democratized access to information. They debated how the creation of the open internet and cryptography could democratize privacy technology and disrupt the seemingly inevitable trend toward a global surveillance state.

Like many cypherpunks, Back’s college education was in computer science. But, serendipitously, he first studied economics between the ages of 16 and 18, and afterward, added a Ph.D. in distributed systems. If anyone was adequately trained to one day become a Bitcoin scientist, it was Back.

While he studied computer science in London in the early 1990s, he learned that one of his friends was working on speeding up computers to run faster encryption techniques. Through his friend, Back learned about the public-key encryption invented 15 years earlier by Diffie and Hellman.

Back thought this was a historic shift in the relationship between governments and individuals. Now citizens could communicate electronically in a way that no government could decrypt. He resolved to learn more, and his curiosity eventually led him to The List.

During the mid-1990s, Back was an avid participant on The List, which at its peak, was populated by dozens of new messages every day. By Back’s own account, he was the most active contributor at times, addicted to the cutting-edge conversations of the era.

Back was struck by how the cypherpunks wanted to change society by using code to peacefully create systems that could not be stopped. In 1993, Hughes wrote the movement’s seminal short essay, “A Cypherpunk’s Manifesto”:

“Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world…

“…We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. We must defend our own privacy if we expect to have any. We must come together and create systems, which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.

“We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.

“Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can’t get privacy unless we all do, we’re going to write it… Our code is free for all to use, worldwide. We don’t much care if you don’t approve of the software we write. We know that software can’t be destroyed and that a widely dispersed system can’t be shut down.”

This kind of thinking, Back thought, was what actually changes society. Sure, one could lobby or vote, but then society changes slowly, lagging behind government policy.

The other way, Back’s preferred strategy, was bold, permissionless change through inventing new technology. If he wanted change, he thought, he just had to make it happen.

III. The Crypto Wars

The original enemies of the cypherpunks were governments trying to stop citizens from using encryption. Back and friends thought that privacy was a human right. On the other hand, nation-states were petrified that citizens would create code allowing them to escape oversight and control.

Authorities doubled down on old military standards — which classified cryptography alongside fighter jets and aircraft carriers as munitions — and tried to ban export of encryption software to kill its use globally. The aim was to scare people away from using privacy tech. The conflict became known as the “Crypto Wars,” and Back was a frontline soldier.

Back knew that the big picture effects of such a ban would cause many U.S. jobs to move offshore, and force vast amounts of sensitive information to remain unencrypted. But the Clinton Administration was not looking ahead, just at what was directly in front of it. And its biggest target was a computer scientist named Phil Zimmerman, who had in 1991 released the first consumer-level secret messaging system, called Pretty Good Privacy, or “PGP” for short.

In the mid-1990s, WIRED covered the cypherpunks in a detailed profile:

View the 4 images of this gallery on the original article

PGP was an easy way for two individuals to communicate privately using PCs and the new world wide web. It promised to democratize encryption to millions of people and end the state’s decades-long control over private messaging.

As the face of the project, however, Zimmerman came under attack from corporations and governments. In 1977, three Massachusetts Institute of Technology (MIT) scientists named Rivest, Shamir, and Adelman, implemented Diffie and Hellman’s ideas into an algorithm called RSA. MIT later issued a license for the patent to a businessman named Jim Bidzos and his company, RSA Data Security.

The cypherpunks were uneasy with such a vital toolkit being controlled by one entity, having a single point of failure, but all through the 1980s, licensing and fear of being sued had largely prevented them from releasing new programs based on the code.

At first, Zimmerman asked Bidzos for a free license for the software, but was denied. In defiance, Zimmerman released PGP as “guerilla freeware,” disseminating it through floppy disks and internet message boards. A young cypherpunk by the name of Hal Finney — who would later play a major role in the Bitcoin story — joined Zimmerman, helping to push the project forward. A 1994 WIRED feature hailed Zimmerman’s brazen release of PGP as a “pre-emptive strike against such an Orwellian future.”

Bidzos called Zimmerman a thief and mounted a campaign to halt the spread of PGP. Zimmerman eventually used a loophole to put out a new PGP version, which piggybacked on code that Bidzos had released for free, defusing the corporate threat.

But the federal government ultimately decided to investigate Zimmerman for exporting “munitions” under the Arms Control Export Act. In defense, Zimmerman argued that he was merely enacting his First Amendment rights of free speech by sharing open-source code.

At the time, the Clinton Administration argued that Americans had no right to encrypt. They pushed for legislation to force companies to install backdoors (“clipper chips”) into their equipment so that the State could have a skeleton key to any message these chips encrypted. Led by White House officials and congressmen like Joe Biden, they argued that cryptography would empower criminals, pedophiles and terrorists.

The cypherpunks rallied to support Zimmerman, who became a cause célèbre. They argued that anti-encryption laws were incompatible with U.S. traditions of free speech. The activists started to print the PGP source code in books and mail them overseas. Via the publishing of the code in printed form, Zimmerman and others theorized they could legally circumvent anti-munitions restrictions. Recipients would scan the code, reconstitute it, and run it, all to prove the point: you cannot stop us.

Back wrote short pieces of source code that any programmer could turn into a fully-functional privacy toolkit. Some activists tattooed snippets of this code on their bodies. Back famously started selling t-shirts with the code on the front and a piece of the U.S. Bill of Rights with “VOID” stamped over it on the back.

Adam Back’s “crypto” t-shirt. Source. 

Activists finally sent a book containing the controversial code to the U.S. government’s Office of Munitions Control, asking if it could share it abroad. They never got a response. The cypherpunks guessed that the White House would never ban books, and in the end, they were right.

In 1996, the U.S. Department of Justice dropped its charges against Zimmerman. The pressure to force companies to use “clipper chips” subsided. Federal judges argued that encryption was a right protected by the First Amendment. Anti-cryptography standards were overturned, and encrypted messaging became a core part of the open web and e-commerce. PGP became “the most widely used email encryption software in the world.”

Today, companies and apps ranging from Amazon to WhatsApp and Facebook rely on encryption to secure payments and messages. Billions of people benefit. Code changed the world.

Back is self-deprecating and said that it is hard to say if his activism in particular made a difference. But certainly, the fight that the cypherpunks mounted was one of the main reasons that the U.S. government lost the Crypto Wars. The authorities tried to stop the code and failed.

This realization would loom large in Back’s mind 15 years later, in the summer of 2008, as he worked through that first email from Nakamoto.

IV. From DigiCash To Bit Gold

As the computing historian Steven Levy said in 1993, the ultimate crypto tool would be “anonymous digital money.” Indeed, after winning the fight for private communications, the next challenge for the cypherpunks was to create digital cash.

Some cypherpunks were crypto-anarchists — deeply skeptical of the modern democratic state. Others believed it was possible to reform democracies to preserve individual rights. No matter what side they took, many considered digital cash to be the Holy Grail of the cypherpunk movement.

In the 1980s and 1990s, major steps were taken in the right direction, both culturally and technically, toward digital cash. From a cultural perspective, science fiction authors like Neal Stephenson captured the imagination of computer scientists around the world with depictions of future societies — where cash was gone — and different kinds of digital e-bucks were the currency du jour. At a time when credit cards and digital payments were already on the rise, there was a nostalgia for the privacy involved in making a cash payment, where the merchant does not know, store, or sell any information about the customer.

On the technical front, a cryptography scholar at the University of California, Berkeley named David Chaum took the powerful idea of public-key encryption and started to apply it to money.

eCash inventor David Chaum. Source.

In the early 1980s, Chaum invented blind signatures, a key innovation in the evolution of being able to prove ownership of a piece of data without revealing its provenance. In 1985, he published “Security Without Identification: Transaction Systems To Make Big Brother Obsolete,” a prescient paper that explored how the growth of the surveillance state could be slowed through private digital payments.

A few years later in 1989, Chaum and friends moved to Amsterdam, applied theory to practice, and launched DigiCash. The company aimed to allow users to convert euros and dollars into digital cash tokens. Bank credits could be turned into “eCash” and sent to friends outside of the banking system. They could store the new currency on their PC, for instance, or cash them out. The software’s strong encryption made it impossible for authorities to trace the money flow.

In a 1994 profile of DigiCash at its heyday, Chaum said that goal was to “catapult our currency system into the 21st century… in the process, shattering the Orwellian predictions of a Big Brother dystopia, replacing them with a world in which the ease of electronic transactions is combined with the elegant anonymity of paying in cash.”

Back said that cypherpunks like him were initially excited about eCash. It prevented outside observers from knowing who had sent how much to whom. And the tokens resembled cash in as much as they were bearer instruments that users controlled.

Chaum’s personal philosophy also resonated with the cypherpunks. In 1992, he wrote that mankind was at a decision point, where “in one direction lies unprecedented scrutiny and control of people’s lives; in the other, secure parity between individuals and organizations. The shape of society in the next century,” he wrote, “may depend on which approach predominates.”

DigiCash, however, failed to get the right funding, and later that decade went bankrupt. For Back and others, this was a big lesson: digital cash needed to be decentralized, without a single point of failure.

Back had personally gone to great lengths to preserve privacy in society. He once ran a “mixmaster” service to help people keep their communications private. He would accept incoming email and forward it along in a way that was not traceable. To make it hard to figure out that he was running the service, Back rented a server from a friend in Switzerland. To pay him from London, he would mail physical cash. Eventually, the Swiss Federal Police showed up at his friend’s office. The next day, Back shut down his mixer. But the dream of digital cash kept burning in his mind.

Centralized digital money could fail operationally, come under regulatory capture, or go bankrupt, à la DigiCash. But its biggest vulnerability is monetary issuance dictated by a trusted third party.

On March 28, 1997, after years of reflection and experimentation, Back invented and announced Hashcash, an anti-spam concept later cited in Nakamoto’s white paper that would prove foundational for Bitcoin mining. Hashcash would eventually enable financial “proof of work”: a currency that needed the expenditure of energy to produce new monetary units, thus making money harder and fairer.

Governments historically have frequently abused their monopolies on the issuance of money. Tragic examples include ancient Rome, Weimar Germany, Soviet Hungary, the Balkans in the 1990s, Mugabe’s Zimbabwe, and the 1.3 billion people today living under double, triple, or quadruple digit inflation everywhere from Sudan to Venezuela.

Against this backdrop, cypherpunk Robert Hettinga wrote in 1998 that properly decentralized digital cash would mean that economics would no longer have to be “the handmaiden of politics.” No more making new huge amounts of new cash with the click of a button.

One vulnerability of Hashcash was that if someone tried to design a currency with its anti-spam mechanism, users with faster computers could still cause hyperinflation. A decade later, Nakamoto would solve this issue with a key innovation in Bitcoin called the “difficulty algorithm,” where the network would reset the difficulty of minting coins every two weeks based on the total amount of power spent by the users on the network.

In 1998, the computer engineer Wei Dai released his b-money concept. B-money was “an anonymous, distributed electronic cash system,” and it proposed a “scheme for a group of untraceable digital pseudonyms to pay each other with money and to enforce contracts amongst themselves without outside help.”

Dai was inspired by Back’s work with Hashcash, incorporating proof of work into b-money’s designs. While the system was limited and turned out to be impractical, Dai left behind a series of writings that echoed Hughes, Back, and others.

In February 1995, Dai sent an email to The List, making a case for technology, not regulation, as the savior of our future digital rights:

“There has never been a government that didn’t sooner or later try to reduce the freedom of its subjects and gain more control over them, and there probably never will be one. Therefore, instead of trying to convince our current government not to try, we’ll develop the technology… that will make it impossible for the government to succeed.

“Efforts to influence the government (e.g., lobbying and propaganda) are important only in so far as to delay its attempted crackdown long enough for the technology to mature and come into wide use.

“But even if you do not believe the above is true, think about it this way: If you have a certain amount of time to spend on advancing the cause of greater personal privacy (or freedom, or cryptoanarchy, or whatever), can you do it better by using the time to learn about cryptography and develop the tools to protect privacy, or by convincing your government not to invade your privacy?”

That same year, in 1998, an American cryptographer named Nick Szabo proposed bit gold. Building off of the ideas of other cypherpunks, Szabo proposed a parallel financial structure whose token would have its own value proposition, separate from the dollar or the euro. Having worked at DigiCash, and seen the vulnerabilities of a centralized mint, he thought gold was a worthwhile asset to try to replicate in the digital space.

Bit gold was important because it finally linked the ideas of monetary reform and hard money to the cypherpunk movement. It tried to make the “provable costliness” feature of gold digital. A gold necklace, for example, proves that the owner either expended significant time and energy and resources to dig that gold out of the ground and make it into jewelry, or paid a lot of money to buy it. Szabo wanted to bring provable costliness online. Bit gold was never implemented, but it continued to inspire the cypherpunks.

The next few years saw the rise of e-commerce, the dot-com bubble, and then the emergence of today’s internet mega-corporations. It was a busy and explosive time online. But there was not another major advancement in digital cash for five years. This points to the fact that first, there were not many people working on this idea, and second, making it all work was extraordinarily challenging.

In 2004, former PGP contributor Finney finally announced reusable proof of work, or “RPOW” for short. This was the next major innovation in the path toward Bitcoin.

RPOW took the idea of bit gold and added a network of open-source servers to verify transactions. One could attach some bit gold to an email, for example, and the recipient would acquire a bearer asset with provable costliness.

While Finney launched RPOW in a centralized fashion on his own server, he had plans to eventually decentralize the architecture. These were all key steps toward Bitcoin’s foundation, but a few more puzzle pieces still needed to slide into place.

V. Running Bitcoin

In 1999, Back finished his Ph.D. in distributed systems and began work in Canada for a company called Zero Knowledge Systems. There, he helped build the Freedom Network, a tool that allowed individuals to browse the web privately. Back and his colleagues used what are known as “zero-knowledge proofs” (based on Chaum’s blind signatures) to encrypt communications over this network, and sold access to the service.

Back, as it turns out, was also ahead of his time on this key innovation. In 2002, computer scientists improved on Zero Knowledge System’s model by taking a U.S. government private web browsing project called “onion routing” open source. They called it the Tor Network, and it inspired the age of the virtual-private networks (VPNs). It remains the gold standard for private web browsing today.

In the early and mid-2000s, Back finished his work at Zero Knowledge Systems, was recruited by Microsoft for a short stint as a cybersecurity researcher, and then joined a new startup doing peer-to-peer encrypted collaboration software. All the while, Back kept the idea of digital cash in the back of his mind.

When the email from Nakamoto arrived in August 2008, Back was intrigued. He read it carefully and responded, suggesting that Nakamoto look into a few other digital money systems, including Dai’s b-money.

On October 31, 2008, Nakamoto published the Bitcoin white paper on The List. The first sentence promised the dream that so many had chased: “a purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution.” Back’s Hashcash, Dai’s b-money, and earlier cryptography research were all cited.

As digital cash historian Aaron van Wirdum wrote, “in Bitcoin, Hashcash killed two birds with one stone. It solved the double-spending problem in a decentralized way, while providing a trick to get new coins into circulation with no centralized issuer.” He noted that Back’s Hashcash was not the first ecash system, but a decentralized electronic cash system “might have been impossible without it.”

On January 9, 2009, Nakamoto launched the first version of the Bitcoin software. Finney was one of the first to download the program and experiment with it, as he was excited that someone had continued his work from RPOW.

On January 10, Finney posted the famous tweet: “Running bitcoin.” The peaceful revolution had begun.

Hal Finney’s “Running Bitcoin” tweet. Source. 

VI. The Genesis Block

In February 2009, Nakamoto summarized the ideas behind Bitcoin on a peer-to-peer tech community message board:

“Before strong encryption, users had to rely on password protection to keep their information private. Privacy could always be overridden by the admin based on his judgement call weighing the principle of privacy against other concerns, or at the behest of his superiors. Then strong encryption became available to the masses, and trust was no longer required. Data could be secured in a way that was physically impossible for others to access, no matter what reason, no matter how good the excuse, no matter what.

“It’s time we had the same thing for money. With e-currency based on cryptographic proof, without the need to trust a third-party middleman, money can be secure and transactions effortless. One of the fundamental building blocks for such a system is digital signatures. A digital coin contains the public key of its owner. To transfer it, the owner signs the coin together with the public key of the next owner. Anyone can check the signatures to verify the chain of ownership. It works well to secure ownership, but leaves one big problem unsolved: double-spending. Any owner could try to re-spend an already spent coin by signing it to another owner. The usual solution is for a trusted company with a central database to check for double-spending, but that just gets back to the trust model. In its central position, the company can override the users…

“Bitcoin’s solution is to use a peer-to-peer network to check for double-spending… The result is a distributed system with no single point of failure. Users hold the crypto keys to their own money and transact with each other, with the help of the P2P network to check for double-spending.”

Nakamoto had stood on the shoulders of Diffie, Chaum, Back, Dai, Szabo, and Finney and forged decentralized digital cash.

The key, in retrospect, was to combine the ability to make private transactions outside of the banking system with the ability to hold an asset that could not be debased via political interference.

This last feature was not top of mind for the cypherpunks before the late 1990s. Szabo had certainly aimed for it with bit gold, and others inspired by Austrian economists like Fredrich Hayek and Murray Rothbard had long discussed getting the creation of money out of government hands. Still, generally, cypherpunks had prioritized privacy over monetary policy in early visions of digital cash.

The ambivalence towards monetary policy shown by privacy advocates is still evident today. Many left-leaning civil liberties groups that have protected American digital rights over the past two decades have either ignored or been outright hostile to Bitcoin. The 21 million-coin limit, scarcity, and “hard money” qualities proved foundational to achieving privacy through digital cash. Yet, digital rights advocacy groups have largely not recognized nor celebrated the role that proof of work and an unchanging monetary policy can play in protecting human rights.

To underline the primary importance of scarcity and predictable monetary issuance in the making of digital cash, Nakamoto released Bitcoin not after a government surveillance scandal, but in the wake of the Global Financial Crisis and ensuing money printing experiments of 2007 and 2008.

The first record in Bitcoin’s blockchain is known as the Genesis Block, and it is a political rallying cry. Right there in the code is a message worth pondering: “The Times / 03 Jan / 2009 Chancellor on brink of second bailout for banks.”

Bitcoin Genesis Block: Chancellor on brink of second bailout for banks. Source. 

The message refers to a headline in The Times of London, describing how the British government was in the process of bailing out a failing private sector through increasing both sides of its balance sheet. This was part of a broader global movement where central banks created cash for commercial banks out of thin air, and in return acquired assets ranging from mortgage-backed securities to corporate and sovereign debt. In the U.K., the Bank of England was printing more money to try to save the economy.

Nakamoto’s Genesis statement was a challenge to the moral hazard created by the Bank of England, which was functioning as a lender of last resort for British companies that had followed reckless policies and were now in danger of going bankrupt.

The average Londoner would be the one to pay the price during a recession, whereas the Canary Wharf elite would find ways to protect their wealth. No British bankers would go to prison during the Great Financial Crisis, but millions of lower- and middle-class British citizens suffered. Bitcoin was more than just digital cash, it was an alternative to central banking.

Nakamoto did not think highly of the model of bureaucrats increasing debt to save ever-more financialized economies. As they wrote:

“The root problem with conventional currency is all the trust that’s required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve.”

Nakamoto launched the Bitcoin network as a competitor to central banks, offering the automation of monetary policy and eliminating the smoky back rooms where small handfuls of elites would make decisions about public money for everyone else.

VII. An Engineering Marvel

Initially, Back was impressed by Bitcoin. He read a technical field report that Finney published in early 2009 and realized Nakamoto had solved many of the problems that had previously prevented the creation of an effective digital cash. What perhaps impressed Back most, and made the Bitcoin project stronger than any he had ever seen, was that sometime in early 2011, Nakamoto vanished forever.

In 2009 and 2010, Nakamoto posted updates, discussed tweaks and improvements to Bitcoin, and shared their thoughts on the future of the network, mainly on an online forum called Bitcointalk. Then, one day, they disappeared, and have never been conclusively heard from since.

At the time, Bitcoin was still a nascent project, and Nakamoto was still conceivably a central point of failure. In late 2010, they were still acting as a benevolent dictator. But by removing themselves — and giving up a lifetime of fame, fortune, and awards — they made it impossible for governments to be able to damage the network by arresting or manipulating its creator.

Before leaving, Nakamoto wrote:

“A lot of people automatically dismiss e-currency as a lost cause because of all the companies that failed since the 1990s. I hope it’s obvious it was only the centrally controlled nature of those systems that doomed them. I think this is the first time we’re trying a decentralized, non-trust based system.”

Back agreed. Beyond being struck by the way Nakamoto revealed Bitcoin and then disappeared, he was especially intrigued by Bitcoin’s monetary policy, which was programmed to issue a smaller and smaller amount of coins each year until the 2130s, when the last bitcoin would be released and no further bitcoin would be issued. The total number of coins was set in stone at just shy of 21 million.

Every four years, the new Bitcoin provided to winning miners as part of the block reward would be cut in half, in an event now celebrated as the “halving.”

Bitcoin’s predictable issuance. Source.

When Nakamoto was mining bitcoin in early 2009, the subsidy was 50 bitcoin. The subsidy dropped to 25 in 2012, 12.5 in 2016, and 6.25 in April 2020. As of late 2021, nearly 19 million bitcoin have been mined, and by 2035, 99% of all bitcoin will be distributed.

The remainder will be distributed over the following century, as a lingering incentive to miners, who over time must shift to making their profit from transaction fees instead of the ever-shrinking subsidy.

Even in 2009, Nakamoto, Finney, and others speculated that Bitcoin’s unique “hard-capped” monetary policy with a limit of 21 million total coins could make the currency extremely valuable if it one day took off.

In addition to the innovative monetary policy, Back thought the so-called “difficulty algorithm” was also a significant scientific breakthrough. This trick addressed a concern Back had originally had for Hashcash, where users with faster computers could overwhelm the system. In Bitcoin, Nakamoto prevented this from happening by programming the network to reset the difficulty required to successfully mine a block every two weeks, based on how long mining the last two weeks took.

If the market crashed, or some catastrophic event happened (for example, when the Chinese Communist Party kicked half the world’s Bitcoin miners offline in May 2021), and the total global amount of energy spent mining Bitcoin (the “hash rate”) went down, it would take longer than normal to mine blocks.

However, with the difficulty algorithm, the network would shortly compensate, and make mining easier. Conversely, if the global hash rate went up, perhaps if a more efficient piece of equipment were invented, and miners found blocks too quickly, the difficulty algorithm would shortly compensate. This seemingly-simple feature gave Bitcoin resilience and has helped it survive massive seasonal mining turmoil, precipitous price crashes, and regulatory threats. Today, Bitcoin’s mining infrastructure is more decentralized than ever.

These innovations made Back think that Bitcoin could potentially succeed where other digital currency attempts had failed. However, one glaring problem remained: Bitcoin was not very private.

VIII. Bitcoin’s Privacy Problem

For the cypherpunks, privacy was a key goal. Previous iterations of e-cash, like the one produced by DigiCash, had even made the tradeoff of achieving privacy by sacrificing decentralization. There could be immense privacy in these systems, but users had to trust the mint and were at risk of censorship and devaluation.

In creating an alternative to the mint, Nakamoto was forced to rely on an open ledger system, where anyone could publicly view all transactions. It was the only way to ensure auditability, but it sacrificed privacy. Back says that he still thinks this was the right engineering decision.

There had been more work done in the area of private digital currencies since DigiCash. In 1999, security researchers published a paper called “Auditable Anonymous Electronic Cash,” around the idea of using zero-knowledge proofs. More than a decade later, the “Zerocoin” paper was published as an optimization of this concept. But to try to achieve perfect privacy, these systems made tradeoffs.

The math required for these anonymous transactions was so complicated that it made each transaction very large and each spend very time-consuming. One reason Bitcoin works so well today is that the average transaction is just a couple of hundred bytes. Anyone can cheaply run a full node at home and keep track of Bitcoin’s history and incoming transactions, keeping power over the system in the hands of users. The system does not rely on a few supercomputers. Rather, regular computers can store the Bitcoin blockchain and transmit transaction data at low cost because data use is kept to a minimum.

If Nakamoto had used a Zerocoin-type model, each transaction would have been more than 100 kilobytes, the ledger would have grown huge, and only a handful of people with specialized datacenter equipment could have run a full node, introducing the possibility for collusion, censorship, or even a small group of people deciding to increase the monetary supply beyond 21 million. As the Bitcoin community mantra asserts, “don’t trust, verify.”

Back said that he is, in retrospect, glad that he did not mention the 1999 paper to Nakamoto in his emails. Creating decentralized digital cash was the most crucial part: privacy, he thought, could be programmed in later.

By 2013, Back decided Bitcoin had demonstrated enough stability to be the foundation for digital cash. He realized he could take some of his applied cryptography experience and help make it more private. Around this time, Back started spending 12 hours a day reading about Bitcoin. He said that he lost track of time, barely ate, and barely slept. He was obsessed.

That year, Back suggested a few key ideas to the Bitcoin developer community on channels like IRC and Bitcointalk. One was changing the type of digital signature that Bitcoin uses from ECDSA to Schnorr. Nakamoto did not use Schnorr in the original design, despite the fact that it offered better flexibility and privacy for users, because it had a patent on it. But that patent had expired.

Today, Back’s suggestion is being implemented, as Schnorr signatures are being added to the Bitcoin network next month as part of the Taproot upgrade. Once Taproot is activated and used at scale, most types of wallets and transactions will look the same to observers (including governments), helping to fight the surveillance machine.

IV. Confidential Transactions

Back’s biggest vision for Bitcoin was something called Confidential Transactions. Currently, a user exposes the amount of bitcoin they send with each transaction. This enables auditability of the system — everyone at home running the Bitcoin software can ensure that there are only a certain number of coins — but it also enables surveillance to happen on the blockchain.

If a government can pair a Bitcoin address with a real-world identity, they can follow the funds. Confidential Transactions (CT) would hide the transaction amount, making surveillance much more difficult or perhaps even impossible when used in conjunction with CoinJoin techniques.

In 2013, Back talked to a handful of core developers — the “Bitcoin Wizards,” as he calls them — and realized it would be extremely difficult to implement CT, as the community understandably prioritized security and audibility over privacy.

Back also realized that Bitcoin was not very modular — meaning one could not experiment with CT inside the system — so he helped come up with the idea of a new kind of experimental testbed for Bitcoin technology, so that he could test out ideas like CT without harming the network.

Back quickly realized that this would be a lot of work. He would have to build software libraries, integrate wallets, get compatibility with exchanges, and create a user-friendly interface. Back raised a $21 million seed round in Silicon Valley to try to build a company to make it all happen.

With seed funding in hand, Back teamed up with noted Bitcoin Core developer Greg Maxwell and investor Austin Hill and launched Blockstream, which is today one of the world’s biggest Bitcoin companies. Back remains CEO, and pursues projects like Blockstream Satellite, which enables Bitcoin users around the world to use the network without needing internet access.

In 2015, Back and Maxwell released a version of the Bitcoin “testnet” they had envisioned and called it Elements. They proceeded to enable CT on this sidechain — now called Liquid — where today hundreds of millions of dollars are settled privately.

Bitcoin users fought what is known as the “Blocksize War” against big miners and corporations between 2015 and 2017 to keep the blocksize reasonably limited (it did increase to a new theoretical maximum of 4 megabytes) and keep power in the hands of individuals, so any plan to significantly increase the size of blocks in the future could be met with stiff resistance.

Back still thinks it is possible to optimize the code and get CT transactions small enough to implement in Bitcoin. It is still several years away, at best, from being added, but Back continues on his quest.

For now, Bitcoin users can improve their privacy through techniques like CoinJoin, CoinSwap, and by using second-layer technology like the Lightning Network or sidechains like Mercury or Liquid.

In particular, Lightning — another area where Back’s team at Blockstream invests heavily through work on c-lightning — helps users spend bitcoin more cheaply, quickly, and privately. Through innovations like this, Bitcoin serves as censorship-resistant and debasement-proof savings tech for tens of millions of people around the world, and is becoming more friendly for daily transactions.

In the near future, Bitcoin could very well fulfill the cypherpunk vision of teleportable digital cash, with all of the privacy aspects of cash and all of the store-of-value ability of gold. This could prove one of the most important missions of the coming century, as governments experiment with and begin to introduce central bank digital currencies (CBDCs).

CBDCs aim to replace paper money with electronic credits that can be easily surveilled, confiscated, auto-taxed, and debased via negative interest rates. They pave the way for social engineering, pinpoint censorship and deplatforming, and expiration dates on money.

But if the vision for Bitcoin’s digital cash can be fully achieved, then in Nakamoto’s words, “we can win a major battle in the arms race and gain a new territory of freedom for several years.”

This is the cypherpunk dream, and Adam Back is focused on making it happen.

This is a guest post by Alex Gladstein. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

Filed Under: Adam Back, Bitcoin Magazine, culture, Cypherpunks, David Chaum, encryption, English, freedom, Hal Finney, Martin Hellman, Marty's Bent, PGP, Ralph Merkle, Whitfield Diffie

2020: Year 11 Of “The Transformation”

11/01/2021 by Idelto Editor

2020 was unforgettable, especially for Bitcoin. To help memorialize this year for our readers, we asked our network of contributors to reflect on Bitcoin’s price action, technological development, community growth and more in 2020, and to reflect on what all of this might mean for 2021. These writers responded with a collection of thoughtful and thought-provoking articles. Click here to read all of the stories from our End Of Year 2020 Series.

2020 AD. An off-the-charts year in every meaning of that phrase. An annus horribilis. And yet, the synthetic price of Bitcoin has reached all-time highs, well beyond what any normie would have predicted five years ago, and people of the class reflexively hostile to Bitcoin in its early days are now buying hundreds of millions of fiat dollars’ worth of Bitcoin, eschewing altcoins and anointing themselves as the next wave of breathless clumsy gurus. This change in sentiment was very predictable, and is an essential part of “The Transformation” from the fiat economy to the Bitcoin economy.

President Donald John Trump mentioned Bitcoin in a tweet. The greatest fraudster in Bitcoin was finally and irrefutably exposed as a liar and fraud. The EU decided that it needs its own altcoin, demonstrating that it knows absolutely nothing about Bitcoin (or economics), why it was created and that it can do nothing about it. Mnuchin unilaterally declared that the Constitution is now “out of service” as he laid down a diktat that U.S. persons are forbidden from doing multiplication.

PayPal decided to expose synthetic bitcoin to its 350,000,000 users, and my own startup Azteco exposed actual bitcoin to 760,000,000 users, processing over $1,000,000 in just under three months of full launch. A new strain of the flu, first detected in 2019 in the U.S., drove everyone out of their minds in one of the biggest mass hysteria events ever recorded.

When I said “off the charts,” and “annus horibilis” I really meant it.

2021: The Dawn Breaks

There is hope. Bitcoin is now considered by ordinary people to be totally reliable, safe, not a scam and a very good way to store wealth. Every shred of doubt about Bitcoin in the psychologically normal has evaporated, and it is becoming increasingly hard to find mainstream media fake news outlets that have a bad thing to say about Bitcoin. Whenever they talk about it, they tilt their heads down a little, as if they’re looking over their spectacles, do not smirk and treat Bitcoin with the same deadpan reverence as they do discussion of the U.S. dollar. Clearly, the word has come down from the boardroom that Bitcoin is to be taken seriously from now on. It’s a safe bet to wager that the board members of every news organization have a large “position” in Bitcoin and do not want to damage the value of their portfolios.

Which brings us to the future; specifically, the future position of the United States of America as the best, most powerful nation state in history. How will the greatest nation on Earth approach the new reality created by Bitcoin?

Hearings on Bitcoin and its derivatives are being held in the U.S. on a regular basis, and invariably the expert witnesses called to testify fail to properly describe the actual processes going on underneath the hood. Some of them are lying deliberately, some are misleading out of ignorance. If the ones intending to tell the truth used the correct language and excluded all analogies, the only possible conclusion they could come to would be that America cannot regulate Bitcoin under its current legal system. The Constitution guarantees the inalienable rights of American citizens, and therefore Bitcoin is protected by virtue of it being text. The only way Bitcoin can be made regulatable is if the Constitution is changed; and that does not mean adding a new amendment, it means removing the First Amendment entirely. 

Inevitably, the anti-Bitcoin protagonists will face a robust and ultimately successful legal challenge that will remove the possibility of any sort of “BitLicense” or interference from the CTFC, FinCEN or any other U.S. agency. It will also remove any possibility of interference at the U.S. State level. The consequence of adhering to the basic law of the United States will cause America to become the center of all Bitcoin business for the entire world, and will cause trillions of dollars worth of ecommerce to flow through the U.S.

Let me explain why this is the case.

Some say that bitcoin is money. Others say that it is not money. It doesn’t matter what these people say. What does matter are three things; that Bitcoin is, that the Bitcoin network does what it is meant to do completely reliably and what the true nature of the Bitcoin network and the messages in it are.

Bitcoin is a distributed ledger system, maintained by a network of peers that monitors and regulates which entries are allocated to what Bitcoin addresses. This is done entirely by transmitting messages that are text, between the computers in the network (known as “nodes”), where cryptographic procedures are executed on these messages in text to verify their authenticity and the identity of the sender and recipient of the message and their position in the public ledger. The messages sent between nodes in the Bitcoin network are human readable, and printable. There is no point in any Bitcoin transaction that Bitcoin ceases to be text. It is all text, all the time.

Bitcoin can be printed out onto sheets of paper. This output can take different forms, like machine-readable QR codes, or it can be printed out in the letters a to z and the numbers 0 to 9. This means they can be read by a human being, just like “Huckleberry Finn.”

At the time of the creation of the United States of America, the Founding Fathers of that new country in their deep wisdom and distaste for tyranny, haunted by the memory of the absence of a free press in the countries from which they escaped, wrote into the basic law of that then-young federation of free states, an explicit and unambiguous freedom, the “freedom of the press.” This amendment was first because of its central importance to a free society. The First Amendment guarantees that all Americans have the power to exercise their right to publish and distribute anything they like, without restriction or prior restraint.

“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

This single line, forever precludes any law that restricts Bitcoin in any way.

In 1995, the U.S. government had, on the statute books, laws that restricted the export of encryption software products from America without a license. These goods are classified as “munitions.” The first versions of the breakthrough public key encryption software “Pretty Good Privacy” or “PGP,” written by Philip Zimmerman had already escaped the U.S. via Bulletin Board Systems from the moment it was first distributed, but all copies of PGP outside of the United States were “illegal.” In order to fix the problem of all copies of PGP outside of America being encumbered by this perception, an ingenious plan was put into motion, using the first amendment as the means of making it happen legally.

The source code for PGP was printed out.

The original print out of the PGP source code. Source: https://medium.com/swlh/why-america-cant-regulate-bitcoin-8c77cee8d794

It’s as simple as that. Once the source code for PGP was printed in book form, it instantly and, more importantly, unambiguously, fell under the protection of the First Amendment. As a binary, the U.S. government ridiculously tried to assert that immaterial software is a device, and not text (software or “binaries” is text that can be run on devices). Clearly the idea that software is a device is patently absurd, but rather than waste money arguing this point in court, printing out PGP removed all doubt that a First Amendment act was taking place.

The printed source code was shipped to another country, perfectly legally and beyond challenge, and then transferred to a machine by OCR (Optical Character Recognition, a software tool that can turn a printed page into a text file, removing the need for a person to manually type out a printed page), resulting in a PGP executable that was legally exported from the United States.

The direct analogy to Bitcoin should be vividly clear to you now. PGP and Bitcoin are both:

  1. Pieces of software that can be rendered as printed text on paper
  2. Software that generates unique blocks of human readable text
  3. Designed to generate text that is 100 percent covered by the First Amendment

The purpose of PGP is to absolutely verify the identity of the sender of a message and ensure that the message was not read or changed in transit. The purpose of Bitcoin is to absolutely verify the ability of the owner of a cryptographic key (which is a block of text) that can unlock a ledger entry in the global Bitcoin network. Both of these pieces of software are messaging systems and services that absolutely fall under the First Amendment in every aspect, from the source code used to generate the software clients that do the message signing to the text the compiled clients generate, send, receive and process.

Bitcoin is text. Bitcoin is speech. It cannot be regulated in a free country like the U.S. with guaranteed inalienable rights and a First Amendment that explicitly excludes the act of publishing from government oversight.

Bitcoin and PGP generate messages that are initiated by their users. Each of the messages that are generated by these two pieces of software are unique. The only bodies of law that could possibly be invoked regarding their output and source code are copyright and patent law, respectively. The Bitcoin source is not copyrighted and the core idea of it is not patented, and, in any case, none of this has anything to do with the nature of Bitcoin messages, or your right to publish. Typewriters can include patented methods in their construction, and those patents have no bearing on your First Amendment right to publish what you create with a patented tool.

Copyright gives the generator of these texts privileges under the law imposing fines on someone copying your message without your permission, but copyright law has nothing to do with exporting, regulating or imposing a tax on the messages themselves, and of course, forbidding the copying of your Bitcoin payment message rather negates the purpose of using Bitcoin.

Taking all of this into account, if any legislator, regulator, three- or six-letter U.S. agency or other bureaucrat dares to try and regulate Bitcoin, they will be on a hiding to nothing. A legal challenge will be mounted, and will have to be mounted, because if the state can legislate against a single piece of software that generates messages, a legal precedent will be created allowing the U.S. government to regulate all software no matter what it does.

Bitcoin’s operation is fundamentally no different to what all email, text messaging and internet connected software does; relay messages. The only difference is in the software that tracks how the messages of the sender and recipient relate to each other. Email is no different to Bitcoin, save for the fact that a record of the sender and recipient and content of your email is not stored in a public ledger one against the other. We know it’s stored in a private database, but… that’s another story. Here is another example: The case of Bernstein vs Department of Justice created case law proving that this reasoning is correct.

Image for post
Source: https://www.eff.org/cases/bernstein-v-us-dept-justice 

In Bernstein v. US Department of Justice, it was established that code is speech and is protected by the First Amendment. This absolutely and unambiguously applies to Bitcoin, with eerie parallels to KYC/AML in Bitcoin. The unconstitutional ITAR requirements are exactly the same as asking Bitcoin traders to register as “money transmitters” and seek licenses before they can be paid to transmit text to the Bitcoin network for publication on the public ledger. The Ninth Circuit Court of Appeals found in Bernstein’s favor, and ruled that software was speech protected by the First Amendment and that the government’s regulations preventing its publication were unconstitutional. It is clear to see that Bitcoin falls squarely into the category of protected speech, there is no way around any of this, and the U.S. courts must come to the same conclusion for Bitcoin. Bitcoin is protected speech, and the case law says so explicitly.

The position that Bitcoin is money is fundamentally wrong, and systems like it have existed for many years without gaining the attention of any three-letter agencies. Take for example FarmVille, the massively popular farm simulation game on Facebook.

Image for post
Source: Wikipedia’s entry on FarmVille

This hugely popular game is no different to Bitcoin in nature. “FarmBucks” exist in a closed system, just as Bitcoin does. The only difference is the size of the space where the messages are being sent, and in the case of “FarmBucks,” the number of users and transactions (messages sent) was large. FarmVille had 83,760,000 monthly active users and not a single one was subjected to KYC/AML to exchange fiat for FarmBucks or FarmCash.

Why not?

What happened to that money? Why weren’t FinCEN or the SEC all over that game as they are on ICOs? No one can explain this adequately. This example is very useful as a tool to pull back the curtain on the people who assert that Bitcoin is a money and is fundamentally different to a money kept in a game. All the rationales they use (mostly in the form of word salad run on sentences) to explain the difference are inaccurate, and never address the fundamental processes; if they did, they would have no choice but to conclude that Bitcoin is no more subject to regulation than FarmBucks or PGP are.

The same logic and reasoning applies to Bitcoin exchanges. The Hollywood Stock Exchange, created by Max Keiser and Michael R. Burns was not subject to SEC rules or scrutiny. It dealt with an entirely artificial and fictional idea displayed in the paradigm of a stock market with all the graphs and interfaces associated with stocks, bonds and commodities.

The act of contextualising Hollywood actors and films in this manner did not suddenly make the Hollywood Stock Exchange into a real stock exchange and subject to all of the financial rules of a real stock exchange when it was created, but today, if software developers were to create the Hollywood Stock Exchange from scratch, you can be sure that someone in government would claim that it is a real stock exchange, and that all the rules that apply to the New York Stock Exchange apply equally to the Hollywood Stock Exchange, because both have the words “Stock Exchange” in their description. This is the root of the “reasoning” being used to claim that Bitcoin is money. It is deeply, fundamentally flawed and totally without merit.

Clearly, allowing legislation to touch Bitcoin means that any software of any kind will suddenly be liable to arbitrary and unconstitutional restriction. It will set a precedent that will be devastating to all software development in the U.S., and software is the means by which everything is run, communicated, exchanged and ordered in modern society. In fact, it is now impossible to run a modern society without software.

Twitter, for example, could find itself being regulated; it transmits messages that are no different in nature to the messages that Bitcoin transmits; the only difference being the publicly-maintained ledger and application of the messages. In fact, Twitter could turn itself into a Bitcoin company quite easily by adding a few fields to its message JSON schema to include a Bitcoin address for each of its users, adding a page to its client and running its own Bitcoin server pool. Would that extra text suddenly transform Twitter into a bank? Would that suddenly change the nature of each tweet that is sent on its network, and cause it to be a “money transmitter”? How is having a Bitcoin address integrated into your Twitter account different to making a promise by hand on Twitter to your followers or in a direct message?

Essentially, Bitcoin allows you to make written contracts with people without knowing them or signing paper; the network and software take care of identifying and fulfilling the promise, all with cryptographically-signed pieces of text. What the people calling for “BitLicenses” are asserting is that because Bitcoin right now has a particular use, it should be exempted from the basic law of the United States of America. That is completely insane, and will have unintended consequences that would be absolutely disastrous for the American economy since almost everything today is mediated by or touches software.

On the other hand, if the letter of the law is followed and Bitcoin is left to flourish and the market allowed to define the services, means of setting the value and resolving disputes, Bitcoin as an ecosystem will be extremely robust and widespread, just like the internet is today, after having grown for decades without any regulation or oversight from the state.

Furthermore, as I have said previously, the country that does not enact Bitcoin legislation will become the starting and endpoints of all Bitcoin transactions globally by first-mover advantage. All other jurisdictions will see Bitcoin passing through them untaxed, and there will be nothing they can do about it, as Bitcoin is an unassailable peer-to-peer network.

We have seen a similar phenomenon with the legal position of encryption in France. SSL was regulated in France until former managing director of the International Monetary Fund Dominique Strauss-Khan removed the restrictions. They knew that “French e-Commerce” would take place entirely inside “le pays Roosbeef” if it were not possible to secure French websites with SSL on demand without friction. American Bitcoin businesses (since the endpoints will be in their jurisdiction) will be taxed on their profits, and this will be a percentage of the trillions of global transactions made on the network for every conceivable and inconceivable purpose.

The same is true for any other country. The United States looks set to cripple itself by enacting “BitLicenses” — new, arcane, anti-American regulations declaring by fiat that Bitcoin is a currency, or a commodity or legal tender. As I described above, Bitcoin is none of those things by nature, and the myriad number of applications it can be put to is only just being discovered. Our consumer Bitcoin startup Azteco is but one of them, with the potential to reach the billions of unbanked, underbanked and first-world users globally, providing them with an easy way to access this new network, with a system that makes payment fraud impossible. The potential benefit to the unbanked and the websites that sell goods online and the jurisdictions where those websites operate is without precedent. Only a fool would do something that could harm the advent of this transformation, or shun this new technology and the business building on it.

No legislature will be able to keep up with the advances in software that are taking place; there are too many developers and efficient tools in the wild all over the world, all with equal access to the market. The best the State can possibly hope for is to tax new businesses that use the new tools as they emerge, and encourage entrepreneurs to incorporate in their jurisdictions. If America wants to drive away Bitcoin developers, exchanges and new businesses, there will be unintended, very predictable and disastrous consequences. There are many other places in the world with fast internet pipes where the government is not so backward. Skype was founded in Estonia, not Silicon Valley, and this is for a reason. Some of the biggest Bitcoin exchanges are outside of the U.S. There is a reason for that. No one wanting to start a Bitcoin business is planning to move to New York from anywhere, because they know that their business models will immediately come under attack.

For those of you who are frightened of a free market in Bitcoin, rest assured, all the laws that currently exist to do with fraud, theft, misrepresentation and everything else, continue to apply to all people and corporations who use Bitcoin. Bitcoin does not make laws or your personal or corporate or moral obligations moot. When you deal with a company, you retain access to the law and recourse to it. When someone makes a promise to sell you goods with bitcoin, that promise is not nullified because you are paying with bitcoin. Good Bitcoin businesses will build dispute resolution systems the way that eBay and Amazon have, so that you never have to go to court to obtain justice if there is a problem. In the online world, reputation is everything, and bad reputations can destroy your business credibility and customer base over night. This is a far more powerful incentive to behave correctly and fulfil promises, which most people do by default in any case, rather than some arbitrary and absurd “BitLicense.”

All the “BitLicenses” in the world could not stop Mt. Gox from having a software problem, and no law can bring back the money lost either directly or through the disruption the event caused by the software error. Once again, entrepreneurs powered by the internet make life easier and better, not laws and regulations. Regulation does not make software correct; developers do.

I have one recommendation for anyone advocating that there should be a nationwide “BitLicense” in the United States of America. Don’t waste everyone’s time, money and resources proposing this anti-American idea. The EFF has better things to do with its time than teach you the PGP “Munitions Case” lesson all over again. If it goes to court, your side will lose, and as a consequence, America will lose its headstart as all Bitcoin entrepreneurs flee the U.S. for environments that will allow them to innovate, grow and prosper.

And what can the business people who want a “BitLicense” forced on the software industry say? That they don’t trust themselves? That’s patently absurd. That they do not trust their competitors? If it’s the case that their competitors are bad actors, then the good actors have a market advantage, and remember; a license cannot protect the public from fraud or provide any guarantee of any kind, it can only distort the market.

What these “BitLicense” advocates actually want is a guaranteed market advantage. They are Crony Capitalists. They want to prevent the emergence of a “Golden BB” entrepreneur that might destroy their business. They want to slow down and stifle innovation, so that they can become the entrenched and unassailable gatekeepers. They want to bar new entrants to the market. It simply will not work. And it’s unAmerican.

The American legislature must let the American dream flourish and extend its power to Bitcoin, or it will be compelled by the court to obey the law, and this has started to happen. Two judges in the U.S. have now found that Bitcoin is not money, and have thrown out “money laundering” charges against two men:

“U.S. Magistrate Judge Hugh B. Scott ruled in a money laundering case in Buffalo, N.Y. that bitcoin is more like a commodity and is not a form of currency, according to a local news report.

He recommended the money laundering charge be dropped against the defendant since bitcoin isn’t money.

In another money laundering case last year, Miami-Dade Circuit Judge Teresa Mary Pooler stated it is very clear, even to someone with limited knowledge in the area, that bitcoin has a long way to go before it is the equivalent of money.”

Archive

Bitcoin is not money. KYC/AML should not apply to it at all. The Hugh B. Scott ruling is highly significant, because it directly contradicts the idea of BitLicence. And lest there be any doubt, all of this, including legal remedies for breach of promise, applies to “ICOs,” which are also nothing more than text stored in a database. The fact that they are called, “Initial Coin Offerings” is irrelevant to the underlying processes, and it is not illegal to parrot the language and terms of finance, which are not trademarked or copyrighted. The Hollywood Stock Exchange wasn’t deceptive because it called itself a “stock exchange.” Opponents of Bitcoin and ICOs have no good arguments, and the threadbare pretexts for regulation they’re able to synthesize are as flimsy as fiat.

No matter what anyone wants, Bitcoin is here to stay. All the lies that were told about it over the last 11 years have been demolished, and Bitcoin is now as familiar and mundane as Coca Cola. The phase we are in now is the beginning of the Consumer Bitcoin era, where new tools and services like Azteco bring this fantastic and overwhelmingly beneficial computer network to ordinary people through an easy-to-understand interface. This era, which we call “The Transformation” can happen in the United States of America spreading outwards, or it can happen outside of the United States of America and be adopted by the entire world. The GSM mobile phone standard  and network beat the American CDMA standard and became the way phones work worldwide. The same thing has happened with Bitcoin. The only question now is whether the “Silicon Valley of Bitcoin” is in Hong Kong or Houston.

This is a guest post by Akin Fernandez. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc. or Bitcoin Magazine.

The post 2020: Year 11 Of “The Transformation” appeared first on Bitcoin Magazine.

Filed Under: Bitcoin Magazine, Constitution, English, First Amendment, PGP, Regulation

Sources Say World’s Largest Darknet Empire Market Exit Scammed, $30 Million in Bitcoin Stolen

26/08/2020 by Idelto Editor

One of the world’s largest darknet markets (DNM), Empire Market, allegedly exit scammed after the marketplace was taken offline for a number of days this week. DNM patrons are upset about Empire Market’s departure and customers say that $30 million in bitcoin held by the darknet’s admins has been stolen.

Three days ago news.Bitcoin.com reported on the Empire Market’s recent downtime, as our report had shown the DNM was offline for more than 36 hours. At the time, much of the blame was cast at a distributed denial-of-service (DDoS) attack. However, as time continued to unwind; customers, vendors, and DNM researchers started discussing “exit scam” theories more regularly.

An exit scam is when the moderators of a darknet marketplace suddenly shut the operation down with no warning, and users and vendor funds are stolen. For instance, at times vendors pay a deposit in order to list wares on specific DNMs and customers also keep funds in the DNMs wallets and in escrow systems during exchanges.

Exit scams in the past have allowed DNM moderators to walk away with millions in bitcoin by suddenly shutting down the operation and going offline.

It is assumed as of right now that Empire Market has officially exit scammed, as discussions about the downed DNM are all over forums and social media on Wednesday. The Twitter account @Darkdotfail or Dark.fail explained early Wednesday morning (ET) that the DNM is gone, ending a long “golden age” of trust.

“Empire, the largest darknet cryptomarket is gone. With no explanation from its admins and no announcement from law enforcement, this looks like a devastating exit scam,” Dark.fail tweeted. “The darknet was in a golden age of trust. Expect a rough year of exit scams ahead as trust is rediscovered.”

Dark.fail’s thread continues by adding that the massive DNM was launched in January 2018 after the fall of the infamous Alphabay marketplace. Empire Market quickly grew to 1.3 million users in a matter of no time.

Dark.fail’s Twitter thread estimates that Empire staff members may have gotten away with around $30 million from the exit scam. “A staff member estimates under the condition of anonymity that the admins profited 2,638 BTC, $30 million USD,” the researcher notes.

Empire Market has been down since it went offline on August 22, 2020, which is a total of four consecutive days. Reports say that even though the DNM operators have stolen around 2,638 BTC, onchain funds stemming from the DNM have not moved yet.

On the Reddit forum r/darknet a great number of the 128,000 subscribers are talking about the incident. Some posts assume that the Empire Market “money is gone” and people have been checking the BTC addresses they leveraged while using the marketplace.

Individuals are also discussing how much they lost from Empire Market’s sudden departure. Some Empire users claim to have lost just a few dollars, others lost hundreds, and a few people said the moderators got a few thousand from their purses.

“$5.5k in escrow [right now] for me,” said one Empire patron. [Two] orders arrived yesterday, $500, and $350 (couldn’t finalize em though).”

On the DNM forum called Dread, a known Empire staff member named “Se7en” said the marketplace was indeed down but he doesn’t believe it was an exit scam. Although many DNM insiders do not believe Se7en’s story and some have insisted that “Se7en deleted his Dread account.”

The researcher Dark.fail has also been discussing the character called Se7en as well. Dark.fail’s recent Twitter thread highlights that “eight major sites exit scammed in 2019 after Wall Street Market’s seizure, yet Empire remained trustworthy.”

The Twitter account and a number of Empire fans on the Reddit forum r/darknet also said a lot of people assumed Empire Market would be different. “Launched ‘in the memory of Alexandre Cazes’ – the alleged AlphaBay admin who committed suicide – many believed that Empire was not operating out of greed, but to continue AlphaBay’s movement,” Dark.fail added.

The Twitter account and DNM analyst further stated:

What really caused this sudden disappearance with everyone’s money? We may never know.

What do you think about the possible demise of the DNM Empire Market? Let us know what you think about this subject in the comments section below.

The post Sources Say World’s Largest Darknet Empire Market Exit Scammed, $30 Million in Bitcoin Stolen appeared first on Bitcoin News.

Filed Under: @Darkdotfail, /r/darknet, Bitcoin, cryptocurrency, darknet market, DDoS, DDoS attack, DNM, downtime, Dread Forum, Email, Empire, empire market, Empire Mods, English, Hydra, Messages, Monero, News, News Bitcoin, PGP, Reddit, Russia’s Hydra, Se7en, Staff Members, subReddit

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Primary Sidebar

Archives

Recents articles

  • Indian Regulator SEBI Proposes Banning Public Figures From Endorsing Crypto Products
  • Iran Blocks 9,200 Bank Accounts Over Suspicious Foreign Currency, Crypto Transactions
  • Former Fed Chair Bernanke: Bitcoin Is Mainly Used in Underground Economy for Illicit Activities
  • Five Stalls That Caught My Attention At Bitcoin 2022’s Bitcoin Bazaar
  • How Bitcoin Should Be Upgraded In The Future
  • Grayscale Launches European ETF While Urging SEC to Approve GBTC Conversion Into Spot Bitcoin ETF
  • China Backed Publication: Terra LUNA Crash Vindicates Country’s Ban on Crypto-Related Activities
  • Bitcoin Songsheet: Wind And Solar Are The Altcoins Of Energy

© 2022 · Idelto · Site design ONVA ONLINE

Posting....