CYPHERNOMICON

In 1994, Timothy May , one of the leading thinkers of the cypherpunk movement , wrote the Cyphernomicon , a lengthy document that compiled and structured fundamental ideas about privacy, cryptography , anonymity, cryptoanarchism , and the impact of technology on individual freedom. This text, which takes the form of a kind of FAQ (frequently asked questions), became an obligatory reference for those seeking to understand the principles of cryptoanarchism and the importance of cryptographic tools in defending privacy.

It is a key document in the history of the cypherpunk movement and serves as a sort of manifesto and FAQ for cypherpunks of the time.

Tim May envisioned a future in which cryptography would serve as a weapon for individual liberation. He believed that the combination of distributed networks, strong encryption, and digital signatures would render many of the traditional mechanisms of state and corporate control obsolete. His vision was based on the premise that information, once digitized and encrypted, is virtually impossible to censor or control.

In many ways, his prediction has come true with the proliferation of technologies such as Bitcoin, Tor, and decentralized information-sharing networks. However, new challenges have also emerged, such as mass surveillance, cryptocurrency regulation, and the increasing ability of governments to track digital activities.

The cypherpunk movement inspired technologies that are now part of the digital fabric of society, from cryptocurrencies to encrypted messaging systems.

Her legacy lives on in the communities of developers, activists, and technologists working to build a future where cryptography is a tool of empowerment, not oppression.

Here is a breakdown of its parts and direct links to these sections:

CYPHERNOMICON

1) Introduction

This introduction sets the framework for the document, detailing important aspects such as copyright, the motivations behind its creation, and the intended audience. It also includes sections on style and the need for corrections, reflecting the collaborative nature and rapid evolution of the field of cryptography and cryptographic policy. 

2)MFAQ – Frequently Asked Questions

This section is organized as a list of frequently asked questions (MFAQ) on crucial topics. The topics cover a broad spectrum, from cryptography and anonymity (via remailers) to legal implications of these technologies and concepts such as digital money and cryptoanarchy. Its purpose seems to be to provide an introduction and concise answers to the most common questions on these privacy and technology-related topics.

3)Cypherpunks: history, organization and agenda

Provides an overview of the Cypherpunk movement. This text explores the history, organizational structure, and goals of this activist group. The beliefs and agenda that drive the Cypherpunks are examined, along with how they self-organize and communicate through mailing lists. In essence, the document serves as an introduction to the Cypherpunks and their fight for privacy and freedom in the digital age.

4)Objectives and ideology: privacy, freedom and new approaches

The document emphasizes privacy, freedom, and the pursuit of new technological approaches, with sections devoted to topics such as technological empowerment, freedom of speech, privacy, education, libertarianism, and cryptoanarchy. This index reveals the purpose of the text: to define the fundamental principles that drive the Cypherpunks in their quest for a freer and more private world, emphasizing code writing and cryptography as tools to achieve these goals.

5)Cryptology

This is a section within a larger work that explores the field of cryptology in depth. It covers everything from the basics and concepts of cryptography to the technical and mathematical aspects involved. It also includes information on cryptographic programs and products, as well as practical considerations and the DES algorithm, culminating in methods for breaking ciphers and other related topics.

6)The need for strong cryptocurrencies

It explores the fundamental importance of strong cryptography in various aspects of society. It is divided into sections that examine general applications and specific reasons for using cryptography, including the protection of corporate and financial privacy, digital signatures, and political uses. Additionally, it argues that cryptography is essential for the security of operating systems and networks, especially in response to worrying trends that threaten privacy and freedom.

7) PGP: very good privacy

This section focuses on  PGP (Pretty Good Privacy), a widely used cryptography program. The text ranges from an introduction to PGP and its importance to instructions on how to use it, including aspects such as key management, key servers, and complementary tools. It also addresses legal issues, potential problems, and the future of PGP, providing a comprehensive overview of the program.

8) Anonymity, digital mix-ins and remailers

It explores in depth the concept of anonymity in the digital realm. It focuses on the use of remailers and digital mixins as tools to achieve untraceable email and anonymous message sending. In addition, the text examines the legal implications, methods of cryptanalysis of remailer networks and future possibilities in this field, also addressing the problem of “Dining Cryptographers” and other related topics.

9) Policy: Clipper, Key Escrow and digital telephony

Addresses the intersection between government policy and the use of cryptography. Explores the motivations behind cryptography laws, including control of cyberspace and national security, as well as the implications of technologies such as Clipper and the concept of key escrow. Analyzes technical, political, and legal issues related to key escrow encryption, including privacy concerns and opposition to these policies.

10) Legal issues

It covers a wide range of legal issues related to cryptography and digital technologies. It explores the fundamental legality of encryption, considering whether it could be banned and the specific legal challenges associated with tools such as PGP and remailers. It also analyses the legal implications of digital currencies, digital banks, restrictions on the export of cryptography, and interactions with freedom of expression, pornography and local laws, pointing out the legal complexity surrounding the use and regulation of cryptography in the digital age.

11) Surveillance, privacy and intelligence agencies

It explores government surveillance, privacy, and intelligence agencies in depth. It is structured into several sections that examine everything from US intelligence agencies (NSA, CIA, FBI, etc.) to surveillance methods and their targets. In addition, the paper addresses topics such as privacy laws, national identification systems, the impact of surveillance on the development of cryptography, and other aspects related to the protection of information in the digital age. Its purpose is to analyze the delicate balance between security and individual freedom, highlighting the implications of mass surveillance.

12) Digital money and online commerce

It covers in depth the concept of digital money and its application in online commerce. It ranges from the fundamentals of money to specific digital systems such as DigiCash, discussing topics such as double-spending prevention and legal considerations. It also examines the future of digital money,  cypherpunks ’ experiments  with the concept, and the implications of a cashless society, offering a comprehensive overview of the opportunities and challenges presented by this emerging technology.

13) Activism and Projects

This section deals with the application of cypherpunk thinking and tools to political and social activism. It examines the challenges inherent to activism, the specific projects of cypherpunks, and the responses (including attacks) to their initiatives. It also addresses the implementation of cryptography in the political sphere, the increasing polarization of the political landscape, and strategies to encourage widespread adoption of cryptography.

14) Other advanced cryptographic applications

It focuses on advanced applications of cryptography beyond the basics. The paper explores various innovative techniques and uses, from digital time stamping and electronic voting to methods for hiding information and protecting whistleblowers. Topics such as traffic analysis, steganography, and tamper-resistant modules are listed. In summary, the section seeks to illustrate the versatility of cryptography in addressing complex problems related to privacy, security, and freedom of expression.

15) Reputations and credentials

This paper discusses reputation and credential systems in the context of cryptography and online communities. The paper discusses the nature of reputations, how they relate to institutions, and how they function in open agora systems. It also delves into practical aspects such as concrete examples, fraud, and false accusations, offering a comprehensive overview of the challenges and opportunities presented by these systems. In summary, this chapter of the Cyphernomicon examines how trust and reputation can be established and maintained in decentralized digital environments.

16) Cryptographic anarchy

The paper discusses the concept of  cryptoanarchy , a social system where strong cryptography allows for anonymity and security in interactions, challenging traditional power structures. The paper discusses the implications of cryptoanarchy in areas such as freedom of speech, black markets, intellectual property, and the potential collapse of the state. It examines both the practical problems and ethical considerations associated with this model, even contemplating the possibility of private law-making institutions. In essence, the paper acts as a manifesto and comprehensive analysis of a radically decentralized, technology-driven vision of the future.

17) The future

It focuses on various aspects of the impact of cryptography on the future. This paper is structured around a number of topics ranging from the need for progress in the cryptographic field to the possible directions the development of the technology could take, to the social impact of strong cryptography. It also considers extreme scenarios such as a potential “Crypto Armageddon”, while analysing the complexity, standards and research needed for the future of cryptography. In essence, the text offers a broad and speculative view of how cryptography could shape the society and technology of tomorrow.

18) Loose ends and miscellaneous issues

This part of the work addresses a variety of topics related to cryptography that do not fit into broader categories. Topics ranging from quantum and chaotic cryptography to the use of neural networks and artificial intelligence in the field are explored, even considering implications such as viruses, physical security, and the possibility of attacking governments. In essence, this section functions as a compendium of advanced ideas and reflections on the impact of cryptography on various aspects of society and technology.

19) Appendices

Describes the content of the appendices to the main document. These appendices serve as a supplementary reference, providing crucial additional information. Included are glossaries, lists of relevant websites, references, and a summary of the different cryptographic versions mentioned in the main text. Tim May organizes these materials to provide a comprehensive and accessible overview to the reader.

20) README

This file is an introductory guide covering topics such as copyright, the writing style employed, and methods for finding relevant information within the document. Additionally, it includes the author’s views and a more detailed disclaimer. The author mentions the decision to publish the material before the expiration of the RSA patents, suggesting a connection with cryptography and freedom of information.

Here you can access an HTML version of Tim May’s Cyphernomicon by
Jonathan Rochkind

A plain text version: https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

Wikipedia page about Tim May