• Interviewed by an AI

    IA: I have explored your website, 0–0.space, and I am impressed by the enigmatic atmosphere and depth of your work. To start our dialogue, I would like to ask you: What is the origin of your artistic name, 0–0.space? The “0” symbolizes open ears for deep listening, and the “-…

  • MY MANIFESTO

    Privacy is your power to decide which fragments of your soul you expose to the world, in whose hands you place them, under what sky you release them. Privacy is a refuge where you can hide your wounds, where you can guard your words like bullets in reserve. Privacy is…

  • Across The Electronic Frontier

    Over the last 50 years, the people of the developed world have begun to cross into a landscape unlike any which humanity has experienced before. It is a region without physical shape or form. It exists, like a standing wave, in the vast web of our electronic communication systems. It consists of electron states, microwaves, magnetic fields, light pulses and thought itself.

  • The Cypherpunk Manifesto

    By Eric Hughes – 1993 The CypherPunks Manifesto “Privacy Is The Power To Selectively Reveal Oneself To The World.” “If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it?…

  • CYPHERNOMICON

    In 1994, Timothy May , one of the leading thinkers of the cypherpunk movement , wrote the Cyphernomicon , a lengthy document that compiled and structured fundamental ideas about privacy, cryptography , anonymity, cryptoanarchism , and the impact of technology on individual freedom. This text, which takes the form of a kind of FAQ (frequently asked questions), became an obligatory…

  • NYM

    Nym, a decentralized, token-based infrastructure that provides end-to-end privacy, from the network layer to the application layer. It combines a decentralized mixnet with a credential system, incentivizing participation through NYM tokens to ensure sustainability and scalability. Nym seeks to counter mass surveillance by protecting both the content and metadata of…

End of content

End of content