#cypherpunk
22 items · 22 articles
Articles
The Frequency of Dissent
Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.
Your Software Runs on Enemy Infrastructure
Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.
When They Come for the Protocols
Governments cannot kill open protocols, so they imprison the humans who write them, spending $275 billion per year to catch nothing.
A Constitution for the Ungoverned
Medieval merchants and diaspora communities built functional legal systems without states; their principles can now govern disputes in cyberspace.
The Algebra of Trust
Anonymous commerce requires solving the trust problem, and the solution may be to treat trust itself as a quantifiable, tradeable commodity.
Strategic Intelligence for Freedom-Builders: Paul Rosenberg's Quarterly Newsletter
Rosenberg predicted Bitcoin in fiction seven years early. His quarterly newsletter delivers strategic intelligence for freedom-builders, not commentary for readers.
The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy
The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.
The Praxeology of Privacy ~ Chapter 20: Implementation Strategy
Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.
The Praxeology of Privacy ~ Chapter 15: Bitcoin: Resistance Money
Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.
The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations
Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.
The Praxeology of Privacy ~ Chapter 12: The Crypto Wars
The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.
The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction
Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.
The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance
The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.
The Praxeology of Privacy ~ Chapter 2: Two Traditions, One Conclusion
Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.
The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy
Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.
The Praxeology of Privacy ~ Preface
Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.
Seven Resolutions
Freedom requires commitment, not sentiment. Seven resolutions define the ethical foundation for those who would build a voluntary society instead of complaining.
The Quiet Departure
The loudest revolutions fail; the quiet ones succeed. We do not protest or petition. We build alternatives and simply leave.
Builders, Not Talkers
Decades of libertarian theory and cypherpunk tools have produced almost nothing because ideas without builders are worthless. Act or leave us alone.
No Papers Required: How Zapstore Breaks the App Store Checkpoint
Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.
The Cypher Wars: Choose Your Weapon Wisely
Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.
Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation
A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.