Articles

The Missing Credit Layer

The Missing Credit Layer

The parallel economy has sound money and encrypted communication but still lacks the credit layer needed to finance production across time.

The Capital Structure of War

The Capital Structure of War

Cheap drones expose the state's war machine: centralized militaries accumulate fragile capital while decentralized force converts low-cost tools into strategic advantage.

The Third Court: Insurance, Arbitration, and the Private Production of Justice

The Third Court: Insurance, Arbitration, and the Private Production of Justice

Insurance prices risk, arbitration resolves disputes, restitution makes victims whole, and cryptographic enforcement binds them all into one complete system.

The Machine Cannot Want Your Job

The Machine Cannot Want Your Job

Smart machines relocate comparative advantage; the weaker worker keeps value only where human judgment, ownership, and presence still command a premium.

The Market for Peace

The Market for Peace

War persists because profits concentrate among those who wage it while costs disperse across those who must suffer and pay.

The Price of Blood

The Price of Blood

Every civilization before the modern state treated crime as a debt owed to the victim, enforced through restitution and community insurance.

The Merchant Court Returns

The Merchant Court Returns

Justice is a service that degrades under monopoly and improves under competition. Merchants proved this; now builders are proving it again.

Self-Liquidating Credit: The Instrument That Destroys Itself

Self-Liquidating Credit: The Instrument That Destroys Itself

Bills of exchange carried a built-in death date and extinguished themselves as goods reached market; modern debt compounds forever by design.

The Engine of Prosperity: How Four Sources Drive All Economic Progress

The Engine of Prosperity: How Four Sources Drive All Economic Progress

Four sources of economic progress form an interdependent system that emerges spontaneously from voluntary exchange when property rights remain completely intact.

The Anatomy of Aggression

The Anatomy of Aggression

Rothbard's typology classifies all state intervention into autistic, binary, and triangular forms, revealing the common thread of coercive aggression beneath policy complexity.

Another round of patience

Another round of patience

Time preference reveals through lending at interest rates. Hoarding refuses all rates, demanding present possession. Expected gains are speculation, not deferral.

The Root of Money

The Root of Money

Money is neither vice nor virtue but the material expression of human judgment exercised through time. Only parasites hate it.

The Consumption You Call Saving

The Consumption You Call Saving

Holding money does not defer gratification but consumes the opportunity cost of lending, making hoarding a present expense rather than proof of low time preference.

The Price of Patience

The Price of Patience

Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.

The Price of Patience

The Price of Patience

Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.

The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy

The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy

The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.

The Praxeology of Privacy ~ Chapter 20: Implementation Strategy

The Praxeology of Privacy ~ Chapter 20: Implementation Strategy

Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.

The Praxeology of Privacy ~ Chapter 19: Operational Security

The Praxeology of Privacy ~ Chapter 19: Operational Security

Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.

The Praxeology of Privacy ~ Chapter 18: Lessons from History

The Praxeology of Privacy ~ Chapter 18: Lessons from History

DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives.

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.

The Praxeology of Privacy ~ Chapter 16: Zero-Knowledge Proofs

The Praxeology of Privacy ~ Chapter 16: Zero-Knowledge Proofs

Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.

The Praxeology of Privacy ~ Chapter 15: Bitcoin: Resistance Money

The Praxeology of Privacy ~ Chapter 15: Bitcoin: Resistance Money

Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.

The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations

The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations

Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.

The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction

The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction

Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.

The Praxeology of Privacy ~ Chapter 10: Financial Surveillance and State Control

The Praxeology of Privacy ~ Chapter 10: Financial Surveillance and State Control

Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.

The Praxeology of Privacy ~ Chapter 9: Monetary Theory and Sound Money

The Praxeology of Privacy ~ Chapter 9: Monetary Theory and Sound Money

Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools.

The Praxeology of Privacy ~ Chapter 8: Capital Theory and Entrepreneurship

The Praxeology of Privacy ~ Chapter 8: Capital Theory and Entrepreneurship

Privacy infrastructure is capital requiring present sacrifice for future capability. Entrepreneurial discovery drives innovation. Markets coordinate heterogeneous privacy tools most effectively.

The Praxeology of Privacy ~ Chapter 7: Exchange Theory and Privacy

The Praxeology of Privacy ~ Chapter 7: Exchange Theory and Privacy

Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.

The Praxeology of Privacy ~ Chapter 6: Information, Scarcity, and Property

The Praxeology of Privacy ~ Chapter 6: Information, Scarcity, and Property

Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property.

The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance

The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance

The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.

The Praxeology of Privacy ~ Chapter 4: The Argumentation Axiom and Self-Ownership

The Praxeology of Privacy ~ Chapter 4: The Argumentation Axiom and Self-Ownership

Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership.

The Praxeology of Privacy ~ Chapter 3: The Action Axiom: Privacy as Structural Feature

The Praxeology of Privacy ~ Chapter 3: The Action Axiom: Privacy as Structural Feature

The Action Axiom proves privacy is structural to human action. Deliberation is internal; preferences are subjective; information asymmetry is inherent.

The Praxeology of Privacy ~ Chapter 2: Two Traditions, One Conclusion

The Praxeology of Privacy ~ Chapter 2: Two Traditions, One Conclusion

Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.

The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy

The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy

Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.

The Praxeology of Privacy ~ Preface

The Praxeology of Privacy ~ Preface

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.

Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation

A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.