Still working to recover. Please don't edit quite yet.
Difference between revisions of "Crypto Anarchy Principle"
From Anarchopedia
m (paragraph moved to crypto-anarchism, it wasn't specifically about the crypto anarchy principle; added a reference) |
|||
Line 1: | Line 1: | ||
{{stub-1}} | {{stub-1}} | ||
− | The '''Crypto Anarchy Principle''' declares that strong cryptography can create zones in which only voluntary interactions are possible. | + | The '''Crypto Anarchy Principle''' declares that strong cryptography can create zones in which only voluntary interactions are possible.<ref>[http://koeln.ccc.de/archiv/cyphernomicon/chapter4/4.11.html Cyphernomicon: The Crypto Anarchy Principle]</ref> |
− | + | ||
− | + | ||
Example: [[public key cryptography]] and [[steganography]] allows one to create [[identities]] that are fully verifiable, yet [[pseudonymous]] and invisible to uninvited parties. | Example: [[public key cryptography]] and [[steganography]] allows one to create [[identities]] that are fully verifiable, yet [[pseudonymous]] and invisible to uninvited parties. | ||
See also: [[cypherpunks]], [[Cyphernomicon]], [[temporary autonomous zone]], [[voluntaryism]]. | See also: [[cypherpunks]], [[Cyphernomicon]], [[temporary autonomous zone]], [[voluntaryism]]. | ||
+ | |||
+ | ===References=== | ||
+ | |||
+ | <references/> | ||
[[Category:Ideas]] | [[Category:Ideas]] | ||
[[Category:Crypto-anarchism]] | [[Category:Crypto-anarchism]] |
Revision as of 15:13, 26 September 2008
You can help Anarchopedia by expanding this article |
The Crypto Anarchy Principle declares that strong cryptography can create zones in which only voluntary interactions are possible.[1]
Example: public key cryptography and steganography allows one to create identities that are fully verifiable, yet pseudonymous and invisible to uninvited parties.
See also: cypherpunks, Cyphernomicon, temporary autonomous zone, voluntaryism.