Skip to main content

WTF Crypto-Anarchy??

Crypto-anarchism is a political ideology that advocates the use of cryptography and other technologies to protect individual privacy, freedom, and autonomy from state interference. Crypto-anarchists believe that by encrypting their communications and transactions, we can create a decentralized and voluntary society that is immune to censorship, surveillance, and taxation. The term crypto-anarchism was coined by Timothy C. May in his 1988 "Crypto Anarchist Manifesto", where he declared: "Crypto Anarchy is the cyberspatial realization of anarchism, transcending national boundaries and freeing individuals to make the economic arrangements they wish, consensually." May was one of the founders of the cypherpunk movement, a group of activists and hackers who promoted the use of cryptography and digital currencies to challenge the authority of governments and corporations. The cypherpunks were influenced by libertarian and anarchist thinkers such as Murray Rothbard, David

Operational Security: A Counter-Economic Guide





*Note: For legal reasons, this article is for educational purposes only*


Operational security is a key aspect of counter-economics. In fact, its the only element common to all counter-economic operations.

As such, it's a shame opsec isn't discussed more often. The reluctance to lay the issue out bare may be due to either a naivety surrounding the topic, or an unwillingness of agorists to embrace their black market roots. But remember Laertes, to thine own self be true!

As agorists, it's incumbent upon us to lay out a guide for operational security that newcomers can use to engage with the counter-economy in a simple, safe & secure manner. This is a first attempt at such a guide. The New Libertarian will be updating this piece from time to time as technology continues to progress.

Feel free to jump to any section that suits your needs.





I. KYC

II. Coin Mixers & Privacy Coins

III. E2EE

IV. Password Protection

V. Tor

VI. VPN


I. KYC

In the past, if two individuals wished to conduct a transaction who weren’t face to face, they required a trusted third party, such as Visa or a bank to verify both the transmission & receipt of funds.

During the age of private banking, there was a competitive market for this service & things functioned rather efficiently. As the market for this service became cartelized however, these third parties came to represent centralized points of failure.

Now, any malevolent actor seeking to censor or block your transactions only has to strong arm these firms. If they refuse to process your transaction, well, too bad for you!

The mechanism which these malevolent actors - aka politicians - use to accomplish this, are Know Your Customer laws, or KYC for short. This is why individuals have to provide a driver's license or state ID to open a financial account. By connecting your identity to PayPal or a bank, authorities can successfully monitor your transactions & block them as they see fit.

This changed on October 31, 2008.



Now, with the advent of Bitcoin, individuals who are not face to face can securely transact without the need for a third party intermediary. This is done by relying on a decentralized network of miners rather than one centralized firm. Thus, by choosing to use cryptocurrency rather than fiat, individuals no longer subject themselves to the KYC identity verification process.

This is the first & most basic step to achieving operational security.

II. Coin Mixers & Privacy Coins

Bitcoin transactions are preferable to fiat transactions because although the latter can be traced directly back to you, the former can only be linked to a pseudonymous Bitcoin wallet address. In the early days - the Wild West of Bitcoin - this was sufficient protection. Countless voluntary exchanges successfully occurred on the Silk Road securely cloaked in the pseudonymity of Bitcoin. But pseudonymity isn’t anonymity & nowadays, Bitcoin transactions are subject to more advanced blockchain analytics.

This means that if the feds reallllly wanted to link you to a Bitcoin transaction, they may be able to. There are several solutions to this.

Users of BTC and BCH can & should be using coin shuffling services. Check out this article to review some of the top coin mixers available.

Nevertheless, until coin mixing is integrated directly into wallets, or is in some other way more streamlined into the user experience, shuffling continues to represent an inconvenient, additional step. To remove this step, use a privacy coin.



Monero is your best option. Monero uses cryptographic tools like ring signatures to conceal the sender’s identity, stealth addresses to conceal recipients, & Ring Confidential Transactions (RCT) to hide the transaction amount. All of this means Monero transactions are private by default. For more on privacy coins, see this previous TNL article.

With your financial transactions now safeguarded, it’s time to think about communications.

III. E2EE

I truly can’t stress this enough: all counter-economic communication should use end-to-end encryption. You have several options, but at the end of the day, your best bet is Signal.

All messages on Signal use E2EE by default & thus there’s little to worry about. The only drawback is that you’ll be asked to provide a telephone number during the signup process. A quick workaround, is to pick up a cheap burner phone available from any convenience store. For all intents & purposes, it’s best not to use a local convenience store.

Other messaging services that use E2EE include Telegram & even iMessages. Text messages from one iPhone to another are secure, but if either user is backing up their messages to iCloud, there will be a record. Telegram’s secret chats use E2EE & are a great option. It’s important to understand however, that normal Telegram messages & channels DO NOT use E2EE & thus are inadvisable for counter-economic purposes.

To incorporate encryption with email, use protonmail. All emails from one protonmail address to another use E2EE. Messages to and from accounts outside protonmail use other, lesser forms of encryption, but encryption nonetheless.


IV. Password Protection

How inconvenient is having to remember a different password for each of your online accounts? It makes matters worse when each account has different requirements - add a symbol here, capital letter there, don’t forget a number!

Forget about being inconvenient, it’s also insecure. Most people wind up using simple words they can remember & many even use one password across multiple accounts. This leaves you vulnerable to brute force attacks.

SoloKeys, is an open-source FIDO2 USB Key
Gradually, this old & inefficient style of online password security is being replaced with the use of FIDO2 USB hardware authenticators.  These security keys use fingerprints, facial recognition, button pushes, or virtually any other trigger, to grant or deny access to your online accounts.

Since these devices grant access to so many accounts, it’s important they stay secure. The best way of doing this is by using DiceKeys. For more on DiceKeys check out the video below.


V. Tor

Tor is a network that can be accessed through a special browser. Tor protects both the operators & users of .onion sites by securing data moving through the network. However, recent vulnerabilities have allowed bad actors to steal Bitcoin transactions, and thus, TNL doesn’t recommend using Tor for counter-economic transactions until the issue is resolved. For more on Tor, check out this episode of the Techno-Agorist podcast.



VI. VPN

VPNs are a crucial component of operational security in the Agora. A counter-economic deal negotiated over E2EE and settled in Monero is a wasted effort if the IP traces back to your home address.



After consulting fellow agorists and cypherpunks & reviewing the technology ourselves, The New Libertarian is comfortable recommending vypyrVPN. Find out more about them here.

Conclusion

Operational security is a key aspect of counter-economics. As such, agorists need to provide a clear pathway for newcomers to operate securely & effectively. This is a first attempt, which I hope will inspire other, more capable agorists of building on.

Share your ideas in the comments below!




Comments

Popular posts from this blog

The Economics of BTC Maximalism

BTC maximalism is a flawed doctrine, fallacious in numerous respects.  First, if you'd prefer to hear these arguments in audio, check out this recent episode of ABNP , where @mrpseu & I discused these same topics.  Also, a qualifier: I'm not capable of making, defending or refuting technical arguments. I'll leave that aspect of the debate to others. My concerns with BTC maximalism are entirely economic and can be divided into four areas.  Based on the criteria for saleability as laid out by the austrian school, BTC is not the most marketable digital commodity. A lack of portability relative to other cryptocurrencies implies BTC isn't as sound of a commodity.  Value storage is a secondary function of money and cannot satisfy the use-value requirement of regression theorem.  BTC maximalism lays waste to the Hayekian notion of competition as a discovery procedure. This final point was addressed in detail on episode 50 of The Agora, Crypto-Economics

Weathering With You: An Agorist Perspective

If someone asked you what your favorite emotion was, how do you think you’d answer? For many people, I suspect they would answer “Happiness”, “Joy'', or some variant of exclusively positive emotion. Someone may think more meticulously and answer with “Contentment”, which while a positive emotion has a lot of nuance attached to it. However my answer to that question is what I feel others would consider more orthodox: Bittersweet. Pleasure accompanied by suffering, not exactly most people’s first pick but from my perspective pain is necessary in order to enjoy the pleasure that life gives you. Perhaps I'm over-romanticizing but there’s something to desire from looking back fondly at times where you were hurting and seeing yourself in a better place in the present. Perhaps you finally have moved on from “The one who got away” and can look back on those times with fondness. Perhaps you are sharing stories of a friend or family member at their funeral and though they may never w

5 Simple Ways to Support the Counter-Economy

Even if you aren’t prepared to engage in radical counter-economics, there are small steps everyone can take to either participate in, or at a minimum, support the counter-economy. I’ve assembled a list of 5 simple ways everyday people can participate in the agorist revolution. Food Trucks Food trucks not only often have excellent food, but they can also help push back against the state. In what is normally a cash business, food truck operators are better positioned to hide income from the state than other vendors such as chain grocery stores. Also, the more amateur the operation, the more likely the vendor is unlicensed; see the 7 year old NY child-slave, who’s lemonade stand was shut down by emissaries from Emperor Cuomo. Given the grey market dominance of the food truck business, it’s no wonder we’ve seen the industry blossom over the past couple decades. Food trucks have progressed from the standard roach coach to the present diverse array of taco trucks, gr