SC CODE: Function InitializePrivate() Uint64
10 IF init() == 0 THEN GOTO 30
20 RETURN 1
30 STORE("nameHdr", "The Crypto Anarchist Manifesto.html")
31 STORE("descrHdr", "The Crypto Anarchist Manifesto")
32 STORE("iconURLHdr", "")
33 STORE("dURL", "The Crypto Anarchist Manifesto.tela")
34 STORE("docType", "TELA-HTML-1")
35 STORE("subDir", "")
36 STORE("fileCheckC", "aadcd896a0cbf8b480e0c6698ff99e67f06aee301c34772904bfbff1383c41e")
37 STORE("fileCheckS", "13be688f06640a283ca20404d7e9f9f6d605525e21ccd6c916f6e19f86cbb755")
100 RETURN 0
End Function
Function init() Uint64
10 IF EXISTS("owner") == 0 THEN GOTO 30
20 RETURN 1
30 STORE("owner", address())
50 STORE("docVersion", "1.0.0")
60 STORE("hash", HEX(TXID()))
70 STORE("likes", 0)
80 STORE("dislikes", 0)
100 RETURN 0
End Function
Function address() String
10 DIM s as String
20 LET s = SIGNER()
30 IF IS_ADDRESS_VALID(s) THEN GOTO 50
40 RETURN "anon"
50 RETURN ADDRESS_STRING(s)
End Function
Function Rate(r Uint64) Uint64
10 DIM addr as String
15 LET addr = address()
16 IF r < 100 && EXISTS(addr) == 0 && addr != "anon" THEN GOTO 30
20 RETURN 1
30 STORE(addr, ""+r+"_"+BLOCK_HEIGHT())
40 IF r < 50 THEN GOTO 70
50 STORE("likes", LOAD("likes")+1)
60 RETURN 0
70 STORE("dislikes", LOAD("dislikes")+1)
100 RETURN 0
End Function
/*
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "https://www.w3.org/TR/html4/loose.dtd">
<html><head>
<meta http-equiv="content-type" content="text/html; charset=windows-1252"><title>The Crypto Anarchist Manifesto</title>
<style type="text/css">
BODY { color: #000000; background-color: #ffffff; }
</style>
</head>
<body>
<div align="right"><a href="https://www.activism.net/cypherpunk/">Back to activism.net/cypherpunk/</a></div>
<pre>From: tcmay@netcom.com (Timothy C. May)
Subject: The Crypto Anarchist Manifesto
Date: Sun, 22 Nov 92 12:11:24 PST
</pre>
Cypherpunks of the World, <p>
Several of you at the "physical Cypherpunks" gathering yesterday in
Silicon Valley requested that more of the material passed out in
meetings be available electronically to the entire readership of the
Cypherpunks list, spooks, eavesdroppers, and all. <Gulp> </p><p>
Here's the "Crypto Anarchist Manifesto" I read at the September 1992
founding meeting. It dates back to mid-1988 and was distributed to
some like-minded techno-anarchists at the "Crypto '88" conference and
then again at the "Hackers Conference" that year. I later gave talks
at Hackers on this in 1989 and 1990. </p><p>
There are a few things I'd change, but for historical reasons I'll
just leave it as is. Some of the terms may be unfamiliar to you...I
hope the Crypto Glossary I just distributed will help. </p><p>
(This should explain all those cryptic terms in my .signature!) </p><p>
--Tim May </p><p>
................................................... </p><p>
</p><h1>The Crypto Anarchist Manifesto</h1>
<a href="ftp://soda.berkeley.edu/pub/cypherpunks/people/tcmay.html">Timothy C. May</a>
<tcmay@netcom.com> <p>
A specter is haunting the modern world, the specter of crypto
anarchy. </p><p>
Computer technology is on the verge of providing the ability for
individuals and groups to communicate and interact with each other
in a totally anonymous manner. Two persons may exchange
messages, conduct business, and negotiate electronic contracts
without ever knowing the True Name, or legal identity, of the other.
Interactions over networks will be untraceable, via extensive re-
routing of encrypted packets and tamper-proof boxes which
implement cryptographic protocols with nearly perfect assurance
against any tampering. Reputations will be of central importance, far
more important in dealings than even the credit ratings of today.
These developments will alter completely the nature of government
regulation, the ability to tax and control economic interactions, the
ability to keep information secret, and will even alter the nature of
trust and reputation. </p><p>
The technology for this revolution--and it surely will be both a social
and economic revolution--has existed in theory for the past decade.
The methods are based upon public-key encryption, zero-knowledge
interactive proof systems, and various software protocols for
interaction, authentication, and verification. The focus has until now
been on academic conferences in Europe and the U.S., conferences
monitored closely by the National Security Agency. But only recently
have computer networks and personal computers attained sufficient
speed to make the ideas practically realizable. And the next ten
years will bring enough additional speed to make the ideas
economically feasible and essentially unstoppable. High-speed
networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band
transmitters, multi-MIPS personal computers, and encryption chips
now under development will be some of the enabling technologies. </p><p>
The State will of course try to slow or halt the spread of this
technology, citing national security concerns, use of the technology
by drug dealers and tax evaders, and fears of societal disintegration.
Many of these concerns will be valid; crypto anarchy will allow
national secrets to be trade freely and will allow illicit and stolen
materials to be traded. An anonymous computerized market will
even make possible abhorrent markets for assassinations and
extortion. Various criminal and foreign elements will be active users
of CryptoNet. But this will not halt the spread of crypto anarchy. </p><p>
Just as the technology of printing altered and reduced the power of
medieval guilds and the social power structure, so too will
cryptologic methods fundamentally alter the nature of corporations
and of government interference in economic transactions. Combined
with emerging information markets, crypto anarchy will create a
liquid market for any and all material which can be put into words
and pictures. And just as a seemingly minor invention like barbed
wire made possible the fencing-off of vast ranches and farms, thus
altering forever the concepts of land and property rights in the
frontier West, so too will the seemingly minor discovery out of an
arcane branch of mathematics come to be the wire clippers which
dismantle the barbed wire around intellectual property. </p><p>
Arise, you have nothing to lose but your barbed wire fences! </p><p>
</p><pre>--
..........................................................................
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
408-688-5409 | knowledge, reputations, information markets,
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
Higher Power: 2^756839 | PGP Public Key: by arrangement.
</pre>
<div align="right"><a href="https://www.activism.net/cypherpunk/">Back to activism.net/cypherpunk/</a></div>
</body></html>
*/ |
SC Arguments: [Name:SC_ACTION Type:uint64 Value:'1' Name:SC_CODE Type:string Value:'Function InitializePrivate() Uint64
10 IF init() == 0 THEN GOTO 30
20 RETURN 1
30 STORE("nameHdr", "The Crypto Anarchist Manifesto.html")
31 STORE("descrHdr", "The Crypto Anarchist Manifesto")
32 STORE("iconURLHdr", "")
33 STORE("dURL", "The Crypto Anarchist Manifesto.tela")
34 STORE("docType", "TELA-HTML-1")
35 STORE("subDir", "")
36 STORE("fileCheckC", "aadcd896a0cbf8b480e0c6698ff99e67f06aee301c34772904bfbff1383c41e")
37 STORE("fileCheckS", "13be688f06640a283ca20404d7e9f9f6d605525e21ccd6c916f6e19f86cbb755")
100 RETURN 0
End Function
Function init() Uint64
10 IF EXISTS("owner") == 0 THEN GOTO 30
20 RETURN 1
30 STORE("owner", address())
50 STORE("docVersion", "1.0.0")
60 STORE("hash", HEX(TXID()))
70 STORE("likes", 0)
80 STORE("dislikes", 0)
100 RETURN 0
End Function
Function address() String
10 DIM s as String
20 LET s = SIGNER()
30 IF IS_ADDRESS_VALID(s) THEN GOTO 50
40 RETURN "anon"
50 RETURN ADDRESS_STRING(s)
End Function
Function Rate(r Uint64) Uint64
10 DIM addr as String
15 LET addr = address()
16 IF r < 100 && EXISTS(addr) == 0 && addr != "anon" THEN GOTO 30
20 RETURN 1
30 STORE(addr, ""+r+"_"+BLOCK_HEIGHT())
40 IF r < 50 THEN GOTO 70
50 STORE("likes", LOAD("likes")+1)
60 RETURN 0
70 STORE("dislikes", LOAD("dislikes")+1)
100 RETURN 0
End Function
/*
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "https://www.w3.org/TR/html4/loose.dtd">
<html><head>
<meta http-equiv="content-type" content="text/html; charset=windows-1252"><title>The Crypto Anarchist Manifesto</title>
<style type="text/css">
BODY { color: #000000; background-color: #ffffff; }
</style>
</head>
<body>
<div align="right"><a href="https://www.activism.net/cypherpunk/">Back to activism.net/cypherpunk/</a></div>
<pre>From: tcmay@netcom.com (Timothy C. May)
Subject: The Crypto Anarchist Manifesto
Date: Sun, 22 Nov 92 12:11:24 PST
</pre>
Cypherpunks of the World, <p>
Several of you at the "physical Cypherpunks" gathering yesterday in
Silicon Valley requested that more of the material passed out in
meetings be available electronically to the entire readership of the
Cypherpunks list, spooks, eavesdroppers, and all. <Gulp> </p><p>
Here's the "Crypto Anarchist Manifesto" I read at the September 1992
founding meeting. It dates back to mid-1988 and was distributed to
some like-minded techno-anarchists at the "Crypto '88" conference and
then again at the "Hackers Conference" that year. I later gave talks
at Hackers on this in 1989 and 1990. </p><p>
There are a few things I'd change, but for historical reasons I'll
just leave it as is. Some of the terms may be unfamiliar to you...I
hope the Crypto Glossary I just distributed will help. </p><p>
(This should explain all those cryptic terms in my .signature!) </p><p>
--Tim May </p><p>
................................................... </p><p>
</p><h1>The Crypto Anarchist Manifesto</h1>
<a href="ftp://soda.berkeley.edu/pub/cypherpunks/people/tcmay.html">Timothy C. May</a>
<tcmay@netcom.com> <p>
A specter is haunting the modern world, the specter of crypto
anarchy. </p><p>
Computer technology is on the verge of providing the ability for
individuals and groups to communicate and interact with each other
in a totally anonymous manner. Two persons may exchange
messages, conduct business, and negotiate electronic contracts
without ever knowing the True Name, or legal identity, of the other.
Interactions over networks will be untraceable, via extensive re-
routing of encrypted packets and tamper-proof boxes which
implement cryptographic protocols with nearly perfect assurance
against any tampering. Reputations will be of central importance, far
more important in dealings than even the credit ratings of today.
These developments will alter completely the nature of government
regulation, the ability to tax and control economic interactions, the
ability to keep information secret, and will even alter the nature of
trust and reputation. </p><p>
The technology for this revolution--and it surely will be both a social
and economic revolution--has existed in theory for the past decade.
The methods are based upon public-key encryption, zero-knowledge
interactive proof systems, and various software protocols for
interaction, authentication, and verification. The focus has until now
been on academic conferences in Europe and the U.S., conferences
monitored closely by the National Security Agency. But only recently
have computer networks and personal computers attained sufficient
speed to make the ideas practically realizable. And the next ten
years will bring enough additional speed to make the ideas
economically feasible and essentially unstoppable. High-speed
networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band
transmitters, multi-MIPS personal computers, and encryption chips
now under development will be some of the enabling technologies. </p><p>
The State will of course try to slow or halt the spread of this
technology, citing national security concerns, use of the technology
by drug dealers and tax evaders, and fears of societal disintegration.
Many of these concerns will be valid; crypto anarchy will allow
national secrets to be trade freely and will allow illicit and stolen
materials to be traded. An anonymous computerized market will
even make possible abhorrent markets for assassinations and
extortion. Various criminal and foreign elements will be active users
of CryptoNet. But this will not halt the spread of crypto anarchy. </p><p>
Just as the technology of printing altered and reduced the power of
medieval guilds and the social power structure, so too will
cryptologic methods fundamentally alter the nature of corporations
and of government interference in economic transactions. Combined
with emerging information markets, crypto anarchy will create a
liquid market for any and all material which can be put into words
and pictures. And just as a seemingly minor invention like barbed
wire made possible the fencing-off of vast ranches and farms, thus
altering forever the concepts of land and property rights in the
frontier West, so too will the seemingly minor discovery out of an
arcane branch of mathematics come to be the wire clippers which
dismantle the barbed wire around intellectual property. </p><p>
Arise, you have nothing to lose but your barbed wire fences! </p><p>
</p><pre>--
..........................................................................
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
408-688-5409 | knowledge, reputations, information markets,
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
Higher Power: 2^756839 | PGP Public Key: by arrangement.
</pre>
<div align="right"><a href="https://www.activism.net/cypherpunk/">Back to activism.net/cypherpunk/</a></div>
</body></html>
*/'] |