imported>Chunbum Park |
imported>John Stephenson |
(198 intermediate revisions by 8 users not shown) |
Line 1: |
Line 1: |
| A '''[[cypherpunk]]''' is an activist advocating widespread use of strong cryptography as a route to social and political change. Cypherpunks have been engaged in an active movement since the late 1980s, heavily influenced by the hacker tradition and by libertarian ideas. Many cypherpunks were quite active in the intense political and legal controversies around cryptography of the 90s, and most have remained active into the 21st century.
| | {{:{{FeaturedArticleTitle}}}} |
| | | <small> |
| The basic ideas are in this quote from the ''Cypherpunk Manifesto'':
| | ==Footnotes== |
| | | {{reflist|2}} |
| {{quotation|Privacy is necessary for an open society in the electronic age. ... | | </small> |
| | |
| We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy ...
| |
| | |
| We must defend our own privacy if we expect to have any. ...
| |
| | |
| Cypherpunks write code. We know that someone has to write software to defend privacy, and ... we're going to write it. ... }}
| |
| | |
| Many cypherpunks are technically quite sophisticated; they do understand ciphers and are capable of writing software. Some are or were quite senior people at major hi-tech companies and others are well-known researchers. However, the "punk" part of the name indicates an attitude:
| |
| | |
| {{quotation|We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.}} | |
| | |
| {{quotation|This is crypto with an attitude, best embodied by the group's moniker: Cypherpunks.}}
| |
| | |
| The first mass media discussion of cypherpunks was in a 1993 Wired article by Steven Levy titled ''Code Rebels'':
| |
| | |
| {{quotation|The people in this room hope for a world where an individual's informational footprints -- everything from an opinion on abortion to the medical record of an actual abortion -- can be traced only if the individual involved chooses to reveal them; a world where coherent messages shoot around the globe by network and microwave, but intruders and feds trying to pluck them out of the vapor find only gibberish; a world where the tools of prying are transformed into the instruments of privacy.}} | |
| | |
| {{quotation|There is only one way this vision will materialize, and that is by widespread use of cryptography. Is this technologically possible? Definitely. The obstacles are political -- some of the most powerful forces in government are devoted to the control of these tools. In short, there is a war going on between those who would liberate crypto and those who would suppress it. The seemingly innocuous bunch strewn around this conference room represents the vanguard of the pro-crypto forces. Though the battleground seems remote, the stakes are not: The outcome of this struggle may determine the amount of freedom our society will grant us in the 21st century. To the Cypherpunks, freedom is an issue worth some risk.}}
| |
| | |
| The three masked men on the cover of that edition of Wired were prominent cypherpunks Tim May, Eric Hughes and John Gilmore.
| |
| | |
| Later, Levy wrote a book ''Crypto: How the Code Rebels Beat the Government — Saving Privacy in the Digital Age'' covering the "crypto wars" of the 90s in detail. "Code Rebels" in the title is almost synonymuous with "cypherpunks".
| |
| | |
| The term "cypherpunk" is mildly ambiguous. In most contexts in means anyone advocating cryptography as a tool for social change. However, it can also be used to mean a participant in the cypherpunks mailing list described below. The two meanings obviously overlap, but they are by no means synonymous.
| |
| | |
| Documents exemplifying cypherpunk ideas include the ''Crypto Anarchist Manifesto'', the ''Cypherpunk Manifesto'' and the ''Ciphernomicon''.
| |
| | |
| == Cypherpunk issues ==
| |
| | |
| Through most of the 90s the cypherpunks mailing list had extensive discussions of the public policy issues related to cryptography and on the politics and philosophy of concepts such as anonymity, pseudonyms, reputation, and privacy. Of course these discussions are continuing elsewhere since the list shut down.
| |
| | |
| In at least two senses, people on the list were ahead of more-or-less everyone else. For one thing, the list was discussing questions about privacy, government monitoring, corporate control of information, and related issues in the early 90s that did not become major topics for broader discussion until ten years or so later. For another, at least some list participants were more radical on these issues than almost anyone else.
| |
| | |
| The list had a range of viewpoints and there was probably no completely unanimous agreement on anything. The general attitude, though, definitely put personal privacy and personal liberty above all other considerations.
| |
| ''[[Cypherpunk|.... (read more)]]''
| |
Latest revision as of 10:19, 11 September 2020
Categories of smart home devices shown on Amazon's website in April 2023.
The phrase smart home refers to home automation devices that have internet access. Home automation, a broader category, includes any device that can be monitored or controlled via wireless radio signals, not just those having internet access. Whether the device is powered by the electrical grid or by battery, if it uses the home Wi-Fi network and if an internet logon needs to be created to use it, then it is smart home technology.
Collectively, all the smart home devices on every home's Wi-Fi network helps to make up what is called the Internet of Things (IoT), a huge sea of sensors and control devices across the world that are capable of being accessed from afar via the internet. One of the key reasons such devices need internet access is so that the manufacturer can periodically download updated firmware to the device to keep it up-to-date. However, being available via the internet also means that such devices are, potentially, available for spying or hacking. Today, homes may contain dozens or even hundreds of such devices, and consumers may enjoy their benefits while knowing little about how they work, or even realizing that they are present.
Not all home automation is "smart"
Many remotely controllable devices do not require internet access. They may instead have physical control devices that use either RF (“Radio Frequency”) or IR (“Infrared”) beams, two different kinds of energy used in remote controls to communicate commands. Non-"smart" home automation may also present security risks, because the control signals can be hijacked by bad actors with the right signaling equipment. Garage door openers are of particular note in this regard. Modern automobiles, in fact, are full of automation similar to home automation, and cars are hackable by bad actors in a number of ways. See Wikipedia's Automotive hacking article for more information.
Incompatibility hassles
At present, consumers must make sure that the smart device they wish to use is specified to be compatible whichever phone/tablet operating system they use (Apple vs. Android). Since smart home products emerged in the absence of any standard, a morass of competing methods for networking, control and monitoring now exist. For some products, consumers may need to buy an expensive hub, or bridge, a device that is specific to one vendor. Products made by different manufacturers but performing the same function are typically not interoperable. Consumers often need to open a different app on their smartphone or tablet in order to control devices by each manufacturer. This may make it too expensive and awkward to try out competing devices, leaving consumers stuck with the product they bought originally or else having to add yet more apps to their phones.
Security concerns
Security for smart home products has been uneven and sometimes seriously inadequate. Smart thermostats which can monitor whether a home's occupants are present or not, entry-way locks, robotic vacuums that work with a map of the house, and other smart home devices can present very real dangers if hackers can access their data.
Matter, an emerging standard
Matter is emerging standard in 2023 intended to increase security, reliability and inter-operability of smart-home devices. About ten years ago, industry consortiums formed to work on standards for smart home device communications, and their underlying wireless communications, which would make it possible for products from all vendors to work together seamlessly and provide fast performance, privacy, and security and would work even if there is not connection to the outside internet (i.e., no connection to "the cloud" or to servers).