mirror of
https://github.com/0xb100d/manifestos.git
synced 2025-12-16 23:54:22 +01:00
963 lines
75 KiB
Plaintext
963 lines
75 KiB
Plaintext
https://kk.org/mt-files/books-mt/ooc-mf.pdf
|
||
Chapter 12 (pg 176-197)
|
||
E-Money
|
||
Crypto-anarchy: encryption always wins
|
||
In Tim May’s eyes a digital tape is a weapon as potent and subversive as a shouldermounted
|
||
Stinger missile. May (fortyish, trim beard, ex-physicist) holds up a $9.95 digital
|
||
audio tape, or DAT. The cassette—just slightly fatter than an ordinary cassette—contains
|
||
a copy of Mozart equivalent in fidelity to a conventional digital compact disc. DAT
|
||
can hold text as easily as music. If the data is smartly compressed, one DAT purchased
|
||
at K-Mart can hold about 10,000 books in digital form.
|
||
One DAT can also completely cloak a smaller library of information interleaved
|
||
within the music. Not only can the data be securely encrypted within a digital tape, but
|
||
the library’s existence on the tape would be invisible even to powerful computers. In the
|
||
scheme May promotes, a computer hard disk’s-worth of coded information could be
|
||
made to disappear inside an ordinary digital tape of Michael Jackson’s Thriller.
|
||
The vanishing act works as follows. DAT records music in 16 binary digits, but that
|
||
precision is beyond perception. The difference contained in the 16th bit of the signal is
|
||
too small to be detected by the human ear. An engineer can substitute a long message—a
|
||
book of diagrams, a pile of data spreadsheets (in encrypted form)—into the positions
|
||
of the 16th bits of music. Anyone playing the tape would hear Michael Jackson crooning
|
||
in the exact digital quality they would hear on a purchased Thriller tape. Anyone
|
||
examining the tape with a computer would see only digital music. Only by matching an
|
||
Tim May, cypherpunk.
|
||
177
|
||
untampered-with tape with the encrypted one bit by bit on a computer could someone
|
||
detect the difference. Even then, the random-looking differences would appear to be
|
||
noise acquired while duping a digital tape through an analog CD player (as is normally
|
||
done). Finally, this “noise” would have to be decrypted (not likely) to prove that it was
|
||
something other than noise.
|
||
“What this means,” says May, “is that already it is totally hopeless to stop the flow
|
||
of bits across borders. Because anyone carrying a single music cassette bought in a
|
||
store could carry the entire computerized files of the stealth bomber, and it would be
|
||
completely and totally imperceptible.” One tape contains disco music. The other tape
|
||
contains disco and the essential blueprints of a key technology.
|
||
Music isn’t the only way to hide things, either. “I’ve done this with photos, “ says
|
||
May. “I take a digitized photo posted on the Net, download it into Adobe Photoshop,
|
||
and then strip an encrypted message into the least significant bit in each pixel. When I
|
||
repost the image, it is essentially indistinguishable from the original.”
|
||
The other thing May is into is wholly anonymous transactions. If one takes the
|
||
encryption methods developed by military agencies and transplants them into the vast
|
||
terrain of electronic networks, very powerful—and very unbreakable—technologies of
|
||
anonymous dealing become possible. Two complete strangers could solicit or supply
|
||
information to each other, and consummate the exchange with money, without the least
|
||
chance of being traced. That’s something that cannot be securely done with phones and
|
||
the post office now.
|
||
It’s not just spies and organized crime who are paying attention. Efficient means
|
||
of authentication and verification, such as smart cards, tamper-proof networks, and
|
||
micro-size encryption chips, are driving the cost of ciphers down to the consumer level.
|
||
Encryption is now affordable for the everyman.
|
||
The upshot of all this, Tim believes, is the end of corporations in their current form
|
||
and the beginning of more sophisticated, untaxed black markets. Tim calls this movement
|
||
Crypto Anarchy. “I have to tell you I think there is a coming war between two
|
||
forces,” Tim May confides to me. “One force wants full disclosure, an end to secret dealings.
|
||
That’s the government going after pot smokers and controversial bulletin boards.
|
||
The other force wants privacy and civil liberties. In this war, encryption wins. Unless the
|
||
government is successful in banning encryption, which it won’t be, encryption always
|
||
wins.”
|
||
A couple of years ago May wrote a manifesto to alert the world to the advent of
|
||
widespread encryption. In this electronic broadside published on the Net, he warned of
|
||
the coming “specter of crypto anarchy”:
|
||
...The State will of course try to slow or halt the spread of this technology, citing
|
||
national security concerns, use of the technology by drug dealers and tax evaders, and
|
||
fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will
|
||
allow national secrets to be traded freely and will allow illicit and stolen materials to be
|
||
traded. An anonymous computerized market will even make possible abhorrent markets
|
||
for assassinations and extortion. Various criminal and foreign elements will be active users
|
||
of CryptoNet. But this will not halt the spread of crypto anarchy.
|
||
Just as the technology of printing altered and reduced the power of medieval guilds
|
||
and the social power structure, so too will cryptologic methods fundamentally alter the
|
||
nature of corporations and of government interference in economic transactions. Combined
|
||
with emerging information markets, crypto anarchy will create a liquid market for
|
||
any and all material which can be put into words and pictures. And just as a seemingly
|
||
minor invention like barbed wire made possible the fencing-off of vast ranches and
|
||
farms, thus altering forever the concepts of land and property rights in the frontier West,
|
||
so too will the seemingly minor discovery out of an arcane branch of mathematics come
|
||
178
|
||
to be the wire clippers which dismantle the barbed wire around intellectual property.
|
||
The manifesto was signed:
|
||
Timothy C. May, Crypto Anarchy: encryption, digital money, anonymous networks,
|
||
digital pseudonyms, zero knowledge, reputations, information markets, black markets,
|
||
collapse of government.
|
||
I asked Tim May, a retired Intel physicist, to explain the connection between
|
||
encryption and the collapse of society as we know it. May explained, “Medieval guilds
|
||
would monopolize information. When someone tried to make leather or silver outside
|
||
the guilds, the King’s men came in and pounded on them because the guild paid a levy
|
||
to the King. What broke the medieval guilds was printing; someone could publish a
|
||
treatise on how to tan leather. In the age of printing, corporations arose to monopolize
|
||
certain expertise like gunsmithing, or making steel. Now encryption will cause the
|
||
erosion of the current corporate monopoly on expertise and proprietary knowledge.
|
||
Corporations won’t be able to keep secrets because of how easy it will be to sell information
|
||
on the nets.”
|
||
The reason crypto anarchy hasn’t broken out yet, according to May, is that the
|
||
military has a monopoly on the key knowledge of encryption—just as the Church once
|
||
tried to control printing. With few exceptions, encryption technology has been invented
|
||
by and for the world’s military organizations. To say that the military is secretive about
|
||
this technology would be an understatement. Very little developed by the U.S. National
|
||
Security Agency (NSA)—whose mandate it is to develop crypto systems—has ever
|
||
trickled down for civilian use, unlike technologies spun off from the rest of the military/
|
||
industrial alliance.
|
||
But who needs encryption, anyway? Only people with something to hide, perhaps.
|
||
Spies, criminals, and malcontents. People whose appetite for encryption may be thwarted
|
||
righteously, effectively, and harshly.
|
||
The ground shifted two decades ago when the information age arrived, and intelligence
|
||
became the chief asset of corporations. Intelligence was no longer the monopoly
|
||
of the Central Intelligence Agency, but the subject of seminars for CEOs. Spying meant
|
||
corporate spying. Illicit transfer of corporate know-how, rather than military plans,
|
||
became the treasonous information the state had to worry about.
|
||
In addition, within the last decade, computers became fast and cheap; enciphering
|
||
no longer demanded supercomputers and the superbudgets need to run them. A generic
|
||
brand PC picked up at a garage sale could handle the massive computations that decent
|
||
encryption schemes consumed. For small companies running their entire business on
|
||
PCs, encryption was a tool they wanted on their hard disks.
|
||
And now, within the last few years, a thousand electronic networks have blossomed
|
||
into one highly decentralized network of networks. A network is a distributed thing without
|
||
a center of control, and with few clear boundaries. How do you secure something
|
||
without boundaries? Certain types of encryption, it turns out, are an ideal way to bring
|
||
security to a decentralized system while keeping the system flexible. Rather than trying
|
||
to seal out trouble with a rigid wall of security, networks can tolerate all kinds of crap if
|
||
a large portion of its members use peer-to-peer encryption.
|
||
Suddenly, encryption has become incredibly useful to ordinary people who have
|
||
“nothing to hide” but their privacy. Peer-to-peer encryption, sown into the Net, linked
|
||
with electronic payments, tied into everyday business deals, becomes just another business
|
||
tool like fax machines or credit cards.
|
||
Just as suddenly, tax-paying citizens—whose dollars funded the military ownership
|
||
of this technology—want the technology back.
|
||
But the government (at least the U.S. government) may not give encryption back
|
||
179
|
||
to the people for a number of antiquated reasons. So, in the summer of 1992, a loose
|
||
federation of creative math hackers, civil libertarians, free-market advocates, genius
|
||
programmers, renegade cryptologists, and sundry other frontier folk, began creating,
|
||
assembling, or appropriating encryption technology to plug into the Net. They called
|
||
themselves “cypherpunks.”
|
||
On a couple of Saturdays in the fall of 1992, I joined Tim May and about 15 other
|
||
crypto-rebels for their monthly cypherpunk meeting held near Palo Alto, California. The
|
||
group meets in a typically nondescript office complex full of small hi-tech start-up companies.
|
||
It could be anywhere in Silicon Valley. The room has corporate gray carpeting
|
||
and a conference table. The moderator for this meeting, Eric Hughes, tries to quiet the
|
||
cacophony of loud, opinionated voices. Hughes, with sandy hair halfway down his back,
|
||
grabs a marker and scribbles the agenda on a whiteboard. The items he writes down
|
||
echo Tim May’s digital card: reputations, PGP encryption, anonymous re-mailer update,
|
||
and the Diffie-Hellmann key exchange paper.
|
||
After a bit of gossip the group gets down to business. It’s class time. One member,
|
||
Dean Tribble, stands up front to report on his research on digital reputations. If you are
|
||
trying to do business with someone you know only as a name introducing some e-mail,
|
||
how can you be sure they are legit? Tribble suggests that you can buy a reputation from
|
||
a “trust escrow”—a company similar to a title or bond company that would guarantee
|
||
someone for a fee. He explains the lesson from game theory concerning iterated negotiation
|
||
games, like the Prisoner’s Dilemma; how payoffs shift when playing the game over
|
||
and over instead of just once, and how important reputations become in iterated relationships.
|
||
The potential problems of buying and selling reputations online are chewed
|
||
on, and suggestions of new directions for research are made, before Tribble sits down
|
||
and another member stands to give a brief talk. Round the table it goes.
|
||
Arthur Abraham, dressed in heavy studded black leather, reviews a recent technical
|
||
paper on encryption. Abraham flicks on an overhead projector, whips out some transparencies
|
||
painted with equations, and walks the group through the mathematical proof.
|
||
It is clear that the math is not easy for most. Sitting around the table are programmers
|
||
(many self-taught), engineers, consultants—all very smart—but only a single member
|
||
is equipped with a background in mathematics. “What do you mean by that?” questions
|
||
one quiet fellow as Abraham talks. “Oh, I see, you forgot the modulus,” chimes in
|
||
another guy. “Is that ‘a to the x’ or ‘a to the y’? The amateur crypto-hackers challenge
|
||
each statement, asking for clarification, mulling it over until each understands. The
|
||
hacker mind, the programmer’s drive to whittle things down to an elegant minimum,
|
||
to seek short cuts, confronts the academic stance of the paper. Pointing to a large hunk
|
||
of one equation, Dean asks, “Why not just scrap all this?” A voice from back: “That’s a
|
||
great question, and I think I know why not.” So the voice explains. Dean nods. Arthur
|
||
looks around to be sure everyone got it. Then he goes on to the next line in the paper;
|
||
those who understand help out those who don’t. Soon the room is full of people saying,
|
||
“Oh, that means you can serve this up on a network configuration! Hey, cool!” And
|
||
another tool for distributed computing is born; another component is transferred from
|
||
the shroud of military secrecy to the open web of the Net; and another brick is set into
|
||
the foundation of network culture.
|
||
The main thrust of the group’s efforts takes place in the virtual online space of the
|
||
Cypherpunk electronic mailing list. A growing crowd of crypto-hip folks from around
|
||
the world interact daily via an Internet “mailing list.” Here they pass around code-inprogress
|
||
as they attempt to implement ideas on the cheap (such as digital signatures), or
|
||
discuss the ethical and political implications of what they are doing. Some anonymous
|
||
subset of them has launched the Information Liberation Front. The ILF locates schol-
|
||
180
|
||
arly papers on cryptology appearing in very expensive (and very hard-to-find) journals,
|
||
scans them in by computer, and “liberates” them from their copyright restrictions by
|
||
posting the articles anonymously to the Net.
|
||
Posting anything anonymously to the Net is quite hard: the nature of the Net is to
|
||
track everything infallibly, and to duplicate items promiscuously. It is theoretically trivial
|
||
to monitor transmission nodes in order to backtrack a message to its source. In such a
|
||
climate of potential omniscience, the crypto-rebels yearn for true anonymity.
|
||
I confess my misgivings about the potential market for anonymity to Tim: “Seems
|
||
like the perfect thing for ransom notes, extortion threats, bribes, blackmail, insider
|
||
trading, and terrorism.” “Well,” Tim answers, “what about selling information that
|
||
isn’t viewed as legal, say about pot growing, do-it-yourself abortion, cryonics, or even
|
||
peddling alternative medical information without a license? What about the anonymity
|
||
wanted for whistleblowers, confessionals, and dating personals?”
|
||
Digital anonymity is needed, the crypto-rebels feel, because anonymity is as important
|
||
a civil tool as authentic identification is. Pretty good anonymity is offered by
|
||
the post office; you don’t need to give a return address and the post office doesn’t verify
|
||
it if you do. Telephones (without caller ID) and telegrams are likewise anonymous to
|
||
a rough degree. And everyone has a right (upheld by the Supreme Court) to distribute
|
||
anonymous handbills and pamphlets. Anonymity stirs the most fervor among those who
|
||
spend hours each day in networked communications. Ted Kaehler, a programmer at
|
||
Apple Computer, believes that “our society is in the midst of a privacy crisis.” He sees
|
||
encryption as an extension of such all-American institutions as the Post Office: “We have
|
||
always valued the privacy of the mails. Now for the first time, we don’t have to trust in it;
|
||
we can enforce it.” John Gilmore, a crypto-freak who sits on the board of the Electronic
|
||
Frontier Foundation, says, “We clearly have a societal need for anonymity in our basic
|
||
communications media.”
|
||
A pretty good society needs more than just anonymity. An online civilization requires
|
||
online anonymity, online identification, online authentication, online reputations,
|
||
online trust holders, online signatures, online privacy, and online access. All are essential
|
||
ingredients of any open society. The cypherpunk’s agenda is to build the tools that provide
|
||
digital equivalents to the interpersonal conventions we have in face-to-face society,
|
||
and hand them out for free. By the time they are done, the cypherpunks hope to have
|
||
given away free digital signatures, as well as the opportunity for online anonymity.
|
||
To create digital anonymity, the cypherpunks have developed about 15 prototype
|
||
versions of an anonymous re-mailer that would, when fully implemented, make it impossible
|
||
to determine the source of an e-mail message, even under intensive monitoring of
|
||
communication lines. One stage of the re-mailer works today. When you use it to mail
|
||
to Alice, she gets a message from you that says it is from “nobody.” Unraveling where it
|
||
came from is trivial for any computer capable of monitoring the entire network—a feat
|
||
few can afford. But to be mathematically untraceable, the re-mailers have to work in a
|
||
relay of at least two (more is better)—one re-mailer handing off a message to the next
|
||
re-mailer, diluting information about its source to nothing as it is passed along.
|
||
Eric Hughes sees a role for digital pseudonymity—your identity is known by some
|
||
but not by others. When cloaked pseudonymously “you could join a collective to purchase
|
||
some information and decrease your actual cost by orders of magnitude—that is,
|
||
until it is almost free.” A digital co-op could form a private online library and collectively
|
||
purchase digital movies, albums, software, and expensive newsletters, which they would
|
||
“lend” to each other over the net. The vendor selling the information would have absolutely
|
||
no way of determining whether he was selling to one person or 500. Hughes sees
|
||
these kinds of arrangements peppering an information-rich society as “increasing the
|
||
181
|
||
margins where the poor can survive.”
|
||
“One thing for sure,” Tim says, “long-term, this stuff nukes tax collection.” I
|
||
venture the rather lame observation that this may be one reason the government isn’t
|
||
handing the technology back. I also offer the speculation that an escalating arms race
|
||
with a digital IRS might evolve. For every new avenue the digital underground invents to
|
||
disguise transactions, the digital IRS will counter with a surveillance method. Tim poohpoohs
|
||
the notion. “Without a doubt, this stuff is unbreakable. Encryption always wins.”
|
||
John Gilmore shows of document secured under a Freedom of Information Act request.
|
||
182
|
||
And this is scary because pervasive encryption removes economic activity—one
|
||
driving force of our society—from any hope of central control. Encryption breeds outof-controllness.
|
||
The fax effect and the law of increasing returns
|
||
Encryption always wins because it follows the logic of the Net. A given public-key
|
||
encryption key can eventually be cracked by a supercomputer working on the problem
|
||
long enough. Those who have codes they don’t want cracked try to stay ahead of the
|
||
supercomputers by increasing the length of their keys (the longer a key, the harder it is to
|
||
crack)—but at the cost of making the safeguard more unwieldy and slow to use. However,
|
||
any code can be deciphered given enough time or money. As Eric Hughes often
|
||
reminds fellow cypherpunks, “Encryption is economics. Encryption is always possible,
|
||
just expensive.” It took Adi Shamir a year to break a 120-digit key using a network of
|
||
distributed Sun workstations working part-time. A person could use a key so long that
|
||
no supercomputer could crack it for the foreseeable future, but it would be awkward to
|
||
use in daily life. A building-full of NSA’s specially hot-rodded supercomputers might take
|
||
a day to crack a 140-digit code today. But that is a full day of big iron to open just one
|
||
lousy key!
|
||
Cypherpunks intend to level the playing field against centralized computer resources
|
||
with the Fax Effect. If you have the only fax machine in the world it is worth nothing.
|
||
But for every other fax installed in the world, your fax machine increases in value. In
|
||
fact, the more faxes in the world, the more valuable everybody’s fax becomes. This is the
|
||
logic of the Net, also known as the law of increasing returns. It goes contrary to classical
|
||
economic theories of wealth based on equilibratory tradeoff. These state that you
|
||
can’t get something from nothing. The truth is, you can. (Only now are a few radical
|
||
economics professors formalizing this notion.) Hackers, cypherpunks, and many hi-tech
|
||
entrepreneurs already know that. In network economics, more brings more. This is why
|
||
giving things away so often works, and why the cypherpunks want to pass out their tools
|
||
gratis. It has less to do with charity than with the clear intuition that network economics
|
||
reward the more and not the less—and you can seed the “more” at the start by giving
|
||
the tools away. (The cypherpunks also talk about using the economics of the Net for the
|
||
reverse side of encryption: to crack codes. They could assemble a people’s supercomputer
|
||
by networking together a million Macintoshes, each one computing a coordinated
|
||
little part of a huge, distributed decryption program. In theory, such a decentralized parallel
|
||
computer would in sum be the most powerful computer we can now imagine—far
|
||
greater than the centralized NSA’s.)
|
||
The idea of choking Big Brother with a deluge of petty, heavily encrypted messages
|
||
so tickles the imagination of crypto-rebels that one of them came up with a freeware
|
||
version of a highly regarded public-key encryption scheme. The software is called PGP,
|
||
for Pretty Good Privacy. The code has been passed out on the nets for free and made
|
||
available on disks. In certain parts of the Net it is quite common to see messages encrypted
|
||
with PGP, with a note that the sender’s public-key is “available upon request.”
|
||
PGP is not the only encryption freeware. On the Net, cypherpunks can grab
|
||
RIPEM, an application for privacy-enhanced mail. Both PGP and RIPEM are based
|
||
on RSA, a patented implementation of encryption algorithms. But while RIPEM is
|
||
distributed as public domain software by the RSA company itself, Pretty Good Privacy
|
||
183
|
||
software is home-brew code concocted by a crypto-rebel named Philip Zimmermann.
|
||
Because Pretty Good Privacy uses RSA’s patented math, it’s outlaw-ware.
|
||
RSA was developed at MIT—partly with federal funds—but was later licensed to
|
||
the academic researchers who invented it. The researchers published their crypto-methods
|
||
before they filed for patents out of fear that the NSA would hold up the patents
|
||
or even prevent the civilian use of their system. In the US, inventors have a year after
|
||
publication to file patents. But the rest of the world requires patents before publication,
|
||
so RSA could secure only U.S. patents on its system. PGP’s use of RSA’s patented
|
||
mathematics is legitimate overseas. But PGP is commonly exchanged in the no-place
|
||
of the Net (what country’s jurisdiction prevails in cyberspace?) where the law on intellectual
|
||
property is still a bit murky and close to the beginnings of crypto anarchy. Pretty
|
||
Good Privacy deals with this legal tar baby by notifying its American users that it is their
|
||
responsibility to secure from RSA a license for use of PGP’s underlying algorithm. (Sure.
|
||
Right.)
|
||
Zimmermann claims he released the quasi-legal PGP into the world because he
|
||
was concerned that the government would reclaim all public-key encryption technology,
|
||
including RSA’s. RSA can’t stop distribution of existing versions of PGP because
|
||
once something goes onto the Net, it never comes back. But it’s hard for RSA to argue
|
||
damages. Both the outlawed PGP and the officially sanctioned RIPEM infect the Net to
|
||
produce the Fax Effect. PGP encourages consumer use of encryption—the more use, the
|
||
better for everyone in the business. Pretty Good Privacy is freeware; like most freeware,
|
||
its users will sooner or later graduate to commercially supported stuff. Only RSA offers
|
||
the license for that at the moment. Economically, what could be better for a patent
|
||
holder than to have a million people use the buddy system to teach themselves about the
|
||
intricacies and virtues of your product (as pirated and distributed by others), and then
|
||
wait in line to buy your stuff when they want the best?
|
||
The Fax Effect, the rule of freeware upgrade, and the power of distributed intelligence
|
||
are all part of an emerging network economics. Politics in a network economy will
|
||
also definitely require the kind of tools the cypherpunks are playing with. Glenn Tenney,
|
||
chairman of the annual Hackers’ Conference, ran for public office in California last
|
||
year using the computer networks for campaigning, and came away with a realistic grasp
|
||
of how they will shape politics. He notes that digital techniques for establishing trust
|
||
are needed for electronic democracy. He writes online, “Imagine if a Senator responds
|
||
to some e-mail, but someone alters the response and then sends it on to the NY Times?
|
||
Authentication, digital signatures, etc., are essential for protection of all sides.” Encryption
|
||
and digital signatures are techniques to expand the dynamics of trust into a new
|
||
territory. Encryption cultivates a “web of trust,” says Phil Zimmermann, the very web
|
||
that is the heart of any society or human network. The short form of the cypherpunk’s
|
||
obsession with encryption can be summarized as: Pretty good privacy means pretty good
|
||
society.
|
||
One of the consequences of network economics, as facilitated by ciphers and digital
|
||
technology, is the transformation of what we mean by pretty good privacy. Networks
|
||
shift privacy from the realm of morals to the marketplace; privacy becomes a commodity.
|
||
A telephone directory has value because of the energy it saves a caller in finding a
|
||
particular phone number. When telephones were new, having an individual number to
|
||
list in a directory was valuable to the lister and to all other telephone users. But today,
|
||
in a world full of easily obtained telephone numbers, an unlisted phone number is more
|
||
valuable to the unlisted (who pay more) and to the phone company (who charge more).
|
||
Privacy is a commodity to be priced and sold.
|
||
184
|
||
Most privacy transactions will soon take place in the marketplace rather than in
|
||
government offices because a centralized government is handicapped in a distributed,
|
||
open-weave network, and can no longer guarantee how things are connected or not connected.
|
||
Hundreds of privacy vendors will sell bits of privacy at market rates. You hire
|
||
Little Brother, Inc., to demand maximum payment from junk mail and direct marketers
|
||
when you sell your name, and to monitor uses of that information as it tends to escape
|
||
into the Net. On your behalf, Little Brother, Inc., negotiates with other privacy vendors
|
||
for hired services such as personal encrypters, absolutely unlisted numbers, bozo filters
|
||
(to hide the messages from known “bozos”), stranger ID screeners (such as caller ID on
|
||
phones that only accept calls from certain numbers), and hired mechanical agents (called
|
||
network “knowbots”) to trace addresses, and counter-knowbots that unravel traces of
|
||
your own activities.
|
||
Privacy is a type of information that has its polarity reversed; I imagine it as anti-information.
|
||
The removal of a bit of information from a system can be seen as the reproduction
|
||
of a corresponding bit of anti-information. In a world flooded with information
|
||
ceaselessly replicating itself to the edges of the Net, the absence or vaporization of a bit
|
||
of information becomes very valuable, especially if that absence can be maintained. In a
|
||
world where everything is connected to everything—where connection and information
|
||
and knowledge are dirt cheap—then disconnection and anti-information and no-knowledge
|
||
become expensive. When bandwidth becomes free and entire gigabytes of information
|
||
are swapped around the clock, what you don’t want to communicate becomes the
|
||
most difficult chore. Encryption systems and their ilk are technologies of disconnection.
|
||
They somewhat tame the network’s innate tendency to connect and inform without
|
||
discrimination.
|
||
Superdistribution
|
||
We manage the disconnection of domestic utilities, such as water or electricity,
|
||
through metering. But metering is neither obvious nor easy. Thomas Edison’s dazzling
|
||
electrical gizmos were of little use to anyone until people had easy access to electricity in
|
||
their factories and homes. So at the peak of his career Edison diverted his attention away
|
||
from designing electrical devices to focus on the electrical delivery network itself. At first,
|
||
very little was settled about how electricity should be created (DC or AC?), carried, or
|
||
billed. For billing, Edison favored the approach that most information providers today
|
||
favor: charge a flat fee. Readers pay the same for a newspaper no matter how much of it
|
||
they read. Ditto for cable TV, books and computer software. All are priced flat for all you
|
||
can use.
|
||
Edison pushed a flat fee for electricity—a fixed amount if you are connected,
|
||
nothing if you aren’t—because he felt that the costs of accounting for differential usage
|
||
would exceed the cost of variances in electricity usage. But mostly Edison was stymied
|
||
about how to meter electricity. For the first six months of his General Electric Lighting
|
||
Company in New York City, customers paid a flat fee. To Edison’s chagrin, that didn’t
|
||
work out economically. Edison was forced to come up with a stop-gap solution. His
|
||
remedy, an electrolytic meter, was erratic and impractical. It froze in winter, it sometimes
|
||
ran backwards, and customers couldn’t read it (nor did they trust the company’s meter
|
||
readers). It wasn’t until a decade after municipal electrical networks were up and running
|
||
that another inventor came up with a reliable watt-hour meter. Now we can hardly
|
||
185
|
||
imagine buying electricity any other way.
|
||
A hundred years later the information industry still lacks an information meter.
|
||
George Gilder, hi-tech gadfly, puts the problem this way: “Rather than having to pay for
|
||
the whole reservoir every time you are thirsty, what you want is to only pay for a glass of
|
||
water.”
|
||
Indeed, why buy an ocean of information when all you want is a drink? No reason
|
||
at all, if you have an information meter. Entrepreneur Peter Sprague believes he has just
|
||
invented one. “We use encryption to force the metering of information,” says Sprague.
|
||
His spigot is a microchip that doles out small bits of information from a huge pile of
|
||
encrypted data. Instead of selling a CD-ROM crammed with a hundred thousand pages
|
||
of legal documents for $2,000, Sprague invented a ciphering device that would dispense
|
||
the documents off the CD-ROM at $1 per page. A user only pays for what she uses and
|
||
can use only what she pays for.
|
||
Sprague’s way of selling information per page is to make each page unreadable until
|
||
decrypted. Working from a catalog of contents, a user selects a range of information
|
||
to browse. She reads the abstracts or summaries and is charged a minuscule amount.
|
||
Then she selects a full text, which is decrypted by her dispenser. Each act of decryption
|
||
rings up a small charge (maybe 50 cents). The charge is tallied by a metering chip in her
|
||
dispenser that deducts the amount from a prepaid account (also stored on the metering
|
||
chip), much as a postage meter deducts credit while dispensing postage tapes. When the
|
||
CD-ROM credit runs out, she calls a central office, which replenishes her account via
|
||
an encrypted message sent on a modem line running into her computer’s metering chip.
|
||
Her dispenser now has $300 credit to spend on information by the page, by the paragraph,
|
||
or by the stock price, depending on how fine the vendor is cutting it.
|
||
What Sprague’s encryption metering device does is decouple information’s fabulous
|
||
ease in being copied from its owner’s need to have it selectively disconnected. It lets
|
||
information flow freely and ubiquitously—like water through a town’s plumbing—by
|
||
metering it out in usable chunks. Metering converts information into a utility.
|
||
The cypherpunks note, quite correctly, that this will not stop hackers from siphoning
|
||
off free information. The Videocipher encryption system, used to meter satellite-delivered
|
||
TV programs such as HBO and Showtime, was compromised within weeks of its
|
||
introduction. Despite claims by the meter’s manufacturer that the encrypto-metering
|
||
chip was unhackable, big moneymaking scams capitalized on hacks around the codes.
|
||
(The scams were set up on Indian reservations—but that’s a whole ’nother story). Pirates
|
||
would find a descrambler box with a valid subscription—in a hotel room, for instance—
|
||
and then clone the identity into other chips. A consumer would send their box to the
|
||
reservation for “repairs” and it would come back with a new chip cloned with the identity
|
||
of the hotel box. The broadcasting system couldn’t perceive clones in the audience.
|
||
In short, the system was hacked not by cracking the code but by subverting places where
|
||
the code tied into the other parts of the system.
|
||
No system is hack-proof. But disruptions of an encrypted system require deliberate
|
||
creative energy. Information meters can’t stop thievery or hacking, but meters can counteract
|
||
the effects of lazy mooching and the natural human desire to share. The Videocipher
|
||
satellite TV system eliminates user piracy on a mass scale—the type of piracy that
|
||
plagued the satellite TV outback before scrambling and that still plagues the lands of
|
||
software and photocopying. Encryption makes pirating a chore and not something that
|
||
any slouch with a blank disk can do. Satellite encryption works overall because encryption
|
||
always wins.
|
||
Peter Sprague’s crypto-meter permits Alice to make as many copies of the encrypted
|
||
CD-ROMs as she likes, since she pays for only what she uses. Crypto-metering, in
|
||
186
|
||
essence, disengages the process of payment from the process of duplication.
|
||
Using encryption to force the metering of information works because it does not
|
||
constrain information’s desire to reproduce. All things being equal, a bit of information
|
||
will replicate through an available network until it fills that network. With an animate
|
||
drive, every fact naturally proliferates as many times as possible. The more fit—the more
|
||
interesting or useful—a fact is, the wider it spreads. A pretty metaphor compares the
|
||
spread of genes through a population with the similar spread of ideas, or memes, in a
|
||
population. Both genes and memes depend on a network of replicating machines—cells
|
||
or brains or computer terminals. A network in this general sense is a swarm of flexibly
|
||
interconnected nodes each of which can copy (either exactly or with variation) a message
|
||
taken from another node. A population of butterflies and a flurry of e-mail messages
|
||
have the same mandate: replicate or die. Information wants to be copied.
|
||
Our digital society has built a supernetwork of copiers out of hundreds of millions
|
||
of personal faxes, library photocopiers, and desktop hard disks. It is as if our information
|
||
society is one huge aggregate copying machine. But we won’t let this supermachine copy.
|
||
Much to everyone’s surprise, information created in one corner finds its way into all the
|
||
other corners rather quickly. Because our previous economy was built upon scarcity of
|
||
goods, we have so far fought the natural fecundity of information by trying to control
|
||
every act of replication as it occurs. We take a massively parallel copy machine and try
|
||
to stifle most acts of reproduction. As in other puritanical regimes, this doesn’t work.
|
||
Information wants to be copied.
|
||
“Free the bits!” shouts Tim May. This sense of the word “free” shifts Stewart
|
||
Brand’s oft-quoted maxim, “Information wants to be free”—as in “without cost”—to the
|
||
more subtle “without chains or imprisonment.” Information wants to be free to wander
|
||
and reproduce. Success, in a networked world of decentralized nodes, belongs to those
|
||
plans that do not resist either the replication or roaming urges of information.
|
||
Sprague’s encrypted meter capitalizes on the distinction between pay and copy. “It
|
||
is easy to make software count how many times it has been invoked, but hard to make
|
||
it count how many times it has been copied,” says software architect Brad Cox. In a message
|
||
broadcast on the Internet, Cox writes:
|
||
Software objects differ from tangible objects in being fundamentally unable to monitor
|
||
their copying but trivially able to monitor their use....So why not build an information
|
||
age market economy around this difference between manufacturing-age and information-age
|
||
goods? If revenue collection were based on monitoring the use of software
|
||
inside a computer, vendors could dispense with copy protection altogether.
|
||
Cox is a software developer specializing in object-oriented programming. In addition
|
||
to the previously mentioned virtue of reduced bugs which OOP delivers, it offers
|
||
two other magnificent improvements over conventional software. First, OOP provides
|
||
the user with applications that are more fluid, more interoperable with various tasks—
|
||
sort of like a house with movable “object” furniture instead of house saddled with
|
||
built-in furniture. Second, OOP provides software developers the ability to “reuse” modules
|
||
of software, whether they wrote the modules themselves or purchased them from
|
||
someone else. To build a database, an OOP designer like Cox takes a sort routine, a field
|
||
manager, a form generator, an icon handler, etc., and assembles the program instead of
|
||
rewriting a working whole from scratch. Cox developed a set of cool OOP objects that
|
||
he sold to Steve Jobs to use in his Next machine, but selling small bits of modular code as
|
||
a regular business has been slow. It is similar to trying to peddle limericks one by one. To
|
||
recoup the great cost of writing an individual object by selling it outright would garner
|
||
too few sales, but selling it by copy is too hard to monitor or control. But if objects could
|
||
generate revenue each time a user activated one, then an author could make a living
|
||
187
|
||
creating them.
|
||
While contemplating the possible market for OOP objects that were sold on a “per
|
||
use” plan, Cox uncovered the natural grain in networked intelligence: Let the copies
|
||
flow, and pay per use. He says, “The premise is that copy protection is exactly the wrong
|
||
idea for intangible, easily copied goods such as software. You want information-age
|
||
goods to be freely distributed and freely acquired via whatever distribution means you
|
||
want. You are positively encouraged to download software from networks, give copies to
|
||
your friends, or send it as junk mail to people you’ve never met. Broadcast my software
|
||
from satellites. Please!”
|
||
Cox adds (in echo of Peter Sprague, although surprisingly the two are unfamiliar
|
||
with each other’s work), “This generosity is possible because the software is actually
|
||
‘meterware.’ It has strings attached that make revenue collection independent of how
|
||
the software was distributed.”
|
||
“The approach is called superdistribution,” Cox says, using a term given by Japanese
|
||
researchers to a similar method they devised to track the flow of software through a
|
||
network. Cox: “Like superconductivity, it lets information flow freely, without resistance
|
||
from copy protection or piracy.”
|
||
The model is the successful balance of copyright and use rights worked out by the
|
||
music and radio industries. Musicians earn money not only by selling customers a copy
|
||
of their work but by selling broadcast stations a “use” of their music. The copies are supplied
|
||
free, sent to radio stations in a great unmonitored flood by the musicians’ agents.
|
||
The stations sort through this tide of free music, paying royalties only for the music they
|
||
broadcast, as metered (statistically) by two agencies representing musicians, ASCAP and
|
||
BMI.
|
||
JEIDA, a Japanese consortium of computer manufacturers, developed a chip and
|
||
a protocol that allows each Macintosh on a network to freely replicate software while
|
||
metering use rights. According to Ryoichi Mori, the head of JEIDA, “Each computer is
|
||
thought of as a station that broadcasts, not the software itself, but the use of the software,
|
||
to an audience of a single ‘listener.’” Each time your Mac “plays” a piece of software
|
||
or a software component from among thousands freely available, it triggers a royalty.
|
||
Commercial radio and TV provide an “existence proof ” of a working superdistribution
|
||
system in which the copies are disseminated free and the stations only pay for what they
|
||
use. Musicians would be quite happy if one radio station made copies of their tapes and
|
||
distributed them to other stations (“Free the bits!”) because it increases the likelihood of
|
||
some station using their music.
|
||
JEIDA envisions software percolating through large computer networks unencumbered
|
||
by restrictions on copying or mobility. Like Cox, Sprague, and the cypherpunks,
|
||
JEIDA counts on public-key encryption to keep these counts private and untampered as
|
||
they are transmitted to the credit center. Peter Sprague says plainly, “Encrypted metering
|
||
is an ASCAP for intellectual property.”
|
||
Cox’s electronically disseminated pamphlet on superdistribution sums up the virtues
|
||
very nicely:
|
||
Whereas software’s ease of replication is a liability today, superdistribution makes it an
|
||
asset. Whereas software vendors must spend heavily to overcome software’s invisibility,
|
||
superdistribution thrusts software out into the world to serve as its own advertisement.
|
||
A hoary ogre known as the Pay-Per-View Problem haunts the information economy.
|
||
In the past this monster ate billions of dollars in failed corporate attempts to sell movies,
|
||
databases, or music recordings on a per view or per use basis. The ogre still lives. The
|
||
problem is, people are reluctant to pay in advance for information they haven’t seen
|
||
because of their hunch that they might not find it useful. They are equally unwilling to
|
||
188
|
||
pay after they have seen it because their hunch usually proves correct: they could have
|
||
lived without it. Can you imagine being asked to pay after you’ve seen a movie? Medical
|
||
knowledge is the only type of information that can be easily sold sight unseen because
|
||
the buyers believe they can’t live without it.
|
||
The ogre is usually slain with sampling. Moviegoers are persuaded to pay beforehand
|
||
by lapel-grabbing trailers. Software is loaned among friends for trial; books and
|
||
magazines are browsed in the bookstore.
|
||
The other way to slay the problem is by lowering the price of admission. Newspapers
|
||
are cheap; we pay before looking. The ingenious thing about information metering
|
||
is that it delivers two solutions: it provides a spigot to record how much data is used, and
|
||
it provides a spigot that can be turned down to a cheap trickle. Encryption-metering
|
||
chops big expensive data hunks into small inexpensive doses of data. People will readily
|
||
pay for bits of cheap information before viewing, particularly if the payment invisibly
|
||
deducts itself from an account.
|
||
The fine granularity of information-metering gets Peter Sprague excited. When
|
||
asked for an example of how fine it could get, he volunteers one so fast it’s obvious that
|
||
he has been giving it some thought: “Say you want to write obscene limericks from your
|
||
house in Telluride, Colorado. If you could write one obscene limerick a day, we can
|
||
probably find 10,000 people in the world who want to pay 10 cents a day to get it. We’ll
|
||
collect $365,000 per year and pay you $120,000, and then you can ski for the rest of
|
||
your life.” In no other kind of marketplace would one measly limerick, no matter how
|
||
bawdy and clever, be worth selling on its own. Maybe a book of them—an ocean of limericks—but
|
||
not one. Yet in an electronic marketplace, a single limerick—the information
|
||
equivalent of a stick of gum—is worth producing and offering for sale.
|
||
Sprague ticks off a list of other fine-grained items that might be traded in such a
|
||
marketplace. He catalogs what he’d pay for right now: “I want the weather in Prague for
|
||
25 cents per month, I want my stocks updated for 50 cents a stock, I want the Dines Letter
|
||
for $12 a week, I want the congestion report from O’Hare Airport updated continuously
|
||
because I’m always getting stuck in Chicago, so I’ll pay a buck per month for that, and I
|
||
want ‘Hagar the Horrible’ cartoon for a nickel a day.” Each of these products is currently
|
||
either given away scattershot or peddled in the aggregate very expensively. Sprague’s
|
||
electronically mediated marketplace would “unbundle” the data and deliver a narrowly
|
||
selected piece of information to your desktop or mobile palmtop for a reasonable price.
|
||
Encryption would meter it out, preventing you from filching other tiny bits of data that
|
||
would hardly be worth protecting (or selling) in other ways. In essence, the ocean of
|
||
information flows through you, but you only pay for what you drink.
|
||
At the moment, this particular technology of disconnection exists as a $95 circuit
|
||
board that can slide into a personal computer and plug into a phone line. To encourage
|
||
established computer manufacturers such as Hewlett-Packard to hardwire a similar
|
||
board into units coming off their assembly line, Sprague’s company, Waves, Inc., offers
|
||
manufacturers a percentage of the revenue the encryption system generates. Their first
|
||
market is lawyers, “because,” he says, “lawyers spend $400 a month on information
|
||
searches.” Sprague’s next step is to compress the encrypto-metering circuits and the
|
||
modem down into a single $20 microchip that can be tucked into beepers, video recorders,
|
||
phones, radios, and anything else that dispenses information. Ordinarily, this vision
|
||
might be dismissed as the pipe dream of a starry-eyed junior inventor, but Peter Sprague
|
||
is chairman and founder of National Semiconductor, one of the major semiconducter
|
||
manufacturers in the world. He is sort of a Henry Ford of silicon chips. A cypherpunk,
|
||
not. If anyone knows how to squeeze a revolutionary economy onto the head of a pin, it
|
||
might be him.
|
||
Anything holding an electric charge w ill hold a fiscal charge
|
||
This anticipated information economy and network culture still lacks one vital
|
||
component—an ingredient that, once again, is enabled by encryption, and a key element
|
||
that, once again, only long-haired crypto-rebels are experimenting with: electronic cash.
|
||
We already have electronic money. It flows daily in great invisible rivers from bank
|
||
vault to bank vault, from broker to broker, from country to country, from your employer
|
||
to your bank account. One institution alone, the Clearing House Interbank Payment
|
||
System, currently moves an average of a trillion dollars (a million millions) each day via
|
||
wire and satellite.
|
||
But that river of numbers is institutional electronic money, as remote from electronic
|
||
cash as mainframes are from PCs. When pocket cash goes digital—demassified into data
|
||
in the same transformation that institutional money underwent—we’ll experience the
|
||
deepest consequences of an information economy. Just as computing machines did not
|
||
reorganize society until individuals plugged into them outside of institutions, the full
|
||
effects of an electronic economy will have to wait until everyday petty cash (and check)
|
||
transactions of individuals go digital.
|
||
We have a hint of digital cash in credit cards and ATMs. Like most of my generation,
|
||
I get the little cash I use at an ATM, not having been inside a bank in years. On
|
||
average, I use less cash every month. High-octane executives fly around the country
|
||
purchasing everything on the go—meals, rooms, cabs, supplies, presents—carrying no
|
||
more than $50 in their wallets. Already, the cashless society is real for some.
|
||
Today in the U.S., credit card purchases are used for one-tenth of all consumer
|
||
payments. Credit card companies salivate while envisioning a near future where people
|
||
routinely use their cards for “virtually every kind of transaction.” Visa U.S.A. is experimenting
|
||
with card-based electronic money terminals (no slip to sign) at fast-food shops
|
||
and grocery stores. Since 1975, Visa has issued over 20 million debit cards that deduct
|
||
money from one’s bank account. In essence, Visa moved ATMs off of bank walls and
|
||
onto the front counters of stores.
|
||
The conventional view of cashless money thus touted by banks and most futurists is
|
||
not much more than a pervasive extension of the generic credit card system now operating.
|
||
Alice has an account at National Trust Me Bank. The bank issues her one of their
|
||
handy-dandy smart cards. She goes to an ATM and loads the wallet-size debit card with
|
||
$300 cash deducted from her checking account. She can spend her $300 from the card
|
||
at any store, gas station, ticket counter, or phone booth that has a Trust Me smart-card
|
||
slot.
|
||
What’s wrong with this picture? Most folks would prefer this system over passing
|
||
around portraits of dead presidents. Or over indebtedness to Visa or MasterCard. But
|
||
this version of the cashless concept slights both user and merchant; therefore it has slept
|
||
on the drawing boards for years, and will probably die there.
|
||
Foremost among the debit (or credit) card’s weaknesses is its nasty habit of leaving
|
||
every merchant Alice buys from—newsstand to nursery—with a personalized history
|
||
of her purchases. The record of a single store is not worrisome. But each store’s file of
|
||
Alice’s spending is indexed with her bank account number or Social Security number.
|
||
That makes it all too easy, and inevitable, for her spending histories to be combined,
|
||
store to store, into an exact, extremely desirable marketing profile of her. Such a mon-
|
||
190
|
||
etary dossier holds valuable information (not to mention private data) about her. She has
|
||
no control over this information and derives no compensation for it.
|
||
Second, the bank is obliged to hand out whiz-bang smart cards. Banks being the legendary
|
||
cheapskates they are, you know who is going to pay for them, at bank rates. Alice
|
||
will also have to pay the bank for the transaction costs of using the money card.
|
||
Third, merchants pay the system a small percentage whenever a debit card is used.
|
||
This eats into their already small profits and discourages vendors from soliciting the
|
||
card’s use for small purchases.
|
||
Fourth, Alice can only use her money at establishments equipped with slots that
|
||
accept Trust Me’s proprietary technology. This hardware quarantine has been a prime
|
||
factor in the nonhappening of this future. It also eliminates person-to-person payments
|
||
(unless you want to carry a slot around for others to poke into). Furthermore, Alice can
|
||
only refill her card (essentially purchase money) at an official Trust Me ATM branch.
|
||
This obstacle could be surmounted by a cooperative network of banks using a universal
|
||
slot linked into an internet of all banks; a hint of such a network already exists.
|
||
The alternative to debit card cash is true digital cash. Digital cash has none of the
|
||
debit or credit card’s drawbacks. True digital cash is real money with the nimbleness of
|
||
electricity and the privacy of cash. Payments are accountable but unlinkable. The cash
|
||
does not demand proprietary hardware or software. Therefore, money can be received
|
||
or transferred from and to anywhere, including to and from other individuals. You don’t
|
||
need to be a store or institution to get paid in nonpaper money. Anyone connected can
|
||
collect. And any company with the right reputation can “sell” electronic money refills, so
|
||
the costs are at market rates. Banks are only peripherally involved. You use digital cash to
|
||
order a pizza, pay for a bridge toll, or reimburse a friend, as well as to pay the mortgage,
|
||
if you want. It is different from plain old electronic money in that it can be anonymous
|
||
and untraceable except by the payer. It is fueled by encryption.
|
||
The method, technically known as blinded digital signatures, is based on a variant
|
||
of a proven technology called public-key encryption. Here’s how it works at the consumer
|
||
level. You use a digicash card to pay Joe’s Meat Market for a prime roast. The
|
||
merchant can verify (by examining the digital signature of the bank issuing the money)
|
||
that he was paid with money that had not been “spent” before. Yet, he’ll have no record
|
||
of who paid him. After the transaction, the bank has a verifiable account that you spent
|
||
$7, and spent it only once, and that Joe’s Meat Market did indeed receive $7. But those
|
||
two sides of the transaction are not linked and cannot be reconstructed unless you the
|
||
payer enable them to be. It seems illogical at first that such blind but verifiable transactions
|
||
can occur, but the integrity of their “disconnection” is pretty watertight.
|
||
Digital cash can replace every use of pocket cash except flipping a coin. You have
|
||
a complete record of all your payments and to whom they were made. “They” have a
|
||
record of being paid but not by whom they were made. The reliability of both impeccably
|
||
accurate accounting and 100 percent anonymity is ranked mathematically “unconditional”—without
|
||
exceptions.
|
||
The privacy and agility of digital cash stems from a simple and clever technology.
|
||
When I ask a digicash card entrepreneur if I could see one of his smart cards, he says
|
||
that he is sorry. He thought he had put one in his wallet but can’t find it. It looks like a
|
||
regular credit card, he says, showing me his very small collection of them. It looks like...
|
||
why, here it is! He slips out a blank, very thin, flexible card. The plastic rectangle holds
|
||
math money. In one corner is a small gold square the size of a thumbnail. This is a computer.
|
||
The CPU, no larger than a soggy cornflake, contains a limited amount of cash,
|
||
say, $500 or 100 transactions, whichever comes first. This one, made by Cylink, contains
|
||
a coprocessor specifically designed to handle public-key encryption mathematics. On
|
||
191
|
||
the tiny computer’s gold square are six very minute surface contacts which connect to an
|
||
online computer when the card is inserted into a slot.
|
||
Less smart cards (they don’t do encryption) are big in Europe and Japan, where 61
|
||
million of them are already in use. Japan is afloat in a primitive type of electronic currency—prepaid
|
||
magnetic phone cards. The Japanese national phone company, NTT,
|
||
has so far sold 330 million (some 10 million per month) of them. Forty percent of the
|
||
French carry smart cards in their wallets today to make phone calls. New York City
|
||
recently introduced a cashless phone card for a few of its 58,000 public phone booths.
|
||
New York is motivated not by futurism but by thieves. According to The New York Times,
|
||
“Every three minutes, a thief, a vandal, or some other telephone thug breaks into a coin
|
||
box or yanks a handset from a socket. That’s more than 175,000 times a year,” and costs
|
||
the city $10 million annually for repairs. The disposable phone card New York uses is
|
||
not very smart, but it’s adequate. It employs an infrared optical memory, common in
|
||
European phone cards, which is hard to counterfeit in small quantities but cheap to
|
||
manufacture in large numbers.
|
||
In Denmark, smart cards substitute for the credit cards the Danes never got. So
|
||
everyone who would tote a credit card in America, packs a smart debit card in Denmark.
|
||
Danish law demanded two significant restrictions: (1) that there be no minimum purchase
|
||
amount; (2) that there be no surcharge for the card’s use. The immediate effect was
|
||
that the cards began to replace cash in everyday use even more than checks and credit
|
||
cards have replaced cash in the States. The popularity of these cards is their undoing
|
||
because unlike cheap, decentralized phone cards, these cards rely on real-time interactions
|
||
with banks. They are overloading the Danish banking system, hogging phone lines
|
||
as the sale of each piece of candy is transmitted to the central bank, flooding the system
|
||
with transactions that cost more than they are worth.
|
||
David Chaum, a Berkeley cryptographer now living in Holland, has a solution.
|
||
Chaum, head of the cryptography group at the center for Mathematics and Computer
|
||
Science in Amsterdam, has proposed a mathematical code for a distributed, true digital
|
||
cash system. In his solution, everyone carries around a refillable smart card that packs
|
||
anonymous cash. This digicash seamlessly intermingles with electronic cash from home,
|
||
company, or government. And it works offline, freeing the phone system.
|
||
Chaum looks like a Berkeley stereotype: gray beard, full mane of hair tied back in
|
||
a professional ponytail, tweed jacket, sandals. As a grad student, Chaum got interested
|
||
in the prospects and problems of electronic voting. For his thesis he worked on the idea
|
||
of a digital signature that could not be faked, an essential tool for fraud-proof electronic
|
||
elections. From there his interest drifted to the similar problem in computer network
|
||
communications: how can you be sure a document is really from whom it claims to be
|
||
from? At the same time he wondered: how can you keep certain information private and
|
||
untraceable? Both directions—security and privacy—led to cryptography and a Ph.D. in
|
||
that subject.
|
||
Sometime in 1978, Chaum says, “I had this flash of inspiration that it was possible
|
||
to make a database of people so that someone could not link them all together, yet you
|
||
could prove everything about them was correct. At the time, I was trying to convince
|
||
myself that it was not possible, but I saw a loophole, how you might do it and I thought,
|
||
gee....But it wasn’t until 1984 or ’85 that I figured out how to actually do that. ”
|
||
“Unconditional untraceability” is what Chaum calls his innovation. When this
|
||
code is integrated with the “practically unbreakable security” of a standard public-key
|
||
encryption code, the combined encryption scheme can provide anonymous electronic
|
||
money, among other things. Chaum’s encrypted cash (to date none of the other systems
|
||
anywhere are encrypted) offers several important practical improvements in a card-based
|
||
192
|
||
electronic currency.
|
||
First, it offers the bonafide privacy of material cash. In the past, if you bought a
|
||
subversive pamphlet from a merchant for a dollar, he had a dollar that was definitely
|
||
a dollar and could be paid to anyone else; but he had no record of who gave him that
|
||
dollar or any way to provably reconstruct who gave it to him. In Chaum’s digital cash,
|
||
the merchant likewise gets a digital dollar transferred from your card (or from an online
|
||
account), and the bank can prove that indeed he definitely has one dollar there and no
|
||
more and no less, but no one (except you if you want) can prove where that dollar came
|
||
from.
|
||
One minor caveat: the smart-card versions of cash implemented so far are, alas, as
|
||
vulnerable and valuable as cash if lost or stolen. However, encrypting them with a PIN
|
||
password would make them substantially more secure, though also slightly more hassle
|
||
to use. Chaum predicts that users of digicash will use short (4-digit) PINs (or none at all)
|
||
for minor transactions and longer passwords for major ones. Speculating a bit, Chaum
|
||
David Chaum in his Berkeley home.
|
||
193
|
||
says, “To protect herself from a robber who might force her to give up her passwords at
|
||
gunpoint, Alice could use a ‘duress code’ that would cause the card to appear to operate
|
||
normally, while hiding its more valuable assets.”
|
||
Second, Chaum’s card-based system works offline. It does not require instant verification
|
||
via phone lines as credit cards do, so the costs are minimal and perfect for the
|
||
numerous small-time cash transactions people want them for—parking meters, restaurant
|
||
meals, bus rides, phone calls, groceries. Transaction records are ganged together
|
||
and zapped once a day, say, to the central accountant computer.
|
||
During this day’s delay, it would theoretically be possible to cheat. Electronic money
|
||
systems dealing in larger amounts, running online in almost real time, have a smaller
|
||
window for cheating—the instant between sending and receiving—but the minute opportunity
|
||
is still there. While it is not theoretically possible to break the privacy aspect
|
||
of digital cash (who paid whom) if you were desperate enough for small cash, you could
|
||
break the security aspect—has this money been spent?—with supercomputers. By breaking
|
||
the RSA public-key code, you could use the compromised key to spend money more
|
||
than once. That is, until the data was submitted to the bank and they caught you. For
|
||
in a delicious quirk, Chaum’s digital cash is untraceable except if you try to cheat by
|
||
spending money more than once. When that happens, the extra bit of information the
|
||
twice-spent money now carries is enough to trace the payer. So electronic money is as
|
||
anonymous as cash, except for cheaters!
|
||
Because of its cheaper costs, the Danish government is making plans to switch from
|
||
the Dencard to the Dencoin, an offline system suited to small change. The computational
|
||
overhead needed to run a system like this is nano-small. Each encrypted transaction
|
||
on a smart card consumes only 64 bytes. (The previous sentence contains 67 bytes.) A
|
||
household’s yearly financial record of all income and all expenditure would easily fit on
|
||
one hi-density floppy disk. Chaum calculates that the existing mainframe computers in
|
||
banks would have more-than-adequate computational horsepower to handle digital cash.
|
||
The encryption safeguards of an offline system would reduce much of the transactional
|
||
computation that occurs online over phone lines (for ATMs and credit card checks),
|
||
enabling the same banking computers to cover the increase in electronic cash. Even if
|
||
we assume that Chaum guessed wrong about the computational demands of a scaled-up
|
||
system, and he is off by a factor of ten, computer speed is accelerating so fast that this
|
||
defers the feasibility of using existing bank power by only a few years.
|
||
In variations on Chaum’s basic design, people may also have computer appliances
|
||
at home, loaded with digital cash software, which allow them to pay other individuals,
|
||
and get paid, over phone lines. This would be e-money on the networks. Attached to
|
||
your e-mail message to your daughter is an electronic $100 bill. She may use that cash
|
||
to purchase via e-mail an airplane ticket home. The airline sends the cash to one of
|
||
their vendors, the flight’s meal caterer. In Chaum’s system nobody has any trace of the
|
||
money’s path. E-mail and digital cash are a match made in heaven. Digital cash could
|
||
fail in real life, but it is almost certain to flourish in the nascent network culture.
|
||
I asked Chaum what banks think of digital cash. His company has visited or been
|
||
visited by most of the big players. Do they say, gee, this threatens our business? Or do
|
||
they say, hmm, this strengthens us, makes us more efficient? Chaum: “Well, it ranges. I
|
||
find the corporate planners in $1,000 suits and private dining halls are more interested
|
||
in it than the lower-level systems guys because the planners’ job is to look to the future.
|
||
Banks don’t go about building stuff themselves. They have their systems guys buy stuff
|
||
from vendors. My company is the first vendor of electronic money. I have a very extensive
|
||
portfolio of patents on electronic money, in the U.S., Europe, and elsewhere.” Some
|
||
of Chaum’s crypto-anarcho friends still give him a hard time about taking out patents on
|
||
194
|
||
this work. Chaum tells me in defense, “It turns out that I was in the field very early so I
|
||
wiped out all the basic problems. So most of the new work now [in encrypted electronic
|
||
money] are extensions and applications of the basic work I did. The thing is, banks don’t
|
||
want to invest into something that is unprotected. Patents are very helpful in making
|
||
electronic money happen.”
|
||
Chaum is an idealist. He sees security and privacy as a tradeoff. His larger agenda
|
||
is providing tools for privacy in a networked world so that privacy can be balanced with
|
||
security. In the economics of networks, costs are disproportionately dependent on the
|
||
number of other users. To get the Fax Effect going, you need a critical mass of early
|
||
adopters. Once beyond the threshold, the event is unstoppable because it is self-reinforcing.
|
||
Electronic cash shows all the signs of having a lower critical mass threshold than
|
||
other implementations of data privacy. Chaum is betting that an electronic cash system
|
||
inside an e-mail network, or a card-based electronic cash for a local public transportation
|
||
network, has the lowest critical mass of all.
|
||
The most eager current customers for digital cash are European city officials. They
|
||
see card-based digital cash as the next step beyond magnetic fast-passes now issued regularly
|
||
by most cities’ bus and subway departments. One card is filled with as much bus
|
||
money as you want. But there are added advantages: the same card could fit into parking
|
||
meters when you did drive or be used on trains for longer-distance travel.
|
||
Urban planners love the idea of automatic tolls charging vehicles for downtown
|
||
entry or crossing a bridge without having the car stop or slow down. Bar-code lasers can
|
||
identify moving cars on the road, and drivers will accept purchasing vouchers. What’s
|
||
holding up a finer-grain toll system is the Orwellian fear that “they will have a record of
|
||
my car’s travels.” Despite that fear, automatic tolls that record car identities are already
|
||
operating in Oklahoma, Louisiana, and Texas. Three states in the busy Northeast
|
||
have agreed to install one compatible system starting with experimental setups on two
|
||
Manhattan/New Jersey bridges. In this system, a tiny card-size radio taped to the car
|
||
windshield transmits signals to the toll gate which deducts the toll from your account at
|
||
the gate (not from the card). Similar equipment running on the Texas turnpike system
|
||
is 99.99 percent reliable. These proven toll mechanisms could easily be modified to
|
||
Chaum’s untraceable encrypted payments, and true electronic cash, if people wanted.
|
||
In this way the same cash card that pays for public transportation can also be used
|
||
to cover fees for private transportation. Chaum relates that in his experience with European
|
||
cities, the Fax Effect—the more people online, the more incentive to join—takes
|
||
hold, quickly drawing other uses. Officials from the phone company get wind of what’s
|
||
up and make it known that they would like to use the card to rid themselves of a nasty
|
||
plague called “coins” that bog public phones down. Newspaper vendors call to inquire if
|
||
they can use the card.... Soon the economics of networks begin to take over.
|
||
Ubiquitous digital cash dovetails well with massive electronic networks. It’s a pretty
|
||
sound bet that the Internet will be the first place that e-money will infiltrate deeply. Money
|
||
is another type of information, a compact type of control. As the Net expands, money
|
||
expands. Wherever information goes, money is sure to follow. By its decentralized,
|
||
distributed nature, encrypted e-money has the same potential for transforming economic
|
||
structure as personal computers did for overhauling management and communication
|
||
structure. Most importantly, the privacy/security innovations needed for e-money are
|
||
instrumental in developing the next level of adaptive complexity in an information-based
|
||
society. I’d go so far as to say that truly digital money—or, more accurately, the economic
|
||
mechanics needed for truly digital cash—will rewire the nature of our economy, communications,
|
||
and knowledge.
|
||
195
|
||
Peer-to-peer finance with nanobucks
|
||
The consequential effects of digital money upon the hive mind of our network
|
||
economy are already underway. Five we can expect are:
|
||
• Increased velocity. When money is disembodied—removed from any material basis at
|
||
all—it speeds up. It travels farther, faster. Circulating money faster has an effect similar
|
||
to circulating more money. When satellites went up, enabling near-the-speed-of-light,
|
||
round-the-clock world stock trade, they expanded the amount of global money by 5 percent.
|
||
Digital cash used on a large scale will further accelerate money’s velocity.
|
||
• Continuity. Money that is composed of gold, precious materials, or paper comes in
|
||
fixed units that are paid at fixed times. The ATM spits out $20 bills; that’s it. You pay the
|
||
phone company once a month even though you use the phone everyday. This is batchmode
|
||
money. Electronic money is continuous-flow. It allows recurring expenses to be
|
||
paid, in Alvin Toffler’s phrase, by “bleeding electronically from one’s bank account in
|
||
tiny droplets, on a minute-by-minute basis.” Your e-money account pays for each phone
|
||
call as soon as you hang up, or—how about this?—as you are talking. Payment coincides
|
||
with use. Together with its higher velocity, continuous electronic money can approach
|
||
near instantaneity. This puts a crimp on banks which derive a lot of their current profit
|
||
on the “float”—which instantaneity erases.
|
||
• Unlimited fungibility. Finally, really plastic money. Once completely disembodied, digitized
|
||
money escapes from a single transmission form and merrily migrates to whatever
|
||
medium is handiest. Separate billing fades away. Accounts can be interleaved with the
|
||
object or service itself. The bill for a video comes incorporated into the video. Invoices
|
||
reside alongside of bar codes and can be paid with the zap of a laser. Anything that can
|
||
hold an electronic charge can hold a fiscal charge. Foreign currencies become a matter
|
||
of changing a symbol. Money is as malleable as digitized information. This makes it all
|
||
the easier to monetize exchanges and interactions that were never part of an economy
|
||
before. It opens the floodgates of commerce onto the Net.
|
||
• Accessibility. Until now, sophisticated manipulations of money have been the private
|
||
domain of professional financial institutions—a financial priesthood. But just as a million
|
||
Macs broke the monopoly of the high priests guarding access to mainframe computers,
|
||
so e-money will break the monopoly of financial Brahmins. Imagine if you could charge
|
||
(and get) interest on any money due you by dragging an icon over that electronic invoice.
|
||
Imagine if you could factor in the “interest due” icon and give it variable interest, ballooning
|
||
as it aged. Or maybe you would charge interest by the minute if you sent a
|
||
payment in early. Or program your personal computer to differentially pay bills depending
|
||
on the prime rate—programmed bill-trading for amateurs. Or perhaps you would
|
||
engineer your computer to play with exchange rates, paying bills in whatever currency
|
||
is least valuable at the time. All manner of clever financial instruments will surface once
|
||
the masses can drink from the same river of electronic money as the pros. To the list of
|
||
things to hack, we may now add finance. We are headed toward programmed capitalism.
|
||
• Privatization. The ease with which e-money is caught, flung, and shaped makes it
|
||
ideal for private currencies. The 214 billion yen tied up by Japan’s NTT’s phone cards
|
||
is one limited type of private currency. The law of the Net is: he who owns a computer
|
||
not only owns a printing press, but also a mint, when that computer is linked to e-money.
|
||
Para-currencies can pop up anywhere there is trust (and fail there, too).
|
||
196
|
||
Historically, most modern barter networks rapidly slide into exchanges of real currency;
|
||
one could expect the same in electronic barter clubs, but the blinding efficiency
|
||
of an e-money system may not tend that way. The $350 billion tax question is whether
|
||
para-currency networks would ever rise above unofficial status.
|
||
The minting and issuing of currency has been one of the few remaining functions
|
||
of government that the private sector has not encroached upon. E-money will lower
|
||
this formidable barrier. By doing so it will provide a powerful tool to private governance
|
||
systems, such as might be established by renegade ethnic groups, or the “edge cities”
|
||
proliferating near the world’s megacities. The use of institutional electronic money transfers
|
||
to launder money on a global scale is already out of anyone’s control.
|
||
Fear of underwire economies
|
||
The nature of e-money —invisible, lightning quick, cheap, globally penetrating—is
|
||
likely to produce indelible underground economies, a worry way beyond mere laundering
|
||
of drug money. In the net-world, where a global economy is rooted in distributed
|
||
knowledge and decentralized control, e-money is not an option but a necessity. Paracurrencies
|
||
will flourish as the network culture flourishes. An electronic matrix is destined
|
||
to be an outback of hardy underwire economies. The Net is so amicable to electronic cash
|
||
that once established interstitially in the Net’s links, e-money is probably ineradicable.
|
||
In fact, the legality of anonymous digital cash is in limbo from the start. There are
|
||
now strict limits to the size of transactions U.S. citizens can make with physical cash;
|
||
try depositing $10,000 in greenbacks in a bank. At what amount will the government
|
||
limit anonymous digital cash? The drift of all governments is to demand fuller and fuller
|
||
disclosures of financial transactions (to make sure they get their cut of tax) and to halt
|
||
unlawful transactions (as in the War on Drugs). The prospect of allowing untraceable
|
||
commerce to bloom on a federally subsidized network would probably have the U.S.
|
||
government seriously worried if they were thinking about it. But they aren’t. A cashless
|
||
society smells like stale science-fiction, and the notion reminds every bureaucrat drowning
|
||
in paper of the unfulfilled predictions of a paperless society. Eric Hughes, maintainer
|
||
of the cypherpunks’ mailing list, says, “The Really Big Question is, how large can the
|
||
flow of money on the nets get before the government requires reporting of every small
|
||
transaction? Because if the flows can get large enough, past some threshold, then there
|
||
might be enough aggregate money to provide an economic incentive for a transnational
|
||
service to issue money, and it wouldn’t matter what one government does.”
|
||
Hughes envisions multiple outlets for electronic money springing up all over the
|
||
global net. The vendors would act like traveler’s check companies. They would issue
|
||
e-money for, say, a 1 percent surcharge. You could then spend Internet Express Checks
|
||
wherever anyone accepts them. But somewhere on the global Net, underwire economies
|
||
would dawn, perhaps sponsored by the governments of struggling developing countries.
|
||
Like the Swiss banks of old, these digital banks would offer unreported transactions.
|
||
Paying in online Nigerian nairas from a house in Connecticut would be no more difficult
|
||
than using U.S. dollars. “The interesting market experiment,” Hughes says, “is to see
|
||
what the difference in the charge for anonymous money is, once the market equalizes. I
|
||
bet it’ll be on the order of 1–3 percent higher, with an upper limit of about 10 percent.
|
||
That amount will be the first real measure of what financial privacy is worth. It might
|
||
also be the case that anonymous money will be the only kind of money. ”
|
||
197
|
||
Usable electronic money may be the most important outcome of a sudden grassroots
|
||
takeover of the formerly esoteric and forbidden field of codes and ciphers. Everyday
|
||
e-money is one novel use for encryption that never would have occurred to the military.
|
||
There are certainly many potential uses of encryption that the cypherpunks’ own
|
||
ideological leanings blind them to, and that will have to wait until encryption technology
|
||
enters the mainstream—as it certainly will.
|
||
To date encryption has birthed the following: digital signatures, blind credentials
|
||
(you have a diploma that says, yes, you have a Ph.D., yet no one can link that diploma
|
||
with the other diploma in your name from traffic school), anonymous e-mail, and electronic
|
||
money. These species of disconnection thrive as networks thrive.
|
||
Encryption wins because it is the necessary counterforce to the Net’s runaway
|
||
tendency to link. Left to itself, the Net will connect everyone to everyone, everything to
|
||
everything. The Net says, “Just connect.” The cipher, in contrast, says, “Disconnect.”
|
||
Without some force of disconnection, the world would freeze up in an overloaded tangle
|
||
of unprivate connections and unfiltered information.
|
||
I’m listening to the cypherpunks not because I think that anarchy is a solution to
|
||
anything but because it seems to me that encryption technology civilizes the grid-locking
|
||
avalanche of knowledge and data that networked systems generate. Without this taming
|
||
spirit, the Net becomes a web that snares its own life. It strangles itself by its own prolific
|
||
connections. A cipher is the yin for the network’s yang, a tiny hidden force that is able to
|
||
tame the explosive interconnections born of decentralized, distributed systems.
|
||
Encryption permits the requisite out-of-controllness that a hive culture demands in
|
||
order to keep nimble and quick as it evolves into a deepening tangle.
|