This article recently ran in Die Zeit in Germany about Cyber Punks. I was ofcourse misquoted in the article, see my detraction about what was wrong: http://talk.org/archives/000193.html
http://www.zeit.de/2003/50/Cypherpunks (original in German) http://talk.org/archives/000211.html (This Translation. CYBERSPACE The pirates of the 21st century Fighting against terror, police and secret services are establishing the surveillance state. But a group of computer geniuses is waging data war on authorities. A report from the world of encrypted messages. By Thomas Fischermann (translated by Veronika Leluschko) The art of power is the art of disappearing. (Paul Virilio) The computer in the ZEIT office just reported the reception of a town clerkâs e-mail. That man is an important informer for this story. One who has a certain reputation among the cryptographers, the inventor and user of electronic hiding and encrypting techniques. But that town clerkâs e-mail cannot simply be opened by clicking on it. It took a couple of minutes until the computer was accepted in the âLasseiz Faire Cityâ, an underground network, hiding deep underneath the surface of the internet, only to be entered with the right code words. On first sight, the Lasseiz Faire City doesnât look different from many other websites on the internet. One may send e-mails, post messages on a message board and visit chatrooms. But here, different form the usual internet, surfers can be assured of their anonymity. Nobody will intercept their messages. A series of techniques, some 25 years ago only available to secret services, encrypt electronic messages beyond recognition, let them dash around the globe as supposedly meaningless data dust, covering over all traces on their long journey. The town clerkâs message starts with âaANQR1DBw04D/NSEz31qI+8QEADwytYâ, thatâs âCyphertextâ. A mathematically encrypted message, only to be read by its receiver. A few mouse clicks, a password, and finally something readable appears on the screen. âThomas, let me think about those questions. Iââl get back to you tomorrow.â Welcome to the mysterious world of Cypherpunks! It was in May 1992, when Eric Hughes went to see his friend Tim May in Santa Cruz, California â and ended up staying there for three days, chatting away. That time, Hughes was in his late 20s and a gifted mathematician from UC Berkeley; May was 10 years older, a former physicist at the Intel chip company, having âretiredâ a couple of years ago thanks to a huge shareholder package. It was obvious that the two scientists got along together well: they shared a similar taste for Western gear and cool sunglasses, a fascination for computer techniques and more than a healthy amount of paranoia. Most of all, they shared political convictions. Both regarded themselves associated with the libertarians, the supporters of an ultraliberal ideology, quite widely spread among the white American middle class. Libertarian Americans are facing the state in a particularly sceptical way, which concerns police as well as tax-collectors. Many of them would like to completely abolish states including their taxes and authorities and leave the power to the free market. That was the vigorous subject the two friends were discussing during their talk marathon that month of May. It wouldnât be worth mentioning if the duo hadnât been convinced of holding the key to their political dreams in their own hands. In fall 1992, May and Hughes created a loose association of like-minded people which lead to one of the most unusual â and most obscure political movements of all times. They called themselves Cypherpunks, based on a science fiction style that had become popular around the end of the 19th century. They were a conglomeration of highly decorated scientists and dreamers, computer geniuses and political activists, lawyers and also criminals. They wanted to be rebels in cyberspace, those guys in sneakers and T-Shirts wanted to change the world, using their laptops as weapons. They would gather for fortuitous âphysical meetingsâ, their Cypherpunk mailinglist would raise to one of the hottest internet debating places with almost 2000 subscribers. They wanted to be the technical elite, creating the infrastructure for a utopian, lawless cyberspace. And today, just 10 years later and after the terror attacks of 9/11, some of them see their hour come: as the last bastion against a society of surveillance. In the early 90s, the internet economy as we know it today, was still in its infancy. But among the techniciansâ avantgarde Hughes and May frequented, visions of a a digital future had already quite progressed: People on the American west coast were already discussing how electronic mail would replace all paper mailings in and between companies, that all money and shares transfers should be moved from classical banking to cyberspace, that products such as music, movies and news should, one day, only be delivered via data processing. More and more parts of our work and spare time would happen in front of a screen. That time, a hand full of books and essays appeared, like âThe sovereign individualâ, describing someone who organizes his life and business in cyberspace, allowing no state to govern him. An organization called Laissez Faire City opened a provisional office in Costa Rica, wanting to offer some sort of virtual citizenship. Political terms like cyberanarchy and virtual regions managed to make their way into seminars of political sciences and law schools. Wasnât it a childrenâs game to smuggle all those data, messages and products past governmental eavesdroppers and controllers, past all those police, tax-collectors and customs officials? Would such an unregulated, lawless cyberspace be able to force the hated states to their knees? One might have thought about such ideologies what he wanted. Tim May once openly declared that cryptography would also be advantageous for murderers and terrorists, for racists, kidnappers and hijackers. That would be the inevitable and necessary evil side of the new freedom, he said. âCypherpunks break the laws they donât likeâ, the founders autocratically wrote in one of their pamphlets. But, one way or the other, it seemed to be technically feasible to the experts and even unavoidable. In the 70s and 80s, methods for extreme data encryption had already slipped out of the hands of the secret services. Powerless, military and police could only watch how programmes like Pretty Good Privacy (PGP) were spread all over the world in the 90s, unable to be hacked with acceptable effort and expense - not even with the help of the secret servicesâ own supercomputers. âCypherpunks will write programsâ, so Eric Hughesâ battle cry which he wrote in a manifesto of the newly founded group. They would establish secret electronic mailboxes, found electronic banks and deal with electronic money, simply create a network of highly encrypted communication. âThe change will not arise in a political but in a technical wayâ co-founder Tim May added. âGovernments in the industrial world, you tired giants made of flesh and steelâ. This is how, a couple of years later, John Perry Barlow began his Declaration of Independence in Cyberspace. The rancher, former Grateful Dead songwriter and passionate fighter for civil rights had become an icon of the movement. âWhere we gather, you have no sovereignty anymore.â Lima, May 2003. Caryn Mladen had prepared her trip to Peru perfectly. Her luggage looked quite unusual for a Canadian tourist, though: laptops, adapters, computer software. A list with names of groups of the civil rights movement that have gotten in trouble with police or political opponents. âPeru has a history as a particularly well organized surveillance stateâ, says the 38-year-old lawyer from Toronto, telling about her 2.5 week long undercover trip. âAlthough itâs now a democratic country, many old forces are still working. Nobody knows if the old surveillance systems are still in use and who uses them.â Ms Caryn is a computer expert with extensive knowledge of data protection. She has written books about computers and is the author of a news column. She has hitch-hiked through Africa and travelled Syria during the first Gulf War (âI felt safer there than in New York Cityâ) and studied massage techniques from the Far East. Recently, she says, âI just needed something new, a new challenge. Then, in December 2001, it just happened.â They were five like-minded people, all of them fascinated by data protection and encryption techniques. Three lawyers, a medical doctor and a computer specialist with contacts to the Cypherpunk scene. They called themselves Privaterra and wanted to do foreign (development-) aid in an unusual way. They would provide civil rights fighters in developing countries with modern instruments of encryption techniques - the weapons of the Crypto movement. Meanwhile the group has been to several countries in South- and Central America, like-minded people in various African countries. âThe needs are often very different,â says the activist, âmany groups have such little technical knowledge, they first of all need things like a virus protection program.â Computers, e-mail and the internet have, for a long time, become an indispensable tool for human rights fighters all over the world - an indispensable tool in the search for political prisoners and for coordinating campaigns. The disadvantage is, though, that these organizationsâ computers now host the addresses of activists, confidential mail and other body of evidence. Ms Caryn and her friends have taught dozens of civil rights fighters how to encrypt such data, how to hide them on the hard disk or stock them in a safe place in the far cyberspace - just in case that a computer gets confiscated by the police or disappears in a âburglaryâ. They taught civil rights fighters how to protect themselves from being attacked by hostile hackers who often also work for secret services. They taught them how to encrypt messages and how to find their way into secret communication networks, cleverly installed underneath the surface of the internet by crypto activists, instead of sending a regular e-mail that can be read by everybody like a postcard. âWho are the opponents weâre fighting against?â A question Ms Caryn has asked frequently. She didn't always get an answer. Sometimes itâs governments, sometimes former governmentsâ loyal members who continue working underground. Privaterra is helped by amnesty international, Human Rights Watch and other human rights movements when choosing their âclientsâ to make sure that the instruments arenât handed over to the wrong people. About ten years after the Cypherpunksâ foundation meeting some of their political dreams have come closer to reality than ever before. Data encryption that no curious state official can hack anymore, in Peru or at the American snooping service NSA? Many such techniques are today available for everybody on the internet. Software forges like Martus Software or Hacktivismo have even written custom-made programs on the internet for political activists and civil rights movements. Nonetheless Caryn and her traveling data rebels had to make a painful recognition: The technology might work, but a much bigger problem is the application. âThose people are no computer experts, and we canât make them computer expertsâ says Caryn. âBut these groups cannot risk to make mistakes - their communication has to be 100% bugproof.â âMost of the people we work with have extremely good reasons for privacyâ she says. Death threats, unannounced raids in dawn, unexplained burglaries in the organizationsâ offices. A Privaterra âclientâ, âsomewhere in Central Americaâ, was later found murdered. Only a couple of weeks ago, the Vietnamese activist Pham Hong Son was sentenced to 13 years in jail for âespionageâ because he had exchanged e-mails with international democracy groups. âThis is not an amusing adventure, most of all we have to be careful not to harm anybodyâ, says one of Carynâs co-workers. A couple of years ago, when China built a wall around the entire Chinese internet and had police control all internet cafÃs in Peking, a team of Cypherpunks immediately wrote a program to break through the virtual wall. But after a short time of enthusiasm they withdraw it, because the use of the program left suspicious traces on the internet - which represented an even bigger source of trouble. Las Vegas, August 2003. Once a year the walls of the Alexis Park Congress Center are covered with black cloth. Bouncers guard the doors, the police sends out special forces and allegedly even international secret services reconnoitre the terrain. A motley crowd of hackers invades the Nevada desert: itâs DefCon, the biggest convention for all those who know about penetrating othersâ computer systems. Hordes of computer geeks populate the congress halls and the deck chairs around the swimming pool, pale guys in T-Shirts and enormous sandals, trendy hipsters with fantasy haircuts. Many of the guests still have quite pimpled faces. Computer kids. The speaker entering the stage is in his late 30s. Wearing a suit and T-Shirt and a gray floppy hat he may not quite fit into the surrounding. Also his public is older and more serious looking than the huge amount of computer kids. In the middle row a few FBI agents have mingled with the public, expectantly folding their arms. No surprise considering the title of his speech: Punish the collaborators! is Bill Scannellâs subject. He is a veteran on these meetings: a confessed Cypherpunk, although not very knowledgeable in technology. The power-speaker and chainsmoker Scannell has become famous as the mouthpiece of a bunch of cryptography companies - for example The Bunker, the company who bought an entire nuclear blast-proof bunker in the West of England and, since then, extols it as a particularly safe data storage place. Today he is playing his preferred role: the self-declared civil rights fighter and troublemaker. âWe must prevent George Bush and John Ashcroft from making the US a society of observation and surveillanceâ says Scannell. He quickly talks himself into a fury and receives mixed reactions - defiant applauding, a few outraged listeners are leaving the conference hall. âWe must make life hell for those who want to take away the freedom of our constitution from us!â Maybe itâs due to Bill Scannellâs personal history that he is so concerned about privacy and data protection. Scannell has worked as a spy in East-Berlin, then as a journalist in countries formerly belonging to the Eastern bloc. He claims having experienced âhow things are going in totalitarian countries. I was always proud of the freedom an American enjoys in America.â When, in February, the American airline Delta offered to test an extensive passenger surveillance system of the American government âI blew a fuseâ, says Scannell. A few days later he started a protest-website, requesting boycott and attacking personally the Delta chief manager; he toured American talk shows and attended the Delta general meeting. The company ended up withdrawing its original plan. At the moment he is working on a similar website against the flight booking system Galileo. âThese things donât help at all to fight terrorismâ Scannell says. âThey are an instrument of prosecutors for all kind of goals.â Scannell claims it a âfundamental rightâ to travel through the country without being detected. This has become more difficult since the terror attacks, but, when he has enough extra-time for his check-in, he quarrels with the security staff; he gets a kick out of buying a bus- or railway ticket under a false name (âJoe Cypherpunkâ). âRecently I was at the airport, talking to my sister on the phone, about politics, and I spoke out clearly some personal points of viewâ he says. âThen I noticed everybody was staring at me as if I were a terrorist. That moment I realized that, in this country, we are beginning to be afraid to speak out freely what we think.â The early Cypherpunks considered it a law of nature that the internet era will simply deprive the authorities of power, that, one day, they will just capitulate and be quiet. But two years after 9/11 the âtired giants of flesh and steelâ are regaining their strength. Only a few weeks after the terror attacks Bush arranged for new laws. He even established an âAdministration for Cyberspace Securityâ. Rumors could be heard that encryption techniques deriving from hacker and cypherpunk forges had helped bin Ladenâs kamikaze pilots plan their attacks, that people like the Cypherpunks were even partially responsible for 9/11. It is, of course, an old contentious issue in the debate about data protection if encryption techniques are in fact a civil right or only a support for terrorists, rascals and drug dealers, if they are a modern equivalent for a sealed envelope or a âproduct equivalent to weaponsâ, as the US government decided at times. Is there a perfect balance between freedom and security? The core around Tim May and Phil Zimmermann, the inventor of the encryption program PGP, stuck to it after 9/11: protection for criminals and terrorists is a necessary price to pay. Nobody could stop the movement anyway. And werenât there enough legitimate applications for the new technology? Protection for âcypher dissidentsâ in China or Burma â and even in America, where, for example, some groups are planning to publish the names of âmissing peopleâ in GuantÃnamo Bay, fearing political repercussions, who knows whether they are right or wrong? âIf cryptography is prohibited, then only the criminals have cryptographyâ Phil Zimmermann occasionally declared succinctly. After 9/11 and the following hunt for more security, such remarks hardly found sympathizers. Many law keepers and security services sensed their chance to create facts. Step by step the rights of police and secret services to tap phone calls are extended, authorities connect their data banks, more and more they are given the right to access data banks of private companies â in America, in Europe and in other parts of the world. âFew people have understood that a surveillance like in Orwellâs Big Brother isnât reduced to the world of books and movies anymoreâ says Barry Steinhart, the data protection expert of the civil rights movement Civil Liberties Union. However, it was not the first shock of 9/11 burying the Cypherpunk foundersâ mantra of the âinevitabilityâ of unlimited privacy. It was the technical development itself. The explosive spreading of computer technology and internet in the industrial countries was followed by an explosion of spying programs, an explosion of surveillance cameras in streets and on airports, biometrical recognition techniques and loads more of other technologies. More and higher performing computer systems apparently became the snoopersâ advantage. Never before companies, national authorities and obstinate internet researchers could find out so much about anyone â thanks to the internet that once should bring unlimited freedom, as Cypherpunks had been dreaming. âYou have zero privacy anywayâ, Scott McNealy, head of the Californian computer company Sun Microsystems said a couple of years ago. âDeal with it.â New York City, October 2003. The head waiter lifted his eyebrows for a second as Jo, John and Sean entered his noble seafood restaurant in sneakers and casual outfit. The three people in their mid-thirties and with gawky Westcoast attitude look a bit different from the serious business people who usually have lunch here. But how can the waiter know that he is confronted with three future government leaders? âHas the dream of an anonymous, stateless Cyberspace burst?â Thatâs the question Sean asks. Leaning back, he repeats the sentence, then takes a moment of reflection. Sean is clearly the man for the big answers, heâs the leader of the group. A stocky young guy with a fat, round face. "Itâs all there, burglar-proof mathematical proceedings, anonymous e-mail-programs, anonymous websurfing, even anonymous exchange platforms. But one of the big problems is: Nobody uses these things! They are only reserved for a small elite.â When Sean Hastings speaks about a small elite one thing is clear: he himself and his friends count among them. Hastings is a Cypherpunk. None of the sworn founding members, but a gifted young computer programmer with a rebelâs heart, who would just love to scare the hell out of the nation-states. âBut, donât write that Iâm a Cypherpunkâ he corrects immediately. âI donât like to be put in a drawer. Just write that I sympathize pretty much with the Cypherpunksâ philosophy.â Hastings has reached cult status. In the late 90s he found an old book called How to start your own country. A couple of months later he bought a number of computer servers and installed them on a rusty air defense station from WWII, a few miles from the East coast of England (in the middle of the North Sea), opening the âfirst public data paradise in the worldâ. Hastings claimed that these computers were not controlled by anybody. In 1967, the retired officer Paddy Roy Bates âconqueredâ and declared independent the deserted military station. Bates once expelled the Royal Navy with well-aimed shots across the bow. (here is a pun which cannot be translated. T.F. writes âSchÃsse vor den Bugâ, which literally means âshots against the bowâ, but mainly âto severely offend someoneâ.) Since then, Bates considers himself âPrince of Sealandâ and, for a couple of years, Hastings was his official national entrepreneur. Hastings, his wife Jo and a hand full of seamen hackers squeezed themselves into windowless cabins, and they all were very discreet. The Prince kept his paws off the computers and Hastings told nobody who used his servers to stock data base and websites. After all, Sealand was supposed to guarantee absolute data inviolability for the first time in history. âThroughout many discussions we had agreed that an anonymous cyberspace needs a certain amount of physical safety,â says Hastings. It may be more and more difficult to hack encrypted messages, electronic âmagic hatsâ may become more and more efficient. But somewhere in the world, on some computer, all these secret data must be stored and be fed into the internet. Somewhere out there the worldâs mystery-mongers are sitting in front of their computers, knowing how to get to see their messages in plain text â discreet and secluded entrepreneurs from Kiev, tax evaders from the USA, secret online gamblers from Brussels, unfaithful guys from Vienna, dealers of illegal nude pictures from Bogotà and drug dealers from Lucerne. And everywhere unpleasant states can cut off lines, confiscate hard disks or sentence their owners to hand out keys. When a couple of years ago, during the Internet security fair RSA, a young blasà programmer was listing all the âultrasafeâ protection programs of his computer, one of the police representatives blew his top: âSo what if I kick down your door and hold a gun to your head? Are your data still safe then?â Even Sealand, says Hastings, couldnât have made the Cypherpunksâ dreams safe and secure. âIt only really works when we have computers all over the world and distribute encrypted data in little bits on all those systems.â Thatâs why he is already planning a new data paradise: a gigantic swimming island in the international waters near Gibraltar. âMaybe we establish a completely new form of life down thereâ he dreams. He has created a website about âLife on the seaâ. Details about the business plans are not yet available, but Hastings says he has already hired engineers and found financing sources. The young nation would also have âarms for self-defenseâ on board. âWater-to-air-rocketsâ she will employ, says his wife Jo and laughs. A joke? Thatâs not really clear. âBy the way, Iâm not gonna move thereâ Jo adds, and Sean nods with a sour grin. Obviously this is not the first time the subject is discussed controversially at the Hastingsâ. âSheâll probably come to visit, Sean says.â Back in the Sealand cabins, the stateless guys had to shower with caught rain water for months, for security reasons they never could sleep on deck and the steady buzzing of the diesel generators made sleep almost impossible. âAfter Sealand Iâve got all I ever needed concerning life on weird marine constructionsâ says Jo. How about crypto rebels who donât live on far-away islands or rusty platforms in the ocean? What do they do? Several of his colleagues say that Tim May has withdrawn from public and now lives as a bearded hermit, owning an impressive arsenal of weapons -â a statement May neither denies nor confirms. A well-known crypto-pioneer from the American East coast is said to do additional work for the Mafia, providing them with programs for highly encrypted and unforgeable betting systems. The Cypherpunk founding member Jim Bell from Vancouver even became the first official âcrypto criminalâ in 2001: A judge decided that Bellâs confused essay with the title âAssassination Politicsâ was tantamount to a call for attacks. Bell had developed an encrypted betting system with digital currency and guaranteed anonymity. Participants could guess the decease of certain tax officers in the Vancouver area; the one who came closest to the actual time of death won the jackpot. âMany (Cypherpunks) arenât even connected anymore to the libertarian ideologyâ, says an insider. âThe only thing they have in common seems to be the conviction that data protection is a good thing.â Numerous Cypherpunks donât even call themselves Cypherpunks anymore, also for the weird self-portrayal of some of the founders. Some of the rebels even seem rather bourgeois today. There are a couple of companies offering programs and systems for anonymous websurfing and e-mailing, safe from being spied by authorities and employers and protected against the maniac data collecting as it is done by advertising companies. Those systems are developed with the crypto rebelsâ technologies and sometimes operated by confessed Cypherpunks. They have names like Zero Knowledge, Hushmail, Anonymizer or ZipLip. A New Yorker company called iPrivacy even wanted to anonymize the trade of goods on the internet; the clients could have done their shopping on the internet without delivering their identity, with iPrivacy organizing the transactions and shipment anonymously. Not even the delivering companies would have known a clientâs identity. But meanwhile iPrivacy has gotten bankrupt, many of such companies are having severe economic difficulties, due to the low demand for their supplies. Due to that situation, a number of activists associated with the Cypherpunks have, during the last years, switched from programming to debating. âMany Cypherpunks have become missionaries, seeing themselves as educators, their task being the enlightenment of the public,â says a founding member. Meanwhile there is a huge amount of academic projects, such as the OpenNet initiative at Harvard, Cambridge and the University of Toronto: they regularly produce a summary about internet censorship all over the world. The Electronic Frontier Foundation (EFF), founded in 1990 by a hand full of encryption activists, is today a political think tank and one of the loudest voices when it comes to debating data protection in the USA. The group also employs lawyers to help hackers, data protectors and encryption artists â and forced American secret services to hand over encryption techniques or to take them off their list of âweaponsâ banned from export. For most private users the data protection programs are still too expensive and too complicated. The company Anonymizer in San Diego asks $30 or more per year for âanonymous websurfingâ -â with the disadvantage that web pages take longer to load, in many situations a couple of extra clicks are necessary. Easy to use music exchange programs like Napster and Kazaa have enormous success, whereas complicated Cypherpunk alternatives like Moio Nation never really caught on. Is the data protectorsâ cause rather a cultural than a technical task? âMost people still accept the internet the way it isâ says John Perry Barlow, author of the above mentioned âDecleration of Independence in Cyberspaceâ. âWe still donât have the killer applicationâ adds Lee Tien, a law expert at EFF. Panama City, October 2003. Sandy Sandfortâs office is located in a white painted apartment building with rows of balconies. Sandyâs balcony can easily be made out from the sidewalk: the one with the gigantic satellite dish in front of the window. Sandy Sandfort is in sunny Panama City for work, not for vacation. âVerax Inc.â says the sign at his door. Inside the bare room a few desks, a couch, a number of computers, a buzzing fan. âWeâre a post-venture-capital-businessâ, says the director of the company and laughs. A company that has got no starting capital except for the money Sandy raised on a private basis. If things go as planned, Sandy Sandfort expects to make history in his spartan office. A new payment system for online purchases is supposed to arise in Panama City. A kind of central bank with a new kind of electronic money, permitting superdiscreet, supersafe payments via internet. One of the oldest dreams of the Cypherpunk community is planned to become real â economic freedom on the internet. Sandy Sandfort is today 57 years old. He has worked as a lawyer in Arizona and as an English teacher. In Costa Rica he was the star of a soap opera (âI was the bad guyâ). He was also part of the first members of the Cypherpunk movement. Since last year he lives in Panama, and he had good reasons for moving there: The payment system he intends to create could never be run legally in the USA. New payment systems for the internet â for activists of encryption techniques this has always been considered the royal discipline. Loads of web pages have been filled with concepts for a new currency, with the Internet-Dollar and eGold, with pre-paid internet currency to be bought at kiosks and elaborate money laundering methods. They were supposed to put an end to the control by tax offices and other authorities. Numerous elegant schemes for virtual exchange circles and digital cash have been developed for a long time, many of them are considered more elegant and better thought-out than Sandyâs Neuclear system. But: they never were of economic success. Sandy sees his advantage in a different aspect: beside the payment system, his Verax Inc. includes its own âkiller applicationâ. Sandy Sandfort also knows quite well the gambling scene â not the traditional Roulette or Canasta in casinos, but cyber-gambling on the internet. For many years gambling websites have been part of the most important income sources in the digital economy, but they have one problem: in many countries they are illegal. Many criminal prosecutor offices, among them those in the USA, search their citizensâ credit card billings for suspicious transactions with cyber casinos. No surprise that many gamblers all over the world are longing for an alternative. âWe want to become the new payment system on the internetâ, says Sandy Sandfort, rocking back and forth on his rickety desk chair as if suddenly he couldnât wait for things to happen. âA system people donât have trouble with when purchasing gambling chips, weapons or whatever it may be.â Simply spoken: clients will transfer money to Verax, via bank, postal money order or even in cash. Verax grants them funds and, from this time on, they can start gambling in online casinos. In Panama there is no law prohibiting this procedure. Only Sandfort and his colleagues will know a gamblerâs real identity; new crypto-technologies will make sure that the gamblerâs anonymity is guaranteed and prevent from fraud. But what happens if, one day, the American authorities forbid money transfers to Verax as they forbad transfers to casinos in the past? Sandy laughs. âThatâs why we want to make sure as soon as possible that our payment system is accepted by as many online dealers as possible, also by hotels, travel agencies, maybe one day even by Amazon.com. Our system will make it impossible to retrace on what exactly a client spent his money. He always can deny having spent it on cyber gambling.â Once the payment system is running, Sandfort perhaps wants to licence it for other providers. His programmer, Pelle, a 33-year-old Dane, has already developed plenty of ideas on the subject. âNeuclear works like very old exchange systems, but is operated with high-tech-methodsâ, he says. âTheoretically, you can create any kind of currency with this system. If you want to, create a cyber currency, based upon gold as security. Or, even better, on opium. I would laugh my head off if someone would try thatâ. A joke. Pelle is already working on a version of his banking program that isnât placed on only one computer, but distributed on many, many single computers all over the world. Once that works, which banking laws could be applicable here after all? Is this the hour of birth of perfect digital financial oases in cyberspace? Parallel economic areas, where all trade and gambling business can be hidden for good? âWell, you know, thatâs the problem with all Cypherpunks,â says Sandy Sandfort. âThey have this vision of totally disappearing in a parallel world. Most of the time the world doesnât work that way.â Sandfort walks over to his desk and points at the ceiling: âLook, I could sit right here with the best and most secure software in the world -â and then some spy or the police could have built a tiny little camera in the lamp, recording everything I write. Believe me, we will continue making progress, but youâll never be completely invisible in cyberspace.â  DIE ZEIT 12/04/2003 No.50 -- http://talk.org + Live and direct from Panama http://neuclear.org + Clear it both ways with NeuClear --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]