Publication Cover
Internet Histories
Digital Technology, Culture and Society
Volume 5, 2021 - Issue 2
930
Views
8
CrossRef citations to date
0
Altmetric
Research Article

Against technocratic authoritarianism. A short intellectual history of the cypherpunk movement

Pages 101-118 | Received 25 Oct 2019, Accepted 14 Feb 2020, Published online: 02 Mar 2020

References

  • Assange, J. (2012). Cypherpunk. New York, NY: OR Books.
  • Bartlett, J. (2016). From the Dark Net: Inside the digital underworld. New York, NY: Melville House.
  • Bentham, J. (1993). Official aptitude maximized; expense minimized: The collected works of Jeremy Bentham (Vol. 18). Oxford: Clarendon.
  • Berlan, A. (2019). Snowden, Constant, et le sens de la liberte a lheure du desastre. Terrestrial. Retrieved from https://www.terrestres.org/2019/12/20/snowden-constant-et-le-sens-de-la-liberte-a-lheure-du-desastre/
  • Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030–1044. doi:10.1145/4372.4373
  • Chomsky, N., & Foucaut, M. (2006). The Chomsky-Foucault debate: On human nature. New York, NY: The New Press.
  • Cohen, R., & R. E. Zelnik (Eds.) (2002). The free speech movement: Reflections on Berkley in the 1960s. Berkeley, CA: University of California Press.
  • Cohen, R. (2009). Freedom’s Orator: Mario Savio and the Radical Legacy of the 1960s (Oxford: Oxford University Press).
  • Cohen, R. (Ed.) (2014). The essential Mario Savio. Speeches and writings that changed America. Berkeley, CA: University of California Press.
  • Conder, J. (2018). Cypherpunk revolution: A bitcoin and blockchain primer. Amazon Digital Services.
  • Dahlberg, L. (2010). Cyberlibertarianism. In Oxford research encyclopedia of communication. Retrieved from http://oxfordre.com/communication/view/10.1093/acrefore/9780190228613.001.0001/acrefore-9780190228613-e-70. A previous version was published as “Cyberlibertarianism 2.0: A discourse theory/critical political economy examination”. Cultural Politics, 6(3), 331–356.
  • Foley, M. S. (2014). Dead Kennedys’ fresh fruit for rotting vegetables. Oakland, CA: PM Press.
  • Galbraith, J. K. (1958). The affluent society. Boston, MA: Houghton Mifflin Harcourt.
  • Gibson, W. (1984). Neuromancer. New York, NY: Ace Science Fiction.
  • Gilmore, J. (n.d). Retrieved from http://www.toad.com/gnu/
  • Goines, D. L. (1993). The free speech movement: Coming to age in the 1960’s. Berkeley, CA: Ten Speed Press.
  • Green, L. (2018, December 15). Lucky Green is feeling sad. Facebook. https://www.facebook.com/lucky.green.73/posts/10155498914786706.
  • Hartz, L. (1955). The liberal tradition in America: An interpretation of American political thought since the revolution. San Diego, CA: Harcourt, Brace, and Howe.
  • Hughes, E. (1993). A Cypherpunk Manifesto.
  • Levy, S. (1993). Crypto Rebels, Wired, 02.01. Retrieved from https://www.wired.com/1993/02/crypto-rebels/
  • Levy, S. (2001). Crypto: How the code Rebels beat the government saving privacy in the digital age. New York, NY: Random House.
  • Levy, S. (2010). Hackers: Heroes of the computer revolution. Sebastopol, CA: O’Reilly Media, 25th anniversary edition.
  • Lucas, S. E., & Medhurst, M. J. (2009). Worlds of a century: The top 100 American speeches, 1900–1999. New York, NY: Oxford University Press.
  • Ludlow, P. (Ed.) (2001). Crypto anarchy, cyberstates, and pirate utopias. Cambridge, MA: MIT Press.
  • Manne, R. (2015). Cypherpunk revolutionary: On Julian Assange. Black Inc.
  • May, T. C. (1994). Cyphernomicon.
  • May, T. C. (1988 and 1992). The Crypto Anarchist Manifesto.
  • May, T. C. (2001). True Nyms and crypto anarchy. In J. Frenkel (Ed.), True names: And the opening of the cyberspace frontier (pp. 33–87). New York, NY: Tor Books.
  • Milhon, J., & Sirius, R. U. (1997). How to mutate & take over the world: An exploded post-novel. London: Random House.
  • Moretta, J. A. (2017). The hippies, A 1960s history. Jefferson, NC: McFarland & Co.
  • N.D. (1964). Harvard Crimson, December 15.
  • Rid, T. (2016). Rise of the machines: A cybernetics history. Brunswick, VIC: Scribe Publications.
  • Roszak, T. (1969). The making of a counter culture. Berkeley, CA: University of California Press.
  • Savio, M. (1965). California’s Angriest Student, Life, February 26, pp. 100–101.
  • Shire, P. (2007). Hippies of the religious right. Waco, TX: Baylor University Press.
  • Sirius, R.U. (2013). Cypherpunk rising: WikiLeaks, encryption, and the coming surveillance dystopia. La Verge, March 7. Retrieved from https://www.theverge.com/2013/3/7/4036040/cypherpunks-julian-assange-wikileaks-encryption-surveillance-dystopia
  • Skinner, B. F. (1948). Beyond freedom and dignity. New York, NY: Knopf/Random House.
  • Skinner, B. F. (1971). Walden two. Indianapolis, IN: Hackett Publishing Company.
  • Spinrad, N. (1986). The neuromantics. Issac Asimov’s Science Fiction Magazine, May, pp. 180–191.
  • Talbot, D. (2013). Enchantment, terror, and deliverance in the city of love. New York, NY: Free Press.
  • Tréguer, F. (2019). L’utopie déchue: Une contre-histoire d’Internet, XVe-XXIe siècle. Paris: Fayard.
  • Trilling, L. (1950). The liberal imagination. New York, NY: Viking Press.
  • Vangelisti, P. (ed.) (2013). Decentralized currencies, digital panhandling, startup governments: It’s a cypherpunk world. Bitcoin Magazine, Issue 11, June.

Sources

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.