References
- Bartlett, J. (2016). Cypherpunks write code. American Scientist. https://web.archive.org/web/20201209230910/ https://www.americanscientist.org/article/cypherpunks-write-code
- Bell, J. (1997, April 3). Assassination Politics. Cryptome. https://web.archive.org/web/20210105223654/ https://cryptome.org/ap.htm
- Bellia, P. L. (2012). WikiLeaks and the institutional framework for national security disclosures. The Yale Law Journal, 121(6), 1448–1526.
- Beltramini, E. (2020). Against Technocratic Authoritarianism: A short intellectual history of the cypherpunk movement. Internet Histories. https://doi.org/10.1080/24701475.2020.1731249
- Bentham, J. (1843). The works of Jeremy Bentham, vol. 11 (Memoirs of Bentham Part II and Analytical Index). Online Library of Liberty. https://web.archive.org/web/20200929023941/ https://oll.libertyfund.org/titles/bentham-the-works-of-jeremy-bentham-vol-11-memoirs-of-bentham-part-ii-and-analytical-index
- Boaz, D. (2015). The libertarian mind. Liberatianism.org. https://web.archive.org/web/20151029234532/ https://www.libertarianism.org/guides/introduction-libertarianism
- Böhme, R., Nicolas, C., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of Economic Perspectives, 29(2), 213–238. https://doi.org/10.1257/jep.29.2.213
- Brautigan, R. (1967). All watched over by machines of loving grace. brautigan.net. https://web.archive.org/web/20070223021032/http://www.brautigan.net/machines.html
- Card, O. S. (1985). Ender’s Game. Tor Books.
- Chaum, D. (1985a). Security without identification: Transaction systems to make Big Brother obsolete. Communications of the ACM, 28(10), 1030–1044. https://doi.org/10.1145/4372.4373
- Chaum, D. (1985b). Security without identification: card computers to make Big Brother obsolete. chaum. https://web.archive.org/web/20210304193723/ https://www.chaum.com/publications/Security_Wthout_Identification.html.
- Cypherpunk Bitstream Podcast. (2020). Cypherpunk bitstream podcast. https://web.archive.org/web/20210210062703/ https://taz0.org/bitstream/
- Dahlberg, L. (2010). Cyber-Libertarianism 2.0: A discourse theory/critical political economy examination. Cultural Politics: An International Journal, 6(3), 331–356. https://doi.org/10.2752/175174310X12750685679753
- Dexheimer, E. (1993, September 29). Secret agents. Denver Westword, 12.
- Froomkin, M. A. (1995). The metaphor is the key: Cryptography, the clipper chip, and the constitution. University of Pennsylvania Law Review, 143(3), 709–897. https://doi.org/10.2307/3312529
- Garfinkel, S. (1995). PGP: Pretty Good Privacy. O’Reilly Media Inc.
- Greenberg, A. (2012). This machine kills secrets: How wikileakers, cypherpunks, and hacktivists aim to free the world’s information. Random House.
- Hospers, J. (1971). Libertarianism: A political philosophy for tomorrow. Nash Publishing.
- Jarvis, C. (2020). Crypto wars: The fight for privacy in the digital age, a political history of digital encryption. CRC Press.
- Lessig, L. (2006). Code 2.0. Basic Books.
- Levy, S. (2010). Hackers: Heroes of the Computer Revolution – 25th anniversary edition. O’Reilly Media.
- Martin, K. (2020). Cryptography: The key to digital security, how it works, and why it matters. W.W. Norton & Company.
- Milhon, J. (n.d). The nerdgirl’s pillow book, or, the joy of hacker sex. Jude Milhon’s Webpage. https://web.archive.org/web/20070814112409/ http://members.aol.com/stjude/pillowbook
- Orenstein, J. (2016, February 29). Memorandum and Order. United States District Court Easter District of New York. https://web.archive.org/web/20210120153137/ https://cdn1.vox-cdn.com/uploads/chorus_asset/file/6124209/Orenstein-Order-Apple-iPhone-02292016.0.pdf
- Palys, T. (2008). Purposive sampling. In L. M. Givens (Ed.), The Sage encyclopaedia of qualitative research methods (Vol 2, pp. 697–698). Sage Publications.
- Rid, T. (2016). Rise of the machines: The lost history of Cybernetics. W. W. Norton & Company.
- Rhoads, C. (2007, January 13). The twilight years of Cap’n Crunch. Wall Street Journal. https://web.archive.org/web/20210314162356/ https://www.wsj.com/articles/SB116863379291775523
- Roszak, T. (1969). The making of a counter culture: Reflections on the technocratic society and its youthful opposition. Anchor Books.
- Slater, D. (1997, March 14). Secret agents. Bay Area Weekly. https://web.archive.org/web/20110610153125/ http://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks/bay-area-weekly-march-14-97
- Turner, F. (2006). From counterculture to cyberculture: Stewart Brand, The Whole Earth Network, and the Rise of Digital Utopianism. University of Chicago Press.
- United States Congress. (2020, March 5). S.3398 – EARN IT act of 2020. United States Congress. https://web.archive.org/web/20210305003937/ https://www.congress.gov/bill/116th-congress/senate-bill/3398/text
- United States Library of Congress. (n.d.). Federalist papers: Primary documents in American history. United States Library of Congress. https://web.archive.org/web/20210313183739/https://guides.loc.gov/federalist-papers/full-text
- United States Senate. (2020). The lawful access to encrypted data act. United States Senate. https://web.archive.org/web/20210308103304/ https://www.judiciary.senate.gov/imo/media/doc/S.4051%20Lawful%20Access%20to%20Encrypted%20Data%20Act.pdf.
- Vasvari, R., & Scarselli, G. (1996). Plaintiff seeks summary judgment in Cleveland case challenging licensing of “exports” of cryptographic information. Case Western Reserve University. Retrieved June 3, 2020, from https://web.archive.org/web/20060912162151/ http://samsara.cwru.edu/comp_law/jvc/pressrel2.html
- Vinge, V. (1981). True names. Dell Publishing.
- Zimmermann, P. (n.d). The early roots of PGP. philzimmermann.com. https://web.archive.org/web/20210128154041/ https://philzimmermann.com/EN/background/peace.html
- Zinn, H. (1980). A people’s history of the United States. HarperCollins Publishers.
Sources
- Anonymous Poster. (1996, November 19). Netscape. MessageID: ‘[email protected]’. 20 July 1996. Cypherpunk Mail List Archives 1992-1998.
- Assange, J. (1996, May 12). Again: [hrdware] anti-Tempest video settings. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Bell, J. (1996, July 24). Re: Netscape. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Blakenship, L. (1994, Jan 17). Too Much Noise, Goodbye. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Detweiler, L. (1993, February 4). White House Letter. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Dinkelacker, J. (1993, October 18). Shockwave Rider (True Names, Enders Game, Islands In The Net). MessageID: ‘[email protected]’. 18 October 1993. Cypherpunk Mail List Archives 1992-1998.
- Draper, J. (1992, November 12). Mac PGP – Some comments. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Finney, H. (1992, November 28). Misc. items. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Finney, H. (1993, February 24). When’s enough enough?. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Frissell, D. (1996, July 22). Re: [RANT] Giving Mind Control Drugs to Children. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Hughes, E. (1993b, October 8). Re: Virtual City (tm) Network FAQ 1.0 (fwd). MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Hughes, E. (1994, February 9). ANNOUNCE: February meeting–"True Names. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Karn, P. (1992, November 27). How far is to far?. MessageID: ‘9211272304.AA09837@servo’. Cypherpunk Mail List Archives 1992-1998.
- May, T. C. (1992, October 20). TEMPEST, Eavesdropping, and PDAs. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- May, T. C. (1993a, April 21). Crypto Activism and Respectability. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- May, T. C. (1993b, September 14). Anarchy v. Privacy. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- May, T. C. (1994a, February 20). Blacknet worries. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- May, T. C. (1994c, July 12). True Names," chat with Vinge, and Cypherpunks. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- May, T. C. (1994d, March 10). Re: The Coming Police State. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- May, T. C. (1995, November 9). Paranoia Has Its Uses. MessageID: ‘acc432a115021004a17f@[205.199.118.202]’. Cypherpunk Mail List Archives 1992-1998.
- Metzger, P. (1993, March 1). Re: Anonymity + untraceable digital money = potential problems. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Nuri, V. Z. (1996, July 23). Re: Netscape. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Ringuette, M. (1993, April 2). White House Letter. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Sandfort, S. (1996, November 10). Re: a retort + a comment + a question = [RANT]. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- The following within: Cypherpunk Mail List Archives. (1992–1998). Cypherpunks Mail List Archive 1992-1998 [Data Set]. https://web.archive.org/web/20201101083103/ https://lists.cpunks.org/pipermail/cypherpunks/2013-September/000741.html
- Wayner, P. (1993, January 14). No Subject. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
- Whitaker, R. E. (1992, November 16). Apple including PKS?. MessageID: ‘[email protected]’. Cypherpunk Mail List Archives 1992-1998.
Additional doctrinal documents
- Assange, J. (2006, July 31). Conspiracy as a form of governance. Cryptome. https://cryptome.org/0002/ja-conspiracies.pdf
- Barlow, J. P. (1996). A declaration of the independence of cyberspace. Electronic Frontier Foundation. https://web.archive.org/web/20210317122410/ https://www.eff.org/cyberspace-independence
- Blankenship, L. (1986). Hacker Manifesto/The Conscience of a Hacker. Phrack Magazine https://web.archive.org/web/20210224205447/http://phrack.org/issues/7/3.html
- Hughes, E. (1993, March 9). A Cypherpunk’s Manifesto. activism.net. https://web.archive.org/web/20210311174847/ https://www.activism.net/cypherpunk/manifesto.html
- May, T. C. (1988). Crypto-Anarchist Manifesto. activism.net. https://web.archive.org/web/20210224050018/ https://activism.net/cypherpunk/crypto-anarchy.html
- May, T. C. (1994b, September 10). The Cyphernomicon. Nakamoto Institute. https://web.archive.org/web/20201101035447/ https://nakamotoinstitute.org/static/docs/cyphernomicon.txt