├── 2018-12-27-cypherpunks.md
├── 2018-12-27-resources.md
├── 2019-01-05-electronic-cash.md
├── 2019-05-28-rare-pepe.md
├── 2019-06-04-peer-to-peer.md
├── 2019-06-26-early-internet-communication.md
├── 2019-11-27-money.md
├── 2019-12-13-cyberpunk.md
├── 2019-12-15-cryptography.md
├── 2019-12-16-Bitcoin-history.md
├── 2019-12-16-hacking-culture.md
├── 2019-12-17-darknet-markets.md
├── 2020-02-23-satoshi.md
├── README.md
└── people
├── 2019-12-10-timothy-c-may.md
├── 2019-12-11-david-chaum.md
├── 2019-12-12-nick-szabo.md
├── 2019-12-13-adam-back.md
├── 2019-12-14-hal-finney.md
├── 2020-01-27-phil-zimmerman.md
├── 2020-02-02-people.md
└── transcripts
├── 2019-02-13-JW-Weatherman-Interview-Tim-May.md
└── 2019-11-13-chaum-forefather-cryptocurrencies-cypherpunk-movement.md
/2018-12-27-resources.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "Survey of the history surrounding Bitcoin"
4 | title: Resources and Timelines
5 | teaser:
6 | excerpt: >
7 | "The first recorded claim of bitcoin’s demise was in 2010, on a little-known blog that found itself posted on a record of 'bitcoin obituaries' collected by 99Bitcoins, a bitcoin information site."
8 | categories: ["History"]
9 | header: no
10 | image:
11 | thumb: "history/chancellor-brink-bailout-banks-teaser.png"
12 | title: "history/chancellor-brink-bailout-banks.png"
13 | caption: "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks"
14 | caption_url: https://breakermag.com/ten-years-later-reflections-on-the-second-bailout/
15 | permalink: "/history/"
16 | last_modified_at: 2020-02-02T13:22:33-23:00
17 | directory: 2018-12-27-resources.md
18 |
19 | ---
20 |
21 | * [Bitcoin History — p2pfoundation](http://wiki.p2pfoundation.net/Bitcoin#History)
22 | * [lopp.net - BITCOIN HISTORY](https://www.lopp.net/bitcoin-information/history.html)
23 | > Bitcoin didn't simply appear out of thin air - it was built upon decades of work and came after many failed digital currency projects. Understanding how we got here will help you understand where we're going.
24 | * [Visions of Bitcoin—How major Bitcoin narratives changed over time](https://medium.com/@nic__carter/visions-of-bitcoin-4b7b7cbcd24c)
25 | > Conflicts within Bitcoin thus arise from entities who hold visions of the protocol that are mutually exclusive — and this leads to friction when these visions cannot be reconciled. Visions of Bitcoin are not static. Technological developments, practical realities and real-world events have shaped collective views. This post is an attempt to aggregate the various dominant narratives that have characterized Bitcoin throughout its 9-year history. This post builds on excellent prior work by Murad Mahmudov and Adam Taché, and we suggest you add that to your reading list.
26 |
27 | [](https://web.archive.org/web/20180829032336/https://www.thetimes03jan2009.com/)
28 |
29 |
30 | * [Revolutions and Counter Revolutions: Andreas Antonopoulos Reflects on 10 years of Bitcoin](https://bitcoinmagazine.com/articles/revolutions-and-counter-revolutions-andreas-antonopoulos-reflects-10-years-bitcoin/)
31 | > In the following interview with Bitcoin Magazine, Antonopoulos reflects on the metamorphosis the ecosystem has undergone over the past decade.
32 | * [History of bitcoin](https://en.wikipedia.org/wiki/History_of_bitcoin)
33 | > Bitcoin is a cryptocurrency, a digital asset designed to work as a medium of exchange that uses cryptography to control its creation and management, rather than relying on central authorities. The presumed pseudonymous Satoshi Nakamoto integrated many existing ideas from the ...
34 | * [Iterative Capital Management Thesis - What's Really Driving the Cryptocurrency Phenomenon?](https://iterative.capital/thesis/)
35 | > In this paper, we introduce investors to the socio-economic factors that led to the development of Bitcoin, and which will shape its future.
36 | * [Blockchain aimed to protect Bitcoin, but these 5 scams show it mis...](https://www.digitaltrends.com/computing/worst-bitcoin-scams/)
37 | > Check out some of the worst bitcoin scams in history: From fraudulent companies to simple lies that brought down whole exchanges, here's how people have been stealing bitcoins...and what you should be aware of if you want to invest.
38 | * [Do Libertarians Dream Of Electric Coins? The Material Embeddedness Of Bitcoin](https://archive.org/stream/DoLibertariansDreamOfElectricCoinsTheMaterialEmbeddednessOfBitcoin/Do%2520libertarians%2520dream%2520of%2520electric%2520coins?%2520The%2520material%2520embeddedness%2520of%2520Bitcoin_djvu.txt)
39 | * [Collin Enstad 🌮 (@CollinEnstad)](https://twitter.com/collinenstad/status/1158202685088251904?s=12)
40 | > So anyone know who @shaolinfry is? This anon dev appears to show up out of nowhere to jump start the UASF movement, and disappears afterwards. A real organic and grassroots movement! [https://t.co/LkM3jfwfLC](https://t.co/LkM3jfwfLC)
41 | * [notsofast (@notsofast)](https://twitter.com/notsofast/status/1050174862533234688)
42 | > If you're new(er), look up some of these (anti)heroes from $crypto past. Shadow_runner
43 | > presstab The Story Of Bob Surplus Wolong OTOH Kazonomics IGotSpots
44 | * [The Exclusive Inside Story Of The Fall Of Overstock’s Mad King, Patrick Byrne](https://www.forbes.com/sites/laurendebter/2019/08/22/the-exclusive-inside-story-of-the-fall-of-overstocks-mad-king-patrick-byrne/)
45 | > Patrick Byrne, the founder and longtime CEO of former e-tailing giant Overstock.com, recently resigned, saying his involvement as a federal informant in the investigation of accused Russian spy Maria Butina made performing his duties impossible. That’s not the whole story. This is.
46 | * [Dan Hedl (@danheld)](https://threadreaderapp.com/thread/1084848063947071488.html)
47 | > 1/ Satoshi’s Vision™ is a silly endeavor, as it doesn’t matter what it was, we are where we are now. However, those pushing the “Bitcoin was first made for payments” narrative insist on cherry-picking sentences from the white paper and forum posts to champion their perspective.
48 | > 2/ The following tweetstorm is a categorical repudiation of this tired narrative. Bitcoin was purpose-built to first be a Store of Value (SoV), a thread:
49 | * [The Cryptoconomy Podcast: My Favorite Bitcoin Holidays? A Walk with Guy Through Bitcoin History](https://podcasts.apple.com/us/podcast/the-cryptoconomy-podcast/id1359544516?i=1000433986180)
50 | * [Darknet Diaries: Ep 22: Mini-Stories: Vol 1 on Apple Podcasts](https://podcasts.apple.com/us/podcast/darknet-diaries/id1296350485?i=1000419785075) (16:00 hackers windfarm bitcoin mining)
51 | > Early crypto jackers reach symbiosis w windfarm
52 | >
53 | > “We now have a faster and more reliable patch cycle”
54 | * [WhiteRabbit (@WhiteRabbitBTC)](https://twitter.com/whiterabbitbtc/status/1183370538284146690?s=12)
55 | > Bitcoin Hall of Shame
56 | * [https://bitcointalk.org/index.php?topic=2777849.0](https://bitcointalk.org/index.php?topic=2777849.0)
57 | > My list of 43(+3) reviewed Bitcoin forks
58 | * [Bitcoin's Origins and the Genesis Blockade](https://youtu.be/cagoyF3WePo)
59 | > "In this talk, Andreas recounts the origins of Bitcoin, the meaning of the message embedded forever in its genesis block, and how we figured out who the banks truly serve when there was no other choice. He also speaks about what happens when money stops working, why censorship resistance was one of Bitcoin's most valuable characteristics from the start, and what possibilities lay in store with a global, voluntary financial system."
60 | * [@PeterLBrandt on 'Bubbles'](https://twitter.com/PeterLBrandt/status/1030884169763549184) - Us old-timers always considered a decline greater than 80% to be a bubble that popped. Most altcoins must be legitimately considered as bubbles that popped. The dead-cat bounces from the resulting decimation can be wicked.
61 | * CryptoQuikRead_089 - [Bitcoin Magazine’s Week in Review: Looking to the Past and the Future](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_089---Bitcoin-Magazines-Week-in-Review-Looking-to-the-Past-and-the-Future-e2ndrt)
62 | * CryptoQuikRead_180 - [Bitcoin at 10](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_180---Bitcoin-at-10-e2ndoo)
63 | * [On the Origins and Variations of Blockchain Technologies](https://ieeexplore.ieee.org/document/8674176)
64 | * [The coming digital anarchy](https://www.telegraph.co.uk/technology/news/10881213/The-coming-digital-anarchy.html)
65 | > Bitcoin is giving banks a run for their money. Now the same technology threatens to eradicate social networks, stock markets, even national governments. Are we heading towards an anarchic future where centralised power of any kind will dissolve?
66 |
67 |
68 | 
https://github.com/peercoin/peercoin/wiki/history-of-cryptocurrency
69 |
70 |
71 | ## Resources
72 |
73 | * [https://en.bitcoinwiki.org/wiki/Bitcoin_history](https://en.bitcoinwiki.org/wiki/Bitcoin_history)
74 | * [Blockchain Libarary - Reading Lists - Bitcoin History](https://blockchainlibrary.org/category/reading-lists/bitcoin-history/)
75 | * [Bitcoin History - OXT](https://oxt.me/history) - "This page lists a set of 'famous' events or lesser-known facts which are all part of the history of Bitcoin. Each event is illustrated with data extracted from the blockchain.
76 | * [wiki.p2pfoundation.net/Bitcoin#History](http://wiki.p2pfoundation.net/Bitcoin#History)
77 | * [Bitcoin History](https://www.lopp.net/bitcoin-information/history.html)
78 | >Bitcoin didn't simply appear out of thin air - it was built upon decades of work and came after many failed digital currency projects. Understanding how we got here will help you understand where we're going.
79 | * [The Rise of the Cypherpunks](http://www.coindesk.com/the-rise-of-the-cypherpunks/)
80 | * [A Cypherpunk's Manifesto](https://www.activism.net/cypherpunk/manifesto.html)
81 | * [Bitcoin's Academic Pedigree](https://queue.acm.org/detail.cfm?id=3136559)
82 | * [cryptoanarchy.wiki](https://cryptoanarchy.wiki)
83 | * [Complete Writings of Satoshi Nakamoto](https://satoshi.nakamotoinstitute.org/)
84 | * [Original Announcement Email Thread](https://www.mail-archive.com/search?l=cryptography%40metzdowd.com&q=subject:%22Bitcoin+P2P+e%5C-cash+paper%22&o=oldest&f=1)
85 | * [Historical Literature](http://nakamotoinstitute.org/literature/) (work that preceded Bitcoin)
86 | * [History Timeline](http://historyofbitcoin.org/)
87 | * [Bryan Bishop's Bitcoin Event Transcripts](http://diyhpl.us/wiki/transcripts/)
88 | * [Premature Obituaries](https://99bitcoins.com/bitcoinobituaries/)
89 | * [Bitcoin's Family Tree](http://mapofcoins.com/bitcoin)
90 | * [The three economic eras of Bitcoin](https://medium.com/@rusty_lightning/the-three-economic-eras-of-bitcoin-d43bf0cf058a)
91 | > "The way the bitcoin ecosystem will play out is written in the mathematics of its consensus rules; we should all know the three phases it will go through."
92 | * [SLP23 – Economic Eras of Bitcoin, and Lightning Development](https://stephanlivera.com/2018/09/20/slp23-economic-eras-of-bitcoin-and-lightning-development-with-rusty-russell-of-blockstream/)
93 | > "Rusty Russell, a well known and respected Bitcoin Lightning developer at Blockstream joins me in this episode. We talk about his article, The Three Economic Eras of Bitcoin, and discuss the Lightning Network for Bitcoin. Lastly, Rusty draws from his prior experience as a Linux kernel developer to contrast Linux development with Bitcoin and Lightning development practices and culture."
94 | * [Bryan Bishop's Bitcoin Event Transcripts](http://diyhpl.us/wiki/transcripts/) 2009-2019
95 | * [Research Archive - CoinDesk](https://www.coindesk.com/research)
96 | * [Untold Stories Podcast with Charlie Shrem](https://blockworksgroup.io/untold-stories-podcast)
97 | > On Untold Stories, host Charlie Shrem dives deep into the lives and personal histories of some of crypto's most influential leaders
98 | * [Bitcoin news snippets](http://bitcoinsnippets.com/)
99 | * [P2P Foundation Wiki](http://wiki.p2pfoundation.net/)
100 | * [https://nakamotoinstitute.org/](https://nakamotoinstitute.org/)
101 | * [btcmanager.com/tag/history](https://btcmanager.com/tag/history/)
102 |
103 | ## Princeton - Bitcoin and Cryptocurrency Technologies Online Course
104 |
105 | [](https://www.youtube.com/watch?v=apYieuvnUaE)
106 |
107 | * [Bitcoin History: From the Cypherpunk Movement to JPMorgan Chase](https://www.youtube.com/watch?v=apYieuvnUaE)
108 | * [History of Cryptocurrencies [Bonus lecture]](https://www.youtube.com/watch?v=1VYs_zZsorU&t=0s&index=13&list=PLQIX_E46U4XYE5GR6029FpnaX9aBXbt0B)
109 |
110 | ### Death of Bitcoin
111 |
112 | * [Bitcoin is not Dead](https://www.forbes.com/sites/michaeldelcastillo/2018/09/06/bitcoin-is-not-dead/#355f465b5bdd)
113 | > "The first recorded claim of bitcoin’s demise was in 2010, on a little-known blog that found itself posted on a record of “bitcoin obituaries” collected by 99Bitcoins, a bitcoin information site. While I consider myself among the first wave of bitcoin writers, having written my first article on the subject in 2011, this early claim of bitcoin’s death came when the cryptocurrency was valued at only $0.23. It is now worth almost $7,000."
114 | * [The Skeptics - A Tribute to Bold Assertions](https://nakamotoinstitute.org/the-skeptics/) - nakamotoinstitute.org
115 | * [Bitcoin Obituaries - Bitcoin Declared Dead 350+ Times (2019 Updated)](https://99bitcoins.com/bitcoinobituaries)
116 | > Until today Bitcoin has died more than 350 times. We collect Bitcoin obituaries since 2010. Found a Bitcoin obituary? submit it to us.
117 |
118 | ### Timelines
119 |
120 | * [Bitcoin History: Timeline, Origins and Founder](https://www.thestreet.com/investing/bitcoin/bitcoin-history-14686578)
121 | > "The history of Bitcoin has been a turbulent one to say the least, and right now we're in one of the most turbulent periods in its history, as it has spent the entirety of 2018 falling further and further from its peak value of nearly $20,000 in December 2017.
122 | >
123 | > But something as uncertain as Bitcoin (and cryptocurrency in general) was never going to be smooth sailing. Many tried a cryptographed digital currency before it, and they weren't able to fully crack it. Since Bitcoin became a reality nearly a decade ago, there have been some high highs and some low lows. For some Bitcoin owners, that's part of the appeal.
124 | >
125 | > But how did we get to where we are today with Bitcoin? How did it begin, what were its forebearers, and what have been the unexpected turns of the Bitcoin journey? Let's take a walk through the timeline and find out."
126 | * [Bitcoin History: The Complete History of Bitcoin [Timeline]](http://historyofbitcoin.org/)
127 | > The History of Bitcoin is a timeline that illustrates Bitcoin History from the very beginning all the way to present day. Learn what there is to know.
128 | * [Hobbes' Blockchain Timeline 0.1 Blockchain, Bitcoin, Distributed Ledgers, Smart Contracts and Cryptocurrencies](https://www.zakon.org/robert/blockchain/timeline)
129 | > A timeline highlighting some of the key events and technologies that helped shape the current state of blockchains, cryptocurrencies and Bitcoin.
130 | * [Bitcoin and Markets - Bitcoin History](https://github.com/Bitcoin-and-Markets/resources/wiki/Bitcoin-History) - Timeline of important research and events since 1970.
131 |
132 |
133 | [Best 101 Bitcoin Facts – the Infographic](https://ambcrypto.com/best-101-bitcoin-facts-the-infographic/)
134 |
135 |
136 | 
137 |
138 | ---
139 |
140 | {% include _improve_history.html %}
141 | ### Related Content
142 |
143 | {% include list-posts entries='5' category='History' %}
144 |
145 |
--------------------------------------------------------------------------------
/2019-01-05-electronic-cash.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "The many attempts to create a digital currency"
4 | title: Electronic Cash, Before Bitcoin
5 | teaser: "Digicash, Liberty Reserve, Bit Gold, Hashcash, RPoW, and more"
6 | excerpt: "Each RPOW or POW token can only be used once but since it gives birth to a new one, it is as though the same token can be handed from person to person."
7 |
8 | header: no
9 | image:
10 | thumb: "electronic-cash-2013.png"
11 | title: "history/2013-Virtual-Currency-Infographic.png"
12 | caption: "Dec 2013 - History of Virtual Currency"
13 | caption_url: https://www.course5i.com/blogs/wp-content/uploads/2013/12/virtual-currency_infographics_new2.pdf
14 |
15 | permalink: /history/electronic-cash/
16 |
17 | categories: ["History"]
18 | tags: ["Early Internet"]
19 | last_modified_at: 2019-05-27T13:22:33-23:00
20 | directory: 2019-01-05-electronic-cash.md
21 |
22 | ---
23 |
24 |
25 | * [The Evolution of Digital Cash](https://medium.com/@FidelityDigitalAssets/the-evolution-of-digital-cash-da19b06aa58e)
26 | > "The emergence of digital assets, such as bitcoin, signals a fundamental change in the way value is transferred globally. The concepts of money and value transfer have been evolving since primitive societies adopted shells and stones for monetary exchange, but the concept of digital money has been sought after for as long as there’s been an internet and peer-to-peer networking capabilities to drive its development."
27 | > * DigiCash (1989)
28 | > * Hashcash (1997)
29 | > * B-money proposal (1998)
30 | > * The Bit Gold proposal (1998)
31 | > * Reusable Proof of Work (2004)
32 | * [Till Antonio Mahler (@mahler_till)](https://twitter.com/mahler_till/status/1075356512732803072) - thread
33 | * [’82 - The Birth Of Digital Cash](https://medium.com/blockwhat/82-the-birth-of-digital-cash-ea08b53379d8)
34 | * [’96 - Oncologist + Gold = Revolution?](https://medium.com/blockwhat/96-oncologist-gold-revolution-c08a8dc26880)
35 | * [’97 - Anybody interested in some hash(cash)?](https://medium.com/blockwhat/97-anybody-interested-in-some-hash-cash-7fd422dc5e79)
36 | * [’98 - Wei Dai — Who dat?](https://medium.com/blockwhat/98-wei-dai-who-dat-f93c4e4bcfc9)
37 | * [’98 - Make It Rain (Bit) Gold!](https://medium.com/blockwhat/98-make-it-rain-bit-gold-dc1bd896827b)
38 | * [’03 - It’s Karma](https://medium.com/blockwhat/03-it-s-karma-484fdc2d8657)
39 | * [’04 - Use me baby, one more time](https://medium.com/blockwhat/04-use-me-baby-one-more-time-d0dd599c8357) (RPoW)
40 | * [A three part story of the tech that paved the way for Bitcoin](https://cryptodaddyshop.com/blogs/news/in-the-ashes-of-financial-ruin-cypherpunks-and-the-birth-of-bitcoin) — eCash (DigiCash), HashCash, Bit Gold.
41 | * [Pre-Blockchain Digital Currencies](https://cointelegraph.com/news/bitcoin-history-pre-blockchain-digital-currencies) — Digicash, eGold, Beenz, Flooz, Internetcash.
42 | * [Lecture 12 — History of Cryptocurrencies [Bonus lecture]](https://www.youtube.com/watch?v=1VYs_zZsorU&t=0s&index=13&list=PLQIX_E46U4XYE5GR6029FpnaX9aBXbt0B)
43 | > For the accompanying textbook, including the free draft version, see: [http://bitcoinbook.cs.princeton](http://bitcoinbook.cs.princeton/)
44 | * [The Amazing Story of Cryptocurrencies Before Bitcoin](https://hackernoon.com/the-amazing-story-of-cryptocurrencies-before-bitcoin-fe1b0e55155b)
45 | * [Bitcoin and Cryptocurrency Technologies](https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton_bitcoin_book.pdf)
46 | * [Bitcoin and Cryptocurrency Technologies Online Course](https://www.youtube.com/channel/UCNcSSleedtfyDuhBvOQzFzQ)
47 | * [Eric Turner (@ericturnr)](https://twitter.com/ericturnr/status/1037095399868297217)
48 | > Looking for recommendations: History of digital money and history of crypto Any suggestions?
49 | * [BANK FOR INTERNATIONAL SETTLEMENTS IMPLICATIONS FOR CENTRAL BANKS OF THE DEVELOPMENT OF ELECTRONIC MONEY](https://cryptome.org/jya/bis_emoney.html) - October 1996
50 | * [HOW TO MAKE A MINT: THE CRYPTOGRAPHY OF ANONYMOUS ELECTRONIC CASH](https://cryptome.org/jya/nsamint.htm) Laurie Law, Susan Sabett, Jerry Solinas National Security Agency 18 June 1996
51 | * [Cybercash at risk/Money laws lacking](https://cryptome.org/jya/lawdno.txt)
52 | * [twan (@dantwany)](https://twitter.com/dantwany/status/939987392496365569)
53 | > Bitcoin is sometimes compared Netscape and it's said some other will dethrone it. There have been many digital currency systems created that failed. Bitcoin is where it's today because it's a success. [Payment mechanisms designed for the Internet (1996)](http://web.archive.org/web/19961130160745/http://ganges.cs.tcd.ie:80/mepeirce/Project/oninternet.html)
54 |
55 |
56 | ### DigiCash
57 | * [Digicash enables First Electronic Payment](https://www.chaum.com/ecash/articles/1994/05-27-94%20-%20World_s%20first%20electronic%20cash%20payment%20over%20computer%20networks.pdf) - 1994
58 | * [eCash](https://www.chaum.com/ecash/) - Timeline [1998]
59 | * [E-Money (That's What I Want)](https://www.wired.com/1994/12/emoney/)
60 | > The killer application for electronic networks isn't video-on-demand. It's going to hit you where it really matters - in your wallet. It's, not only going to revolutionize the Net, it will change the global economy.
61 | * [How DigiCash Blew Everything](https://satoshiwatch.com/hall-of-fame/dr-david-chaum/in-depth/digicash-blew-everything-david-chaums/) [[**ϟ**](https://cryptome.org/jya/digicrash.htm)]
62 | * [A Brief History of Digital Currencies](https://ebrary.net/7927/education/brief_history_digital_currencies)
63 | * History of digital currencies of the 90's with DigiCash as the primary example
64 | * [Privacy/Online Commerce - Digital Money & Transactions - Digicash Announce](http://web.archive.org/web/20110406225453/https://w2.eff.org/Privacy/Digital_money/?f=digicash.announce.txt):
65 | * [1994-05-03 - Re: Virtual Cash](http://mailing-list-archive.cryptoanarchy.wiki/archive/1994/05/fedd4c390e542fb17285e25d9f056916858b1da0a7f161886e8edb52877ba057/)
66 |
67 | from [Buniskey's Cryptoassets](https://www.goodreads.com/en/book/show/36197082-cryptoassets):
68 | > "One of Bitcoin’s most famous ancestors was pioneered by a company called DigiCash, led by David Chaum, who remains one of the most famous cryptographers in crypto asset history. In 1993, prior to Marc Andressen founding Netscape, Chaum invented the digital payment system called ecash. This allowed secure and anonymous payments across the Internet, no matter the amount. 3 Clearly, Chaum’s timing could not have been better given the tech boom that followed through the mid- to late-1990s, and his company, DigiCash, had several opportunities for growth, any of which might have made it a household name. However, while Chaum was widely regarded as a technical genius, as a businessperson he left much to be desired. Bill Gates approached Chaum about integrating ecash into Windows 95, which would have immediately given it global distribution, but Chaum refused what was rumored to be a $100 million offer. Similarly, Netscape made initial inquiries about a relation- ship, but management was quickly turned off by Chaum’s attitude. In 1996, Visa wanted to invest $40 million into the company but were dissuaded when Chaum demanded $75 million (if these reports are correct, it’s clear that the potential price for Chaum’s creation was dropping). 4 If all had gone well, DigiCash’s ecash would have been integrated into all our web browsers at the ground floor, serving as the global Internet payment mechanism and potentially removing the need for credit cards in online payments. Sadly, mismanagement ultimately ran DigiCash into the ground, and in 1998 it declared bankruptcy. While DigiCash failed to become a household name, some players will resurface in our story, such as Nick Szabo, the father of “smart contracts,” and Zooko Wilcox, the founder of Zcash, both of whom worked at DigiCash for a time. 5:
69 |
70 |
71 | ### FirstVirtual and CyberCash
72 |
73 | * [Early History of Digital Cash and Cryptocurrency](https://medium.com/@danielsfskim/the-early-history-of-digital-cash-and-cryptocurrency-b87436711de0)
74 | * In 1994, FirstVirtual offered online payments, like paypal, via e-mail.
75 | * 1994 - CyberCash - utilizing SET architecture to provide micro-payments
76 | > Secure electronic transaction (SET) was an early protocol for electronic credit card payments. As the name implied, SET was used to facilitate the secure transmission of consumer credit card information via electronic avenues, such as the Internet. SET blocked out the details of credit card information, thus preventing merchants, hackers and electronic thieves from accessing this information. -[investopedia](https://www.investopedia.com/terms/s/secure-electronic-transaction-set.asp)
77 |
78 | * [CyberCash Credit Card Protocol Version 0.8](https://tools.ietf.org/html/rfc1898)
79 |
80 | ### NetCash
81 |
82 | * [NetCheque, NetCash, and the Characteristics of Internet Payment Services](https://quod.lib.umich.edu/j/jep/3336451.0001.126?view=text;rgn=main) '95
83 | > Secure methods of payment are needed before we will see widespread commercial use of the Internet. Recently proposed and implemented payment methods follow one of three models: electronic currency, credit-debit, and secure credit card transactions. Such payment services have different strengths and weaknesses with respect to the requirements of security, reliability, scalability, anonymity, acceptability, customer base, reliability, convertibility, efficiency, ease of integration with applications, and ease of use. NetCheque and NetCash are payment systems under development at the Information Sciences Institute of the University of Southern California. NetCheque and NetCash are described and their strengths with respect to these requirements are discussed.
84 |
85 | ### Modex
86 |
87 | ### Project CAFÉ
88 |
89 | ### e-Gold
90 | * [e-Gold](https://cs.stanford.edu/people/eroberts/cs201/projects/2010-11/Bitcoins/e-gold.html) Founded in 1996
91 | * [Bullion and Bandits: The Improbable Rise and Fall of E-Gold](https://www.wired.com/2009/06/e-gold/)
92 | * [E-GOLD FOUNDER PLEADS GUILTY TO MONEY LAUNDERING](https://www.wired.com/2008/07/e-gold-founder/)
93 | * [e-Gold](https://medium.com/blockwhat/96-oncologist-gold-revolution-c08a8dc26880)
94 | * [’96 | Oncologist + Gold = Revolution?](https://medium.com/blockwhat/96-oncologist-gold-revolution-c08a8dc26880)
95 | * https://en.bitcoinwiki.org/wiki/E-gold
96 |
97 | >In April 2007, the US government ordered e-gold administration to lock approximately 58 e-gold accounts, including ones owned by The Bullion Exchange, AnyGoldNow, IceGold, GitGold, The Denver Gold Exchange, GoldPouch Express, 1MDC (a Digital Gold Currency, based on e-gold), and forced OmniPay's owner, G&SR, to liquidate the seized assets.-[Bitcoiners: Remember what happened to eGold](http://www.economicpolicyjournal.com/2013/04/bitcoiners-remember-what-happened-to.html)
98 |
99 | ### Hashcash
100 |
101 | * [Pricing via Processing or Combatting Junk Mail](http://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp_abs.html)
102 | > The main idea is for the mail system to require the sender to compute some moderately expensive, but not intractable, function of the message and some additional information.
103 | * [Hashcash](http://www.hashcash.org/) is a proof-of-work algorithm, invented by Adam Back in 1997
104 | * [What is Hashcash?](https://www.bitcoinmining.com/what-is-hashcash/)
105 | * [The History of Bitcoin Part 1: What is Hashcash?](https://btcmanager.com/the-history-of-bitcoin-part-1-what-is-hashcash/)
106 | * [Anybody interested in some Hash Cash?](https://medium.com/blockwhat/97-anybody-interested-in-some-hash-cash-7fd422dc5e79)
107 | * [The Genesis Files: Hashcash or How Adam Back Designed Bitcoin’s Motor Block](https://bitcoinmagazine.com/articles/genesis-files-hashcash-or-how-adam-back-designed-bitcoins-motor-block/)
108 | * [bitcoin.it/wiki/Hashcash](https://en.bitcoin.it/wiki/Hashcash)
109 | * [Proof of Work Proves not to Work](https://www.cl.cam.ac.uk/~rnc1/proofwork.pdf)
110 | * https://security.stackexchange.com/questions/14262/hashcash-is-this-really-used
111 | * CryptoQuikRead_095 - [The Genesis Files: Hashcash or How Adam Back Designed Bitcoin's Motor Block](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_095---The-Genesis-Files-Hashcash-or-How-Adam-Back-Designed-Bitcoins-Motor-Block-e2ndrl)
112 |
113 |
114 |
115 | ### B-money
116 |
117 | * [Wei Dai, Who Dat?](https://medium.com/blockwhat/98-wei-dai-who-dat-f93c4e4bcfc9)
118 | * [If Bitcoin had a first Draft - B-money was it](https://bitcoinmagazine.com/articles/genesis-files-if-bitcoin-had-first-draft-wei-dais-b-money-was-it/)
119 | * [B-money](https://www.investopedia.com/terms/b/bmoney.asp) - investopedia
120 | * [The History Of Bitcoin Part 3: What Is B-Money | BTCMANAGER](https://btcmanager.com/the-history-of-bitcoin-part-3-what-is-b-money/)
121 | > You can read Part 2 of the History of Bitcoin series here. In the initial days of the crypto-anarchy and cypherpunk movement, where bitcoin was eventually born, researchers were determined to create a community that would be free of the control from centralized authorities. I...
122 |
123 |
124 |
125 | ### Beenz and Flooz
126 |
127 | An early clickworking site that rewarded users with its own digital currency.
128 | * [A decade before crypto, one digital currency conquered the world — then failed spectacularly](https://thehustle.co/beenz-pre-bitcoin-digital-currency)
129 | * [What It's Like to Work at Beenz.com Inc.](https://www.computerworld.com/article/2596386/financial-it/what-it-s-like-to-work-at-beenz-com-inc-.html)
130 | * [Beenz.com Closes Internet Currency Business](https://www.ecommercetimes.com/story/12892.html)
131 | * [bitcoinwiki - Beenz](https://en.bitcoinwiki.org/wiki/Beenz.com)
132 | >Flooz had a similar name, model, and was a direct competitor with Beenz: Users were rewarded for activity with flooz, which served as a medium of exchange among its network of partners. Like Beenz, also, Flooz went bust in the dot-com crash.
133 | * [The Rise and Fall of Flooz](http://mentalfloss.com/article/517911/bitcoin-rise-and-fall-flooz-e-currency)
134 | * [bitcoinwiki - Flooz](https://en.bitcoinwiki.org/wiki/Flooz.com)
135 | * [Internet Currency Site Flooz Suspends Operations](https://www.ecommercetimes.com/story/12704.html)
136 | * [What we can Learn from Flooz and Beenz](https://medium.com/@ParolaAnalytics/bitcoin-etc-what-can-we-learn-from-flooz-and-beenz-73566f140932)
137 |
138 | ### InternetCash
139 |
140 | ### E-Bullion
141 |
142 | ### Dexit
143 |
144 | ### Peppercoin
145 |
146 | * [Peppercoin Whitepaper](https://people.csail.mit.edu/rivest/pubs/Riv04c.pdf), by Ronald L. Rivest Computer Science and Artificial Intelligence Laboratory
147 | * [About Digicash and Peppercoin](https://www.theguardian.com/technology/2003/feb/25/comment.comment) - Micropayments
148 | * [Peppercoin Micropayment Slides](https://people.csail.mit.edu/rivest/pubs/Riv04c.slides.slides.pdf)
149 | * [Peppercoin Sold, and Almost Noone Noticed](https://www.techdirt.com/articles/20070417/012124.shtml)
150 | * [International Conference on Financial Cryptography — Peppercoin Micropayments](https://link.springer.com/chapter/10.1007/978-3-540-27809-2_2)
151 |
152 | ### Reusable Proof of Work
153 |
154 | * [Subject: RPOW - Reusable Proofs of Work](https://cryptome.org/rpow.htm) -03 [[**ϟ**](https://nakamotoinstitute.org/finney/rpow/world.html)]
155 | >This system receives hashcash as a Proof of Work (POW) token, and in exchange creates RSA-signed tokens which I call Reusable Proof of Work (RPOW) tokens. RPOWs can then be transferred from person to person and exchanged for new RPOWs at each step. Each RPOW or POW token can only be used once but since it gives birth to a new one, it is as though the same token can be handed from person to person.
156 | * [Use me Baby one more Time](https://medium.com/blockwhat/04-use-me-baby-one-more-time-d0dd599c8357)
157 | * https://github.com/NakamotoInstitute/RPOW
158 | * https://slashdot.org/story/04/08/18/1345258/rpow---reusable-proofs-of-work
159 | * [**>> More Information on Hal Finney >>**](https://bitcoin-nerds.xyz/history/people/hal-finney/)
160 |
161 | ### Bit Gold
162 |
163 |
164 | * [2005 - Bit Gold Proposal](https://unenumerated.blogspot.com/2005/12/bit-gold.html) [[**ϟ**](https://web.archive.org/web/20140406003811/http://szabo.best.vwh.net/bitgold.html)]
165 | * [Bit Gold and Bitcoin](https://medium.com/@insearchofsatoshi/bit-gold-and-bitcoin-9357176cd420)
166 | * [The History of Bitcoin - Part 2 - Bit Gold](https://btcmanager.com/the-history-of-bitcoin-part-2-bit-gold/)
167 | > In the initial days of the crypto-anarchy and cypherpunk movement, where bitcoin was eventually born, researchers were determined to create a community that would be free of the control from centralized authorities. I...
168 | * [Genesis Files: Bit Gold - Szabo was Inches Away from Inventing Bitcoin](https://bitcoinmagazine.com/articles/genesis-files-bit-gold-szabo-was-inches-away-inventing-bitcoin/) - [CryptoQuikRead_111](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_111---Genesis-Files---With-Bit-Gold--Nick-Szabo-Was-Inches-From-Inventing-Bitcoin-e2ndr5)
169 | * [Make It Rain (Bit) Gold!](https://medium.com/blockwhat/98-make-it-rain-bit-gold-dc1bd896827b)
170 | * [Re: They want to delete the Wikipedia article](https://bitcointalk.org/index.php?topic=342.msg4508#msg4508) - satoshi
171 | >Bitcoin is an implementation of Wei Dai's b-money proposal http://weidai.com/bmoney.txt on Cypherpunks http://en.wikipedia.org/wiki/Cypherpunks in 1998 and Nick Szabo's Bitgold proposal http://unenumerated.blogspot.com/2005/12/bit-gold.html
172 | * [What is Bit Gold? The Brainchild of Blockchain Pioneer - Nick Szabo](https://coincentral.com/what-is-bit-gold-the-brainchild-of-blockchain-pioneer-nick-szabo/)
173 | * [Show The Cryptoconomy Podcast, Ep CryptoQuikRead_275 - Bit Gold - Jul 25, 2019](https://podcasts.apple.com/us/podcast/the-cryptoconomy-podcast/id1359544516?i=1000445320562)
174 |
175 | ### Liberty Reserve
176 |
177 | * [Digital Currency Liberty Reserve Busted for Money Laundering](https://www.aol.com/on/digital-currency-liberty-reserve-money-laundering/)
178 | > About 1 million users worldwide, including 200,000 in the U.S.; 55 million transactions; and $6 billion in ill-gotten gains.
179 | >
180 | > Those are the numbers defining the case of Liberty Reserve, a digital currency and online payment service incorporated in Costa Rica in 2006. On Tuesday, an indictment was unsealed showing that seven men have been charged with running the unlicensed Liberty Reserve as a "bank of choice for the criminal underworld." According to The Wall Street Journal, "The system allegedly was designed to give criminals a way to move money earned from credit-card fraud, online Ponzi schemes, child pornography and other crimes without being detected by law enforcement." Five of the seven men are in custody, having been arrested on Friday in Spain, Costa Rica and Brooklyn, N.Y. Extradition will be sought for the suspects who are overseas; the other two remain at large.
181 | >
182 | > For the first time, officials invoked the post-9/11 Patriot Act to shut down a virtual currency when they cut off Liberty Reserve from the U.S. financial system. The drastic measure comes at a time when digital alternatives to traditional currencies such as Bitcoin are drawing wider interest from the public.
183 | * [Liberty Reserve digital cash chief jailed for 20 years](https://www.bbc.com/news/technology-36247289)
184 | > The founder of the digital currency service Liberty Reserve has been sentenced to 20 years in prison.
185 | > Arthur Budovsky had pleaded guilty to conspiring to commit money laundering.
186 | > The online facility, shut down in 2013, had operated out of Costa Rica.
187 | > Prosecutors in New York said many of its clients had been cybercriminals who had sought to move funds anonymously.
188 | > Two other men involved in the business were sentenced to shorter jail terms.
189 | > Two more people will be sentenced on 13 May.
190 | > The authorities are still trying to locate a further two suspects.
191 | * [Founder of Liberty Reserve Pleads Guilty to Laundering More Than $250 Million through His Digital Currency Business](https://www.justice.gov/opa/pr/founder-liberty-reserve-pleads-guilty-laundering-more-250-million-through-his-digital)
192 | > The founder of Liberty Reserve, a virtual currency once used by cybercriminals around the world to launder the proceeds of their illegal activity, pleaded guilty today to running a massive money laundering enterprise, announced Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division and U.S. Attorney Preet Bharara of the Southern District of New York.
193 | >
194 | > Arthur Budovsky, 42, pleaded guilty to one count of conspiring to commit money laundering before U.S. District Judge Denise L. Cote of the Southern District of New York. He is scheduled to be sentenced on May 6, 2016.
195 | * [Hackers switch to new digital currency after Liberty Reserve](https://www.reuters.com/article/net-us-cybercrime-digital-currency-idUSBRE9780GM20130809)
196 | > NEW YORK (Reuters) - Three months after a team of international law enforcement officials raided the digital currency firm Liberty Reserve, cyber experts say criminals are increasingly turning to another online currency called Perfect Money.
197 | >
198 | > Idan Aharoni, the head of cyber intelligence at EMC Corp’s RSA security division, said that some online scam artists and thieves are using Perfect Money’s digital currency to launder money and conceal profits in much the same way they allegedly did with Liberty Reserve’s currency.
199 |
200 |
201 | ## Karma
202 |
203 | * [Karma: Secure Economic Framework for Peer-to-Peer Resource Sharing](http://www.cs.cornell.edu/people/egs/papers/karma.pdf)
204 | > Peer-to-peer systems are typically designed around the assumption that all peers will willingly contribute resources to a global pool. They thus suffer from freeloaders, that is, participants who consume many more resources than they contribute. In this paper, we propose a general economic framework for avoiding freeloaders in peer-to-peer systems. Our system works by keeping track of the resource consumption and resource contribution of each participant. The overall standing of eachparticipant in the system is represented by a single scalar value, called their karma. A set of nodes, called a bankset, keeps track of each node’s karma, increasing it as resources are contributed, and decreasing it as they are consumed. Our framework is resistant to malicious attemptsby the resource provider, consumer, and a fraction of the members of the bank set. We illustrate the application of this framework to a peer-to-peer filesharing application
205 | * [A Brief History with Professor Emin Gün Sirer - Dec 3, 2017](https://podcasts.apple.com/us/podcast/020-bitcoin-is-at-%2410-000-heres-brief-history-professor/id1238906492?i=1000395583146)
206 |
207 |
208 | ### Resources
209 |
210 | * [Digital vs Virtual Currencies](https://bitcoinmagazine.com/articles/digital-vs-virtual-currencies-1408735507/)
211 | * [Network Payment Mechanisms and Digital Cash](http://ganges.cs.tcd.ie//mepeirce/project.html)
212 | * [Electronic Payment Schemes](https://www.w3.org/Payments/roadmap.html) by Dr Phillip M. Hallam-Baker, of the World Wide Web Consortium.
213 | * [Evolution of Network Payment and E-Commerce Technologies](http://www.bcneuman.com/ecommerce/)
214 | * [Electronic Payment Systems](http://www.ra.ethz.ch/WWW/WWW8/tutorial_5.html) from the eighth World Wide Web conference in toronto, canada
215 | * [Electronic Cash Payment Protocols and Systems](http://www.dmi.unipg.it/bista/didattica/sicurezza-pg/sistemi-pagamento/e-cash-payment.v1.10.20.pdf) '00
216 | * Ecash (Digital Cash)
217 | - NetCash
218 | - Modex
219 | - Project CAFÉ
220 | * [Does Virtual Currency's Past Dictate its Future?](https://www.mobilepaymentstoday.com/blogs/does-virtual-currencys-past-dictate-its-future-3/)
221 | * digicash
222 | * cybercash
223 | * Beenz
224 | * Flooz
225 | * Internetcash
226 | * E-Bullion
227 | * E-Gold
228 | * Dexit
229 |
230 | ---
231 |
232 | {% include _improve_history.html %}
233 | ### Related Content
234 |
235 | {% include list-posts entries='5' category='History' %}
236 |
237 |
--------------------------------------------------------------------------------
/2019-05-28-rare-pepe.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "Birth of digitally rare art"
4 | title: "Rare Pepe and the Bitcoin Blockchain"
5 | teaser: Starting in October 2014, users on the /r9k/ (robot9000) board on 4chan began referring to original illustrations and photoshops of Pepe the Frog as "Rare Pepes"; sharing the "rare" images of Pepe as if they were trading cards
6 | categories: ["History"]
7 | header: no
8 | image:
9 | thumb: "RarePepe-Cards-696x348.png"
10 | title: "RarePepe-Cards-696x348.png"
11 | caption: "Rare Pepe Gets Blockchained, Made Into Tradable Counterparty Tokens"
12 | caption_url: https://news.bitcoin.com/rare-pepe-assets-get-blockchained/
13 | last_modified_at: 2020-03-02T11:22:33-23:00
14 | permalink: /history/rare-pepe-counterparty/
15 | directory: 2019-05-28-rare-pepe.md
16 |
17 | ---
18 |
19 | ## In The Beginning
20 |
21 | >In 2005, artist [Matt Furie](http://www.mattfurie.com/) created the comic series Boy's Club, which stars the teenage monster characters Pepe, Brett, Andy and Landwolf.
22 | [pepe-the-frog](https://knowyourmeme.com/memes/pepe-the-frog)
23 |
24 | 
25 |
26 | * [The Creator of Pepe the Frog Talks About Making Comics in the Post-Meme World](https://www.vice.com/en_us/article/avy3aj/feels-good-man-728)
27 | >"I've made my mark on the internet, so I can relax. I'm retired now, living off all the shares and likes."
28 |
29 | ## Feels Good Man
30 |
31 | 
32 |
33 | * [knowyourmeme.com/memes/feels-good-man](https://knowyourmeme.com/memes/feels-good-man)
34 | > Feels Good Man is a catchphrase and exploitable from a comic strip authored by artist Matt Furie. The phrase is in reference to the emotions one of the characters in the strip feels when he goes to the bathroom standing up, with his pants all the way down.
35 | * [knowyourmeme.com/memes/exploitables](https://knowyourmeme.com/memes/exploitables)
36 | > Exploitables are image templates that are missing a defining characteristic and easy to edit, dying to be filled with your wit & candor. They are used very frequently on image-boards like 4chan.
37 | >Early 2008, a user on 4Chan's /b/ board decided to upload a scan of one page from the comic, involving Pepe pulling his pants all the way down to his ankles to pee, leaving his bare ass exposed.
38 |
39 | 
40 |
41 | * [4chan’s Pepe the Frog is bigger than ever—and his creator feels good, man](https://www.dailydot.com/unclick/4chan-pepe-the-frog-renaissance/) -2017
42 |
43 | ## The Birth of Rare Pepe
44 |
45 | * [knowyourmeme.com/memes/rare-pepe](https://knowyourmeme.com/memes/rare-pepe)
46 | >Starting in October 2014, users on the /r9k/ (robot9000) board on 4chan began referring to original illustrations and photoshops of Pepe the Frog as "Rare Pepes"; sharing the "rare" images of Pepe as if they were trading cards, some of which were posted with watermarks to retain their value (shown below).
47 | 
48 |
49 |
50 | ## Biggest Meme of 2015
51 |
52 | * [Tumblr’s Biggest Meme of 2015 Was Pepe the Frog](http://nymag.com/intelligencer/2015/12/tumblr-was-here-for-pepe-the-frog-in-2015.html)
53 | * [Rare Pepe Mosaic](https://mustacheese.deviantart.com/art/Rare-Pepe-Mosaic-NOT-FOR-NORMIES-567803519)
54 | 
55 | * [Reddit Rare Pepe Memes](https://www.ohmycat.club/reddit-rare-pepe-memes.html)
56 | [](https://imgur.com/r/4chan/awRrhwX)
57 |
58 | ## Alt-Right Drives Away Normies
59 |
60 | * [How Pepe the Frog Became a Nazi Trump Supporter and Alt-Right Symbol](https://www.thedailybeast.com/how-pepe-the-frog-became-a-nazi-trump-supporter-and-alt-right-symbol)
61 | >“Most memes are ephemeral by nature, but Pepe is not,” @JaredTSwift told me. “He’s a reflection of our souls, to most of us. It’s disgusting to see people (‘normies,’ if you will) use him so trivially. He belongs to us. And we’ll make him toxic if we have to.”
62 | >
63 | >@JaredTSwift said some of the support for Trump was in jest, but for most of his cohorts, it’s sincere. He even claimed to have voted for Trump in the primary himself, wherever it is he lives, and said he’d vote for him in the general, too.
64 | >
65 | >“In a sense, we’ve managed to push white nationalism into a very mainstream position,” he said. “Trump’s online support has been crucial to his success, I believe, and the fact is that his biggest and most devoted online supporters are white nationalists.
66 |
67 | * [Is Pepe the Frog just a racist meme?](https://medium.com/pepedapp/is-pepe-the-frog-just-a-racist-meme-1083ab8f4b99) - Pepe is about love, not hate.
68 | >In fact, the very same Anti-Defamation League that added Pepe to its list of hate symbols stated on its own website:
69 | >
70 | >“However, because so many Pepe the Frog memes are not bigoted in nature, it is important to examine use of the meme only in context. The mere fact of posting a Pepe meme does not mean that someone is racist or white supremacist.”5
71 | >
72 | >This, however, does not take away from specific use cases, but it does imply that as a meme is used, so it evolves.
73 |
74 | ## Enter Bitcoin
75 |
76 | * [[ANN] The first truly rare Pepes on the Bitcoin Blockchain! [ANN]](https://bitcointalk.org/index.php?topic=1617264.0)
77 |
78 | 
79 |
80 | >For years people have been trying to preserve the rarest of pepes from being stolen.
81 | >
82 | >Thanks to Bitcoin and Counterparty we can associate these Rare Pepes with tokens to make them truly rare. Now Pepe’s can preserve their rareness and actually be traded on the market.
83 | [](http://rarepepedirectory.com/?page_id=122)
84 | * [counterparty.io](https://counterparty.io/)
85 | >Counterparty extends Bitcoin’s functionality by “writing in the margins” of regular Bitcoin transactions, opening the door for innovation and advanced features not possible with ordinary Bitcoin software.
86 |
87 |
88 | ## First Live Auction
89 |
90 | * [I Went to the First Live Auction for Rare Pepes on the Blockchain](https://www.vice.com/en_us/article/ev57p4/i-went-to-the-first-live-auction-for-rare-pepes-on-the-blockchain)
91 | [](https://www.vice.com/en_us/article/ev57p4/i-went-to-the-first-live-auction-for-rare-pepes-on-the-blockchain)
92 |
93 | 
94 |
95 | * [Rare Pepe Blockchain Cards Have Produced More Value Than Most ICOs](https://news.bitcoin.com/rare-pepe-blockchain-cards-produce-more-value-than-most-icos/)
96 |
97 | ## Should Pepe Live on Bitcoin?
98 |
99 | * [Counterparty Wants to Stay on Bitcoin but Fees Remain a Contentious Issue](https://bitsonline.com/counterparty-bitcoin-fees-contentious/) - December 27, 2017
100 | >“Earlier in 2017, when the Counterparty community was still largely intact, I created two proposals that would have led to Counterparty moving off of Bitcoin Core. I thought Counterparty should either embrace Bitcoin Cash (at the time it was Bitcoin Classic) for the block space Counterparty needs or move to Litecoin where a metaprotocol like Counterparty would be welcome.”
101 |
102 | I've also heard some vague accusations that counterparty\rare-pepe are not good for bitcoin... although I've not seen any detailed discussion of the topic. Pls reach out if you have more information on pepe and Bitcoin.
103 |
104 |
105 | I know there are a lot of newer projects, like memes, memecoins get copied. That doesn't interest me as much as the other digital art projects, and mostly the history.
106 |
107 | There are many other aspects of digital art that interest me, and I'll be diving in, beyond pepe, coming soon. You can have a sneek peek of my new [Rare Digital Art](https://sourcecrypto.pub/rare-digital-art/) page now, although it's not ready for production, and this resource belongs over here, anyway.
108 | {: .notice--warning}
109 |
110 | 
111 |
112 | ## Resources
113 |
114 | * [https://www.reddup.co/r/rarepepemarket](https://www.reddup.co/r/rarepepemarket)
115 | * [Artnome- The Birth of Cryptoart](https://www.artnome.com/news/2018/1/23/rare-pepe-wallet-the-birth-of-cryptoart)
116 | * [fivethirtyeight.com - People Paying Thousands To Own Pictures Of Pepe The Frog](https://fivethirtyeight.com/features/pepe-the-frog-symbolism-cryptoart-blockchain/)
117 | * [I went to the first Live Auction for Rare Pepes on the Blockchain](https://motherboard.vice.com/en_us/article/ev57p4/i-went-to-the-first-live-auction-for-rare-pepes-on-the-blockchain)
118 | * [Know Your Meme- Pepe](http://knowyourmeme.com/memes/pepe-the-frog)
119 | * [Know Your Meme- Rare Pepe](http://knowyourmeme.com/memes/rare-pepe)
120 | * [Matt Furie](http://www.mattfurie.com/)- Originator of Pepe
121 | * [rarepepewallet.com](https://rarepepewallet.com)
122 | * [rarepepedirectory.com](http://rarepepedirectory.com)
123 | * [counterparty.io](https://counterparty.io)
124 | * [How Pepe the Frog became a Nazi Trump Supporter](https://www.thedailybeast.com/how-pepe-the-frog-became-a-nazi-trump-supporter-and-alt-right-symbol)
125 | * [The Creator of Pepe Is Winning His War on the Alt-Right](https://www.thedailybeast.com/the-creator-of-pepe-is-winning-his-war-on-the-alt-right)
126 |
127 |
128 | ---
129 |
130 | {% include _improve_history.html %}
131 | ### Related Content
132 |
133 | {% include list-posts entries='5' category='History' %}
134 |
--------------------------------------------------------------------------------
/2019-06-04-peer-to-peer.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "Early examples of P2P technology"
4 | title: "Peer to Peer rEvolution and Histories"
5 | teaser: "Napster, Limewire, Bittorrent, IPFS, Freenet, Open Bazaar etc."
6 | categories: History
7 | permalink: /peer-to-peer/
8 | last_modified_at: 2020-03-02T11:22:33-23:00
9 | directory: 2019-06-04-peer-to-peer.md
10 |
11 | ---
12 |
13 |
14 | * [P2P Foundation](https://p2pfoundation.net)
15 | * [Definition of P2P](https://www.lifewire.com/definition-of-p2p-818026)
16 | * [A Brief History of Peer to Peer Netowrks](https://learnoutlive.com/a-brief-history-of-peer-to-peer-networks/)
17 | * [Limewire, Napster, The Pirate Bay](https://www.geek.com/gadgets/limewire-napster-the-pirate-bay-a-brief-history-of-file-sharing-1359473/)
18 | * [Introduction to P2P Networks - Limewire](https://www.lifewire.com/introduction-to-peer-to-peer-networks-817421)
19 | * [A Network of Peers: Peer-to-Peer Models Through the History of the Internet](https://www.oreilly.com/library/view/peer-to-peer/059600110X/ch01.html)
20 | > The Internet is a shared resource, a cooperative network built out of millions of hosts all over the world. Today there are more applications than ever that want to use the network, consume bandwidth, and send packets far and wide. Since 1994, the general public has been racing to join the community of computers on the Internet, placing strain on the most basic of resources: network bandwidth. And the increasing reliance on the Internet for critical applications has brought with it new security requirements, resulting in firewalls that strongly partition the Net into pieces. Through rain and snow and congested Network Access Providers (NAPs), the email goes through, and the system has scaled vastly beyond its original design.
21 | * [Introduction to Peer-To-Peer Networks](http://compnetworking.about.com/od/basicnetworkingfaqs/a/peer-to-peer.htm)
22 | > Internet-based peer-to-peer networks became popular in the 1990s due to the development of P2P file-sharing networks such as Napster. Technically, many P2P networks are not pure peer networks but rather hybrid designs as they utilize central servers for some functions such as search.
23 |
24 |
25 | 
26 |
27 | [IPFS, CoinList, and the Filecoin ICO with Juan Benet and Dalton Caldwell](https://blog.ycombinator.com/ipfs-coinlist-and-the-filecoin-ico-with-juan-benet-and-dalton-caldwell/)
28 | > my first company, imeem that I started, was a peer-to-peer. It was distributed social networking. A lot of these ideas keep recycling every few years. One thing that we noticed is how hard it was for users to get the negative side effects; having something that is peer-to-peer. BitTorrent worked pretty well, but even Skype. Skype kept it really, you didn’t know that it was peer-to-peer. Unless your upstream bandwidth was saturating and you got a nasty letter from your ISP or something, you had no knowledge as a user. Sort of my takeaway during that era was that usability always trumped the elegance of peer-to-peer models.
29 |
30 | ### Filesharing
31 |
32 | * [The History of Filesharing](https://torrentfreak.com/the-history-of-filesharing-120422/)
33 | * [Timeline of Filesharing](https://en.wikipedia.org/wiki/Timeline_of_file_sharing)
34 | * [A Brief History of P2P Content Distribution, in 10 Major Steps](https://medium.com/paratii/a-brief-history-of-p2p-content-distribution-in-10-major-steps-6d6733d25122)
35 |
36 |
37 | ## 1st Generation
38 |
39 | ## RSS
40 |
41 | * [@varun_mathur on RSS history's compared to Bitcoin](https://twitter.com/varun_mathur/status/1038107664868208640)
42 | > "Crypto’s RSS Era About 10 yrs ago, before the advent of bitcoin, the tech world was coming to grips with how RSS failed to take off as a consumer tech. I spent 2 yrs of my life building the best (?)feed reader UX, but I was solving for local maxima, not global maximum (industry)"
43 |
44 |
45 | ### Napster
46 |
47 | * [The Napster Story with Jordan Ritter](http://www.internethistorypodcast.com/2017/04/the-napster-story-with-jordan-ritter/)
48 | * [wired: The Short History of Napster 1.0](https://www.wired.com/2013/04/napster/)
49 | * [LimeWire, Napster, The Pirate Bay: A Brief History of File Sharing](https://www.geek.com/gadgets/limewire-napster-the-pirate-bay-a-brief-history-of-file-sharing-1359473/)
50 | * [historyofdomainnames.com/napster/](http://www.historyofdomainnames.com/napster/)
51 | * [Napster is Finally Dead, here's a look back at what happened](https://www.businessinsider.com/napster-is-finally-dead-heres-a-look-back-at-what-happened-2011-10?IR=T)
52 | - [Early History of Napster - Legal Timeline](http://www.moyak.com/papers/napster-history.html)
53 | >While finishing his freshman year at Northeastern University, Shawn Fanning decided to create a piece of software that would allow people to search for and share MP3 files they had trouble finding. He then founded a company, Napster, Inc. in May of 1999, dropped out of school, and moved to northern California. Napster quickly became the world's largest community for sharing music files because it allowed easy searching, had a user-friendly interface, let users communicate with each other in various ways (i.e. chat), and to share each others' bookmarks.
54 | >
55 | >Due to the recording industry's efforts to close Napster down, many of the music sharing enthusiasts who had made it such a popular phenomenon moved on to use other services, such as Gnutella, AudioGalaxy, and Freenet. This was even more problematic for those concerned with copyright issues because these new services didn't have centralized servers or organizational structures to shut down.
56 | * [June 1, 1999, Napster](https://www.lifewire.com/history-of-napster-2438592)
57 | > Napster had a very different face when it first came into existence in 1999. The developers of the original Napster (brothers Shawn and John Fanning, along with Sean Parker) launched the service as a peer-to-peer (P2P) file sharing network. The software application was easy to use with a free account, and it was specifically designed for sharing digital music files (in the MP3 format) across a Web-connected network.
58 | * [Dec. 7, 1999: RIAA Sues Napster](https://www.wired.com/2009/12/1207riaa-sues-napster/)
59 | * [John Backus (@backus)](https://twitter.com/backus/status/1039701785789620224?s=20)
60 | > - Interested in decentralization today? Learn what worked in the 2000s for p2p file sharing:
61 | > - Decentralization is a legal tactic used alongside activism
62 | > - Decentralizing the wrong things is a waste of time
63 | > - Decentralizing everything is suicide by bad UX Threa...
64 | * [Resistant protocols: How decentralization evolves](https://medium.com/@jbackus/resistant-protocols-how-decentralization-evolves-2f9538832ada)
65 | > Decentralization is tough: Too little? You're dead. Too much? Unusable. We can learn a lot from the evolution of p2p file sharing
66 | * [John Backus (@backus)](https://twitter.com/backus/status/1020111697896341504?s=20)
67 | > p2p file sharing history is littered w/ predictions that a new **unstoppable and totally decentralized** protocol will takeover. It never happened. Users always flocked to the least decentralized system possible. Big lesson for today's blockchain and decentralization eco...
68 | >
69 | > I've been diving deep on the history of file sharing. If you listen to early news reports about Napster, it sounds a lot like fear around blockchain today [https://t.co/pggGtmdGFE](https://t.co/pggGtmdGFE)
70 |
71 | * [John Backus (@backus)](https://twitter.com/backus/status/1016088316498726912?s=20)
72 | > If you're interested in the connections between p2p file sharing history and blockchain, I've written about a bunch of connections in this article: [https://t.co/AoE2WvYHga](https://t.co/AoE2WvYHga)
73 |
74 | * [Fat protocols aren’t new: What blockchain can learn from p2p filesharing][CryptoQuikRead_141](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_141---Fat-Protocols-Arent-New-e2ndq4)
75 | > “People have speculated on what a future with fat protocols will look like. File sharing protocols aren’t exactly the same, but they have a lot of similarities we can learn from.”
76 | * [John Backus (@backus)](https://twitter.com/backus/status/1012070561306963968)
77 | > Fear of file sharing tech in 2000 even sounds like crypto today. "If they think Napster is bad ... there is a lot worse coming. Software that is untraceable" "The soon to come Freenet will offer completely anonymous and untraceable file trading"
78 |
79 |
80 |
81 | ### eDonkey
82 |
83 | * Sep 6, 2000, eDonkey2000 - Sued for copyright infringement.
84 |
85 | [](https://download.cnet.com/s/internet-file-sharing/windows/)
86 |
87 | * [wiki.debian.org/eDonkey](https://wiki.debian.org/eDonkey)
88 | > aMule -aMule is a peer to peer file sharing application that works with the eDonkey computer network, but offers more features than the standard eDonkey client. It is based on the eMule sourcecode, and evolved from ?LMule and xMule. It is now the Linux client on the eMule links section on their webpage. As eMule, aMule is open source software released under the GNU ?GeneralPublicLicense.
89 |
90 | * [emule-project](http://www.emule-project.net) eMule project - or [eMule on Sourceforge](http://emule.sf.net)
91 | * [Freemule.net](http://www.freemule.net/) - Website with the latest news on eMule's legal actions
92 | * [amule.org](http://www.amule.org) aMule's homepage - or aMule on ?BerliOS
93 | * [wiki.amule.org](http://wiki.amule.org/) aMule Wiki- Wiki of the aMule Project
94 |
95 |
96 |
97 | ## 2nd Generation
98 |
99 |
100 | * 2000 - [Gnutella](http://rakjar.de/gnufu/index.php/Main_Page)
101 | * 2002 [eMule](https://www.emule-project.net/home/perl/general.cgi?l=1)
102 | * 2001
103 | * [Blubster](http://web.archive.org/web/20010720062547/http://www.blubster.com/)
104 | * [Kazaa](http://theinventors.org/library/inventors/bl_KaZaA.htm)
105 | * 2002 - [Ares](http://aresgalaxy.sourceforge.net/)
106 | * 2003 - [Waste](https://www.afterdawn.com/news/article.cfm/2003/05/31/nullsoft_releases_waste_--_aol_pulls_the_plug)
107 | * 2000 - [Limewire](http://cultureandcommunication.org/deadmedia/index.php/Limewire)
108 | * https://www.theguardian.com/technology/2010/oct/27/limewire-shut-down
109 | * https://www.dfrws.org/sites/default/files/session-files/paper-limewire_examinations.pdf
110 | * [Filetopia](http://www.filetopia.com/)
111 | * [DirectConnect](http://www.dslreports.com/faq/dc)
112 |
113 | ### Bittorent
114 |
115 | * [WIRED -The Inside Story of BitTorrent’s Bizarre Collapse](https://www.wired.com/2017/01/the-inside-story-of-bittorrents-bizarre-collapse/)
116 |
117 | 
118 |
119 | * [visual.ly - infographic -history-bittorrent](https://visual.ly/community/infographic/technology/history-bittorrent)
120 |
121 | 
122 |
123 | [](https://medium.com/@simonhmorris/why-bittorrent-mattered-bittorrent-lessons-for-crypto-1-of-4-fa3c6fcef488)
124 | [medium.com - Why BitTorrent Mattered: Lessons for Crypto [1 of 4]](https://medium.com/@simonhmorris/why-bittorrent-mattered-bittorrent-lessons-for-crypto-1-of-4-fa3c6fcef488)
125 |
126 | * CryptoQuikRead_219 - [Why BitTorrent Mattered: Lessons for Crypto [1 of 4]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_219---Why-BitTorrent-Mattered-Lessons-for-Crypto-1-of-4-e3ghrs)
127 | * CryptoQuikRead_220 - [If You're Not Breaking the Rules Then You're Doing it Wrong: BitTorrent Lessons [2 of 4]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_220---If-Youre-Not-Breaking-the-Rules-Then-Youre-Doing-it-Wrong-BitTorrent-Lessons-2-of-4-e3grft)
128 | * CryptoQuikRead_221 - [Intent, Complexity, & The Governance Paradox: BitTorrent Lessons [3 of 4]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_221---Intent--Complexity---The-Governance-Paradox-BitTorrent-Lessons-3-of-4-e3h2uj)
129 | * CryptoQuikRead_222 - [Decentralized Disruption, Who Dares Wins: BitTorrent Lessons [4 of 4]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_222---Decentralized-Disruption--Who-Dares-Wins-BitTorrent-Lessons-4-of-4-e3hek4)
130 |
131 | * CryptoQuikRead_141 - [Fat Protocols Aren't New](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_141---Fat-Protocols-Arent-New-e2ndq4)
132 |
133 | ## Bittorrent
134 |
135 | * [Feross 🧙🏼♂️✨ (@feross)](https://twitter.com/feross/status/1148682080051703808?s=20)
136 | > The video of my talk "What I Learned from WebTorrent" was just released! In the talk, I share behind-the-scenes details about how WebTorrent was built, reflect on hard-won lessons, and share advice for other projects in the space.
137 | * [CIRCL » CIRCL Images AIL Dataset - Open Data at CIRCL](https://www.circl.lu/opendata/circl-ail-dataset-01/)
138 | * [CryptoQuikRead_220 - If You're Not Breaking the Rules Then You're Doing it Wrong: BitTorrent Lessons [2 of 4] by The Cryptoconomy Podcast](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_220---If-Youre-Not-Breaking-the-Rules-Then-Youre-Doing-it-Wrong-BitTorrent-Lessons-2-of-4-e3grft)
139 | > Today we cover Part 2 of Simon Morris's excellent series on the lessons we can take from BitTorrent to better understand the goals and value of Bitcoin and Crypto. If it doesn't break the rules, then why does decentralization even matter? Don't miss the excellent article,...
140 | * [CryptoQuikRead_221 - Intent, Complexity, & The Governance Paradox: BitTorrent Lessons [3 of 4] by The Cryptoconomy Podcast](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_221---Intent--Complexity---The-Governance-Paradox-BitTorrent-Lessons-3-of-4-e3h2uj)
141 | > In the context of Part 2, knowing that the true value of decentralization is in breaking rules, Simon Morris now explores the consequences of a systems "intent," the incredible complexity and balance it requires to sustain them, & the paradox of making changes to a system who...
142 | * [Evan Kirstel (@evankirstel)](https://twitter.com/evankirstel/status/749248794550730752?s=20)
143 | > Today in 2001 – @BramCohen first revealed #BitTorrent on a Yahoo group called decentralization #Tech #History
144 | * [Could BitTorrent be the Most Important Development Since the Printing Press](https://medium.com/@MTorygreen/could-bittorrent-be-the-most-important-development-since-the-printing-press-a8e47d1265ab)
145 | > There’s been a lot of buzz over Tron’s BitTorrent since its $7.2M token sale last week, and rightfully so — the platform allows over 100…
146 | * [Why BitTorrent Mattered — Bittorrent Lessons for Crypto (1 of 4)](https://medium.com/@simonhmorris/why-bittorrent-mattered-bittorrent-lessons-for-crypto-1-of-4-fa3c6fcef488) - [CryptoQuikRead_219](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_219---Why-BitTorrent-Mattered-Lessons-for-Crypto-1-of-4-e3ghrs)
147 | > Bitcoin is an incredibly novel technology, there are few technologies that can boast the revolutionary impact that Bitcoin potentially has. However, there is still much to be learned from its predecessors and benefactors. One of those being the resilient and disruptive ecos...
148 | * [feentorrents (@feentorrents)](https://twitter.com/feentorrents/status/412327557246111744?s=20)
149 | > #FreedomFeens #bittorrent of Episode 302- Scott Horton’s History Of The World, Part 1 [http://t.co/OatBXREK0s](http://t.co/OatBXREK0s)
150 | * [A Beginner's Guide The Pirate Bay Controversy](https://www.complex.com/pop-culture/2015/01/the-pirate-bay-down-and-up-again/)
151 | > From old legal troubles to the recent raid, we walk you through the shut down (and possible return of torrent site The Pirate Bay)
152 | * [TPB AFK: The Pirate Bay Away From Keyboard](https://www.youtube.com/watch?v=eTOKXCEwo_8)
153 | > The documentary about the founders of the Pirate Bay. Share it with the world! Support the filmmakers of this free film here www.tpbafk.tv A film by Simon Klose
154 | * [Watch Pirate Bay Documentary TPB AFK Here (Or on Pirate Bay, Natur...](https://www.wired.com/2013/02/pirate-bay-documentary/)
155 |
156 | The new documentary TPB AFK is now available in almost every online format from YouTube to, yes, The Pirate Bay.
157 |
158 |
159 | ## 3rd Generation
160 |
161 | ### Freenet
162 |
163 | * 1999 [Freenet](http://freenetproject.org/)
164 | * Freenet went Darknet in 2008
165 | * [What is Freenet?](https://freenetproject.org/pages/about.html)
166 | * [Pirate DNS Could Hatch a Lawless Darknet](https://www.pcworld.com/article/212263/pirate_dns_could_hatch_a_lawless_darknet.html)
167 | > The Pirate Bay wants a new DNS system that will be impossible to censor, but also impossible to police. Would it be worthwhile?
168 |
169 |
170 |
171 |
173 |
174 | ## After Bitcoin
175 |
176 | * 2009 - Bitcoin
177 | * 2011 - Namecoin
178 | * 2012 - Diaspora
179 |
180 | ### Decentralised Storage Networks
181 |
182 | * Filecoin
183 | * Swarm
184 | * Sia
185 | * Storj
186 | * Maidsafe
187 |
188 | ## Openbazaar
189 |
190 | * [Brian Hoffman & Washington Sanchez: OpenBazaar – Growing a Permi...](https://epicenter.tv/episode/279/)
191 | We're joined by Brian Hoffman and Washington Sanchez of OpenBazaar. The project has grown to become a mature decentralized marketplace where people come together to buy and sell products and services anonymously with crypto.
192 | * [Untold Stories: Brian Hoffman Leaving The Government For OpenBazaar](https://blockworksgroup.io/podcasts/untold-stories-brian-hoffman-openbazaar-gethaven)
193 | OpenBazaar founder Brian Hoffman talks about leaving his elite government job to grow a startup but covers some fascinating ground as well as...
194 | * [OpenBazaar Is Not The Next Silk Road -- It's An Anarchist eBay On Acid](https://www.forbes.com/sites/thomasbrewster/2016/03/16/openbazaar-silk-road-dark-web-drugs-ebay/)
195 | OpenBazaar is open to all and promises anonymous shopping. Could it become the next Silk Road? Or is it destined to radically change Internet retail as we know it?
196 | * [OpenBazaar interview with the CEO - Brian Hoffman! Fascinating pro...](https://bitcoin-millionaire.com/business-openbazaar/)
197 | Have you heard of OpenBazaar or DarkMarket before? If not ever thought about peer to peer ebay for Bitcoin? If so OpenBazaar is what you need to know about!
198 | * [OpenBazaar 2018 Roadmap](https://openbazaar.org/blog/openbazaar-2018-roadmap/)
199 | It’s been a while since we updated the roadmap for OpenBazaar development. The previous roadmap essentially stated: “Get 2.0 finished!” We did that last November, and since then we’ve also released one major update (2.1.1) which allowed people to use Bitcoin Cash and ...
200 | * [OpenBazaar's Brian Hoffman and ZCash's Jack Gavigan on privacy and...](https://cryptonewsreview.com/openbazaars-brian-hoffman-and-zcashs-jack-gavigan-on-privacy-and-decentralised-markets/)
201 | “Regulators are going to come around – some of them already have,” says crypto privacy advocate… One of the great things about events like last week’s World Blockchain Forum is that players from the crypto space get to indulge in impromptu meet-ups, and chat with ea...
202 | * [Some of tech's biggest investors are funding a police-proof market...](https://www.businessinsider.com/openbazaar-gets-1-million-seed-round-from-andreessen-horowitz-union-square-ventures-2015-6)
203 | The next Silk Road — or the next Etsy?
204 | * [The Fed-Proof Online Market OpenBazaar Is Going Anonymous](https://www.wired.com/2017/03/fed-proof-online-market-openbazaar-going-anonymous/)
205 | OpenBazaar is set to integrate Tor's anonymity features---but still swears it's not trying to attract the dark web's black market sales.
206 | * [OB1: OpenBazaar, P2P Keys to Global eCommerce | PYMNTS.com](https://www.pymnts.com/news/ecommerce/2018/openbazaar-p2p-private-global-ecommerce-cryptocurrency/)
207 | OpenBazaar bills itself as a new way to transact online, through decentralized markets and with cryptocurrencies. As parent company OB1 CEO Brian Hoffman tells PYMNTS, OpenBazaar has no restrictions (or fees), aiming to reduce transaction costs and bring marketplace power to ...
208 | * [How OpenBazaar’s Early Adopters Are Testing the Online Market - ...](https://www.coindesk.com/7-vendors-early-adopters-openbazaar)
209 | OpenBazaar isn't even fully operational and vendors have begun to test its services. A look at who's preparing to do business reveals surprising diversity.
210 | * [https://news.ycombinator.com/item?id=14829945](https://news.ycombinator.com/item?id=14829945)
211 | work on OpenBazaar and I'm happy to answer questions.
212 | This website links to the current version of OpenBazaar, but we're just about to launch a completely new version, which you can read about here:
213 | https://medium.com/openbazaarproject/openbazaar-2-0-p2p-trade-takes-the-next-step-4d75b7f23ec8
214 | The 2.0 is built with Go and uses IPFS. It's open source and we welcome any developers into the project:
215 | https://github.com/OpenBazaar/openbazaar-go
216 |
217 | [](https://hackernoon.com/outgrowing-our-internet-caught-between-the-intranet-and-the-decentralized-web-707c532abbe2)
218 | [Caught Between the Intranet and the Decentralized Web](https://hackernoon.com/outgrowing-our-internet-caught-between-the-intranet-and-the-decentralized-web-707c532abbe2) - 2017
219 |
220 |
221 | ---
222 |
223 | {% include _improve_history.html %}
224 | ### Related Content
225 |
226 | {% include list-posts entries='5' category='History' %}
227 |
--------------------------------------------------------------------------------
/2019-11-27-money.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "Histories in Currency"
4 | title: "💲 Money"
5 | teaser: "Not much here, yet."
6 | categories: ["History"]
7 | header: no
8 | last_modified_at: 2020-02-02T13:22:33-23:00
9 | directory: 2019-11-27-money.md
10 |
11 | ---
12 |
13 |
14 | * [Blockchain's Secret 1,000 Year History](https://www.forbes.com/sites/oliversmith/2018/03/23/blockchains-secret-1000-year-history/)
15 | > Far from a modern idea, Blockchain, in fact, has a long history tracing all the way back to the tribal villages of the tiny island of Yap in 500AD.
16 | * [Bezant Denier (@bezantdenier)](https://twitter.com/bezantdenier/status/1165613209270833152?s=12)
17 | > 1.) Published: “Tales of Soft Money — Oceans of Wealth” This article provides eyewitness accounts on the use of seashell money in Africa and in Asia, and also on the logical conclusion of such monetary systems in the face of economic forces. [https://t.co/gDDfimILMd](https://t.co/gDDfimILMd)
18 | * [Blockchain Mama (@EvolutionCrypto)](https://twitter.com/evolutioncrypto/status/981901294850854912?s=12)
19 | > April 5th, 1933, federal reserve confiscated all the gold from US citizens. Interesting..
20 | * CryptoQuikRead_075 - [Homo Sapiens, Evolution, Money & Bitcoin](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_075---Homo-Sapiens--Evolution--Money--Bitcoin-e2nds7)
21 |
22 | [](https://nakamotoinstitute.org/shelling-out/)
23 | * [Shelling Out The Origins of Money](https://anchor.fm/thecryptoconomy/episodes/Shelling-Out---The-Origins-of-Money-e2ndom) Complete
24 | * CryptoQuikRead_176 - [[Part 1]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_176---Shelling-Out---The-Origins-of-Money-Part-1-e2ndor)
25 | * CryptoQuikRead_177 - [[Part 2]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_177---Shelling-Out---The-Origins-of-Money-Part-2-e2ndoq)
26 | * CryptoQuikRead_178 - [[Part 3]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_178---Shelling-Out---The-Origins-of-Money-Part-3-e2ndos)
27 | * CryptoQuikRead_179 - [[Part 4]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_179---Shelling-Out---The-Origins-of-Money-Part-4-e2ndop)
28 | * CryptoQuikRead_262 - [The Island of Stone Money](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_262---The-Island-of-Stone-Money-e4d6m0)
29 | * GuysTake_18 - [A Story About Booms & Busts](https://anchor.fm/thecryptoconomy/episodes/GuysTake_18---A-Story-About-Booms--Busts-e4aflh)
30 |
31 |
32 | ---
33 |
34 | {% include _improve_history.html %}
35 | ### Related Content
36 |
37 | {% include list-posts entries='5' category='History' %}
38 |
--------------------------------------------------------------------------------
/2019-12-13-cyberpunk.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "Information was meant to be free"
4 | title: Cyberpunk History
5 | teaser: Phone Phreaks, BBS, Warez, and Cult of the Dead Cow
6 | header: no
7 | categories: ["History"]
8 | tags: ["Early Internet", "Hacker"]
9 | permalink: "/history/early-internet/cyberpunk/"
10 | last_modified_at: 2020-03-02T11:22:33-23:00
11 | directory: 2019-12-13-cyberpunk.md
12 |
13 | ---
14 |
15 | * [A Cyberpunk Manifesto: 20 Years Later – Neon Dystopia](https://www.neondystopia.com/cyberpunk-fashion-lifestyle/a-cyberpunk-manifesto-20-years-later/)
16 | > It was Valentine’s Day in 1997. Many of us were already cemented in our love of cyberpunk and cyber-culture was in full swing. Then came A Cyberpunk Manifesto by Kristiyan Kirchev. I was only just discovering the genre at this time and reading this document during my format...
17 | * [A Cyberpunk Manifesto](http://project.cyberpunk.ru/idb/cyberpunk_manifesto.html) By Christian As. Kirtchev
18 | > We are the ELECTRONIC MINDS, a group of free-minded rebels. Cyberpunks.
19 | > We live in Cyberspace, we are everywhere, we know no boundaries.
20 | > This is our manifest. The Cyberpunks' manifest.
21 | >
22 | > 1/ We are those, the Different. Technological rats, swimming in the ocean of information.
23 | * [A very short history of Cyberpunk](https://www.athabascau.ca/courses/engl/491/cyberpunk_history.pdf)
24 | > Neuromancer made a big splash not because it was the "first" cyberpunk novel, but rather, because it perfectly captured the Zeitgeist of anxiety and wonder that prevailed at the dawning of the present era of globalized economics, digital telecommunications, and exponential technological progress --things which we now take for granted but which, in the early 1980s were still new and frightening. For example, Gibson's novels exhibit a fascination with the "Japanification" of Western culture --then a major concern, but now a forgotten and laughable anxiety. This is also visible in the futuristic Los Angeles of Scott’s Blade Runner.
25 | * [History of Cyberpunk](http://project.cyberpunk.ru/idb/history.html)
26 | > ...The free human mind, creating the future, brings us to the new age - the Cyber Age. The inventing of the electricity and the telephone marks the beginning of the rise of the mankind. Broadcasting of sounds and images changed the human life forever...
27 | >
28 | > With every new invention, the world - a child of the new age - was growing. Mankind saw millions of new opportunities. The Computer was the biggest invention of the human race ever made after the discovery of electricity. This invention of the seething intelligence became the most used one in daily life... This new invention opened a door to a new dimension - the cyberworlds also known as Virtual Reality. The computer-synthesized worlds were the brand new technology, taking more and more victims... After those events the world could never be the same again...
29 | * [What is cyberpunk?](https://www.polygon.com/features/2018/8/30/17796680/cyberpunk-2077-history-blade-runner-neuromancer) - We present a brief history of the near future
30 | > a woman doing her makeup as the camera slowly pulls out to reveal she’s missing the bottom half of her face, a gaping cybernetic maw in its place. A cable jacked directly into a businessman’s skull, sparking and smoking as it fries his brain. An elevator the size of an apartment, crawling up the side of a high-rise towards the sky.
31 | >
32 | > These are just some of the fragmented vignettes studio CD Projekt Red put on display in Cyberpunk 2077’s debut trailer earlier this year. As an introduction to Night City, it promised one of the most distinctive game settings since Rapture or City 17 — but not much of its neon-soaked imagery is original. And that’s by design.
33 | * [Cyberpunk](http://web.mit.edu/m-i-t/science_fiction/jenkins/jenkins_5.html) - mit media in transition project
34 | > The cyberpunk movement in American science fiction first took shape in the early 1980s in the fiction of such figures as Bruce Sterling, William Gibson, Rudy Rucker, Pat Cadigan, and James Patrick Kelly. However different in other respects, these writers were preoccupied by the changing place of media in American society, especially in the wake of the initial phases of the "digital revolution."
35 | >
36 | > In his introduction to Mirrorshades, an anthology which helped to map the parameters of the cyberpunk movement, Bruce Sterling argues that cyberpunk reflects a new perspective on technology, not only among science fiction writers, but among consumers. For Sterling cyberpunk imagines an "overlapping of worlds that were formally separate: the realm of high tech and the modern pop underground."
37 | >
38 | > Cyberpunk's protagonists are hackers, rockers, and other cultural rebels, clinging to a cult of individualism in a culture characterized by corporate control and mass conformity. These protagonists are adept at appropriating the materials of popular culture and making them speak to alternative needs and interests; they also know how to tap into the vast digital database to access information about corporations and their secret conspiracies, or to spread resistant messages despite powerful mechanisms of top-down control.
39 | * [What is cyberpunk?](https://www.polygon.com/features/2018/8/30/17796680/cyberpunk-2077-history-blade-runner-neuromancer) - We present a brief history of the near future
40 | * [The History of Cyberpunk](https://www.tiki-toki.com/timeline/entry/317380/The-History-of-Cyberpunk/) - Exploring the history of Cyberpunk through literary works and film
41 | * [Cyberpunk Information Database](http://project.cyberpunk.ru/idb/)
42 | > Cyberpunk Information Database - The Definitive Cyberpunk Information Collection by The Cyberpunk Project.
43 | * [Digital: A Love Story; Nostalgia, Irony and Cyberpunk](http://futurismic.com/2011/01/05/digital-a-love-story-nostalgia-irony-and-cyberpunk/)
44 | > Nostalgia ain’t what it used to be. Originally coined in 1688 by a medical student investigating the tendency of Swiss mercenaries to become homesick to the point of physical incapacity, nostalgia soon changed from being a curable physical ailment to being an unassuageable psychological condition, a sickness of the soul.
45 | >
46 | > This shift was the result of nostalgia being partly decoupled from the concept of homesickness. Homesickness can be cured by allowing the sufferer to return home, but nostalgia came to signify a longing not for a particular place but for a by-gone age forever out of reach… short of someone inventing time travel. However, despite becoming de-pathologised, nostalgia never quite managed to shed the negative connotations of its medical origins and the late 20th Century’s decision to turn nostalgia from a condition into a marketing strategy did little for its respectability in certain circles.
47 | * [Cyberpunk Librarian - High tech, low budget](https://cyberpunklibrarian.com/series/cyberpunk-librarian/)
48 | * [Mondo 2000](https://www.mondo2000.com/) - Mondo 2000 The original magazine of cyberculture returns. Watch out for your overcoats!
49 | * [In the beginning was the command line (1999) [pdf]](https://news.ycombinator.com/item?id=20684764) By Neal Stephenson - [Hacker News](https://news.ycombinator.com/item?id=20684764)
50 | > About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for use in the home. The business took off, and its founders made a lot of money and received the credit they deserved for being daring visionaries. But around the same time, Bill Gates and Paul Allen came up with an idea even stranger and more fantastical: selling computer operating systems. This was much weirder than the idea of Jobs and Wozniak. A computer at least had some sort of physical reality to it. It came in a box, you could open it up and plug it in and watch lights blink. An operating system had no tangible incarnation at all. It arrived on a disk, of course, but the disk was, in effect, nothing more than the box that the OS came in. The product itself was a very long string of ones and zeroes that, when properly installed and coddled, gave you the ability to manipulate other very long strings of ones and zeroes. Even those few who actually understood what a computer operating system was were apt to think of it as a fantastically arcane engineering prodigy, like a breeder reactor or a U-2 spy plane, and not something that could ever be (in the parlance of high-tech) "productized."
51 | >
52 | > Yet now the company that Gates and Allen founded is selling operating systems like Gillette sells razor blades. New releases of operating systems are launched as if they were Hollywood blockbusters, with celebrity endorsements, talk show appearances, and world tours. The market for them is vast enough that people worry about whether it has been monopolized by one company. Even the least technically-minded people in our society now have at least a hazy idea of what operating systems do; what is more, they have strong opinions about their relative merits. It is commonly understood, even by technically unsophisticated computer users, that if you have a piece of software that works on your Macintosh, and you move it over onto a Windows machine, it will not run. That this would, in fact, be a laughable and idiotic mistake, like nailing horseshoes to the tires of a Buick.
53 |
54 | ## Cyberpunk Books
55 |
56 | [](https://www.goodreads.com/book/show/22332.Cyberpunk_and_Cyberculture)
57 | Cyberpunk and Cyberculture: Science Fiction and the Work of William Gibson. ^^^ Really excellent literary review!
58 |
59 | * [https://www.athabascau.ca/courses/engl/491/cyberpunk_history.pdf](https://www.athabascau.ca/courses/engl/491/cyberpunk_history.pdf)
60 | > Neuromancer made a big splash not because it was the "first" cyberpunk novel, but rather, because it perfectly captured the Zeitgeist of anxiety and wonder that prevailed at the dawning of the present era of globalized economics, digital telecommunications, and exponential technological progress --things which we now take for granted but which, in the early 1980s were still new and frightening. For example, Gibson's novels exhibit a fascination with the "Japanification" of Western culture --then a major concern, but now a forgotten and laughable anxiety. This is also visible in the futuristic Los Angeles of Scott’s Blade Runner.
61 | * [Cyberpunk Reading List](https://tanukibtc.home.blog/cyberpunk-reading-list/)
62 | > - Neuromancer, William Gibson 1984
63 | > - Count Zero, William Gibson 1986
64 | > - Metrophage, Richard Kadrey 1988
65 | > - Wetware, Rudy Rucker 1988
66 | > - Mona Lisa Overdrive, William Gibson 1989
67 | > - Snow Crash, Neal Stephenson 1992
68 | > - Freeware, Rudy Rucker 1997
69 | > - Realware, Rudy Rucker 2000
70 | > - Jennifer Government, Max Barry 2003
71 | > - The Windup Girl, Paolo Bacigalupi 2009
72 | * [Must Read Cyberpunk Books](https://futurism.media/must-read-cyberpunk-books)
73 | > Cyberpunk book readers navigate sprawling neon cities populated by hackers, gangsters, outcasts, and femmes fatales.
74 | * [Did Neal Stephenson's Snow Crash predict the world of today?](https://io9.gizmodo.com/did-neal-stephensons-snow-crash-predict-the-world-of-t-511697336)
75 | > That's what a number of venture capitalists and futurists told the Wall Street Journal recently. They cite Stephenson's classic novel as a harbinger of many current staples, from World of Warcraft to Google's search capabilities.
76 | * [Snow Crash Revisited: Grokking a Satire of Mimesis](https://hackernoon.com/snow-crash-revisited-grokking-a-satire-of-mimesis-23de3ac05f47)
77 | > The other day, I found myself in an intense conversation about the potential of shared virtual reality with a senior engineer at one of the largest tech companies in Silicon Valley. I say a “conversation,” but if I were to be more frank, I would have to admit that for long stretches I was on the receiving end of a rant. My interlocutor’s argument was impassioned, utterly contrarian, and possibly correct. One thing he said in passing struck me as hyperbolic but nonetheless apt: “Never trust an engineer who isn’t fond of Snow Crash.”
78 |
79 | ## The Phone Phreaks and 'Computer Hacking'
80 |
81 | * [.:: Phrack Magazine ::.](http://phrack.org/issues/7/3.html)
82 | * [Teenage hackers motivated by morality not money, study finds](https://www.theguardian.com/society/2017/apr/21/teenage-hackers-motivated-moral-crusade-money-cybercrime)
83 | > Young people attack computer networks to impress friends and challenge political system, crime research shows
84 | * [‘Hacker’ security biz built on FBI snitches](https://www.theregister.co.uk/2002/07/17/hacker_security_biz_built/)
85 | * [The History of Hacking and Phreaking - Help Net Security](https://www.helpnetsecurity.com/2002/04/04/the-history-of-hacking-and-phreaking/)
86 | > -=-=-=-=-=- Okay boys and girls, children of all ages...Here's a revolutionary idear....The announcements foist! -=-=-=-=-=- The file we released on
87 | * [http://www.takedown.com/](http://www.takedown.com/) - [ycombinator thread](https://news.ycombinator.com/item?id=17058880) - Kevin Mitnick
88 | * [The watchman : the twisted life and crimes of serial hacker Kevin Poulsen](https://archive.org/stream/watchmantwistedl00jona/watchmantwistedl00jona_djvu.txt)
89 | * [Kingpin by Kevin Poulsen](https://www.wired.com/2011/02/kingpin-by-kevin-poulsen/)
90 | * [satuyn (@satuyn)](https://twitter.com/satuyn/status/1174267599112298497?s=20)
91 | > @hodlonaut Non-fiction books I'd recommend: Cyberpunk by Hafner & Markoff - 80s hacker culture The Hacker Crackdown - Sterling - US gov realizes genie is out of bottle Masters of Deception - Slatalla - 80s Hacker culture Underground by Dreyfus - Assange and *other* Aussie ...
92 | * [2600 Magazine: Digital Editions](https://www.2600.com/Magazine/DigitalEditions)
93 | * [Darknet Diaries: Ep 23: Vladimir Levin on Apple Podcasts](https://podcasts.apple.com/us/podcast/darknet-diaries/id1296350485?i=1000420795591)
94 | * [Today In Infosec (@todayininfosec)](https://twitter.com/todayininfosec/status/1179587325690400768?s=20)
95 | > 1996: "Hackers", the first episode of the TV series Net Cafe aired. It was filmed in a cyber cafe in San Francisco called CoffeeNet. Dan Farmer, Aleph One, White Knight, Reid Fleming, Mudge, and Deth Veggie appeared in the episode. Watch and enjoy! [https://t.co/2xWfTrNI1p](https://t.co/2xWfTrNI1p)
96 | * [The Art of Warez [video]](https://news.ycombinator.com/item?id=20596454) - Hacker News • 02-Aug-19 04:41 PM
97 | * [Cult of the Dead Cow: the untold story of the hacktivist group that presaged everything great and terrible about the internet](https://boingboing.net/2019/06/25/hacker-zelig.html)
98 | > Back in 1984, a lonely, weird kid calling himself Grandmaster Ratte' formed a hacker group in Lubbock, Texas. called the Cult of the Dead Cow, a name inspired by a nearby slaughterhouse. In the decades to come, cDc would become one of the dominant forces on the BBS scene and then the internet -- endlessly inventive, funny and prankish, savvy and clever, and sometimes reckless and foolish -- like punk-rock on a floppy disk.
99 |
100 | ## BBS
101 |
102 | * [This is the Modem World: The sinister side of the '80s BBS](https://www.engadget.com/2013/07/31/the-sinister-side-of-the-80s-bbs/)
103 | * [A 1985 Essay from a Bulletin Board System Admin Eerily Foretold Our Future](https://www.vice.com/en_us/article/jp5y84/a-1985-essay-from-a-bulletin-board-system-admin-eerily-foretold-our-future)
104 | > From privacy to the dark web, this obscure essay has it all.
105 | * [Today in cyberpunk history: First BBS goes online.](https://www.static.anarchivism.org/cyberpunkreview-archive/www.cyberpunkreview.com/cyberpunk-history/today-in-cyberpunk-history-first-bbs-goes-online/index.html)
106 | > Those of you who never experienced the days of the “command line” or “DOS prompt” may not realize the impact that the bulletin board system, or BBS, has on today’s Internet. The archive site textfiles.com seeks to preserve those heady, monochrome, dial-up days for old-timers to relive and for the curious to see what the net was like before GUIs.
107 | * [A Brief History Of cyberpunk.live](http://www.cyberpunklive.ca/history.html) - cyberpunk.live was a Rogers Community 22 television show that ran from 1994 to 1996 and covered hte burgeoning Internet and BBS scene in Ottawa
108 | > In the summer of 1994, Ottawa screenwriter and standup comedian Rick Kaulbars came up with the idea of a call-in television show about the rapidly growing Internet and the locally popular BBS scene. A BBS user himself, Rick recognized that the growing availability of communications and computing technology to the general public would revolutionize the way in which people interacted, worked, and played. He was not the first to understand that the birth of the "information highway" (as it was popularly dubbed in those days) was going to be a major social development. But he did realize this would lead to an increasing demand amongst new and experienced users for information and news about this evolving phenomenon.
109 | * [Anatoly Shashkin💾 (@dosnostalgic)](https://twitter.com/dosnostalgic/status/714805561196421120?s=20)
110 | >Do you remember the days of Bulletin Board Systems? No matter what ur answer is, u should watch BBS: The Documentary [https://t.co/27uPksSVRi](https://t.co/27uPksSVRi)
111 |
112 | ## Anarchist Cookbook
113 |
114 | * [Editions of The Anarchist Cookbook by William Powell](https://www.goodreads.com/work/editions/243756-the-anarchist-cookbook)
115 | > Editions for The Anarchist Cookbook: 0974458902 (Paperback published in 1971), 0818400048 (Hardcover published in 1971), 0962303208 (Paperback published ...
116 | * [The contentious history of the Anarchist Cookbook](https://bigthink.com/culture-religion/anarchist-cookbook?rebelltitem=1)
117 | > It's difficult to find a book more eclectic, violent, provocative, and incendiary than the Anarchist Cookbook. It's a bizarre instruction manual that covers a wide array of topics whose only connection is that they are often illegal and dangerous. Broadly, the book covers fou...
118 | * [William Powell, ‘Anarchist Cookbook’ Writer, Dies at 66](https://www.nytimes.com/2017/03/29/arts/william-powell-anarchist-cookbook-writer-dies.html)
119 | > The author was an angry teenager when he began research on the book, which outlined weapon use, bomb-building techniques and drug manufacturing.
120 | * [I wrote the Anarchist Cookbook in 1969. Now I see its premise as f...](https://www.theguardian.com/commentisfree/2013/dec/19/anarchist-cookbook-author-william-powell-out-of-print)
121 | > William Powell: When I penned the book, I was angry and alienated. Today I realize that violence can't be used to prevent violence
122 | * [The Anarchist's Cookbook Written by: The Jolly Roger](http://index-of.co.uk/Tutorials-2/The%2520Proper%2520Anarchists%2520Cookbook.pdf)
123 | * [Read the FBI’s review of ‘The Anarchist Cookbook’](https://theoutline.com/post/6285/read-the-fbis-review-of-the-anarchist-cookbook?zd=1&zi=77ew2zqy)
124 |
125 |
126 | ---
127 |
128 | {% include _improve_history.html %}
129 | ### Related Content
130 |
131 | {% include list-posts entries='5' category='History' %}
132 |
--------------------------------------------------------------------------------
/2019-12-15-cryptography.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "All roads lead back to Chaum"
4 | title: Histories of Digital Cryptography
5 | teaser: Hash Algorithms, Public Key Crypto, and Digital Signatures, oh my!
6 | categories: ["History"]
7 | tags: ["Before Bitcoin","Cryptography", "Early Internet"]
8 | permalink: /history/cryptography/
9 | last_modified_at: 2020-02-02T13:22:33-23:00
10 | directory: 2019-12-15-cryptography.md
11 | ---
12 |
13 | * [EFF - Crypto Is For Everyone—and American History Proves It](https://www.eff.org/deeplinks/2015/10/crypto-everyone-and-american-history-proves-it)
14 | * ["GET READY FOR A WORLD CURRENCY"](http://altcoopsys.org/wp-content/uploads/2017/01/ArticleEconomist1988GetReadyforthePhoenix_001.pdf)
15 | Get Ready for the Phoenix- Economist; 01/9/88, Vol. 306, pp 9-10
16 | * [Before Babylon, Beyond Bitcoin: From Money that We Understand to Money that Understands Us](https://the-eye.eu/public/concen.org/Before%20Babylon%2C%20Beyond%20Bitcoin%20%282017%29%20%28Pdf%29%20Gooner/Before%20Babylon%2C%20Beyond%20Bitcoin%20%282017%29.pdf)
17 |
18 | ## Digital Cryptography
19 |
20 | * [The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography](https://www.amazon.com/Code-Book-Science-Secrecy-Cryptography/dp/0385495323) [[**ϟ**](https://simonsingh.net/cryptography/crypto-cd-rom/)]
21 | > "Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy."
22 |
23 | **Hash Algorithms**
24 | * [History of Hash Algo's - StackExchange](https://crypto.stackexchange.com/questions/56404/what-was-the-first-hash-and-what-problem-was-it-supposed-to-solve)
25 | * [New Directions in Cryptography](https://ee.stanford.edu/~hellman/publications/24.pdf) '76
26 | * [DATA ENCRYPTION STANDARD (DES)](http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips46-3.pdf) approved as a federal standard in ['76](https://en.wikipedia.org/wiki/Data_Encryption_Standard#History_of_DES)
27 |
28 | **Public Key Cryptography**
29 | * Publishing a new idea
30 | by Ralph C. Merkle
31 | >In the Fall of 1974, as an undergraduate, I enrolled in CS244, the Computer Security course offered at UC Berkeley and taught by Lance Hoffman. We were required to submit two project proposals, one of which we would complete for the course. I submitted a proposal for what would eventually become known as Public Key Cryptography -- which Hoffman rejected. I dropped the course, but kept working on the idea.
32 | * [Part 1](https://www.youtube.com/watch?v=_ZTWLAqYf9c) — [Part 2](https://www.youtube.com/watch?v=oR0_LPbWxe4) about the development of public-key cryptography.
33 |
34 |
For a more complete version, read:
35 | * CRYPTO— how the code rebels beat the government— saving privacy in the digital age -Steven Levy
36 | * [THE OPEN SECRET](https://www.wired.com/1999/04/crypto/)
37 | —Public key cryptography - the breakthrough that revolutionized email and ecommerce - was first discovered by American geeks. Right? Wrong.
38 | > The story of the invention of public key cryptography is a cypherpunk sacred text: In 1976, an iconoclastic young hacker named Whitfield Diffie hooked up with Stanford professor Martin Hellman, and together they devised what experts hailed as the most important development in crypto since the invention of polyalphabetic ciphers during the Renaissance. The duo produced a system that allowed an unlimited number of people to communicate with total privacy.
39 |
40 |
41 |
42 |
43 | * [How to Time-Stamp a Digital Document](https://link.springer.com/content/pdf/10.1007%2F3-540-38424-3_32.pdf) 1991
44 | * [The Eureka Moment That Made Bitcoin Possible](https://www.wsj.com/articles/the-eureka-moment-that-made-bitcoin-possible-1527268025) [[**ϟ**](https://www.facebook.com/flx/warn/?u=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fthe-eureka-moment-that-made-bitcoin-possible-1527268025&h=AT01z4enWp-C1obtu-eTYF1yxmB7LWM9N9GM5vFGWJOuHVW9xuis-tFhcHpSMOshOHAMVWzS8XSPquk_VkFphpN7G5irj39Kp1dzgWurvz5Am_8)]
45 | > A key insight for the technology came to a physicist almost three decades ago at a Friendly’s restaurant in New Jersey.
46 | * [Why I wrote PGP](https://philzimmermann.com/EN/essays/index.html) - [CryptoQuikRead_150](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_150---Why-I-wrote-PGP-e2ndpp)
47 | > “If we do nothing, new technologies will give the government new automatic surveillance capabilities that Stalin could never have dreamed of. The only way to hold the line on privacy in the information age is strong cryptography.” -Phil Zimmerman Explore this article & ...
48 | * [𝓡𝓪𝓶𝓹𝓪𝓰𝓮 🦍 (@Thrillmex)](https://twitter.com/Thrillmex/status/1061583930724253697)
49 | > NSA: HOW TO MAKE A MINT: THE CRYPTOGRAPHY OF ANONYMOUS ELECTRONIC CASH References two articles written by "Tatsuaki Okamoto" from 1991. Titled; An Efficient Divisible Electronic Cash Scheme Universal Electronic Cash Is this the OG Satoshi Nakamoto?
50 | * [bitrawr⚡🦖 (@bitrawr)](https://twitter.com/bitrawr/status/1135130717724250113)
51 | > #Bitcoin’s building blocks. All hail #Satoshi
52 | > 🌿 1979: Hash trees
53 | > 🗝 1980: Public key cryptography
54 | > ⌛ 1991: Cryptographic timestamps
55 | > ⛓ 1992-3: PoW for spam
56 | > 💸 1997: HashCash
57 | > 💰 1998: BitGold
58 | > 💷 1998: B-money
59 | > 🏰 1999: pBFT
60 | > 💾 ~2000: MojoNation/BitTorrent
61 | > ⚔ 2001: SHA-256
62 | * [Today In Infosec (@todayininfosec)](https://twitter.com/todayininfosec/status/981710806252318720)
63 | > 1977: Alice and Bob became a thing. Ron Rivest first introduced Alice and Bob in the paper "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems".
64 | * [Matthew Green (@matthew_d_green)](https://twitter.com/matthew_d_green/status/596674230214877184)
65 | > Since key escrow is cool again, here are some classic posters from the Clipper era. Courtesy of Ron Rivest.
66 | * [Whitfield Diffie on the History of Cryptography — What Bitcoin Did](https://www.whatbitcoindid.com/podcast/whitfield-diffie-on-the-history-of-cryptography)
67 | > In this episode, I talk with legend of cryptography, Whitfield Diffie. Whit was working on cryptography long before Bitcoin existed, building the foundations for which Bitcoin relies upon. We discuss his history, Bitcoin and his views on privacy.
68 | * [Geoff Sullivan, Esq. (@geoffsengine)](https://twitter.com/geoffsengine/status/1123929546233982977)
69 | > @emmataylorwords @tnmoc "Codebreakers- The inside story of Bletchley Park". Edited by Hinsley & Stripp is a good place to start. Paperback or Kindle If you really get hooked on the Polish contribution, Dermot Turing's X, Y & Z is good. but rather complex spy story, based a...
70 | * [The Open Secret](https://www.wired.com/1999/04/crypto/)
71 | > Public key cryptography – the breakthrough that revolutionized email and ecommerce – was first discovered by American geeks. Right? Wrong. The story of the invention of public key cryptography is a cypherpunk sacred text: In 1976, an iconoclastic young hacker named Whitfi...
72 | * [The Alternative History of Public-Key Cryptography](https://cryptome.org/ukpk-alt.htm)
73 | > Over the past twenty years, Diffie, Hellman and Merkle have become world famous as the cryptographers who invented the concept of public-key cryptography, while Rivest, Shamir and Adleman have been credited with developing RSA, the most beautiful implementation of public-key cryptography. However, a recent announcement means that the history books are having to be rewritten. According to the British Government, public-key cryptography was originally invented at the Government Communications Headquarters (GCHQ) in Cheltenham, the top-secret establishment that was formed from the remnants of Bletchley Park after the Second World War. This is a story of remarkable ingenuity, anonymous heroes and a government cover-up that endured for decades.
74 | * [GCHQ trio recognised for key to secure shopping online](https://www.bbc.com/news/uk-england-gloucestershire-11475101)
75 | > The computer code was developed in the 1970s for military use, but it is now used to protect customers security when shopping online.
76 | >
77 | > A group of US researchers had been credited with the discovery until 1997 when the work was declassified and made public and the trio from GCHQ received the recognition.
78 | * [Sam Hart (@hxrts)](https://twitter.com/hxrts/status/1066783065865953282?s=12)
79 | > @cedarshims @DisincarnateEVL @srrhhamerman There's a lot out there, but here are a couple papers to get started: [Six Answers to the Question “What is Secrecy Studies?”](https://t.co/AiofOKggYA), Clare Birchall Communication Theory of Secrecy Systems, Claude Shannon
80 | * [Gabriel Peyré (@gabrielpeyre)](https://twitter.com/gabrielpeyre)(https://twitter.com/gabrielpeyre/status/1175998223787253761?s=12)
81 | > Oldies but goldies: Claude Shannon, A Mathematical Theory of Communication, 1948. Defines, among many things, the notion of entropy as a fundamental limit for compression. [https://t.co/rYjobbK7FW](https://t.co/rYjobbK7FW)
82 | * [Martin and Mitchell defection](https://en.m.wikipedia.org/wiki/Martin_and_Mitchell_defection)
83 | > The Martin and Mitchell Defection occurred in September 1960 when two U.S. National Security Agency (NSA) cryptologists, William Hamilton Martin and Bernon F. Mitchell, defected to the Soviet Union. A secret 1963 NSA study said that: "Beyond any doubt, no other event has had...
84 | * [The Shakespearean Ciphers Examined](https://www.marshallfoundation.org/library/digital-archive/shakespearean-ciphers-examined/)
85 | > William F. Friedman was introduced to the question of the authorship of the works of Shakespeare, and to the field of cryptography itself, while working as the director of the department of genetics at Riverbank Laboratories. Shortly thereafter, Elizebeth Smith arrived at Riverbank to work in the Department of Cryptography on the question of Shakespeare authorship. Both William and Elizebeth shared the opinion that the method employed by Elizabeth Wells Gallup, the director of the Department of Cryptography at Riverbank Laboratories, to reach the conclusion that the works of Shakespeare were written by Francis Bacon was questionable.
86 | * [Data Encryption Standard - cryptology](https://www.britannica.com/topic/Data-Encryption-Standard)
87 | > Data Encryption Standard (DES), an early data encryption standard endorsed by the U.S. National Bureau of Standards (NBS; now the National Institute of Standards and Technology). It was phased out at the start of the 21st century by a more secure encryption standard, known as...
88 | * [LUCIFER, A CRYPTOGRAPHIC ALGORITHM](https://www.tandfonline.com/doi/abs/10.1080/0161-118491858746?journalCode=ucry20)
89 | * [Feistel, H. (1973) Cryptography and Computer Privacy. Scientific American, 228, 15-23](http://www.scirp.org/(S(351jmbntvnsjt1aadkposzje))/reference/ReferencesPapers.aspx?ReferenceID=1239921)
90 | > This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENTTM. The design is based on the Present block cipher which is included in the ISO/IEC 29192 standard on lightweight cryptography. The advantage of I-PRESENTTM is that the cipher is involutive such that the encryption circuit is identical to decryption. This is an advantage for environments which require the implementation of both circuits. The area requirement of I-PRESENTTM compares reasonably well with other similar ciphers such as PRINCE
91 | * [Multiuser cryptographic techniques](http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=26692AD7C35D88EC9C45223E740FCFCA?doi=10.1.1.892.6389&rep=rep1&type=pdf)
92 | > This paper deals with new problems which arise in the application of cryptography to computer commu- nication systems with large numbers of users. Fore- most among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology and requires sub- version of several separate key distribution nodes to compromise the system's security. Its disadvantage is a high overhead for single message connections. The second technique is still in the conceptual phase, but promises to eliminate completely the need for a secure key distribution channel, by making the sender's key- ing information public. It is also shown how such a public key cryptosystem would allow the development of an authentication system which generates an un- forgeable, message dependent digital signature.
93 | * [Hellman, M. E. (2002). An overview of public key cryptography. IEEE Communications Magazine, 40(5), 42-49.](https://cr.yp.to/bib/1988/diffie.pdf)
94 | * [A. M. Turing Award Oral History Interview with Whitfield Diffie](https://amturing.acm.org/pdf/DiffieTuringTranscript.pdf) by Hugh Williams Sept. 15, 2017, Portola Valley CA
95 | * [Secure Communications Over Insecure Channels](https://www.merkle.com/1974/PuzzlesAsPublished.pdf)
96 | * [New Directions in Cryptography](https://ee.stanford.edu/~hellman/publications/24.pdf) Invited Paper - WHITFIELD DIFFIE AND MARTIN E. HELLMAN, MEMBER, IEEE
97 | > Abstract-Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
98 | * [A BRIEF HISTORY OF FACTORIZATION TECHNIQUES](https://courses.cs.washington.edu/courses/csep590/06wi/finalprojects/smith-erick.doc)
99 | * [Method for Obtaining Digital Signatures and Public-Key Cryptosystems](https://people.csail.mit.edu/rivest/Rsapaper.pdf) - R.L. Rivest, A. Shamir, and L. Adleman∗
100 | * [Puzzle Palace - Chapter 9 - Competition](http://cryptome.org/jya/pp09.htm)
101 | > What must have come as NSA's biggest blow took place in 1976, when the two anti-DES scientists from Stanford, Hellman and Diffie, came up with what David Kahn called "the most revolutionary new concept in the field since polyalphabetic substitution emerged in the Renaissance." Later refined by three scientists at MIT, Ronald Rivest, Adi Shamir, and Leonard Adleman, the system was labeled public-key cryptography and offered a radical new twist to an old concept. Rather than using the same key, as with the DES, to encrypt and decrypt, the public-key system allows for two separate keys--one limited to encryption and the other to decryption. What this means is that a person can now freely distribute his computer's encryption key, such as in a national directory, permitting anyone to send secret information to him. But only he is able to decrypt the messages, since he alone has the decrypt key. An added bonus of the system is that it also permits the sender of the messages to sign, in effect, in indelible code, thus ensuring the authenticity of the author.
102 | * [Data Privacy: What Washington Doesn't Want You to Know](https://reason.com/1981/01/01/data-privacy-what-washington-d/)
103 | > New, unbreakable codes offer people true communications privacy, for the first time. But the government is fighting to keep this amazing technology for itself.
104 | * [THE GOVERNMENT'S CLASSIFICATION OF PRIVATE IDEAS](https://fas.org/sgp/othergov/invention/private.pdf)
105 | * [THE SILENT POWER OF THE N.S.A. - The New York Times ](https://www.nytimes.com/1983/03/27/magazine/the-silent-power-of-the-nsa.html) By David Burnham
106 | * [Prehistory of Public Key Cryptography](https://www.cs.columbia.edu/~smb/nsam-160/)
107 | * [ADM Bobby R. Inman, USN > National Security Agency - Central Security Service > Hall of Honor](https://www.nsa.gov/about/cryptologic-heritage/historical-figures-publications/hall-of-honor/Article/1620368/adm-bobby-r-inman-usn/)
108 | * [National Security Agency - Central Security Service > Cryptologic Heritage > Hall of Honor ](https://www.nsa.gov/about/cryptologic-heritage/historical-figures-publications/hall-of-honor/2017/)
109 | * [An Interview with JAMES BIDZOS - OH 376](https://conservancy.umn.edu/bitstream/handle/11299/107117/oh376jb.pdf?sequence=1&isAllowed=y) - Conducted by Jeffrey R. Yost on 11 December 2004 - Mill Valley, California
110 | * [An Interview with JAMES BIDZOS OH 376](https://conservancy.umn.edu/bitstream/handle/11299/107117/oh376jb.pdf?sequence=1&isAllowed=y) Conducted by Jeffrey R. Yost on 11 December 2004 - Mill Valley, California
111 |
112 | [](https://www.signix.com/blog/bid/108804/infographic-the-history-of-digital-signature-technology)
113 |
114 | * [Infographic: The History of Digital Signature Technology](https://www.signix.com/blog/bid/108804/infographic-the-history-of-digital-signature-technology)
115 | > Digital signatures have been around for decades, and they're gaining popularity in the mainstream. Learn about their history in this infographic.
116 | * [Full text of "Dr. Dobb's Journal - Vol 8 - RSA: A Public Key Cryptography System, Part I](https://archive.org/stream/dr_dobbs_journal_vol_08/dr_dobbs_journal_vol_08_djvu.txt)
117 | > "In this two-part series of articles, we will discuss the Rivest-Shamir-Adleman [RSA] PKS and show how to implement it on a microcomputer ."
118 | * [Full text of "Dr. Dobb's Journal - Vol 9"](https://archive.org/stream/dr_dobbs_journal_vol_09/dr_dobbs_journal_vol_09_djvu.txt)
119 | > RSA: A Public Key Cryptography System, Part I
120 | >
121 | > "In this two-part series of articles, we will discuss the Rivest-Shamir-Adleman [RSA] PKS and show how to implement it on a microcomputer ."
122 | * [Zero-knowledge proofs of identity](https://link.springer.com/article/10.1007/BF02351717)
123 | > In this paper we extend the notion of interactive proofs of assertions to interactive proofs of knowledge. This leads to the definition of unrestricted input zero-knowledge proofs of knowledge in...
124 | * [Khufu and Khafre](https://en.wikipedia.org/wiki/Khufu_and_Khafre)
125 | > In cryptography, Khufu and Khafre are two block ciphers designed by Ralph Merkle in 1989 while working at Xerox's Palo Alto Research Center. Along with Snefru, a cryptographic hash function, the ciphers were named after the Egyptian Pharaohs Khufu, Khafre and Sneferu. Under a...
126 | * [Merkle's "A Software Encryption Function" now published and available](https://groups.google.com/forum/m/#!topic/sci.crypt/mIe11sz2Z8U)
127 | * [Fast Software Encryption Functions](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.14.450&rep=rep1&type=pdf)
128 | * [The Possibility of Secure Non-Secret Digital Encryption](http://web.archive.org/web/20170216051636/https://www.gchq.gov.uk/sites/default/files/document_files/CESG_Research_Report_No_3006_0.pdf) '70
129 | * [Digital Signature Algorithm](https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Digital_Signature_Algorithm.html)
130 | * [Digital Signature Algorithm - Crypto Wiki](https://cryptography.fandom.com/wiki/Digital_Signature_Algorithm)
131 | > The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and...
132 | * [Uploads by Andy Greenberg - Scribd](https://www.scribd.com/user/60533782/Andy-Greenberg/uploads)
133 | * [Patently Absurd](https://www.google.com/amp/s/www.wired.com/1994/07/patents-2/amp)
134 | > One of the best-known patents in the computer industry is patent Number 4,405,829, "Cryptographic Communications System and Method," the patent on RSA public-key cryptography. This patent, which expires on September 20, 2000, covers every implementation of RSA encryption in the United States. Because the algorithm is patented, it is a violation of US law for a company to write its own implementation of the RSA algorithm and use it without a license from Public Key Partners, the company that has an exclusive license to the patent from the Massachusetts Institute of Technology, the university where the algorithm was developed. It's even illegal for a public-spirited citizen to write his or her own implementation of RSA and give it away.
135 | * [Why Cryptography Is Harder Than It Looks](https://insecure.org/stf/whycrypto.html) by Bruce Schneier - [audio](http://www.secdocs.org/docs/why-cryptography-is-harder-than-it-looks-audio/)
136 | * [IT Security and Hacking knowledge base - SecDocs](http://www.secdocs.org/docs/why-cryptography-is-harder-than-it-looks-audio/)
137 | > IT Security and hackers documentation site, with papers, slides from conferences and training videos
138 | * [Pricing via Processing or Combatting Junk Mail](http://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf) Cynthia Dwork Moni Naory
139 | > We present a computational technique for combatting junk mail, in particular, and controlling access to a shared resource, in general. The main idea is to require a user to compute a moderately hard, but not intractable, function in order to gain access to the resource, thus preventing frivolous use. To this end we suggest several pricing functions, based on, respectively, extracting square roots modulo a prime, the Fiat-Shamir signature scheme, and the Ong-Schnorr-Shamir (cracked) signature scheme.
140 | * [Cryptography - IEEE](https://ieeexplore.ieee.org/document/5390134) - D. Coppersmith
141 | > Abstract: This paper is concerned with two aspects of cryptography in which the author has been working. One is the Data Encryption Standard (DES), developed at IBIM and now in wide use for commercial cryptographic applications. This is a “private key” system; the communicants share a secret key, and the eavesdropper will succeed if he can guess this key among its quadrillions of possibilities. The other is the Diffie-Hellman key exchange protocol, a typical “public key” cryptographic system. Its security is based on the difficulty of taking “discrete logarithms” (reversing the process of exponentiation in a finite field). We describe the system and some analytic attacks against it.
142 | * [An Interview with MARTIN HELLMAN](https://conservancy.umn.edu/bitstream/handle/11299/107353/oh375mh.pdf)
143 | > Leading cryptography scholar Martin Hellman begins by discussing his developing interest in cryptography, factors underlying his decision to do academic research in this area, and the circumstances and fundamental insights of his invention of public key cryptography with collaborators Whitfield Diffie and Ralph Merkle at Stanford University in the mid-1970s. He also relates his subsequent work in cryptography with Steve Pohlig (the Pohlig-Hellman system) and others. Hellman addresses his involvement with and the broader context of the debate about the federal government’s cryptography policy—regarding to the National Security Agency’s (NSA) early efforts to contain and discourage academic work in the field, the Department of Commerce’s encryption export restrictions (under the International Traffic of Arms Regulation, or ITAR), and key escrow (the so-called Clipper chip). He also touches on the commercialization of cryptography with RSA Data Security and VeriSign, as well as indicates some important individuals in academe and industry who have not received proper credit for their accomplishments in the field of cryptography.
144 | * [An overview of public key cryptography.](http://professor.unisinos.br/linds/teoinfo/hellman.pdf) - Hellman, M. E. (2002). IEEE Communications Magazine, 40(5), 42-49.
145 | > The system I called the ax1x2 system in this paper has since become known as Diffie-Hellman key exchange. While that system was first described in a paper by Diffie and me, it is a public key distribution system, a concept developed by Merkle, and hence should be called "Diffie-Hellman-Merkle key exchange" if names are to be associated with it. I hope this small pulpit might help in that endeavor to recognize Merkle's equal contribution to the invention of public key cryptography. Space does not permit an explanation of the quirk of fate that seems to have deprived Merkle of the credit he deserves, but a quirk it is.
146 | * [Nick Szabo 🔑 (@NickSzabo4)](https://twitter.com/NickSzabo4/status/1032449901802614784)
147 | > Inventors of the most important technologies in Bitcoin: digital signatures and Merkle trees (Merkle), elliptic curve crypto (Koblitz), malicious-fault-tolerant consensus (Lamport), elliptic curve crypto (independent inventor: Miller).
148 |
149 |
150 | ---
151 |
152 | {% include _improve_history.html %}
153 | ### Related Content
154 |
155 | {% include list-posts entries='5' category='History' %}
156 |
--------------------------------------------------------------------------------
/2019-12-16-hacking-culture.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "Read Stephen Levy"
4 | title: "Hacking and Hacker Culture."
5 | teaser: "MIT AI Intelligence Lab, the Hacker Ethic and Beyond."
6 | categories:
7 | - History
8 | tags:
9 | - Hacking
10 | - Early Internet
11 | header: no
12 | image:
13 | title: http://opentranscripts.org/wp-content/uploads/2016/12/allison-parrish-programming-forgetting-15-768x576.png
14 | caption: 'Programming is Forgetting: Toward a New Hacker Ethic'
15 | caption_url: http://opentranscripts.org/transcript/programming-forgetting-new-hacker-ethic/
16 | last_modified_at: 2020-02-02T13:22:33-23:00
17 | permalink: /history/early-internet/hacker-culture/
18 | directory: 2019-12-16-hacking-culture.md
19 | ---
20 |
21 |
22 | * [Thesis - Section II: Historical background on the phenomenon](https://iterative.capital/section-ii/)
23 | > Section II Historical Background On The Phenomenon Using context to understand why hackers set out to build digital currency systems. “Corporations have neither bodies to be punished, nor souls to be condemned; they therefore do as they li..
24 | * [Christopher Lemmer Webber (@dustyweb)](https://twitter.com/dustyweb/status/1071495594584260608?s=12)
25 | > New episode of @librelounge is out! [Episode 3: Hacker Culture, Past, Belonging and Inclusion](https://librelounge.org/episodes/episode-3-hacker-culture-past-belonging-and-inclusion.html) Tricky things discussed in this episode... is it possible to have FOSS heritage connected to subcultures without being exclusionary to those outside of th...
26 | * [A genealogy of hacking](http://sro.sussex.ac.uk/id/eprint/59776/1/GenealogyHackingSRO.pdf)
27 | > Abstract: Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information techno-cultures enacted by each hacker practice situating itself within a particular techno-culture and then using that techno-culture to change itself, both in changing potential actions that can be taken and changing the nature of the techno-culture itself.
28 | * [A HACKER PRIMER](https://www.oodaloop.com/wp-content/uploads/2019/06/Hacker-Primer-PCCIP.pdf) Matt Devost - April 5, 1997
29 | > An introduction to the document is followed by an examination of hacker organizational and social considerations to include a detailed listing of hacker communication mechanisms and listings of high profile hacker groups. Subsequent sections identify hacker targets and off-line techniques hackers use to supplement their intrusion capabilities, provide a descriptive listing of common hacker tools with Internet reference points, and furnish a listing of hacker references to include WWW sites, related books, magazines and movies.
30 |
31 |
32 | ## MIT
33 |
34 | * [hacks.mit.edu/](http://hacks.mit.edu/)
35 | > Welcome to the IHTFP Gallery!
36 | * [Hacks, tomfoolery & pranks - MIT Admissions](https://mitadmissions.org/discover/life-culture/hacks-tomfoolery-pranks/)
37 | > At MIT Admissions, we recruit and enroll a talented and diverse class of undergraduates who will learn to use science, technology, and other areas of scholarship to serve the nation and the world in the 21st century.
38 | * [Hacks at the Massachusetts Institute of Technology](https://en.wikipedia.org/wiki/Hacks_at_the_Massachusetts_Institute_of_Technology)
39 | > Hacks at the Massachusetts Institute of Technology are practical jokes and pranks meant to prominently demonstrate technical aptitude and cleverness, or to commemorate popular culture and historical topics. The pranks are anonymously installed at night by hackers, usually, bu...
40 | * [A Brief History of Hacker Culture](https://www.cybersecuritymastersdegree.org/a-brief-history-of-hacker-culture/)
41 | > The annual Harvard-Yale football game doesn’t really excite many college football fans, played as it is between two schools known more for intellectual than athletic prowess. So on November 30, 1982, during the 2nd quarter of the 99th meeting of the two teams, it was largely students and alumni of those two Ivy League colleges in the stands watching.
42 | >
43 | > As the teams faced off after Harvard’s second touchdown, a strange noise drew the crowd’s attention to the sideline at midfield. Springing out of the turf and slowly growing was a black balloon. As it continued to inflate, stopping the game, a set of letters became clearly visible. “MIT” read the balloon, before it exploded with a bang and a swirl of white vapor.
44 | >
45 | > The Harvard-Yale game had just been hacked.
46 | * [What the Hack? Tracing the Origins of Hacker Culture and the Hacker Ethic](https://www.channelfutures.com/open-source/what-the-hack-tracing-the-origins-of-hacker-culture-and-the-hacker-ethic)
47 | > It is difficult to associate open source with "hacker culture" or "the hacker ethic." Instead, open source values, and projects such as Linux, can be traced to academia.
48 | * [A Short History of “Hack”](https://www.newyorker.com/tech/annals-of-technology/a-short-history-of-hack)
49 |
50 | "Before Amazon, before eBay, the seminal act of e-commerce was a drug deal." [*What the Dormouse Said*](http://www.conspiracyschool.com/sites/default/files/resources/John%2520Markoff%2520-%2520What%2520the%2520Dormouse%2520Said%2520-%2520How%2520the%2520Sixties%2520Counterculture%2520Shaped%2520the%2520Personal%2520Computer%2520Industry.pdf)
51 |
52 | * [Full text of "New Hacker's Dictionary, The"](https://archive.org/stream/jarg422/jarg422.txt)
53 | > This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor.
54 | >
55 | > This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached.
56 | >
57 | > Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.2.2" or "The on-line hacker Jargon File, version 4.2.2, 20 AUG 2000".)
58 | >
59 | > The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include:
60 |
61 | [](https://www.stevenlevy.com/index.php/books/hackers)
62 | [Hackers – Heroes of the Computer Revolution](https://www.stevenlevy.com/index.php/books/hackers)
63 | > The book is in three parts, exploring the canonical AI hackers of MIT, the hardware hackers who invented the personal computer industry in Silicon Valley, and the third-generation game hackers in the early 1980s.
64 |
65 |
66 | ## Hacker Spirit
67 |
68 | * [I Like the Noise of the Computer](https://hackernoon.com/i-like-the-noise-of-the-computer-b37f7fd8be28) and I will miss it
69 | * [Thesis - Section II: Historical background on the phenomenon](https://iterative.capital/section-ii/) - [CryptoQuikRead_187](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_187---The-Cryptocurrency-Phenomenon-Part-2-e2ndoe)
70 | > Section II Historical Background On The Phenomenon Using context to understand why hackers set out to build digital currency systems. “Corporations have neither bodies to be punished, nor souls to be condemned; they therefore do as they li...
71 | * [Defense One Radio: Cyberwarfare yesterday on Apple Podcasts](https://podcasts.apple.com/us/podcast/cyberwarfare-yesterday/id1256043663?i=1000445441970)
72 | * [Today In Infosec (@todayininfosec)](https://twitter.com/todayininfosec/status/1174880990394630144?s=12)
73 | >1968: The movie "Hot Millions" was released. It was the first hacker movie. Disagree? Fight me. Social engineering. Defeating security systems. Mucking with a mainframe for profit. [https://t.co/iJ8jH4bmx6](https://t.co/iJ8jH4bmx6)
74 |
75 |
76 | ## Open Source
77 |
78 | * [Homesteading the Noosphere - Eric Steven Raymond](http://www.catb.org/esr/writings/homesteading/homesteading/)
79 | * [Philosophy of the GNU Project](https://www.gnu.org/philosophy/)
80 | * [The GNU Operating System](https://www.gnu.org/gnu/gnu.html)
81 |
82 | ## Linux
83 |
84 | * [The Cathedral and the Bazaar - Eric Steven Raymond](http://www.catb.org/esr/writings/cathedral-bazaar/cathedral-bazaar/)
85 | * [Revolution OS (2001) Full movie](https://www.youtube.com/watch?v=-1h4RNetLbg)
86 | > "Revolution OS" tells the inside story of the hackers who rebelled against Microsoft and created GNU/Linux and the Open Source movement. Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft's way of life.
87 | * [A Brief History of Hackerdom](http://catb.org/~esr/writings/hacker-history/hacker-history.html#toc3) by Eric S. Raymond
88 | * [Prologue: The Real Programmers](http://catb.org/~esr/writings/hacker-history/hacker-history-2.html)
89 | * [The Early Hackers](http://catb.org/~esr/writings/hacker-history/hacker-history-3.html)
90 | * [The Rise of Unix](http://catb.org/~esr/writings/hacker-history/hacker-history-4.html)
91 | * [The End of Elder Days](http://catb.org/~esr/writings/hacker-history/hacker-history-5.html)
92 | * [The Proprietary-Unix Era](http://catb.org/~esr/writings/hacker-history/hacker-history-4.html)
93 | * [The Early Free Unixes](http://catb.org/~esr/writings/hacker-history/hacker-history-7.html)
94 | * [The Great Web Explosion](http://catb.org/~esr/writings/hacker-history/hacker-history-8.html)
95 |
96 |
97 | ## Xanadu
98 |
99 |
100 | * [Xanadu.com](http://www.xanadu.com/)
101 | * [w3.org/Xanadu.html](https://www.w3.org/Xanadu.html)
102 | * [Ted Nelson and the Xanadu Hypertext System](http://scihi.org/ted-nelson-xanadu-hypertext-system/)
103 | > On June 17, 1937, American pioneer of information technology, philosopher, and sociologist Theodore Holm "Ted" Nelson was born. Nelson coined the terms hypertext and hypermedia in 1963 and publishe
104 | * [Project Xanadu](https://en.wikipedia.org/wiki/Project_Xanadu)
105 | > Project Xanadu was the first hypertext project, founded in 1960 by Ted Nelson. Administrators of Project Xanadu have declared it an improvement over the World Wide Web, with mission statement: "Today's popular software simulates paper. The World Wide Web (another imitation of...
106 |
107 |
108 | ## Silicon Valley
109 |
110 | [Steve Blank Secret History of Silicon Valley](https://steveblank.com/category/secret-history-of-silicon-valley/)
111 |
112 | [Tech Talk: Steve Blank — “The Secret History of Silicon Valley: How Stanford & the CIA/NSA Built the Valley We Know Today”](https://vimeo.com/15992737) - VIMEO
113 |
114 | ## ETC
115 |
116 | * [A New Digital Manifesto](https://anewdigitalmanifesto.com) -[newsycombinator comments](https://news.ycombinator.com/item?id=21443755)
117 | * [DEF CON and Stack Overflow: What Our Traffic Says About Cybersecurity](https://stackoverflow.blog/2019/08/08/def-con-stack-overflow-traffic-data-trends/?cb=1) - [Hacker News](https://news.ycombinator.com/item?id=20661311)
118 | > Today is the first day of DEF CON 27, arguably the world’s best known hacker convention. Each year, thousands of people interested in security (and/or the hacking thereof) travel to Las Vegas to learn and gather with like-minded community. Some also attend Black Hat, a related conference which is typically scheduled right before DEF CON, also in Las Vegas. Not everyone who identifies as a hacker or is part of hacker culture writes code or uses Stack Overflow, but we would expect a significant proportion to do so. Well over 25,000 people attended DEF CON in 2018, all located in Las Vegas. Can we see any differences in traffic to Stack Overflow during the days of DEF CON? What can we learn about the hacker community from traffic during that time?
119 | * [Birth of a Digital Nation](https://www.wired.com/1997/04/netizen-3/)
120 | > And perhaps the toughest questions of all: Can we build a new kind of politics? Can we construct a more civil society with our powerful technologies? Are we extending the evolution of freedom among human beings? Or are we nothing more than a great, wired babble pissing into the digital wind?
121 | >
122 | > Where freedom is rarely mentioned in mainstream media anymore, it is ferociously defended - and exercised daily - on the Net.
123 |
124 |
125 | ---
126 |
127 | {% include _improve_history.html %}
128 | ### Related Content
129 |
130 | {% include list-posts entries='5' category='History' %}
131 |
--------------------------------------------------------------------------------
/2020-02-23-satoshi.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: Could be anyone but Craig Wright
4 | title: Satoshi Nakamoto the Pseudonymous Creator of Bitcoin
5 | teaser: "What we know about Satoshi, and more about who they aren't."
6 | permalink: /satoshi-nakamoto/
7 | categories: ["People","History"]
8 | last_modified_at: 2020-02-02T13:22:33-23:00
9 | directory: 2020-02-23-satoshi.md
10 | ---
11 |
12 | I'm not interested in knowing who Satoshi is... but it's still fun to explore the theories and learn about some of the could-be's.
13 |
14 | * [The Complete Satoshi - Nakamoto Institute](https://satoshi.nakamotoinstitute.org/) - Between 2008 and 2012, a pseudonymous programmer (or programmers) going by the name Satoshi Nakamoto shared with the world a brilliant vision and the code to build it.
15 | * [Emails](https://satoshi.nakamotoinstitute.org/emails/) - It all began here.
16 | * [Forum Posts](https://satoshi.nakamotoinstitute.org/posts/) - Where an idea flourished.
17 | * [Code](https://satoshi.nakamotoinstitute.org/code/) - The vision distilled.
18 | * [Quotes](https://satoshi.nakamotoinstitute.org/quotes/) - Indexed wisdom from the quotable Satoshi.
19 |
20 |
21 | [Dan Hedl (@danheld)](https://twitter.com/danheld/status/1084848063947071488?s=12)
22 | > 1/ Satoshi’s Vision™ is a silly endeavor, as it doesn’t matter what it was, we are where we are now. However, those pushing the “Bitcoin was first made for payments” narrative insist on cherry-picking sentences from the white paper and forum posts to champion the...
23 |
24 | "I think this is the first time we’re trying a decentralized, non-trust-based system" - Satoshi (find source)
25 |
26 | [Most Cited Satoshi Nakamoto Publications](https://blockchainlibrary.org/2017/11/most-cited-satoshi-nakamoto-publications/)
27 | > Last updated November 4th, 2017. Publications must mention the creator of Bitcoin, Satoshi Nakamoto (pseudonym). “Bitcoin: A peer-to-peer electronic cash system”. S Nakamoto. 2008. acad…
28 |
29 |
30 | ### Bitcointalk
31 |
32 | * [Welcome to the new Bitcoin forum!](https://bitcointalk.org/index.php?topic=5.msg28) - satoshi - November 22, 2009
33 | * [View the profile of satoshi](https://bitcointalk.org/index.php?action=profile;u=3)
34 | > `Date Registered: November 19, 2009, 07:12:39 PM`
35 | > `Last Active: December 13, 2010, 04:45:41 PM`
36 | * [grubles (@notgrubles)](https://twitter.com/notgrubles/status/1043569394901602304)
37 | > Satoshi commenting in a thread about a "hypothetical system" where the network doesn't know the values and lineage of the transactions, hiding Bitcoin addresses, and "group signatures".
38 | * [Not a suggestion](https://bitcointalk.org/index.php?topic=770.msg9074) - Satoshi
39 | > As some might have noticed, one of the things that bugs me about bitcoin is that the entire history of transactions is completely public. I totally understand the benefits of how this simplifies things and makes it easy for everyone to prove coins are valid.
40 | >
41 | > So this is not a suggestion for a change to bitcoin. Rather it is a question about what could be possible, and what couldn't be possible.
42 | >
43 | > The general question is, could the block list be/have been implemented in a way that didn't store the full transactions in the list? Specifically, *perhaps* it would be possible to store only hashes of the in-points, out-points in the block list. These would be time stamped (notarized) in the blocklist exactly as is being done now.
44 |
45 |
46 | ## Satoshi's Bitcoin
47 |
48 | * [According to BitMEX Research, Satoshi Nakamoto may have mined fewer bitcoins than previously thought.](https://bitcoinmagazine.com/articles/new-research-claims-satoshi-mined-far-fewer-bitcoins-previously-thought/)
49 | > Based on five-year-old research, Bitcoin enthusiasts and critics alike have often held that Satoshi Nakamoto originally mined some 1,000,000 bitcoin in the early days of the network. New numbers from BitMEX Research, however, demonstrates this number could be off by 300,000-400,000 total bitcoin.
50 | * [Does Satoshi have a million bitcoin?](https://blog.bitmex.com/satoshis-1-million-bitcoin/)
51 | > Abstract: We examine the extent to which one miner dominated Bitcoin in 2009. We review Sergio Demian Lerner’s 2013 analysis, where he discovered that the increase in the ExtraNonce value in the block can potentially be used to link different blocks to the same miner. We build on his analysis and conclude that although the evidence is far less robust than many assume, there is reasonable evidence that a single dominant miner in 2009 could have generated around 700,000 bitcoin. Although our analysis itself is weak and there is no perfect way of approaching this problem.
52 | * [16.7 Satoshi's hashrate](http://organofcorti.blogspot.fr/2014/08/167-satoshis-hashrate.html)
53 | > "Bitcoin mining pool, network and exchange analysis"
54 | * [The Well Deserved Fortune of Satoshi Nakamoto, Bitcoin creator, Vi...](https://bitslog.wordpress.com/2013/04/17/the-well-deserved-fortune-of-satoshi-nakamoto/)
55 | > I won’t discuss anything in this post. I’m tired of discussing technical things with people with skewed opinions and monetary interest. I’ve talked enough in the Bitcointalk forum…
56 | * [Who Will Steal Satoshi’s Bitcoins?](https://medium.com/@nopara73/stealing-satoshis-bitcoins-cc4d57919a2b)
57 | > I woke up in the middle of the night so I fired up Twitter and I encountered two well-known cryptographers’ conversation about quantum…
58 |
59 |
60 | ## Who is Satoshi?
61 |
62 |
63 | [Chris Burneky — Cryptoassets 2018](https://www.amazon.com/Cryptoassets-Innovative-Investors-Bitcoin-Beyond/dp/1260026671)
64 | > "Based on historical estimates, Satoshi likely started formalizing the Bitcoin concept sometime in late 2006 and started coding it around May 2007. In this same time span, many regulators began to believe that the U.S. housing market was overextended and likely in for a rough ride. 22 It’s hard to believe someone with such breadth of knowledge as Satoshi would be working in isolation from what he was witnessing in global financial markets.
65 | * [Who is Satoshi Nakamoto ? Suspects, frauds and conspiracies on bitcointalk](https://bitcointalk.org/index.php?topic=4359615.0)
66 | > Satoshi Nakamoto is a talented cipher and coder.
67 | > Wrote the whitepaper on bitcoin "Bitcoin: A Peer-to-Peer Electronic Cash System" and published it on the cypherpunks mailing list in October 2008
68 | > Developed the code for bitcoin and founded https://bitcointalk.org
69 | > He used an e-mail address and a web site that is untraceable.
70 | > In 2009 and 2010, he wrote hundreds of posts in flawless English.
71 | > He invited other software developers to help him improve the code, and corresponded with them,
72 | > He never revealed any personal details.
73 | > Stefan Thomas, a Swiss coder and active community member, graphed the time stamps for each of Nakamoto's bitcoin forum posts and found:
74 | > He made almost no posts between the hours of 5 a.m. and 11 a.m. Greenwich Mean Time.
75 | > In April, 2011, he sent a note to a developer saying that he had “moved on to other things.” He has not been heard from since.
76 | >
77 | > His birthday is said to be on April 5, 1975 according to this post.
78 | > (But it is likely that he didn't select his real birth-date)
79 | * [A Week of Satoshi Pt. 2: A Faceless Response to the Power of Centralization](https://btcmanager.com/a-week-of-satoshi-faceless-response-power-centralization/)
80 | > Many have claimed to be Satoshi Nakamoto publicly only to have their proclamations refuted. Conversely, others have outright denied any involvement with Bitcoin after being portrayed as the brains behind the cryptocurrency that started it all.
81 | * [Stylometric Analysis: Satoshi Nakamoto](https://drive.google.com/file/d/1T3ITw4KL-QKy1zY3fpM1yTZ799HZLoPS/view) - Michael Chon - Fall 2017 - Georgetown University
82 | > Natural Language Processing tools were applied to the Satoshi Nakamoto’s Bitcoin paper to compare it to numerous cryptocurrency-related papers in an attempt to identify the true identity of the unknown Satoshi Nakamoto. There are two parts to the paper; the first part is stylometric analysis on the linguistic features generated and n-grams of each document in the corpus consisting of the relevant literature listed on Satoshi Nakamoto Institute and using machine learning models of the linguistic features to predict an author/authors on the Satoshi Nakamoto’s Bitcoin paper and his personal email texts. The second part is semantic similarity analysis where the content of each document in the corpus is compared in terms of semantic similarity number using the built-in functions in spaCy and gensim. The results from the two parts suggested which author/authors in the corpus are linguistically and semantically similar to Satoshi Nakamoto.
83 | * [𝓡𝓪𝓶𝓹𝓪𝓰𝓮 🦍 (@Thrillmex)](https://twitter.com/Thrillmex/status/1061583930724253697)
84 | > NSA: HOW TO MAKE A MINT: THE CRYPTOGRAPHY OF ANONYMOUS ELECTRONIC CASH References two articles written by "Tatsuaki Okamoto" from 1991. Titled; An Efficient Divisible Electronic Cash Scheme Universal Electronic Cash Is this the OG Satoshi Nakamoto? [https://t.co/3RwWspL](https://t.co/3RwWspL)...
85 | * [N.Y Times: Study Suggests Link Between Dread Pirate Roberts and Satoshi Nakamoto](https://gir.pub/deepdotweb/2013/11/25/n-y-times-study-suggests-link-between-dread-pirate-roberts-and-satoshi-nakamoto/) Posted by: DeepDotWeb November 25, 2013
86 | > Two Israeli computer scientists say they may have uncovered a puzzling financial link between Ross William Ulbricht, the recently arrested operator of the Internet black market known as the Silk Road, and the secretive inventor of bitcoin, the anonymous online currency, used to make Silk Road purchases.
87 | >
88 | > Dorit Ron, a computer scientist at the Weizmann Institute, and Adi Shamir, a pioneering cryptographer who is a member of the applied mathematics faculty at the Institute, will publish a paper Sunday exploring how the 29-year-old Mr. Ulbricht, who was arrested by the Federal Bureau of Investigation in October and has been charged with a murder-for-hire scheme and narcotics-trafficking, acquired and protected the estimated millions he made in commissions operating Silk Road. The researchers say Silk Road, at the time of Mr. Ulbricht’s arrest, had sales of $1.2 billion, generating $80 million in commissions. A huge run-up in the value of bitcoin in the last month has exponentially increased those amounts.
89 | * [How the NSA identified Satoshi Nakamoto](https://medium.com/cryptomuse/how-the-nsa-caught-satoshi-nakamoto-868affcef595)
90 | > The ‘creator’ of Bitcoin, Satoshi Nakamoto, is the world’s most elusive billionaire (worth more than $7B as of November 2017). Very few…
91 | * [Obi_Obvi ⚡️👽⚡️ (@ObiObvi)](https://twitter.com/obiobvi/status/1135404828992163841?s=12)
92 | > Paul Solotshi Calder Le Roux, a criminal mastermind, is the creator of encryption software E4M & TrueCrypt (the cryptography encryption software Satoshi likely used to lock up his 1 million $BTC)... Holy sh*t! Talk about a plot twist. Very interesting.
93 | * [Deadal Nix (@deadalnix)](https://twitter.com/deadalnix/status/1007548856375095296?s=09)
94 | >Some people seems to adulate Satoshi, think he can do nothing wrong and his word are to be interpreted as gospel. While I share Satoshi's plan to create peer to peer digital cash, I do think it is important that we think for ourselves. Here are some errors Satoshi made:
95 |
96 |
97 | ### Nick Szabo
98 |
99 | * [Linguistic Researchers Name Nick Szabo as Author of Bitcoin Whitepaper](https://www.coindesk.com/linguistic-researchers-name-nick-szabo-author-bitcoin-whitepaper)
100 | > A group of forensic linguistics experts believe the real creator of bitcoin is former law professor Nick Szabo.
101 |
102 | ### Neil Stephenson
103 |
104 | [If We Told You Neal Stephenson Invented Bitcoin, Would You Be Surp...](https://reason.com/2019/06/05/if-we-told-you-neal-stephenson-invented-bitcoin-would-you-be-surprised/)
105 | >In his new book, Fall, the author of Snow Crash, Cryptonomicon, and The Diamond Age, looks to the digital afterlife, and beyond.
106 |
107 | * [Legendary sci-fi author says suggestion he invented bitcoin ‘flattering’ but untrue](https://www.marketwatch.com/story/best-selling-author-neal-stephenson-wants-you-to-know-he-isnt-bitcoin-creator-satoshi-nakamoto-2019-07-18)
108 | > It isn’t just Stephenson’s prescient fiction that would justify such speculation. After all, Stephenson has been “both disciple and muse to the most powerful men in tech,” the article noted, including having served as an early employee of Amazon.com Inc.
109 | * [Satoshi Nakamoto: Could This Sci-Fi Legend Be Bitcoin’s Mastermind?](https://www.ccn.com/satoshi-nakamoto-bitcoin-neal-stephenson/)
110 | > By CCN: A recent article in Reason suggests that there’s a reason to believe that science fiction author Neal Stephenson might be Bitcoin creator Satoshi Nakamoto. The article starts: “Consider the possibility that Neal Stephenson is Satoshi Nakamoto, the pseudonymous inventor of Bitcoin.” Let's Not…
111 |
112 | ### Phil Zimmerman
113 |
114 | * [Vlad Costea (@TheVladCostea)](https://twitter.com/vampirevladofw/status/1139679700740124673?s=12)
115 | > Something that baffles me in this space is the lack of Phil Zimmermann appreciation/references. He did a lot for privacy and pioneered some ideological principles that get paraphrased by everyone who advocates for Bitcoin or Monero.
116 | >
117 | > Seriously, he’s a worthy Satoshi candidate.
118 | * [Vlad Costea (@TheVladCostea)](https://twitter.com/TheVladCostea)
119 | > Anybody who thinks they can flesh out a protocol in secret and then deploy it, full-blown and working, is in for a world of hurt” - @NickSzabo4 in 1993, probably referring to Filip Zimmermann, but simultaneously predicting the coming of Satoshi and Nicolas van Saberha...
120 |
121 | [*12.8.4. Nick Szabo: Other Digital Money Systems: Digital Cash and Net Commerce:*](https://koeln.ccc.de/archiv/cyphernomicon/chapter12/12.8.html) - Cyphernomicon 12.8
122 | > "Internet commercialization in itself is a _huge_ issue full of pitfall and opportunity: Mom & Pop BBS's, commercial MUDs, data banks, for-profit pirate and porn boards, etc. are springing up everywhere like weeds, opening a vast array of both needs of privacy and ways to abuse privacy. Remailers, digital cash, etc. won't become part of this Internet commerce way of life unless they are deployed soon, theoretical flaws and all, instead of waiting until The Perfect System comes along. Crypto- anarchy in the real world will be messy, "nature red in tooth and claw", not all nice and clean like it says in the math books. Most of thedebugging will be done not in any ivory tower, but by the bankruptcy of businesses who violate their customer's privacy, the confiscation of BBS operators who stray outside the laws of some jurisdication and screw up their privacy arrangements, etc. Anybody who thinks they can flesh out a protocol in secret and then deploy it, full-blown and working, is in for a world of hurt. For those who get their Pretty Good systems out there and used, there is vast potential for business growth -- think of the $trillions confiscated every year by governments around the world, for example." [Nick Szabo, 1993-8-23]
123 |
124 |
125 | ### Craig Wright (definitely not)
126 |
127 | 
128 |
129 | * [WhalePanda (@WhalePanda)](https://twitter.com/WhalePanda/status/1060522612676268032)
130 | Roger Ver admits that he may have been fooled by CSW. Screenshot below is the email CSW send to Roger. If you want to watch the video: [https://t.co/PwDGtEbltV](https://t.co/PwDGtEbltV) First 2 minutes are mildly entertaining.
131 | * [Bitcoin Core Dev: Gavin Andresen’s GitHub Privileges Were A “Liability”](https://www.ccn.com/bitcoin-core-dev-gavin-andresens-github-privileges-liability/)
132 | > Gavin Andresen, chief scientist at the Bitcoin Core Foundation and former chief developer of the Bitcoin source code had his commit access revoked recently. The move, a collective one taken by Bitcoin Core developers, left Andresen without any administrator or commit privileges after publicly backing…
133 | * [The Craig Wright - CryptoAnarchy.wiki](https://cryptoanarchy.wiki/people/craig-wright)
134 | * [Wladimir van der Laan: “There is Something Truly Fishy Going On”](https://www.newsbtc.com/2016/05/08/wladimir-van-der-laan-something-truly-fishy-going/)
135 | This recent Satoshi Nakamoto reveal became every more worrying when Wright had allegedly proven his identity as Satoshi Nakamoto to Bitcoin experts. Despite the red flags raised in December of 2015 concerning Wright being Satoshi, people still gave his claims a level of credibility that would otherwise not be achievable.
136 | * [Naomi ₿rockwell (@naomibrockwell)](https://twitter.com/naomibrockwell/status/1140120771072675840?s=12)
137 | > Everything you need to know about Kleiman v Wright: Judge threatens to hold CSW in criminal contempt CSW compelled to provide list of bitcoin addresses Judge Orders CSW to Physically Appear in Florida Lawsuit h/t @stephendpalley for great thread VIDEO: [https://t.co/aFTHJ](https://t.co/aFTHJ)...
138 | * [Time02/SatoshiTimeLine](https://github.com/Time02/SatoshiTimeLine) - 中本聪时间线。Satoshi Time Line. Facts about CSW's Involvement in Bitcoin.
139 | * [The Craig Wright Affair (and other attempts to identify Satoshi)](https://cryptoanarchy.wiki/events/craig-wright-satoshi)
140 | * [Wright’s wrongs](https://www.economist.com/finance-and-economics/2016/05/07/wrights-wrongs) - The quest to find Satoshi Nakamoto continues
141 |
142 | ### DRP - Ross Ulbricht
143 |
144 | * [Study Suggests Link Between Dread Pirate Roberts and Satoshi Nakamoto](https://bits.blogs.nytimes.com/2013/11/23/study-suggests-link-between-dread-pirate-roberts-and-satoshi-nakamoto/)
145 | Two Israeli scientists have written a paper that suggests a link between Ross William Ulbricht, who was recently arrested as the operator of the Internet black market Silk Road, and the anonymous inventor of bitcoin.
146 | * [Researchers Retract Claim Of Link Between Alleged Silk Road Mastermind And Founder Of Bitcoin](https://www.businessinsider.com/silk-road-satoshi-paper-retraction-2013-11)
147 | > Two Israeli mathematicians are retracting their claim that there was a link between Bitcoin founder Satoshi Nakamoto and the man accused of running illicit online marketplace The Silk Road.
148 | >
149 | > "We no longer believe that the very early Founder account we identified in the full bitcoin transaction graph belongs to Satoshi Nakamoto," Dorit Ron and Adi Shamir of the Weizmann Institute said in a statement. "We will revise our paper accordingly."
150 | * [How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?](https://eprint.iacr.org/2013/782.pdf) - Dorit Ron and Adi Shamir
151 | > Abstract. The Bitcoin scheme is one of the most popular and talked about alternative payment schemes. One of the most active parts of the Bitcoin ecosystem was the Silk Road marketplace, in which highly illegal substances and services were traded. It was run by a person who called himself Dread Pirate Roberts (DPR), whose bitcoin holdings are estimated to be worth hundreds of millions of dollars at today’s exchange rate. On October 1-st 2013, the FBI arrested a 29 year old person named Ross William Ulbricht, claiming that he is DPR, and seizing a small fraction of his bitcoin wealth. In this paper we use the publicly available record to trace the evolution of his holdings in order to find how he acquired and how he tried to hide them from the authorities. In particular, we trace the amounts he received and the amounts he transferred out of his accounts, and show that all his Silk Road commissions from the months of May, June and September 2013, along with numerous other amounts, were not seized by the FBI. This analysis demonstrates the power of data mining techniques in analyzing large payment systems, and especially publicly available transaction graphs of the type provided by the Bitcoin scheme.
152 |
153 | ### Duality
154 |
155 | * [Daniel Jeffries (@Dan_Jeffries1)](https://twitter.com/Dan_Jeffries1/status/1013517580613480448)
156 | > 1/ Is #Satoshi writing a book? Is Duality authentic? I weigh in here because I have spent the last few years studying and reading every single word Nakamoto ever wrote as I'm writing a book about #Bitcoin as we speak. [https://t.co/EGH3Xliqgu](https://t.co/EGH3Xliqgu)
157 | * [nic carter (@nic__carter)](https://threadreaderapp.com/thread/1013151635206557696.html)
158 | Someone didn't do their research. Satoshi never said 'blockchain'. 1/10 scam attempt, try again. Bloomberg, you've been conned.
159 | * [Satoshi Book Review: Verification of ‘duality’ excerpt using s...](https://zycrypto.com/satoshi-book-review-verification-of-duality-excerpt-using-stylometric-analysis/)
160 | We verified the authenticity of the new Satoshi document using stylometric data mining methods and used Most Frequent Word culling to
161 |
162 |
163 | ---
164 |
165 | {% include _improve_history.html %}
166 |
167 | ### Related Content
168 |
169 | {% include list-posts entries='5' category='History' %}
170 |
--------------------------------------------------------------------------------
/people/2019-12-10-timothy-c-may.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | header: no
4 | title: "Timothy C May - Chief Instigator: Cypherpunks"
5 | permalink: /history/people/timothy-c-may/
6 | categories: ["History","People"]
7 | tags: ["Cypherpunk","Before Bitcoin"]
8 | directory: people/2019-12-10-timothy-c-may.md
9 |
10 | ---
11 |
12 | * [1993-11-09 - (fwd) Clipper and Tipper on Route 666](http://mailing-list-archive.cryptoanarchy.wiki/archive/1993/11/99f4383f9733a2d139b5f7e1055546195e0dcd5b064975b63351b0c358fc704c/) - From: tcmay@netcom.com (Timothy C. May)
13 | * [JW Weatherman Inverviews Cypherpunk Legend Timothy C May](https://sourcecrypto.pub/posts/transcripts/JW-Weatherman-Interview-Tim-May/)
14 | * [Nick Szabo 🔑 (@NickSzabo4)](https://twitter.com/NickSzabo4/status/1074018110829555713?s=17)
15 | > Tim May was my chief cypherpunk inspiration. His vision is of a cyberspace free from government oppression. I was further blessed to be able to hang out with him and kvetch about our crazy world. Will miss you greatly Tim! [https://t.co/cLx5dpiUEF](https://t.co/cLx5dpiUEF)
16 | * [Thomas Rid (@RidT)](https://twitter.com/RidT/status/1074017873943764992)
17 | > Thanks to @octal, a significant part of Tim May's work is online and searchable at http://cypherpunks.venona.com
18 | >
19 | > For example: Tim's famous first articulation of "Blacknet," an concept that arguably foreshadowed Tor Hidden Services
20 | * [Introduction to BlackNet](https://web.archive.org/web/20020730044602/http://cypherpunks.venona.com:80/date/1993/08/msg00538.html)
21 | > Your name has come to our attention. We have reason to believe you may be interested in the products and services our new organization, BlackNet, has to offer.
22 | > BlackNet is in the business of buying, selling, trading, and otherwise dealing with *information* in all its many forms.
23 | * [Untraceable Digital Cash, Information Markets, and BlackNet](http://osaka.law.miami.edu/~froomkin/articles/tcmay.htm) - "Governmental and Social Implications of Digital Money" panel at CFP '97
24 | * [Timothy C. May - Thirty Years of Crypto Anarchy | HCPP16](https://youtu.be/TdmpAy1hI8g)
25 | * [Tim May, Father of 'Crypto Anarchy,' Passes Away](https://www.indybay.org/newsitems/2018/12/23/18819945.php)
26 |
27 | ---
28 |
29 | {% include _improve_history.html %}
30 | ### Related Content
31 |
32 | {% include list-posts entries='5' category='People' %}
33 |
--------------------------------------------------------------------------------
/people/2019-12-11-david-chaum.md:
--------------------------------------------------------------------------------
1 | ---
2 | title: "Father of Digital Cryptography - David Chaum"
3 | layout: page-fullwidth
4 | permalink: /history/people/david-chaum/
5 | categories: ["History","People"]
6 | tags: ["Cypherpunk","Before Bitcoin","Cryptography"]
7 | directory: people/2019-12-11-david-chaum.md
8 | ---
9 |
10 |
11 | * [Chaum.com](https://www.chaum.com)
12 | * [Chaum.com - List of Publications](https://www.chaum.com/publications/publications.html)
13 | * [Everipedia - David Chaum](https://everipedia.org/wiki/lang_en/Cypherpunk/)
14 | * [Cryptography Legend - David Chaum](https://satoshiwatch.com/hall-of-fame/dr-david-chaum/)
15 | * [The Birth of Digital Cash](https://medium.com/blockwhat/82-the-birth-of-digital-cash-ea08b53379d8)
16 | * [Untracable Electronic Cash](http://www.alessandromasciadri.com/wise/wp-content/uploads/2018/01/David_Chaum-1982-Electronic_Cash.pdf) - 1982
17 | * [Blind Signatures for Untracable Payments](http://www.hit.bme.hu/~buttyan/courses/BMEVIHIM219/2009/Chaum.BlindSigForPayment.1982.PDF) - 1982
18 | * [SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER OBSOLETE ](https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf) - 1985
19 | * [THE FATHER OF ONLINE ANONYMITY HAS A PLAN TO END THE CRYPTO WAR](https://www.wired.com/2016/01/david-chaum-father-of-online-anonymity-plan-to-end-the-crypto-wars/) 2016
20 | * [What Everybody Misunderstands About Privacy Pioneer David Chaum's Controversial Crypto Plan](http://fortune.com/2016/01/14/encryption-wars-crypto-david-chaum/)
21 | * [How David Chaum's eCash spawned a Cypherpunk Dream](https://bitcoinmagazine.com/articles/genesis-files-how-david-chaums-ecash-spawned-cypherpunk-dream/) - 2018 - [CryptoQuikRead_058](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_058---The-Genesis-Files-How-David-Chaum-Spawned-a-Cypherpunk-Dream-e2ndsp)
22 | > Chaum’s work would inspire a group of cryptographers, hackers and activists, connected through a mailing list. It was this group — which included DigiCash contributors like Nick Szabo and Zooko Wilcox-O’Hearn — that would come to be known as the cypherpunks.Link t...
23 | * [David Chaum: Godfather of Digital Currency](https://blockchaintimes.news/2018/10/19/david-chaum-godfather-of-digital-currency/) - 2018
24 |
25 | [Epicenter Podcast #304: David Chaum - Forefather of Cryptocurrencies and the Cypherpunk Movement](https://sourcecrypto.pub/posts/Bitcoin/pre-history/chaum-forfather-cypherpunk-cryptocurrency/)
26 |
27 | [The Father of Online Anonymity Has a Plan to End the Crypto War](https://www.wired.com/2016/01/david-chaum-father-of-online-anonymity-plan-to-end-the-crypto-wars/)
28 | > Cryptographer David Chaum's ideas helped spark the decades-long war between encryption and government. Now he's back with a new idea designed to end it.
29 |
30 | ## Publications 1980's
31 |
32 | I got this list from David Chaum's Website, and am gradually adding links and additional info for each.
33 |
34 | [**List of Publications**](https://www.chaum.com/publications/) - Chaum.com
35 | [**LIST OF PUBLICATIONS BY D. CHAUM**](http://web.archive.org/web/20090801121749/https://w2.eff.org/Privacy/Digital_money/?f=david_chaum.biblio.txt) - eff\web.archive
36 |
37 | * Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, February, 1981. - [https://www.freehaven.net/anonbib/cache/chaum-mix.pdf](https://www.freehaven.net/anonbib/cache/chaum-mix.pdf)
38 | * Trust Relationships and Information Security, D. Chaum, (invited) - Proceedings of the National Electronics Conference, 1981.
39 | * Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups, June 1982. - [https://www.chaum.com/publications/research_chaum_2.pdf](https://www.chaum.com/publications/research_chaum_2.pdf)
40 | * Blind Signatures for Untraceable Payments, Crypto 82 - [https://link.springer.com/chapter/10.1007/978-1-4757-0602-4_18](https://link.springer.com/chapter/10.1007/978-1-4757-0602-4_18)
41 | * Silo Watching also known as Verification by Anonymous Monitors, - [https://link.springer.com/chapter/10.1007%2F3-540-49677-7_1](https://link.springer.com/chapter/10.1007%252F3-540-49677-7_1)
42 | * A New Paradigm for Individuals in the Information Age, 1984 - [https://ieeexplore.ieee.org/document/6234815](https://ieeexplore.ieee.org/document/6234815)
43 | * Design Concepts for Tamper-Responding Systems, Crypto 84 - [https://link.springer.com/chapter/10.1007/978-1-4684-4730-9_29](https://link.springer.com/chapter/10.1007/978-1-4684-4730-9_29)
44 | * How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding and Threshold Systems, CRYPTO '84, - [https://dl.acm.org/citation.cfm?id=19517](https://dl.acm.org/citation.cfm?id=19517)
45 | * Security Without Identification: Transaction Systems to Make Big Brother Obsolete, - [https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf](https://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf)
46 | * Showing Credentials without Identification: Signatures Transferred Between Unconditionally Unlinkable Pseudonyms, Eurocrypt'85. - [https://link.springer.com/chapter/10.1007/3-540-39805-8_28](https://link.springer.com/chapter/10.1007/3-540-39805-8_28)
47 | * [Attacks on some RSA Signature Schemes](https://dl.acm.org/citation.cfm?id=704569) CRYPTO '85
48 | * [Security without Identification: Transaction Systems to Make Big Brother Obsolete](https://dl.acm.org/citation.cfm?id=4373) (Oct) 1985
49 | * [Cryptanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers](https://link.springer.com/chapter/10.1007/3-540-39799-X_16) CRYPTO '85
50 | * [Card Computers to Make Big Brother Obsolete (in German)](http://www.cs.kent.edu/~javed/DL/papers/web/bigbro.html)
51 | * [Blind Signatures for Untraceable Payments](https://link.springer.com/chapter/10.1007/978-1-4757-0602-4_18)
52 | > Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the...
53 | * [Blinding for Unanticipated Signatures](https://link.springer.com/chapter/10.1007/3-540-39118-5_21)
54 | > Previously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These...
55 | * [Highly Secure But Untraceable Transactions](https://pdfslide.us/documents/compsec-88.html) SEC'86
56 | * [A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations](https://link.springer.com/chapter/10.1007/3-540-47721-7_10) CRYPTO '86
57 | * Pay-as-you-go Poker & Showing Satisfiability of an Arbitrary Predicate Without Revealing How Both as Secure as Factoring, D. Chaum, workshop record, Algorithms, randomness and complexity, CIRM, Marseille-Luminy, March 1986. Unpublished.
58 | * [Some Variations on RSA Signatures and Their Security](https://link.springer.com/chapter/10.1007/3-540-47721-7_4) CRYPTO '86
59 | * [MultipartyDemonstrating Possession of a Discrete Log Without Revealing It](https://dl.acm.org/citation.cfm?id=36678) CRYPTO '86
60 | * [Demonstrating that a Public Predicate can be Satisfied Without Revealing any Information About How](https://link.springer.com/chapter/10.1007/3-540-47721-7_13) CRYPTO '86
61 | * [Computations Ensuring Secrecy of Each Party's Input and Correctness of the Result](https://chaum.com/publications/multiparty_computation.pdf) CRYPTO '87
62 | * [An Improved Protocol for Demonstrating Possession of a Discrete Logarithm and Some Generalizations](https://link.springer.com/chapter/10.1007/3-540-39118-5_13) EUROCRYPT '87
63 | * [COMPSEC '88](https://pdfslide.us/documents/compsec-88.html)
64 | > Vol. 11, No. 1, Page 21 solutions, or where the hard-wired solution is uneconomic. So should we trust computers? Within limits, yes - but we do not know where those limits
65 | * [A Secure and Privacy-Protecting Protocol for Transmitting Personal Inf](https://link.springer.com/chapter/10.1007/3-540-47721-7_10)
66 | > A multi-party cryptographic protocol and a proof of its security are presented. The protocol is based on RSA using a one-way-function. Its participants are individuals and organizations, which are...
67 | * [Some Variations on RSA Signatures & their Security](https://link.springer.com/chapter/10.1007/3-540-47721-7_4)
68 | > The homomorphic structure of RSA signatures can impair security. Variations on a generalization of RSA signatures are considered with the aim of obviating such vulnerabilities. Of these variations,...
69 | * [Demonstrating that a Public Predicate can be Satisfied Without Reveali](https://link.springer.com/chapter/10.1007/3-540-47721-7_13)
70 | * [Gradual and Verifiable Release of a Secret](https://link.springer.com/chapter/10.1007/3-540-48184-2_11) CRYPTO ' 87
71 | * Blinding for Unanticipated Signatures, EUROCRYPT '87 - [https://link.springer.com/chapter/10.1007/3-540-39118-5_21](https://link.springer.com/chapter/10.1007/3-540-39118-5_21)
72 | * [Untraceable Electronic Cash](https://allquantor.at/blockchainbib/pdf/chaum1990untraceable.pdf) (21 Aug) 1988 David Chaum, Amos Fiat, Moni Naor
73 | * [Elections with Unconditionally Secret Ballots and Disruption Equivalent to Breaking RSA](https://link.springer.com/chapter/10.1007/3-540-45961-8_15) EUROCRYPT '88
74 | * [Multiparty Unconditionally Secure Protocols](https://dl.acm.org/citation.cfm?id=62214) ACM, 1988
75 | * [Minimum Disclosure Proofs of Knowledge](http://crypto.cs.mcgill.ca/~crepeau/PDF/BCC88-jcss.pdf) 1988
76 | * [Undeniable Signatures](https://link.springer.com/chapter/10.1007/0-387-34805-0_20) CRYPTO '89
77 | * [The Dining Cryptographers Problem: Unconditional Sender Untraceability](https://users.ece.cmu.edu/~adrian/731-sp04/readings/dcnets.html) 1988
78 | * [Untraceable Electronic Cash](https://link.springer.com/chapter/10.1007/0-387-34799-2_25) CRYPTO '88
79 | * [The spymasters Double Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities](https://link.springer.com/chapter/10.1007/0-387-34805-0_52) CRYPTO '89
80 | * [Gradual and Verifiable Release of a Secret (Extended Abstract)](https://link.springer.com/chapter/10.1007/3-540-48184-2_11)
81 | Protocols are presented allowing someone with a secret discrete logarithm to release it, bit by bit, such that anyone can verify each bit’s correctness as they receive it. This new notion of release...
82 | * [Elections with Unconditionally-Secret Ballots and Disruption Equivalen](https://link.springer.com/chapter/10.1007/3-540-45961-8_15)
83 | Election protocols embodying robustness, verifiability of returns by voters, and unconditional security for voters’ privacy have been presented. The techniques also allow untraceable payments and...
84 | * [Undeniable Signatures](https://link.springer.com/chapter/10.1007/0-387-34805-0_20)
85 | * Digital signatures [DH]—unlike handwritten signatures and banknote printing—are easily copied exactly. This property can be advantageous for some uses, such as dissemination of announcements and...
86 | * Online Cash Checks, D. Chaum, Advances in CryptologyEUROCRYPT '89, J.J. Quisquater & J. Vandewalle (Eds.), Springer-Verlag, pp. 288-293. Privacy Protected Payments: Unconditional Payer and/or Payee Untraceability, D. Chaum, Smart Card 2000, D. Chaum & I. Schaumuller-Bichl (Eds.), North Holland, 1989, pp. 69-93.
87 | * Efficient Offline Electronic Checks, B. den Boer, D. Chaum, E. van Heyst, S. Mjxlsnes, & A. Steenbeek, Advances in CryptologyEUROCRYPT '89, J.-J. Quisquater & J. Vandewalle (Eds.), Springer-Verlag, pp. 294-301.
88 |
89 |
90 | ### Publications 1990's
91 |
92 | [ACHIEVING ELECTRONIC PRIVACY](http://web.archive.org/web/20090801121935/https://w2.eff.org/Privacy/Digital_money/?f=chaum_privacy_id.article.txt) by David Chaum, david@digicash.nl
93 | > A CRYPTOGRAPHIC INVENTION KNOWN AS A BLIND SIGNATURE PERMITS NUMBERS TO SERVE AS ELECTRONIC CASH OR TO REPLACE CONVENTIONAL IDENTIFICATION. THE AUTHOR HOPES IT MAY RETURN CONTROL OF PERSONAL INFORMATION TO THE
94 | INDIVIDUAL.
95 |
96 | * Zero-Knowledge Undeniable Signatures, D. Chaum, Advances in CryptologyEUROCRYPT '90, I.B. Damgard (Ed.), Springer-Verlag, pp. 458-464.
97 | * An Efficient Credential Mechanism Allowing an Unlimited Number of Credential Types, D. Chaum & J.-H. Evertse. Unpublished.
98 | * A Provably Secure and Fast Message Authentication Scheme, D. Chaum & Maarten van der Ham, Unpublished.
99 | * An Interactive Signature Scheme D. Chaum & N.J. Ferguson, Unpublished.
100 | * Combining Secrets in Most Concealing Ways: Dynamic Graphs for Restricted Choices in Hidden Key Transformations, B. den Boer & D. Chaum. Unpublished.
101 | * Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer D. Chaum, E. van Heijst & B. Pfitzmann, Advances in Cryptology CRYPTO '91, J. Feigenbaum (Ed.), Springer-Verlag, pp. 470-484.
102 | * Convertible Undeniable Signatures, D. Chaum, I. Damgard, & T. Pedersen, Advances in CryptologyCRYPTO '90, A.J. Menezes & S.A. Vanstone (Eds.), Springer-Verlag, pp. 189- 205.
103 | * Direct Zero Knowledge Proofs of Computational Power in Five Rounds, T. Okamoto, K. Ohta, & D. Chaum, Advances in CryptologyEUROCRYPT '91, D.W. Davies (Ed.), Springer-Verlag, pp. 96-105.
104 | * Group Signatures, D. Chaum & E van Heyst, Advances in Cryptology -EUROCRYPT '91 [https://chaum.com/publications/Group_Signatures.pdf](https://chaum.com/publications/Group_Signatures.pdf)
105 | * Implementating Capability Based Protection Using Encryption, D. Chaum & R.S. Fabry, UC Berkeley Memorandum UCB/ERL M78/46.
106 | * Numbers Can Be a Better Form of Cash than Paper, D. Chaum, Smart Card 2000, D. Chaum (Ed.), North Holland, 1991, pp. 151-156 .
107 | * Provably Unforgeable Signatures, D. Chaum & J. Bos, Advances in CryptologyCRYPTO '92, Ernest F. Brickell (Ed), Springer-Verlag, pp. 1-14
108 | * Achieving Electronic Privacy , D. Chaum, (invited) Scientific American, August 1992, pp. 96-101
109 | * Provers Can Limit the Number of Verifiers, D. Chaum
110 | * Smart Cash: A Practical Electronic Payment System, J. Bos & D. Chaum, CWI-Report CS-R9035, August 1990.
111 | * Some Weaknesses of Weaknesses of Undeniable Signatures, D. Chaum, EUROCRYPT '91, D.W. Davies (Ed.), Springer-Verlag, pp. 554-556.
112 | * Transferred money grows, D. Chaum & T.P. Pedersen, Advances in CryptologyEurocrypt '92, R.A. Rueppel (Ed.), Springer-Verlag, pp. 89-105.
113 | * Unconditionally-Secure Digital Signatures, D. Chaum & S. Roijakkers, Advances in CryptologyCRYPTO '90, Springer-Verlag, A.J. Menezes & S.A. Vanstone (Eds.), pp. 206- 214.
114 | * Undeniable Signatures: Applications and Theory, J. Boyar, D. Chaum, I. Damgerd & T. Pedersen, July, 1991
115 | * Wallet Databases with Observers, D. Chaum & T.P. Pedersen, Advances in Cryptology CRYPTO '92, Ernest F. Brickell (Ed), Springer-Verlag, pp. 1-14
116 | * Zero Information Circuits with DES, D. Chaum & B. den Boer. Unpublished.
117 | * Prepaird Smart Card Techniques. A Brief Introduction and Comparison ., D.Chaum, 1993.
118 |
119 | ---
120 |
121 | {% include _improve_history.html %}
122 | ### Related Content
123 |
124 | {% include list-posts entries='5' category='People' %}
125 |
--------------------------------------------------------------------------------
/people/2019-12-12-nick-szabo.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | subheadline: "Cypherpunk Extraordinaire"
4 | title: "Nick Szabo"
5 | teaser: ""
6 | header: no
7 | categories: ["History","People"]
8 | tags: ["Cypherpunk","Nick Szabo"]
9 | permalink: /history/people/nick-szabo/
10 | directory: people/2019-12-12-nick-szabo.md
11 | ---
12 |
13 |
14 | * [Who is Nick Szabo, The Mysterious Blockchain Titan - unblock.net](https://unblock.net/nick-szabo/)
15 | > Nick Szabo is a living legend in the world of cryptocurrency. For some, he's considered to be the creator of the very concept of Bitcoin and there is solid proof backing the claims. We take a look at his history and useful contributions that have greatly propelled the growth ...
16 | * [https://unblock.net/nick-szabo/](https://unblock.net/nick-szabo/)
17 | * [Vlad Costea (@TheVladCostea)](https://twitter.com/vampirevladofw/status/1139847786977824768?s=12)
18 | > Anybody who thinks they can flesh out a protocol in secret and then deploy it, full-blown and working, is in for a world of hurt” - @NickSzabo4 in 1993, probably referring to Filip Zimmermann, but simultaneously predicting the coming of Satoshi and Nicolas van Saberha...
19 | * [Linguistic Researchers Name Nick Szabo as Author of Bitcoin Whitepaper](https://www.coindesk.com/linguistic-researchers-name-nick-szabo-author-bitcoin-whitepaper)
20 | > A group of forensic linguistics experts believe the real creator of bitcoin is former law professor Nick Szabo.
21 |
22 | ## Literature
23 |
24 | * [Unenumerated](https://unenumerated.blogspot.com) - Homepage
25 | * [Nick Szabo's Home Page — Archive (pre-2005)](http://archive.is/H8UGk) "Nick Szabo's Essays, Papers, and Concise Tutorials"
26 | * [Smart Contracts - 12 Use Cases for Business and Beyond - A Technology, Legal & Regulatory Introduction](https://gallery.mailchimp.com/a87f67248663abe55ad9325d6/files/Smart_Contracts_12_Use_Cases_for_Business_Beyond.pdf) — Foreword by Nick Szabo Prepared by: Smart Contracts Alliance — In collaboration with Deloitte
27 | * [Wet code and dry](http://unenumerated.blogspot.com/2006/11/wet-code-and-dry.html)
28 | > There's a strong distinction to be made between "wet code," interpreted by the brain, and "dry code," interpreted by computers. Human-read m...
29 | * [Trusted Third Parties Are Security Holes - Nick Szabo (2001)](https://nakamotoinstitute.org/trusted-third-parties/)
30 | > "Commercial security is a matter of solving the practical problems of business relationships such as privacy, integrity, protecting property, or detecting breach of contract. A security hole is any weakness that increases the risk of violating these goals. In this real world view of security, a problem does not dissapear because a designer assumes it away. The invocation or assumption in a security protocol design of a 'trusted third party' (TTP) or a 'trusted computing base' (TCB) controlled by a third party constitutes the introduction of a security hole into that design. The security hole will then need to be plugged by other means."
31 | * [https://nakamotoinstitute.org/contract-language/](https://nakamotoinstitute.org/contract-language/) A Formal Language for Analyzing Contracts-Nick Szabo Preliminary Draft from 2002
32 |
33 | ## Video
34 |
35 | * [BLOCKWALKS conference](https://www.youtube.com/channel/UCi-8MVARjeN2lzqUJn74D8g)
36 | > Blockchain, cryptocurrency, and smart contracts pioneer Nick Szabo is a computer scientist, legal scholar and cryptographer known for his research in digital...
37 |
38 | ## Podcasts
39 |
40 | [](http://unenumerated.blogspot.com/2007/05/towards-digital-and-private-common-law.html)
41 |
42 | * [CryptoQuikRead_058 - The Genesis Files: How David Chaum Spawned a Cypherpunk Dream by The Cryptoconomy Podcast](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_058---The-Genesis-Files-How-David-Chaum-Spawned-a-Cypherpunk-Dream-e2ndsp)
43 | > "Chaum’s work would inspire a group of cryptographers, hackers and activists, connected through a mailing list. It was this group — which included DigiCash contributors like Nick Szabo and Zooko Wilcox-O’Hearn — that would come to be known as the cypherpunks."Link t...
44 | * [The Quiet Master of Cryptocurrency — Nick Szabo (#244)](https://tim.blog/2017/06/04/nick-szabo/)
45 | > “Trusted third parties are security holes.” – Nick Szabo Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He̵…
46 | * [Let's Talk Bitcoin! #246 Smart Contracts with Nick Szabo](https://letstalkbitcoin.com/blog/post/lets-talk-bitcoin-246-smart-contracts-with-nick-szabo)
47 | > On Todays Show Adam, Stephanie and Andreas spend an hour with crypto-scholar of note Nick Szabo in a wide ranging discussion covering Smart Contracts, Bitcoin and Blockchains. You can find more of Nicks perspective at his homepage or blog
48 |
49 | ### Cryptoconomy
50 |
51 | * CryptoQuikRead_029 - [Szabo's Towards a Digital and Private Common Law](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_029---Szabos-Towards-a-Digital-and-Private-Common-Law-e2ndtv)
52 | * CryptoQuikRead_060 - [Nick Szabo The Mysterious Blockchain Titan](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_060---Nick-Szabo-The-Mysterious-Blockchain-Titan-e2ndsq)
53 | * CryptoQuikRead_083 - [Trusted Third Parties are Security Holes](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_083---Trusted-Third-Parties-are-Security-Holes-e2nds2)
54 | * CryptoQuikRead_113 - [The Dawn of Trustworthy Computing](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_113---The-Dawn-of-Trustworthy-Computing-e2ndr3)
55 | * CryptoQuikRead_214 - [Szabo's Formalizing & Securing Network Relationships [Part 1]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_214---Szabos-Formalizing--Securing-Network-Relationships-Part-1-e3953d)
56 | * CryptoQuikRead_215 - [Szabo’s Formalizing & Securing Network Relationships [Part 2]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_215---Szabos-Formalizing--Securing-Network-Relationships-Part-2-e3atv9)
57 | * CryptoQuikRead_216 - [Formalizing & Securing Network Relationships [Part 3]](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_216---Formalizing--Securing-Network-Relationships-Part-3-e3ejnd)
58 | * CryptoQuikRead_261 - [The God Protocols](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_261---The-God-Protocols-e4cstb)
59 | * CryptoQuikRead_233 - [Exit & Freedom](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_233---Exit--Freedom-e3nleo)
60 |
61 | ---
62 |
63 | {% include _improve_history.html %}
64 | ### Related Content
65 |
66 | {% include list-posts entries='5' category='People' %}
67 |
--------------------------------------------------------------------------------
/people/2019-12-13-adam-back.md:
--------------------------------------------------------------------------------
1 | ---
2 | title: Adam Back
3 | share: true
4 | permalink: /history/people/adam-back/
5 | categories: ["History","People"]
6 | tags: ["Cypherpunk"]
7 | directory: people/2019-12-13-adam-back.md
8 |
9 | ---
10 |
11 | * Founder and CEO of [Blockstream](https://blockstream.com/)
12 | * [Homepage](http://www.cypherspace.org/adam/) [[**T**](https://twitter.com/adam3us)]
13 | * [Who is Adam Back? About the Blockstream CEO](https://thebitcoinnews.com/who-is-adam-back-about-the-blockstream-ceo/)
14 | * [The Bitcoin Game #59: Dr. Adam Back](https://letstalkbitcoin.com/blog/post/the-bitcoin-game-59-dr-adam-back)
15 | > Dr. Back talks about topics such as his first computers, his early privacy-oriented work, Hashcash vs. other proof-of-work, various early electronic money systems, and his work on Bitcoin Confidential Transactions. Get ready to soak in some history from one of the people whose "work" became an integral part of Bitcoin.
16 |
17 | * [Why Dr Adam Back So Legendary - The Bitcoin Knowledge Podcast](https://www.bitcoin.kn/2015/09/why-dr-adam-back-so-legendary/) - [[**ϟ**](https://bitcoinmagazine.com/articles/back-future-adam-back-remembers-cypherpunk-revolution-origins-bitcoin-1441741053/)]
18 | > To help you better understand Bitcoin the top people in the Bitcoin industry are interviewed by Trace Mayer for the Bitcoin Knowledge Podcast.
19 | * [Legendary - The Bitcoin Knowledge Podcast](https://www.bitcoin.kn/legendary/)
20 | > To help you better understand Bitcoin the top people in the Bitcoin industry are interviewed by Trace Mayer for the Bitcoin Knowledge Podcast.
21 | * [Rob Mitchell (@TheBTCGame)](https://twitter.com/TheBTCGame/status/1069961056913477632)
22 | > @nlw I’ve never nominated my own podcast for anything before, but felt The Bitcoin Game with Adam Bach (part 1) was an amazing historical account of projects leading up to Bitcoin. [https://t.co/mP45HPKSjn](https://t.co/mP45HPKSjn)
23 | * [The Genesis Files: Hashcash or How Adam Back Designed Bitcoin’s Motor Block](https://bitcoinmagazine.com/articles/genesis-files-hashcash-or-how-adam-back-designed-bitcoins-motor-block) - [CryptoQuikRead_095](https://anchor.fm/thecryptoconomy/episodes/CryptoQuikRead_095---The-Genesis-Files-Hashcash-or-How-Adam-Back-Designed-Bitcoins-Motor-Block-e2ndrl)
24 | > "It was around this time — 1997, close to the [cypherpunk mailing] list’s peak popularity — that Back submitted his Hashcash proposal." @AaronvanW @BitcoinMagazine Today we read the second in Aaron Von Wirdum's "Genesis Files" series titled "Hashcash or How Adam Back De...
25 | * [The World Crypto Network Podcast: Proof of Work](https://podcasts.apple.com/us/podcast/the-world-crypto-network-podcast/id825708806?i=1000446663999) - An interview with Adam Back (Blockstream) - Aug 11, 2019
26 |
27 | ---
28 |
29 | {% include _improve_history.html %}
30 | ### Related Content
31 |
32 | {% include list-posts entries='5' category='People' %}
33 |
--------------------------------------------------------------------------------
/people/2019-12-14-hal-finney.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | title: Hal Finney
4 | permalink: /history/people/hal-finney/
5 | categories: ["History","People"]
6 | tags: ["Cypherpunk"]
7 | directory: people/2019-12-14-hal-finney.md
8 | ---
9 |
10 | * [Who is Hal Finney?](https://101blockchains.com/who-is-hal-finney-bitcoin/)
11 |
12 | * [Who is Satoshi? - The Hal Finney-Dorian Nakamoto Connection](https://cointelegraph.com/news/who-is-satoshi-the-hal-finney-dorian-nakamoto-connection)
13 |
14 | * [Dr. Bitcoin, M.D. (@DrBitcoinMD)](https://twitter.com/DrBitcoinMD/status/1165004233663496197?s=20)
15 | > You think bitcoin twitter is bullish? Hal Finney (@halfin), was calculating a bitcoin price of $10,000,000 per coin just ONE WEEK after the the genesis block on January 3rd, 2009. Absolute legend.
16 |
17 | * [Guy Swann⚡ (@TheCryptoconomy)](https://twitter.com/thecryptoconomy/status/1166841133294637056?s=12)
18 | > Harold Thomas Finney (May 4, 1956 – Aug 28, 2014) In one of his last posts, Hal shared a message about his past, finding #Bitcoin, working with Satoshi, coming to terms with ALS, & the legacy he leaves behind. Hal's, Bitcoin & Me
19 |
20 | * [https://nakamotoinstitute.org/finney/rpow/](https://nakamotoinstitute.org/finney/rpow/)
21 |
22 |
23 | * [Bitcoin and me (Hal Finney)](https://bitcointalk.org/index.php?topic=155054.0)
24 |
25 | * [Dying Outside](https://www.lesswrong.com/posts/bshZiaLefDejvPKuS/dying-outside)
26 | > A man goes in to see his doctor, and after some tests, the doctor says, "I'm sorry, but you have a fatal disease."
27 | >
28 | > Man: "That's terrible! How long have I got?"
29 | >
30 | > Doctor: "Ten."
31 | >
32 | > Man: "Ten? What kind of answer is that? Ten months? Ten years? Ten what?"
33 | >
34 | > The doctor looks at his watch. "Nine."
35 |
36 | * [Nakamoto's Neighbor: My Hunt For Bitcoin's Creator Led To A Paralyzed Crypto Genius](https://www.forbes.com/sites/andygreenberg/2014/03/25/satoshi-nakamotos-neighbor-the-bitcoin-ghostwriter-who-wasnt/#409dae0c4a37)
37 |
38 | * [Bitcoin's Earliest Adopter Is Cryonically Freezing His Body to See the Future](https://www.wired.com/2014/08/hal-finney/)
39 |
40 | * [[ExI] Hal Finney being cryopreserved](https://www.nytimes.com/2014/08/31/business/hal-finney-cryptographer-and-bitcoin-pioneer-dies-at-58.html) - [extropy discussion](http://lists.extropy.org/pipermail/extropy-chat/2014-August/082585.html)
41 |
42 | * [Hal Finney Memorial ALS Donation Drive (@bitcoin4als)](https://twitter.com/bitcoin4als/status/1123209833375850496?s=12)
43 | > 1/ "Bitcoin And Me" By Hal Finney Posted in @bitcointalk on 3/19/2013 "I thought I'd write about the last four years, an eventful time for Bitcoin and me. For those who don't know me, I'm Hal Finney.
44 |
45 |
46 |
47 | ---
48 |
49 | {% include _improve_history.html %}
50 | ### Related Content
51 |
52 | {% include list-posts entries='5' category='People' %}
53 |
--------------------------------------------------------------------------------
/people/2020-01-27-phil-zimmerman.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | title: Phil Zimmerman
4 | teaser:
5 | permalink: /history/people/phil-zimmerman/
6 | categories: ["History","People"]
7 | tags: ["Cypherpunk"]
8 | published: false
9 | directory: people/2020-01-27-phil-zimmerman.md
10 | ---
11 |
12 | * [Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state](https://www.techrepublic.com/article/defending-the-last-missing-pixels-phil-zimmermann/)
13 | >Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective is more relevant than ever.
14 | * [Phil Zimmermann on PGP](https://philzimmermann.com/EN/essays/index.html)
15 | * [Cypher Wars](https://www.wired.com/1994/11/cypher-wars/) - Pretty Good Privacy Gets Pretty Legal
16 |
17 | ---
18 |
19 | {% include _improve_history.html %}
20 | ### Related Content
21 |
22 | {% include list-posts entries='5' category='People' %}
23 |
--------------------------------------------------------------------------------
/people/2020-02-02-people.md:
--------------------------------------------------------------------------------
1 | ---
2 | layout: page-fullwidth
3 | header: no
4 | title: "People"
5 | permalink: /history/people/
6 | categories: ["History","People"]
7 | tags: ["Cypherpunk"]
8 | published: false
9 | directory: people/2020-02-02-people.md
10 |
11 | ---
12 |
13 | It's rather ambitious to try and list all essential people from Bitcoin's history.
14 |
15 | This is just the beginnings of a list and will meander in the direction o move in that direction, and nothing like comprehensive
16 |
17 |
18 | ## Charlie-schrem
19 |
20 |
21 | * [Charlie Shrem - First Bitcoin Felon](https://www.weusecoins.com/first-bitcoin-felon/)
22 | > Charlie Shrem, former CEO of BitInstant, tells war stories about buying and selling bitcoins. PODCAST INTERVIEW TRANSCRIPTION
23 | * [Charlie Shrem - War Stories On Buying And Selling Bitcoins](https://www.weusecoins.com/war-stories-buying-selling-bitcoins/)
24 | > Charlie Shrem is a former CEO of BitInstant and currently part of JAXX Exchange. In this video he talks about war stories on buying and selling Bitcoins.
25 |
26 |
27 | ## Craig-wright-is-a-fraud
28 |
29 | * [SeekingSatoshi (@jimmy007forsure)](https://twitter.com/jimmy007forsure/status/1165544829096349696?s=12)
30 | > So whilst Satoshi Nakamoto was hard at work designing Bitcoin Craig Wright was in his man-shed Hacking Coffee Makers ..
31 |
32 | * [Katie Ananina (@KatieAnanina)](https://twitter.com/katieananina/status/1166083984830410759?s=12)
33 |
34 | * [Bill Smith (@billsmith4lyfe)](https://twitter.com/billsmith4lyfe/status/1166207069629775872?s=12)
35 | > Let me try and clear a few things up. 1st - whatever happened at the csw hearing today - it doesn't really matter until the actual federal judge reduces it to an Order. It appears the hearing was held with a magistrate judge. Magistrate judges are NOT federal judges. /1
36 |
37 | * [He’s not Satoshi, he’s a very naughty boy | FT Alphaville](http://ftalphaville.ft.com/2019/08/27/1566922213000/He-s-not-Satoshi--he-s-a-very-naughty-boy/)
38 |
39 |
40 | ## Brian-hoffman
41 |
42 | * [Brian Hoffman](https://www.weusecoins.com/brian-hoffman/)
43 | > Brian Hoffman is the CEO of OB1, which is the parent company of the decentralized marketplace OpenBazaar.
44 |
45 | ## Bitcoin-belle
46 |
47 | * [Ryan Calder (@_RyanCalder)](https://twitter.com/_RyanCalder/status/1119505033014308865)
48 | > WHO IS BITCOIN BELLE?!? Please answer and Retweet #CCMe #CryptoNautica #FreeTalkLiveRadio #Bitcoin
49 |
50 | * [This Lydia 'Bitcoin Belle' Will Give You Your Bitcoin News, Naked](http://web.archive.org/web/20160314035302/https:/cointelegraph.com/news/this-bitcoin-belle-will-give-you-your-bitcoin-news-naked)
51 | > NakedBits is the website, Lydia Belle is the girl, and Proof-of-Strip is the show. That is all you need to know to learn everything you need to know about Bitcoin, while having a naked young woman explain it to you.
52 |
53 | * [You, Me, and BTC (@YouMeAndBTC)](https://twitter.com/YouMeAndBTC/status/853782133273489409?s=20)
54 | > Throwback: Bitcoin Belle: Books, Bitches, Banter, & More - YMB Podcast E114 [https://t.co/FBCF9874Ba](https://t.co/FBCF9874Ba) #bitcoinbelle #bitcoinbook
55 |
56 | * [Bitcoin Belle (@BitcoinBelle@mastodon.social)](https://mastodon.social/@BitcoinBelle)
57 |
58 | * [https://vimeo.com/maryjbelle](https://vimeo.com/maryjbelle)
59 |
60 | * [https://btcupload.com/video/proof-of-strip-ep12-naked-bitcoin-news](https://btcupload.com/video/proof-of-strip-ep12-naked-bitcoin-news)
61 |
62 | * [Bitcoin Belle: Books, Bitches, Banter, & More - YMB Podcast E114 -...](https://youmeandbtc.com/bitcoin-podcast/bitcoin-belle-books-bitches-b-ymb-podcast-e114/)
63 | > In this Bitcoin podcast, the Bitcoin Belle joins us to chat all kinds of crypto. We'll cover her new novel, some Ross Ulbricht news, her court cases & more!
64 |
65 | ## Judith Milhon
66 |
67 | St Jude, came up w the term Cypherpunk
68 |
69 | [Jude Milhon - Wikipedia](https://en.m.wikipedia.org/wiki/Jude_Milhon)
70 | > Judith [Jude] Milhon (March 12, 1939 – July 19, 2003), in Washington D.C., best known by her pseudonym St. Jude, was a hacker and author in the San Francisco Bay Area. Milhon coined the term cypherpunk and was a founding member of the cypherpunks. On July 19, 2003, Milhon d...
71 |
72 | ## JLopp
73 |
74 | - [https://www.ccn.com/one-bitcoin-developers-quixotic-quest-to-vanish-in-plain-sight/](https://www.ccn.com/one-bitcoin-developers-quixotic-quest-to-vanish-in-plain-sight/)
75 | - [One Bitcoin Developer's Quixotic Quest to Vanish in Plain Sight](https://www.ccn.com/one-bitcoin-developers-quixotic-quest-to-vanish-in-plain-sight/)
76 | > Bitcoin developer Jameson Lopp has made a shockingly thorough attempt to vanish from the face of the earth - all while remaining in plain sight.
77 |
78 | ## Wei Dai
79 |
80 | https://thebookofbitcoin.github.io/html/people/wei_dai.html
81 |
82 | * [Wei Dai/Satoshi Nakamoto 2009 Bitcoin emails](https://www.gwern.net/docs/bitcoin/2008-nakamoto)
83 |
84 | https://en.bitcoin.it/wiki/Wei_Dai
85 |
86 | https://en.bitcoinwiki.org/wiki/Wei_Dai
87 |
88 | * [Wei Dai, Who Dat?](https://medium.com/blockwhat/98-wei-dai-who-dat-f93c4e4bcfc9)
89 |
90 |
91 | ---
92 |
93 | {% include _improve_history.html %}
94 | ### Related Content
95 |
96 | {% include list-posts entries='5' category='People' %}
97 |
--------------------------------------------------------------------------------