The Community for Technology Leaders
RSS Icon
Issue No.02 - March-April (2013 vol.11)
pp: 75-76
Arvind Narayanan , Princeton University
One way to use cryptography for privacy is to tweak various systems to be privacy-preserving. But the more radical cypherpunk movement sought to wield crypto as a weapon of freedom, autonomy, and privacy that would fundamentally and inexorably reshape social, economic, and political power structures. This installment of On the Horizon primarily examines the latter use.
Cryptography, Privacy, Computer security, Computer crime, Social factors, Social implications of technology, cypherpunk, crypto, cryptography, security, privacy
Arvind Narayanan, "What Happened to the Crypto Dream?, Part 1", IEEE Security & Privacy, vol.11, no. 2, pp. 75-76, March-April 2013, doi:10.1109/MSP.2013.45
1. S. Levy, Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age, Penguin Putnam, 2002.
2. D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, 1985, pp. 1030–1044.
3. A. Greenberg, This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information, Dutton Adult, 2012.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool