Crypto-anarchism
Crypto-anarchism (or crypto-anarchy) is a cyber-spatial realization of anarchism. Crypto-anarchists employ cryptographic software to evade prosecution and harassment while sending and receiving infor...
Cypherpunk
A cypherpunk is any activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, info...
Cypherpunk - Wikipedia
Financial cryptography
Financial cryptography (FC) is the use of cryptography in applications in which financial loss could result from subversion of the message system.Cryptographers think of the field as originating in th...
Double-spending
Double-spending is a failure mode of digital cash schemes, when it is possible to spend a single digital token twice. Since, unlike physical token money such as coins, electronic files can be duplicat...
Decentralized network 42
Decentralized network 42 (also known as dn42) is a decentralized peer-to-peer network built using VPNs and software/hardware BGP routers.While other Darknets try to establish anonymity for their parti...
Sean Hastings
Sean Hastings (born 1968) is an entrepreneur, cypherpunk author, and security expert. He is best known for being the founding CEO of HavenCo, the world's first formal data haven.
In 1997, Hastings...
Sean Hastings - Wikipedia
Crypto-society
A crypto-society is an encrypted virtual community. It is nearly impossible to create a face to face crypto-society as it would take too much time and resources to encrypt all the human to human inter...
Haystack (software)
Haystack was a never-completed program intended for network traffic obfuscation and encryption. It was promoted as a tool to circumvent internet censorship in Iran. Shortly after the release of the fi...
Brian LaMacchia
Brian A. LaMacchia is a computer security specialist.LaMacchia is best known for his work at the Massachusetts Institute of Technology establishing the MIT PGP Key Server, the first key centric PKI im...
GTunnel
GTunnel is a Windows application developed by Garden Networks which sets up a local HTTP or SOCKS proxy server which tunnels traffic through their server farm before it reaches its intended destinatio...
GTunnel - Wikipedia
Virtual private network
A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or network-enabled device to send and receive data across shared or publi...
Virtual private network - Wikipedia
ECache
eCache is an electronic currency. eCache issues cryptographic certificates, digital bearer certificates, that can be exchanged among the eCache users. The certificates can be bought and sold for real ...
Robert (P2P Software)
Robert is a file sharing application that relies upon the security and encryption of peers and tunnels inside of I2P. The software uses torrents or a distribution method similar but not compatible to...
Assassination market
An assassination market or market for assassinations is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a give...
CalPOP
California Point of Presence, more commonly known as CalPOP, is a privately held server hosting company based in Los Angeles, California specializing in dedicated servers. Operating from Digital Realt...
CalPOP - Wikipedia
Sameer Parekh
Sameer Parekh is the founder of C2Net Software, Inc.While in high school in Libertyville, Illinois, he published an underground newspaper called The Free Journal, promoting libertarian ideas.In 1993 P...
BartVPN
BartVPN is a VPN client developed and published by Red Sky, Poland. The software implements virtual private network technology to create secure point-to-point or site-to-site connections with encrypte...
Cipherspace
Cipherspace or cypherspace is the encrypted (and often pseudonymous or fully anonymous) equivalent to cyberspace. Examples of cipherspaces include Freenet, I2P, Tor, and some anonymous mail-forwarding...
Cyphernomicon
"The Cyphernomicon" is a document written by Timothy C. May in 1994 for the Cypherpunks electronic mailing list, outlining some ideas behind, and the effects of, crypto-anarchism. It constitutes one o...
Anonymous P2P
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by speci...
Anonymous Internet banking
Anonymous Internet banking is the proposed use of strong financial cryptography to make electronic bank secrecy (or more precisely pseudonymous banking) possible. The bank issues currency in the form ...