Encryption always wins because it follows the logic of the Net. A
given public-key encryption key can eventually be cracked by a
supercomputer working on the problem long enough. Those who have codes
they don't want cracked try to stay ahead of the supercomputers by
increasing the length of their keys (the longer a key, the harder it is
to crack) -- but at the cost of making the safeguard more unwieldy and slow
to use. However, any code can be deciphered given enough time or money.
As Eric Hughes often reminds fellow cypherpunks, "Encryption is
economics. Encryption is always possible, just expensive." It took Adi
Shamir a year to break a 120-digit key using a network of distributed
Sun workstations working part-time. A person could use a key so long
that no supercomputer could crack it for the foreseeable future, but it
would be awkward to use in daily life. A building-full of NSA's
specially hot-rodded supercomputers might take a day to crack a
140-digit code today. But that is a full day of big iron to open just
one lousy key!
Cypherpunks intend to level the playing field against centralized
computer resources with the Fax Effect. If you have the only fax machine
in the world it is worth nothing. But for every other fax installed in
the world, your fax machine increases in value. In fact, the more faxes
in the world, the more valuable everybody's fax becomes. This is the
logic of the Net, also known as the law of increasing returns. It goes
contrary to classical economic theories of wealth based on equilibratory
tradeoff. These state that you can't get something from nothing. The
truth is, you can. (Only now are a few radical economics professors
formalizing this notion.) Hackers, cypherpunks, and many hi-tech
entrepreneurs already know that. In network economics, more brings more.
This is why giving things away so often works, and why the cypherpunks
want to pass out their tools gratis. It has less to do with charity than
with the clear intuition that network economics reward the more and not
the less -- and you can seed the "more" at the start by giving the tools
away. (The cypherpunks also talk about using the economics of the Net
for the reverse side of encryption: to crack codes. They could assemble
a people's supercomputer by networking together a million Macintoshes,
each one computing a coordinated little part of a huge, distributed
decryption program. In theory, such a decentralized parallel computer
would in sum be the most powerful computer we can now imagine -- far
greater than the centralized NSA's.)
The idea of choking Big Brother with a deluge of petty, heavily
encrypted messages so tickles the imagination of crypto-rebels that one
of them came up with a freeware version of a highly regarded public-key
encryption scheme. The software is called PGP, for Pretty Good Privacy.
The code has been passed out on the nets for free and made available on
disks. In certain parts of the Net it is quite common to see messages
encrypted with PGP, with a note that the sender's public-key is
"available upon request."
PGP is not the only encryption freeware. On the Net, cypherpunks can
grab RIPEM, an application for privacy-enhanced mail. Both PGP and RIPEM
are based on RSA, a patented implementation of encryption algorithms.
But while RIPEM is distributed as public domain software by the RSA
company itself, Pretty Good Privacy software is home-brew code concocted
by a crypto-rebel named Philip Zimmermann. Because Pretty Good Privacy
uses RSA's patented math, it's outlaw-ware.
RSA was developed at MIT -- partly with federal funds -- but was later
licensed to the academic researchers who invented it. The researchers
published their crypto-methods before they filed for patents out of fear
that the NSA would hold up the patents or even prevent the civilian use
of their system. In the US, inventors have a year after publication to
file patents. But the rest of the world requires patents before
publication, so RSA could secure only U.S. patents on its system. PGP's
use of RSA's patented mathematics is legitimate overseas. But PGP is
commonly exchanged in the no-place of the Net (what country's
jurisdiction prevails in cyberspace?) where the law on intellectual
property is still a bit murky and close to the beginnings of crypto
anarchy. Pretty Good Privacy deals with this legal tar baby by notifying
its American users that it is their responsibility to secure from RSA a
license for use of PGP's underlying algorithm. (Sure. Right.)
Zimmermann claims he released the quasi-legal PGP into the world because
he was concerned that the government would reclaim all public-key
encryption technology, including RSA's. RSA can't stop distribution of
existing versions of PGP because once something goes onto the Net, it
never comes back. But it's hard for RSA to argue damages. Both the
outlawed PGP and the officially sanctioned RIPEM infect the Net to
produce the Fax Effect. PGP encourages consumer use of encryption -- the
more use, the better for everyone in the business. Pretty Good Privacy
is freeware; like most freeware, its users will sooner or later graduate
to commercially supported stuff. Only RSA offers the license for that at
the moment. Economically, what could be better for a patent holder than
to have a million people use the buddy system to teach themselves about
the intricacies and virtues of your product (as pirated and distributed
by others), and then wait in line to buy your stuff when they want the
best?
The Fax Effect, the rule of freeware upgrade, and the power of
distributed intelligence are all part of an emerging network economics.
Politics in a network economy will also definitely require the kind of
tools the cypherpunks are playing with. Glenn Tenney, chairman of the
annual Hackers' Conference, ran for public office in California last
year using the computer networks for campaigning, and came away with a
realistic grasp of how they will shape politics. He notes that digital
techniques for establishing trust are needed for electronic democracy.
He writes online, "Imagine if a Senator responds to some e-mail, but
someone alters the response and then sends it on to the NY Times?
Authentication, digital signatures, etc., are essential for protection
of all sides." Encryption and digital signatures are techniques to
expand the dynamics of trust into a new territory. Encryption cultivates
a "web of trust," says Phil Zimmermann, the very web that is the heart
of any society or human network. The short form of the cypherpunk's
obsession with encryption can be summarized as: Pretty good privacy
means pretty good society.
One of the consequences of network economics, as facilitated by ciphers
and digital technology, is the transformation of what we mean by pretty
good privacy. Networks shift privacy from the realm of morals to the
marketplace; privacy becomes a commodity.
A telephone directory has value because of the energy it saves a caller
in finding a particular phone number. When telephones were new, having
an individual number to list in a directory was valuable to the lister
and to all other telephone users. But today, in a world full of easily
obtained telephone numbers, an unlisted phone number is more valuable to
the unlisted (who pay more) and to the phone company (who charge more).
Privacy is a commodity to be priced and sold.
Most privacy transactions will soon take place in the marketplace rather
than in government offices because a centralized government is
handicapped in a distributed, open-weave network, and can no longer
guarantee how things are connected or not connected. Hundreds of privacy
vendors will sell bits of privacy at market rates. You hire Little
Brother, Inc., to demand maximum payment from junk mail and direct
marketers when you sell your name, and to monitor uses of that
information as it tends to escape into the Net. On your behalf, Little
Brother, Inc., negotiates with other privacy vendors for hired services
such as personal encrypters, absolutely unlisted numbers, bozo filters
(to hide the messages from known "bozos"), stranger ID screeners (such
as caller ID on phones that only accept calls from certain numbers), and
hired mechanical agents (called network "knowbots") to trace addresses,
and counter-knowbots that unravel traces of your own activities.
Privacy is a type of information that has its polarity reversed; I
imagine it as anti-information. The removal of a bit of information from
a system can be seen as the reproduction of a corresponding bit of
anti-information. In a world flooded with information ceaselessly
replicating itself to the edges of the Net, the absence or vaporization
of a bit of information becomes very valuable, especially if that
absence can be maintained. In a world where everything is connected to
everything -- where connection and information and knowledge are dirt
cheap -- then disconnection and anti-information and no-knowledge become
expensive. When bandwidth becomes free and entire gigabytes of
information are swapped around the clock, what you don't want to
communicate becomes the most difficult chore. Encryption systems and
their ilk are technologies of disconnection. They somewhat tame the
network's innate tendency to connect and inform without
discrimination.
continue...
|