The Father of Online Anonymity Has a Plan to End the Crypto War (2024)

It’s been more than 30 years since David Chaum launched the ideas that would serve as much of the groundwork for anonymity online. In doing so, he also helped spark the debate that’s endured ever since, over the anarchic freedoms that digital secrecy enables---the conflict between privacy advocates and governments known today as the “crypto wars.”

Now Chaum has returned with his first online privacy invention in more than a decade. And with it, he wants to bring those crypto wars to an end.

At the Real World Crypto conference at Stanford University today, Chaum plans to present for the first time a new encryption scheme he calls PrivaTegrity. Like other tools Chaum has spent his long career developing, PrivaTegrity is designed to allow fully secret, anonymous communications that no eavesdropper can crack, whether a hacker or an intelligence agency. But PrivaTegrity, which Chaum's been developing as a side project for the last two years along with a team of academic partners at Purdue, Radboud University in the Netherlands, Birmingham University and other schools, is meant to be both more secure than existing online anonymity systems like Tor or I2P and also more efficient; he claims it will be fast enough to work as a smartphone app with no perceptible delay. Chaum wouldn't comment on whether the project, which has yet to be fully coded and tested, would be commercialized or run as a non-profit, but he says an alpha version for Android is in development that functions as an instant-messaging app. In future versions, Chaum and his collaborators plan to add features like larger file sharing for photos and video, the ability to follow Twitter-like feeds, and even financial transactions, all under the cover of strong anonymity with untraceable pseudonyms. "It’s a way to create a separate online reality," says Chaum, "One in which all the various things we now know people like to do online can be done in a lightweight manner under a completely different and new and very attractive privacy and security model."

That ambitious privacy toolset aside, Chaum is also building into PrivaTegrity another feature that's sure to be far more controversial: a carefully controlled backdoor that allows anyone doing something “generally recognized as evil” to have their anonymity and privacy stripped altogether.

Whoever controls that backdoor within PrivaTegrity would have the power to decide who counts as "evil"---too much power, Chaum recognizes, for any single company or government. So he's given the task to a sort of council system. When PrivaTegrity's setup is complete, nine server administrators in nine different countries would all need to cooperate to trace criminals within the network and decrypt their communications. The result, Chaum argues, is a new approach that “breaks the crypto wars,” satisfying both the law enforcement agencies who argue that encryption offers a haven for criminals, and also those who argue that it’s necessary to hobble mass spying.

“If you want a way to solve this apparent logjam, here it is,” says Chaum. “We don’t have to give up on privacy. We don’t have to allow terrorists and drug dealers to use it. We can have a civil society electronically without the possibility of covert mass surveillance.”

Inventing Anonymity

Chaum’s quest for a shield against Internet surveillance began before most of the world was even aware of the Internet at all. His inventions include the first-ever cryptocurrency, a 1990s venture known as DigiCash, and DC Nets, a scheme he invented in the early '80s to allow theoretically perfect anonymity within a group of computers. But perhaps the most influential of Chaum’s privacy ideas was an earlier, simpler scheme he called a “mix network,” a term he coined in 1979.

Mix networks anonymize messages by encrypting them in layers and routing them through a series of computers that serve as intermediaries. Each of those middlemen machines collects messages in batches, shuffles them, strips off one layer of their encryption that only that computer can decrypt, and then passes them on to the next computer in the chain. The result is that no one, not even the individual intermediary computers themselves, can trace the messages from origin to destination. Today, anonymity tools inspired by mix networks are used by everyone from the nearly 2 million inhabitants of the Tor anonymity network---whose messages are routed through a sort of mutated mix network of thousands of volunteer machines---to Bitcoin spenders hiding drug transactions on the Dark Web.

With PrivaTegrity, Chaum is introducing a new kind of mix network he calls cMix, designed to be far more efficient than the layered encryption scheme he created decades ago. In his cMix setup, a smartphone communicates with PrivaTegrity's nine servers when the app is installed to establish a series of keys that it shares with each server. When the phone sends a message, it encrypts the message's data by multiplying it by that series of unique keys. Then the message is passed around all nine servers, with each one dividing out its secret key and multiplying the data with a random number. On a second pass through the nine servers, the message is put into a batch with other messages, and each server shuffles the batch's order using a randomized pattern only that server knows, then multiplies the messages with another random number. Finally, the process is reversed, and as the message passes through the servers one last time, all of those random numbers are divided out and replaced with keys unique to the message's intended recipient, who can then decrypt and read it.

Chaum argues that PrivaTegrity's setup is more secure than Tor, for instance, which passes messages through three volunteer computers which may or may not be trusted. Unlike PrivaTegrity, Tor also doesn't deliver its messages in batches, a decision designed to allow fast Web browsing. But that tradeoff means a spy who watches both ends of Tor's network of intermediary computers might be able to identify the same message going in one at one place and coming out at another, a problem PrivaTegrity batch system is designed to solve.

PrivaTegrity's protocol will be speedier than past attempts at implementing mix networks, Chaum claims. That supposed efficiency comes from the fact that the collections of random numbers it uses, both before and after the messages are shuffled, can be precomputed and passed between the servers during moments when the servers are idle, instead of being created in real-time and slowing down conversations. And because the entire cMix process is a series of simple multiplications and divisions, it's far faster than the public key computations necessary in older mix networks, says Aggelos Kiayas, a computer science professor at the University of Connecticut who's reviewed Chaum's system. "It is well known that mix nets can be better than Tor in terms of privacy...The real question is latency," Kiayas writes in an email, cautioning that he can't fully judge the scheme's efficiency without seeing the final app. "PrivaTegrity appears to be a decisive step forward in this direction."

A Backdoor Security Council

On top of those security and efficiency tricks, PrivaTegrity's nine-server architecture---with a tenth that works as a kind of "manager" without access to any secret keys---also makes possible its unique backdoor decryption feature. No single server, or even eight of the nine servers working together, can trace or decrypt a message. But when all nine cooperate, they can combine their data to reconstruct a message's entire path and divide out the random numbers they used to encrypt it. "It's like a backdoor with nine different padlocks on it," Chaum says.

For now, Chaum admits the prototype of PrivaTegrity that he plans to distribute to alpha testers will have all its servers running in Amazon's cloud, leaving them open to the usual threats of American government surveillance, from subpoenas to National Security Letters. But in the app's final version, Chaum says he plans to move all but one of those servers abroad, so that they're spread out to nine different countries, and require each server to publish its law enforcement cooperation policy. Chaum won't yet detail his suggested privacy policies for those servers, but suggests that decryption and tracing could be reserved for "serious abuse, something that leads to death and real harm to people or major economic malfeasance." Or perhaps the system could limit the frequency of covert traces to some number, such as 100 decryptions per year. Or, Chaum suggests, the privacy policy could be written to prevent the servers from performing any voluntary tracing or decryption, though they'd still be subject to legal threats from governments. Chaum argues that he doesn't himself advocate any one of those approaches. "It’s one thing to advocate an opinion, and another thing to create something and say 'this could be the solution,'" Chaum says.3

The Father of Online Anonymity Has a Plan to End the Crypto War (2024)

FAQs

The Father of Online Anonymity Has a Plan to End the Crypto War? ›

The Father of Online Anonymity Has a Plan to End the Crypto War. Cryptographer David Chaum's ideas helped spark the decades-long war between encryption and government.

Who is the godfather of crypto? ›

NetVRk Names "Crypto Godfather" Michael Terpin as Advisor.

What was the first crypto war fought over? ›

The First Crypto War were fought over end-to-end encryption for communications, and appeared largely over as a result of the EU's and US's loosening of export regulations in the late 1990s.

Who is the father of all crypto? ›

The name "Satoshi Nakamoto" is the pseudonym for the person or people who introduced the concept of Bitcoin in a 2008 paper. 1 Nakamoto remained active in the creation of Bitcoin and the blockchain until about 2010 but has not been heard from since.

Who really owns crypto? ›

The largest holders of Bitcoin include Satoshi Nakamoto, public companies like MicroStrategy and Tesla, institutional investment trusts such as Grayscale, individuals known as “Bitcoin whales,” and even some governments through legal seizures and strategic purchases like the United States and El Salvador.

Who was the first crypto destroy all humans? ›

(2005) During the year 1959, Cryptosporidium 137 first arrived on the Earth to investigate the planet and search for his predecessor clone, Cryptosporidium 136, who disappeared in 1947 after Orthopox 13 sent him to Earth on a similar mission.

What is the oldest coin in crypto? ›

Bitcoin, launched in 2009, was the first cryptocurrency and is still the best known and most valuable. Since then, thousands of alternative cryptocurrencies (altcoins) have been created, each with their own unique characteristics and uses.

What is the oldest crypto exchange still active? ›

Bitstamp is a European cryptocurrency exchange founded in 2011. It is the world's longest-running cryptocurrency exchange.

Who is the most successful person in crypto? ›

For the third year running, Changpeng Zhao, founder and former CEO of crypto exchange Binance, is crypto's wealthiest person. Despite pleading guilty to U.S. money laundering charges in November, CZ, as he's known, is now worth an estimated $33 billion, up from $10.5 billion last year.

Who is controlling crypto? ›

Each currency has its own blockchain, which is an ongoing, constantly re-verified record of every single transaction ever made using that currency. No company, country, or third party is in control of it; and anyone can participate.

Who is the number one crypto? ›

Rankings
#Name% ATH
1Bitcoin BTC-13%
2Ethereum ETH-35%
3Tether USDT-18%
4BNB BNB-21%
23 more rows

Who is crypto genius? ›

Simply because opening an account with Crypto Genius comes with a wide range of benefits! Crypto Genius is a smart platform that helps you connect with various partner broker platforms across the globe and begin trading like a pro.

Top Articles
Cybersecurity Policy Responses to the Colonial Pipeline Ransomware Attack
Making mutual fund choice: Multi-asset vs balanced advantage funds
Encore Atlanta Cheer Competition
Durr Burger Inflatable
Combat level
Ixl Elmoreco.com
Brendon Tyler Wharton Height
Air Canada bullish about its prospects as recovery gains steam
David Packouz Girlfriend
Graveguard Set Bloodborne
Mivf Mdcalc
Keurig Refillable Pods Walmart
Gas Station Drive Thru Car Wash Near Me
Identogo Brunswick Ga
Top tips for getting around Buenos Aires
Sony E 18-200mm F3.5-6.3 OSS LE Review
Munich residents spend the most online for food
Canvas Nthurston
Imagetrend Inc, 20855 Kensington Blvd, Lakeville, MN 55044, US - MapQuest
Vintage Stock Edmond Ok
Whitefish Bay Calendar
TBM 910 | Turboprop Aircraft - DAHER TBM 960, TBM 910
ZURU - XSHOT - Insanity Mad Mega Barrel - Speelgoedblaster - Met 72 pijltjes | bol
Craigslist Southern Oregon Coast
MLB power rankings: Red-hot Chicago Cubs power into September, NL wild-card race
Apple Original Films and Skydance Animation’s highly anticipated “Luck” to premiere globally on Apple TV+ on Friday, August 5
Cvs El Salido
Sullivan County Image Mate
The Tower and Major Arcana Tarot Combinations: What They Mean - Eclectic Witchcraft
Jeff Nippard Push Pull Program Pdf
Troy Gamefarm Prices
Chime Ssi Payment 2023
Watson 853 White Oval
Gillette Craigslist
Roseann Marie Messina · 15800 Detroit Ave, Suite D, Lakewood, OH 44107-3748 · Lay Midwife
Taylored Services Hardeeville Sc
Winterset Rants And Raves
LG UN90 65" 4K Smart UHD TV - 65UN9000AUJ | LG CA
The value of R in SI units is _____?
Craigslist Maryland Baltimore
Human Unitec International Inc (HMNU) Stock Price History Chart & Technical Analysis Graph - TipRanks.com
Envy Nails Snoqualmie
Workday Latech Edu
Skyrim:Elder Knowledge - The Unofficial Elder Scrolls Pages (UESP)
Can You Buy Pedialyte On Food Stamps
Tugboat Information
3496 W Little League Dr San Bernardino Ca 92407
Hk Jockey Club Result
Reli Stocktwits
Diesel Technician/Mechanic III - Entry Level - transportation - job employment - craigslist
Southern Blotting: Principle, Steps, Applications | Microbe Online
Latest Posts
Article information

Author: Lidia Grady

Last Updated:

Views: 5701

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lidia Grady

Birthday: 1992-01-22

Address: Suite 493 356 Dale Fall, New Wanda, RI 52485

Phone: +29914464387516

Job: Customer Engineer

Hobby: Cryptography, Writing, Dowsing, Stand-up comedy, Calligraphy, Web surfing, Ghost hunting

Introduction: My name is Lidia Grady, I am a thankful, fine, glamorous, lucky, lively, pleasant, shiny person who loves writing and wants to share my knowledge and understanding with you.