Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
We need the ability to lose ourselves in the crowd. The ability to become nameless and faceless is an essential human experience. Further, I would assert that anonymity is essential to a free society. In the digital age, this is more important than ever.
Donât believe me? Did you know that the Federalist Papers, and âCommon Senseâ, were both published anonymously? In fact, the Federalist Papers were published under a pseudonym! Both were essential to the founding of America, the eventual formation of its Constitution and Bill of Rights.
Anonymity and pseudo-anonymity are critical to expressing dangerous ideas freely (as Iâm doing here, now). If your boss, or your partner, or your friends, found out about the potentially harmful ideas youâre putting forth, experimenting with, playing with, you probably wouldnât try them in the first place.
Of course, this freedom comes at a terrible price: letting nazi filth, or pedophiles, or fascists, or any manner of horrible people, speak their minds, share encrypted messages, and spread propaganda with wild abandon. There is no price to pay, for them, if theyâre anonymous, faceless, nameless.
One could argue that this is an essential cost of liberty. If speech is free, people will say things you donât like. If thereâs a right to privacy, people will do things behind closed doors you donât like. Naturally, we would never say the police should carry keys to every door to come and go as they please, so why do it in the digital age?
I say we can have our cake and eat it too.
How? With digital trust and reputation systems.
A nameless, faceless entity that puts forth a conspiracy theory is lambasted, laughed off of the stage (by most; Iâll get back to that later). However, if CNN promoted the theory that, say, humans never landed on the moon, it would be given credence. Why?
Because we trust CNN. The sane among us, anyway. Why do we trust them?
Because they have a reputation to uphold. They have people to answer to. If they push a theory thatâs fundamentally false, they lose trust. As they say, âtrust is gained in drops and lost in bucketsâ.
This is all well and good, but how does this translate to the digital age? With cryptography, of course!
The simplest approach to this is âkey signingâ. It goes like this: Alice and Bob are partners. They know that each holds the private key corresponding to the public key they know, so they digitally âsignâ the public key, essentially saying âyeah, thatâs Aliceâ, or âyeah, thatâs Bobâ.
Eventually, you can build a giant system of trust, called a âweb of trustâ, which tells you that a given public key is likely to be associated with a given person; the more signatures a key has, the more likely the key is to be authentic.
But of course, this has a ton of holes.
For one, this is an absolute system of trust. We might say âI trust you with my lifeâ or âI donât trust them as far as I can throw themâ, but trust is rarely absolute. Itâs more granular, more relative, like âI trust you not to go on a killing spree, but I donât trust you to house-sit for meâ.
This also doesnât handle revocation of signatures. If the person whose key you signed turns out to have their identity stolen (letâs say they were coerced into giving up their private key), thereâs no way in the system I described to take back your trust, as we so often do in real life.
This is brushing aside reputation, as thereâs no way I know of to have a reputation system in the âweb of trustâ model.
There might be ways to handle these cases in GnuPG, but GPG is such a clusterfuck, I really donât care. Whenâs the last time you said, âletâs use GPG to encrypt emails!â? Never ever in your life have you said that to a non-techie friend.
What we need is a system that reflects the real world. We need a system thatâs easy to use. We need a system that real, actual people can use, not just tech weirdos (and I say that as a proud tech weirdo).
What would this system look like?
Iâve often thought about âcirclesâ of friends. I might have one circle of friends who I trust with general information about my life, but not my secrets. Then in another circle, I might trust people with some secrets. Then there would be a circle of two, with my partner, where no information leaves that circle. Finally, thereâs a circle with me and myself alone, with secrets I never let out.
I swear, I came up with this concept of circles in 2008â2009, before Google+. Youâll have to trust me on that one.
So we have this concept of circles, levels, layers of trust in which someone might be a friend; or they might be a friend, a confidant, and a coworker; or they might simply be someone you do business with and nothing more.
How does this get us to reputation?
Well, if a user builds up a following within their circles, they might get âpromotedâ from one circle to another. They might gain trust! This is a simple concept that maps to real life. We can quantify this with the sheer volume of information going through that circle of people. There are more complex methods, but this gets us most of the way there.
This raises the question that I alluded to earlier on: what if nazis gain a following and start pushing propaganda outside their network, or pedophiles create circles and start sending encrypted messages to each other?
Letâs focus on the nazi case, for now. In the case where a group of nazis decides to try to extend their tendrils beyond their little echo chamber, ideally, theyâll be seen as an echo chamber and treated as such. A true circle is one that has connections everywhere. Six degrees of separation from any other node in the network, in theory (like the âsix degrees of Kevin Baconâ, or the âsix degrees of Wikipediaâ game).
What about the circle of perverts, sharing messages with each other? In an ideal case, they wouldnât have any trust between each other because they canât extend their network beyond their circle of immediate contacts.
Ultimately, it comes back to the closed doors question; how much privacy are you willing to sacrifice for security? Are you willing to let the cops kick the door in to any house, to make sure the perverts donât have a chance? Probably not. No matter what, though, the creeps wonât be able to gain trust because they canât share outside of that tiny little circle.
So this begs many questions, including favorites such as âhow do we quantify trust and reputation?â and âhow do we âoutâ bad actors?â. But Iâm getting tired, this is getting long-winded, and the scotch is kicking in. Til next time, this is Mister Fahrenheit, signing off and wishing you some much-needed time away, awash in the mass of nameless, faceless pedestrians of the city.
Originally published at https://community.hackernoon.com on May 31, 2019.
Cryptography, Anonymity, and their Roles in a Free Society was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.