This is the exact problem solved by onion-routing. The first node is called "Guard" for a reason, it can directly monitor all incoming connection to the network, but if onion-routing is used and the system is properly designed, it usually doesn't matter. The only information revealed is the fact that someone has connected.
> You already have to operate as if an exit node could be bad, it's not that different.
Tor's anonymity is guaranteed by its probability and temporary nature of exit nodes. Every Tor client uses the same algorithm to select an exit node, and a single exit node in a circuit is typically discarded within a few minutes for web browsing. Further, Stream Isolation selects different exit nodes for different destinations. Effectively, it means the correlation between an individual Tor user and a particular exit node is practically zero (and tracking at Layer-7 is often better than breaking Tor).
It's like discarding and selecting one of the 1,000 dead-drops at a time, and all of them are being used by a million people. On the other hand, purchasing a VPS is like setting up a single, permanent dead-drop just for yourself. The correlation is almost-certain, and the cost of getting a new one is high.
It may be a solution to a very specific problem where pseudonymous access is needed, like using a VPN/VPS to bypass the Tor blacklist of your E-mail account, and ONLY TO ACCESS your E-mail account. But for greater applications which requires anonymity, or very-shortlived pseudonymity, it's generally unsuitable. You don't want to ruin your valuable VPS that you've spent half-an-hour to purchase via Bitcoin, only to bypass the blacklist of a random website.
Some may suggest a pool of VPS servers can be provided, and well, be purchased on-demand via Lightning Network's micropayment (old-school Cypherpunks will love this idea, the idea had been around since the 1990s, and has eventually become feasible today!). But it effectively recreate the Exit Node infrastructure that Tor is using.
> Buy some Bitcoin, and then mix two or three times.
Simply exchange them to Monero. If you want, mix them, but only a single pass is needed. A mixer is a trusted 3rd-party, which introduces serious counterparty risk, and vulnerable to multiple forms to input-output correlation attacks, in the worst case, provides no security.
If you are paranoid, create multiple Monero wallets, and send the funds back and forth, each time with a randint(1, 100) hours delay to frustrate timing analysis. Please note that you should only run full node Monero, and must run it inside Whonix, otherwise, the unencrypted Monero traffic is exposed. The situation of P2P-level encryption of the entire cryptocurrency world is a disaster, almost all traffic is clear.
Ring-CT is possibly not the best cryptographic implementation of transaction anonymity, but currently the best practical implementation available. CoinJoin is a P2P version of mixer, but has no wide deployment, zn-SNARKs involves cutting-edge cryptography and provides 80-bit security (read, not confident), but 90% of Zcash transactions are clear transactions, makes private transactions vulnerable.
Or, once GNU/Taler is available, making an anonymous payment would be as easy as using PayPal.
I think the major mistakes of the early Cypherpunks include the following. If we want to go forward, these problems must be solved.
(a) informal approach to cryptography, the entire applied cryptography from late 1990s to the early 2000s suffered from this problem, we are still working hard to correct them since Post-Snowden. TLSv1.3 is the most recent effort to pay our debt.
We should understand that, even we can create lots of clever things by mixing and meshing different cryptographic primitives, if the cryptosystem is fundamental enough that you need to use them in serious systems, they must be formally designed and analyzed. Linux’s /dev/random works by gathering various sources of entropy and mixing them, sounds extremely secure, right? But it doesn’t have the rigorous security properties as shown by formal analysis.
One may argue the design is practically secure, but for something fundamental like this, formal approach should be used to keep it robust in all possible and impossible circumstances, just like a good symmetric cipher should resist all forms of known cryptanalysis, to ensure a strong fallback security — that even the adversary can ask you to encrypt any data of their choice, the cipher is still unbreakable.
Empiricism works well in many cases, and you can surely design cryptographic protocols and applications in this way, but it should know when it is needed to stop and call a true cryptographer. The Signal Protocol is a good example of well-designed, and formally analyzed protocol, while Telegram is a bad one.
(b) Overemphasize of Technical Possibilities, But Not Usability. The Cypherpunks were fascinated by cryptography’s endless possibilities. As a result, they create systems which there are hundreds of user adjustable parameters and options.
Do you want AES? TwoFish? 3DES? The first one is the U.S. national standard, well-reviewed, fast hardware implementation, but it has a relatively weak key schedule and may have a small risk of related-key attack in 256-bit mode, but related-key is not a real issue in proper encryption, and… the second one is the security guru Schneier’s cipher, years of cryptanalysis didn’t discover any flaws, and the pure software implementation is typically faster than 256-bit AES, but… Do you want SHA-1? RIPEMD-160? SHA-256? SHA-512? SHA-3? BLAKE2e? SHA-1 and RIPEMD-160 is not recommended for new systems, SHA-256 is the best practice, but why don’t you use SHA-512 for additional protections? By the way, SHA-3 is not vulnerable to length-extension attacks as it’s not a Merkle–Damgård construction, and BLAKE2e is the state-of-art by utilizing Daniel J. Bernstein’s ChaCha20 stream cipher…and so on, and so on, and so on…
You can see this in GnuPG, almost every aspect of encryption can be adjusted. Another example is Mixmaster remailer, which has more than 20 parameters to control the behavior of mail forwarding.
These designs are clearly from the desires to fit the personal preferences by different professional Cypherpunks, but has little actual security benefits. Instead, it greatly complicates the entire protocol, and expose a large surface for attackers. On the other hand, WireGuard, an execellent VPN protocol, doesn’t allow the user to change anything. It is hard-coded to only use state-of-art, and proven algorithms, such as ChaCha20 and Curve25519.
Dreaming about the endless use-cases is another related issue, Cypherpunks spent too much time discussing them, such as trustless key management, etc. However, to bring real changes, we must have systems designed for ordinary people. An less-than-ideal encryption protocol that is simple enough for mass adoption, is superior to a completely trustless protocol, but only usable by a handful of Cypherpunk.
Cypherpunk may disregard these protocols for its imperfections by Cypherpunk’s standard, but it’s still essential to develop them as mass adoption is crucial for Cypherpunks to succeed.
(c) Unrealistic Overconfidence in Cryptography
In Tim May’s The Crypto Anarchist Manifesto of 1992, it announced that, there will be the extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering, and as more and more Cypherpunk decided to opt-out from the conventional social order and enters the cypherspace, the State can be therefore eliminated.
The security of any real-life systems is nowhere close to that level in the Manifesto, it could be done in theory doesn’t mean it can be done in practice.
Also, as Cory Doctorow stated, the best encryption, the fastest computers, the most open networks, will not make you comfortable living in an autocratic, corrupt state. You and your radical friends will eventually make a mistake and be rolled up by state thugs, or blacklisted, or blackmailed, or publicly discredited. To evade this all-pervading power, you have to be perfect. To defeat your evasion, the state need merely find a moment’s imperfection in your operational security. Even if your system is perfect, the human-element is the weakest link, the State just need to wait you making a single mistake to be hunt you down, the story of The Silk Road is a good cautionary tale for us.
We should continue the original vision and ideals, but also adopt an reality-based approach, keep quoting Doctorow,
The internet is a tool that can crack open a space in even the most totalitarian of regimes, a place where reformers and revolutionaries can organize, mobilize, and fight back. It’s a forum for whispering dissidence in secret and for blasting the shameful secrets of the powerful at full volume.
The theory of change that goes, “We will walk away from politics and use the internet to evade state oppression” is a dead letter. It always has been. But the theory that goes, “The internet will let us organize to hold the government to account, to topple the corrupt, to rally the honorable and expose the wicked” — that theory has never been more important.
(d) “Cypherpunks Write Code!”
Linus Torvalds like to say “Talk is cheap, show me the code”. The slogan of Cypherpunks in fact came earlier, “Cypherpunks Write Code!”. The meaning is that, good ideas need real implementation, not just talks.
Unfortunately, the discussions of the Cypherpunks were too broad and pretty much ahead of its time, as a result, most ideas were not implemented, and few implementations were only prototypes. Even the best software package, suffers from Problem B.
It is not to say that discussions are unnecessary, but we must build something for mass adoption as well. So perhaps a new slogan, “Cypherpunks Build Apps” can be used, although “app” sounds like a corporate buzzword.
(e) Hostile Discussion Atmosphere
Cypherpunks were radicals, many are radical individualists and anarcho-capitalists, with very strong personally opinions on almost everything and very militant. The Cypherpunk mailing list suffered from endless personal attacks and arguments from day 0. I recommend everyone to read the Cypherpunk Mailing List archives to understand the situations.
If we want to build a public forum, we should take all the possible precautionary measures to prevent it from happening, and cooperate towards a common goal. Having an ideological civil war between democratic socialist, and libertarians only helps the Big Brother.
We should find a way to allow diverse groups of people of different ideologies to cooperate to accomplish things, meanwhile still upholding the same core values.
- Decentralization is consistently expensive (in many different ways) and few people have agreed that they need it
- Extreme technical fragility of anonymity (deanonymization, correlations, uniqueness of items in high-dimensional datasets, stylometry and behavioral uniqueness)
(This is not meant to suggest that the cypherpunks didn't talk or think about these issues, just that they tended to underestimate how big a challenge they would represent.)
I would like further to say, as I said in another comment, Cyphernomicon is one of the most valuable document worth to read, an amazing collecting of farseeing ideas. The widespread of data breach, privacy-invading computer systems and software, tendency of authoritarianism and mass surveillance in the digital world, how Internet will change whistleblowing, and even cryptographic ransomware were predicted.
They got a lot of things correct. But many great ideas are still not implemented. I'm listing a few that I really want to see and use today...
* In Tim May's Cyphernomicon, two concepts are of great significance: anonymity, AND reputation. The most common argument today against anonymity is, "how can you trust these people", but the problem has been answered early: you build a system and community based on reputation. Unfortunately, nowadays, only the first part of the vision, anonymity, is partially implemented, but there is almost no deployed reputation/identity system.
There are some of them, e.g. Web-of-Trust based, blockchain-based, Reddit/Hacker News karma, but I think we still don't have figure out a system that implements May's vision. I really want to see something similar to the Cyberspace in True Names or Ender's Game... Currently the best approximation is just 4chan + Reddit + Second Life + Tor, or perhaps OpenBazaar and BitNation?, which is not very interesting.
And of course, there are reasons. If you attach an identity to anonymity, it downgrades to pseudonymity. Having a long-term pseudonymity is very dangerous, once you have leaked ~30 bit of entropy, your anonymity is basically finished. Another hard problem of reputation is Sybil Attack.
* Dining cryptographers, or DC-net, a revolutionary anonymous network by David Chaum, which eliminates correlation attacks and information-theoretic secure. Cypherpunks saw the Onion Routing of Cypherpunk Remailing can be written in an afternoon of Perl hacking, it shouldn't be hard to perfect the system and move to DC-net within the next 5 years.
But the hard problems of DC-net has been overlooked, one non-cooperative participant can DoS the entire network. The solution is the construction of a BLAME protocol for kicking out malicious nodes out. I think we just managed to solve most of the problem with a functional prototype, DISSENT, in 2015 (20 years later!!). Until a practical network has been engineered, DC-net is still like One-Time Pad, good on paper but not useful in practice.
Do you have related writings or presentations on your hands? If so, could you please publish them online? I'd love to see some details of your critique, especially, what is the problem of Vanguardism?
Cypherpunk Movement, leaded by Tim May is an established ideology and movement since the late 80s. At the time, they were the most prominent supporters of individual privacy and digital liberty. It was them, who helped to build the EFF DES cracker to expose the lies of FBI about DES’s security, and forced the U.S government moving to the 128-bit encryption standard. It was them, who successfully stopped the NSA’s plan to install mandatory encryption backdoor on the telephone system. And it was also them, who fought against the regulation of cryptography through various means, and effectively ended it.
They were also the earliest researchers on practical technology to defend privacy. The very idea of an anonymous communication system was purposed by David Chaum in 1981, and implemented as Type I Cypherpunk Anonymous Remailer. By purely coincidence, the syntax used in the control messages allows the user to chain multiple remailers, and hence the concept of Onion Routing was discovered. Cypherpunks also recognized the importance of cash — an anonymous payment system in the past 3000 years, urgently needed a electronic version to stop the enablement of a surveillance state in the digital age. The original vision was also purposed by David Chaum, but it faced various difficulties, especially the problem of consensus and double-spending (Chaum's own centralized payment processor was good, but did not succeed commercially, but check GNU/Taler!), so it was under constant discussion throughout the entire 90s, until Satoshi Nakomoto, presumably a Cypherpunk, purposed a workable, but perhaps less-favorable solution 10 years later. The inventor of computer firewall, Steven Bellovin, and the first developer of a commercial firewall, Marcus Ranum, were also cypherpunks. The entire concept of deniable cryptography was also invented by the cypherpunks, specifically, first implemented in a Linux Full-Disk Encryption program by Julian Assange.
Cypherpunks, were also the root of many, if not all, security and cryptography tools and projects used by everyone today. You name it, it’s probably has a cypherpunk personally involved, or derived from a cypherpunk prototypes, or at least some some degrees of involvements. SSH, PGP/OpenPGP/GnuPG, Tor, OTR, OpenSSL/SSL, GNU Radio, Warrant Canary, TrueCrypt, HashCash, WikiLeaks, Linux’s /dev/random, just to name a few. Yeah, these are not just independent project, but they were created by the large Cypherpunk movement.
Yes, the original mailing list was a victim of its own success — it disintegrated in 2000 because the entire fields of privacy, cryptography the movement kickstarted, turned to be too diverse to be contained in a single mailing list.
>“The main reason the list doesn’t seem to have the center of gravity anymore is the topic has gotten so big and gone in so many directions,” Wayner says. “It used to be you could read maybe (the newsgroup) comp.risks and Cypherpunks and you had read all there was. Now there are so many things going on it can’t be the center of gravity, it can’t be the center of all things.”
You don't have to agree Tim May's Anarcho-Capitalist position or everything he has said, but I think we can all agree that the victory of the First Crypto War is our timeless legacy and his largest contributions (as a leader) to the Internet.
After reading the Manifesto, everyone should read Tim May’s Cyphernomicon, the most important document - the only comprehensive and the only documentation of the entire Cypherpunk movement.
Yes, it’s ten thousand lines of plaintext in a list format, and obviously not easy to read. It may be difficult to start, but it is surely an amazing collecting of ideas. You should download it to your disk, open your favorite text editor, and choose a nice color scheme, to read the entire document, line-by-line, as if you are reading some source code. In my opinion, this is the most comfortable way to read. You may need two weeks to a month to finish the reading, use the bookmark feature of your text editor to mark your progress. Another useful note is that, Tim May’s documentation is heavily leaning towards Anarcho-Capitalism, but as he said, the house of Cypherpunk has many room.