From Lumeniki
Jump to: navigation, search

Cryptocourts can gain their power and autonomy through the innovative use of cryptography and other privacy/security techniques.

Local secrets[edit]

In its most basic form, cryptography is used to establish ownership (signatures), hide secrets (encryption, stenography), transfer ownership and secrets (public key cryptography), and establish integrity (hashes/proof-of-work). This technology isn't currently "trust free" (unless you know how to build a Bitcoin tablet/wallet from minerals) nor is it exactly user friendly (wtf, can I even rely on Qubes "system defaults" for gpg? not even analog inputs are good enough for entropy (or is this for hardware wallets?) but it seems to probably be working fine most of the time (so long as you wave the queen's hand while passing these old FUDy duddies on the int3rnETs).


What seems much more difficult is to achieve a satisfactory level of anonymity/pseudonymity (online). But insofar as existing mix networks (Tor, Zcoin, Whisper, etc) are able to hide identities (from some nosy mofos), users can not be singled out to be individually threatened (using "legal" or "technical" measures). And it must be politically incorrect or too expensive (same ting) for governments or hackers to shutdown or weaken the privacy features of the entire network, or they have/would do/done so.


Put em together and you can decentralize the int3rnETs (starting with (domain) name registration), the glowball financial system, and world governance.