From Lousy Finch, 11 Years ago, written in Plain Text.
Embed
  1. Newsgroups: alt.cyberpunk
  2. From: whitaker@eternity.demon.co.uk (Russell Earl Whitaker)
  3. Subject: Cryptosystems are our defensive weapons!
  4. Organization: Extropy Institute
  5. Reply-To: whitaker@eternity.demon.co.uk
  6. Date: Wed, 28 Oct 1992 13:17:28 +0000
  7.  
  8.   FROM CROSSBOWS TO CRYPTOGRAPHY:  THWARTING THE STATE VIA
  9.                      TECHNOLOGY
  10.  
  11.   Given at the Future of Freedom Conference, November 1987
  12.  
  13.  
  14.      You   know,   technology--and   particularly   computer
  15. technology--has often gotten a bad rap in  Libertarian  cir-
  16. cles.  We tend to think of Orwell's 1984, or Terry Gilliam's
  17. Brazil,  or  the  proximity  detectors keeping East Berlin's
  18. slave/citizens on their own side of the border, or  the  so-
  19. phisticated  bugging  devices  Nixon used to harass those on
  20. his "enemies list."  Or, we recognize that for the price  of
  21. a  ticket  on  the Concorde we can fly at twice the speed of
  22. sound, but only if we first walk thru a magnetometer run  by
  23. a  government  policeman, and permit him to paw thru our be-
  24. longings if it beeps.
  25.  
  26.      But I think that mind-set is a mistake.   Before  there
  27. were cattle prods, governments tortured their prisoners with
  28. clubs  and  rubber  hoses.    Before  there  were lasers for
  29. eavesdropping, governments used binoculars and  lip-readers.
  30. Though  government certainly uses technology to oppress, the
  31. evil lies not in the tools but in the wielder of the tools.
  32.  
  33.      In fact, technology represents one of the most  promis-
  34. ing  avenues  available  for  re-capturing our freedoms from
  35. those who have stolen them.  By its very nature,  it  favors
  36. the  bright  (who can put it to use) over the dull (who can-
  37. not).  It favors the adaptable (who are  quick  to  see  the
  38. merit  of  the  new  (over  the sluggish (who cling to time-
  39. tested ways).  And what two better words are  there  to  de-
  40. scribe government bureaucracy than "dull" and "sluggish"?
  41.  
  42.      One  of  the  clearest,  classic triumphs of technology
  43. over tyranny I see is  the  invention  of  the  man-portable
  44. crossbow.   With it, an untrained peasant could now reliably
  45. and lethally engage a target out to  fifty  meters--even  if
  46. that  target  were  a mounted, chain-mailed knight.  (Unlike
  47. the longbow, which, admittedly was more powerful, and  could
  48. get  off  more shots per unit time, the crossbow required no
  49. formal training to utilize.   Whereas the  longbow  required
  50. elaborate  visual,  tactile  and kinesthetic coordination to
  51. achieve any degree of accuracy, the wielder  of  a  crossbow
  52. could simply put the weapon to his shoulder, sight along the
  53. arrow  itself, and be reasonably assured of hitting his tar-
  54. get.)
  55.  
  56.      Moreover, since just about  the  only  mounted  knights
  57. likely  to  visit  your  average peasant would be government
  58. soldiers and tax collectors, the utility of the  device  was
  59. plain:    With it, the common rabble could defend themselves
  60. not only against one another, but against their governmental
  61. masters.   It was the  medieval  equivalent  of  the  armor-
  62. piercing  bullet,  and, consequently, kings and priests (the
  63. medieval equivalent of a  Bureau  of  Alcohol,  Tobacco  and
  64. Crossbows)  threatened  death  and  excommunication, respec-
  65. tively, for its unlawful possession.
  66.  
  67.      Looking at later developments, we  see  how  technology
  68. like  the  firearm--particularly the repeating rifle and the
  69. handgun, later followed by the Gatling gun and more advanced
  70. machine guns--radically altered the balance of interpersonal
  71. and inter-group power.  Not without reason was the Colt  .45
  72. called "the equalizer."  A frail dance-hall hostess with one
  73. in  her  possession  was  now  fully able to protect herself
  74. against the brawniest roughneck in any saloon.    Advertise-
  75. ments  for  the period also reflect the merchandising of the
  76. repeating cartridge  rifle  by  declaring  that  "a  man  on
  77. horseback,  armed with one of these rifles, simply cannot be
  78. captured."  And, as long as his captors  were  relying  upon
  79. flintlocks  or  single-shot rifles, the quote is doubtless a
  80. true one.
  81.  
  82.      Updating now to  the  present,  the  public-key  cipher
  83. (with  a  personal  computer to run it) represents an equiv-
  84. alent quantum leap--in a defensive weapon.    Not  only  can
  85. such  a technique be used to protect sensitive data in one's
  86. own possession, but it can also permit two strangers to  ex-
  87. change   information   over   an   insecure   communications
  88. channel--a  wiretapped   phone   line,   for   example,   or
  89. skywriting, for that matter)--without ever having previously
  90. met  to  exchange cipher keys.   With a thousand-dollar com-
  91. puter, you can create a cipher that  a  multi-megabuck  CRAY
  92. X-MP  can't  crack in a year.  Within a few years, it should
  93. be economically feasible to similarly encrypt voice communi-
  94. cations; soon after that, full-color digitized video images.
  95. Technology will not only have made wiretapping obsolete,  it
  96. will  have  totally demolished government's control over in-
  97. formation transfer.
  98.  
  99.      I'd like to take just a moment to sketch the  mathemat-
  100. ics  which makes this principle possible.  This algorithm is
  101. called the RSA algorithm, after Rivest, Shamir, and  Adleman
  102. who  jointly created it.  Its security derives from the fact
  103. that, if a very large number is  the  product  of  two  very
  104. large  primes,  then it is extremely difficult to obtain the
  105. two prime factors from analysis  of  their  product.    "Ex-
  106. tremely"  in  the  sense that if primes  p  and  q  have 100
  107. digits apiece, then their 200-digit product cannot  in  gen-
  108. eral be factored in less than 100 years by the most powerful
  109. computer now in existence.
  110.  
  111.      The  "public" part of the key consists of (1) the prod-
  112. uct  pq  of the two large primes p and q, and (2)  one  fac-
  113. tor,  call it  x  , of the product  xy  where  xy = {(p-1) *
  114. (q-1) + 1}.  The "private" part of the key consists  of  the
  115. other factor  y.
  116.  
  117.      Each  block of the text to be encrypted is first turned
  118. into an integer--either by using ASCII,  or  even  a  simple
  119. A=01,  B=02,  C=03, ... , Z=26 representation.  This integer
  120. is then raised to the power  x (modulo pq) and the resulting
  121. integer is then sent as the encrypted message.  The receiver
  122. decrypts by taking this integer to the  (secret)  power    y
  123. (modulo  pq).  It can be shown that this process will always
  124. yield the original number started with.
  125.  
  126.      What makes this a groundbreaking development,  and  why
  127. it  is  called  "public-key"  cryptography,"  is  that I can
  128. openly publish the product  pq and the number   x   ,  while
  129. keeping  secret  the number  y  --so that anyone can send me
  130. an encrypted message, namely
  131.                        x
  132.                      a    (mod pq)  ,
  133. but only I can recover the original message  a  , by  taking
  134. what  they  send, raising it to the power  y  and taking the
  135. result (mod pq).  The risky step (meeting to exchange cipher
  136. keys) has been eliminated.  So people who may not even trust
  137. each other enough to want to meet, may  still  reliably  ex-
  138. change  encrypted  messages--each  party having selected and
  139. disseminated his own  pq  and his  x  ,   while  maintaining
  140. the secrecy of his own  y.
  141.  
  142.      Another benefit of this scheme is the notion of a "dig-
  143. ital signature," to enable one to authenticate the source of
  144. a given message.  Normally, if I want to send you a message,
  145. I raise my plaintext  a  to your x and take the result  (mod
  146. your pq)  and send that.
  147.  
  148.     However,  if in my message, I take the plaintext  a and
  149. raise it to my (secret) power  y  , take the result  (mod my
  150. pq), then raise that result to your x   (mod  your  pq)  and
  151. send this, then even after you have normally "decrypted" the
  152. message,  it  will still look like garbage.  However, if you
  153. then raise it to my public power x   , and take  the  result
  154. (mod  my public pq  ), so you will not only recover the ori-
  155. ginal plaintext message, but you will know that no one but I
  156. could have sent it to you (since no one else knows my secret
  157. y).
  158.  
  159.      And these are the very concerns by the way that are to-
  160. day tormenting the Soviet Union about the whole question  of
  161. personal  computers.    On the one hand, they recognize that
  162. American schoolchildren are right now growing up  with  com-
  163. puters  as commonplace as sliderules used to be--more so, in
  164. fact, because there are things computers can do  which  will
  165. interest  (and instruct) 3- and 4-year-olds.  And it is pre-
  166. cisely these students who one generation hence will be going
  167. head-to-head against their Soviet  counterparts.    For  the
  168. Soviets  to  hold  back might be a suicidal as continuing to
  169. teach swordsmanship  while  your  adversaries  are  learning
  170. ballistics.    On  the  other hand, whatever else a personal
  171. computer may be, it is also an exquisitely efficient copying
  172. machine--a floppy disk will hold upwards of 50,000 words  of
  173. text,  and  can  be  copied in a couple of minutes.  If this
  174. weren't threatening enough, the computer that  performs  the
  175. copy  can also encrypt the data in a fashion that is all but
  176. unbreakable.  Remember that in Soviet society  publicly  ac-
  177. cessible  Xerox  machines are unknown.   (The relatively few
  178. copying machines in existence  are  controlled  more  inten-
  179. sively than machine guns are in the United States.)
  180.  
  181.      Now  the  "conservative" position is that we should not
  182. sell these computers to the Soviets, because they could  use
  183. them  in weapons systems.  The "liberal" position is that we
  184. should sell them, in  the  interests  of  mutual  trade  and
  185. cooperation--and  anyway,  if  we don't make the sale, there
  186. will certainly be some other nation willing to.
  187.  
  188.      For my part, I'm ready to suggest that the  Libertarian
  189. position should be to give them to the Soviets for free, and
  190. if  necessary, make them take them . . . and if that doesn't
  191. work load up an SR-71  Blackbird  and  air  drop  them  over
  192. Moscow in the middle of the night.  Paid for by private sub-
  193. scription, of course, not taxation . . . I confess that this
  194. is not a position that has gained much support among members
  195. of  the conventional left-right political spectrum, but, af-
  196. ter all, in the words of one of Illuminatus's characters, we
  197. are political non-Euclideans:   The shortest distance  to  a
  198. particular  goal may not look anything like what most people
  199. would consider a "straight line."    Taking  a  long  enough
  200. world-view,  it is arguable that breaking the Soviet govern-
  201. ment monopoly on information transfer could better  lead  to
  202. the enfeeblement and, indeed, to the ultimate dissolution of
  203. the Soviet empire than would the production of another dozen
  204. missiles aimed at Moscow.
  205.  
  206.      But  there's  the rub:  A "long enough" world view does
  207. suggest that the evil, the oppressive, the coercive and  the
  208. simply  stupid  will "get what they deserve," but what's not
  209. immediately clear is how the rest of  us  can  escape  being
  210. killed, enslaved, or pauperized in the process.
  211.  
  212.     When  the  liberals and other collectivists began to at-
  213. tack freedom, they possessed a reasonably  stable,  healthy,
  214. functioning economy, and almost unlimited time to proceed to
  215. hamstring   and   dismantle  it.    A  policy  of  political
  216. gradualism was at least  conceivable.    But  now,  we  have
  217. patchwork  crazy-quilt  economy held together by baling wire
  218. and spit.  The state not only taxes us to  "feed  the  poor"
  219. while also inducing farmers to slaughter milk cows and drive
  220. up food prices--it then simultaneously turns around and sub-
  221. sidizes research into agricultural chemicals designed to in-
  222. crease  yields of milk from the cows left alive.  Or witness
  223. the fact that a decline in the price of oil is considered as
  224. potentially frightening as a comparable increase a few years
  225. ago.  When the price went up,  we  were  told,  the  economy
  226. risked  collapse for for want of energy.  The price increase
  227. was called the "moral equivalent of war" and the Feds  swung
  228. into  action.    For the first time in American history, the
  229. speed at which you drive your car to work in the morning be-
  230. came an issue of Federal concern.   Now, when the  price  of
  231. oil  drops, again we risk problems, this time because Ameri-
  232. can oil companies and Third World  basket-case  nations  who
  233. sell  oil  may  not  be  able to ever pay their debts to our
  234. grossly over-extended banks.  The suggested panacea is  that
  235. government  should now re-raise the oil prices that OPEC has
  236. lowered, via a new oil tax.  Since the government is seeking
  237. to raise oil prices to about the same extent  as  OPEC  did,
  238. what  can we call this except the "moral equivalent of civil
  239. war--the government against its own people?"
  240.  
  241.      And, classically, in international trade, can you imag-
  242. ine any entity in the world except  a  government  going  to
  243. court  claiming  that  a  vendor  was  selling  it goods too
  244. cheaply and demanding not only that that naughty  vendor  be
  245. compelled by the court to raise its prices, but also that it
  246. be punished for the act of lowering them in the first place?
  247.  
  248.      So  while the statists could afford to take a couple of
  249. hundred years to trash our  economy  and  our  liberties--we
  250. certainly  cannot  count  on  having an equivalent period of
  251. stability in which to reclaim them.   I contend  that  there
  252. exists  almost  a  "black  hole"  effect in the evolution of
  253. nation-states just as in the evolution of stars.  Once free-
  254. dom contracts beyond a certain  minimum  extent,  the  state
  255. warps  the fabric of the political continuum about itself to
  256. the degree that subsequent re-emergence of  freedom  becomes
  257. all but impossible.  A good illustration of this can be seen
  258. in the area of so-called "welfare" payments.  When those who
  259. sup  at the public trough outnumber (and thus outvote) those
  260. whose taxes must replenish the trough,  then  what  possible
  261. choice has a democracy but to perpetuate and expand the tak-
  262. ing  from  the few for the unearned benefit of the many?  Go
  263. down to the nearest "welfare" office, find just  two  people
  264. on  the dole . . . and recognize that between them they form
  265. a voting bloc that can forever outvote you on  the  question
  266. of who owns your life--and the fruits of your life's labor.
  267.  
  268.      So essentially those who love liberty need an "edge" of
  269. some  sort  if  we're ultimately going to prevail.  We obvi-
  270. ously  can't  use  the  altruists'  "other-directedness"  of
  271. "work,  slave, suffer, sacrifice, so that next generation of
  272. a billion random strangers can  live  in  a  better  world."
  273. Recognize  that, however immoral such an appeal might be, it
  274. is nonetheless an extremely powerful one in today's culture.
  275. If you can convince  people  to  work  energetically  for  a
  276. "cause," caring only enough for their personal welfare so as
  277. to  remain  alive  enough  and  healthy  enough  to continue
  278. working--then you have a truly massive reservoir  of  energy
  279. to draw from.  Equally clearly, this is just the sort of ap-
  280. peal which tautologically cannot be utilized for egoistic or
  281. libertarian goals.  If I were to stand up before you tonight
  282. and say something like, "Listen, follow me as I enunciate my
  283. noble "cause," contribute your money to support the "cause,"
  284. give  up  your  free  time  to  work for the "cause," strive
  285. selflessly to bring it about, and then (after you  and  your
  286. children are dead) maybe your children's children will actu-
  287. ally  live under egoism"--you'd all think I'd gone mad.  And
  288. of course you'd be right.  Because the point I'm  trying  to
  289. make is that libertarianism and/or egoism will be spread if,
  290. when, and as, individual libertarians and/or egoists find it
  291. profitable and/or enjoyable to do so.    And  probably  only
  292. then.
  293.  
  294.      While I certainly do not disparage the concept of poli-
  295. tical  action, I don't believe that it is the only, nor even
  296. necessarily the most cost-effective path  toward  increasing
  297. freedom  in  our time.  Consider that, for a fraction of the
  298. investment in time, money and effort I might expend in  try-
  299. ing  to  convince  the  state to abolish wiretapping and all
  300. forms of censorship--I can teach every libertarian who's in-
  301. terested  how  to   use   cryptography   to   abolish   them
  302. unilaterally.
  303.  
  304.      There  is  a  maxim--a proverb--generally attributed to
  305. the Eskimoes, which very likely most Libertarians  have  al-
  306. ready  heard.    And while you likely would not quarrel with
  307. the saying, you might well feel that you've heard  it  often
  308. enough already, and that it has nothing further to teach us,
  309. and moreover, that maybe you're even tired of hearing it.  I
  310. shall therefore repeat it now:
  311.  
  312.      If you give a man a fish, the saying runs, you feed him
  313. for a day.  But if you teach a man how to fish, you feed him
  314. for a lifetime.
  315.  
  316.      Your exposure to the quote was probably in some sort of
  317. a  "workfare"  vs.  "welfare"  context;  namely, that if you
  318. genuinely wish to help someone in need, you should teach him
  319. how to earn his sustenance, not simply how to  beg  for  it.
  320. And of course this is true, if only because the next time he
  321. is hungry, there might not be anybody around willing or even
  322. able to give him a fish, whereas with the information on how
  323. to fish, he is completely self sufficient.
  324.  
  325.      But  I  submit  that this exhausts only the first order
  326. content of the quote, and if there were nothing  further  to
  327. glean  from  it,  I would have wasted your time by citing it
  328. again.  After all, it seems to have almost a crypto-altruist
  329. slant, as though to imply that we should structure  our  ac-
  330. tivities  so  as  to  maximize  the  benefits to such hungry
  331. beggars as we may encounter.
  332.  
  333.      But consider:
  334.  
  335.      Suppose this Eskimo doesn't know how to  fish,  but  he
  336. does  know  how  to hunt walruses.   You, on the other hand,
  337. have often gone hungry while traveling thru  walrus  country
  338. because  you  had  no idea how to catch the damn things, and
  339. they ate most of the fish you could catch.  And now  suppose
  340. the  two  of  you  decide to exchange information, bartering
  341. fishing knowledge for hunting knowledge.   Well,  the  first
  342. thing  to  observe  is  that  a  transaction  of  this  type
  343. categorically and unambiguously refutes the Marxist  premise
  344. that  every  trade  must  have a "winner" and a "loser;" the
  345. idea that if one person gains, it must necessarily be at the
  346. "expense" of another person who loses.  Clearly, under  this
  347. scenario, such is not the case.  Each party has gained some-
  348. thing  he  did  not have before, and neither has been dimin-
  349. ished in any way.  When it comes to exchange of  information
  350. (rather  than material objects) life is no longer a zero-sum
  351. game.  This is an extremely powerful notion.   The  "law  of
  352. diminishing   returns,"   the  "first  and  second  laws  of
  353. thermodynamics"--all those "laws" which constrain our possi-
  354. bilities in other contexts--no longer bind us!   Now  that's
  355. anarchy!
  356.  
  357.      Or  consider  another possibility:  Suppose this hungry
  358. Eskimo never learned  to  fish  because  the  ruler  of  his
  359. nation-state    had  decreed fishing illegal.   Because fish
  360. contain dangerous tiny bones, and sometimes sharp spines, he
  361. tells us, the state has decreed that their  consumption--and
  362. even  their  possession--are  too  hazardous to the people's
  363. health to be permitted . . . even by knowledgeable,  willing
  364. adults.   Perhaps it is because citizens' bodies are thought
  365. to be government property, and therefore it is the  function
  366. of the state to punish those who improperly care for govern-
  367. ment  property.    Or perhaps it is because the state gener-
  368. ously extends to competent adults the "benefits" it provides
  369. to children and to the mentally ill:  namely,  a  full-time,
  370. all-pervasive supervisory conservatorship--so that they need
  371. not  trouble  themselves  with making choices about behavior
  372. thought physically risky or morally "naughty."  But, in  any
  373. case,  you  stare stupefied, while your Eskimo informant re-
  374. lates how this law is taken so seriously that  a  friend  of
  375. his was recently imprisoned for years for the crime of "pos-
  376. session of nine ounces of trout with intent to distribute."
  377.  
  378.      Now  you  may  conclude  that  a society so grotesquely
  379. oppressive as to enforce a law of this  type  is  simply  an
  380. affront to the dignity of all human beings.  You may go far-
  381. ther  and  decide to commit some portion of your discretion-
  382. ary, recreational time specifically to the task of thwarting
  383. this tyrant's goal.  (Your rationale may be "altruistic"  in
  384. the   sense   of  wanting  to  liberate  the  oppressed,  or
  385. "egoistic" in the sense of  proving  you  can  outsmart  the
  386. oppressor--or  very likely some combination of these or per-
  387. haps even other motives.)
  388.  
  389.      But, since you have zero desire to become a  martyr  to
  390. your "cause," you're not about to mount a military campaign,
  391. or  even try to run a boatload of fish through the blockade.
  392. However, it is here that technology--and in  particular  in-
  393. formation technology--can multiply your efficacy literally a
  394. hundredfold.    I say "literally," because for a fraction of
  395. the effort (and virtually none of  the  risk)  attendant  to
  396. smuggling in a hundred fish, you can quite readily produce a
  397. hundred  Xerox copies of fishing instructions.  (If the tar-
  398. geted government, like present-day America, at least permits
  399. open  discussion  of  topics  whose  implementation  is  re-
  400. stricted,  then that should suffice.  But, if the government
  401. attempts to suppress the flow of information as  well,  then
  402. you will have to take a little more effort and perhaps write
  403. your  fishing manual on a floppy disk encrypted according to
  404. your mythical Eskimo's public-key parameters.  But as far as
  405. increasing real-world access to fish you have  made  genuine
  406. nonzero  headway--which  may  continue to snowball as others
  407. re-disseminate the information you have provided.   And  you
  408. have not had to waste any of your time trying to convert id-
  409. eological  adversaries, or even trying to win over the unde-
  410. cided.  Recall Harry Browne's dictum  from  "Freedom  in  an
  411. Unfree World" that the success of any endeavor is in general
  412. inversely proportional to the number of people whose persua-
  413. sion is necessary to its fulfilment.
  414.  
  415.      If  you  look  at  history, you cannot deny that it has
  416. been dramatically shaped by men with names like  Washington,
  417. Lincoln,  .  .  .  Nixon  .  . . Marcos . . . Duvalier . . .
  418. Khadaffi . . .  and their ilk.  But it has also been  shaped
  419. by  people with names like Edison, Curie, Marconi, Tesla and
  420. Wozniak.  And this latter shaping has been at least as  per-
  421. vasive, and not nearly so bloody.
  422.  
  423.      And  that's  where  I'm  trying  to  take The LiberTech
  424. Project.  Rather than beseeching the state to please not en-
  425. slave, plunder or constrain us, I propose a libertarian net-
  426. work spreading  the  technologies  by  which  we  may  seize
  427. freedom for ourselves.
  428.  
  429.      But here we must be a bit careful.  While it is not (at
  430. present)  illegal  to  encrypt  information  when government
  431. wants to spy on you, there is no guarantee of what  the  fu-
  432. ture  may hold.  There have been bills introduced, for exam-
  433. ple, which would have made it a crime  to  wear  body  armor
  434. when government wants to shoot you.  That is, if you were to
  435. commit certain crimes while wearing a Kevlar vest, then that
  436. fact  would  constitute a separate federal crime of its own.
  437. This law to my knowledge has not passed . . . yet . . .  but
  438. it does indicate how government thinks.
  439.  
  440.      Other  technological  applications,  however, do indeed
  441. pose legal risks.  We recognize, for  example,  that  anyone
  442. who  helped a pre-Civil War slave escape on the "underground
  443. railroad" was making a clearly illegal use of technology--as
  444. the sovereign government of the United States of America  at
  445. that time found the buying and selling of human beings quite
  446. as  acceptable  as  the buying and selling of cattle.  Simi-
  447. larly, during Prohibition, anyone who used  his  bathtub  to
  448. ferment  yeast and sugar into the illegal psychoactive drug,
  449. alcohol--the controlled substance, wine--was using  technol-
  450. ogy  in a way that could get him shot dead by federal agents
  451. for his "crime"--unfortunately not to be  restored  to  life
  452. when  Congress  reversed itself and re-permitted use of this
  453. drug.
  454.  
  455.      So . . . to quote a former President,  un-indicted  co-
  456. conspirator  and pardoned felon . . . "Let me make one thing
  457. perfectly clear:"  The LiberTech Project does not  advocate,
  458. participate  in, or conspire in the violation of any law--no
  459. matter how oppressive,  unconstitutional  or  simply  stupid
  460. such  law may be.  It does engage in description (for educa-
  461. tional and informational  purposes  only)  of  technological
  462. processes,  and some of these processes (like flying a plane
  463. or manufacturing a firearm) may well require appropriate li-
  464. censing to perform legally.    Fortunately,  no  license  is
  465. needed  for  the  distribution or receipt of information it-
  466. self.
  467.  
  468.      So, the next time you look at the political  scene  and
  469. despair,  thinking,  "Well,  if 51% of the nation and 51% of
  470. this State, and 51% of this city have  to  turn  Libertarian
  471. before  I'll  be  free,  then  somebody might as well cut my
  472. goddamn throat now, and put me out of my  misery"--recognize
  473. that  such  is not the case.  There exist ways to make your-
  474. self free.
  475.  
  476.      If you wish to explore such techniques via the Project,
  477. you are welcome to give me your name and address--or a  fake
  478. name  and  mail  drop, for that matter--and you'll go on the
  479. mailing list for my erratically-published newsletter.    Any
  480. friends  or acquaintances whom you think would be interested
  481. are welcome as well.  I'm not even asking for stamped  self-
  482. addressed envelopes, since my printer can handle mailing la-
  483. bels and actual postage costs are down in the noise compared
  484. with  the  other  efforts  in getting an issue out.   If you
  485. should have an idea to share, or even a  useful  product  to
  486. plug,  I'll be glad to have you write it up for publication.
  487. Even if you want to be the proverbial "free rider" and  just
  488. benefit  from  what others contribute--you're still welcome:
  489. Everything will be public domain; feel free to  copy  it  or
  490. give it away (or sell it, for that matter, 'cause if you can
  491. get  money  for  it while I'm taking full-page ads trying to
  492. give it away, you're certainly entitled to  your  capitalist
  493. profit . . .)  Anyway, every application of these principles
  494. should make the world just a little freer, and I'm certainly
  495. willing to underwrite that, at least for the forseeable  fu-
  496. ture.
  497.  
  498.      I  will leave you with one final thought:  If you don't
  499. learn how to beat your plowshares into  swords  before  they
  500. outlaw  swords,  then you sure as HELL ought to learn before
  501. they outlaw plowshares too.
  502.  
  503.                                        --Chuck Hammill
  504.  
  505.                                  THE LIBERTECH PROJECT
  506.                                  3194 Queensbury Drive
  507.                                Los Angeles, California
  508.                                                  90064
  509.                                           310-836-4157
  510.  
  511. [The above LiberTech address was updated June 1992, with the
  512.  permission of Chuck Hammill, by Russell Whitaker]
  513.  
  514. Please address all enquiries to the LiberTech Project address,
  515. above, or call the telephone number.  Chuck Hammill does not yet
  516. have an email address; this will change in the near future, however.
  517.  
  518. Those interested in the issues raised in this piece should participate
  519. in at least these newsgroups:
  520.  
  521.                 alt.privacy
  522.                 alt.security.pgp
  523.                 sci.crypt (*especially this one*)
  524.  
  525. A copy of the RSA-based public key encryption program, PGP 2.0 (Pretty
  526. Good Privacy), can be obtained at various ftp sites around the world.
  527. One such site is gate.demon.co.uk, where an MS-DOS version can be had by
  528. anonymous ftp as pgp20.zip in /pub/ibmpc/pgp.
  529.  
  530. There are, of course, other implementations of PGP 2.0 available; use
  531. your nearest archie server to find them.  All source code for PGP is
  532. available, as well.
  533.  
  534. If you've enjoyed this message, please distribute it freely!  Drop in on
  535. sci.crypt and discover that we're living in what the Chinese call
  536. "interesting times"...
  537.  
  538. Russell Earl Whitaker                   whitaker@eternity.demon.co.uk
  539. Communications Editor                       71750.2413@compuserve.com
  540. EXTROPY: The Journal of Transhumanist Thought         AMiX: RWHITAKER
  541. Board member, Extropy Institute (ExI)
  542. -----BEGIN PGP PUBLIC KEY BLOCK-----
  543. Version: 2.0
  544.  
  545. mQCNAiqwg10AAAEEAMVNMI766ljeuW01xqXKYYV5lmDPvb+6dCQK3m1iBQdan0no
  546. pm35j1DIRp3UJZogAe5eimsQg1TALDhTq310OZs9+L6B/HxeX3+4BadIDad4g+xI
  547. lvaFY1Ut/hMdZNkw0tzNZOdUPiO4jYIyirReAUiMCm6jXzkTRITj7/vxxWtPAAUR
  548. tDNSdXNzZWxsIEUuIFdoaXRha2VyIDx3aGl0YWtlckBldGVybml0eS5kZW1vbi5j
  549. by51az4=
  550. =LOCL
  551. -----END PGP PUBLIC KEY BLOCK-----