██████╗██╗ ██╗██████╗ ██╗ ██╗███████╗██████╗ ██████╗ ██╗ ██╗███╗ ██╗██╗ ██╗███████╗ ██╔════╝╚██╗ ██╔╝██╔══██╗██║ ██║██╔════╝██╔══██╗██╔══██╗██║ ██║████╗ ██║██║ ██╔╝██╔════╝ ██║ ╚████╔╝ ██████╔╝███████║█████╗ ██████╔╝██████╔╝██║ ██║██╔██╗ ██║█████╔╝ ███████╗ ██║ ╚██╔╝ ██╔═══╝ ██╔══██║██╔══╝ ██╔══██╗██╔═══╝ ██║ ██║██║╚██╗██║██╔═██╗ ╚════██║ ╚██████╗ ██║ ██║ ██║ ██║███████╗██║ ██║██║ ╚██████╔╝██║ ╚████║██║ ██╗███████║ ╚═════╝ ╚═╝ ╚═╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚═╝ ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═╝╚══════╝
The Heroes who brought you Internet Privacy
man cypherpunks
These are the heroes that built the tools to protect us all. They showed that cryptography is a quiet declaration of freedom.
The tools we rely on today came from those who refused to accept that freedom and privacy were negotiable. They built the infrastructure of independence, and in doing so, gave us a free world.
Cryptography is a declaration.
The people in these halls built systems that defied states. They wrote code when cryptography was treated as contraband. They stood for individual rights long before most understood that a battle was underway.
They are the quiet heroes we never deserved.
We remember them, and we thank them, for the freedoms their code made possible, and for the ones it allows us to defend.
"Cypherpunks write code. We know that someone has to write software to defend privacy, and we're going to write it." - Eric Hughes
The fathers of freedom understood they were in a world ruled by law but governed by control. They knew that without privacy, freedom was theater. So they built tools no one else understood, that would become the arsenal of the free.
Timothy C. May
Visionary who authored the foundational The Crypto Anarchist Manifesto, Timothy C. May articulated the principles of crypto-anarchy, predicting how public-key cryptography and strong encryption would empower individuals to resist surveillance and censorship. As a co-founder of the Cypherpunks mailing list, he catalyzed the movement that inspired innovations like digital cash, anonymous networks, and privacy-enhancing technologies. His vision of a decentralized, cryptographically protected society, outlined in works like Libertaria in Cyberspace, profoundly influenced the development of cryptocurrencies and the global privacy movement
Eric Hughes
Author of the seminal A Cypherpunk's Manifesto (1993), he articulated the foundational philosophy that privacy is a social duty and that "cypherpunks write code" to defend individual freedoms. As a co-founder and moderator of the original Cypherpunks mailing list, he fostered a global community that transformed cryptographic theory into practical tools for privacy, anonymity, and digital resistance. His advocacy and leadership catalyzed the development of technologies like PGP and inspired generations of privacy activists, making him a central architect of the cypherpunk ethos
John Gilmore
Visionary co-founder of the Electronic Frontier Foundation (EFF), he championed digital privacy and fought government surveillance through landmark activism and litigation. Instrumental in launching the Cypherpunks mailing list, he fostered a global community dedicated to advancing cryptography and resisting censorship. Gilmore was a key supporter of the GNU Project, free software, and open encryption, and his iconic phrase, "The Net interprets censorship as damage and routes around it", encapsulates the cypherpunk ethos of resilience and decentralization. His advocacy for strong cryptography and opposition to export controls helped shape the legal and technical landscape for privacy tools
Co-founder of the Cypherpunks mailing list, he catalyzed the global exchange of ideas on privacy, digital cash, and anonymous communication, directly influencing the development of remailers and practical cryptographic tools. An early advocate for strong encryption, he bridged theoretical cryptography and real-world implementation, providing technical infrastructure and thought leadership that helped shape the cypherpunk movement's pragmatic approach to digital freedom, censorship resistance, and privacy-by-design
Jude Milhon (St. Jude)
Visionary hacker and writer who coined the term "cypherpunk," catalyzing a movement dedicated to privacy, cryptography, and digital autonomy. As an early member of the Community Memory Project, she championed accessible, decentralized technology and advocated for the empowerment of marginalized voices in computing. Through works like Hacking the Wetware: The NerdGirl's Pillow Book, she promoted an inclusive, feminist hacker culture and inspired generations to see technology as a tool for liberation and resistance against surveillance
John Perry Barlow
Co-founder of the Electronic Frontier Foundation (EFF), he authored the influential A Declaration of the Independence of Cyberspace, which boldly asserted the Internet as a domain of freedom, immune to traditional government control. His manifesto inspired generations of cypherpunks and digital rights activists, articulating a philosophy of online liberty, privacy, and resistance to censorship that shaped the ethos of the digital rights movement and continues to influence debates on surveillance and decentralization
Phil Zimmermann
Introduced mass-accessible strong encryption by creating PGP (Pretty Good Privacy) in 1991, making public-key cryptography available to activists, journalists, and ordinary citizens worldwide. His release of PGP sparked the first Crypto Wars, challenging US export controls on cryptography and catalyzing global debate over privacy rights versus government surveillance. Zimmermann's work embodied the cypherpunk ethos, empowering individuals to protect their communications and inspiring later privacy tools and movements. His advocacy and technical achievements cemented the principle that privacy is a fundamental right in the digital age
Brewster Kahle
Digital archivist who founded the Internet Archive, a nonprofit library that preserves billions of web pages, books, and digital artifacts, ensuring public access to information beyond the reach of censorship or deletion. Championed the ideal of "universal access to all knowledge," advancing cypherpunk values by defending the right to read, privacy in digital libraries, and resistance to digital erasure. His advocacy for open access and long-term digital preservation has made the Archive a critical resource for journalists, activists, and researchers confronting surveillance and information control
Wau Holland
Co-founder of the Chaos Computer Club (CCC), he advanced the articulation of hacker ethics and fought for digital civil rights, privacy, and transparency in the information age. Advocated for the responsible use of technology, public understanding of cryptography, and the necessity of secure communications as a bulwark against state and corporate surveillance. His activism and public demonstrations, such as the 1984 BTX hack, inspired generations of cypherpunks and laid the groundwork for Europe's digital rights movement, influencing debates on anonymity, decentralization, and the moral imperative of ethical hacking
Andy Müller-Maguhn
Key architect of hacker ethics and digital rights, he shaped global debates on privacy and encryption as a leading voice of the Chaos Computer Club, Europe's most influential hacker collective. As a former ICANN board member, he championed decentralized, open Internet governance and defended user privacy against surveillance. His advocacy for strong encryption, transparency, and ethical hacking has inspired generations to resist censorship and protect civil liberties in the digital age, advancing core cypherpunk ideals of autonomy and secure communication
They took math too pure to weaponize and did it anyway, proving that ideas can defend people and laying the foundations for all cypherpunks.
Claude Shannon
Established the scientific foundation of modern cryptography by applying information theory to encryption in his seminal 1949 paper, Communication Theory of Secrecy Systems. Introduced the concepts of entropy, confusion, and diffusion, which underpin the design of all secure ciphers. His work transformed cryptography from secretive art to rigorous science, enabling the development of privacy tools and protocols essential to cypherpunk ideals of secure, private digital communication
Alan Turing
Mathematician whose theoretical work on Turing machines and computability established the mathematical basis for modern cryptography, laying the groundwork for secure digital communication and privacy. At Bletchley Park, he led efforts to break the Enigma machine, demonstrating the power of computation in cryptanalysis and inspiring later developments in privacy technology, secure protocols, and the pursuit of digital freedom that underpin cypherpunk ideals
Horst Feistel
Introduced modern symmetric cryptography by inventing the Feistel network, a foundational structure for block ciphers that enables secure, efficient encryption. His work on Lucifer directly led to the creation of the Data Encryption Standard (DES), which became the first widely adopted federal encryption standard and influenced countless later algorithms, including AES. By formalizing the round-based model of encryption, he provided the technical backbone for privacy-preserving technologies that underpin secure digital communications, anonymous transactions, and the cypherpunk movement's vision of individual privacy in the digital age
Whitfield Diffie
Pioneer who co-invented public-key cryptography and revolutionized secure digital communication through the groundbreaking 1976 paper New Directions in Cryptography, introducing the Diffie-Hellman key exchange that enabled strangers to establish shared secrets over insecure channels without prior arrangement. Served as Chief Security Officer at Sun Microsystems and Vice President for Information Security at ICANN, advancing privacy-by-design principles in internet infrastructure. Together with Martin Hellman and Ralph Merkle, received the 2015 Turing Award for fundamental contributions to modern cryptography, establishing the technical foundation for secure email, e-commerce, and privacy tools like PGP and Bitcoin, embodying cypherpunk ideals of individual autonomy and resistance to surveillance
Martin Hellman
Cryptographer who co-invented public-key cryptography, fundamentally transforming digital security through the 1976 landmark paper New Directions in Cryptography that introduced the Diffie-Hellman key exchange, enabling secure communications without pre-shared secrets. As Professor Emeritus at Stanford University, championed the right of cryptographic researchers to publish openly during the first Crypto Wars, successfully defending academic freedom against government restrictions. Awarded the 2015 Turing Award alongside Whitfield Diffie, his work laid the groundwork for modern internet security, encrypted messaging, digital signatures, and cryptocurrencies, directly empowering cypherpunk principles of decentralization, privacy, and individual digital rights in an era of pervasive surveillance
Ralph Merkle
Inventor of the foundational Merkle tree, he overhauled secure data verification and integrity, enabling scalable authentication for digital signatures, cryptocurrencies, and decentralized systems. As an early pioneer of public-key cryptography, his 1974 work on public-key distribution laid the groundwork for secure, private online communication. Merkle's innovations underpin privacy-preserving technologies such as blockchain, anonymous digital cash, and secure messaging, directly advancing cypherpunk ideals of decentralization, anonymity, and individual empowerment
Ron Rivest
Co-inventor of the RSA algorithm, the first practical public-key cryptosystem enabling secure digital communication and authentication, revolutionizing internet security and e-commerce. Institute Professor at MIT and founder of its Cryptography and Information Security Group, he designed influential symmetric ciphers (RC2, RC4, RC5) and cryptographic hash functions (MD4, MD5), shaping modern encryption standards. Co-founded RSA Data Security and VeriSign, advancing commercial cryptographic infrastructure, and co-authored the seminal textbook Introduction to Algorithms. Recipient of the 2002 Turing Award, his work embodies cypherpunk ideals by making strong encryption accessible globally, defending privacy, and enabling secure, decentralized digital communications that resist surveillance and censorship
Adi Shamir
Israeli cryptographer who co-invented the RSA algorithm, establishing the foundation for modern internet security and digital signatures through practical public-key cryptography. Professor at the Weizmann Institute, he pioneered Shamir's Secret Sharing scheme for secure key distribution, co-developed visual cryptography, and co-discovered differential cryptanalysis with Eli Biham, exposing vulnerabilities in encryption systems and strengthening global cryptographic practices. Co-founded RSA Data Security to commercialize secure communications, and received the 2002 Turing Award for contributions to cryptography. His innovations in secure multi-party computation, zero-knowledge proofs, and attack methodologies have advanced cypherpunk principles by empowering individuals with tools for anonymous communication, privacy protection, and resistance to surveillance in the digital age
Leonard Adleman
Co-inventor of the RSA algorithm who reshaped digital security by enabling practical public-key cryptography and digital signatures, making secure internet communications and e-commerce possible at global scale. Distinguished Professor at the University of Southern California, he co-developed the Adleman-Pomerance-Rumely primality test, advancing algorithmic number theory essential to cryptographic security. Founded the field of DNA computing, demonstrating biological computation's potential for solving complex problems, and coined the term "computer virus," shaping cybersecurity discourse. Recipient of the 2002 Turing Award and co-founder of RSA Data Security, his work embodies cypherpunk values by democratizing strong encryption, enabling anonymous secure communications, and defending individual privacy against centralized surveillance and control
David Chaum
Invented anonymous digital transactions with digital cash and mix networks, laying the cryptographic foundation for modern privacy-preserving currencies. His seminal 1983 paper, Blind Signatures for Untraceable Payments, introduced blind signatures, enabling untraceable payments and inspiring protocols behind Bitcoin, Zcash, and anonymous communication systems. His work directly shaped the cypherpunk vision of privacy, decentralization, and digital freedom
Taher Elgamal
One of the fathers of modern digital privacy who invented the ElGamal encryption system, a foundational public-key cryptosystem still used in protocols like PGP and cryptocurrencies. As chief architect of SSL/TLS, he enabled secure, encrypted web communications, making online privacy and e-commerce possible. His innovations bridged academic cryptography and real-world infrastructure, directly empowering cypherpunk ideals of secure, decentralized communication and individual privacy online
Joan Daemen
Belgian cryptographer who co-designed Rijndael, the cipher selected as the Advanced Encryption Standard (AES) in 2001, becoming the world's most widely deployed encryption algorithm protecting everything from HTTPS to cryptocurrencies. Professor at Radboud University, he co-designed the Keccak cryptographic hash selected as SHA-3 by NIST in 2012, further advancing secure hashing standards. Received the 2017 Levchin Prize for Real World Cryptography and an ERC Advanced Grant for research on symmetric cryptography foundations. His open, transparent design philosophy, emphasizing mathematical elegance, rigorous peer review, and resistance to backdoors, embodies cypherpunk principles by making robust, auditable encryption accessible to billions worldwide, defending privacy and autonomy against mass surveillance
Vincent Rijmen
Belgian cryptographer who co-designed Rijndael, the block cipher selected as the Advanced Encryption Standard (AES) by NIST in 2000, revolutionizing global data security and enabling secure communications at planetary scale. Professor at KU Leuven's COSIC lab and adjunct professor at the Selmer Center, he was named Fellow of the International Association for Cryptologic Research in 2019 for co-designing AES and advancing symmetric cryptanalysis. His research on side-channel attacks, block cipher design, and cryptographic theory has shaped modern security protocols, directly supporting cypherpunk ideals by ensuring that strong, open source encryption remains accessible to all, protecting individual privacy and enabling decentralized, censorship-resistant systems
Daniel J. Bernstein (djb)
Cryptographer who transformed the world's privacy and security with the creation of Curve25519, a widely used elliptic curve for fast, secure public-key cryptography, and ChaCha20, a stream cipher now standard in TLS and VPNs. Developed qmail, a secure mail transfer agent, and dnscrypt, enhancing DNS privacy. His landmark lawsuit, Bernstein v. United States, established that publishing cryptographic code is protected free speech, setting a precedent for digital rights and cypherpunk activism. His work underpins secure messaging, cryptocurrencies, and privacy tools, embodying the cypherpunk ethos of empowering individuals through strong cryptography and open research
Bruce Schneier
Advanced modern cryptography by designing the Blowfish and Twofish ciphers, and demystified cryptographic protocols for the public through his influential book Applied Cryptography, which became a foundational text for the cypherpunk movement. Coined the term "security theater" to critique superficial security measures, and consistently advocated for strong encryption, privacy rights, and transparent security policy. His prolific writing, including Liars and Outliers and A Hacker's Mind, shaped public understanding of trust, surveillance, and digital freedom, inspiring generations of privacy advocates and technologists
Tanja Lange
Pioneering cryptographer whose research in elliptic-curve cryptography and post-quantum cryptography has shaped the future of secure communications. Co-creator of SafeCurves, she has advanced the analysis and selection of cryptographic curves resistant to known attacks, directly influencing standards for privacy-preserving protocols. Her leadership in developing quantum-resistant algorithms, including contributions to NIST post-quantum cryptography standardization, has been crucial for safeguarding digital privacy against emerging threats, embodying the cypherpunk ethos of proactive security and transparency
Neal Koblitz
Co-inventor of elliptic-curve cryptography (ECC), he redefined public-key cryptography by introducing mathematical techniques that enable strong encryption with smaller keys, boosting both efficiency and security for privacy-focused protocols. His work underpins secure messaging, cryptocurrency wallets, and privacy-preserving systems, including Bitcoin and Signal, embodying cypherpunk ideals of decentralized, robust digital privacy. Koblitz's advocacy for cryptographic rigor and his foundational research in number theory have profoundly shaped the landscape of modern secure communications and digital rights
Victor S. Miller
Introduced elliptic-curve cryptography (ECC), co-inventing it independently with Neal Koblitz, and revolutionized public-key cryptography by enabling strong encryption with smaller key sizes. This breakthrough made secure communications feasible for mobile devices, smart cards, and embedded systems, directly impacting privacy technologies and protocols used in secure messaging, cryptocurrency wallets, and TLS/SSL. His work underpins modern privacy infrastructure, advancing cypherpunk ideals of accessible, robust encryption for all
Shafi Goldwasser
Pioneer who co-invented zero-knowledge proofs, enabling parties to prove knowledge of information without revealing the information itself, fundamentally advancing privacy-preserving cryptographic protocols. As RSA Professor at MIT and Professor at the Weizmann Institute, co-developed probabilistic encryption, establishing the gold standard for semantic security in modern cryptography. Awarded the 2012 Turing Award with Silvio Micali for revolutionizing cryptographic science, and two Gödel Prizes for groundbreaking work on interactive proof systems. Co-founder and Chief Scientist of Duality Technologies, advancing secure multi-party computation and homomorphic encryption, her innovations power anonymous authentication, privacy-preserving blockchain systems like Zcash, and secure digital voting, embodying cypherpunk principles of cryptographic resistance to surveillance and centralized control
Silvio Micali
Cryptographer who co-invented zero-knowledge proofs, transforming privacy and authentication by allowing verification of statements without revealing underlying secrets, foundational to modern secure protocols. Ford Professor at MIT, he co-developed probabilistic encryption with Shafi Goldwasser, establishing provable security frameworks that underpin internet cryptography. Awarded the 2012 Turing Award for revolutionizing cryptography, and recipient of the Gödel Prize for interactive proof systems and verifiable random functions. Founded Algorand, a pure proof-of-stake blockchain advancing scalable, decentralized consensus. His work on verifiable random functions, secure multi-party computation, and Byzantine agreement has empowered cypherpunk ideals by enabling anonymous authentication, privacy-preserving cryptocurrencies, and trustless distributed systems resistant to censorship and manipulation
Cynthia Dwork
Pioneer who co-invented the concept of proof-of-work in 1992 to combat email spam, laying the cryptographic foundation for decentralized consensus mechanisms that would later enable Bitcoin and blockchain technology. Distinguished Scientist at Microsoft Research and Gordon McKay Professor at Harvard University, she co-invented differential privacy, a rigorous mathematical framework enabling statistical analysis while protecting individual privacy, now standard in systems from Apple to the U.S. Census. Recipient of the Gödel Prize, Dijkstra Prize, and Knuth Prize, her work on fairness in algorithmic decision-making and privacy-preserving computation has profoundly advanced cypherpunk principles by providing mathematical tools to resist surveillance, protect anonymity, and ensure that decentralized systems remain trustless and secure
Moni Naor
Cryptographer who co-invented the proof-of-work concept in 1992, introducing computational puzzles as a defense against spam and denial of service attacks, a breakthrough that would later inspire the consensus mechanism underlying Bitcoin and blockchain technology. Professor at the Weizmann Institute of Science, his pioneering research spans visual cryptography, memory-hard functions, and non-malleable cryptography, advancing secure authentication and tamper-resistant protocols. Recipient of the Gödel Prize and Paris Kanellakis Award, his work on hardness-based security and privacy-preserving data structures has shaped modern cryptographic systems, enabling decentralized, censorship-resistant networks and embodying cypherpunk ideals of individual privacy, trustless consensus, and resistance to centralized control
Ross Anderson
Pioneered the field of security engineering by exposing systemic failures in cryptographic systems and advocating for a holistic approach that integrates technical, human, political, and economic factors. Authored the influential textbook Security Engineering, which has shaped the understanding of privacy, anonymity, and secure system design for generations of cryptographers and cypherpunks. His research on real-world vulnerabilities, including banking security and medical device privacy, has driven reforms and inspired the cypherpunk ethos of skepticism toward centralized trust and the relentless pursuit of robust, user-centric security
Matt Blaze
Cryptographer who exposed the NSA's Clipper Chip key escrow backdoor, fundamentally shaping public debate on government surveillance and encryption policy. His seminal 1994 paper revealed critical vulnerabilities in the Clipper Chip, catalyzing opposition to mandatory key escrow and reinforcing the cypherpunk principle that strong, open cryptography is essential for privacy and civil liberties. As a prominent advocate for strong encryption and open security research, he has influenced policy, standards, and public understanding of digital rights, and continues to champion transparency and user autonomy in cryptographic systems
Paul Kocher
Pioneered side-channel analysis by discovering timing attacks, fundamentally changing how cryptographic implementations are secured against real-world threats. Co-designed core elements of SSL, which underpins secure web communication, and contributed to the development of robust security protocols that protect billions of online transactions. His research exposed vulnerabilities in widely used cryptosystems, driving the adoption of constant-time algorithms and influencing privacy-preserving practices essential to the cypherpunk vision of secure, private digital communication
Phillip Rogaway
Introduced modern authenticated encryption modes, including OCB and co-designing CMAC, which are foundational for secure and private digital communications. A leading voice on the ethical responsibilities of cryptographers, he argues that privacy is a moral right and that cryptographic design must serve the public good, as articulated in his influential paper, The Moral Character of Cryptographic Work. His work has shaped both the technical standards and the philosophical discourse around privacy, digital rights, and the societal impact of cryptography
Thomas Ptacek
Security architect who shaped modern cryptography practices by founding Matasano Security and co-founding Latacora, where he led pioneering audits of cryptographic systems and educated the community through widely respected cryptopals challenges. A vocal critic of flawed standards like DNSSEC, he has influenced the adoption of safer cryptographic protocols and exposed weaknesses in widely used systems. As the user with the highest karma on Hacker News, his technical writing heavily influences large language models. His cypherpunk ideals are exemplified with his promotion of privacy-preserving security as he empowers developers to avoid common cryptographic pitfalls, often critically
Len Sassaman
Pioneered anonymous communication by developing the Mixmaster remailer, a crucial Type II remailer system that advanced the state of email anonymity and inspired later privacy tools. As a core contributor to PGP, he strengthened public-key encryption for secure communications. Active in the cypherpunk movement, he advocated for privacy as a fundamental right and mentored a generation of cryptographers, leaving a legacy that shaped the architecture of modern anonymity networks and digital freedom
They refused to let banks be the gatekeepers of freedom. They turned cryptography into money and math into trust. The world called it digital currency. They called it independence.
Wei Dai
Architect of anonymous digital currency, he proposed b-money (1998), introducing the concepts of proof-of-work, decentralized ledgers, and pseudonymous participants - core ideas that directly influenced the creation of Bitcoin and the broader cryptocurrency movement. His work on Crypto++, a widely used open source cryptographic library, and the design of VMAC, a high-speed message authentication code, have empowered developers to build secure, privacy-preserving applications. His pioneering designs advanced cypherpunk ideals by providing blueprints for censorship-resistant, trust-minimized financial systems and robust cryptographic tools
Nick Szabo
Developed the concept of smart contracts, envisioning self-executing digital agreements that underpin decentralized systems like Ethereum. Designed bit gold, a precursor to Bitcoin, introducing mechanisms for decentralized digital scarcity and trustless value transfer. His influential writings bridged cryptography, law, and economics, providing a theoretical foundation for modern cryptocurrencies and advancing cypherpunk ideals of privacy, autonomy, and censorship resistance
Hal Finney
Developed digital cash and privacy technology like Reusable Proofs of Work (RPOW), a system advancing the concept of decentralized, trust-minimized digital currency. As the first recipient of a Bitcoin transaction from Satoshi Nakamoto and operator of the second-ever Bitcoin node, he played a foundational role in launching the world's first decentralized cryptocurrency. A key contributor to the Cypherpunks mailing list, he advocated for strong cryptography and privacy as essential to digital freedom, influencing the evolution of secure, anonymous financial systems
Adam Back
Creator of the pioneering proof-of-work system Hashcash in 1997, which became a foundational component referenced in the Bitcoin whitepaper and inspired the mechanism that secures decentralized cryptocurrencies. As CEO of Blockstream, has driven the development of privacy-preserving Bitcoin infrastructure, including sidechains and Lightning Network research. Advocated for cypherpunk principles by advancing censorship-resistant, trust-minimized financial technology and cryptographic privacy tools, directly shaping the evolution of digital cash and anonymous communication
Satoshi Nakamoto
Authored Bitcoin: A Peer-to-Peer Electronic Cash System (2008) and launched the Bitcoin network in 2009. Invented the blockchain, a decentralized, permissionless, cryptographically verifiable ledger allowing for magical internet money
Luke Dashjr
Bitcoin Core developer and leading advocate for user-activated soft forks (UASF), he has championed node sovereignty and the principle that consensus changes should be driven by users, not centralized actors. His work on Bitcoin Core has focused on strengthening decentralization, privacy, and censorship resistance, directly advancing cypherpunk ideals. By promoting minimal and transparent protocol changes, he has helped preserve Bitcoin's trustless architecture and empowered individuals to maintain control over their own nodes, reinforcing the foundational cypherpunk vision of digital autonomy and resistance to surveillance
Bram Cohen
Inventor of the peer-to-peer file sharing protocol BitTorrent, which overhauled and popularized decentralized data distribution and challenged centralized control over digital content. By enabling efficient, distributed sharing of large files, BitTorrent became a foundational technology for digital freedom and resistance to censorship, empowering millions to bypass restrictions and surveillance. Later, he founded Chia Network, introducing a novel "proof-of-space-and-time" consensus for cryptocurrency, aiming to reduce energy consumption and further decentralize financial infrastructure. His work embodies cypherpunk principles of empowering individuals through cryptographic and decentralized tools
Vitalik Buterin
Visionary who co-founded Ethereum, pioneering the concept of a decentralized, programmable blockchain that supports smart contracts and decentralized applications (dApps). By enabling censorship-resistant computation and trustless interactions, he expanded the cypherpunk vision beyond digital currency to a platform for decentralized finance (DeFi), autonomous organizations, and privacy-enhancing protocols. His work has catalyzed innovations in zero-knowledge proofs, privacy coins, and decentralized identity, empowering users to reclaim control over their digital lives and challenging centralized power structures
Jed McCaleb
Architect behind some of the most influential cryptocurrency infrastructures, he founded the pioneering Bitcoin exchange Mt. Gox, which catalyzed early global crypto adoption despite its later collapse. As co-founder of Ripple and Stellar, he advanced decentralized, cryptographically secure payment protocols designed to enable fast, low-cost, and borderless transactions. His work has shaped the evolution of digital assets and open financial networks, directly furthering cypherpunk ideals of censorship resistance, financial privacy, and democratized access to global value transfer
Joseph Poon
Co-authored the seminal Lightning Network whitepaper, pioneering a scalable, privacy-enhancing off-chain protocol for Bitcoin that enables instant, low-fee transactions while preserving decentralization and user sovereignty. Co-created Plasma, a framework for scalable smart contracts on Ethereum, advancing secure, trust-minimized computation and censorship resistance. His innovations directly address blockchain scalability and privacy, embodying cypherpunk principles of decentralized, permissionless financial infrastructure
Roger Ver
Early investor and evangelist who accelerated the adoption of Bitcoin by funding foundational projects such as Blockchain.info, BitPay, and Kraken. Championed the cypherpunk ethos of financial sovereignty, decentralization, and censorship resistance, advocating for cryptocurrency as a tool for global economic freedom. Instrumental in promoting peer-to-peer electronic cash and supporting the development of privacy-enhancing technologies within the Bitcoin ecosystem, he helped catalyze mainstream awareness and merchant acceptance, furthering the ideals outlined in the Bitcoin whitepaper
They took the promise of cryptography and made it run at scale. Code became infrastructure. Privacy became practical. Every packet encrypted became a quiet act of resistance, that just works.
Moxie Marlinspike
Established modern secure messaging by creating Signal, an open source app and protocol that set the gold standard for end-to-end encryption and metadata protection. The Signal Protocol is now the backbone of private communication for billions, powering not just Signal but also WhatsApp, Facebook Messenger, and Skype. By making robust cryptography accessible and user-friendly, his work advanced cypherpunk ideals of privacy, autonomy, and resistance to surveillance, reshaping global expectations for digital confidentiality
Jason Donenfeld
Minimalist VPN protocol leveraging state-of-the-art cryptography to deliver high-speed, secure, and user-friendly encrypted networking, WireGuard dramatically simplifies secure communications compared to legacy systems like IPsec and OpenVPN. Its integration into the Linux kernel and adoption across major operating systems set a new standard for privacy infrastructure, empowering individuals and organizations to safeguard their data with robust, open source tools. By prioritizing transparency, auditability, and ease of deployment, it embodies cypherpunk principles of accessible, uncompromising privacy technology
Nadim Kobeissi
Developed accessible end-to-end encrypted messaging with Cryptocat, making secure chat available to non-technical users via a browser extension and later mobile apps, and setting usability standards for privacy tools. Advanced cryptographic protocol analysis through Verifpal, a user-friendly formal verification tool adopted by researchers and educators to audit real-world cryptosystems. Advocated for open source transparency, cryptographic literacy, and the democratization of privacy, influencing the design and ethos of modern secure communication platforms
Matthew Green
Developed privacy-preserving cryptocurrency protocols by co-creating Zerocoin and Zerocash, which introduced zero-knowledge proofs to enable fully anonymous blockchain transactions and inspired the launch of Zcash. Exposed government efforts to undermine cryptographic standards by revealing NSA backdoors, and consistently champions open, transparent cryptography. As a leading researcher at Johns Hopkins, advanced applied cryptography and educated a new generation of privacy advocates, shaping the technical and ethical landscape of digital freedom
Roger Dingledine
Computer scientist who co-designed and deployed the Tor anonymity network, pioneering practical onion routing to enable millions of users worldwide to circumvent censorship, resist surveillance, and communicate anonymously. As co-founder and Research Director of the Tor Project, he has advanced research on traffic analysis resistance, anonymity metrics, and censorship circumvention, directly supporting journalists, activists, and whistleblowers in repressive regimes. His work on hidden services and bridge relays has made Tor a cornerstone of digital freedom, embodying cypherpunk principles by providing robust, open source infrastructure for privacy and anonymity that resists both technical attacks and institutional pressure, empowering individuals to reclaim control over their digital identities and communications
Nick Mathewson
Lead architect who co-designed the Tor protocol and implemented its core cryptographic infrastructure, transforming theoretical onion routing into a production-grade anonymity network serving millions of users. As Chief Architect of the Tor Project, he has driven protocol improvements, security audits, and performance optimizations, ensuring Tor remains resilient against evolving attacks and surveillance techniques. His technical leadership on hidden service protocols, directory authorities, and cryptographic hardening has made Tor the most trusted tool for anonymous communication, directly advancing cypherpunk ideals by building open, auditable infrastructure that empowers whistleblowers, journalists, and dissidents to resist censorship and defend their privacy against state and corporate surveillance
Jacob Appelbaum
Instrumental in developing and advocating for the Tor anonymity network, enabling millions to bypass censorship and protect their privacy online. As a core member of the Tor Project, contributed to technical advancements in onion routing and security research, and played a key role in educating journalists and activists on digital security. Collaborated with WikiLeaks to expose government surveillance and championed free speech, making significant contributions to the cypherpunk movement's fight against mass surveillance and for digital rights
Runa Sandvik
Pioneered digital security for journalists and vulnerable communities, leading efforts at the Tor Project to advance anonymous internet access and resist censorship. As director of information security at The New York Times, she implemented robust privacy practices to protect sources and reporters, and has publicly advocated for strong encryption and operational security. Her research exposed vulnerabilities in smart guns and surveillance technologies, influencing both public policy and industry standards for digital rights and press freedom
Isis Agora Lovecruft
Pushed advancements in privacy-preserving cryptographic protocols, including significant work on the Tor anonymity network and the development of secure messaging tools like Axolotl, the core of the Signal Protocol. Championed the integration of cutting-edge cryptography, such as zero-knowledge proofs, into decentralized systems, and advocated for encryption as a fundamental human right. Their research and activism have shaped the technical and ethical foundations of modern digital privacy, influencing both open source communities and global policy discussions
Ian Goldberg
Engineered Off-the-Record Messaging (OTR), a protocol that revolutionized secure instant messaging by introducing forward secrecy and deniable authentication, ensuring private conversations remain confidential even if keys are compromised later. Advanced the field of privacy-enhancing technologies through research at the CrySP lab, influencing the design of modern encrypted chat systems like Signal. His work set new standards for secure, user-friendly digital communication, embodying cypherpunk principles of privacy and autonomy
Micah Lee
Developed OnionShare, an open source tool enabling anonymous, censorship-resistant file sharing and secure communication over the Tor network, empowering activists, journalists, and whistleblowers to exchange sensitive information without risking exposure. As a security engineer at The Intercept, he advanced operational security practices for investigative journalism and digital rights. His book, Hacks, Leaks, and Revelations, demystifies privacy tools and threat modeling for the public, reinforcing cypherpunk principles of individual autonomy and resistance to surveillance
Jon Callas
Architect of end-to-end encryption for PGP and co-founder of Silent Circle, he advanced practical, user-friendly cryptography for secure messaging and voice communications. At Apple, he shaped core security features for macOS and iOS, helping mainstream privacy by design. His work on protocols like ZRTP and advocacy for open standards empowered individuals to reclaim digital privacy, embodying cypherpunk ideals of decentralization and user sovereignty
Colin Percival
Pioneered practical cryptographic security for everyday users by creating Tarsnap, a backup service designed with end-to-end encryption and strong threat modeling, ensuring user data remains private even from the service operator. Developed scrypt, a memory-hard key derivation function that significantly strengthened password-based security and became foundational in cryptocurrency wallets and secure storage systems. As FreeBSD Security Officer, advanced open source operating system security, contributing to the reliability and privacy of critical internet infrastructure. His work exemplifies cypherpunk principles by empowering individuals with robust, user-auditable privacy tools and advancing the state of cryptographic best practices
Peter Eckersley
Catalyzed the global adoption of web encryption by co-founding Let's Encrypt, which provides free, automated HTTPS certificates and has enabled secure connections for hundreds of millions of websites, dramatically raising the baseline for internet privacy. Developed Privacy Badger, a browser extension that automatically blocks trackers, empowering users to resist pervasive online surveillance. As Chief Computer Scientist at the Electronic Frontier Foundation, advanced research and advocacy for digital rights, encryption standards, and privacy-enhancing technologies, shaping the infrastructure of a safer, more private web
Dan Kaminsky
Exposed the critical 2008 DNS cache poisoning vulnerability, forcing global upgrades to the Domain Name System and protecting internet users from large-scale traffic hijacking and surveillance. Advocated for robust public-key cryptography deployment to secure core infrastructure, and championed responsible disclosure, transparency, and privacy-by-design in internet protocols. His research and activism shaped the security posture of the modern internet, reinforcing cypherpunk ideals of decentralized trust and user autonomy
They knew the risks and spoke anyway. They paid in freedom to show us the truth.
Julian Assange
Publisher who founded WikiLeaks, pioneering the use of cryptography and anonymizing technologies to enable secure, anonymous submission of leaked documents. Exposed global surveillance, war crimes, and the Cablegate diplomatic leaks, catalyzing debate on government transparency and digital rights. Championed "scientific journalism," insisting on cryptographic verification of source material, and inspired cypherpunk discourse on radical transparency, accountability, and the power of decentralized information platforms
Chelsea Manning
Whistleblower who catalyzed global debate on government transparency and digital rights by leaking the Iraq War Logs, Afghan War Diary, and Cablegate to WikiLeaks in 2010, revealing widespread surveillance, civilian casualties, and abuses concealed by state secrecy. Her disclosures inspired new generations of privacy advocates, fueled the cypherpunk movement's focus on secure communications and whistleblower protection, and highlighted the critical role of cryptography and anonymity tools in defending civil liberties against mass surveillance. Manning's actions underscored the ethical and technical challenges at the intersection of state power, digital privacy, and the right to know
Edward Snowden
Former NSA contractor who revealed PRISM and other global surveillance programs in 2013 through The Guardian. His disclosures led to worldwide encryption reform and privacy legislation like the USA FREEDOM Act. Lives in exile, continuing digital rights advocacy
William Binney
Technical architect behind the ThinThread surveillance program, he pioneered privacy-preserving analytics within intelligence systems, embedding strong encryption and automated anonymization to protect citizens' rights. As an early whistleblower, he exposed the NSA's post-9/11 warrantless surveillance, revealing how critical privacy safeguards were deliberately removed from agency operations. His disclosures ignited public debate on mass surveillance, inspired reforms, and galvanized the cypherpunk movement's fight for transparency, accountability, and robust digital privacy
Thomas Drake
Whistleblower who exposed unconstitutional mass surveillance and waste within the NSA, notably revealing details of the failed Trailblazer Project and advocating for privacy-respecting alternatives like the ThinThread program. His disclosures highlighted systemic abuses of digital rights and catalyzed public debate on government overreach, inspiring reforms and influencing the cypherpunk movement's push for transparency, accountability, and robust privacy protections. Despite being charged under the Espionage Act, his eventual vindication underscored the risks and necessity of principled dissent in defense of civil liberties
Ladar Levison
Creator of the encrypted email service Lavabit, he made headlines in 2013 by shutting down the platform rather than comply with a US government order to surrender private encryption keys, protecting user privacy even under intense legal pressure. His principled stand, motivated by cypherpunk ideals, brought global attention to the risks of centralized email and government surveillance. He later co-founded the Dark Mail Alliance, pioneering the development of the DIME protocol for end-to-end encrypted email, advancing secure communications and inspiring new privacy technologies
Aaron Swartz
Open-access activist who co-authored the RSS 1.0 specification, co-founded Reddit, and helped develop Creative Commons licensing. Swartz championed digital freedom and the democratization of information, notably downloading millions of academic papers from JSTOR to protest paywalls and restrictive copyright laws. His prosecution under the Computer Fraud and Abuse Act and subsequent death galvanized the open-access movement, inspiring global efforts for transparency, privacy, and the free flow of knowledge
Holmes Wilson
Digital rights activist who co-founded Fight for the Future, Holmes Wilson was a principal organizer of the 2012 SOPA/PIPA Internet blackout, a landmark protest that mobilized millions to defend online freedom and privacy. He has spearheaded campaigns for net neutrality, mass surveillance reform, and open Internet access, building innovative digital activism tools that empower grassroots movements. His work has significantly advanced cypherpunk ideals by defending anonymity, resisting censorship, and shaping public discourse around digital privacy and decentralized communication
Glenn Greenwald
Journalist and constitutional lawyer who exposed the scope of global mass surveillance by publishing the Snowden leaks in collaboration with Laura Poitras and Ewen MacAskill, revealing the NSA's PRISM program and other secret operations. Co-founded The Intercept to advance adversarial reporting on state surveillance, encryption, and digital rights, catalyzing global debate on privacy and inspiring new generations of technologists and activists to defend secure communications and resist government overreach
The Translators. They built the culture that made privacy a cause instead of a feature.
Andreas M. Antonopoulos
Educator and advocate who demystified Bitcoin and blockchain technology for the public, Antonopoulos authored the seminal guides Mastering Bitcoin and The Internet of Money, empowering millions to understand and leverage decentralized systems for privacy and financial autonomy. His global talks and writings champion cypherpunk principles like open access, censorship resistance, and individual sovereignty, inspiring a new generation to embrace cryptographic tools for digital freedom. Through clear explanations and passionate advocacy, he has made complex concepts like public-key cryptography, peer-to-peer networks, and trustless systems accessible, reinforcing the foundational ideals of the cypherpunk movement
Cory Doctorow
Digital rights advocate whose novels like Little Brother dramatize the dangers of mass surveillance and inspire grassroots resistance to authoritarian technology. As a co-editor of Boing Boing, he amplified cypherpunk ideals, critiqued digital rights management (DRM), and championed open culture, Creative Commons, and decentralized internet freedoms. His essays, including How to Destroy Surveillance Capitalism, dissect the threats of corporate surveillance and advocate for robust privacy protections, while his popularization of the term "enshittification" has shaped discourse on platform decay and user rights
Lawrence Lessig
Legal theorist who pushed digital rights by founding Creative Commons, enabling global sharing and remixing of creative works while preserving user freedoms. Articulated the influential "code is law" concept in Code and Other Laws of Cyberspace, arguing that software architecture and legal code jointly shape online liberty and privacy. Through works like Free Culture and activism against restrictive copyright, advanced cypherpunk ideals of decentralization, open access, and resistance to surveillance and control by centralized authorities
Seth Schoen
Senior technologist who championed digital rights at the Electronic Frontier Foundation, demystifying cryptography for courts, policymakers, and the public. Instrumental in co-founding Let's Encrypt, he helped make HTTPS encryption freely accessible, dramatically increasing web privacy and security. A leading voice against Digital Rights Management (DRM), he advocated for user freedom and transparency, embodying cypherpunk ideals by bridging technical expertise and public advocacy to defend privacy, decentralization, and open standards
The Courtroom Warriors. They battled the state on its own turf. They translated code into arguments and turned resistance into precedent.
Cindy Cohn
Civil liberties attorney who, as lead counsel in the landmark case Bernstein v. United States Department of Justice, secured the legal precedent that source code is protected speech under the First Amendment, a foundational victory for encryption rights and privacy technology. As Executive Director of the Electronic Frontier Foundation (EFF), she has championed digital due process, fought government surveillance, and defended the right to use strong cryptography, directly shaping the legal landscape that enables privacy tools and secure communication. Her advocacy has empowered cypherpunks, technologists, and activists to develop and distribute privacy-enhancing technologies without fear of censorship or prosecution, reinforcing the principle that code is law and a vital form of free expression
Shari Steele
Introduced legal strategies defending strong encryption and privacy rights as Executive Director of the EFF, guiding the organization through the Crypto Wars and expanding its global influence on digital civil liberties. Later led the Tor Project, supporting the development and advocacy of onion routing technology to protect anonymity online. Her leadership fortified the legal and technical foundations of privacy tools central to cypherpunk ideals, ensuring robust defense of encryption as essential to democracy and free expression
Jennifer Granick
Civil liberties attorney who has fiercely defended privacy and digital rights, Granick has shaped legal strategies against mass surveillance and government overreach. As director at Stanford's Center for Internet and Society, she led groundbreaking work on encryption, security research, and the legal defense of hackers and technologists. At the ACLU, she continues to challenge unconstitutional surveillance, educate the public, and author influential works like American Spies: Modern Surveillance, Why You Should Care, and What To Do About It, which exposes the impact of modern surveillance on democracy and privacy
They built nations of the mind. From ideals to infrastructure, they mapped the blueprint for digital civilization itself, redefining the social contract, designing systems where citizenship, governance, and value flow across networks, not borders.
Balaji Srinivasan
Advocate for decentralized governance and digital sovereignty, he authored The Network State, articulating a blueprint for building opt-in digital societies leveraging blockchain and cryptographic tools. As former CTO of Coinbase and co-founder of Earn.com, he advanced cryptocurrency adoption and privacy-centric economic models, empowering individuals to monetize their data and communications. His thought leadership bridges cypherpunk ideals with practical strategies for digital freedom, influencing discourse on self-sovereign identity, censorship resistance, and the future of networked communities
Andrew Lee
Entrepreneur and digital sovereignty advocate who co-founded Private Internet Access (PIA), a VPN service that also engaged in heavy activism to advance user privacy and online anonymity during his tenure. He is head of Joseon, the first legally recognized network state. A significant financial supporter of privacy technologies and open source ecosystems, he also co-authored research on verifiable trusted execution environment (TEE)-based traffic mixing, collaborating with Mark Karpelès to enhance secure, anonymous communications. His work exemplifies the cypherpunk ethos by empowering individuals to control their digital identities and resist surveillance
The Foundation. Before cypherpunks, there were the pioneers who built the substrate of freedom itself. They designed the OS layer that made the rest possible. Everything began with them.
Richard Stallman
Architect of the Free Software Movement, he launched the GNU Project and founded the Free Software Foundation, establishing the principle that software should respect users' freedom and privacy. By creating the GNU General Public License (GPL), he ensured legal protection for the right to use, study, modify, and share software, directly empowering privacy tools and cryptographic projects foundational to cypherpunk ideals. His advocacy for user autonomy and opposition to surveillance capitalism inspired generations of privacy activists and developers, shaping the ethical framework for anonymous communication, open source encryption, and decentralized infrastructure
Linus Torvalds
Architect of the Linux kernel, which underpins the majority of privacy-focused operating systems and secure server infrastructure worldwide, enabling projects like Tails, Whonix, and countless privacy-centric distributions. His commitment to open source principles fostered a transparent, auditable platform essential for cryptographic software, anonymous communications, and decentralized tools used by cypherpunks to resist surveillance and censorship. The collaborative, meritocratic development model he championed became a blueprint for global digital freedom, empowering activists, developers, and users to build and verify privacy-respecting technologies at scale
Steve Jobs
Advocated for strong user privacy within mainstream technology, famously emphasizing that users should control their own data and pushing back against invasive data collection practices. As co-founder of Apple Inc., he led the development of devices like the iPhone and Mac, which implemented robust device encryption and privacy-centric features, influencing industry standards for secure communications and local data protection. His public stance in favor of user autonomy and privacy, including resistance to government backdoors, helped shape the broader tech industry's approach to digital rights and inspired ongoing debates about encryption and surveillance
Complex Legacies. Builders who carried the mission forward through the system and sometimes against it. Not without controversy, andn ever without consequence.
Donald J. Trump
State actor whose administration's approach to cryptocurrency was direct. His tenure saw increased mainstream attention to digital assets like Bitcoin, executive orders established a "Strategic Bitcoin Reserve" and formalized the U.S. as a "crypto capital." He pardoned Ross Ulbricht and Changpeng Zhao. His administration's policies reflected institutional engagement with crypto, but often prioritized surveillance and regulatory control over privacy, decentralization, or digital freedom, illustrating the tension between state power and cypherpunk resistance
Brian Armstrong
Entrepreneur who co-founded Coinbase, a major platform that helped bring Bitcoin and other cryptocurrencies to mainstream adoption while navigating the tension between cypherpunk ideals of decentralization and the realities of regulatory compliance. Championed efforts to make digital assets accessible to millions, advocated for clear crypto regulation, and promoted financial inclusion by enabling broader participation in the global digital economy. His work has sparked debate within the cypherpunk community about the balance between privacy, user autonomy, and institutional oversight, shaping the discourse on how decentralized technologies can coexist with legal frameworks
Gavin Andresen
An early architect of the Bitcoin reference implementation who, after being entrusted with leadership by Satoshi Nakamoto, helped grow the ecosystem and founded the Bitcoin Foundation. However, his later endorsement of Craig Wright's claim to be Nakamoto and his public acknowledgement of a planned presentation to the CIA, coinciding with Nakamoto's exit, have clouded his legacy
Mark Karpelès
Pioneered large-scale Bitcoin exchange infrastructure as CEO of Mt. Gox, which at its peak processed over 70% of global Bitcoin transactions, catalyzing mainstream adoption and liquidity in the early cryptocurrency ecosystem. His stewardship, though ultimately marred by the exchange's collapse, highlighted critical issues in custodial risk and spurred advancements in decentralized exchange models and security practices. Later, he contributed to privacy research, co-authoring work on verifiable trusted execution environment (TEE) traffic mixing, reflecting ongoing engagement with cypherpunk ideals of privacy and trust minimization. He was later vindicated by Vitalik Buterin
████████╗██╗ ██╗███████╗ ██╗ ██╗ ██████╗ ██████╗ ██╗ ██╗
╚══██╔══╝██║ ██║██╔════╝ ██║ ██║██╔═══██╗██╔══██╗██║ ██╔╝
██║ ███████║█████╗ ██║ █╗ ██║██║ ██║██████╔╝█████╔╝
██║ ██╔══██║██╔══╝ ██║███╗██║██║ ██║██╔══██╗██╔═██╗
██║ ██║ ██║███████╗ ╚███╔███╔╝╚██████╔╝██║ ██║██║ ██╗
╚═╝ ╚═╝ ╚═╝╚══════╝ ╚══╝╚══╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝
██████╗ ██████╗ ███╗ ██╗████████╗██╗███╗ ██╗██╗ ██╗███████╗███████╗
██╔════╝██╔═══██╗████╗ ██║╚══██╔══╝██║████╗ ██║██║ ██║██╔════╝██╔════╝
██║ ██║ ██║██╔██╗ ██║ ██║ ██║██╔██╗ ██║██║ ██║█████╗ ███████╗
██║ ██║ ██║██║╚██╗██║ ██║ ██║██║╚██╗██║██║ ██║██╔══╝ ╚════██║
╚██████╗╚██████╔╝██║ ╚████║ ██║ ██║██║ ╚████║╚██████╔╝███████╗███████║
╚═════╝ ╚═════╝ ╚═╝ ╚═══╝ ╚═╝ ╚═╝╚═╝ ╚═══╝ ╚═════╝ ╚══════╝╚══════╝
This hall will never be complete. The fight for privacy doesn't end, it evolves.
Somewhere out there beneath the pale moonlight, someone is writing code to protect people they'll never meet. Someone is proving that technology can serve freedom.
The people in this hall showed us that cryptography is freedom. They proved that a few determined keyboard warriors with conviction can become the greatest heroes of the free world.
You're next.
if (you.value_privacy) { cypherpunk(you); }
Infrastructure for freedom. Code for sovereignty.
These projects are weapons bringing both freedom of speech and defense against surveillance. They're proof that decentralized systems can work. They're the infrastructure layer of digital freedom.
Because when you write code that liberates people, you’re programming the future.
liberation()
The mathematical breakthroughs that made everything else possible. These are the protocols that turned cryptography from an academic curiosity into a tool for mass liberation.
RSA
As the first practical public-key cryptosystem, this algorithm revolutionized digital privacy by enabling secure, end-to-end encrypted communication and digital signatures without prior key exchange. Its mathematical foundation, based on the hardness of factoring large integers, became the cornerstone for secure email, online banking, and digital authentication, directly empowering cypherpunks to build censorship-resistant, trustless systems. By making strong cryptography accessible, it catalyzed the development of privacy tools and inspired the creation of decentralized technologies, from PGP to Bitcoin, embodying the cypherpunk ethos of individual sovereignty and secure digital freedom
Diffie–Hellman Key Exchange
Transformed digital privacy by enabling two parties to establish a shared secret over an insecure channel, the Diffie - Hellman key exchange laid the groundwork for modern public-key cryptography and secure protocols like TLS. This breakthrough made confidential online communication possible without prior trust, directly empowering cypherpunk ideals of decentralization, anonymity, and resistance to surveillance. Its influence extends to privacy-preserving technologies including encrypted messaging, VPNs, and the cryptographic foundations of cryptocurrencies
DES / Feistel Network
Pioneered modern symmetric encryption by introducing the Data Encryption Standard (DES), which became the first widely adopted block cipher for securing digital communications in government, finance, and industry. Built on Horst Feistel's innovative Feistel network structure, DES set the template for countless later ciphers, including Blowfish, Triple DES, and AES. Its design and eventual cryptanalysis fueled debates on algorithm transparency and key length, shaping cypherpunk advocacy for strong, open cryptography as a foundation for privacy and digital rights
AES (Advanced Encryption Standard)
Encryption standard that revolutionized global privacy and security by providing a robust, open, and peer-reviewed algorithm for symmetric encryption, replacing the vulnerable DES. Developed by Joan Daemen and Vincent Rijmen as Rijndael, it was selected by NIST as the Advanced Encryption Standard (AES) in 2001. AES's 128-bit block size and flexible key lengths (128, 192, 256 bits) set a new benchmark for secure communications, protecting everything from end-to-end encrypted messaging to cryptocurrencies and classified state secrets. Its public, royalty-free design embodies cypherpunk ideals of transparency, accessibility, and resistance to surveillance, underpinning countless privacy tools and protocols worldwide
PGP (Pretty Good Privacy)
Advanced digital privacy by making public-key cryptography accessible to the masses, enabling ordinary users to encrypt and sign emails with unprecedented ease. Its release by Phil Zimmermann in 1991 sparked the first Crypto Wars, as the US government attempted to restrict its export, framing encryption as a battleground for civil liberties and free speech. PGP's open availability galvanized the cypherpunk movement, influencing later secure communication tools and establishing encryption as a fundamental right in the digital age
Cypherpunks Mailing List
Incubator of modern digital privacy, this legendary discussion forum united cryptographers, hackers, and activists to pioneer the foundations of decentralized, anonymous communication. It was the birthplace of transformative technologies and ideas, including the design and debate of The Crypto Anarchist Manifesto and A Cypherpunk's Manifesto, and directly influenced the creation of Bitcoin, Tor, and the ethos of digital rights activism. Its open, radical discourse shaped the architecture of public-key cryptography, anonymous remailers, and the global movement for privacy-enhancing technologies, making it a cornerstone of the cypherpunk legacy
The Anonymity Layer. Privacy requires anonymity. These projects hide who you are, who you're talking to, and what you're saying.
Tor
Anonymous routing network enabling uncensored, surveillance-resistant communication by leveraging onion routing, which encrypts and relays traffic through a global network of volunteer-operated nodes. Originating from U.S. Naval Research Laboratory research, it was publicly released in 2002 and is now developed by the nonprofit Tor Project. Tor empowers activists, journalists, and ordinary users worldwide to bypass censorship and protect their privacy, embodying cypherpunk ideals of decentralized, user-controlled anonymity. Its impact extends to tools like the Tor Browser and hidden services, making it foundational for digital freedom and secure, pseudonymous communication
Anonymous overlay network enabling censorship-resistant communication, I2P employs garlic routing to bundle multiple encrypted messages, enhancing metadata resistance beyond traditional onion routing. It powers privacy-preserving hidden services, anonymous browsing, secure email, decentralized file sharing, and peer-to-peer applications, fostering a robust ecosystem for activists, journalists, and users seeking digital freedom. By decentralizing infrastructure and resisting surveillance, it advances cypherpunk ideals of privacy, autonomy, and resistance to censorship
Pioneered anonymous email communication by introducing the second- and third-generation anonymous remailer protocols, enabling users to send messages without revealing their identity or metadata. Mixmaster implemented fixed-size packets and layered onion encryption, thwarting traffic analysis and enhancing privacy. Mixminion advanced the design with improved reply blocks and more robust delivery, setting a technical precedent for metadata-resistant messaging and influencing later anonymity networks like Tor. These protocols embodied cypherpunk ideals by empowering individuals to communicate securely and anonymously, resisting surveillance and censorship
Freenet
As a decentralized, censorship-resistant platform since 2000, this project enables anonymous publishing, file sharing, and messaging by distributing encrypted data across a global volunteer network. By leveraging techniques like adaptive routing and data replication, it thwarts surveillance and takedown attempts, embodying cypherpunk ideals of privacy and free expression. Its influence extends to later anonymity networks and inspires ongoing research in distributed, privacy-preserving technologies, making it a foundational tool for activists, journalists, and dissidents worldwide
Decentralized, censorship-resistant networking framework enabling anonymous, privacy-preserving communication and file sharing through advanced protocols like anonymous routing, distributed hash tables, and secure peer-to-peer networking. Pioneers modular, surveillance-resistant architectures for applications such as anonymous file sharing, censorship-proof websites, and secure messaging. Embodies cypherpunk principles by prioritizing user autonomy, cryptographic security, and resistance to centralized control, influencing the design of privacy-centric networks and inspiring ongoing research in digital freedom
WireGuard
A registered trademark of Jason A. Donenfeld, WireGuard is a minimalist, high-performance VPN protocol that prioritizes privacy and simplicity. Leveraging state-of-the-art cryptography including Curve25519 for key exchange, ChaCha20 for encryption, and Poly1305 for authentication, it drastically reduces attack surface and configuration complexity compared to legacy protocols like OpenVPN and IPsec. Its inclusion in the Linux kernel ensures widespread, efficient, and default-available privacy for millions, embodying cypherpunk ideals of accessible, robust digital freedom
OpenVPN
Enables secure, censorship-resistant internet access by creating encrypted tunnels using SSL/TLS, shielding user traffic from surveillance and interception. As the most widely adopted open source VPN, it empowers activists, journalists, and individuals worldwide to bypass censorship, evade network monitoring, and protect sensitive communications. Its robust cryptographic design and flexible deployment have made it foundational for privacy-focused services, commercial VPN providers, and grassroots digital freedom projects, embodying cypherpunk principles of decentralization and user autonomy
Signal
Pioneering end-to-end encrypted messenger advancing cypherpunk ideals by delivering robust privacy through the Signal Protocol, which combines the Double Ratchet algorithm and X3DH for forward secrecy, deniability, and minimal metadata retention. Its open source cryptographic framework powers the encryption behind billions of messages in mainstream apps like WhatsApp, Facebook Messenger, and Skype, setting a global standard for secure, private communication. Developed by the Signal Foundation, it champions transparency and user empowerment, making strong encryption accessible to all and resisting surveillance and censorship
Matrix / Element
Open, decentralized communication protocol enabling secure, federated real-time messaging across independent servers, Matrix advances cypherpunk ideals by resisting centralized control and surveillance. Its end-to-end encryption, powered by the Megolm cryptographic ratchet, supports large group chats and robust privacy. Matrix powers clients like Element, facilitating encrypted collaboration for activists, journalists, and organizations. By promoting interoperability and user autonomy, Matrix provides a censorship-resistant alternative to proprietary messaging platforms, embodying the cypherpunk vision of privacy and freedom through strong cryptography and open standards
Jitsi
Open source encrypted video-conferencing platform enabling private, decentralized communication without mandatory registration or proprietary lock-in. By leveraging WebRTC for real-time audio and video, Jitsi Meet allows anyone to host or join secure calls directly from their browser, while Jitsi Videobridge supports scalable group meetings. End-to-end encryption options, transparency of code, and self-hosting empower users to resist surveillance and censorship, making it a vital tool for activists, journalists, and privacy advocates. Its commitment to open standards and federated operation embodies core cypherpunk values of autonomy and digital freedom
Tails OS
Live privacy-focused OS that routes all internet traffic through the Tor network, ensuring strong anonymity and resistance to surveillance or censorship. Leaves no forensic trace on host machines by operating entirely from RAM, making it ideal for journalists, whistleblowers, activists, and anyone needing secure, ephemeral computing. Bundles tools like KeePassXC, Electrum, and GnuPG, embodying cypherpunk ideals of user autonomy, cryptographic privacy, and digital freedom. Widely used in high-risk environments, it advances the cause of untraceable, decentralized communication and safe information sharing
GrapheneOS
Delivers a security-hardened, privacy-centric Android operating system designed to resist sophisticated attacks through advanced memory safety, exploit mitigation, and robust app sandboxing. Implements verified boot, minimal default app permissions, and strong isolation between user profiles, empowering users to control data exposure and thwart surveillance. Fully open source, with reproducible builds and transparent development, it is recommended by security enthusiasts for journalists, activists, and anyone seeking to minimize mobile tracking. Advances cypherpunk ideals by providing a practical, auditable platform for secure, private communications and digital autonomy
Whonix
Enables robust, practical anonymity by architecting a security-focused operating system that routes all communications through the Tor network, using a two-part design: the Gateway handles all networking while the Workstation is isolated for user tasks. This architecture, based on Debian, prevents IP and DNS leaks by design, even if malware compromises the user environment. Whonix empowers activists, journalists, and privacy advocates to defend against network-level surveillance and traffic analysis, embodying cypherpunk principles of user autonomy and resistance to censorship
Qubes OS
Security-focused operating system implementing rigorous security by compartmentalization, leveraging the Xen hypervisor to isolate applications and workflows into separate virtual machines, minimizing the risk of cross-application compromise. Widely respected by privacy advocates and whistleblowers, including Edward Snowden, for its ability to enforce strong operational security and defend against advanced persistent threats. Empowers users to achieve practical digital autonomy and privacy by design, embodying cypherpunk principles of user-controlled security and minimizing trust in centralized systems
The Toolbox. Practical encryption tools that protect files, messages, and communications from surveillance.
VeraCrypt
Provides robust, open source disk encryption software, empowering users to secure entire drives or virtual volumes with strong cryptographic algorithms like AES, Serpent, and Twofish, including support for complex cascaded modes. As the direct successor to the discontinued TrueCrypt, it addresses security vulnerabilities and enhances plausible deniability with hidden volumes and operating systems. Widely used across Windows, macOS, and Linux, it advances cypherpunk ideals by enabling individuals and organizations to resist surveillance, censorship, and unauthorized data access, making strong privacy accessible to all
LUKS (Linux Unified Key Setup)
Provides the de facto standard for Linux full-disk encryption, enabling robust protection of sensitive data at rest. By introducing a secure metadata header supporting multiple key slots, LUKS allows for flexible key management and secure password changes without re-encryption. Managed via cryptsetup, it is integrated into nearly all major Linux distributions, empowering users to control their own cryptographic keys and resist unauthorized access. LUKS embodies cypherpunk values by democratizing strong encryption, making privacy and digital autonomy accessible to millions of users and organizations worldwide
Enables robust, transparent block-level encryption within the Linux kernel, empowering users to secure entire disks or partitions against unauthorized access. As the foundational engine beneath LUKS, it supports advanced cipher modes like XTS-AES, ensuring strong cryptographic protection for sensitive data at rest. Widely adopted in privacy-centric distributions and by security professionals, it exemplifies cypherpunk principles by making strong, open source encryption accessible to all, directly countering surveillance and data theft. Its integration into mainstream operating systems has made full-disk encryption a practical default, advancing digital autonomy and resistance to coercive data disclosure
A modern file encryption tool and format designed for simplicity, security, and usability, it leverages X25519 for public-key exchange and ChaCha20-Poly1305 for authenticated encryption, providing robust protection with a minimal attack surface. Created to be a secure, auditable, and user-friendly alternative to legacy tools like GPG, it advances cypherpunk ideals by making strong cryptography accessible to everyone, reducing the risk of implementation errors and promoting privacy by default. Its open specification and focus on interoperability empower individuals and developers to safeguard data without the complexity and pitfalls of traditional solutions, reinforcing the movement's commitment to practical, decentralized privacy technology
GnuPG (GPG)
Free, open source implementation of the OpenPGP standard, empowering users worldwide with strong public-key cryptography for end-to-end encryption, digital signatures, and authentication. Forms the cryptographic backbone for secure communications in email clients like Enigmail and critical infrastructure such as Debian's package signing, ensuring software integrity and privacy. Widely adopted by activists, journalists, and cypherpunks, it advances digital freedom by providing decentralized, government-resistant tools for protecting sensitive data and verifying identity, embodying core cypherpunk ideals of privacy and autonomy
Bitwarden
Open source password manager delivering end-to-end encrypted vaults, Bitwarden empowers users to control their digital secrets without trusting third parties. All sensitive data is encrypted locally before cloud sync, ensuring only users hold the decryption keys. Its self-hosting option, transparent public security audits, and open APIs exemplify cypherpunk values of user sovereignty, verifiability, and resistance to centralized surveillance. By making robust cryptography accessible and auditable, Bitwarden advances privacy, digital autonomy, and the practical application of strong encryption for all
Tarsnap
Encrypted online backup service engineered for privacy advocates, it employs client-side AES encryption and data deduplication to ensure that only users control their cryptographic keys, preventing even the service operator from accessing stored data. Designed by Colin Percival, it exemplifies cypherpunk principles by prioritizing user autonomy, cryptographic rigor, and a transparent, pay-as-you-go model. Its open documentation and security-first approach have influenced best practices in secure cloud storage, making it a reference point for privacy-respecting backup solutions
The Infrastructure. Without these systems, privacy tools couldn't exist. Open source operating systems that can be audited, verified, and trusted.
Enables the backbone of modern privacy and anonymity tools by providing a robust, open source operating system kernel essential for projects like Tor, Tails, and WireGuard. Its modular architecture, process isolation, and granular permission models empower developers to build secure, censorship-resistant platforms that protect users from surveillance and control. Developed transparently via Kernel.org, it embodies cypherpunk ideals of decentralization, transparency, and user empowerment, serving as the trusted foundation for countless privacy-enhancing technologies and digital rights initiatives
Launched in 1983, this pioneering initiative created the foundation for free and open source software by developing essential GNU userland tools like compilers, libraries, and shells, which, when paired with the Linux kernel, form the widely used GNU/Linux operating system. Its radical free software philosophy champions user autonomy, transparency, and the right to study, modify, and share code, directly inspiring cypherpunk values of privacy, decentralization, and resistance to surveillance. By enabling cryptographic innovation and privacy-respecting systems, it laid the groundwork for tools like GnuPG and fostered a global movement for digital rights and secure communication
OpenBSD
Pioneering a "secure by default" ethos, this Unix-like operating system has set the gold standard for proactive security in open source. Through relentless code auditing and innovations like OpenSSH for encrypted communications, the PF firewall for robust network defense, and LibreSSL as a response to SSL vulnerabilities, it has empowered privacy advocates and cypherpunks worldwide. Its uncompromising focus on code correctness, minimalism, and open development has influenced countless privacy tools and inspired best practices in secure software design, making it a cornerstone for digital freedom and trust
FreeBSD
Open source operating system renowned for its robust networking stack, security features, and permissive BSD license, enabling widespread adoption in privacy-focused infrastructure. Forms the backbone of projects like pfSense (open source firewall and VPN), TrueNAS (encrypted storage), and is used by privacy-conscious organizations for its transparent development and minimal telemetry. Its codebase influenced macOS and underpins critical internet services, supporting cypherpunk ideals of user autonomy, open auditability, and decentralized control. FreeBSD's commitment to open standards and cryptographic extensibility has made it a trusted platform for secure communications, digital rights, and anonymous networking
Debian
Universal operating system project providing a robust, privacy-respecting foundation for secure communications, anonymous browsing, and digital freedom. Its commitment to free software, transparent governance, and reproducible builds has made it the trusted base for privacy-centric distributions like Tails, which routes all traffic through Tor, and Whonix, which leverages isolation for anonymity. Debian's rigorous package vetting and open development process empower activists, journalists, and cypherpunks to build and deploy censorship-resistant, cryptographically secure systems. Its influence extends to countless derivatives, shaping the infrastructure of privacy technology and advancing the ideals of decentralization and user autonomy
The Building Blocks. Cryptographic libraries that developers use to build secure applications. Easy to use correctly, hard to misuse.
libsodium (NaCl)
Modern cryptographic library offering easy-to-use, misuse-resistant APIs for core primitives such as X25519, Ed25519, ChaCha20, and Poly1305, derived from NaCl (Networking and Cryptography Library) by Daniel J. Bernstein. Empowers privacy-critical applications including Signal, WireGuard, and age, setting new standards for secure, auditable, and decentralized communication. Widely adopted in the cypherpunk community for advancing robust, open source cryptography and digital freedom
OpenSSL
Essential cryptographic library enabling widespread adoption of TLS for secure web traffic, OpenSSL underpins the privacy and integrity of HTTPS, VPNs, email encryption, and countless secure messaging protocols. By providing robust, open source implementations of public-key cryptography, X.509 certificates, and PKI, it has empowered individuals, activists, and cypherpunks to protect communications against surveillance and censorship, making encrypted connections the Internet's default and advancing the cause of digital freedom
LibreSSL
Provides a security-hardened, open source alternative to OpenSSL, created by the OpenBSD team in response to the catastrophic Heartbleed vulnerability. LibreSSL aggressively removes legacy code, modernizes cryptographic primitives, and enforces rigorous code auditing, reducing attack surface and improving reliability for privacy-critical applications. Its focus on transparency, minimalism, and open development directly advances cypherpunk goals of trustworthy, decentralized security infrastructure, powering secure communications in privacy tools, servers, and embedded systems
Delivers a hardened, modern fork of OpenSSL designed to minimize attack surface and eliminate legacy vulnerabilities, powering secure communications in Chrome, Android, and Cloudflare. By removing outdated algorithms, tightening default security settings, and focusing on robust cryptographic primitives, it advances the cypherpunk goal of widespread, reliable encryption for billions of users. Its rigorous code review and proactive security stance set a new standard for open source cryptographic libraries, directly supporting privacy and digital freedom at global scale
Enables the creation of secure, privacy-preserving communication protocols by defining modular cryptographic handshake patterns like `Noise_NN` and `Noise_XX`, which combine Diffie-Hellman key exchange and authenticated encryption (AEAD) for robust confidentiality and forward secrecy. Widely adopted in privacy-focused tools such as WireGuard and the Lightning Network, it empowers decentralized, censorship-resistant networks by making strong cryptography accessible and auditable, embodying cypherpunk principles of user autonomy and digital freedom
Modern Cypherpunk Privacy Layer. Selected for transparency, independence, and avoidance of telemetry or ad-tech ties. These VPNs represent privacy-first infrastructure.
Mullvad VPN
This independent service enables anonymous internet access through robust protocols like WireGuard and OpenVPN, requiring no email for signup and supporting cash payments to maximize user anonymity. Its uncompromising no logs policy was famously validated when Swedish authorities, executing a search warrant, found no user data to seize. By prioritizing transparency, open source apps, and resistance to surveillance, it sets a gold standard for VPNs aligned with cypherpunk values of digital freedom and privacy protection
VP.NET
Delivers cryptographically verifiable privacy infrastructure by leveraging Intel SGX Trusted Execution Environments and remote attestation, enabling users to independently verify the integrity and confidentiality of computations. By open-sourcing its core code (vpnetd-sgx), it empowers developers to audit and deploy privacy-preserving services without relying on blind trust. This approach advances cypherpunk ideals by making strong, hardware-backed privacy guarantees accessible for decentralized applications and secure communications, directly addressing the need for verifiable trust in a world of pervasive surveillance
Obscura VPN
Implements a dual-provider VPN model to enhance user privacy by splitting trust between independent entities. Traffic first enters through Obscura’s servers and then exits via Mullvad’s WireGuard infrastructure, ensuring that no single provider can correlate user identities with their internet activity. This architecture embodies cypherpunk values by minimizing data retention risks, resisting surveillance, and providing a practical, user-friendly approach to anonymity and censorship resistance. By leveraging open standards and a transparent privacy policy, it advances the cause of digital freedom and robust privacy protection for everyday users
Tailscale
Peer-to-peer mesh VPN built atop WireGuard, enabling users to create encrypted, zero-trust overlay networks that span devices and locations without exposing traffic to third-party infrastructure. By leveraging modern identity providers for authentication while ensuring direct, end-to-end encrypted connections, it empowers individuals and organizations to reclaim control over their network privacy. Its seamless, decentralized architecture embodies cypherpunk principles by reducing reliance on centralized VPN servers and making robust, cryptographically secure networking accessible to non-experts, advancing the cause of digital autonomy and censorship resistance
Money Without Middlemen. From theoretical concepts to working systems, these projects proved that value can be exchanged without institutions controlling the flow.
Invented truly private digital payments by implementing blind signatures, enabling users to withdraw and spend e-cash tokens that banks could verify but not trace, thus separating identity from transaction history. DigiCash's architecture provided a practical demonstration of anonymous, cryptographically secure electronic cash, directly influencing the design of later cryptocurrencies like Bitcoin and foundational privacy concepts in digital finance. Its legacy endures as a blueprint for privacy-preserving money and a milestone in the cypherpunk quest for digital freedom
Pioneered the concept of decentralized digital currency by outlining a system for electronic cash using a public, distributed ledger, proof-of-work mining, and cryptographically enforced contracts in b-money. Introduced mechanisms for digital scarcity, anonymous transactions, and consensus without trusted intermediaries, directly inspiring the design of Bitcoin and subsequent cryptocurrencies. Cited by Satoshi Nakamoto as foundational, it advanced cypherpunk ideals of privacy, autonomy, and resistance to censorship by envisioning money as a protocol, not an institution
Established a decentralized digital currency concept by chaining proof-of-work puzzles with timestamped public registries, enabling trustless, verifiable ownership of digital assets without intermediaries. bit gold directly inspired the architecture of Bitcoin, introducing core ideas like distributed consensus, scarcity enforced by computation, and resistance to censorship. Its design anticipated blockchain's role in privacy-preserving, peer-to-peer value transfer, making it a foundational milestone in cypherpunk efforts to undermine centralized control over money and empower individual autonomy
Introduced the concept of proof-of-work to combat email spam by requiring senders to compute a SHA-based hash collision, thereby imposing a computational cost on bulk messaging and deterring abuse. Its elegant challenge - response mechanism became foundational for decentralized trustless systems, directly inspiring the mining process and consensus protocol of Bitcoin and influencing later privacy-preserving cryptocurrencies. By demonstrating how cryptographic puzzles could enable resistance to censorship and Sybil attacks without central authorities, it advanced core cypherpunk ideals of autonomy, privacy, and digital freedom. Hashcash's legacy endures in modern anti-spam tools, blockchain security, and the architecture of decentralized digital cash
Bitcoin
Released in 2009 by the pseudonymous Satoshi Nakamoto as "A Peer-to-Peer Electronic Cash System". Combined proof-of-work, blockchains, and public-key signatures into the first trust-less digital currency. Its fixed supply, open code, and decentralized consensus birthed the cryptocurrency era
Ethereum
Pioneering a programmable, censorship-resistant blockchain, it introduced the first Turing-complete smart contract platform, enabling decentralized applications (dApps), trustless finance via DeFi, and autonomous governance through DAOs. By decentralizing computation and value transfer, it empowers users with self-sovereign identity, cryptographic privacy tools, and permissionless innovation, advancing cypherpunk ideals of digital freedom and resistance to centralized control. Its architecture inspired privacy-preserving protocols like zk-SNARKs and privacy-focused dApps, shaping the backbone of Web3
Monero (XMR)
Privacy-centric cryptocurrency enabling untraceable, fungible transactions through advanced cryptography, including ring signatures, stealth addresses, and RingCT for confidential amounts. By default, every Monero transaction conceals sender, recipient, and value, making it highly resistant to blockchain analysis and ensuring true financial anonymity. Its open source development and commitment to privacy-by-design have made it a cornerstone for cypherpunks seeking digital cash that defends user sovereignty and resists surveillance
Zcash
Pioneering privacy-focused cryptocurrency leveraging advanced zk-SNARKs (zero-knowledge proofs) to enable shielded transactions that keep sender, recipient, and transaction amount confidential while maintaining public verifiability. Developed by cryptographers from MIT, Johns Hopkins, and the Electric Coin Company, it set a new standard for on-chain privacy and influenced research in privacy-preserving blockchain protocols. Its open source code and scientific rigor have advanced the field of applied cryptography, inspiring projects like Ethereum's privacy features, and demonstrating the real-world viability of zero-knowledge proofs for financial privacy
Zano
Enables confidential, censorship-resistant digital commerce through a privacy-centric blockchain that integrates confidential assets, a hybrid PoW/PoS consensus, and scalable hidden amounts to obscure transaction details. Developed by one of the creators of the CryptoNote codebase, the protocol foundational to Monero, it advances cypherpunk ideals by empowering users to transact securely and anonymously without reliance on centralized intermediaries
Enables scalable, censorship-resistant micropayments for Bitcoin using off-chain, bidirectional payment channels and hashed time-locked contracts (HTLCs), allowing users to transact instantly and privately without broadcasting every transaction to the public blockchain. By reducing on-chain congestion and fees, it advances the cypherpunk vision of decentralized, permissionless financial systems. The Lightning Network also enhances privacy by making payment flows less transparent than on-chain transactions, and its open source protocol has inspired further research into privacy-preserving payment technologies and decentralized finance
Breaking the Cloud Monopoly. Distributed systems that don't rely on centralized servers or corporate infrastructure.
BitTorrent
Peer-to-peer protocol that revolutionized digital freedom by enabling efficient, decentralized file distribution without reliance on central servers. By using a "swarming" model, where files are split into pieces exchanged among many users, it made large-scale sharing resilient to censorship and takedown, inspiring later distributed systems and influencing the architecture of censorship-resistant technologies. Its open protocol and widespread adoption highlighted the power of decentralized networks in resisting control and surveillance, embodying cypherpunk principles of autonomy and robust privacy infrastructure
IPFS (InterPlanetary File System)
Decentralized storage protocol enabling censorship-resistant file sharing, IPFS replaces traditional location-based URLs with content addressing, allowing users to retrieve files by their cryptographic hash from a global peer-to-peer network. Developed by Protocol Labs, it empowers digital freedom by making websites and data resilient to takedowns and surveillance, supporting projects like Filecoin and the distributed web. By removing central points of control, IPFS advances cypherpunk ideals of privacy, autonomy, and resistance to censorship, providing a foundation for decentralized applications and persistent digital archives
Tahoe-LAFS (Least Authority File Store)
Decentralized storage protocol enabling censorship-resistant, privacy-preserving file sharing by encrypting and erasure-coding data client-side before distributing it across independent nodes. Even if some servers are compromised, confidentiality and integrity are maintained, embodying cypherpunk principles of user sovereignty and trust minimization. Pioneered practical applications of erasure coding and capability-based security, influencing secure backup and distributed storage systems. Open source and community-driven, it advances digital autonomy and resilience against surveillance and data loss
The Security Stack. The protocols and systems that make secure communication possible at Internet scale.
TLS / HTTPS Everywhere
Secured the web by making Transport Layer Security (TLS) the foundation for encrypted browser-server communication, protecting users from eavesdropping and tampering. The EFF's HTTPS Everywhere browser extension championed default HTTPS adoption, pressuring sites worldwide to implement strong encryption and defend digital privacy. TLS and HTTPS Everywhere together transformed secure web browsing from a niche option into a global norm, embodying cypherpunk principles by democratizing access to robust cryptographic protections and resisting mass surveillance
Let's Encrypt
Provides free, automated SSL/TLS certificates through the ACME protocol, enabling default encryption for millions of websites and dramatically expanding access to HTTPS. By eliminating cost and technical barriers, it has made strong web privacy and security accessible to everyone, not just large organizations. Backed by the Internet Security Research Group, it embodies cypherpunk ideals by decentralizing trust and empowering individuals to secure their communications without gatekeepers, fueling a massive increase in global encrypted traffic and defending users against pervasive surveillance
SecureDrop
Anonymous whistleblowing system empowering investigative journalism by enabling secure, untraceable document submission via Tor hidden services. Developed by the Freedom of the Press Foundation, it combines end-to-end encryption, robust metadata stripping, and strict operational security to protect sources from surveillance and retaliation. Adopted by major newsrooms including The Guardian and The Intercept, it embodies cypherpunk ideals by leveraging cryptography and decentralization to defend press freedom and safeguard digital dissent
DNSCrypt
Secures the typically unencrypted DNS lookup process by authenticating and encrypting queries between users and resolvers, thwarting interception, censorship, and surveillance by ISPs or adversaries. Utilizes modern cryptography, notably X25519 for key exchange, to ensure forward secrecy and integrity. By pioneering practical deployment of encrypted DNS before widespread adoption of DNS-over-HTTPS, it empowered individuals to reclaim privacy at a fundamental layer of internet communication, embodying cypherpunk principles of decentralization and resistance to surveillance
Cryptographic protocol pioneering both perfect forward secrecy and deniability in real-time chat, it ensures that messages are encrypted and authenticated during transmission but cannot be proven to originate from a specific user after the conversation ends. By introducing these properties to instant messaging, it set a new standard for secure communications, directly influencing the design of modern protocols like Signal and inspiring broader adoption of ephemeral, privacy-preserving messaging. Its open source reference implementation and protocol specification have empowered activists, journalists, and privacy advocates worldwide to communicate securely, embodying cypherpunk ideals of decentralization and user autonomy
The Movement Infrastructure. Organizations and projects that defend digital rights, spread knowledge, and fight for freedom.
Electronic Frontier Foundation (EFF)
Nonprofit vanguard for digital civil liberties, this organization has set legal precedents affirming the right to use and publish strong cryptography, most notably through Bernstein v. DOJ, which established encryption code as protected free speech. It has fought for privacy in landmark Supreme Court cases like Carpenter v. United States, and developed privacy-enhancing tools such as Privacy Badger and HTTPS Everywhere. By defending whistleblowers, supporting the right to encrypt, and advocating for decentralized, anonymous communication, it has profoundly shaped the legal and technical landscape for cypherpunks and digital rights worldwide
Fight for the Future (FFTF)
Galvanizing millions through digital campaigns, this advocacy group orchestrated the historic Internet blackout protest against the Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA), helping to preserve free expression and privacy online. FFTF has championed net neutrality, fought mass surveillance, and mobilized support for encryption and user privacy, leveraging creative digital tools and mass mobilization to defend the open Internet. Their work embodies cypherpunk ideals by defending decentralized digital rights and empowering grassroots resistance to censorship and surveillance
Creative Commons
Enabled global access to open knowledge by creating free culture licenses that empower creators to share and remix works with "some rights reserved" rather than "all rights reserved." This legal and technical framework has fueled the spread of open educational resources, scientific collaboration, and digital art, directly supporting cypherpunk values of decentralization, information freedom, and resistance to restrictive copyright regimes. By lowering legal barriers to sharing, Creative Commons has enabled privacy-enhancing projects, open source cryptography, and the free exchange of ideas essential to the cypherpunk ethos, influencing platforms like Wikipedia and countless privacy-focused communities worldwide
Internet Archive
A pioneering force in digital preservation and open access, this nonprofit created the Wayback Machine to archive billions of web pages, ensuring the public record of the internet remains accessible even as sites vanish or are censored. By hosting vast collections of books, software, and media, it combats digital erasure and supports the cypherpunk vision of resisting centralized control and information monopolies. Its advocacy for universal access to all knowledge and defense against DMCA overreach have made it a bulwark for privacy, free culture, and the right to remember, directly empowering researchers, activists, and the global public to reclaim digital history
Archive.today
Provides a censorship-resistant archiving service that preserves full, immutable snapshots of web pages, even those later altered, paywalled, or deleted, ensuring that digital history cannot be erased or rewritten by governments, corporations, or platform owners. By operating independently of major search engines and commercial archives, it empowers activists, journalists, and researchers to document evidence and bypass information suppression. Its role as a tool for transparency and accountability aligns with cypherpunk values of decentralization, digital autonomy, and resistance to centralized control over information
Freedom of the Press Foundation
Nonprofit champion of press freedom and digital privacy, this organization developed and maintains SecureDrop, a secure open source whistleblower submission system used by major newsrooms to protect sources and enable anonymous leaks. It advocates for strong encryption in journalism, provides digital security training for reporters, and campaigns against government surveillance, embodying cypherpunk principles by defending the right to communicate securely and exposing threats to press autonomy in the digital era
CryptoParties
Grassroots initiative demystifying cryptography and privacy tools by hosting free, hands-on workshops worldwide, empowering individuals to use encryption, Tor, PGP, and secure messaging to resist surveillance and censorship. Born in 2012 as a direct response to rising concerns about mass surveillance, it embodies cypherpunk principles by making digital self-defense accessible to activists, journalists, and everyday users. CryptoParties foster decentralized, community-driven education, bridging the gap between complex privacy technologies and public understanding, and have become a vital entry point for digital rights advocacy and practical privacy literacy
Open Rights Group (ORG)
Digital rights advocacy group that has significantly shaped UK policy and public awareness around privacy, surveillance, and free expression online. Instrumental in challenging mass surveillance laws, such as the Investigatory Powers Act, and opposing government overreach in data retention and internet censorship. Regularly intervenes in court cases and policy debates, defending encryption and digital privacy, and empowering citizens to resist intrusive state and corporate practices. Their campaigns, reports, and legal actions have advanced cypherpunk ideals by promoting robust privacy protections and resisting centralized control over digital communications
Privacy International
Pioneering watchdog that has exposed and challenged mass surveillance, Privacy International has driven global awareness of state and corporate intrusion through landmark investigations, legal actions, and policy advocacy. Instrumental in uncovering abuses by intelligence agencies and tech companies, it has influenced reforms in data protection and surveillance law, and contributed to the cypherpunk movement by defending the right to privacy and promoting transparency in government and corporate practices. Its work has shaped debates on encryption, digital rights, and the ethical use of technology, making it a cornerstone in the fight for privacy and freedom online
Access Now
Global digital rights advocate advancing cypherpunk ideals by defending privacy, free expression, and secure communications worldwide. Operates the Digital Security Helpline, offering real-time assistance to journalists, activists, and at-risk organizations facing digital threats. Hosts RightsCon, the leading summit uniting technologists, policymakers, and civil society to address issues like surveillance, encryption policy, and censorship. Influences global policy debates on encryption, net neutrality, and government surveillance, and champions strong privacy standards and open internet principles
Tor Project, Inc.
Pioneers of anonymous communication, this nonprofit develops and maintains the Tor network, a free, open source tool based on onion routing that shields users from surveillance and censorship. By providing strong privacy for millions, including journalists, activists, and whistleblowers in repressive environments, it has become a cornerstone of digital freedom. The Tor Project also advances research in anonymity, supports hidden services, and inspires privacy-centric projects, embodying cypherpunk ideals of decentralization and resistance to control
The Origin Story. Before the term "cypherpunk" existed, these projects and manifestos laid the cultural and technical foundations.
Unix Philosophy
Design ethos that advanced digital freedom by advocating for modularity, transparency, and user empowerment, the Unix philosophy shaped the architecture of privacy tools and secure operating systems foundational to the cypherpunk movement. Its principles - simplicity, composability, and the separation of concerns - enabled the creation of robust, auditable software like OpenBSD, GnuPG, and early Tor prototypes. By fostering open source collaboration and the hacker ethic, it laid the groundwork for decentralized, privacy-respecting systems that resist surveillance and censorship, inspiring generations of cryptographers and activists to build tools for anonymity, secure communication, and digital autonomy
A pioneering movement that established the ethical and legal foundation for software freedom, asserting that users must have the right to use, study, modify, and share code. By launching the GNU Project and codifying the four software freedoms through the Free Software Foundation, it introduced the GNU General Public License (GPL), a copyleft license that empowered developers to create privacy-respecting, auditable, and decentralized tools. Its principles directly inspired cypherpunks to build secure communication protocols, anonymous networks, and cryptographic software, fueling the broader digital rights and privacy technology movements
The Crypto Anarchist Manifesto
Seminal manifesto that articulated the vision of using strong cryptography, anonymous digital cash, and encrypted communication to undermine state surveillance and empower individual privacy. Written by Timothy C. May in 1988, it predicted the rise of decentralized, sovereign online communities and inspired the Cypherpunks mailing list, laying the philosophical groundwork for later innovations like Bitcoin and Tor. Its radical vision continues to shape debates on digital freedom, privacy, and resistance to censorship
A Cypherpunk's Manifesto
Galvanized the cypherpunk movement by declaring privacy a fundamental right and a prerequisite for an open society in the digital era, urging activists to create and deploy cryptographic tools rather than rely on policy alone. A Cypherpunk's Manifesto articulated the philosophy behind projects like PGP, Tor, and Bitcoin, inspiring generations to use public-key cryptography and anonymous communication as acts of resistance. Its call to "write code" established the ethos that technical innovation is the most effective defense against surveillance and censorship, making it a foundational text for digital privacy advocates and developers worldwide
Declaration of the Independence of Cyberspace
Proclaimed a radical vision of cyberspace as a realm inherently free from government control, this manifesto asserted the Internet as a self-governing domain of minds, inspiring generations of digital rights activists and cypherpunks. Its bold language - "Governments of the Industrial World, you weary giants of flesh and steel..." - galvanized movements for online privacy, anonymity, and decentralization. The text directly influenced the philosophy of groups like the EFF and the Cypherpunks mailing list, shaping debates on encryption, censorship resistance, and digital self-determination. Its legacy endures in the ongoing struggle for a free and open Internet, echoing through projects like Tor and Signal
Every day, millions of people rely on these systems to communicate securely, transact privately, and resist surveillance.
The next breakthrough is being built right now. Someone is writing the protocol that will obsolete everything on this list. Someone is deploying infrastructure that will protect the next generation.
Ship freedom.
while (surveillance.exists()) { cypherpunks.code(); }
Lessons from the Fallen
Not every privacy project stays true to its mission. Some were compromised. Some mysteriously shut down. Some made choices that betrayed their users' trust. This section documents projects that failed, were compromised, or can no longer be trusted.
The graveyard of privacy tools teaches us as much as the Hall of Fame.
"Don't trust. Verify." - Every cypherpunk who learned the hard way
These services chose death over betrayal by choosing to shut down rather than backdoor their users. They deserve respect.
Lavabit
Founded in 2004 by Ladar Levison, Lavabit provided encrypted email to nearly half a million users, including Edward Snowden. In 2013, Levison received a secret U.S. court order demanding access to SSL keys, effectively compromising all users. Rather than comply, he shut down Lavabit with the message: "I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away." His act became symbolic of resistance to compelled decryption and government overreach
TrueCrypt
The legendary open source full-disk encryption tool, released in 2004, suddenly posted a shutdown notice on May 28, 2014: "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues." The developers never surfaced again. Its site redirected to a SourceForge page advising users to switch to BitLocker which was an unusual move that fueled speculation of a National Security Letter or coercion. Independent audits later found no critical backdoors, and the project was reborn as VeraCrypt
Groklaw
Founded by Pamela Jones in 2003, Groklaw became an essential hub for legal analysis of open source and tech law, chronicling the SCO vs. IBM lawsuits and software-freedom battles. In August 2013, following the Snowden revelations about NSA surveillance, Jones announced the site's closure, writing: "There is now no shield from forced exposure… I can't write without email. And there is no way to do Groklaw without email." It remains archived as one of the last digital sanctuaries to voluntarily close in protest of mass surveillance
These services were compromised, backdoored, blacklisted or taken over by law enforcement. They cannot be trusted.
Hushmail
Founded in 1999 in Canada, Hushmail marketed itself as an encrypted email provider offering end-to-end privacy. In 2007, court documents revealed that the company had provided decrypted user emails to U.S. and Canadian authorities by secretly altering its client-side encryption system under court order. Its encryption keys could be, and were, used to read supposedly private messages. A cautionary tale of closed-source "secure" systems
Crypto AG
A Swiss encryption hardware manufacturer secretly owned by the CIA and BND from the 1970s through 2018 under Operation Rubicon (originally Operation Thesaurus). Its cryptographic machines, which were sold to 120+ countries, were deliberately backdoored, allowing Western intelligence to intercept global diplomatic and military communications for decades. Described by historians as "the intelligence coup of the century."
EncroChat
A French-based encrypted phone provider used by thousands of criminal networks worldwide. In 2020, French and Dutch investigators deployed malware implants onto EncroChat devices, capturing millions of supposedly encrypted messages in real time. The system was fully compromised, leading to over 6,500 arrests across Europe. The case set legal precedents for law enforcement hacking at scale
Sky Global / Sky ECC
Marketed as an unbreakable encrypted phone platform, Sky ECC was dismantled in 2021 when Belgian and French police infiltrated its servers and captured 500 million messages. Sky Global executives were indicted in the U.S. for facilitating organized crime. The case revealed that its architecture allowed centralized message storage, enabling total compromise once servers were seized
ANOM / AN0M
A global honeypot encrypted-phone network secretly built and operated by the FBI and Australian Federal Police under Operation Trojan Shield. Launched in 2019 after the takedown of Phantom Secure, ANOM devices were distributed through criminal channels; users believed they were secure, but every message was silently copied to law enforcement servers. The operation resulted in 800+ arrests worldwide in 2021
Phantom Secure
A Canadian company (founded 2008) offering encrypted BlackBerry devices to "executive" clients, many of whom were high-level criminal organizations. In 2018, CEO Vincent Ramos was arrested and later pled guilty to RICO charges for knowingly providing secure devices for illicit use. Phantom Secure's takedown triggered law enforcement efforts that eventually spawned ANOM
Samourai Wallet
A privacy-focused Bitcoin wallet known for features like CoinJoin and Whirlpool mixing. In April 2024, U.S. authorities arrested founders Keonne Rodriguez and William Hill, charging them with money laundering and unlicensed transmission. The FBI seized infrastructure and source servers, effectively ending the project. A blow to financial privacy advocates
Tornado Cash
A non-custodial Ethereum mixer enabling anonymous transactions through zero-knowledge proofs (zk-SNARKs). In August 2022, the U.S. Treasury's OFAC sanctioned the protocol, the first time software code itself was blacklisted. Dutch authorities arrested developer Alexey Pertsev under money-laundering allegations. Tornado Cash remains a legal and philosophical test of whether open source privacy tools can exist under regulation
These services made architectural choices or policy decisions that fundamentally compromise user privacy.
Proton Mail / Proton VPN
Swiss-based encrypted email and VPN provider operated by Proton AG. Despite its reputation for privacy, Proton admitted in 2021 that it had logged user IP addresses under a Swiss court order tied to Europol and French police. While Proton states it doesn't log by default, it retains the technical capability to comply. Its VPN and abuse-monitoring systems can correlate traffic between entry IPs and activity, as acknowledged by its team. Critics highlight ties to the World Economic Forum and question the company's growing institutional alignment
Tutanota / Tuta
German encrypted email service claiming end-to-end encryption for messages and calendar data. Under German telecommunication law (§110 TKG), providers can be compelled to enable lawful interception and IP address logging. In 2020, a regional court order forced Tutanota to monitor inbox activity for specific users. The company complied under protest, acknowledging that targeted monitoring was technically possible. While Tuta maintains transparency via its transparency report, it illustrates how jurisdiction trumps encryption promises
Telegram
Founded by Pavel Durov, Telegram markets itself as a privacy-focused messaging app but is not end-to-end encrypted by default. Group chats and cloud messages are stored on centralized servers under Telegram's control, and only "Secret Chats" use end-to-end encryption. Telegram employs proprietary cryptography (MTProto), which has been criticized by cryptographers for lacking formal security proofs and peer review. Its opaque infrastructure and data access in certain jurisdictions make it unsuitable for high-security communication
Dual_EC_DRBG
A pseudorandom number generator standardized by NIST in 2006 as part of SP 800-90A. Developed by the NSA, it was later proven to contain a mathematical backdoor enabling anyone with specific internal parameters to predict outputs and decrypt traffic. In 2013, the Snowden leaks revealed that RSA Security allegedly accepted $10 million from the NSA to make Dual_EC_DRBG the default in its BSafe library. Withdrawn by NIST in 2014, it remains a textbook example of state sabotage in cryptography
Juniper Networks Backdoor
In December 2015, Juniper disclosed the discovery of unauthorized code in its ScreenOS firewall software that allowed VPN decryption and administrative access. Forensic analysis by researchers like Matthew Green revealed that the code modified Juniper's random number generator, replacing NSA's Dual_EC_DRBG constants with a different unknown key, implying a second actor had hijacked an NSA backdoor. The breach demonstrated that once backdoors exist, anyone can exploit them, including rival states or hackers
Privacy tools that were acquired by companies with different incentives.
Wickr
Founded in 2012 as a secure messaging app offering end-to-end encryption and ephemeral communication, Wickr was once popular among journalists, military personnel, and privacy advocates. In 2021, it was acquired by Amazon Web Services (AWS), a company deeply integrated into government surveillance infrastructure, including CIA cloud contracts. Since the acquisition, Wickr has been integrated into AWS enterprise tools and discontinued its free personal service in 2023. The once-independent privacy platform is now part of corporate surveillance architecture
Skype
Originally a peer-to-peer encrypted VoIP service, launched in 2003 by Niklas Zennström and Janus Friis, using technology from Kazaa. In 2011, Microsoft acquired Skype for $8.5 billion and centralized its architecture, removing P2P encryption in favor of server-based routing. Subsequent leaks revealed that Skype was part of the NSA's PRISM program, with access to decrypted calls and chats. Encryption backdoors and warrant compliance turned a once-decentralized service into a surveillance node
Private Internet Access (PIA)
Once the most trusted VPN provider with strong privacy principles, PIA merged with Kape Technologies, formerly Crossrider, a company infamous for developing adware and browser hijackers. Although framed as a merger with a coming name change, Kape, a publicly traded company, further acquired more VPN companies before delisting and going private. Owning multiple VPN brands (CyberGhost, ExpressVPN) and VPN review sites create clear conflicts of interest. Security analysts have raised red flags about consolidation of privacy services under former ad-tech entities
ExpressVPN
Acquired by Kape Technologies in 2021 for $936 million, ExpressVPN's reputation took further damage when its CIO, Daniel Gericke, was revealed to have been part of Project Raven, a UAE surveillance operation targeting journalists and activists. While ExpressVPN maintains it operates independently, its inclusion in the same portfolio as other Kape-owned VPNs and its leadership's history in state-level hacking undermine user confidence
NordVPN / Surfshark
In 2022, Nord Security (parent of NordVPN, founded in Lithuania by Tesonet) merged with Surfshark. Tesonet's past involvement in data mining and proxy traffic monetization sparked concern about NordVPN's independence. Both VPNs now operate under a single corporate umbrella, Nord Security Group, consolidating user data pipelines while marketing "audited no log" claims. Analysts warn this growing VPN oligopoly undermines decentralization in the privacy industry
StartPage
Founded in 1998 as a Dutch privacy search engine, StartPage was long considered an alternative to Google. In 2019, it sold a major ownership stake to System1, an American ad-tech firm specializing in data analytics and targeted advertising. Despite assurances that privacy policies remain unchanged, System1's business model fundamentally conflicts with StartPage's original mission
Every compromised project teaches us something:
Build systems that can't betray their users, even if the developers want to.
The only trusted system is one you can audit yourself, running on hardware you control or can remote attest and verify, using open protocols that can't be backdoored.