{
  "glossary": {
    "en": [
      {
        "id": "2fa",
        "name": "Two-Factor Authentication (2FA)",
        "type": "security concept",
        "keywords": [
          "Two-Factor Authentication",
          "2FA"
        ],
        "resources": [
          {
            "title": "NIST Definition of 2FA",
            "url": "https://csrc.nist.gov/glossary/term/2fa"
          }
        ],
        "description": "Two-Factor Authentication (2FA) is a security process that requires users to provide two distinct forms of identification to access resources, data, or systems. This additional layer of security goes beyond the traditional username and password combination by requiring a second verification method, making it significantly more difficult for unauthorized users to gain access to sensitive information or accounts.\n\nThe two factors in 2FA typically come from different categories: something you know (like a password), something you have (like a phone or security key), or something you are (biometric data like fingerprints). Common implementations include receiving a code via SMS, using an authenticator app, or employing a physical security key. This multi-layered approach means that even if one factor is compromised (such as a password being stolen), an attacker would still need the second factor to gain access.\n\n2FA has become increasingly important in the [[digital security]] landscape as a defense against various cyber threats, including [[phishing]] attacks, credential stuffing, and password breaches. It is widely recommended by security experts and has been adopted by many organizations and online services as a standard security measure. The concept is part of the broader [[multi-factor authentication]] (MFA) family, which can involve three or more factors for even stronger security. In the context of [[cryptocurrency]] and blockchain applications, 2FA is often a crucial component of securing digital wallets and exchange accounts.",
        "links": [
          {
            "key": "digital security",
            "link": null,
            "target": null
          },
          {
            "key": "phishing",
            "link": null,
            "target": null
          },
          {
            "key": "multi-factor authentication",
            "link": null,
            "target": null
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          }
        ]
      },
      {
        "id": "agorism",
        "name": "Agorism",
        "type": "philosophy",
        "resources": [
          {
            "title": "New Libertarian Manifesto by Samuel Edward Konkin III",
            "url": "https://theanarchistlibrary.org/library/samuel-edward-konkin-iii-new-libertarian-manifesto"
          },
          {
            "title": "Counter-Economics by Samuel Edward Konkin III",
            "url": "https://www.amazon.com/Counter-Economics-Samuel-Edward-Konkin-III-ebook/dp/B07KM79V9B"
          }
        ],
        "description": "Agorism is a libertarian political philosophy founded by Samuel Edward Konkin III (SEK3) that promotes the creation of a voluntary society through [[counter-economics]] and peaceful revolution against the state. The term was first introduced at CounterCon I in 1974 and emphasizes direct action through black and grey market activity as a means of living free from state control while simultaneously weakening state power.\n\nAt its core, agorism advocates for the development of alternative economic structures outside of state control, what Konkin called the \"counter-economy.\" This includes all voluntary exchanges that happen outside of state oversight - from informal barter and unlicensed businesses to [[cryptocurrency]] usage and [[tax avoidance]]. Agorists believe that by growing these parallel economic structures, they can gradually make state institutions irrelevant.\n\nThe philosophy represents a left-wing interpretation of Murray Rothbard's [[anarcho-capitalism]], emphasizing worker liberation and opposition to corporate power alongside opposition to state authority. Unlike other anarchist schools that focus on direct confrontation with the state, agorism promotes a gradual transition through expanding counter-economic activity until the state becomes obsolete. This approach aligns with broader [[crypto-anarchist]] and [[cypherpunk]] movements that use technology to create alternative systems beyond state control.",
        "links": [
          {
            "key": "counter-economics",
            "link": null,
            "target": "counter-economics"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "tax avoidance",
            "link": null,
            "target": "tax-avoidance"
          },
          {
            "key": "anarcho-capitalism",
            "link": null,
            "target": "anarchocapitalism"
          },
          {
            "key": "crypto-anarchist",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          }
        ]
      },
      {
        "id": "alternative-education-systems",
        "name": "Alternative Education Systems",
        "type": "concept",
        "description": "Alternative Education Systems refer to educational approaches that differ from traditional, standardized schooling methods by employing diverse pedagogical philosophies and learning environments. These systems often emphasize individualized learning, holistic development, and student autonomy, moving away from rigid curriculum structures and standardized testing. Common examples include *Montessori*, *Waldorf Education*, [[unschooling]], and democratic schools.\n\nThese educational models typically share certain characteristics despite their different approaches: they tend to be more learner-centered, emphasize experiential learning, and focus on developing the whole person rather than just academic achievement. Many alternative education systems emerged as responses to perceived limitations of conventional schooling, with pioneers like Maria Montessori and Rudolf Steiner developing their methods based on observations of how children naturally learn and develop.\n\nThe impact of alternative education systems extends beyond just teaching methods - they often represent different philosophical approaches to human development, society, and the purpose of education itself. These systems frequently incorporate elements of [[self-directed learning]], [[community involvement]], and practical life skills, aiming to prepare individuals not just for academic success but for autonomous, meaningful participation in society. In the context of parallel structures, alternative education systems demonstrate how parallel approaches to learning and development can coexist with and challenge traditional institutional models.",
        "links": [
          {
            "key": "unschooling",
            "link": null,
            "target": null
          },
          {
            "key": "self-directed learning",
            "link": null,
            "target": null
          },
          {
            "key": "community involvement",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "anarchism",
        "name": "Anarchism",
        "type": "philosophy",
        "keywords": [
          "anarchist"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Anarchism\"",
            "url": "https://en.wikipedia.org/wiki/Anarchism"
          }
        ],
        "description": "Anarchism is a political philosophy that advocates for self-governed societies based on voluntary associations. It opposes all involuntary, coercive hierarchy and authority, including but not limited to the state. Instead of centralized power structures, anarchism proposes horizontal organization, mutual aid, and direct action as means of organizing society. The term derives from the Ancient Greek \"anarchos,\" meaning \"without rulers.\"\n\nCore principles of anarchism include [[individual autonomy]], voluntary cooperation, mutual aid, and [[decentralization]]. Anarchists believe that social cooperation should arise through free agreement rather than being imposed by authority. They emphasize [[direct action]] and self-organization as practical methods for achieving social change, often implementing parallel structures and alternative institutions rather than trying to reform existing hierarchical systems.\n\nWhile often mischaracterized as chaos, anarchism has a rich theoretical foundation and diverse practical applications. Various strands exist, including [[mutualism]], which focuses on reciprocal exchange; [[crypto-anarchism]], which applies cryptographic technology to ensure individual liberty; [[agorism]], which promotes counter-economics; and numerous other approaches that share the common goal of maximizing human freedom while opposing centralized control. Modern anarchist practices often incorporate [[decentralized technologies]], [[peer-to-peer]] networks, and alternative economic systems.",
        "links": [
          {
            "key": "individual autonomy",
            "link": null,
            "target": null
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "direct action",
            "link": null,
            "target": null
          },
          {
            "key": "mutualism",
            "link": null,
            "target": null
          },
          {
            "key": "crypto-anarchism",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "agorism",
            "link": null,
            "target": "agorism"
          },
          {
            "key": "decentralized technologies",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          }
        ]
      },
      {
        "id": "anarchocapitalism",
        "name": "Anarchocapitalism",
        "type": "philosophy",
        "keywords": [
          "Anarcho-capitalism",
          "ancap"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Anarcho-capitalism\"",
            "url": "https://en.wikipedia.org/wiki/Anarcho-capitalism"
          },
          {
            "title": "Svobodný přístav (CZ)",
            "lang": "cs",
            "url": "https://pristav.urza.cz/"
          }
        ],
        "description": "Anarchocapitalism is a political philosophy and economic theory that advocates for the elimination of the state in favor of individual sovereignty, private property, and [[free markets]]. It combines anarchism's rejection of the state with capitalism's emphasis on private ownership and voluntary exchange.\n\nAt its core, anarchocapitalism proposes a society based on voluntary associations among individuals and private organizations. It argues that all goods and services, including law enforcement, courts, and defense, should be provided by privately funded competitors rather than through taxation and government monopolies. Key principles include the [[non-aggression principle]] (NAP), which opposes the initiation of force against individuals or their property, and strong protection of [[property rights]].\n\nProminent thinkers associated with anarchocapitalism include [Murray Rothbard](https://en.wikipedia.org/wiki/Murray_Rothbard), who developed its foundational theory, and [David Friedman](https://en.wikipedia.org/wiki/David_D._Friedman), who approached it from a consequentialist perspective. The philosophy has influenced various movements, including some strands of [[libertarianism]] and [[crypto-anarchism]]. However, it has faced criticism from both traditional anarchists, who view capitalism as inherently hierarchical and oppressive, and from other political philosophies that argue for the necessity of the state in maintaining social order and providing public goods. Critics also question the practicality of private law and defense systems proposed by anarchocapitalists.",
        "links": [
          {
            "key": "free markets",
            "link": null,
            "target": "free-market"
          },
          {
            "key": "non-aggression principle",
            "link": null,
            "target": "nap"
          },
          {
            "key": "property rights",
            "link": null,
            "target": null
          },
          {
            "key": "libertarianism",
            "link": null,
            "target": "libertarianism"
          },
          {
            "key": "crypto-anarchism",
            "link": null,
            "target": "cryptoanarchy"
          }
        ]
      },
      {
        "id": "anonymous-communication",
        "name": "Anonymous Communication",
        "type": "concept",
        "description": "Anonymous communication refers to methods and technologies that enable people to exchange information while concealing their identities and protecting their privacy. This is a fundamental concept in digital freedom and [[privacy]], achieved through various technical means like [[encryption]], routing protocols, and specialized networks. The most well-known implementation is the [[Tor]] network, which enables anonymous internet browsing and communication through a volunteer-operated overlay network.\n\nThe need for anonymous communication stems from various concerns, including protection from [[surveillance]], [[censorship resistance]], and preservation of civil liberties. It builds upon [[cypherpunk]] principles and employs techniques such as [[onion routing]], which encrypts data in multiple layers and routes it through several intermediate nodes before reaching its destination. This makes it extremely difficult for observers to trace the communication back to its source or determine its intended recipient.\n\nAnonymous communication systems play a crucial role in protecting [[whistleblowers]], journalists, activists, and ordinary citizens who need privacy in their digital interactions. However, these systems also face challenges from various actors who seek to compromise or restrict anonymous communication capabilities, leading to an ongoing technological arms race between privacy advocates and surveillance entities. The development of anonymous communication tools continues to evolve alongside advances in [[cryptography]] and network security.",
        "links": [
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "surveillance",
            "link": null,
            "target": "mass-surveillance"
          },
          {
            "key": "censorship resistance",
            "link": null,
            "target": "censorship-resistance"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "onion routing",
            "link": null,
            "target": "onion-routing"
          },
          {
            "key": "whistleblowers",
            "link": null,
            "target": null
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          }
        ]
      },
      {
        "id": "assassination-politics",
        "name": "Assassination Politics",
        "type": "concept",
        "resources": [
          {
            "title": "The Jim Bell System Revisited",
            "url": "https://news.bitcoin.com/the-jim-bell-system-revisited/"
          },
          {
            "title": "Original Essay \"Assassination Politics\" (1995-96)",
            "url": "https://cryptome.org/ap.htm"
          }
        ],
        "description": "Assassination Politics is a controversial concept proposed by [[crypto-anarchist]] [Jim Bell](/p/jim-bell) in a 1995-96 essay series that describes a system for anonymously crowdfunding political assassinations using [[cryptography]] and digital cash. The system proposed combining [[prediction markets]] with anonymous payment systems to create what Bell argued would be a tool for enforcing political accountability, though the concept has been widely criticized on both ethical and practical grounds.\n\nThe theoretical system would work by allowing people to anonymously contribute funds to predict when a given person would die, with the correct predictor receiving the pool of money - effectively creating a bounty system. Bell argued this would create a form of \"insurance\" against political corruption and abuse of power, as politicians would be deterred from acting against the public interest by the threat of assassination. The concept gained renewed attention with the emergence of [[Bitcoin]] and other cryptocurrencies that could potentially enable such anonymous payment systems.\n\nWhile primarily a thought experiment exploring the implications of strong cryptography and anonymous digital cash, Assassination Politics remains highly controversial and has been criticized for promoting violence and potentially enabling terrorism. The concept has influenced discussions around [[crypto-anarchism]], [[digital privacy]], and the societal implications of [[anonymous payment systems]], though most crypto-anarchists and [[cypherpunks]] distance themselves from its more extreme conclusions.",
        "links": [
          {
            "key": "crypto-anarchist",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "prediction markets",
            "link": null,
            "target": "prediction-markets"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "crypto-anarchism",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "digital privacy",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "anonymous payment systems",
            "link": null,
            "target": null
          },
          {
            "key": "cypherpunks",
            "link": null,
            "target": "cyberpunk"
          }
        ]
      },
      {
        "id": "biohacking",
        "name": "Biohacking",
        "type": "movement",
        "description": "Biohacking is a broad movement focused on optimizing human biology and performance through technological and biological interventions. It encompasses various approaches, from DIY biology and self-experimentation to lifestyle optimization and technological augmentation. The term emerged in the early 2000s and has since grown into a global movement that combines elements of [[citizen science]], [[self-quantification]], and human enhancement.\n\nThe biohacking movement can be divided into several distinct but overlapping categories: DIY biology (conducting biological experiments outside traditional institutions), lifestyle optimization (using data and interventions to improve health and performance), and the [[grinder movement]] (body modification through technological implants). Practitioners range from citizen scientists working in community labs to individuals tracking their biomarkers and experimenting with supplements, diet, and exercise protocols to achieve optimal performance.\n\nThe movement raises important questions about democratizing science, personal autonomy, and the future of human enhancement. While some biohackers focus on accessible health optimization through nutrition and lifestyle changes, others push boundaries with genetic experimentation and cybernetic implants. This has led to ongoing debates about safety, ethics, and regulation in the field. The movement intersects with other philosophies like [[transhumanism]] and has influenced discussions about the future of healthcare, scientific research, and human evolution.",
        "links": [
          {
            "key": "citizen science",
            "link": null,
            "target": null
          },
          {
            "key": "self-quantification",
            "link": null,
            "target": null
          },
          {
            "key": "grinder movement",
            "link": null,
            "target": null
          },
          {
            "key": "transhumanism",
            "link": null,
            "target": "transhumanism"
          }
        ]
      },
      {
        "id": "bitcoin",
        "name": "Bitcoin",
        "type": "blockchain",
        "keywords": [
          "btc"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Bitcoin\"",
            "url": "https://en.wikipedia.org/wiki/Bitcoin"
          }
        ],
        "description": "Bitcoin is the world's first decentralized [[cryptocurrency]], introduced in 2009 by an anonymous entity known as [[Satoshi Nakamoto]]. It operates on a [[peer-to-peer]] network without the need for intermediaries, using [[blockchain]] technology to maintain a public ledger of all transactions. Bitcoin was created as a response to the 2008 financial crisis, aiming to provide a currency independent of central banks and government control.\n\nThe core innovation of Bitcoin lies in its solution to the [[double-spending problem]] and its [[consensus mechanism]] known as [[Proof of Work]]. This system allows for secure, verifiable transactions without a trusted third party. Bitcoin has a fixed supply cap of 21 million coins, with new bitcoins created through a process called [[mining|cryptocurrency mining]], where powerful computers solve complex mathematical problems to validate transactions and add new blocks to the blockchain.\n\nSince its inception, Bitcoin has grown from a niche interest among cryptography enthusiasts to a global financial phenomenon. It has inspired the creation of thousands of other cryptocurrencies and sparked debates about the future of money, financial privacy, and monetary policy. While proponents view Bitcoin as a hedge against inflation and a tool for financial sovereignty, critics point to its price volatility, environmental concerns due to energy-intensive mining, and its use in illicit activities. Despite controversies, Bitcoin continues to evolve, with developments like the [[Lightning Network]] aiming to address scalability issues.",
        "links": [
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "Satoshi Nakamoto",
            "link": null,
            "target": "satoshi-nakamoto"
          },
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "double-spending problem",
            "link": null,
            "target": "double-spending-problem"
          },
          {
            "key": "consensus mechanism",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "Proof of Work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "mining",
            "link": "cryptocurrency mining",
            "target": null
          },
          {
            "key": "Lightning Network",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "bittorrent",
        "name": "BitTorrent",
        "type": "protocol",
        "resources": [
          {
            "title": "BitTorrent Protocol Specification",
            "url": "https://www.bittorrent.org/beps/bep_0003.html"
          }
        ],
        "description": "BitTorrent is a [[peer-to-peer]] (P2P) communication protocol for file sharing that enables users to distribute and share data in a decentralized manner. Instead of downloading files from a single centralized server, BitTorrent allows users to download pieces of files from multiple peers simultaneously, making the distribution process more efficient and resilient while reducing the bandwidth cost for the original distributor.\n\nThe protocol, created by Bram Cohen in 2001, works by breaking files into small pieces that can be downloaded in any order from different peers in the network. Users (called \"peers\") download pieces of the file they want while simultaneously uploading pieces they already have to other users, creating a collaborative distribution network. This system of reciprocity, where users both download and upload (known as \"seeding\"), is fundamental to the protocol's effectiveness and has influenced many subsequent [[decentralized]] systems.\n\nBitTorrent's impact on digital culture and technology has been profound, demonstrating the viability of [[decentralized]] systems at scale. The protocol's success contributed to the rise of various movements including anti-copyright activism and digital rights discussions, while also influencing the development of blockchain technologies and other [[peer-to-peer]] systems. Its architecture has inspired many modern decentralized applications and protocols, showing how distributed systems can effectively replace traditional centralized structures.",
        "links": [
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "decentralized",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "decentralized",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          }
        ]
      },
      {
        "id": "blockchain",
        "name": "Blockchain",
        "type": "technology",
        "keywords": [
          "blockchain technology"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Blockchain\"",
            "url": "https://en.wikipedia.org/wiki/Blockchain"
          }
        ],
        "description": "Blockchain is a distributed ledger technology that enables secure, transparent, and tamper-resistant record-keeping without the need for a central authority. First conceptualized by [[Satoshi Nakamoto]] in 2008 as the underlying technology for [[Bitcoin]], blockchain has since evolved into a broader technological framework with applications far beyond cryptocurrencies.\n\nAt its core, a blockchain is a chain of blocks containing digital information, cryptographically linked and replicated across a network of computers. Each block typically contains a set of transactions or data, a timestamp, and a reference to the previous block, creating an immutable and auditable history. The decentralized nature of blockchain systems, coupled with [[consensus mechanisms]] like [[Proof of Work]] or [[Proof of Stake]], ensures data integrity and resistance to manipulation.\n\nWhile initially associated primarily with [[cryptocurrencies]], blockchain technology has found diverse applications across industries. [[Smart contracts]], self-executing agreements with the terms directly written into code, have enabled the development of [[decentralized finance (DeFi)]] platforms and [[non-fungible tokens (NFTs)]]. Beyond finance, blockchain is being explored for use in supply chain management, voting systems, identity verification, and other fields where transparency, traceability, and trust are paramount. Despite its potential, blockchain technology faces challenges including scalability, energy consumption, and regulatory uncertainties.",
        "links": [
          {
            "key": "Satoshi Nakamoto",
            "link": null,
            "target": "satoshi-nakamoto"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "consensus mechanisms",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "Proof of Work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "Proof of Stake",
            "link": null,
            "target": "proof-of-stake"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "Smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "decentralized finance (DeFi)",
            "link": null,
            "target": "defi"
          },
          {
            "key": "non-fungible tokens (NFTs)",
            "link": null,
            "target": "nft"
          }
        ]
      },
      {
        "id": "byzantine-generals-problem",
        "name": "Byzantine Generals Problem",
        "type": "concept",
        "keywords": [
          "Byzantine fault"
        ],
        "resources": [
          {
            "title": "Understanding the Byzantine Generals Problem",
            "url": "https://medium.com/coinmonks/a-note-from-anthony-if-you-havent-already-please-read-the-article-gaining-clarity-on-key-787989107969"
          },
          {
            "title": "Byzantine Fault Tolerance on Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Byzantine_fault"
          }
        ],
        "description": "The Byzantine Generals Problem is a fundamental concept in [[distributed systems]] that illustrates the challenges of reaching [[consensus]] among multiple parties who need to agree on a single strategy, while some participants may be unreliable or malicious. The problem is presented as an allegory where multiple Byzantine generals must coordinate an attack on a city, but can only communicate through messengers, and some generals might be traitors trying to sabotage the plan.\n\nThis problem, first formalized by Leslie Lamport, Robert Shostak, and Marshall Pease in 1982, demonstrates the difficulties in achieving reliable consensus in distributed computer systems where components may fail or act maliciously. The challenge lies in ensuring that all honest participants can reach agreement despite the presence of faulty or malicious actors, a crucial requirement for many distributed systems including [[blockchain]] networks and [[cryptocurrencies]].\n\nThe solution to the Byzantine Generals Problem has been particularly influential in the development of [[blockchain technology]] and [[consensus mechanisms]]. [[Bitcoin]]'s [[Proof of Work]] system represents one practical solution to this problem in a permissionless setting, while other consensus algorithms like [[Practical Byzantine Fault Tolerance (PBFT)]] and [[Federated Byzantine Agreement (FBA)]] offer different approaches for various types of distributed systems. These solutions enable the creation of trustless, decentralized systems that can maintain consensus even in the presence of malicious actors.",
        "links": [
          {
            "key": "distributed systems",
            "link": null,
            "target": null
          },
          {
            "key": "consensus",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "blockchain technology",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "consensus mechanisms",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "Proof of Work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "Practical Byzantine Fault Tolerance (PBFT)",
            "link": null,
            "target": null
          },
          {
            "key": "Federated Byzantine Agreement (FBA)",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "canary-file",
        "name": "Canary File",
        "type": "security measure",
        "keywords": [
          "Warrant Canary"
        ],
        "resources": [
          {
            "title": "What is a warrant canary? | Cloudflare",
            "url": "https://www.cloudflare.com/learning/privacy/what-is-warrant-canary/"
          },
          {
            "title": "Warrant Canary - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Warrant_canary"
          }
        ],
        "description": "A canary file (or warrant canary) is a method used by service providers to indirectly inform their users that they have not received any secret government subpoenas or warrants for user data. The concept is named after the historical practice of using canaries in coal mines to detect dangerous gases - when the canary stops singing (or in this case, when the warrant canary statement disappears), it serves as a warning signal.\n\nThe mechanism works through regular transparency reports where companies publish statements declaring they have not received any secret government orders. If such an order is received, the company simply removes the canary statement from their next report, thereby alerting users to potential surveillance without directly violating gag orders that typically accompany such warrants. This practice emerged as a response to laws that prevent companies from explicitly disclosing when they receive certain types of government surveillance orders.\n\nWarrant canaries have become an important tool in the [[privacy]] and [[transparency]] landscape, particularly for technology companies and service providers committed to protecting user privacy. However, their legal status remains somewhat unclear, and their effectiveness depends on users actively monitoring these statements for changes. Companies like Reddit and various [[VPN]] providers have notably used warrant canaries as part of their commitment to transparency, though some have disappeared over time, raising questions about government requests and the balance between national security and privacy rights.",
        "links": [
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "transparency",
            "link": null,
            "target": null
          },
          {
            "key": "VPN",
            "link": null,
            "target": "vpn"
          }
        ]
      },
      {
        "id": "censorship-resistance",
        "name": "Censorship Resistance",
        "type": "concept",
        "description": "Censorship resistance is a fundamental property of decentralized networks that prevents any entity, whether governments, corporations, or individuals, from altering, blocking, or controlling transactions and information flow within the system. This characteristic is achieved through decentralization, cryptography, and consensus mechanisms that ensure no single party can exert unilateral control over the network. [[Bitcoin]] is often considered the most censorship-resistant cryptocurrency due to its highly decentralized nature.\n\nThe concept emerged as a core principle of [[cryptocurrency]] networks, drawing from [[cypherpunk]] ideals of privacy and freedom from institutional control. Censorship resistance works through a combination of technical features: [[cryptography]] protects communications and transactions, [[distributed networks]] prevent single points of failure, and economic incentives encourage network participants to maintain the system's integrity rather than attempt to censor it.\n\nIn practice, censorship resistance exists on a spectrum, with more decentralized systems generally offering stronger protection against interference. This property has become increasingly important in an era of digital surveillance and control, as it enables individuals to transact and communicate freely without permission from central authorities. The concept extends beyond just financial transactions to include resistance against content censorship, making it crucial for preserving digital freedom and [[privacy]] in various applications of [[blockchain]] technology.",
        "links": [
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "distributed networks",
            "link": null,
            "target": null
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          }
        ]
      },
      {
        "id": "consensus-mechanism",
        "name": "Consensus Mechanism",
        "type": "concept",
        "keywords": [
          "consensus mechanisms",
          "consensus"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Consensus (computer science)\"",
            "url": "https://en.wikipedia.org/wiki/Consensus_(computer_science)"
          }
        ],
        "description": "A consensus mechanism is a fault-tolerant protocol used in [[blockchain]] systems and distributed computing to achieve agreement on a single data value or state of the network among distributed processes or multi-agent systems. In the context of cryptocurrencies and blockchain technology, consensus mechanisms ensure that all nodes in the network agree on the validity of transactions and the order in which they are added to the ledger.\n\nThe most well-known consensus mechanisms include [[Proof of Work (PoW)]], used by [[Bitcoin]], and [[Proof of Stake (PoS)]], employed by [[Ethereum]] and other cryptocurrencies. Other notable mechanisms include *Delegated Proof of Stake (DPoS)*, *Practical Byzantine Fault Tolerance (PBFT)*, and *Proof of Authority (PoA)*. Each mechanism has its own set of trade-offs in terms of security, decentralization, scalability, and energy efficiency.\n\nConsensus mechanisms play a crucial role in solving the [[Byzantine Generals' Problem|Byzantine fault]] in distributed systems, ensuring that the network can reach agreement even in the presence of malicious actors or faulty nodes. The choice of consensus mechanism significantly impacts a blockchain's performance, security model, and overall design. As the field evolves, researchers and developers continue to explore new consensus algorithms to address limitations of existing models and to meet the specific needs of various blockchain applications.",
        "links": [
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "Proof of Work (PoW)",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "Proof of Stake (PoS)",
            "link": null,
            "target": "proof-of-stake"
          },
          {
            "key": "Ethereum",
            "link": null,
            "target": "ethereum"
          },
          {
            "key": "Byzantine Generals' Problem",
            "link": "Byzantine fault",
            "target": "byzantine-generals-problem"
          }
        ]
      },
      {
        "id": "counter-economics",
        "name": "Counter-economics",
        "type": "concept",
        "keywords": [
          "counter economics"
        ],
        "resources": [
          {
            "title": "Counter-Economics by Samuel Edward Konkin III",
            "url": "https://www.amazon.com/Counter-Economics-Samuel-Edward-Konkin-III-ebook/dp/B07KM79V9B"
          },
          {
            "title": "Black-Market Activism - Libertarianism.org",
            "url": "https://www.libertarianism.org/columns/black-market-activism-agorism-samuel-edward-konkin-iii"
          }
        ],
        "description": "Counter-economics is a philosophical and practical approach to economic activity that operates outside state control, developed by Samuel Edward Konkin III as part of his theory of [[Agorism]]. It encompasses all peaceful economic activity that takes place in the informal sector, including black and grey markets, and is seen as a means of undermining state power through economic civil disobedience.\n\nThe concept forms the practical foundation of Agorism, proposing that individuals can gradually reduce state power by engaging in voluntary exchanges and business activities that circumvent government regulation, taxation, and control. This includes activities ranging from informal labor and barter to the development of alternative currencies and underground markets, all conducted through peaceful and voluntary means.\n\nCounter-economics emphasizes the importance of building parallel economic structures that exist independently of state control. By participating in counter-economic activity, individuals can simultaneously protect their privacy, preserve their wealth from taxation, and contribute to the growth of a voluntary society. This approach aligns with both [[cryptocurrency]] adoption and the broader [[crypto-anarchist]] movement, as it promotes the development of tools and systems that enable economic freedom outside traditional state-controlled channels.",
        "links": [
          {
            "key": "Agorism",
            "link": null,
            "target": "agorism"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "crypto-anarchist",
            "link": null,
            "target": "cryptoanarchy"
          }
        ]
      },
      {
        "id": "crypto-discourse",
        "name": "Crypto-discourse",
        "type": "concept",
        "resources": [
          {
            "title": "Psycholinguistic and emotion analysis of cryptocurrency discourse",
            "url": "https://www.nature.com/articles/s41598-024-58929-4"
          }
        ],
        "description": "Crypto-discourse refers to the unique communication patterns, language, and modes of discussion that have emerged within the [[cryptocurrency]] and [[blockchain]] communities. It encompasses the specialized terminology, cultural norms, and rhetorical styles used by participants in crypto-related spaces, including social media platforms, forums, and other digital communication channels. This discourse reflects the intersection of technical, economic, and ideological aspects of the crypto movement.\n\nThe crypto-discourse is characterized by a blend of technical jargon from [[cryptography]], computer science, and economics, combined with community-specific slang, memes, and cultural references. Common elements include discussions about [[decentralization]], [[privacy]], financial freedom, and technological innovation. The discourse often reflects the underlying values of the [[cypherpunk]] movement and [[crypto-anarchism]], emphasizing concepts like trustlessness, individual sovereignty, and resistance to traditional financial systems.\n\nThis form of communication serves multiple purposes within the crypto community: it facilitates technical discussions, builds community cohesion, spreads awareness about projects and ideas, and helps establish credibility among participants. The crypto-discourse has evolved alongside the technology itself, incorporating elements from various subcultures including [[hacker culture]], [[libertarianism]], and [[digital activism]]. It plays a crucial role in shaping public perception of cryptocurrency projects and the broader movement for digital freedom.",
        "links": [
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "crypto-anarchism",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "hacker culture",
            "link": null,
            "target": null
          },
          {
            "key": "libertarianism",
            "link": null,
            "target": "libertarianism"
          },
          {
            "key": "digital activism",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "crypto-wars",
        "name": "Crypto Wars",
        "year": "1990s",
        "type": "historical event",
        "resources": [
          {
            "title": "Doomed to Repeat History? Lessons from the Crypto Wars of the 1990s",
            "url": "https://newamerica.org/cybersecurity-initiative/policy-papers/doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/"
          },
          {
            "title": "Crypto Wars - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Crypto_Wars"
          }
        ],
        "description": "The Crypto Wars refers to the ongoing political and legal battles between governments (particularly the United States) and advocates of strong [[encryption]], centered around attempts to restrict or control public access to cryptographic technologies. This conflict emerged prominently in the 1990s when the US government tried to maintain control over encryption through export controls and proposals like the [[Clipper Chip]], setting off a debate between national security interests and digital privacy rights that continues today.\n\nThe first major phase of the Crypto Wars occurred in the 1990s, when the US government treated strong encryption as a form of munition, requiring export licenses and attempting to mandate \"backdoors\" for law enforcement access. This period saw significant resistance from [[cypherpunk]]s, technology companies, and civil liberties groups who argued that strong encryption was essential for privacy, commerce, and democracy in the digital age. The debate culminated in the relaxation of export controls in 2000, marking a victory for encryption advocates.\n\nThe concept of Crypto Wars has experienced a resurgence in recent years, sometimes called \"Crypto Wars 2.0,\" as governments worldwide continue to seek ways to access encrypted communications in the name of law enforcement and national security. This ongoing tension reflects fundamental questions about the balance between individual privacy and state power in the digital age, touching on issues like [[end-to-end encryption]], [[backdoors]], and the role of [[surveillance]] in modern society. The debate has become increasingly relevant with the rise of [[cryptocurrency|cryptocurrencies]] and other privacy-enhancing technologies.",
        "links": [
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "Clipper Chip",
            "link": null,
            "target": null
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "end-to-end encryption",
            "link": null,
            "target": "e2ee"
          },
          {
            "key": "backdoors",
            "link": null,
            "target": null
          },
          {
            "key": "surveillance",
            "link": null,
            "target": "mass-surveillance"
          },
          {
            "key": "cryptocurrency",
            "link": "cryptocurrencies",
            "target": "cryptocurrency"
          }
        ]
      },
      {
        "id": "cryptoanarchists-manifesto",
        "name": "Crypto Anarchist Manifesto",
        "type": "document",
        "year": 1988,
        "resources": [
          {
            "title": "Original Crypto Anarchist Manifesto",
            "url": "https://activism.net/cypherpunk/crypto-anarchy.html"
          }
        ],
        "description": "The Crypto Anarchist Manifesto is a seminal document written by [Timothy C. May](/p/timothy-c-may) in 1988 that laid the philosophical foundation for the [[crypto-anarchy]] movement and influenced the broader [[cypherpunk]] ideology. The manifesto predicted how [[cryptography]] and digital technologies would fundamentally transform the nature of corporations and government interference in economic transactions. It envisioned a future where cryptographic software would allow individuals to freely interact and conduct business anonymously, beyond state control.\n\nThe document begins with the famous line \"A specter is haunting the modern world - the specter of crypto anarchy\" (an allusion to The Communist Manifesto), and goes on to describe how the combination of [[cryptography]] and digital money would create a new borderless market system operating outside traditional state boundaries. May argued that these technologies would shift power from centralized institutions back to individuals, enabling truly free markets and private, voluntary interactions while making government regulation and taxation increasingly difficult to enforce.\n\nThe manifesto proved remarkably prescient, anticipating many developments that would later emerge with [[Bitcoin]] and other [[cryptocurrencies]], [[smart contracts]], and [[decentralized systems]]. Its ideas heavily influenced early [[cypherpunk]] discussions and helped spark a movement dedicated to developing privacy-enhancing technologies and digital currency systems. The document remains highly relevant today as society grapples with questions of [[privacy]], [[surveillance|mass surveillance]], and the role of state power in the digital age.",
        "links": [
          {
            "key": "crypto-anarchy",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "decentralized systems",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "surveillance",
            "link": "mass surveillance",
            "target": "mass-surveillance"
          }
        ]
      },
      {
        "id": "cryptoanarchy",
        "name": "Cryptoanarchy",
        "type": "movement",
        "keywords": [
          "crypto-anarchy",
          "cryptoanarchism",
          "crypto-anarchism",
          "crypto-anarchist"
        ],
        "related": [
          "cryptoanarchists-manifesto"
        ],
        "resources": [
          {
            "title": "cryptoanarchy.wiki",
            "url": "https://cryptoanarchy.wiki/"
          },
          {
            "title": "Wikipedia article \"Crypto-anarchism\"",
            "url": "https://en.wikipedia.org/wiki/Crypto-anarchism"
          }
        ],
        "description": "Cryptoanarchy is a political philosophy and technological movement that advocates for the use of strong [[cryptography]] and privacy-enhancing technologies to advance individual liberty, economic freedom, and political autonomy. Emerging in the late 1980s with the [[Cypherpunk]] movement, cryptoanarchy draws inspiration from [[anarchist]] and [[libertarian]] ideals, as well as from technological innovations in computer science and cryptography.\n\nCentral to cryptoanarchist thought is the belief that widespread adoption of encryption, [[anonymous networks]], and [[decentralized systems]] can fundamentally reshape social and economic structures by undermining state surveillance, censorship, and financial control. Key figures like [Timothy C. May](/p/timothy-c-may) and [[Eric Hughes]] laid the groundwork for the movement, advocating for tools such as [[cryptocurrency]], [[secure communication]] protocols, and [[smart contracts]] to create autonomous digital spaces beyond government reach.\n\nThe cryptoanarchist vision has significantly influenced technological development, inspiring projects like [[Bitcoin]], [[Tor]], and [[WikiLeaks]]. The ongoing debate surrounding cryptoanarchy encompasses issues of digital rights, online privacy, financial regulation, and the balance between individual freedom and collective security in the digital age.",
        "links": [
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "Cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "anarchist",
            "link": null,
            "target": "anarchism"
          },
          {
            "key": "libertarian",
            "link": null,
            "target": "libertarianism"
          },
          {
            "key": "anonymous networks",
            "link": null,
            "target": null
          },
          {
            "key": "decentralized systems",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "Eric Hughes",
            "link": null,
            "target": null
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "secure communication",
            "link": null,
            "target": "secure-communication"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "WikiLeaks",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "cryptocurrency",
        "name": "Cryptocurrency",
        "type": "concept",
        "keywords": [
          "cryptocurrencies",
          "Cryptocurrencies",
          "cryptocurrency"
        ],
        "description": "Cryptocurrencies are digital or virtual currencies that use cryptography for security, operating on decentralized networks based on [[blockchain technology]]. Unlike traditional currencies issued by central banks, cryptocurrencies are typically not subject to governmental monetary policies and often aim to provide alternatives to conventional financial systems.\n\nAt their core, cryptocurrencies rely on distributed ledger technology, most commonly blockchain, to record all transactions across a network of computers. This system ensures transparency, security, and immutability of transaction records without the need for a central authority. Key features include [[decentralization]], [[pseudonymity]], and the use of [[consensus mechanisms]] like [[Proof of Work]] or [[Proof of Stake]] to validate transactions and create new units of the currency.\n\n[[Bitcoin]], created in 2009 by an unknown person or group using the pseudonym [[Satoshi Nakamoto]], was the first and remains the most well-known cryptocurrency. Since then, thousands of alternative cryptocurrencies (often called \"altcoins\") have been created, with [[Ethereum]], Litecoin, Solana among the more prominent ones. Beyond serving as digital money, many cryptocurrencies support additional features like [[smart contracts]] and [[decentralized applications (DApps)]]. While cryptocurrencies have gained significant attention and adoption, they also face challenges including price volatility, regulatory scrutiny, and concerns about their environmental impact, particularly for those using energy-intensive mining processes.",
        "links": [
          {
            "key": "blockchain technology",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "pseudonymity",
            "link": null,
            "target": "pseudonimity"
          },
          {
            "key": "consensus mechanisms",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "Proof of Work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "Proof of Stake",
            "link": null,
            "target": "proof-of-stake"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "Satoshi Nakamoto",
            "link": null,
            "target": "satoshi-nakamoto"
          },
          {
            "key": "Ethereum",
            "link": null,
            "target": "ethereum"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "decentralized applications (DApps)",
            "link": null,
            "target": "dapps"
          }
        ]
      },
      {
        "id": "cryptographic-voting-systems",
        "name": "Cryptographic Voting Systems",
        "type": "technology",
        "resources": [
          {
            "title": "End-to-end auditable voting - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/End-to-end_auditable_voting"
          }
        ],
        "description": "Cryptographic voting systems are advanced electronic voting solutions that use [[cryptography]] to ensure secure, verifiable, and transparent democratic processes. These systems, also known as end-to-end auditable (E2E) voting systems, employ sophisticated mathematical techniques to protect voter privacy while maintaining the integrity of the election process. They represent a crucial intersection of [[cryptography]], democracy, and digital rights.\n\nThe core security properties of cryptographic voting systems include voter privacy (ensuring votes remain secret), receipt-freeness (preventing vote buying by making it impossible to prove how one voted), coercion resistance (protecting voters from being forced to vote a certain way), and end-to-end verifiability (allowing voters to verify their votes were correctly counted without compromising ballot secrecy). These systems utilize various cryptographic primitives such as [[zero-knowledge proofs]], [[homomorphic encryption]], and commitment schemes to achieve these properties.\n\nWhile cryptographic voting systems offer promising solutions for modern democratic processes, they face various challenges including the need to balance security with usability, the requirement for robust auditing mechanisms, and the necessity to maintain trust in the system's implementation. These systems are particularly relevant to discussions about digital democracy, [[decentralized governance]], and the future of democratic participation in an increasingly digital world. Their development continues to be influenced by both technological advances in cryptography and evolving requirements for democratic processes.",
        "links": [
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "zero-knowledge proofs",
            "link": null,
            "target": "zero-knowledge-proof"
          },
          {
            "key": "homomorphic encryption",
            "link": null,
            "target": "homomorphic-encryption"
          },
          {
            "key": "decentralized governance",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "cryptography",
        "name": "Cryptography",
        "type": "technology",
        "resources": [
          {
            "title": "IBM - The History of Cryptography",
            "url": "https://www.ibm.com/think/topics/cryptography-history"
          },
          {
            "title": "Wikipedia - Cryptography",
            "url": "https://en.wikipedia.org/wiki/Cryptography"
          }
        ],
        "description": "Cryptography is the science and practice of securing communication and information through the use of codes, ciphers, and other methods of [[encryption]]. It is a branch of mathematics and computer science that focuses on developing techniques to protect the confidentiality, integrity, and authenticity of data, making it readable only to intended recipients while keeping it unintelligible to unauthorized parties.\n\nThe history of cryptography spans thousands of years, from simple substitution ciphers used in ancient civilizations to complex mathematical algorithms employed in modern digital systems. Traditional cryptography relied on manual methods and mechanical devices, while modern cryptography uses sophisticated mathematical equations and computer-based systems to create secure encryption protocols. This evolution has been driven by advances in technology and the increasing need for secure communication in our digital world.\n\nIn contemporary society, cryptography has become fundamental to many aspects of digital life, including [[secure communications]], [[digital signatures]], [[cryptocurrency]] systems, and [[cybersecurity]]. It plays a crucial role in protecting sensitive information in various applications such as online banking, secure messaging, digital commerce, and privacy-preserving technologies. The field continues to evolve with the development of new threats and the advent of technologies like [[quantum computing]], which poses both challenges and opportunities for cryptographic systems.",
        "links": [
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "secure communications",
            "link": null,
            "target": "secure-communication"
          },
          {
            "key": "digital signatures",
            "link": null,
            "target": "digital-signature"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "cybersecurity",
            "link": null,
            "target": null
          },
          {
            "key": "quantum computing",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "cyberpunk",
        "name": "Cyberpunk",
        "type": "genre",
        "keywords": [
          "cypherpunks"
        ],
        "resources": [
          {
            "title": "What is Cyberpunk?",
            "url": "https://www.theverge.com/22777244/cyberpunk-definition-history-movies-books-2077"
          },
          {
            "title": "Cyberpunk Literary Movement",
            "url": "https://www.britannica.com/art/cyberpunk"
          }
        ],
        "description": "Cyberpunk is a subgenre of science fiction that emerged in the 1980s, characterized by its focus on \"high tech, low life\" - a combination of advanced technology and societal breakdown. The genre typically features a dystopian future where society is dominated by powerful corporations, ubiquitous technology, and cybernetic body modifications, while ordinary people struggle to survive in the margins. The term was coined by author Bruce Bethke in his 1983 short story \"Cyberpunk,\" but the genre was popularized by writers like William Gibson, particularly through his novel \"Neuromancer\" (1984).\n\nThe aesthetic and themes of cyberpunk have deeply influenced modern culture, technology, and art. Common elements include artificial intelligence, virtual reality, hackers, megacorporations, and themes of resistance against technological control. The genre often explores the relationship between humanity and technology, questioning what it means to be human in a world where the line between organic and artificial becomes increasingly blurred. These themes have resonated strongly with various counter-cultural movements, including the [[cypherpunk]] movement, which shares similar concerns about privacy, corporate power, and technological autonomy.\n\nCyberpunk has evolved beyond literature into a broader cultural phenomenon, influencing fashion, music, film (like \"Blade Runner\" and \"The Matrix\"), and even architecture and urban planning. Its influence can be seen in contemporary discussions about [[artificial intelligence]], [[surveillance capitalism]], and [[digital privacy]]. The movement's aesthetic and philosophical elements have become particularly relevant in the modern era, as many of its once-fictional concepts have become reality, from widespread surveillance and corporate dominance to human augmentation and virtual worlds.",
        "links": [
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "artificial intelligence",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "surveillance capitalism",
            "link": null,
            "target": "surveillance-capitalism"
          },
          {
            "key": "digital privacy",
            "link": null,
            "target": "digital-freedom"
          }
        ]
      },
      {
        "id": "cyborgism",
        "name": "Cyborgism",
        "type": "concept",
        "resources": [
          {
            "title": "Wikipedia article \"Cyborg\"",
            "url": "https://en.wikipedia.org/wiki/Cyborg"
          },
          {
            "title": "Wikipedia article \"Cyborgization\"",
            "url": "https://en.wikipedia.org/wiki/Cyborgization"
          }
        ],
        "description": "Cyborgism represents the integration of technology with human biology and consciousness, embracing the symbiotic relationship between humans and machines. It goes beyond mere tool use, suggesting that technology can become a fundamental part of human identity and capability. This philosophy views technological augmentation not as artificial, but as a natural evolution of human potential and [[self-sovereignty]].\n\nThe cyborg perspective challenges traditional boundaries between natural and artificial, viewing technology as an extension of human capabilities rather than something separate from humanity. This includes both physical augmentations ([[biohacking]], [[body modification]]) and cognitive enhancements through digital technologies. Modern examples include everyday technologies like smartphones, which effectively function as external memory and processing systems, and more direct interventions like [[neural implants]] and [[sensory enhancement]] devices.\n\nCyborgism intersects with various movements including [[transhumanism]], [[biohacking]], and [[human augmentation]]. It emphasizes individual autonomy over one's own body and mind, including the freedom to modify and enhance oneself using technology. This philosophy has implications for [[digital identity]], [[privacy]], and human rights in an increasingly technologically integrated world, raising questions about the future of human evolution and consciousness.",
        "links": [
          {
            "key": "self-sovereignty",
            "link": null,
            "target": "self-sovereignty"
          },
          {
            "key": "biohacking",
            "link": null,
            "target": "biohacking"
          },
          {
            "key": "body modification",
            "link": null,
            "target": null
          },
          {
            "key": "neural implants",
            "link": null,
            "target": null
          },
          {
            "key": "sensory enhancement",
            "link": null,
            "target": null
          },
          {
            "key": "transhumanism",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "biohacking",
            "link": null,
            "target": "biohacking"
          },
          {
            "key": "human augmentation",
            "link": null,
            "target": "human-augmentation"
          },
          {
            "key": "digital identity",
            "link": null,
            "target": "digital-identity"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          }
        ]
      },
      {
        "id": "cyphernomicon",
        "name": "Cyphernomicon",
        "type": "document",
        "year": 1994,
        "resources": [
          {
            "title": "The Cyphernomicon (Original Text)",
            "url": "https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt"
          }
        ],
        "description": "The Cyphernomicon is a comprehensive document written by [Timothy C. May](/p/timothy-c-may) in 1994 that serves as both a FAQ (Frequently Asked Questions) and manifesto for the [[Cypherpunk]] movement. Released as version 0.666, it outlines the fundamental ideas, principles, and technical aspects behind the cypherpunk philosophy and [[crypto-anarchy]]. The document has become one of the foundational texts of the cypherpunk movement, alongside the [[Crypto Anarchist Manifesto]].\n\nThe document covers a wide range of topics including cryptography, privacy, digital money, anonymous communications, and the social implications of these technologies. It explores how encryption and digital technologies could reshape society by enabling new forms of social and economic organization outside traditional state control. The Cyphernomicon also discusses practical aspects of implementing crypto systems and the potential future impacts of widespread encryption adoption.\n\nAs a historical document, the Cyphernomicon provides valuable insights into the early thinking of the cypherpunk movement and many of its predictions about digital privacy, [[cryptocurrency]], and online anonymity have proven prescient. The document's influence can be seen in many modern privacy-focused and decentralized technologies, including [[Bitcoin]] and other blockchain-based systems. Its anti-democratic and anti-establishment themes continue to resonate within crypto-anarchist and digital freedom movements today.",
        "links": [
          {
            "key": "Cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "crypto-anarchy",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "Crypto Anarchist Manifesto",
            "link": null,
            "target": "cryptoanarchists-manifesto"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          }
        ]
      },
      {
        "id": "cypherpunk",
        "name": "Cypherpunk",
        "type": "movement",
        "keywords": [
          "Cypherpunk Philosophy"
        ],
        "related": [
          "privacy",
          "encryption"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Cypherpunk\"",
            "url": "https://en.wikipedia.org/wiki/Cypherpunk"
          },
          {
            "title": "A Cypherpunk's Manifesto (1993) from Eric Hughes",
            "url": "https://www.activism.net/cypherpunk/manifesto.html"
          }
        ],
        "description": "Cypherpunk is a political and social movement that emerged in the late 1980s and early 1990s, advocating for the use of strong [[cryptography]] and privacy-enhancing technologies as a means to achieve social and political change. The term \"cypherpunk\" is a combination of \"cipher\" (or \"cypher\") and \"[[cyberpunk]]\". Cypherpunks believe that privacy is essential for an open society in the electronic age and see strong cryptography as a tool to preserve civil liberties against government overreach and corporate surveillance.\n\nAt its core, Cypherpunk philosophy is characterized by a distrust of authority, advocacy for [[privacy]] as a fundamental right, and the belief that code can be used to create systems that enforce desired social and political norms. This ideology was formalized in the [[Cypherpunk's Manifesto]], written by Eric Hughes in 1993. Notable figures associated with the cypherpunk movement include [Julian Assange](https://en.wikipedia.org/wiki/Julian_Assange), [Adam Back](https://en.wikipedia.org/wiki/Adam_Back), and [Wei Dai](https://en.wikipedia.org/wiki/Wei_Dai).\n\nThe impact of cypherpunk philosophy has been significant, influencing the development of [[cryptocurrencies]] like [[Bitcoin]], anonymous communication systems such as [[Tor]], and advancing encryption technologies. It continues to play a crucial role in ongoing debates about digital privacy, surveillance, and individual sovereignty in the digital age. The philosophy emphasizes the creation of parallel, decentralized structures that prioritize privacy, freedom, and individual autonomy in the face of increasing digital surveillance and control.",
        "links": [
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "cyberpunk",
            "link": null,
            "target": "cyberpunk"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "Cypherpunk's Manifesto",
            "link": null,
            "target": "cypherpunks-manifesto"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          }
        ]
      },
      {
        "id": "cypherpunks-manifesto",
        "name": "Cypherpunk's Manifesto",
        "type": "document",
        "year": 1993,
        "resources": [
          {
            "title": "Original Cypherpunk's Manifesto",
            "url": "https://www.activism.net/cypherpunk/manifesto.html"
          },
          {
            "title": "Eric Hughes - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Eric_Hughes_(cypherpunk)"
          }
        ],
        "description": "The Cypherpunk's Manifesto is a foundational document written by Eric Hughes in 1993 that outlines the core principles and philosophy of the [[cypherpunk]] movement. The manifesto begins with the famous declaration \"Privacy is necessary for an open society in the electronic age\" and proceeds to explain why [[privacy]] through [[cryptography]] is essential for maintaining freedom in the digital world. It emphasizes that privacy is not secrecy - privacy is the power to selectively reveal oneself to the world.\n\nThe document presents several key arguments about the nature of privacy and electronic systems, including the necessity of anonymous transactions, the role of cryptography in ensuring privacy, and the importance of writing and deploying code that protects individual rights. Hughes argues that privacy in an open society requires [[anonymous transaction systems]] and that we cannot expect governments, corporations, or other large organizations to grant us privacy - we must defend it ourselves through cryptography and digital innovation.\n\nThe manifesto has become a cornerstone of digital rights activism and has influenced numerous movements and technologies, including the development of [[Bitcoin]], [[secure communication]] protocols, and various privacy-enhancing technologies. Its principles continue to resonate in contemporary debates about digital privacy, surveillance, and individual rights in the information age. The document's emphasis on taking active measures to protect privacy rather than merely hoping for it has inspired generations of cryptographers, developers, and digital rights advocates to create tools and systems that embody these principles.",
        "links": [
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "anonymous transaction systems",
            "link": null,
            "target": null
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "secure communication",
            "link": null,
            "target": "secure-communication"
          }
        ]
      },
      {
        "id": "dao",
        "name": "Decentralized Autonomous Organization (DAO)",
        "type": "organization structure",
        "keywords": [
          "Decentralized Autonomous Organizations (DAOs)",
          "Decentralized Autonomous Organizations",
          "Decentralized Autonomous Organization",
          "DAO",
          "DAOs"
        ],
        "resources": [
          {
            "title": "MIT Law - Decentralized Autonomous Organizations",
            "url": "https://law.mit.edu/pub/decentralizedautonomousorganizations"
          }
        ],
        "description": "A Decentralized Autonomous Organization (DAO) is a novel form of organizational structure that operates without traditional hierarchical management, instead using [[blockchain]] technology and [[smart contracts]] to enable collective decision-making and automated execution of rules. DAOs are governed by their members who typically hold governance tokens that grant them voting rights on proposals, treasury management, and organizational changes. The organization's rules and transaction records are transparently stored on a blockchain, making them publicly verifiable.\n\nThe core innovation of DAOs lies in their ability to coordinate activities and resources without requiring trust in central authorities. All rules and financial transactions are encoded in smart contracts - self-executing programs that automatically implement decisions once predetermined conditions are met. This creates a transparent and tamper-resistant framework for collective action, where members can participate in governance regardless of their geographic location or institutional affiliations. Members typically acquire governance rights by purchasing or earning the DAO's native tokens.\n\nDAOs represent an experiment in [[digital governance]] and organizational design, combining elements of [[direct democracy]], [[game theory]], and [[cryptography]]. They have been used to coordinate various activities including investment funds, charitable organizations, software development, and content creation. While promising greater transparency and participation, DAOs also face challenges around legal recognition, security vulnerabilities (as demonstrated by \"The DAO\" hack in 2016), and effective coordination of large groups. The technology continues to evolve as communities experiment with different governance models and use cases.",
        "links": [
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "digital governance",
            "link": null,
            "target": null
          },
          {
            "key": "direct democracy",
            "link": null,
            "target": null
          },
          {
            "key": "game theory",
            "link": null,
            "target": "game-theory"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          }
        ]
      },
      {
        "id": "dapps",
        "name": "Decentralized Applications (dApps)",
        "type": "technology",
        "keywords": [
          "dApps",
          "Decentralized Applications",
          "Decentralized applications"
        ],
        "resources": [
          {
            "title": "Understanding Decentralized Applications",
            "url": "https://ethereum.org/en/dapps/"
          }
        ],
        "description": "Decentralized Applications (dApps) are software applications that run on [[peer-to-peer]] networks rather than centralized servers, eliminating single points of control and failure. Unlike traditional applications where code and data are controlled by a single entity, dApps operate on distributed networks where users retain control of their data and interactions, with core functionality typically implemented through [[smart contract]] and peer-to-peer protocols.\n\nThe key characteristics of dApps include open-source code, cryptographic consensus mechanisms, and token-based incentives that align network participants' interests. Common examples include decentralized exchanges, social media platforms, marketplaces, and gaming environments where users can interact directly without intermediaries. These applications often integrate [[cryptocurrency]] for value transfer and [[digital signature|digital signatures]] for user authentication.\n\ndApps represent a paradigm shift in software architecture, enabling the creation of parallel digital infrastructure that operates independently of traditional corporate or institutional control. By combining peer-to-peer networks, cryptographic primitives, and economic incentives, dApps create resilient systems where users maintain sovereignty over their data, assets, and interactions while participating in community-governed digital spaces.",
        "links": [
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "smart contract",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "digital signature",
            "link": "digital signatures",
            "target": "digital-signature"
          }
        ]
      },
      {
        "id": "darknet",
        "name": "Darknet",
        "keywords": [
          "Darknets"
        ],
        "type": "technology",
        "resources": [
          {
            "title": "Dark Web History Timeline",
            "url": "https://www.soscanhelp.com/blog/history-of-the-dark-web"
          }
        ],
        "description": "A darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, often using non-standard communication protocols and ports. The most famous darknet is the [[Tor]] network, which provides anonymity by encrypting and routing internet traffic through a worldwide network of volunteer servers. Darknets are a key component of the \"Dark Web\" - websites that are not indexed by traditional search engines and require special software to access.\n\nThe technology behind darknets was originally developed by the U.S. Naval Research Laboratory in the 1990s to protect intelligence communications. Today, darknets serve multiple purposes, from protecting privacy and circumventing [[censorship|censorship resistance]] in authoritarian regimes to enabling [[whistleblowing]] and secure communication. The technology relies on various [[cryptographic|cryptography]] protocols and [[peer-to-peer]] networking to ensure user anonymity and data security.\n\nWhile darknets have legitimate uses in protecting [[privacy]] and freedom of speech, they have also gained notoriety for hosting illegal activities. However, this represents only a portion of darknet usage. The technology continues to evolve and play a crucial role in the [[cypherpunk]] movement's goal of protecting digital rights and privacy. Darknets are often used in conjunction with other privacy-enhancing technologies like [[VPN]]s and [[encryption]] tools to create secure communication channels outside traditional internet infrastructure.",
        "links": [
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "censorship",
            "link": "censorship resistance",
            "target": "censorship-resistance"
          },
          {
            "key": "whistleblowing",
            "link": null,
            "target": "whistleblowing"
          },
          {
            "key": "cryptographic",
            "link": "cryptography",
            "target": "cryptography"
          },
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "VPN",
            "link": null,
            "target": "vpn"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          }
        ]
      },
      {
        "id": "decentralization",
        "name": "Decentralization",
        "type": "concept",
        "keywords": [
          "decentralized networks",
          "decentralized",
          "decentralized technologies",
          "Decentralized Systems"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Decentralization\"",
            "url": "https://en.wikipedia.org/wiki/Decentralization"
          },
          {
            "title": "Wikipedia article \"Distributed computing\"",
            "url": "https://en.wikipedia.org/wiki/Distributed_computing"
          }
        ],
        "description": "Decentralization is the process of distributing power, control, and functions away from central authorities to a network of individual participants. In its purest form, decentralization eliminates single points of failure or control, creating systems that are more resilient, censorship-resistant, and immune to manipulation. This concept can be applied to various domains including technology, organizations, economies, and social structures.\n\nIn technological contexts, decentralization manifests through [[peer-to-peer]] networks, [[blockchain]] systems, and [[distributed computing]]. These systems operate without central servers or controlling entities, instead relying on networks of equal participants who collectively maintain and validate the system. Examples include [[Bitcoin]], [[IPFS]], and [[mesh networks]], where each participant contributes to and benefits from the network's functionality without depending on central authorities.\n\nBeyond technology, decentralization represents a fundamental shift in how human systems can organize. It enables [[self-sovereignty]], where individuals maintain control over their own data, identity, and resources. Decentralized [[governance]] models, such as [[DAOs]] (Decentralized Autonomous Organizations), demonstrate how collective decision-making can occur without hierarchical structures. This approach often leads to greater innovation, resilience, and individual empowerment while reducing risks associated with centralized points of failure.",
        "links": [
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "distributed computing",
            "link": null,
            "target": null
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "IPFS",
            "link": null,
            "target": null
          },
          {
            "key": "mesh networks",
            "link": null,
            "target": "mesh-networks"
          },
          {
            "key": "self-sovereignty",
            "link": null,
            "target": "self-sovereignty"
          },
          {
            "key": "governance",
            "link": null,
            "target": null
          },
          {
            "key": "DAOs",
            "link": null,
            "target": "dao"
          }
        ]
      },
      {
        "id": "defi",
        "name": "Decentralized Finance (DeFi)",
        "keywords": [
          "DeFi",
          "decentralized finance"
        ],
        "type": "concept",
        "description": "Decentralized Finance (DeFi) refers to an emerging financial technology based on secure distributed ledgers similar to those used by [[cryptocurrencies]]. It's a system that removes traditional centralized intermediaries like banks and financial institutions from financial transactions, replacing them with [[smart contracts]] on [[blockchain]] networks. This revolutionary approach aims to create an open, permissionless, and transparent financial system accessible to anyone with an internet connection.\n\nThe core components of DeFi include decentralized exchanges ([[DEX]]), lending platforms, [[stablecoins]], and various financial instruments that operate without traditional intermediaries. These applications are typically built on [[Ethereum]] or other blockchain platforms that support smart contracts, allowing users to trade, lend, borrow, and invest their digital assets in a trustless manner. The system relies on [[cryptography]] and consensus mechanisms to ensure security and validate transactions.\n\nDeFi has experienced significant growth since its emergence, particularly during 2020-2021, revolutionizing traditional financial services through innovation in areas like [[yield farming]], [[liquidity mining]], and [[flash loans]]. However, it also faces challenges related to scalability, security risks, regulatory compliance, and potential systemic risks. The technology continues to evolve, with new protocols and applications being developed to address these challenges while expanding the possibilities of decentralized financial services.",
        "links": [
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "DEX",
            "link": null,
            "target": null
          },
          {
            "key": "stablecoins",
            "link": null,
            "target": null
          },
          {
            "key": "Ethereum",
            "link": null,
            "target": "ethereum"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "yield farming",
            "link": null,
            "target": null
          },
          {
            "key": "liquidity mining",
            "link": null,
            "target": null
          },
          {
            "key": "flash loans",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "digital-autonomy",
        "name": "Digital Autonomy",
        "type": "concept",
        "keywords": [
          "cyber-autonomy"
        ],
        "resources": [
          {
            "title": "Open Source and Digital Sovereignty",
            "url": "https://typo3.com/blog/open-source-and-digital-sovereignty"
          },
          {
            "title": "European Digital Autonomy",
            "url": "https://eucloudedgeiot.eu/european-digital-autonomy-and-the-future-of-european-competitiveness/"
          }
        ],
        "description": "Digital autonomy refers to the ability of individuals, organizations, or nations to maintain independence and control over their digital technologies, data, and infrastructure. It encompasses the capacity to make sovereign decisions about technological systems while reducing dependence on external entities or proprietary solutions. This concept has become increasingly important in an era where digital technologies are deeply embedded in all aspects of life, from personal privacy to national security.\n\nA key aspect of digital autonomy is the use of [[open source]] software and hardware, which provides transparency, customization abilities, and freedom from vendor lock-in. This approach aligns closely with [[cypherpunk]] ideals of technological self-determination and privacy. Digital autonomy also involves developing local technological capabilities, maintaining control over critical digital infrastructure, and ensuring [[data sovereignty]] - the ability to maintain authority over how data is collected, processed, and stored.\n\nThe pursuit of digital autonomy often intersects with other parallel structures and movements, including [[decentralization]], [[cryptography]], and [[self-sovereign identity]]. It emphasizes the importance of technological literacy, independent infrastructure, and the ability to opt out of centralized digital systems when desired. This concept is particularly relevant in discussions about [[digital rights]], [[privacy]], and resistance to technological surveillance and control by governments or large corporations.",
        "links": [
          {
            "key": "open source",
            "link": null,
            "target": "foss"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "data sovereignty",
            "link": null,
            "target": "self-sovereignty"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "self-sovereign identity",
            "link": null,
            "target": "self-sovereign-identity"
          },
          {
            "key": "digital rights",
            "link": null,
            "target": null
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          }
        ]
      },
      {
        "id": "digital-freedom",
        "name": "Digital Freedom",
        "keywords": [
          "digital privacy"
        ],
        "type": "concept",
        "description": "Digital Freedom refers to the fundamental rights and liberties of individuals in the digital realm, encompassing the ability to access, use, create, and publish digital media while maintaining privacy and autonomy. It represents the extension of basic human rights and civil liberties into the digital space, including freedom of expression, right to privacy, and access to information through digital technologies, particularly the Internet.\n\nAt its core, digital freedom is built on the principle that the rights we enjoy offline should be equally protected online. This includes protection against [[surveillance]], [[censorship]], and digital authoritarianism, while promoting [[privacy]], security, and individual autonomy in digital spaces. Organizations like the *Electronic Frontier Foundation* and various digital rights groups work to defend these freedoms through advocacy, education, and technological innovation.\n\nThe concept has become increasingly important as our lives become more digitally integrated, with implications for democracy, human rights, and social justice. Digital freedom intersects with various technological and social movements, including [[cypherpunk]], [[cryptocurrency]], and [[privacy]] advocacy, which aim to create tools and systems that preserve individual liberty in the digital age. The struggle for digital freedom often involves resisting both government overreach and corporate surveillance while promoting decentralized, privacy-preserving alternatives.",
        "links": [
          {
            "key": "surveillance",
            "link": null,
            "target": "mass-surveillance"
          },
          {
            "key": "censorship",
            "link": null,
            "target": null
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          }
        ]
      },
      {
        "id": "digital-identity",
        "name": "Digital Identity",
        "type": "concept",
        "description": "Digital identity is a set of attributes and claims that represent an entity in digital environments, enabling authentication and interaction without revealing unnecessary personal information. In the context of parallel structures, digital identity emphasizes [[self-sovereignty]], where individuals maintain complete control over their identity data without relying on centralized authorities or traditional identity providers.\n\nThe cypherpunk approach to digital identity leverages cryptographic primitives like [[public key cryptography]], [[zero-knowledge proofs]], and [[digital signatures]] to enable secure, pseudonymous interactions. These technologies allow individuals to prove specific attributes about themselves (age, membership, credentials) without revealing their full identity, following the principle of minimal disclosure and maintaining maximum privacy.\n\nDigital identity systems built on [[blockchain]] networks and peer-to-peer protocols enable users to create multiple contextual identities, manage their reputation across different environments, and participate in [[DAO]] and other parallel structures without traditional identity documents. This approach supports resistance against surveillance, enables privacy-preserving commerce, and allows for the creation of autonomous communities independent of legacy identity systems.",
        "links": [
          {
            "key": "self-sovereignty",
            "link": null,
            "target": "self-sovereignty"
          },
          {
            "key": "public key cryptography",
            "link": null,
            "target": "public-key-cryptography"
          },
          {
            "key": "zero-knowledge proofs",
            "link": null,
            "target": "zero-knowledge-proof"
          },
          {
            "key": "digital signatures",
            "link": null,
            "target": "digital-signature"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "DAO",
            "link": null,
            "target": "dao"
          }
        ]
      },
      {
        "id": "digital-self-defense",
        "name": "Digital Self-Defense",
        "type": "practice",
        "resources": [
          {
            "title": "Surveillance Self-Defense (EFF)",
            "caption": "Tips, Tools and How-tos for Safer Online Communications",
            "url": "https://ssd.eff.org/"
          }
        ],
        "related": [
          "privacy"
        ],
        "description": "Digital Self-Defense refers to the practices and techniques individuals use to protect their [[digital privacy]], security, and personal information in the face of increasing online threats and [[surveillance|mass surveillance]]. It encompasses a wide range of skills and tools designed to safeguard one's digital presence, communications, and data from unauthorized access, manipulation, or exploitation.\n\nAt its core, Digital Self-Defense is about empowering individuals to take control of their digital lives. This includes understanding and mitigating risks associated with [[online tracking]], [[data collection]], and cyber attacks. Key aspects of Digital Self-Defense include the use of [[encryption]] for secure communications, [[mixnets]] or [[virtual private networks (VPNs)]] for anonymous browsing, [[two-factor authentication]] for account security, and [[digital hygiene]] practices like regular software updates and strong password management.\n\nThe concept of Digital Self-Defense has gained prominence with the rise of [[mass surveillance]], [[data breaches]], and sophisticated cyber threats. It's closely related to the idea of [[information self-determination]], which asserts an individual's right to control the collection and use of their personal data. As digital technologies become increasingly integrated into daily life, Digital Self-Defense is becoming an essential skill for maintaining personal freedom, privacy, and security in the digital age.",
        "links": [
          {
            "key": "digital privacy",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "surveillance",
            "link": "mass surveillance",
            "target": "mass-surveillance"
          },
          {
            "key": "online tracking",
            "link": null,
            "target": null
          },
          {
            "key": "data collection",
            "link": null,
            "target": null
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "mixnets",
            "link": null,
            "target": "mixnet"
          },
          {
            "key": "virtual private networks (VPNs)",
            "link": null,
            "target": "vpn"
          },
          {
            "key": "two-factor authentication",
            "link": null,
            "target": "2fa"
          },
          {
            "key": "digital hygiene",
            "link": null,
            "target": null
          },
          {
            "key": "mass surveillance",
            "link": null,
            "target": "mass-surveillance"
          },
          {
            "key": "data breaches",
            "link": null,
            "target": null
          },
          {
            "key": "information self-determination",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "digital-signature",
        "name": "Digital Signature",
        "keywords": [
          "digital signatures"
        ],
        "type": "technology",
        "resources": [
          {
            "title": "Introduction to Digital Signatures",
            "url": "https://www.cs.cornell.edu/courses/cs5430/2015sp/notes/sig_intro.php"
          },
          {
            "title": "Applied Cryptography - Digital Signatures",
            "url": "https://www.schneier.com/academic/applied-cryptography/"
          }
        ],
        "description": "Digital signatures are cryptographic proofs that enable message authentication, integrity verification, and non-repudiation without relying on trusted third parties. Using [[public key cryptography]], a signer creates an unforgeable mathematical seal with their private key that anyone can verify using the corresponding public key, proving both the origin of a message and that it hasn't been altered.\n\nThis technology forms the foundation for autonomous digital interactions by enabling individuals to make verifiable commitments and sign messages that carry the same weight as traditional signatures, but with mathematical rather than institutional backing. In parallel structures, digital signatures enable binding agreements, [[secure communications]], and reputation systems without the need for authentication authorities.\n\nBeyond simple document signing, digital signatures enable advanced cryptographic protocols like blind signatures for [[private voting systems]], ring signatures for [[anonymous group authentication]], and aggregate signatures for efficient collective signing. These primitives power numerous privacy-preserving applications and parallel systems where individuals can interact with cryptographic certainty while maintaining their autonomy.",
        "links": [
          {
            "key": "public key cryptography",
            "link": null,
            "target": "public-key-cryptography"
          },
          {
            "key": "secure communications",
            "link": null,
            "target": "secure-communication"
          },
          {
            "key": "private voting systems",
            "link": null,
            "target": null
          },
          {
            "key": "anonymous group authentication",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "distributed-manufacturing",
        "name": "Distributed Manufacturing",
        "type": "concept",
        "resources": [
          {
            "title": "Distributed manufacturing - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Distributed_manufacturing"
          },
          {
            "title": "The Rise of Distributed Manufacturing",
            "url": "https://www.industryweek.com/technology-and-iiot/article/22027903/the-rise-of-distributed-manufacturing"
          }
        ],
        "description": "Distributed Manufacturing, also known as distributed production or local manufacturing, is a form of decentralized manufacturing system where products are manufactured close to their final destination using a network of geographically dispersed facilities connected through information technology. This approach stands in contrast to the traditional centralized manufacturing model where products are mass-produced in large factories and then shipped globally. The concept has gained significant momentum with the advent of [[3D Printing]], [[Digital Fabrication]], and other [[Advanced Manufacturing]] technologies that enable small-scale, flexible production.\n\nThe core principles of distributed manufacturing align closely with [[peer-to-peer]] networks and [[decentralization]] philosophies. By leveraging [[digital fabrication]] technologies like [[3D printing]], CNC machines, and laser cutting, communities can create local manufacturing hubs or [[makerspaces]] that produce goods on-demand. This model reduces transportation costs, decreases environmental impact, enables rapid prototyping, and allows for greater customization of products to meet local needs. It also promotes [[resilience]] by reducing dependency on global supply chains and creating redundancy in manufacturing capabilities.\n\nThe movement intersects with various other concepts such as [[Open Source Hardware]], [[Circular Economy]], and [[Industry 4.0]]. It empowers individuals and communities to become producers rather than just consumers, fostering [[DIY culture]] and [[local resilience]]. Projects like *RepRap* (self-replicating 3D printers) and initiatives such as [[FabLabs]] demonstrate how distributed manufacturing can democratize production and enable communities to achieve greater self-sufficiency. This manufacturing paradigm is particularly relevant to *parallel structures* as it provides a framework for creating alternative production systems outside traditional industrial structures.",
        "links": [
          {
            "key": "3D Printing",
            "link": null,
            "target": null
          },
          {
            "key": "Digital Fabrication",
            "link": null,
            "target": null
          },
          {
            "key": "Advanced Manufacturing",
            "link": null,
            "target": null
          },
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "digital fabrication",
            "link": null,
            "target": null
          },
          {
            "key": "3D printing",
            "link": null,
            "target": null
          },
          {
            "key": "makerspaces",
            "link": null,
            "target": null
          },
          {
            "key": "resilience",
            "link": null,
            "target": null
          },
          {
            "key": "Open Source Hardware",
            "link": null,
            "target": "open-hardware"
          },
          {
            "key": "Circular Economy",
            "link": null,
            "target": null
          },
          {
            "key": "Industry 4.0",
            "link": null,
            "target": null
          },
          {
            "key": "DIY culture",
            "link": null,
            "target": null
          },
          {
            "key": "local resilience",
            "link": null,
            "target": null
          },
          {
            "key": "FabLabs",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "double-spending-problem",
        "name": "Double-spending problem",
        "type": "concept",
        "resources": [
          {
            "title": "How Bitcoin Solves the Double Spend Problem",
            "url": "https://river.com/learn/how-bitcoin-solves-the-double-spend-problem/"
          },
          {
            "title": "Understanding Double-Spending",
            "url": "https://www.investopedia.com/terms/d/doublespending.asp"
          }
        ],
        "description": "The double-spending problem refers to the potential flaw in digital currency systems where the same digital token or coin could be spent more than once. This was one of the fundamental challenges that needed to be solved before digital currencies could become viable, as digital information can be easily duplicated, unlike physical cash. The solution to this problem was a key breakthrough that enabled the creation of [[Bitcoin]] and other [[cryptocurrencies]].\n\nThe issue was historically difficult to solve without requiring a trusted third party (like a bank) to verify transactions and maintain a central ledger. [[Blockchain]] technology solved this through a decentralized approach using [[consensus mechanisms]] and [[proof of work]], where a network of nodes maintains a complete history of all transactions. Each transaction is verified by multiple nodes in the network, and once confirmed, becomes part of an immutable record that prevents the same coins from being spent again.\n\nThe prevention of double-spending in cryptocurrencies relies on the chronological ordering of transactions through timestamping and the creation of blocks that are cryptographically linked. When a transaction is made, it is broadcast to the network and included in a block by miners. Once confirmed and added to the blockchain, the transaction becomes part of the permanent record, making it virtually impossible to spend the same coins twice. This solution was first implemented successfully by [[Satoshi Nakamoto]] in the Bitcoin protocol and has become a fundamental component of most cryptocurrency systems.",
        "links": [
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "Blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "consensus mechanisms",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "proof of work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "Satoshi Nakamoto",
            "link": null,
            "target": "satoshi-nakamoto"
          }
        ]
      },
      {
        "id": "e2ee",
        "name": "End-to-end encryption (E2EE)",
        "type": "technology",
        "keywords": [
          "End-to-end encryption",
          "E2EE"
        ],
        "resources": [
          {
            "title": "Understanding End-to-End Encryption",
            "url": "https://www.eff.org/issues/end-end-encryption"
          }
        ],
        "description": "End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages, preventing third parties – including telecom providers, internet providers, and even the application service provider itself – from accessing the cryptographic keys needed to decrypt the conversation. In E2EE systems, the data is encrypted on the sender's device and can only be decrypted on the recipient's device, making it one of the most secure forms of [[encryption]] available for everyday communication.\n\nThe technology works by ensuring that the encryption keys are stored exclusively on the endpoints (i.e., users' devices), rather than on servers or other intermediate points. When a message is sent, it's encrypted using the recipient's public key, and can only be decrypted using the corresponding private key, which never leaves the recipient's device. This approach has been implemented in various popular messaging applications like Signal, WhatsApp, and Telegram (in secret chats), making secure communication accessible to everyday users.\n\nE2EE has become increasingly important in the modern digital age, particularly as concerns about [[privacy]], [[surveillance|mass surveillance]], and data security have grown. It's a crucial tool for protecting sensitive communications, whether for journalists protecting their sources, activists avoiding government surveillance, or ordinary citizens maintaining their privacy. However, E2EE has also faced challenges from governments and law enforcement agencies who argue it can shield criminal activities, leading to ongoing debates about the balance between privacy and security in digital communications.",
        "links": [
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "surveillance",
            "link": "mass surveillance",
            "target": "mass-surveillance"
          }
        ]
      },
      {
        "id": "encryption",
        "name": "Encryption",
        "type": "cryptography",
        "related": [
          "privacy"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Encryption\"",
            "url": "https://en.wikipedia.org/wiki/Encryption"
          }
        ],
        "description": "Encryption is the process of encoding information in such a way that only authorized parties can access it. It converts data into a form that appears random to anyone who doesn't have the decryption key. Encryption is a fundamental component of data security and privacy in the digital age, protecting sensitive information from unauthorized access, interception, and tampering.\n\nAt its core, encryption relies on complex mathematical algorithms called [ciphers](https://en.wikipedia.org/wiki/Cipher). Modern encryption methods typically use a [key](https://en.wikipedia.org/wiki/Key_(cryptography)) to determine how the information is encoded and decoded. There are two main types of encryption: [[symmetric-key encryption]], where the same key is used for both encryption and decryption, and [[public-key encryption]], where a public key is used to encrypt data and a private key to decrypt it. \n\nEncryption plays a crucial role in various aspects of digital life, including secure communication ([[HTTPS]], [[end-to-end encryption]], data storage ([[full disk encryption]]), and authentication processes. It's also fundamental to technologies like [[virtual private networks (VPNs)]] and [[cryptocurrencies]]. As digital threats evolve, so do encryption methods, with ongoing research into [[quantum-resistant encryption]] to prepare for future challenges. Despite its importance for privacy and security, encryption remains a topic of debate, with ongoing discussions about [[encryption policies|crypto wars]] and law enforcement access.",
        "links": [
          {
            "key": "symmetric-key encryption",
            "link": null,
            "target": null
          },
          {
            "key": "public-key encryption",
            "link": null,
            "target": null
          },
          {
            "key": "HTTPS",
            "link": null,
            "target": null
          },
          {
            "key": "end-to-end encryption",
            "link": null,
            "target": "e2ee"
          },
          {
            "key": "full disk encryption",
            "link": null,
            "target": null
          },
          {
            "key": "virtual private networks (VPNs)",
            "link": null,
            "target": "vpn"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "quantum-resistant encryption",
            "link": null,
            "target": null
          },
          {
            "key": "encryption policies",
            "link": "crypto wars",
            "target": "crypto-wars"
          }
        ]
      },
      {
        "id": "ethereum",
        "name": "Ethereum",
        "type": "blockchain",
        "resources": [
          {
            "title": "Ethereum Official Website",
            "url": "https://ethereum.org"
          },
          {
            "title": "Ethereum Whitepaper",
            "url": "https://ethereum.org/whitepaper/"
          }
        ],
        "description": "Ethereum is a decentralized blockchain platform launched in 2015 by [Vitalik Buterin](/p/vitalik-buterin) and other co-founders that enables the creation and execution of [[smart contracts]] and [[decentralized applications]] (dApps). Unlike [[Bitcoin]] which primarily functions as a digital currency, Ethereum was designed as a programmable blockchain that can be used to build and deploy decentralized software applications, creating what some call a \"world computer.\"\n\nThe platform runs on its native cryptocurrency called Ether (ETH), which is used to pay for transaction fees and computational services on the network. Ethereum introduced several revolutionary concepts to the blockchain space, including smart contracts - self-executing contracts with the terms directly written into code - and the ability to create other digital tokens using its ERC-20 standard. This functionality has enabled the development of numerous applications including [[DeFi]] (decentralized finance) protocols, [[NFT]]s (non-fungible tokens), and [[DAO]]s (decentralized autonomous organizations).\n\nEthereum has undergone several major upgrades since its inception, most notably the transition from a [[Proof of Work]] to a [[Proof of Stake]] consensus mechanism in 2022 (known as \"The Merge\"), significantly reducing its energy consumption. The platform has become the foundation for much of the [[Web3]] ecosystem, hosting thousands of decentralized applications and serving as the primary infrastructure for digital innovation in the blockchain space. Its large developer community and extensive tooling have made it the most widely used smart contract platform in the cryptocurrency ecosystem.",
        "links": [
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "decentralized applications",
            "link": null,
            "target": "dapps"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "DeFi",
            "link": null,
            "target": "defi"
          },
          {
            "key": "NFT",
            "link": null,
            "target": "nft"
          },
          {
            "key": "DAO",
            "link": null,
            "target": "dao"
          },
          {
            "key": "Proof of Work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "Proof of Stake",
            "link": null,
            "target": "proof-of-stake"
          },
          {
            "key": "Web3",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "foss",
        "name": "Free and Open Source Software (FOSS)",
        "type": "concept",
        "keywords": [
          "Open Source",
          "FOSS",
          "free and open-source software",
          "Open Source and Free Software"
        ],
        "resources": [
          {
            "title": "GNU's Philosophy on Free Software",
            "url": "https://www.gnu.org/philosophy/free-sw.en.html"
          },
          {
            "title": "Open Source Initiative",
            "url": "https://opensource.org/"
          }
        ],
        "description": "Free and Open Source Software (FOSS) refers to software that is released under licenses that grant users the fundamental freedoms to run, study, modify, and distribute the software. This movement represents a revolutionary approach to software development and distribution that emphasizes transparency, collaboration, and user freedom. The core principles include access to the source code, the ability to make modifications, and the right to share the software with others, either in its original or modified form.\n\nThe FOSS movement emerged from two closely related but philosophically distinct communities: the *Free Software Movement*, founded by [Richard Stallman](/p/richard-stallman) and formalized through the *GNU Project* and *Free Software Foundation*, and the *Open Source Initiative*, which emphasizes the practical benefits of collaborative development. While free software emphasizes the ethical and social aspects of user freedom, open source focuses on the technical and economic advantages of open development methodologies. Both approaches have contributed to the creation of important software licenses like the *GPL* (GNU General Public License) and the *MIT License*.\n\nThe impact of FOSS has been profound, fundamentally changing how software is developed, distributed, and monetized. It has enabled the creation of critical infrastructure software like *Linux*, *Apache*, and countless other tools that power the modern internet and technology landscape. FOSS principles have also influenced other movements, including [[open hardware]], [[open data]], and [[creative commons]], while aligning with broader ideals of [[digital freedom]] and [[decentralization]]. The movement continues to be crucial in discussions about [[digital sovereignty|self-sovereignty]], [[privacy]], and resistance to proprietary software monopolies.",
        "links": [
          {
            "key": "open hardware",
            "link": null,
            "target": "open-hardware"
          },
          {
            "key": "open data",
            "link": null,
            "target": null
          },
          {
            "key": "creative commons",
            "link": null,
            "target": null
          },
          {
            "key": "digital freedom",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "digital sovereignty",
            "link": "self-sovereignty",
            "target": "self-sovereignty"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          }
        ]
      },
      {
        "id": "free-market",
        "name": "Free Market",
        "type": "economic system",
        "keywords": [
          "Free Markets"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Free Market\"",
            "url": "https://en.wikipedia.org/wiki/Free_market"
          }
        ],
        "description": "Free market refer to an economic system in which prices for goods and services are determined by open competition between privately owned businesses, without significant government intervention or regulation. This concept is fundamental to *classical liberalism* and *laissez-faire* economic theories, emphasizing voluntary exchange, private property rights, and minimal government interference in economic activities.\n\nIn a free market economy, supply and demand are the primary forces driving the allocation of resources, production decisions, and price determination. Proponents argue that this system leads to greater economic efficiency, innovation, and individual freedom. They contend that the \"invisible hand\" of the market, a concept introduced by *Adam Smith*, guides self-interested actors to produce socially beneficial outcomes. Free market advocates often support policies such as deregulation, privatization, and free trade.\n\nCritics of free market ideology argue that unregulated markets can lead to *market failures*, extreme inequality, and environmental degradation. They contend that some level of government intervention is necessary to address externalities, provide public goods, and ensure fair competition. The debate between free market proponents and those advocating for various degrees of *market regulation* or alternative economic systems continues to shape political and economic discourse worldwide. In practice, most modern economies are *mixed systems* that combine elements of free markets with varying degrees of government intervention and regulation.",
        "links": []
      },
      {
        "id": "fungibility",
        "name": "Fungibility",
        "type": "concept",
        "resources": [
          {
            "title": "Fungibility - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Fungibility"
          }
        ],
        "description": "Fungibility is a fundamental property of an asset or good that indicates its individual units are interchangeable and indistinguishable from one another. In economic terms, if an item is fungible, any unit of that item can be substituted for another unit without changing its value or utility. The classic example of a fungible asset is fiat currency - one dollar bill is equal to and interchangeable with any other dollar bill. This property is crucial for any asset that aims to serve as a medium of exchange or store of value.\n\nIn the context of [[cryptocurrency]], fungibility becomes particularly important when discussing [[privacy]] and the history of transactions. While [[Bitcoin]] is often considered fungible, its transparent blockchain can potentially make some coins less desirable if they have been associated with illegal activities or been blacklisted by exchanges, effectively reducing their fungibility. This has led to the development of [[privacy coins]] like [[Monero]] that emphasize true fungibility by making all transactions private and untraceable, ensuring that each coin remains indistinguishable from others.\n\nThe concept of fungibility intersects with many aspects of [[digital freedom]] and [[crypto-anarchism]]. When digital assets lack fungibility, it can lead to surveillance, censorship, and control through the tracking and blocking of specific units. This challenges the [[cypherpunk]] ideals of privacy and freedom in digital transactions. The quest for better fungibility has driven innovation in [[cryptography]] and privacy-enhancing technologies, leading to developments in [[zero-knowledge proofs]], [[ring signatures]], and other privacy-preserving mechanisms.",
        "links": [
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "privacy coins",
            "link": null,
            "target": null
          },
          {
            "key": "Monero",
            "link": null,
            "target": null
          },
          {
            "key": "digital freedom",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "crypto-anarchism",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "zero-knowledge proofs",
            "link": null,
            "target": "zero-knowledge-proof"
          },
          {
            "key": "ring signatures",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "game-theory",
        "name": "Game Theory",
        "type": "concept",
        "related": [
          "byzantine-generals-problem"
        ],
        "description": "Game theory is the mathematical study of strategic decision-making between rational actors, providing a framework for understanding how incentives shape behavior in [[decentralized systems|decentralization]]. In crypto networks and parallel structures, game theory principles guide the design of protocols that remain stable and secure without central control, creating systems where individual self-interest aligns with collective benefit.\n\nThe application of game theory in [[cryptocurrency]] networks enables trustless consensus through mechanisms like [[mining]], [[staking]], and reputation systems. These systems create economic incentives that make cooperation more profitable than attack, allowing strangers to coordinate and transact without trusted intermediaries. The same principles power [[DAO]] governance, [[DeFi]] protocols, and other parallel economic structures.\n\nThrough careful mechanism design and incentive engineering, game theory enables the creation of resilient parallel systems that can resist attacks, maintain decentralization, and scale organically. These systems leverage economic rewards, penalties, and reputation to create stable equilibria where participants are naturally motivated to follow protocol rules and contribute to the network's security and growth.",
        "links": [
          {
            "key": "decentralized systems",
            "link": "decentralization",
            "target": "decentralization"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "mining",
            "link": null,
            "target": null
          },
          {
            "key": "staking",
            "link": null,
            "target": null
          },
          {
            "key": "DAO",
            "link": null,
            "target": "dao"
          },
          {
            "key": "DeFi",
            "link": null,
            "target": "defi"
          }
        ]
      },
      {
        "id": "hackerspace",
        "name": "Hackerspace",
        "type": "community space",
        "keywords": [
          "Hackerspaces",
          "makerspace"
        ],
        "resources": [
          {
            "title": "Hackerspaces.org Wiki",
            "url": "https://wiki.hackerspaces.org/"
          },
          {
            "title": "What is a Makerspace?",
            "url": "https://www.makerspaces.com/what-is-a-makerspace/"
          }
        ],
        "description": "A hackerspace (also known as a hackspace or makerspace) is a community-operated physical workspace where people with common interests in technology, digital art, science, and [[DIY]] culture can meet, socialize, collaborate, and work on projects. These spaces typically provide tools, equipment, and resources that might be too expensive or impractical for individuals to own, ranging from 3D printers and laser cutters to electronics workstations and traditional workshop tools.\n\nThe hackerspace movement emerged from the [[hacker culture]] and [[cypherpunk]] communities of the 1990s, with early spaces appearing in Germany and spreading globally. The concept emphasizes peer learning, knowledge sharing, and the democratization of technology through hands-on experimentation. Hackerspaces often operate on principles of [[open source]] collaboration, [[decentralization]], and community governance, making them natural allies of movements focused on technological freedom and autonomy.\n\nModern hackerspaces serve as important nodes in the broader [[maker culture]] ecosystem, fostering innovation, entrepreneurship, and technological literacy. They frequently host workshops, hackathons, and educational events, creating bridges between various communities including artists, engineers, activists, and educators. Notable examples include *Noisebridge* in San Francisco and c-base in Berlin.",
        "links": [
          {
            "key": "DIY",
            "link": null,
            "target": null
          },
          {
            "key": "hacker culture",
            "link": null,
            "target": null
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "open source",
            "link": null,
            "target": "foss"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "maker culture",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "hacktivism",
        "name": "Hacktivism",
        "type": "concept",
        "resources": [
          {
            "title": "Wikipedia article \"Hacktivism\"",
            "url": "https://en.wikipedia.org/wiki/Hacktivism"
          }
        ],
        "description": "Hacktivism combines hacking with activism, using digital tools and computer networks to promote political ideals, freedom of speech, and human rights. Hacktivists employ various techniques including website defacement, information leaks, distributed denial-of-service ([[DDoS]]) actions, and creation of [[privacy]]-enhancing tools to advance social, ideological, and political causes. Notable hacktivist campaigns have exposed corruption, challenged censorship, and supported protest movements worldwide.\n\nHacktivist methodologies often focus on ensuring access to information and protecting digital rights. This includes developing tools for [[encryption]], [[anonymous communication]], and information sharing. Hacktivists frequently create and maintain systems that enable [[whistleblowing]], circumvent [[censorship|censorship-resistance]], and protect digital privacy. The movement emphasizes the importance of technological empowerment and information freedom as fundamental human rights.\n\nThe evolution of hacktivism has significantly influenced modern digital resistance and [[cyber-autonomy]]. It has contributed to the development of important tools and technologies, including [[Tor]], *SecureDrop*, and various [[encryption]] tools. Hacktivist principles have become increasingly relevant in an era of [[digital surveillance|mass-surveillance]] and control, inspiring new forms of technological resistance and digital [[direct action]].",
        "links": [
          {
            "key": "DDoS",
            "link": null,
            "target": null
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "anonymous communication",
            "link": null,
            "target": "anonymous-communication"
          },
          {
            "key": "whistleblowing",
            "link": null,
            "target": "whistleblowing"
          },
          {
            "key": "censorship",
            "link": "censorship-resistance",
            "target": "censorship-resistance"
          },
          {
            "key": "cyber-autonomy",
            "link": null,
            "target": "digital-autonomy"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "digital surveillance",
            "link": "mass-surveillance",
            "target": "mass-surveillance"
          },
          {
            "key": "direct action",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "homomorphic-encryption",
        "name": "Homomorphic Encryption",
        "type": "technology",
        "resources": [
          {
            "title": "What Is Homomorphic Encryption? - TechTarget",
            "url": "https://www.techtarget.com/searchsecurity/definition/homomorphic-encryption"
          },
          {
            "title": "IEEE Digital Privacy - Homomorphic Encryption",
            "url": "https://digitalprivacy.ieee.org/publications/topics/what-is-homomorphic-encryption"
          }
        ],
        "description": "Homomorphic Encryption (HE) is a revolutionary form of [[cryptography]] that allows computations to be performed directly on encrypted data without requiring decryption first. This powerful property enables secure data processing while maintaining [[privacy]], as the data remains encrypted throughout the entire computation process. It represents a significant advancement in cryptographic techniques and has important implications for [[data security]] and [[privacy-preserving computation]].\n\nThere are different types of homomorphic encryption schemes, including partially homomorphic encryption (PHE), which allows specific operations to be performed infinite times on ciphertext, and fully homomorphic encryption (FHE), which enables arbitrary computations on encrypted data. This technology builds upon traditional [[public-key cryptography]] concepts but adds the unique ability to perform mathematical operations on encrypted values while preserving the relationship between the underlying plaintext values.\n\nThe applications of homomorphic encryption are vast and growing, particularly in areas requiring secure data processing like cloud computing, privacy-preserving [[machine learning]], secure search engines, and financial technology. Despite its powerful capabilities, widespread adoption has been limited by computational overhead and complexity. However, ongoing research and technological advances continue to improve its efficiency and practicality, making it an increasingly important tool in the arsenal of [[privacy-enhancing technologies]] and cryptographic protocols.",
        "links": [
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "data security",
            "link": null,
            "target": null
          },
          {
            "key": "privacy-preserving computation",
            "link": null,
            "target": null
          },
          {
            "key": "public-key cryptography",
            "link": null,
            "target": "public-key-cryptography"
          },
          {
            "key": "machine learning",
            "link": null,
            "target": "machine-learning"
          },
          {
            "key": "privacy-enhancing technologies",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "human-augmentation",
        "name": "Human Augmentation",
        "type": "concept",
        "resources": [
          {
            "title": "Human Augmentation – The Dawn of a New Paradigm",
            "url": "https://www.bundeswehr.de/resource/blob/5016368/fdc7f1c529ddfb014d4e321e8b666a2d/210111-sip-ha-data.pdf"
          },
          {
            "title": "Examples of Human Augmentation Technology",
            "url": "https://www.freshconsulting.com/insights/blog/examples-of-human-augmentation/"
          }
        ],
        "description": "Human Augmentation refers to the development and application of technologies that aim to enhance human physical, cognitive, and sensory capabilities beyond their natural limitations. This field encompasses a wide range of technologies, from relatively simple devices like cochlear implants to more advanced innovations such as [[brain-computer interfaces]], genetic engineering, and [[artificial intelligence]] integration. The goal is to improve human abilities and quality of life through technological means.\n\nThe concept of human augmentation is closely tied to [[transhumanism]] and [[biohacking]] movements, which advocate for the ethical use of technology to enhance human capabilities. Current applications include medical devices for restoring lost functions, wearable technology for improving physical performance, and cognitive enhancement through various means. This field raises important ethical questions about the nature of human enhancement, accessibility of these technologies, and their potential impact on society.\n\nAs technology continues to advance, human augmentation is becoming increasingly sophisticated, with developments in areas such as [[neural implants]], [[genetic engineering]], and [[artificial organs]]. The field represents a convergence of multiple disciplines, including biotechnology, robotics, and computer science. While offering tremendous potential benefits, it also presents challenges related to safety, privacy, equity, and the fundamental nature of human identity. The development of these technologies is often accompanied by debates about their societal implications.",
        "links": [
          {
            "key": "brain-computer interfaces",
            "link": null,
            "target": null
          },
          {
            "key": "artificial intelligence",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "transhumanism",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "biohacking",
            "link": null,
            "target": "biohacking"
          },
          {
            "key": "neural implants",
            "link": null,
            "target": null
          },
          {
            "key": "genetic engineering",
            "link": null,
            "target": null
          },
          {
            "key": "artificial organs",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "information-ethics",
        "name": "Information Ethics",
        "type": "concept",
        "description": "Information Ethics is a branch of ethics that focuses on the relationship between the creation, organization, dissemination, and use of information, and the ethical standards and moral codes governing human conduct in society. It addresses the moral issues arising from the lifecycle of information, particularly in the context of the digital age where data collection, processing, and sharing have become ubiquitous. The field examines questions about [[privacy]], accessibility, intellectual property, and the social impact of information technologies.\n\nAt its core, Information Ethics is concerned with principles such as transparency, accountability, fairness, and respect for individual rights in the handling of information. These principles guide decisions about what information should be collected, how it should be stored and protected, who should have access to it, and how it should be used. The field has become increasingly important as [[digital technologies]] and [[artificial intelligence]] raise new ethical challenges around issues like algorithmic bias, surveillance, data protection, and the right to be forgotten.\n\nThe practical applications of Information Ethics extend across many domains including healthcare ([[medical privacy]]), business ([[corporate responsibility]]), government ([[digital governance]]), and education ([[digital literacy]]). It provides frameworks for addressing ethical dilemmas in information management and helps shape policies and guidelines for responsible information handling. The field continues to evolve as new technologies emerge, requiring constant reassessment of ethical principles in light of changing technological capabilities and societal needs.",
        "links": [
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "digital technologies",
            "link": null,
            "target": null
          },
          {
            "key": "artificial intelligence",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "medical privacy",
            "link": null,
            "target": null
          },
          {
            "key": "corporate responsibility",
            "link": null,
            "target": null
          },
          {
            "key": "digital governance",
            "link": null,
            "target": null
          },
          {
            "key": "digital literacy",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "libertarianism",
        "name": "Libertarianism",
        "type": "philosophy",
        "keywords": [
          "libertarian"
        ],
        "resources": [
          {
            "title": "The Machinery of Freedom",
            "url": "http://www.daviddfriedman.com/The_Machinery_of_Freedom_.pdf"
          },
          {
            "title": "The Ethics of Liberty",
            "url": "https://mises.org/library/ethics-liberty"
          }
        ],
        "description": "Libertarianism is a political philosophy that places individual liberty as its core principle, advocating for the maximization of personal freedom and voluntary cooperation while opposing the initiation of force against individuals and their property. This philosophical framework emphasizes self-ownership, property rights, free markets, and the principle that all human relationships and associations should be based on voluntary consent rather than coercion.\n\nThe practical application of libertarian principles leads to the development of parallel structures in various aspects of life - from alternative education systems, private dispute resolution, and community-based security to parallel economic systems and decentralized governance models. These voluntary arrangements demonstrate how essential societal functions can emerge through free association and market mechanisms rather than centralized control.\n\nLibertarian thought has influenced numerous movements focused on creating alternatives to traditional systems, including [[agorism]], [[cryptocurrency]], and various forms of decentralized organization. It provides theoretical groundwork for understanding how individuals can cooperate peacefully and efficiently without relying on centralized authority, inspiring the development of tools and systems that enhance personal autonomy and enable voluntary communities to flourish.",
        "links": [
          {
            "key": "agorism",
            "link": null,
            "target": "agorism"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          }
        ]
      },
      {
        "id": "lunarpunk",
        "name": "Lunarpunk",
        "type": "movement",
        "related": [
          "cypherpunk",
          "privacy",
          "encryption"
        ],
        "description": "Lunarpunk is an emerging philosophical and aesthetic movement that builds upon the foundations of [[cyberpunk]] and [[solarpunk]], with a focus on privacy, anonymity, and resilience in a world of ubiquitous surveillance. The term combines \"lunar\", evoking darkness and mystery, with \"punk\", signifying a rebellious and alternative approach to societal norms.\n\nAt its core, Lunarpunk envisions a future where privacy-enhancing technologies and decentralized systems enable individuals to operate freely in the shadows of digital and physical realms. It embraces the use of [[encryption]], [[anonymous networks]], and [[off-grid living]] as means to resist centralized control and surveillance. Aesthetically, Lunarpunk often incorporates imagery of night, shadows, and celestial bodies, symbolizing the hidden and the mysterious.\n\nThe Lunarpunk ethos extends beyond technology to encompass sustainable living practices that operate independently of mainstream systems. It promotes resilience through local, [[decentralized communities|decentralization]] and [[mutual aid networks|mutual aid]]. While solarpunk focuses on visible, sustainable futures, Lunarpunk explores the potential of hidden, resilient systems that thrive in the metaphorical darkness. This philosophy resonates with those seeking alternatives to pervasive digital surveillance and centralized control, offering a vision of a future where privacy and individual autonomy are preserved through technological and social means.",
        "links": [
          {
            "key": "cyberpunk",
            "link": null,
            "target": "cyberpunk"
          },
          {
            "key": "solarpunk",
            "link": null,
            "target": "solarpunk"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "anonymous networks",
            "link": null,
            "target": null
          },
          {
            "key": "off-grid living",
            "link": null,
            "target": "off-grid-living"
          },
          {
            "key": "decentralized communities",
            "link": "decentralization",
            "target": "decentralization"
          },
          {
            "key": "mutual aid networks",
            "link": "mutual aid",
            "target": null
          }
        ]
      },
      {
        "id": "machine-learning",
        "name": "Machine Learning",
        "type": "technology",
        "description": "Machine Learning (ML) is a branch of [[artificial intelligence]] that focuses on developing systems that can learn and improve from experience without being explicitly programmed. In the context of parallel structures and decentralized systems, ML has evolved to include approaches that distribute computation and learning across multiple nodes or participants, rather than relying on centralized processing. This decentralized approach aligns with principles of [[privacy]], [[security]], and resistance to central control.\n\nA key development in decentralized ML is [[Federated Learning]], which allows multiple parties to train machine learning models collaboratively while keeping their data private and localized. This approach is particularly relevant to parallel structures as it enables the creation of robust learning systems that don't require centralized data collection or processing, preserving individual privacy and autonomy while still benefiting from collective intelligence.\n\nThe intersection of ML with [[blockchain]] technology and other decentralized systems has led to innovative applications in areas such as privacy-preserving AI, distributed decision-making, and autonomous organizations ([[DAOs]]). These systems demonstrate how machine learning can be implemented in ways that support rather than undermine individual sovereignty and privacy, making it a valuable tool for creating parallel structures that operate independently of traditional centralized institutions.",
        "links": [
          {
            "key": "artificial intelligence",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "security",
            "link": null,
            "target": null
          },
          {
            "key": "Federated Learning",
            "link": null,
            "target": null
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "DAOs",
            "link": null,
            "target": "dao"
          }
        ]
      },
      {
        "id": "mass-surveillance",
        "name": "Mass surveillance",
        "type": "practice",
        "keywords": [
          "surveillance"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Mass surveillance\"",
            "url": "https://en.wikipedia.org/wiki/Mass_surveillance"
          }
        ],
        "description": "Mass surveillance refers to the widespread, often covert monitoring of large populations' communications, movements, and activities by governments, corporations, or other entities. This practice has existed for centuries but has dramatically expanded in scope and sophistication with the advent of digital technologies and the internet. Modern mass surveillance employs a variety of methods, including intercepting telecommunications, monitoring internet activity, and collecting [[biometric data|biometrics]].\n\nProponents argue that mass surveillance is necessary for national security, crime prevention, and counterterrorism efforts. Programs like the NSA's [[PRISM]] in the United States and China's [[Golden Shield Project]] exemplify large-scale government surveillance initiatives. However, these practices have sparked intense debate about the balance between security and [[privacy rights]], with critics arguing that mass surveillance threatens civil liberties, chills free speech, and can lead to abuse of power.\n\nThe global discourse on mass surveillance gained significant momentum following the [2013 revelations](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)) by [Edward Snowden](https://en.wikipedia.org/wiki/Edward_Snowden), which exposed the extent of surveillance programs conducted by the [[Five Eyes]] intelligence alliance. These disclosures led to increased public awareness, legal challenges, and efforts to develop stronger [[encryption]] and privacy-preserving technologies. The ongoing tension between surveillance practices and privacy rights continues to shape policy debates, technological development, and international relations in the digital age.",
        "links": [
          {
            "key": "biometric data",
            "link": "biometrics",
            "target": null
          },
          {
            "key": "PRISM",
            "link": null,
            "target": null
          },
          {
            "key": "Golden Shield Project",
            "link": null,
            "target": null
          },
          {
            "key": "privacy rights",
            "link": null,
            "target": null
          },
          {
            "key": "Five Eyes",
            "link": null,
            "target": null
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          }
        ]
      },
      {
        "id": "mesh-networks",
        "name": "Mesh Networks",
        "type": "technology",
        "resources": [
          {
            "title": "Wikipedia article \"Mesh networking\"",
            "url": "https://en.wikipedia.org/wiki/Mesh_networking"
          }
        ],
        "description": "Mesh networks are [[decentralized]] communication systems where each device (node) in the network connects to multiple other nodes, creating redundant paths for data transmission. Unlike traditional networks with centralized infrastructure, mesh networks can function without central control points, making them resilient to failure and [[censorship|censorship resistance]]. Each node in the network acts as both a user and a relay, helping to route data to its destination.\n\nThe key strength of mesh networks lies in their adaptability and resilience. If one node fails or becomes unavailable, data can automatically be rerouted through alternative paths. This architecture enables communities to build their own communication infrastructure independent of traditional Internet Service Providers. Modern mesh networks often use technologies like WiFi, Bluetooth, and LoRa to create interconnected webs of devices that can span neighborhoods or entire cities.\n\nMesh networks represent a practical implementation of [[decentralization]] principles in communication infrastructure. They're particularly valuable for maintaining connectivity during emergencies, enabling communication in areas lacking traditional infrastructure, and creating [[censorship-resistant|censorship resistance]] networks. Projects like *Briar*, *cjdns*, and various community wireless networks demonstrate how mesh networking can support [[digital autonomy]] and community resilience.",
        "links": [
          {
            "key": "decentralized",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "censorship",
            "link": "censorship resistance",
            "target": "censorship-resistance"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "censorship-resistant",
            "link": "censorship resistance",
            "target": "censorship-resistance"
          },
          {
            "key": "digital autonomy",
            "link": null,
            "target": "digital-autonomy"
          }
        ]
      },
      {
        "id": "mixnet",
        "name": "Mixnet",
        "type": "technology",
        "keywords": [
          "mixnets"
        ],
        "resources": [
          {
            "title": "Mix network - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Mix_network"
          },
          {
            "title": "Nym - Privacy Infrastructure",
            "url": "https://nymtech.net/"
          }
        ],
        "description": "A mixnet (mix network) is a routing protocol that uses a chain of proxy servers, called mix nodes, to obscure the correspondence between the messages that go in and the messages that come out, thereby providing anonymous communication. While similar to [[onion routing]] used in systems like [[Tor]], mixnets provide stronger anonymity guarantees through additional mechanisms like message batching, reordering, and intentional delays, making them more resistant to timing analysis attacks at the cost of higher latency.\n\nThe concept was first introduced by [[David Chaum]] in 1981 as a way to implement anonymous email and has since become a fundamental building block for many [[privacy]]-enhancing technologies. Mixnets work by using multiple layers of [[encryption]] (similar to onion routing) where each mix node knows only the previous and next step in the message's journey, but no single node knows both the sender and final recipient. The key difference from onion routing is that mixnets deliberately collect, delay, and shuffle multiple messages together before forwarding them, creating uncertainty about which incoming message corresponds to which outgoing message.\n\nModern implementations of mixnets are being developed for various applications beyond email, including cryptocurrency transactions, instant messaging, and general internet traffic anonymization. Projects like [[Nym]] are building mixnet-based privacy infrastructure that aims to protect against both passive and active surveillance at the network level. While onion routing focuses on low-latency communication suitable for web browsing, mixnets prioritize stronger anonymity guarantees through their batch processing approach, making them more suitable for applications where timing is less critical but privacy is paramount.",
        "links": [
          {
            "key": "onion routing",
            "link": null,
            "target": "onion-routing"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "David Chaum",
            "link": null,
            "target": null
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "Nym",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "nap",
        "name": "Non-Aggression Principle (NAP)",
        "type": "philosophy",
        "keywords": [
          "NAP",
          "Non-Aggression Principle",
          "non-aggression principle"
        ],
        "resources": [
          {
            "title": "Non-aggression Principle Guide",
            "url": "https://www.libertarianism.org/topics/non-aggression-principle"
          },
          {
            "title": "What you should know about the Non-Aggression Principle",
            "url": "https://www.learnliberty.org/blog/what-you-should-know-about-the-non-aggression-principle/"
          }
        ],
        "description": "The Non-Aggression Principle (NAP) is a fundamental ethical principle that states that no one may threaten or commit violence (\"aggress\") against another person's life, body, or property. It is considered a defining principle of [[libertarianism]] and [[anarcho-capitalism]], serving as an ethical foundation for advocating individual rights, private property, and voluntary interaction between people.\n\nThe principle defines aggression as the initiation or threat of physical violence against a person or their property, making a clear distinction between defensive and offensive use of force. Under NAP, defensive force is considered legitimate when used to protect oneself or one's property from aggression. This principle is closely tied to the concept of [[self-ownership]] and extends to the idea that individuals have absolute right to their body and legitimately acquired property.\n\nWhile widely embraced in libertarian circles, the NAP has sparked philosophical debates about its scope, interpretation, and practical application. Critics argue about edge cases and definitional challenges, such as what constitutes aggression, how property rights should be defined, and how the principle applies to complex real-world scenarios. Despite these debates, the NAP remains influential in shaping discussions about individual rights, the role of government, and the ethical foundations of a free society.",
        "links": [
          {
            "key": "libertarianism",
            "link": null,
            "target": "libertarianism"
          },
          {
            "key": "anarcho-capitalism",
            "link": null,
            "target": "anarchocapitalism"
          },
          {
            "key": "self-ownership",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "neurotechnology",
        "name": "Neurotechnology",
        "type": "field",
        "description": "Neurotechnology is an interdisciplinary field that combines neuroscience with technological innovation to develop systems that can interact directly with the nervous system. This emerging field encompasses a wide range of applications, from medical treatments and neural prosthetics to brain-computer interfaces and cognitive enhancement technologies. The core aim is to understand, monitor, and influence neural activity to improve human health, capabilities, and experience.\n\nThe field includes several key applications such as *neural interfaces*, *neuroprosthetics*, *deep brain stimulation* (DBS), and *neurobiofeedback*. These technologies are being used to treat neurological conditions like Parkinson's disease, epilepsy, and paralysis, while also showing promise in enhancing cognitive functions and enabling direct brain-to-computer communication. The development of these technologies relies heavily on advances in [[artificial intelligence]], [[machine learning]], and [[microelectronics]].\n\nAs neurotechnology continues to advance, it raises important ethical considerations regarding [[privacy]], [[consent]], and human enhancement. The ability to directly interface with and potentially modify neural activity presents both tremendous opportunities and significant challenges for society. This intersection with ethics and human rights has led to discussions about [[neuroethics]] and the need for appropriate governance frameworks to ensure responsible development and deployment of these technologies. The field is closely related to movements like [[transhumanism]] and [[biohacking]], which explore human enhancement and the future of human-technology integration.",
        "links": [
          {
            "key": "artificial intelligence",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "machine learning",
            "link": null,
            "target": "machine-learning"
          },
          {
            "key": "microelectronics",
            "link": null,
            "target": null
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "consent",
            "link": null,
            "target": null
          },
          {
            "key": "neuroethics",
            "link": null,
            "target": null
          },
          {
            "key": "transhumanism",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "biohacking",
            "link": null,
            "target": "biohacking"
          }
        ]
      },
      {
        "id": "nft",
        "name": "Non-Fungible Token (NFT)",
        "keywords": [
          "NFTs",
          "non-fungible tokens (NFTs)"
        ],
        "type": "technology",
        "resources": [
          {
            "title": "NFTs on Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Non-fungible_token"
          }
        ],
        "description": "A Non-Fungible Token (NFT) is a unique digital identifier recorded on a [[blockchain]] that certifies the ownership and authenticity of a specific digital asset. Unlike cryptocurrencies such as [[Bitcoin]], which are fungible (meaning each unit is identical and interchangeable), NFTs are unique and cannot be exchanged on a like-for-like basis. This technology enables digital scarcity and verifiable ownership of digital assets, including artwork, music, videos, virtual real estate, and other forms of digital content.\n\nThe rise of NFTs has significantly impacted the digital art world by providing artists with new ways to monetize their work and collectors with verifiable ownership of digital pieces. This technology addresses a long-standing challenge in digital art: the ability to establish scarcity and authenticity in an environment where digital files can be easily copied. Through [[smart contracts]] on blockchain platforms like [[Ethereum]], NFTs can also enable artists to receive royalties automatically whenever their work is resold in the secondary market.\n\nNFTs represent a convergence of [[cryptography]], digital art, and blockchain technology, embodying many principles of the [[cypherpunk]] movement regarding digital ownership and individual sovereignty. The technology has sparked discussions about the future of digital property rights, the nature of ownership in the digital age, and the democratization of art markets. While initially associated primarily with digital art, NFTs have expanded to include applications in gaming ([[GameFi]]), identity verification, and various forms of digital collectibles, demonstrating their potential to reshape how we think about digital assets and ownership.",
        "links": [
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "Ethereum",
            "link": null,
            "target": "ethereum"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "GameFi",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "nootropics",
        "name": "Nootropics",
        "type": "substance",
        "resources": [
          {
            "title": "Wikipedia article on Nootropics",
            "url": "https://en.wikipedia.org/wiki/Nootropic"
          }
        ],
        "description": "Nootropics, also known as \"smart drugs\" or \"cognitive enhancers,\" are natural, semisynthetic, or synthetic compounds that aim to improve cognitive function, particularly executive functions, memory, creativity, or motivation in healthy individuals. The term was coined by Romanian psychologist Corneliu E. Giurgea in 1972, who established several criteria for what constitutes a nootropic, including the enhancement of learning capabilities, resistance to disrupting brain conditions, and very few side effects.\n\nThese substances can be broadly categorized into two main types: natural nootropics (like *caffeine*, *L-theanine*, and various herbal compounds) and synthetic nootropics (such as *modafinil*, *piracetam*, and other prescription medications). Natural nootropics are often derived from plants and have been used in traditional medicine systems for centuries, while synthetic nootropics are laboratory-created compounds designed specifically for cognitive enhancement. The field of [[biohacking]] has embraced nootropics as tools for optimizing mental performance and achieving enhanced states of consciousness.\n\nThe use of nootropics intersects with various movements focused on human enhancement, including the [[transhumanism]] movement and [[DIY biology]] communities. While proponents argue for their benefits in improving productivity and cognitive capabilities, there are ongoing debates about their safety, efficacy, and ethical implications. The long-term effects of many nootropics remain understudied, and their use raises important questions about [[cognitive liberty]], human enhancement ethics, and the future of human performance optimization.",
        "links": [
          {
            "key": "biohacking",
            "link": null,
            "target": "biohacking"
          },
          {
            "key": "transhumanism",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "DIY biology",
            "link": null,
            "target": null
          },
          {
            "key": "cognitive liberty",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "off-grid-living",
        "name": "Off-Grid Living",
        "type": "concept",
        "resources": [
          {
            "title": "Wikipedia article \"Off-the-grid\"",
            "url": "https://en.wikipedia.org/wiki/Off-the-grid"
          }
        ],
        "description": "Off-grid living refers to a lifestyle characterized by independence from centralized utilities and systems. It involves creating self-sufficient living spaces that operate without reliance on public infrastructure for electricity, water, food, or other essential resources. This approach emphasizes [[self-sovereignty]] and resilience through the use of independent systems and sustainable practices.\n\nThe core components of off-grid living typically include [[renewable energy]] systems (such as solar, wind, or micro-hydro), water collection and purification systems, food production methods, and waste management solutions. Modern off-grid setups often incorporate advanced technologies like [[battery storage]], [[smart power management]], and efficient appliances, demonstrating that independence from centralized systems doesn't mean sacrificing modern comforts.\n\nOff-grid living represents a practical implementation of [[decentralization]] principles in everyday life. It intersects with concepts like [[permaculture]], [[circular economy]], and [[resilient communities]]. Beyond individual households, off-grid principles can scale to larger communities and networks, creating interconnected systems of independent units that support each other while maintaining autonomy from centralized infrastructure.",
        "links": [
          {
            "key": "self-sovereignty",
            "link": null,
            "target": "self-sovereignty"
          },
          {
            "key": "renewable energy",
            "link": null,
            "target": null
          },
          {
            "key": "battery storage",
            "link": null,
            "target": null
          },
          {
            "key": "smart power management",
            "link": null,
            "target": null
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "permaculture",
            "link": null,
            "target": null
          },
          {
            "key": "circular economy",
            "link": null,
            "target": null
          },
          {
            "key": "resilient communities",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "onion-routing",
        "name": "Onion Routing",
        "type": "technique",
        "resources": [
          {
            "title": "Wikipedia article \"Onion routing\"",
            "url": "https://en.wikipedia.org/wiki/Onion_routing"
          }
        ],
        "description": "Onion Routing is a technique for [[anonymous communication]] over computer networks. It encrypts data in multiple layers and transmits it through a series of network nodes, with each node \"peeling\" away a single layer of encryption to uncover the data's next destination. This process obscures the data's origin, destination, and content from network surveillance and traffic analysis.\n\nThe key principle behind onion routing is to protect the privacy of the sender and recipient of a message, as well as the message's contents. Data is [[encrypted|Encryption]] multiple times and sent through several network nodes. Each node only knows the immediate preceding and following nodes in the communication chain, making it difficult to trace the complete path of the data.\n\nWhile [[Tor]] (The Onion Router) is the most widely known implementation, various onion routing networks exist, each with its own architecture and node structure. These networks can be used to access regular websites anonymously or to reach special [[hidden services]] that are only accessible within the onion network. Onion routing has become a crucial tool for privacy-conscious users, journalists, activists, and others seeking to communicate securely and anonymously online.",
        "links": [
          {
            "key": "anonymous communication",
            "link": null,
            "target": "anonymous-communication"
          },
          {
            "key": "encrypted",
            "link": "Encryption",
            "target": "encryption"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "hidden services",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "open-hardware",
        "name": "Open Hardware",
        "keywords": [
          "Open Source Hardware"
        ],
        "type": "concept",
        "resources": [
          {
            "title": "Open Source Hardware Association",
            "url": "https://www.oshwa.org/definition/"
          },
          {
            "title": "Arduino - Open Source Hardware",
            "url": "https://www.arduino.cc/en/Main/FAQ#toc3"
          },
          {
            "title": "Open Hardware Repository at CERN",
            "url": "https://ohwr.org/"
          }
        ],
        "description": "Open Hardware (also known as Open Source Hardware or OSHW) refers to physical artifacts whose design has been released to the public in such a way that anyone can study, modify, distribute, make, and sell the design or hardware based on that design. The hardware's source files, including mechanical drawings, schematics, bills of materials, PCB layout data, HDL source code, and any software that interfaces with the hardware, must be readily available and modifiable under an open license.\n\nThe open hardware movement emerged alongside the [[open source]] software movement but focuses on physical objects rather than code. Notable examples include [[Arduino]], an open-source electronics platform, and RepRap, a self-replicating 3D printer project. This approach to hardware development promotes innovation through collaboration, enables [[decentralized manufacturing]], and provides alternatives to proprietary hardware solutions. The movement is particularly important in contexts of [[technological sovereignty]] and [[digital autonomy]], as it allows communities to understand, modify, and control the technology they use.\n\nOpen hardware plays a crucial role in parallel structures by enabling communities to build and maintain their own infrastructure without depending on centralized manufacturers or closed systems. It intersects with various movements including [[maker culture]], [[biohacking]], and [[appropriate technology]]. The philosophy behind open hardware aligns with principles of [[technological empowerment]], knowledge sharing, and resistance to vendor lock-in. This approach has been particularly influential in fields such as scientific instrumentation, medical devices, and sustainable technology development, where open access to hardware designs can accelerate innovation and reduce costs.",
        "links": [
          {
            "key": "open source",
            "link": null,
            "target": "foss"
          },
          {
            "key": "Arduino",
            "link": null,
            "target": null
          },
          {
            "key": "decentralized manufacturing",
            "link": null,
            "target": null
          },
          {
            "key": "technological sovereignty",
            "link": null,
            "target": null
          },
          {
            "key": "digital autonomy",
            "link": null,
            "target": "digital-autonomy"
          },
          {
            "key": "maker culture",
            "link": null,
            "target": null
          },
          {
            "key": "biohacking",
            "link": null,
            "target": "biohacking"
          },
          {
            "key": "appropriate technology",
            "link": null,
            "target": null
          },
          {
            "key": "technological empowerment",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "opsec",
        "name": "Operational Security (OpSec)",
        "keywords": [
          "operational security",
          "opsec"
        ],
        "type": "concept",
        "resources": [
          {
            "title": "What is OPSEC (operations security)?",
            "url": "https://www.techtarget.com/searchsecurity/definition/OPSEC-operations-security"
          }
        ],
        "description": "Operations Security (OpSec) is a systematic process and set of practices designed to protect critical information and prevent potential adversaries from gaining access to sensitive data or operations. Originally developed as a military concept during the Vietnam War under the codename \"Purple Dragon,\" OpSec has since evolved to become a crucial component of both governmental and civilian security practices. The core principle of OpSec is identifying and protecting information that could be pieced together by adversaries to gain insights into protected activities or systems.\n\nOpSec follows a five-step process: identifying critical information, analyzing threats, analyzing vulnerabilities, assessing risks, and implementing countermeasures. This methodology helps organizations and individuals maintain [[privacy]] and security by controlling the information they reveal through their actions and communications. In the context of [[crypto-anarchism]] and [[cypherpunk]] movements, OpSec practices are essential for protecting [[digital privacy]], maintaining [[anonymity]], and securing [[cryptocurrency]] assets.\n\nIn the modern digital age, OpSec has become increasingly important as threats have evolved beyond traditional military applications to include cybersecurity, personal privacy, and protection against [[surveillance|mass surveillance]]. It encompasses both technical security measures (like [[encryption]], [[secure communications]], and [[digital signatures]]) and behavioral practices (such as social media awareness, physical security, and information compartmentalization). For practitioners of parallel structures and alternative systems, strong OpSec is fundamental to maintaining independence from traditional power structures while protecting sensitive activities and information.",
        "links": [
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "crypto-anarchism",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "digital privacy",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "anonymity",
            "link": null,
            "target": null
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "surveillance",
            "link": "mass surveillance",
            "target": "mass-surveillance"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "secure communications",
            "link": null,
            "target": "secure-communication"
          },
          {
            "key": "digital signatures",
            "link": null,
            "target": "digital-signature"
          }
        ]
      },
      {
        "id": "p2p",
        "name": "Peer-to-peer (P2P)",
        "type": "technology",
        "keywords": [
          "peer-to-peer",
          "P2P"
        ],
        "resources": [
          {
            "title": "P2P Architecture Definition (RFC 5694)",
            "url": "https://datatracker.ietf.org/doc/rfc5694/"
          }
        ],
        "description": "Peer-to-peer (P2P) is a distributed network architecture where participants (peers) share resources directly with each other without requiring central coordination. In a P2P network, each node can act as both client and server, enabling direct exchange of data, processing power, or other resources between participants. This decentralized approach stands in contrast to traditional client-server models where clients must interact through centralized servers.\n\nThe history of P2P technology gained mainstream attention in the late 1990s with file-sharing applications like [[Napster]], though the concept dates back to early internet protocols. P2P networks demonstrate several key advantages including improved scalability (as network capacity grows with each new peer), enhanced resilience (no single point of failure), and cost efficiency (shared resources reduce infrastructure needs). Notable applications include [[BitTorrent]] for file sharing, [[Bitcoin]] and other [[cryptocurrencies]] for financial transactions, and [[distributed computing]] projects.\n\nP2P architecture has become fundamental to many modern [[decentralized applications]] (dApps) and [[blockchain]] technologies. The technology enables creation of resilient systems that operate without central authority, aligning with principles of [[digital freedom]] and [[decentralization]]. P2P networks continue to evolve with applications in content distribution, communication systems, and [[distributed storage]], though they also face challenges around security, legal compliance, and quality of service management.",
        "links": [
          {
            "key": "Napster",
            "link": null,
            "target": null
          },
          {
            "key": "BitTorrent",
            "link": null,
            "target": "bittorrent"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "distributed computing",
            "link": null,
            "target": null
          },
          {
            "key": "decentralized applications",
            "link": null,
            "target": "dapps"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "digital freedom",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "distributed storage",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "paralelni-polis-essay",
        "name": "Paralelní Polis",
        "type": "essay",
        "year": 1978,
        "resources": [
          {
            "title": "Original text in Czech language",
            "url": "http://www.disent.usd.cas.cz/wp-content/uploads/09_Benda1-1.pdf"
          }
        ],
        "description": "\"Paralelní Polis\" (Parallel Polis) is an influential essay written by Czech philosopher and political dissident [Václav Benda](https://en.wikipedia.org/wiki/V%C3%A1clav_Benda) in 1978. The essay introduced the concept of creating parallel structures within society as a means of resistance against totalitarian regimes, particularly in the context of *Communist Czechoslovakia*. Benda's work became a foundational text for the *Czech dissident movement* (Charta 77) and had a significant impact on political thought in Eastern Europe.\n\nThe core idea of the essay is that citizens should establish independent social, cultural, and economic institutions that operate outside the control of the authoritarian state. These parallel structures would serve as alternatives to official institutions, allowing people to live more freely and authentically while gradually eroding the power of the oppressive regime. Benda argued that this approach could create a \"parallel polis\" - a shadow society that embodies the values and freedoms suppressed by the totalitarian government.\n\nThe concept of Paralelní Polis influenced the development of civil society in Eastern Europe during the late 20th century and played a role in the peaceful resistance that ultimately led to the fall of communism in the region. The essay's ideas continue to resonate in contemporary discussions about grassroots organizing, decentralized systems, and resistance to authoritarian power structures. Today, the concept has been adopted by various groups seeking to create alternative social and economic models, including [[cryptocurrency]] advocates and proponents of decentralized technologies.",
        "links": [
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          }
        ]
      },
      {
        "id": "piracy",
        "name": "Piracy",
        "type": "concept",
        "description": "Piracy, in the digital context, refers to the unauthorized copying, distribution, or use of copyrighted digital content such as software, music, movies, books, and other media. While traditionally viewed as illegal by mainstream institutions and copyright holders, some within parallel structure movements see it as a form of [[information freedom]] and resistance against restrictive intellectual property regimes. This tension highlights the ongoing debate between proprietary control and the free flow of information in the digital age.\n\nFrom a [[crypto-anarchist]] perspective, piracy can be seen as a practical implementation of counter-economic principles, creating parallel distribution networks that operate outside traditional market structures. These networks, often utilizing [[peer-to-peer]] technologies and [[encryption]], demonstrate how decentralized systems can emerge to challenge established institutional control over information distribution. The development of technologies like [[BitTorrent]] and various file-sharing platforms has been significantly influenced by this dynamic.\n\nThe impact of digital piracy extends beyond simple economic considerations into questions of [[digital rights]], [[information accessibility]], and the nature of ownership in the digital age. While mainstream discourse often focuses on its negative economic effects, advocates within parallel structure movements emphasize its role in preserving cultural heritage, promoting information equality, and resisting [[digital rights management]] (DRM) and other restrictive measures. This has led to the development of various [[decentralized storage]] solutions and content distribution networks that prioritize information freedom.",
        "links": [
          {
            "key": "information freedom",
            "link": null,
            "target": null
          },
          {
            "key": "crypto-anarchist",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "BitTorrent",
            "link": null,
            "target": "bittorrent"
          },
          {
            "key": "digital rights",
            "link": null,
            "target": null
          },
          {
            "key": "information accessibility",
            "link": null,
            "target": null
          },
          {
            "key": "digital rights management",
            "link": null,
            "target": null
          },
          {
            "key": "decentralized storage",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "plausible-deniability",
        "name": "Plausible deniability",
        "type": "concept",
        "resources": [
          {
            "title": "Wikipedia article \"Plausible deniability\"",
            "url": "https://en.wikipedia.org/wiki/Plausible_deniability"
          }
        ],
        "description": "Plausible deniability is a concept in which individuals or organizations can deny knowledge of or responsibility for some actions without direct lies or deceit, usually because of a lack of evidence that confirms their participation. Originally developed in the context of national security and intelligence operations, the concept has since found applications in various fields, including politics, law, and technology.\n\nIn politics and diplomacy, plausible deniability often involves structuring the chain of command to shield decision-makers from potential repercussions of controversial or illegal activities. This strategy was notably employed during the Cold War era, particularly in covert operations. In the legal realm, it can be used as a defense strategy, where defendants maintain their innocence by arguing that there is no concrete proof of their involvement in alleged wrongdoings.\n\nIn the digital age, plausible deniability has gained significance in the context of [[information security]] and privacy. [[Encryption]] technologies like [TrueCrypt](https://en.wikipedia.org/wiki/TrueCrypt) and its successors offer features that allow users to deny the existence of encrypted data. Similarly, some [[secure communication]] protocols are designed to provide deniability of message origins or participation in conversations.",
        "links": [
          {
            "key": "information security",
            "link": null,
            "target": null
          },
          {
            "key": "Encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "secure communication",
            "link": null,
            "target": "secure-communication"
          }
        ]
      },
      {
        "id": "post-state-governance-models",
        "name": "Post-State Governance Models",
        "type": "concept",
        "description": "Post-State Governance Models refer to alternative systems of social and political organization that aim to transcend traditional nation-state structures through decentralized, networked, and often technology-enabled forms of governance. These models explore how communities can organize, make decisions, and provide services traditionally associated with states (such as security, dispute resolution, and public goods) without relying on centralized state authority.\n\nThese governance models often incorporate elements of [[decentralized autonomous organizations]] (DAOs), [[smart contracts]], and other blockchain-based systems to create transparent, programmable rule sets that can govern interactions between participants. Some examples include private cities, [[seasteading]], digital jurisdictions, and various forms of market anarchism. These systems typically emphasize voluntary association, individual sovereignty, and the ability to exit or choose between competing governance providers.\n\nThe development of post-state governance models is closely tied to technological advancement, particularly in [[cryptography]], [[blockchain]], and digital communications. These technologies enable new forms of coordination, consensus-building, and resource allocation that weren't possible in traditional state structures. While many of these models remain theoretical or experimental, they represent important explorations into how society might organize itself in an increasingly digital and interconnected world where traditional national boundaries and centralized authority structures may become less relevant.",
        "links": [
          {
            "key": "decentralized autonomous organizations",
            "link": null,
            "target": "dao"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "seasteading",
            "link": null,
            "target": "seasteading"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          }
        ]
      },
      {
        "id": "prediction-markets",
        "name": "Prediction Markets",
        "type": "concept",
        "keywords": [
          "prediction market"
        ],
        "resources": [
          {
            "title": "What is Polymarket? Decentralized Prediction Markets Explained",
            "url": "https://decrypt.co/resources/what-is-polymarket-decentralized-prediction-markets-explained"
          }
        ],
        "description": "Prediction markets are platforms where users can trade on the outcomes of future events, effectively creating a market-based forecasting system. In the cryptocurrency space, decentralized prediction markets like *Polymarket* and *Augur* allow users to bet on real-world event outcomes using cryptocurrencies, with the market prices reflecting the collective probability assessment of those events occurring.\n\nThe concept of prediction markets has existed for centuries, but blockchain technology has enabled truly decentralized and [[censorship-resistant|censorship resistance]] implementations. These platforms typically use [[smart contracts]] to automatically settle trades based on predefined outcomes, eliminating the need for trusted intermediaries. Users can create markets for various events ranging from political elections and sports outcomes to economic indicators and technological developments.\n\nPrediction markets are considered valuable tools for aggregating information and generating accurate forecasts, as they incentivize participants to bet according to their true beliefs rather than personal biases. Within the [[cryptocurrency]] ecosystem, they represent an important application of [[decentralized finance]] (DeFi) principles, combining financial markets with information discovery while maintaining user privacy and resistance to censorship through blockchain technology.",
        "links": [
          {
            "key": "censorship-resistant",
            "link": "censorship resistance",
            "target": "censorship-resistance"
          },
          {
            "key": "smart contracts",
            "link": null,
            "target": "smart-contract"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "decentralized finance",
            "link": null,
            "target": "defi"
          }
        ]
      },
      {
        "id": "privacy",
        "name": "Privacy",
        "type": "concept",
        "resources": [
          {
            "title": "Wikipedia article \"Privacy\"",
            "url": "https://en.wikipedia.org/wiki/Privacy"
          }
        ],
        "description": "Privacy is the right of an individual or group to control information about themselves and determine when, how, and to what extent this information is communicated to others. In the digital age, privacy has become increasingly complex and crucial, encompassing not only physical space but also digital data and online activities.\n\nAt its core, privacy is about personal autonomy and the ability to make choices free from observation or interference. It includes concepts like [[information privacy]] (control over personal data), [[communications privacy]] (freedom from surveillance of communications), and [[bodily privacy|physical privacy]] (control over one's physical self). In the digital realm, privacy concerns extend to [[data collection]], [[online tracking]], and the use of personal information by governments and corporations.\n\nPrivacy is protected by various legal frameworks, including the [Universal Declaration of Human Rights](https://en.wikipedia.org/wiki/Universal_Declaration_of_Human_Rights) and specific legislation like the [EU's General Data Protection Regulation (GDPR)](https://en.wikipedia.org/wiki/General_Data_Protection_Regulation). However, it faces significant challenges in the era of big data, social media, and [[mass surveillance]]. The balance between privacy and other interests, such as national security or technological innovation, remains a subject of ongoing debate. Privacy-enhancing technologies, including [[encryption]]), [[anonymity networks]], and [[privacy-preserving computation]], are increasingly important tools for protecting individual privacy in the digital world.",
        "links": [
          {
            "key": "information privacy",
            "link": null,
            "target": null
          },
          {
            "key": "communications privacy",
            "link": null,
            "target": null
          },
          {
            "key": "bodily privacy",
            "link": "physical privacy",
            "target": null
          },
          {
            "key": "data collection",
            "link": null,
            "target": null
          },
          {
            "key": "online tracking",
            "link": null,
            "target": null
          },
          {
            "key": "mass surveillance",
            "link": null,
            "target": "mass-surveillance"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "anonymity networks",
            "link": null,
            "target": null
          },
          {
            "key": "privacy-preserving computation",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "proof-of-stake",
        "name": "Proof of Stake (PoS)",
        "keywords": [
          "PoS",
          "Proof of Stake",
          "proof-of-stake"
        ],
        "type": "consensus mechanism",
        "resources": [
          {
            "title": "What is Proof of Stake? | Consensys",
            "url": "https://consensys.io/blog/what-is-proof-of-stake"
          },
          {
            "title": "Proof of Stake - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Proof_of_stake"
          }
        ],
        "description": "Proof of Stake (PoS) is a [[consensus mechanism]] used in [[blockchain]] networks to validate transactions and create new blocks. Unlike [[Proof of Work]], which relies on computational power, PoS selects validators based on the amount of cryptocurrency they \"stake\" or lock up as collateral in the network. This approach is significantly more energy-efficient and environmentally friendly compared to traditional mining methods.\n\nThe PoS mechanism works by having participants (called validators) lock up a certain amount of tokens as stake in the network. The probability of being chosen to validate the next block is generally proportional to the amount staked - the more tokens staked, the higher the chance of being selected. If validators approve fraudulent transactions, they can lose part or all of their staked tokens, creating a strong economic incentive for honest behavior.\n\nThis consensus mechanism has gained significant attention since [[Ethereum]]'s transition from Proof of Work to Proof of Stake (known as \"The Merge\"). Other notable [[blockchain]] platforms using PoS include Cardano, Solana, and Polkadot. The adoption of PoS represents a shift in the cryptocurrency industry towards more sustainable and scalable solutions, though it faces its own challenges regarding centralization risks, as those with more tokens naturally have more influence over the network.",
        "links": [
          {
            "key": "consensus mechanism",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "Proof of Work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "Ethereum",
            "link": null,
            "target": "ethereum"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          }
        ]
      },
      {
        "id": "proof-of-work",
        "name": "Proof of Work (PoW)",
        "type": "consensus mechanism",
        "keywords": [
          "proof of work",
          "proof-of-work",
          "pow",
          "proof-of-work (pow)",
          "Proof of Work (PoW)"
        ],
        "resources": [
          {
            "title": "Wikipedia article \"Proof of Work\"",
            "url": "https://en.wikipedia.org/wiki/Proof_of_work"
          }
        ],
        "description": "Proof of Work (PoW) is a [[consensus mechanism]] and spam prevention system first developed to combat email spam and later adapted for use in cryptocurrencies, most notably [[Bitcoin]]. It requires participants (often called miners) to expend computational effort solving complex mathematical puzzles to validate transactions and create new blocks in a blockchain.\n\nIn a PoW system, miners compete to solve a cryptographic hash function with a specific level of difficulty. The first miner to find a solution that meets the required criteria broadcasts it to the network for verification. If valid, the new block is added to the blockchain, and the successful miner is rewarded with newly minted cryptocurrency and transaction fees. This process serves multiple purposes: it secures the network against attacks, distributes new currency, and provides a decentralized method for reaching consensus on the state of the ledger.\n\nWhile PoW has proven to be a robust and secure system for cryptocurrencies, it has faced criticism for its high energy consumption and potential for centralization as mining becomes more resource-intensive. These concerns have led to the development of alternative consensus mechanisms like [[Proof of Stake]] and explorations into more energy-efficient PoW algorithms. Despite these challenges, PoW remains a fundamental concept in the cryptocurrency ecosystem, underpinning the security and operation of many blockchain networks.",
        "links": [
          {
            "key": "consensus mechanism",
            "link": null,
            "target": "consensus-mechanism"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "Proof of Stake",
            "link": null,
            "target": "proof-of-stake"
          }
        ]
      },
      {
        "id": "pseudonimity",
        "name": "Pseudonymity",
        "type": "concept",
        "resources": [
          {
            "title": "Wikipedia article \"Pseudonymity\"",
            "url": "https://en.wikipedia.org/wiki/Pseudonymity"
          }
        ],
        "description": "Pseudonymity is a state of operating under a pseudonym (a fake name or identifier) while maintaining a consistent identity over time. Unlike [[anonymity]], where an actor is completely unknown, pseudonymity allows individuals to build reputation, maintain relationships, and engage in long-term interactions while protecting their real identity. This concept is fundamental to many [[privacy]]-preserving systems and digital communities.\n\nIn digital spaces, pseudonymity enables users to participate in public discourse, conduct business, or build online presence without exposing their physical world identity. The persistence of pseudonymous identities allows for accountability and trust-building while maintaining privacy. Notable examples include [[Satoshi Nakamoto]], the pseudonymous creator of Bitcoin, and countless developers, writers, and activists who operate under consistent pseudonyms.\n\nPseudonymity is closely related to concepts like [[reputation systems]], [[digital identity]], and [[privacy-enhancing technologies]]. It's particularly important in [[cryptocurrency]] networks, where users operate through pseudonymous addresses, and in online communities where reputation and consistent identity matter. Technologies like [[digital signatures]] and [[zero-knowledge proofs]] help users prove ownership of their pseudonymous identities without revealing their real-world identities.",
        "links": [
          {
            "key": "anonymity",
            "link": null,
            "target": null
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "Satoshi Nakamoto",
            "link": null,
            "target": "satoshi-nakamoto"
          },
          {
            "key": "reputation systems",
            "link": null,
            "target": null
          },
          {
            "key": "digital identity",
            "link": null,
            "target": "digital-identity"
          },
          {
            "key": "privacy-enhancing technologies",
            "link": null,
            "target": null
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "digital signatures",
            "link": null,
            "target": "digital-signature"
          },
          {
            "key": "zero-knowledge proofs",
            "link": null,
            "target": "zero-knowledge-proof"
          }
        ]
      },
      {
        "id": "public-key-cryptography",
        "name": "Public Key Cryptography",
        "keywords": [
          "public-key cryptography"
        ],
        "type": "cryptography",
        "resources": [
          {
            "title": "Understanding Public Key Cryptography",
            "url": "https://www.cloudflare.com/learning/ssl/how-does-public-key-encryption-work/"
          },
          {
            "title": "Public Key Cryptography - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Public-key_cryptography"
          }
        ],
        "description": "Public Key Cryptography, also known as asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. This system enables secure communication and authentication without requiring a pre-shared secret between parties. The fundamental breakthrough of public key cryptography is that it allows people who have never met to securely exchange encrypted messages and verify the authenticity of digital signatures.\n\nThe system works through mathematical functions that are easy to compute in one direction but computationally infeasible to reverse without specific knowledge (the private key). This property enables several critical applications: [[encryption]] (using the recipient's public key to ensure only they can read the message), [[digital signatures]] (using the sender's private key to prove authenticity), and *key exchange* protocols. Public key cryptography is essential to modern [[digital security]] and forms the backbone of secure internet communications through protocols like *SSL/TLS*.\n\nPublic key cryptography has been revolutionary for enabling secure digital communications and is fundamental to many aspects of modern life, from secure websites to [[cryptocurrency]] transactions. It plays a crucial role in the [[cypherpunk]] movement and the development of privacy-preserving technologies. Notable implementations include *PGP* (Pretty Good Privacy) for secure email, *SSH* (Secure Shell) for remote system access, and the cryptographic systems underlying [[Bitcoin]] and other blockchain technologies. The most widely used public key algorithms include *RSA*, *Elliptic Curve Cryptography*, and *Ed25519*.",
        "links": [
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "digital signatures",
            "link": null,
            "target": "digital-signature"
          },
          {
            "key": "digital security",
            "link": null,
            "target": null
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          }
        ]
      },
      {
        "id": "satoshi-nakamoto",
        "name": "Satoshi Nakamoto",
        "type": "pseudonym",
        "resources": [
          {
            "title": "Bitcoin Whitepaper by Satoshi Nakamoto",
            "url": "https://bitcoin.org/bitcoin.pdf"
          }
        ],
        "description": "Satoshi Nakamoto is the pseudonymous creator of [[Bitcoin]] who published the Bitcoin whitepaper in 2008 and launched the Bitcoin network in 2009. Despite being responsible for one of the most revolutionary financial innovations of the 21st century, Nakamoto's true identity remains unknown, having disappeared from public communication in 2011 after handing over Bitcoin's development to other contributors. The estimated 1 million bitcoins in wallets associated with Nakamoto remain untouched.\n\nThe mystery surrounding Satoshi Nakamoto's identity has become legendary in the [[cryptocurrency]] world, with numerous theories and investigations attempting to unmask the creator. Various individuals have been proposed as candidates, including *Nick Szabo*, *Hal Finney*, and *Craig Wright*, though none have been conclusively proven to be Nakamoto. The decision to remain anonymous aligns with [[cypherpunk]] principles of privacy and the decentralized nature of Bitcoin itself.\n\nNakamoto's contributions go far beyond just creating Bitcoin - they solved the long-standing [[double-spending problem]] in digital currencies through the innovative use of [[blockchain]] technology and [[proof-of-work]] consensus mechanism. Their writings and code demonstrated deep knowledge of [[cryptography]], computer science, and economics, while their philosophical views on banking, privacy, and decentralization have profoundly influenced the broader [[cryptocurrency]] movement and [[digital freedom]] advocacy.",
        "links": [
          {
            "key": "Bitcoin",
            "link": null,
            "target": "bitcoin"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "double-spending problem",
            "link": null,
            "target": "double-spending-problem"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "proof-of-work",
            "link": null,
            "target": "proof-of-work"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "digital freedom",
            "link": null,
            "target": "digital-freedom"
          }
        ]
      },
      {
        "id": "seasteading",
        "name": "Seasteading",
        "type": "concept",
        "resources": [
          {
            "title": "The Seasteading Institute",
            "url": "https://www.seasteading.org/"
          },
          {
            "title": "Seasteading Book by Joe Quirk and Patri Friedman",
            "url": "https://www.amazon.com/Seasteading-Floating-Environment-Liberate-Politicians/dp/1451699263"
          }
        ],
        "description": "Seasteading is the concept of creating permanent dwellings at sea, particularly floating cities in international waters that operate with significant autonomy from existing nations. The modern seasteading movement was formalized with the founding of The Seasteading Institute (TSI) by Patri Friedman and Wayne Gramlich in 2008, with significant backing from Peter Thiel. The concept represents an intersection of [[libertarianism]], technological innovation, and environmental sustainability.\n\nThe core philosophy behind seasteading is to enable experimentation with new forms of [[governance]] and social organization by creating autonomous floating communities beyond the jurisdiction of existing nations. Proponents argue that seasteading could foster innovation in political and social systems, similar to how startup companies drive innovation in technology. These floating cities are envisioned as platforms for testing new approaches to government, economics, and social organization.\n\nFrom a technical perspective, seasteading involves developing sustainable floating architecture that can withstand ocean conditions while providing comfortable living spaces. The movement intersects with various fields including marine engineering, [[sustainable technology]], and [[alternative energy]]. Modern seasteading proposals often emphasize environmental benefits, suggesting that floating cities could help address rising sea levels, overpopulation, and provide new approaches to *ocean conservation* and sustainable resource management.",
        "links": [
          {
            "key": "libertarianism",
            "link": null,
            "target": "libertarianism"
          },
          {
            "key": "governance",
            "link": null,
            "target": null
          },
          {
            "key": "sustainable technology",
            "link": null,
            "target": null
          },
          {
            "key": "alternative energy",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "secure-communication",
        "name": "Secure communication",
        "type": "concept",
        "keywords": [
          "secure communications",
          "encrypted communication"
        ],
        "resources": [
          {
            "title": "Electronic Frontier Foundation - Surveillance Self-Defense",
            "url": "https://ssd.eff.org/"
          },
          {
            "title": "A Guide to Secure Communication Tools",
            "url": "https://www.privacyguides.org/real-time-communication/"
          }
        ],
        "description": "Secure communication refers to the practice of exchanging information between parties in a way that prevents unauthorized access, interception, or tampering. It is a fundamental concept in [[privacy]] and [[information security]], built upon principles established by the [[cypherpunk]] movement and modern [[cryptography]]. The core elements of secure communication include [[end-to-end encryption]], [[forward secrecy]], and methods to verify the authenticity of participants in a conversation.\n\nPopular tools for secure communication include [[Signal]], [[Matrix]], and **Briar**, which implement various security protocols to protect users' privacy. These applications typically employ multiple layers of security, including [[public-key cryptography]], [[perfect forward secrecy]], and methods to prevent [[metadata]] leakage. The importance of secure communication has grown significantly in the digital age, particularly as awareness of mass surveillance programs and data collection practices has increased.\n\nBeyond personal privacy, secure communication plays a crucial role in protecting journalist, activists, and individuals living under repressive regimes. It enables the free flow of information while maintaining confidentiality and protecting against censorship. The development of secure communication tools continues to evolve in response to new threats and technological capabilities, with ongoing efforts to make these tools more accessible and user-friendly while maintaining robust security standards. This field intersects with other privacy-enhancing technologies like [[VPN]]s, [[Tor]], and [[decentralized networks]].",
        "links": [
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "information security",
            "link": null,
            "target": null
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "end-to-end encryption",
            "link": null,
            "target": "e2ee"
          },
          {
            "key": "forward secrecy",
            "link": null,
            "target": null
          },
          {
            "key": "Signal",
            "link": null,
            "target": null
          },
          {
            "key": "Matrix",
            "link": null,
            "target": null
          },
          {
            "key": "public-key cryptography",
            "link": null,
            "target": "public-key-cryptography"
          },
          {
            "key": "perfect forward secrecy",
            "link": null,
            "target": null
          },
          {
            "key": "metadata",
            "link": null,
            "target": null
          },
          {
            "key": "VPN",
            "link": null,
            "target": "vpn"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "decentralized networks",
            "link": null,
            "target": "decentralization"
          }
        ]
      },
      {
        "id": "self-sovereign-identity",
        "name": "Self-Sovereign Identity (SSI)",
        "type": "concept",
        "keywords": [
          "Self-Sovereign Identity",
          "SSI"
        ],
        "description": "Self-Sovereign Identity (SSI) is a concept and approach to digital identity management that gives individuals complete control over their personal information and how it's shared. Unlike traditional identity systems where data is controlled by governments, corporations, or other centralized authorities, SSI enables people to manage their own identity credentials without relying on any external administrative authority. This system is built on principles of [[privacy]], security, and portability, utilizing [[blockchain]] technology and [[cryptography]] to create verifiable credentials.\n\nThe core principles of SSI include existence (users must have an independent existence), control (users must control their identities), access (users must have access to their own data), transparency (systems and algorithms must be transparent), persistence (identities must be long-lived), portability (information must be transportable), interoperability (identities should be as widely usable as possible), consent (users must agree to the use of their identity), minimalization (disclosure of claims must be minimized), and protection (the rights of users must be protected).\n\nIn practice, SSI is implemented through [[decentralized identifiers]] (DIDs) and verifiable credentials, which allow individuals to create and manage multiple digital identities for different contexts while maintaining privacy and security. This technology has significant implications for various sectors including finance, healthcare, education, and government services, where it can reduce fraud, streamline processes, and enhance privacy. SSI represents a crucial component of the broader movement toward [[digital sovereignty|self-sovereignty]] and aligns with [[cypherpunk]] ideals of individual autonomy in the digital age.",
        "links": [
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "decentralized identifiers",
            "link": null,
            "target": null
          },
          {
            "key": "digital sovereignty",
            "link": "self-sovereignty",
            "target": "self-sovereignty"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          }
        ]
      },
      {
        "id": "self-sovereignty",
        "name": "Self-Sovereignty",
        "type": "concept",
        "keywords": [
          "data sovereignty"
        ],
        "description": "Self-sovereignty is a concept that emphasizes individual control and ownership over one's identity and personal data without relying on centralized third-party authorities. In the digital realm, this manifests as Self-Sovereign Identity (SSI), a model that gives individuals full ownership of their digital identities, allowing them to manage and share their personal information on their own terms while maintaining privacy and security.\n\nThe concept builds on fundamental principles of human rights and individual autonomy, extending them into the digital sphere. It represents a shift away from traditional centralized identity systems where governments, corporations, or other institutions act as gatekeepers of personal information. Instead, self-sovereignty empowers individuals to be the ultimate arbiters of their own data, deciding what information to share, with whom, and under what circumstances, while maintaining the ability to revoke access at any time.\n\nSelf-sovereignty is often implemented through [[blockchain]] technology and [[cryptography]], which enable secure, decentralized systems for identity management. This approach aligns with [[cypherpunk]] ideals and supports the creation of parallel structures that operate independently of traditional institutional frameworks. The concept has broad implications for [[privacy]], [[digital freedom]], and [[governance]], as it challenges existing power structures and promotes a more equitable distribution of control over personal information in the digital age.",
        "links": [
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "digital freedom",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "governance",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "shadow-library",
        "name": "Shadow library",
        "type": "concept",
        "resources": [
          {
            "title": "Shadow Library on Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Shadow_library"
          },
          {
            "title": "What Is a Shadow Library?",
            "url": "https://builtin.com/articles/shadow-library"
          }
        ],
        "description": "A shadow library is an online database or digital archive that provides free access to academic papers, books, and other content that is typically behind paywalls or otherwise restricted. These platforms emerged as a response to the limited accessibility of scholarly knowledge and high costs of academic publications. Notable examples include *Sci-Hub*, *Z-Library*, and *Library Genesis* (LibGen), which collectively host millions of research articles and books.\n\nShadow libraries operate in a legally grey area, often challenging traditional copyright systems and academic publishing models. They are part of a broader movement advocating for open access to knowledge and information freedom, aligned with principles of the [[digital commons]] and [[information wants to be free]] philosophy. These platforms have become particularly important for researchers, students, and academics in regions with limited institutional access to scholarly resources.\n\nThe existence of shadow libraries has sparked significant debate about intellectual property, academic publishing, and the democratization of knowledge. While publishers and copyright holders often view them as [[digital piracy|piracy]] platforms, supporters argue they serve a crucial role in advancing global education and research by providing access to those who would otherwise be excluded from scholarly discourse. This tension reflects broader discussions about [[information inequality]] and the need for alternative models of knowledge distribution in the digital age.",
        "links": [
          {
            "key": "digital commons",
            "link": null,
            "target": null
          },
          {
            "key": "information wants to be free",
            "link": null,
            "target": null
          },
          {
            "key": "digital piracy",
            "link": "piracy",
            "target": "piracy"
          },
          {
            "key": "information inequality",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "smart-contract",
        "name": "Smart Contract",
        "type": "technology",
        "keywords": [
          "Smart Contracts",
          "Smart contracts"
        ],
        "resources": [
          {
            "title": "What Are Smart Contracts in Blockchain?",
            "url": "https://chain.link/education/smart-contracts"
          },
          {
            "title": "The History of Smart Contracts",
            "url": "https://pontem.network/posts/the-history-of-smart-contracts"
          }
        ],
        "description": "A smart contract is a self-executing computer program that runs on a [[blockchain]] network, automatically enforcing and executing the terms of an agreement between parties without the need for intermediaries. First proposed by *Nick Szabo* in 1994, smart contracts gained practical implementation with the launch of [[Ethereum]] in 2015, enabling automated, trustless transactions and interactions in a decentralized environment.\n\nThe key innovation of smart contracts lies in their ability to transform traditional contractual agreements into deterministic computer code that executes automatically when predefined conditions are met. This automation eliminates the need for trusted intermediaries, reduces costs, and minimizes the potential for fraud or manipulation. Smart contracts operate on a blockchain's immutable ledger, ensuring transparency and providing a verifiable history of all transactions and state changes.\n\nSmart contracts have found applications across various industries, from [[DeFi]] (Decentralized Finance) protocols and [[NFT]] marketplaces to supply chain management and digital identity systems. They serve as the backbone for many [[dApp|decentralized applications]], enabling complex financial instruments, automated market makers, and governance systems for [[DAO|DAOs]]. However, they also face challenges related to security, scalability, and the immutable nature of deployed code, requiring careful development and auditing practices.",
        "links": [
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "Ethereum",
            "link": null,
            "target": "ethereum"
          },
          {
            "key": "DeFi",
            "link": null,
            "target": "defi"
          },
          {
            "key": "NFT",
            "link": null,
            "target": "nft"
          },
          {
            "key": "dApp",
            "link": "decentralized applications",
            "target": "dapps"
          },
          {
            "key": "DAO",
            "link": "DAOs",
            "target": "dao"
          }
        ]
      },
      {
        "id": "solarpunk",
        "name": "Solarpunk",
        "type": "movement",
        "resources": [
          {
            "title": "Solarpunk - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Solarpunk"
          }
        ],
        "description": "Solarpunk is both a cultural movement and artistic aesthetic that envisions an optimistic future where humanity has successfully addressed climate change and created sustainable, equitable societies through the thoughtful application of renewable technologies, particularly solar power. Unlike its darker cousin [[cyberpunk]], which often depicts dystopian futures dominated by corporate control and technological alienation, Solarpunk imagines a world where technology and nature exist in harmony, emphasizing [[green technology]], social justice, and community empowerment.\n\nThe movement combines elements of speculative fiction, environmental activism, and social justice advocacy, drawing inspiration from [[Art Nouveau]], African and Asian architecture, and [[permaculture]] principles. Its visual aesthetic typically features lush green spaces integrated with clean energy infrastructure, vertical gardens, and sustainable urban design. The \"punk\" aspect comes from its rejection of current environmentally destructive systems and the promotion of grassroots, democratic approaches to solving ecological challenges.\n\nSolarpunk shares some philosophical common ground with other parallel movements like [[Biopunk]] and [[Lunarpunk]], but distinguishes itself through its focus on immediate, practical solutions to environmental problems and its notably optimistic outlook. The movement emphasizes [[decentralization]], [[appropriate technology]], and the creation of resilient local communities while promoting values of [[mutual aid]], [[DIY culture]], and ecological harmony. It serves as both an artistic inspiration and a practical framework for imagining and building sustainable futures.",
        "links": [
          {
            "key": "cyberpunk",
            "link": null,
            "target": "cyberpunk"
          },
          {
            "key": "green technology",
            "link": null,
            "target": null
          },
          {
            "key": "Art Nouveau",
            "link": null,
            "target": null
          },
          {
            "key": "permaculture",
            "link": null,
            "target": null
          },
          {
            "key": "Biopunk",
            "link": null,
            "target": null
          },
          {
            "key": "Lunarpunk",
            "link": null,
            "target": "lunarpunk"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "appropriate technology",
            "link": null,
            "target": null
          },
          {
            "key": "mutual aid",
            "link": null,
            "target": null
          },
          {
            "key": "DIY culture",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "steganography",
        "name": "Steganography",
        "type": "technique",
        "resources": [
          {
            "title": "What is Steganography & How Does It Work? - Kaspersky",
            "url": "https://www.kaspersky.com/resource-center/definitions/what-is-steganography"
          },
          {
            "title": "Steganography - Wikipedia",
            "url": "https://en.wikipedia.org/wiki/Steganography"
          }
        ],
        "description": "Steganography is the practice of concealing information within other non-secret data or carriers in a way that prevents the detection of hidden messages. Unlike [[cryptography]], which makes a message unreadable but obvious that it exists, steganography aims to hide the very existence of the communication. The term comes from the Greek words \"steganos\" (covered or hidden) and \"graphein\" (writing), and its first recorded use was in 1499 by Johannes Trithemius in his work \"Steganographia.\"\n\nThroughout history, steganography has taken many forms, from ancient methods like invisible ink and hidden tattoos to modern digital techniques. In the digital age, steganographic methods include hiding data within image files, audio files, network packets, or even social media posts. The technique can be combined with [[cryptography]] to provide an additional layer of security - even if the hidden message is discovered, it remains encrypted and unreadable without the proper decryption key.\n\nWhile steganography has legitimate uses in [[privacy]], [[digital watermarking]], and secure communication, it has also raised concerns in the cybersecurity community due to its potential misuse. The technique is particularly relevant to the [[cypherpunk]] movement and [[digital privacy]] advocates as it provides a means of covert communication that resists surveillance. Modern steganography often employs sophisticated algorithms and techniques that leverage the properties of [[digital media]] formats to hide information in ways that are extremely difficult to detect.",
        "links": [
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "cryptography",
            "link": null,
            "target": "cryptography"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "digital watermarking",
            "link": null,
            "target": null
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "digital privacy",
            "link": null,
            "target": "digital-freedom"
          },
          {
            "key": "digital media",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "surveillance-capitalism",
        "name": "Surveillance Capitalism",
        "type": "concept",
        "resources": [
          {
            "title": "The Age of Surveillance Capitalism by Shoshana Zuboff",
            "url": "https://shoshanazuboff.com/book/about/"
          },
          {
            "title": "What is surveillance capitalism?",
            "url": "https://www.theguardian.com/technology/2019/jan/20/shoshana-zuboff-age-of-surveillance-capitalism-google-facebook"
          }
        ],
        "description": "Surveillance capitalism is a term coined by Harvard professor Shoshana Zuboff to describe a new economic order that claims human experiences as free raw material for commercial practices of extraction, prediction, and sales. This system is primarily driven by major tech companies that collect and commodify personal data for profit. Through various digital platforms and services, these companies harvest vast amounts of information about human behavior, preferences, relationships, and activities, which is then processed using [[artificial intelligence]] and [[machine learning]] algorithms to create detailed predictions about future behaviors.\n\nThe core mechanism of surveillance capitalism operates through what Zuboff calls the \"behavioral surplus\" - the excess data collected beyond what is necessary for product improvement, which is then used to create sophisticated models for predicting and influencing human behavior. This data is not just collected through obvious means like social media posts or search histories, but also through IoT devices, smartphones, and various sensors in our environment. The collected information is then used to create targeted advertising, personalized content, and other forms of behavioral modification that serve commercial interests.\n\nThe implications of surveillance capitalism extend far beyond simple privacy concerns, representing a fundamental challenge to human autonomy and democratic society. By creating powerful systems of behavioral prediction and modification, surveillance capitalism threatens to reshape human nature itself, potentially undermining individual agency and democratic decision-making. This system has significant overlap with concerns raised by [[cypherpunk]] and [[privacy]] advocates, who warn about the dangers of centralized data collection and control. The rise of surveillance capitalism has led to increased interest in [[encryption]], [[decentralization]], and other technological solutions that can help protect individual privacy and autonomy from commercial surveillance.",
        "links": [
          {
            "key": "artificial intelligence",
            "link": null,
            "target": "transhumanism"
          },
          {
            "key": "machine learning",
            "link": null,
            "target": "machine-learning"
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "decentralization",
            "link": null,
            "target": "decentralization"
          }
        ]
      },
      {
        "id": "tax-avoidance",
        "name": "Tax Avoidance",
        "type": "concept",
        "description": "Tax avoidance refers to the legal practice of arranging one's financial affairs to minimize tax liability within the bounds of the law. Unlike [[tax evasion]], which is illegal, tax avoidance utilizes legitimate methods to reduce tax obligations through careful financial planning, use of tax deductions, credits, and other legal mechanisms. This practice is commonly used by individuals and corporations as part of their financial strategy, though it often operates in a grey area between fully compliant tax practices and the [[shadow economy]].\n\nThe concept plays a significant role in discussions about [[parallel economies]] and alternative financial systems. While legal, tax avoidance has become increasingly controversial, particularly in the context of multinational corporations using sophisticated methods like profit shifting and offshore arrangements. This has led to international initiatives like the OECD's Base Erosion and Profit Shifting (BEPS) Project, which aims to address tax avoidance strategies that exploit gaps in tax rules to artificially shift profits to low or no-tax locations.\n\nIn the context of [[crypto-anarchism]] and [[alternative economies]], tax avoidance often intersects with discussions about financial sovereignty and the relationship between individuals and state authority. The rise of [[cryptocurrencies]] and [[decentralized finance]] has introduced new dimensions to tax avoidance, as these technologies can facilitate both legal tax optimization strategies and illegal tax evasion schemes, highlighting the ongoing tension between financial privacy and regulatory compliance.",
        "links": [
          {
            "key": "tax evasion",
            "link": null,
            "target": null
          },
          {
            "key": "shadow economy",
            "link": null,
            "target": null
          },
          {
            "key": "parallel economies",
            "link": null,
            "target": null
          },
          {
            "key": "crypto-anarchism",
            "link": null,
            "target": "cryptoanarchy"
          },
          {
            "key": "alternative economies",
            "link": null,
            "target": null
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "decentralized finance",
            "link": null,
            "target": "defi"
          }
        ]
      },
      {
        "id": "the-commons",
        "name": "Commons-based peer production",
        "type": "concept",
        "resources": [
          {
            "title": "Commons-based Peer Production - P2P Foundation",
            "url": "https://wiki.p2pfoundation.net/Commons-Based_Peer_Production"
          }
        ],
        "description": "Commons-based peer production (CBPP) is a term coined by Harvard Law School professor Yochai Benkler to describe a model of socio-economic production in which groups of individuals cooperate with each other to produce shared resources without traditional hierarchical organization. This system is characterized by decentralized coordination, non-monetary incentives, and the creation of commons-based resources that are freely accessible to all. The most prominent example is *Wikipedia*, but it also includes projects like *Linux* and other [[free and open-source software]].\n\nThe key characteristics of CBPP include: collaboration among large groups of individuals working cooperatively without market signals or managerial commands, the use of [[open source]] licensing to ensure resources remain freely available, and a governance structure that emerges from the community rather than being imposed from above. This model challenges traditional economic theories by demonstrating how complex, high-quality products can be created through voluntary collaboration rather than market mechanisms or corporate hierarchies.\n\nCBPP represents a significant shift in how goods, particularly information and cultural products, can be produced in the digital age. It intersects with concepts like the [[sharing economy]], [[digital commons]], and [[peer-to-peer]] networks, demonstrating how technology enables new forms of social production. The success of CBPP projects has influenced thinking about [[alternative economics]], [[collaborative governance]], and the potential for more democratic and participatory forms of production in various sectors beyond software and content creation.",
        "links": [
          {
            "key": "free and open-source software",
            "link": null,
            "target": "foss"
          },
          {
            "key": "open source",
            "link": null,
            "target": "foss"
          },
          {
            "key": "sharing economy",
            "link": null,
            "target": null
          },
          {
            "key": "digital commons",
            "link": null,
            "target": null
          },
          {
            "key": "peer-to-peer",
            "link": null,
            "target": "p2p"
          },
          {
            "key": "alternative economics",
            "link": null,
            "target": null
          },
          {
            "key": "collaborative governance",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "tor",
        "name": "Tor",
        "type": "anonymity network",
        "resources": [
          {
            "title": "Tor Project Official Website",
            "url": "https://www.torproject.org/"
          },
          {
            "title": "Wikipedia article \"Tor (anonymity network)\"",
            "url": "https://en.wikipedia.org/wiki/Tor_(network)"
          }
        ],
        "description": "Tor, short for \"The Onion Router\", is a [[free and open-source software]] for enabling [[anonymous communication]]. It directs Internet traffic through a worldwide overlay network consisting of thousands of relays, concealing a user's location and usage from network surveillance and traffic analysis. Tor is an implementation of [[onion routing]], developed in the mid-1990s by United States Naval Research Laboratory employees.\n\nThe Tor network operates on the principle of onion routing, where the user's data is [[encrypted|encryption]] in layers and passed through several relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit until the final relay decrypts the innermost layer and sends the original data to its destination without revealing the source IP address. This process makes it extremely difficult for any single point in the network to link the connection's source and destination.\n\nTor is used for various purposes, including protecting personal privacy from marketers and identity thieves, [[circumventing censorship|censorship resistance]], and allowing journalists, human rights workers, and others to communicate more safely. It also enables access to [[.onion]] sites, which are special-use top level domains accessible only through Tor. These [[hidden services]] provide a platform for whistleblowers, dissident movements, and others requiring heightened anonymity and security.",
        "links": [
          {
            "key": "free and open-source software",
            "link": null,
            "target": "foss"
          },
          {
            "key": "anonymous communication",
            "link": null,
            "target": "anonymous-communication"
          },
          {
            "key": "onion routing",
            "link": null,
            "target": "onion-routing"
          },
          {
            "key": "encrypted",
            "link": "encryption",
            "target": "encryption"
          },
          {
            "key": "circumventing censorship",
            "link": "censorship resistance",
            "target": "censorship-resistance"
          },
          {
            "key": ".onion",
            "link": null,
            "target": null
          },
          {
            "key": "hidden services",
            "link": null,
            "target": null
          }
        ]
      },
      {
        "id": "transhumanism",
        "name": "Artificial Intelligence (AI)",
        "keywords": [
          "Artificial Intelligence",
          "AI"
        ],
        "type": "technology",
        "description": "Artificial Intelligence (AI) refers to computer systems designed to perform tasks that typically require human intelligence, such as pattern recognition, decision-making, and natural language processing. Modern AI systems primarily use [[machine learning]] techniques, particularly deep neural networks, which learn from data to improve their performance without explicit programming.\n\nThe development of AI technology represents a fundamental shift in human capability enhancement, offering tools for automating complex tasks, augmenting human decision-making, and processing vast amounts of information. Decentralized AI approaches emphasize open-source development, distributed computing networks, and community-governed AI systems as alternatives to centralized corporate or state control of AI capabilities.\n\nThe intersection of AI with personal freedom focuses on privacy-preserving machine learning, sovereign AI systems that individuals can control and customize, and the development of AI tools that enhance rather than restrict individual agency. This includes federated learning systems that keep data under user control, encryption-based AI that protects user privacy, and open-source AI models that enable independent verification and modification.",
        "links": [
          {
            "key": "machine learning",
            "link": null,
            "target": "machine-learning"
          }
        ]
      },
      {
        "id": "underground-art-and-culture",
        "name": "Underground Art and Culture",
        "type": "concept",
        "resources": [
          {
            "title": "The History of Underground Art Movements",
            "url": "https://www.tate.org.uk/art/art-terms/u/underground-art"
          },
          {
            "title": "DIY Culture and Underground Resistance",
            "url": "https://daily.jstor.org/diy-culture-and-resistance/"
          }
        ],
        "description": "Underground Art and Culture refers to creative and cultural expressions that exist outside mainstream institutional frameworks, often emerging from marginalized communities or those who deliberately choose to operate independently of commercial and established cultural systems. This cultural movement is characterized by its DIY (do-it-yourself) ethos, anti-establishment attitudes, and alternative distribution networks. Underground art and culture often serves as a platform for radical ideas, social criticism, and experimental forms of expression that might be too controversial or unconventional for mainstream acceptance.\n\nThe underground cultural scene typically encompasses various forms of artistic expression, including [[street art]], [[experimental music]], [[independent publishing]], [[crypto art]], and [[performance art]]. These movements often intersect with political activism, [[hacktivism]], and alternative social structures, creating spaces where artists and creators can freely express ideas that challenge societal norms and power structures. Underground venues, independent galleries, [[hackerspaces]], and digital platforms serve as crucial nodes for connecting artists, audiences, and ideas outside traditional institutional frameworks.\n\nThe rise of digital technologies and [[decentralized networks]] has transformed underground art and culture, creating new possibilities for distribution, collaboration, and community-building. [[Blockchain technology]] and [[cryptocurrencies]] have enabled new forms of artistic expression and alternative economic models for supporting underground artists. This has led to the emergence of [[NFTs]] (Non-Fungible Tokens) and other innovative platforms that allow artists to maintain creative independence while reaching global audiences. The underground art scene continues to evolve as a vital force for cultural innovation, social criticism, and the exploration of alternative ways of creating and sharing art.",
        "links": [
          {
            "key": "street art",
            "link": null,
            "target": null
          },
          {
            "key": "experimental music",
            "link": null,
            "target": null
          },
          {
            "key": "independent publishing",
            "link": null,
            "target": null
          },
          {
            "key": "crypto art",
            "link": null,
            "target": null
          },
          {
            "key": "performance art",
            "link": null,
            "target": null
          },
          {
            "key": "hacktivism",
            "link": null,
            "target": "hacktivism"
          },
          {
            "key": "hackerspaces",
            "link": null,
            "target": "hackerspace"
          },
          {
            "key": "decentralized networks",
            "link": null,
            "target": "decentralization"
          },
          {
            "key": "Blockchain technology",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "cryptocurrencies",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "NFTs",
            "link": null,
            "target": "nft"
          }
        ]
      },
      {
        "id": "vpn",
        "name": "Virtual Private Network (VPN)",
        "type": "technology",
        "keywords": [
          "virtual private networks (VPNs)",
          "VPN",
          "VPNs"
        ],
        "resources": [
          {
            "title": "How VPNs Can Help Privacy",
            "url": "https://www.eff.org/issues/vpn"
          },
          {
            "title": "Understanding VPN Protocols",
            "url": "https://www.privacytools.io/guides/vpn-protocols"
          }
        ],
        "description": "A Virtual Private Network (VPN) is a technology that encrypts internet traffic and routes it through remote servers, hiding the user's real IP address and geographic location from [[network surveillance|mass surveillance]]. VPNs create an [[encrypted|encryption]] tunnel between the user's device and the VPN server, preventing internet service providers, network operators, and other intermediaries from monitoring or interfering with the user's online activities.\n\nVPNs serve as a basic tool in the privacy toolset, enabling users to bypass network censorship, avoid geographic restrictions, and maintain a degree of anonymity online. When combined with other privacy technologies like [[Tor]], [[encryption]], and [[cryptocurrency]] payments, VPNs contribute to creating parallel communication infrastructures that resist surveillance and control.\n\nIn the context of parallel structures, self-hosted VPNs and decentralized VPN networks provide alternatives to traditional centralized services. These solutions enable communities to build their own privacy-preserving communication channels, create [[mesh networks]], and maintain connectivity even when facing network restrictions or monitoring.",
        "links": [
          {
            "key": "network surveillance",
            "link": "mass surveillance",
            "target": "mass-surveillance"
          },
          {
            "key": "encrypted",
            "link": "encryption",
            "target": "encryption"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "mesh networks",
            "link": null,
            "target": "mesh-networks"
          }
        ]
      },
      {
        "id": "whistleblowing",
        "name": "Whistleblowing",
        "type": "concept",
        "description": "Whistleblowing is the act of exposing information about wrongdoing, unethical behavior, or illegal activities within an organization to internal authorities or the public. In the context of [[digital rights]] and [[transparency]], whistleblowing has become a crucial mechanism for holding powerful institutions accountable and protecting public interest. Notable whistleblowers like [[Edward Snowden]] and [[Chelsea Manning]] have used digital tools and encryption to safely expose classified information about government surveillance and military operations.\n\nThe digital age has transformed whistleblowing through secure platforms like *SecureDrop* and [[WikiLeaks]], which use [[encryption]] and [[anonymity]] tools to protect sources. These platforms represent the intersection of [[cypherpunk]] ideals and journalistic practices, allowing whistleblowers to safely transmit sensitive information while protecting their identities from retaliation. The evolution of digital whistleblowing has been particularly important in exposing corporate fraud, government surveillance programs, and human rights violations.\n\nHowever, whistleblowing in the digital age also faces significant challenges, including increased surveillance capabilities, digital footprints, and sophisticated tracking methods. This has led to the development of specialized tools and practices within the [[privacy]] and [[security]] communities to protect whistleblowers. Organizations promoting whistleblower rights often emphasize the importance of [[operational security]] (OpSec) and proper use of technologies like [[Tor]] and [[encrypted communication]] to maintain anonymity and safety.",
        "links": [
          {
            "key": "digital rights",
            "link": null,
            "target": null
          },
          {
            "key": "transparency",
            "link": null,
            "target": null
          },
          {
            "key": "Edward Snowden",
            "link": null,
            "target": null
          },
          {
            "key": "Chelsea Manning",
            "link": null,
            "target": null
          },
          {
            "key": "WikiLeaks",
            "link": null,
            "target": null
          },
          {
            "key": "encryption",
            "link": null,
            "target": "encryption"
          },
          {
            "key": "anonymity",
            "link": null,
            "target": null
          },
          {
            "key": "cypherpunk",
            "link": null,
            "target": "cypherpunk"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "security",
            "link": null,
            "target": null
          },
          {
            "key": "operational security",
            "link": null,
            "target": "opsec"
          },
          {
            "key": "Tor",
            "link": null,
            "target": "tor"
          },
          {
            "key": "encrypted communication",
            "link": null,
            "target": "secure-communication"
          }
        ]
      },
      {
        "id": "zero-knowledge-proof",
        "name": "Zero-knowledge proof (ZKP)",
        "keywords": [
          "zero-knowledge proof",
          "zero-knowledge proofs"
        ],
        "type": "technology",
        "resources": [
          {
            "title": "Wikipedia article \"Zero-knowledge proof\"",
            "url": "https://en.wikipedia.org/wiki/Zero-knowledge_proof"
          }
        ],
        "description": "A zero-knowledge proof is a [[cryptographic|cryptography]] method that enables one party (the prover) to prove to another party (the verifier) that a statement is true without revealing any information beyond the validity of the statement itself. This groundbreaking concept allows for verification of data or credentials while maintaining complete privacy of the underlying information, making it a cornerstone of modern [[privacy]] technologies.\n\nThe concept satisfies three key properties: completeness (if the statement is true, an honest verifier will be convinced), soundness (if the statement is false, no cheating prover can convince an honest verifier), and zero-knowledge (if the statement is true, the verifier learns nothing other than the fact that the statement is true). For example, one could prove they are over 18 years old without revealing their actual age, or prove ownership of funds without revealing the account balance.\n\nZero-knowledge proofs have found numerous applications in [[blockchain]] technology, [[digital identity]] systems, and [[privacy-preserving]] protocols. They are used in [[cryptocurrency]] systems for private transactions, in authentication systems where users can prove their credentials without revealing sensitive data, and in various other scenarios where verification without disclosure is crucial. Notable implementations include [[zk-SNARKs]] and [[zk-STARKs]], which are specific types of zero-knowledge proofs optimized for different use cases.",
        "links": [
          {
            "key": "cryptographic",
            "link": "cryptography",
            "target": "cryptography"
          },
          {
            "key": "privacy",
            "link": null,
            "target": "privacy"
          },
          {
            "key": "blockchain",
            "link": null,
            "target": "blockchain"
          },
          {
            "key": "digital identity",
            "link": null,
            "target": "digital-identity"
          },
          {
            "key": "privacy-preserving",
            "link": null,
            "target": null
          },
          {
            "key": "cryptocurrency",
            "link": null,
            "target": "cryptocurrency"
          },
          {
            "key": "zk-SNARKs",
            "link": null,
            "target": null
          },
          {
            "key": "zk-STARKs",
            "link": null,
            "target": null
          }
        ]
      }
    ]
  },
  "generatedAt": "2024-11-16T17:50:45.293Z"
}