Crypto-Anarchism Defeated Gun Control

Defense Distributed just released a video demonstrating their 3D printed AR-15 lower surviving 600 founds:

In my opinion this video demonstrates two important things: the utility of 3D prints and the fact that gun control is dead. When I said gun control is dead I don’t mean the state is going to stop passing laws, I mean that gun control laws are no longer relevant. Technology that allows an individual to easily construct a firearm in their home is now growing out of its infancy.Once a technology evolves beyond its infancy it cannot be stopped from continuing to grow. It is only a matter of time before all parts of a firearm can be produced on a 3D printer. In all likelihood it will only be a few years until affordable 3D printers capable of working with metal hit the market and enable the construction of parts such as bolts, barrels, and gas tubes.

Ironically gun control was killed by crypto-anarchism:

While it may be easy to paint Wilson [the developer of the lower] as a 2nd Amendment-touting conservative, the 25-year-old second-year law student at the Univeristy of Texas, Austin told Ars on Thursday that he’s actually a “crypto-anarchist.”

I say it’s ironic because crypto-anarchism has been pooh-poohed by statists and many anarchists alike. Criticisms against crypto-anarchism revolved around the claim that it only dealt with cyberspace and was unable to affect the real world. What its critics failed to predict was the fall of the barriers separating cyberspace from the real world. 3D printers, in my opinion, were the tool that destroyed the last major barrier. With the invention of 3D printing it became possible to create real world objects based on designs created and distributed online. Suddenly the fabrication of goods is no longer relegated to a handful of individuals. Anybody with a 3D printer, material to feed the printer, a computer, and an Internet connection can download and fabricate a mind boggling number of goods. As the technology matures it will likely become common for basic goods to be replicated in homes instead of factories.

Social anarchists believed one day a worker revolution would occur. In their imagination they believed workers around the world, who finally became sick and tired of capitalist conditions, would rise up, seize the means of production, and usher in a world free of oppression. Things haven’t worked out that way and, if current technology trends are any indicator, things will not work out that way. The revolution won’t be violent, it won’t involve fighting in the streets, it won’t involved people rising up and overthrowing the governments of the world. What the revolution will involve is the continuous decentralization of power. Technology will continue to evolve in a manner that empowers individuals to separate themselves from their rulers. Powerful corporations who have enjoyed protection from competition through the state’s decrees will lose their power as an ever growing number of people are able to replicate their goods from the safety of their own homes. Enforcing patents and regulations will become impossible. As people begin to fabricate needed goods themselves the large corporations and the state will bring in less wealth. People will no longer be forced to buy goods from politically connected corporations or pay sales tax to the state.

The world is changing in a way that power is becoming more decentralized. Eventually, if technological trends continue, the concept of centralized power will be all but extinct.

Fighting CISPA

Remember the Cyber Intelligence Sharing and Protection Act (CISPA) that was introduced last year? Guess what, it’s back. For those of you who weren’t following CISPA the first time around it is a piece of legislation that would introduce exceptions into current privacy laws if those exceptions fell under the vague category of cyber security. Effectively it would render all privacy laws null and void as anything can be twisted into a cyber security threat. The Electronic Frontier Foundation (EFF) is urging people to contact Congress and demand that they vote against CISPA. Unfortunately such a strategy is, at the very best, temporary. The bill was shot down last year only to be reintroduce again this year and if it fails again it will almost certainly be reintroduced at a later date. Until the bill passes there will be a continuous cycle of the legislation getting voted down and reintroduced. This cycle will continue until the bill can be passed, likely as an amendment to a “must pass bill” (think the National Defense Authorization Act) or in a lame duck session on some Christmas Eve.

Fortunately there is good news, the tools to render CISPA entirely irrelevant already exist. Government spying powers become irrelevant if they can’t read acquired data or connect acquired data to real people. Making data unreadable is relatively easy to do using strong encryption tools. All major modern operating systems have built-in full drive encryption capabilities. Microsoft call their drive encryption technology BitLocker, Apple calls theirs FileVault 2, and Ubuntu has the same technology minus a fancy marketing term. When you fully encrypt your drive you make the data inaccessible to anybody who doesn’t have the proper decryption key. What if you don’t have a modern version of Windows, OS X, or Ubuntu? No problem, there’s a wonderful tool called TrueCrypt. TrueCrypt allows you to fully encryption a Microsoft Windows disk or creation encrypted volumes on Windows, OS X, and Linux. You can even use the tool to create a hidden encrypted volume that stores your secure information while keeping junk data in the regular encrypted volume. Doing this allows you to “decrypt” the volume to comply with state demands without having to decrypt your important information.

Encryption shouldn’t stop at your local system though. Every day you probably communicate with other people online and those communications are likely stored on third party servers or can be intercepted en route. There are tools that greatly reduce the risk of both problems. OpenPGP is an e-mail encryption tool that has been around for ages and is still a very effective tool to prevent prying eyes from reading your electronic correspondences. OpenPGP works by using asymmetric encryption. For OpenPGP to work there needs to be two keys, a public certificate and a private certificate. You distribute your public certificate to individuals you want to securely communicate with and, as the name implies, keep your private certificate private. E-mails encrypted with your private certificate can only be decrypted with your public certificate and vise versa. For instant messaging there is a tool called Off-the-Record Messaging (OTR). OTR works on top of currently existing instant messenger services so you can use it to communicate without having to convince all of your friends to switch services (I still have friends who refuse to move away from AOL Instant Messenger).

What about the second problem? How does one stop the state from connecting data to you? Simple, by anonymizing your data. The most popular tool for anonymizing data is Tor. Tor is an onion router, which is a not-so-fancy term for software that encrypts data at an entry point (in the case of Tor, your computer), bounces that encrypted data between multiple nodes on the network, and decrypts the data and sends it to its destination at an exit point. Unless you provide identifying information the exit node is unable to link the data it decrypts to its originator and none of the middle nodes are able to read the data or link it to its originator. Likewise, neither the exit point or intermittent nodes are able to link data that is returned from the receiver. In addition to anonymizing regular Internet traffic Tor allows an individual to run a hidden service. Hidden services only exist on the Tor network and all information communicated between a client and a hidden service is encrypted and bounced between multiple nodes in the network. This means communications between a hidden service and a client are hidden from outside sources and neither the hidden service or the client can identify one another (unless one submits identifying information to the other). If you need a demonstration of the effectiveness of hidden services take a look at Silk Road, a hidden service that allows individuals to sell illegal drugs. Silk Road is so effective that the Drug Enforcement Agency (DEA) has been unable to take it down.

Speaking of buying goods anonymously, let’s discuss payment systems. Silk Road and other “black” market hidden services generally rely on Bitcoin for transactions. Bitcoin is an electronic peer-to-peer currency that is both secure and relatively anonymous. Transactions are performed by sending Bitcoins to published public keys asymmetric encryption at your service, again). The public keys are anonymous unless the holder choose to reveal his identify or his identify is somehow compromised. Information between a sender and receiver of Bitcoins need only know the other person’s public key. Once again the effectiveness of Bitcoin can be demonstrated by the fact that the DEA has been unable to use Bitcoin transaction information to identify sellers on Silk Road.

There are many other tools out there, including I2P and Freenet, that can help denizens of the Internet render CISPA irrelevant. The state can’t do anything with information it can’t read or tie to a real person, which is why the United States has long held a policy prohibiting the export of strong cryptographic technology.

The More the State Pushes the More People Will Slip Away

The state continues to push but they fail to see that the more they push the more people will slip away. A bill has been introduced in the Illinois Senate that would require administrators of websites to remove anonymous comments upon demand:

A recently introduced bill in the Illinois state Senate would require anonymous website comment posters to reveal their identities if they want to keep their comments online.

The bill, called the Internet Posting Removal Act, is sponsored by Illinois state Sen. Ira Silverstein. It states that a “web site administrator upon request shall remove any comments posted on his or her web site by an anonymous poster unless the anonymous poster agrees to attach his or her name to the post and confirms that his or her IP address, legal name, and home address are accurate.”

Legislation like this will force more and more of the Internet to seek shelter in the unregulated safety of Tor hidden services. Personally I look forward to the day when a majority of websites are safety hidden inside of the Tor network as it will make censorship practically impossible.