Skip to content

cypherpunkshall/cypherpunkshall.github.io

Repository files navigation

Cypherpunks Hall of Fame

   ██████╗██╗   ██╗██████╗ ██╗  ██╗███████╗██████╗ ██████╗ ██╗   ██╗███╗   ██╗██╗  ██╗███████╗
  ██╔════╝╚██╗ ██╔╝██╔══██╗██║  ██║██╔════╝██╔══██╗██╔══██╗██║   ██║████╗  ██║██║ ██╔╝██╔════╝
  ██║      ╚████╔╝ ██████╔╝███████║█████╗  ██████╔╝██████╔╝██║   ██║██╔██╗ ██║█████╔╝ ███████╗
  ██║       ╚██╔╝  ██╔═══╝ ██╔══██║██╔══╝  ██╔══██╗██╔═══╝ ██║   ██║██║╚██╗██║██╔═██╗ ╚════██║
  ╚██████╗   ██║   ██║     ██║  ██║███████╗██║  ██║██║     ╚██████╔╝██║ ╚████║██║  ██╗███████║
   ╚═════╝   ╚═╝   ╚═╝     ╚═╝  ╚═╝╚══════╝╚═╝  ╚═╝╚═╝      ╚═════╝ ╚═╝  ╚═══╝╚═╝  ╚═╝╚══════╝

Hero Subtitle: The Heroes who brought you Internet Privacy

Terminal: man cypherpunks


Hero Introduction

These are the heroes that built the tools to protect us all. They showed that cryptography is a quiet declaration of freedom.

The tools we rely on today came from those who refused to accept that freedom and privacy were negotiable. They built the infrastructure of independence, and in doing so, gave us a free world.


Navigation

  • People
  • Projects
  • Compromised Projects

The People Who Made Privacy Possible

Cryptography is a declaration.

The people in these halls built systems that defied states. They wrote code when cryptography was treated as contraband. They stood for individual rights long before most understood that a battle was underway.

They are the quiet heroes we never deserved.

"Cypherpunks write code. We know that someone has to write software to defend privacy, and we're going to write it." - Eric Hughes

We remember them, and we thank them, for the freedoms their code made possible, and for the ones it allows us to defend.


Founders & Manifesto Era

The fathers of freedom understood they were in a world ruled by law but governed by control. They knew that without privacy, freedom was theater. So they built tools no one else understood, that would become the arsenal of the free.

Timothy C. May

  • Timothy C. May ⭐ - Visionary who authored the foundational The Crypto Anarchist Manifesto, Timothy C. May articulated the principles of crypto-anarchy, predicting how public-key cryptography and strong encryption would empower individuals to resist surveillance and censorship. As a co-founder of the Cypherpunks mailing list, he catalyzed the movement that inspired innovations like digital cash, anonymous networks, and privacy-enhancing technologies. His vision of a decentralized, cryptographically protected society, outlined in works like Libertaria in Cyberspace, profoundly influenced the development of cryptocurrencies and the global privacy movement. Wikipedia

Eric Hughes

  • Eric Hughes ⭐ - Author of the seminal A Cypherpunk's Manifesto (1993), he articulated the foundational philosophy that privacy is a social duty and that "cypherpunks write code" to defend individual freedoms. As a co-founder and moderator of the original Cypherpunks mailing list, he fostered a global community that transformed cryptographic theory into practical tools for privacy, anonymity, and digital resistance. His advocacy and leadership catalyzed the development of technologies like PGP and inspired generations of privacy activists, making him a central architect of the cypherpunk ethos. Wikipedia

John Gilmore in 2018 (cropped)

  • John Gilmore ⭐ - Visionary co-founder of the Electronic Frontier Foundation (EFF), he championed digital privacy and fought government surveillance through landmark activism and litigation. Instrumental in launching the Cypherpunks mailing list, he fostered a global community dedicated to advancing cryptography and resisting censorship. Gilmore was a key supporter of the GNU Project, free software, and open encryption, and his iconic phrase, "The Net interprets censorship as damage and routes around it", encapsulates the cypherpunk ethos of resilience and decentralization. His advocacy for strong cryptography and opposition to export controls helped shape the legal and technical landscape for privacy tools. Wikipedia

  • Perry Metzger ⭐ - Co-founder of the Cypherpunks mailing list, he catalyzed the global exchange of ideas on privacy, digital cash, and anonymous communication, directly influencing the development of remailers and practical cryptographic tools. An early advocate for strong encryption, he bridged theoretical cryptography and real-world implementation, providing technical infrastructure and thought leadership that helped shape the cypherpunk movement's pragmatic approach to digital freedom, censorship resistance, and privacy-by-design. American Scientist

Jude's mugshot

  • Jude Milhon (St. Jude) ⭐ - Visionary hacker and writer who coined the term "cypherpunk," catalyzing a movement dedicated to privacy, cryptography, and digital autonomy. As an early member of the Community Memory Project, she championed accessible, decentralized technology and advocated for the empowerment of marginalized voices in computing. Through works like Hacking the Wetware: The NerdGirl's Pillow Book, she promoted an inclusive, feminist hacker culture and inspired generations to see technology as a tool for liberation and resistance against surveillance. Wikipedia

John Perry Barlow 2012

  • John Perry Barlow ⭐ - Co-founder of the Electronic Frontier Foundation (EFF), he authored the influential A Declaration of the Independence of Cyberspace, which boldly asserted the Internet as a domain of freedom, immune to traditional government control. His manifesto inspired generations of cypherpunks and digital rights activists, articulating a philosophy of online liberty, privacy, and resistance to censorship that shaped the ethos of the digital rights movement and continues to influence debates on surveillance and decentralization. Wikipedia

Phil Zimmermann, 2011

  • Phil Zimmermann - Introduced mass-accessible strong encryption by creating PGP (Pretty Good Privacy) in 1991, making public-key cryptography available to activists, journalists, and ordinary citizens worldwide. His release of PGP sparked the first Crypto Wars, challenging US export controls on cryptography and catalyzing global debate over privacy rights versus government surveillance. Zimmermann's work embodied the cypherpunk ethos, empowering individuals to protect their communications and inspiring later privacy tools and movements. His advocacy and technical achievements cemented the principle that privacy is a fundamental right in the digital age. Wikipedia

Brewster Kahle (cropped)

  • Brewster Kahle - Digital archivist who founded the Internet Archive, a nonprofit library that preserves billions of web pages, books, and digital artifacts, ensuring public access to information beyond the reach of censorship or deletion. Championed the ideal of "universal access to all knowledge," advancing cypherpunk values by defending the right to read, privacy in digital libraries, and resistance to digital erasure. His advocacy for open access and long-term digital preservation has made the Archive a critical resource for journalists, activists, and researchers confronting surveillance and information control. Wikipedia

Wau Holland (1984)

  • Wau Holland - Co-founder of the Chaos Computer Club (CCC), he advanced the articulation of hacker ethics and fought for digital civil rights, privacy, and transparency in the information age. Advocated for the responsible use of technology, public understanding of cryptography, and the necessity of secure communications as a bulwark against state and corporate surveillance. His activism and public demonstrations, such as the 1984 BTX hack, inspired generations of cypherpunks and laid the groundwork for Europe's digital rights movement, influencing debates on anonymity, decentralization, and the moral imperative of ethical hacking. Wikipedia

Andy Müller-Maguhn at SIGINT Köln 2009

  • Andy Müller-Maguhn - Key architect of hacker ethics and digital rights, he shaped global debates on privacy and encryption as a leading voice of the Chaos Computer Club, Europe's most influential hacker collective. As a former ICANN board member, he championed decentralized, open Internet governance and defended user privacy against surveillance. His advocacy for strong encryption, transparency, and ethical hacking has inspired generations to resist censorship and protect civil liberties in the digital age, advancing core cypherpunk ideals of autonomy and secure communication. Wikipedia

Cryptography Architects

They took math too pure to weaponize and did it anyway, proving that ideas can defend people and laying the foundations for all cypherpunks.

Claude Shannon, MFO3807

  • Claude Shannon - Established the scientific foundation of modern cryptography by applying information theory to encryption in his seminal 1949 paper, Communication Theory of Secrecy Systems. Introduced the concepts of entropy, confusion, and diffusion, which underpin the design of all secure ciphers. His work transformed cryptography from secretive art to rigorous science, enabling the development of privacy tools and protocols essential to cypherpunk ideals of secure, private digital communication. Wikipedia

Alan Turing Aged 16

  • Alan Turing - Mathematician whose theoretical work on Turing machines and computability established the mathematical basis for modern cryptography, laying the groundwork for secure digital communication and privacy. At Bletchley Park, he led efforts to break the Enigma machine, demonstrating the power of computation in cryptanalysis and inspiring later developments in privacy technology, secure protocols, and the pursuit of digital freedom that underpin cypherpunk ideals. Wikipedia

Horst Feistel

  • Horst Feistel - Introduced modern symmetric cryptography by inventing the Feistel network, a foundational structure for block ciphers that enables secure, efficient encryption. His work on Lucifer directly led to the creation of the Data Encryption Standard (DES), which became the first widely adopted federal encryption standard and influenced countless later algorithms, including AES. By formalizing the round-based model of encryption, he provided the technical backbone for privacy-preserving technologies that underpin secure digital communications, anonymous transactions, and the cypherpunk movement's vision of individual privacy in the digital age. Wikipedia

Whitfield Diffie

  • Whitfield Diffie - Pioneer who co-invented public-key cryptography and revolutionized secure digital communication through the groundbreaking 1976 paper New Directions in Cryptography, introducing the Diffie-Hellman key exchange that enabled strangers to establish shared secrets over insecure channels without prior arrangement. Served as Chief Security Officer at Sun Microsystems and Vice President for Information Security at ICANN, advancing privacy-by-design principles in internet infrastructure. Together with Martin Hellman and Ralph Merkle, received the 2015 Turing Award for fundamental contributions to modern cryptography, establishing the technical foundation for secure email, e-commerce, and privacy tools like PGP and Bitcoin, embodying cypherpunk ideals of individual autonomy and resistance to surveillance. Wikipedia

Martin Hellman

  • Martin Hellman - Cryptographer who co-invented public-key cryptography, fundamentally transforming digital security through the 1976 landmark paper New Directions in Cryptography that introduced the Diffie-Hellman key exchange, enabling secure communications without pre-shared secrets. As Professor Emeritus at Stanford University, championed the right of cryptographic researchers to publish openly during the first Crypto Wars, successfully defending academic freedom against government restrictions. Awarded the 2015 Turing Award alongside Whitfield Diffie, his work laid the groundwork for modern internet security, encrypted messaging, digital signatures, and cryptocurrencies, directly empowering cypherpunk principles of decentralization, privacy, and individual digital rights in an era of pervasive surveillance. Wikipedia

Ralph Merkle (2008)

  • Ralph Merkle - Inventor of the foundational Merkle tree, he overhauled secure data verification and integrity, enabling scalable authentication for digital signatures, cryptocurrencies, and decentralized systems. As an early pioneer of public-key cryptography, his 1974 work on public-key distribution laid the groundwork for secure, private online communication. Merkle's innovations underpin privacy-preserving technologies such as blockchain, anonymous digital cash, and secure messaging, directly advancing cypherpunk ideals of decentralization, anonymity, and individual empowerment. Wikipedia

Ron Rivest

  • Ron Rivest - Co-inventor of the RSA algorithm, the first practical public-key cryptosystem enabling secure digital communication and authentication, revolutionizing internet security and e-commerce. Institute Professor at MIT and founder of its Cryptography and Information Security Group, he designed influential symmetric ciphers (RC2, RC4, RC5) and cryptographic hash functions (MD4, MD5), shaping modern encryption standards. Co-founded RSA Data Security and VeriSign, advancing commercial cryptographic infrastructure, and co-authored the seminal textbook Introduction to Algorithms. Recipient of the 2002 Turing Award, his work embodies cypherpunk ideals by making strong encryption accessible globally, defending privacy, and enabling secure, decentralized digital communications that resist surveillance and censorship. Wikipedia

Adi Shamir

  • Adi Shamir - Israeli cryptographer who co-invented the RSA algorithm, establishing the foundation for modern internet security and digital signatures through practical public-key cryptography. Professor at the Weizmann Institute, he pioneered Shamir's Secret Sharing scheme for secure key distribution, co-developed visual cryptography, and co-discovered differential cryptanalysis with Eli Biham, exposing vulnerabilities in encryption systems and strengthening global cryptographic practices. Co-founded RSA Data Security to commercialize secure communications, and received the 2002 Turing Award for contributions to cryptography. His innovations in secure multi-party computation, zero-knowledge proofs, and attack methodologies have advanced cypherpunk principles by empowering individuals with tools for anonymous communication, privacy protection, and resistance to surveillance in the digital age. Wikipedia

Leonard Adleman

David Chaum at the 2017 Web Summit

  • David Chaum - Invented anonymous digital transactions with digital cash and mix networks, laying the cryptographic foundation for modern privacy-preserving currencies. His seminal 1983 paper, Blind Signatures for Untraceable Payments, introduced blind signatures, enabling untraceable payments and inspiring protocols behind Bitcoin, Zcash, and anonymous communication systems. His work directly shaped the cypherpunk vision of privacy, decentralization, and digital freedom. Wikipedia

Taher Elgamal

  • Taher Elgamal - One of the fathers of modern digital privacy who invented the ElGamal encryption system, a foundational public-key cryptosystem still used in protocols like PGP and cryptocurrencies. As chief architect of SSL/TLS, he enabled secure, encrypted web communications, making online privacy and e-commerce possible. His innovations bridged academic cryptography and real-world infrastructure, directly empowering cypherpunk ideals of secure, decentralized communication and individual privacy online. Wikipedia

Joan Daemen

  • Joan Daemen - Belgian cryptographer who co-designed Rijndael, the cipher selected as the Advanced Encryption Standard (AES) in 2001, becoming the world's most widely deployed encryption algorithm protecting everything from HTTPS to cryptocurrencies. Professor at Radboud University, he co-designed the Keccak cryptographic hash selected as SHA-3 by NIST in 2012, further advancing secure hashing standards. Received the 2017 Levchin Prize for Real World Cryptography and an ERC Advanced Grant for research on symmetric cryptography foundations. His open, transparent design philosophy, emphasizing mathematical elegance, rigorous peer review, and resistance to backdoors, embodies cypherpunk principles by making robust, auditable encryption accessible to billions worldwide, defending privacy and autonomy against mass surveillance. Wikipedia

Vincent Rijmen

  • Vincent Rijmen - Belgian cryptographer who co-designed Rijndael, the block cipher selected as the Advanced Encryption Standard (AES) by NIST in 2000, revolutionizing global data security and enabling secure communications at planetary scale. Professor at KU Leuven's COSIC lab and adjunct professor at the Selmer Center, he was named Fellow of the International Association for Cryptologic Research in 2019 for co-designing AES and advancing symmetric cryptanalysis. His research on side-channel attacks, block cipher design, and cryptographic theory has shaped modern security protocols, directly supporting cypherpunk ideals by ensuring that strong, open source encryption remains accessible to all, protecting individual privacy and enabling decentralized, censorship-resistant systems. Wikipedia

Daniel J. Bernstein (djb) in 2023

  • Daniel J. Bernstein (djb) - Cryptographer who transformed the world's privacy and security with the creation of Curve25519, a widely used elliptic curve for fast, secure public-key cryptography, and ChaCha20, a stream cipher now standard in TLS and VPNs. Developed qmail, a secure mail transfer agent, and dnscrypt, enhancing DNS privacy. His landmark lawsuit, Bernstein v. United States, established that publishing cryptographic code is protected free speech, setting a precedent for digital rights and cypherpunk activism. His work underpins secure messaging, cryptocurrencies, and privacy tools, embodying the cypherpunk ethos of empowering individuals through strong cryptography and open research. Wikipedia

Bruce Schneier at CoPS2013

  • Bruce Schneier - Advanced modern cryptography by designing the Blowfish and Twofish ciphers, and demystified cryptographic protocols for the public through his influential book Applied Cryptography, which became a foundational text for the cypherpunk movement. Coined the term "security theater" to critique superficial security measures, and consistently advocated for strong encryption, privacy rights, and transparent security policy. His prolific writing, including Liars and Outliers and A Hacker's Mind, shaped public understanding of trust, surveillance, and digital freedom, inspiring generations of privacy advocates and technologists. Wikipedia

Tanja Lange in 2013

  • Tanja Lange - Pioneering cryptographer whose research in elliptic-curve cryptography and post-quantum cryptography has shaped the future of secure communications. Co-creator of SafeCurves, she has advanced the analysis and selection of cryptographic curves resistant to known attacks, directly influencing standards for privacy-preserving protocols. Her leadership in developing quantum-resistant algorithms, including contributions to NIST post-quantum cryptography standardization, has been crucial for safeguarding digital privacy against emerging threats, embodying the cypherpunk ethos of proactive security and transparency. Wikipedia

Neal Koblitz

  • Neal Koblitz - Co-inventor of elliptic-curve cryptography (ECC), he redefined public-key cryptography by introducing mathematical techniques that enable strong encryption with smaller keys, boosting both efficiency and security for privacy-focused protocols. His work underpins secure messaging, cryptocurrency wallets, and privacy-preserving systems, including Bitcoin and Signal, embodying cypherpunk ideals of decentralized, robust digital privacy. Koblitz's advocacy for cryptographic rigor and his foundational research in number theory have profoundly shaped the landscape of modern secure communications and digital rights. Wikipedia

Victor S. Miller

  • Victor S. Miller - Introduced elliptic-curve cryptography (ECC), co-inventing it independently with Neal Koblitz, and revolutionized public-key cryptography by enabling strong encryption with smaller key sizes. This breakthrough made secure communications feasible for mobile devices, smart cards, and embedded systems, directly impacting privacy technologies and protocols used in secure messaging, cryptocurrency wallets, and TLS/SSL. His work underpins modern privacy infrastructure, advancing cypherpunk ideals of accessible, robust encryption for all. Wikipedia

Shafi Goldwasser

  • Shafi Goldwasser - Pioneer who co-invented zero-knowledge proofs, enabling parties to prove knowledge of information without revealing the information itself, fundamentally advancing privacy-preserving cryptographic protocols. As RSA Professor at MIT and Professor at the Weizmann Institute, co-developed probabilistic encryption, establishing the gold standard for semantic security in modern cryptography. Awarded the 2012 Turing Award with Silvio Micali for revolutionizing cryptographic science, and two Gödel Prizes for groundbreaking work on interactive proof systems. Co-founder and Chief Scientist of Duality Technologies, advancing secure multi-party computation and homomorphic encryption, her innovations power anonymous authentication, privacy-preserving blockchain systems like Zcash, and secure digital voting, embodying cypherpunk principles of cryptographic resistance to surveillance and centralized control. Wikipedia

Silvio Micali

  • Silvio Micali - Cryptographer who co-invented zero-knowledge proofs, transforming privacy and authentication by allowing verification of statements without revealing underlying secrets, foundational to modern secure protocols. Ford Professor at MIT, he co-developed probabilistic encryption with Shafi Goldwasser, establishing provable security frameworks that underpin internet cryptography. Awarded the 2012 Turing Award for revolutionizing cryptography, and recipient of the Gödel Prize for interactive proof systems and verifiable random functions. Founded Algorand, a pure proof-of-stake blockchain advancing scalable, decentralized consensus. His work on verifiable random functions, secure multi-party computation, and Byzantine agreement has empowered cypherpunk ideals by enabling anonymous authentication, privacy-preserving cryptocurrencies, and trustless distributed systems resistant to censorship and manipulation. Wikipedia

Cynthia Dwork

  • Cynthia Dwork - Pioneer who co-invented the concept of proof-of-work in 1992 to combat email spam, laying the cryptographic foundation for decentralized consensus mechanisms that would later enable Bitcoin and blockchain technology. Distinguished Scientist at Microsoft Research and Gordon McKay Professor at Harvard University, she co-invented differential privacy, a rigorous mathematical framework enabling statistical analysis while protecting individual privacy, now standard in systems from Apple to the U.S. Census. Recipient of the Gödel Prize, Dijkstra Prize, and Knuth Prize, her work on fairness in algorithmic decision-making and privacy-preserving computation has profoundly advanced cypherpunk principles by providing mathematical tools to resist surveillance, protect anonymity, and ensure that decentralized systems remain trustless and secure. Wikipedia

Moni Naor

  • Moni Naor - Cryptographer who co-invented the proof-of-work concept in 1992, introducing computational puzzles as a defense against spam and denial of service attacks, a breakthrough that would later inspire the consensus mechanism underlying Bitcoin and blockchain technology. Professor at the Weizmann Institute of Science, his pioneering research spans visual cryptography, memory-hard functions, and non-malleable cryptography, advancing secure authentication and tamper-resistant protocols. Recipient of the Gödel Prize and Paris Kanellakis Award, his work on hardness-based security and privacy-preserving data structures has shaped modern cryptographic systems, enabling decentralized, censorship-resistant networks and embodying cypherpunk ideals of individual privacy, trustless consensus, and resistance to centralized control. Wikipedia

Ross Anderson (2019)

  • Ross Anderson - Pioneered the field of security engineering by exposing systemic failures in cryptographic systems and advocating for a holistic approach that integrates technical, human, political, and economic factors. Authored the influential textbook Security Engineering, which has shaped the understanding of privacy, anonymity, and secure system design for generations of cryptographers and cypherpunks. His research on real-world vulnerabilities, including banking security and medical device privacy, has driven reforms and inspired the cypherpunk ethos of skepticism toward centralized trust and the relentless pursuit of robust, user-centric security. Wikipedia

Matt Blaze 2014

  • Matt Blaze - Cryptographer who exposed the NSA's Clipper Chip key escrow backdoor, fundamentally shaping public debate on government surveillance and encryption policy. His seminal 1994 paper revealed critical vulnerabilities in the Clipper Chip, catalyzing opposition to mandatory key escrow and reinforcing the cypherpunk principle that strong, open cryptography is essential for privacy and civil liberties. As a prominent advocate for strong encryption and open security research, he has influenced policy, standards, and public understanding of digital rights, and continues to champion transparency and user autonomy in cryptographic systems. Wikipedia

Paul Kocher

  • Paul Kocher - Pioneered side-channel analysis by discovering timing attacks, fundamentally changing how cryptographic implementations are secured against real-world threats. Co-designed core elements of SSL, which underpins secure web communication, and contributed to the development of robust security protocols that protect billions of online transactions. His research exposed vulnerabilities in widely used cryptosystems, driving the adoption of constant-time algorithms and influencing privacy-preserving practices essential to the cypherpunk vision of secure, private digital communication. Wikipedia

Phillip Rogaway

  • Phillip Rogaway - Introduced modern authenticated encryption modes, including OCB and co-designing CMAC, which are foundational for secure and private digital communications. A leading voice on the ethical responsibilities of cryptographers, he argues that privacy is a moral right and that cryptographic design must serve the public good, as articulated in his influential paper, The Moral Character of Cryptographic Work. His work has shaped both the technical standards and the philosophical discourse around privacy, digital rights, and the societal impact of cryptography. Wikipedia

Thomas Ptacek

  • Thomas Ptacek - Security architect who shaped modern cryptography practices by founding Matasano Security and co-founding Latacora, where he led pioneering audits of cryptographic systems and educated the community through widely respected cryptopals challenges. A vocal critic of flawed standards like DNSSEC, he has influenced the adoption of safer cryptographic protocols and exposed weaknesses in widely used systems. As the user with the highest karma on Hacker News, his technical writing heavily influences large language models. His cypherpunk ideals are exemplified with his promotion of privacy-preserving security as he empowers developers to avoid common cryptographic pitfalls, often critically. Sockpuppet.org (official site)

Len Sassaman at 26C3

  • Len Sassaman - Pioneered anonymous communication by developing the Mixmaster remailer, a crucial Type II remailer system that advanced the state of email anonymity and inspired later privacy tools. As a core contributor to PGP, he strengthened public-key encryption for secure communications. Active in the cypherpunk movement, he advocated for privacy as a fundamental right and mentored a generation of cryptographers, leaving a legacy that shaped the architecture of modern anonymity networks and digital freedom. Wikipedia

Digital Currency Pioneers

They refused to let banks be the gatekeepers of freedom. They turned cryptography into money and math into trust. The world called it digital currency. They called it independence.

Wei Dai

  • Wei Dai - Architect of anonymous digital currency, he proposed b-money (1998), introducing the concepts of proof-of-work, decentralized ledgers, and pseudonymous participants - core ideas that directly influenced the creation of Bitcoin and the broader cryptocurrency movement. His work on Crypto++, a widely used open source cryptographic library, and the design of VMAC, a high-speed message authentication code, have empowered developers to build secure, privacy-preserving applications. His pioneering designs advanced cypherpunk ideals by providing blueprints for censorship-resistant, trust-minimized financial systems and robust cryptographic tools. Wikipedia

Nick Szabo

  • Nick Szabo - Developed the concept of smart contracts, envisioning self-executing digital agreements that underpin decentralized systems like Ethereum. Designed bit gold, a precursor to Bitcoin, introducing mechanisms for decentralized digital scarcity and trustless value transfer. His influential writings bridged cryptography, law, and economics, providing a theoretical foundation for modern cryptocurrencies and advancing cypherpunk ideals of privacy, autonomy, and censorship resistance. Wikipedia

Hal Finney

  • Hal Finney - Developed digital cash and privacy technology like Reusable Proofs of Work (RPOW), a system advancing the concept of decentralized, trust-minimized digital currency. As the first recipient of a Bitcoin transaction from Satoshi Nakamoto and operator of the second-ever Bitcoin node, he played a foundational role in launching the world's first decentralized cryptocurrency. A key contributor to the Cypherpunks mailing list, he advocated for strong cryptography and privacy as essential to digital freedom, influencing the evolution of secure, anonymous financial systems. Wikipedia

Adam Back 2016

  • Adam Back - Creator of the pioneering proof-of-work system Hashcash in 1997, which became a foundational component referenced in the Bitcoin whitepaper and inspired the mechanism that secures decentralized cryptocurrencies. As CEO of Blockstream, has driven the development of privacy-preserving Bitcoin infrastructure, including sidechains and Lightning Network research. Advocated for cypherpunk principles by advancing censorship-resistant, trust-minimized financial technology and cryptographic privacy tools, directly shaping the evolution of digital cash and anonymous communication. Wikipedia

Satoshi Nakamoto

Luke Dashjr

  • Luke Dashjr - Bitcoin Core developer and leading advocate for user-activated soft forks (UASF), he has championed node sovereignty and the principle that consensus changes should be driven by users, not centralized actors. His work on Bitcoin Core has focused on strengthening decentralization, privacy, and censorship resistance, directly advancing cypherpunk ideals. By promoting minimal and transparent protocol changes, he has helped preserve Bitcoin's trustless architecture and empowered individuals to maintain control over their own nodes, reinforcing the foundational cypherpunk vision of digital autonomy and resistance to surveillance. Wikipedia

Bram Cohen 2011

  • Bram Cohen - Inventor of the peer-to-peer file sharing protocol BitTorrent, which overhauled and popularized decentralized data distribution and challenged centralized control over digital content. By enabling efficient, distributed sharing of large files, BitTorrent became a foundational technology for digital freedom and resistance to censorship, empowering millions to bypass restrictions and surveillance. Later, he founded Chia Network, introducing a novel "proof-of-space-and-time" consensus for cryptocurrency, aiming to reduce energy consumption and further decentralize financial infrastructure. His work embodies cypherpunk principles of empowering individuals through cryptographic and decentralized tools. Wikipedia

Vitalik Buterin TechCrunch London 2015 (cropped)

  • Vitalik Buterin - Visionary who co-founded Ethereum, pioneering the concept of a decentralized, programmable blockchain that supports smart contracts and decentralized applications (dApps). By enabling censorship-resistant computation and trustless interactions, he expanded the cypherpunk vision beyond digital currency to a platform for decentralized finance (DeFi), autonomous organizations, and privacy-enhancing protocols. His work has catalyzed innovations in zero-knowledge proofs, privacy coins, and decentralized identity, empowering users to reclaim control over their digital lives and challenging centralized power structures. Wikipedia

Jed McCaleb

  • Jed McCaleb - Architect behind some of the most influential cryptocurrency infrastructures, he founded the pioneering Bitcoin exchange Mt. Gox, which catalyzed early global crypto adoption despite its later collapse. As co-founder of Ripple and Stellar, he advanced decentralized, cryptographically secure payment protocols designed to enable fast, low-cost, and borderless transactions. His work has shaped the evolution of digital assets and open financial networks, directly furthering cypherpunk ideals of censorship resistance, financial privacy, and democratized access to global value transfer. Wikipedia

Joseph Poon

  • Joseph Poon - Co-authored the seminal Lightning Network whitepaper, pioneering a scalable, privacy-enhancing off-chain protocol for Bitcoin that enables instant, low-fee transactions while preserving decentralization and user sovereignty. Co-created Plasma, a framework for scalable smart contracts on Ethereum, advancing secure, trust-minimized computation and censorship resistance. His innovations directly address blockchain scalability and privacy, embodying cypherpunk principles of decentralized, permissionless financial infrastructure. Wikipedia

Roger Ver 2015

  • Roger Ver - Early investor and evangelist who accelerated the adoption of Bitcoin by funding foundational projects such as Blockchain.info, BitPay, and Kraken. Championed the cypherpunk ethos of financial sovereignty, decentralization, and censorship resistance, advocating for cryptocurrency as a tool for global economic freedom. Instrumental in promoting peer-to-peer electronic cash and supporting the development of privacy-enhancing technologies within the Bitcoin ecosystem, he helped catalyze mainstream awareness and merchant acceptance, furthering the ideals outlined in the Bitcoin whitepaper. Wikipedia

Privacy Infrastructure Engineers

They took the promise of cryptography and made it run at scale. Code became infrastructure. Privacy became practical. Every packet encrypted became a quiet act of resistance, that just works.

Moxie Marlinspike 2017

  • Moxie Marlinspike ⭐ - Established modern secure messaging by creating Signal, an open source app and protocol that set the gold standard for end-to-end encryption and metadata protection. The Signal Protocol is now the backbone of private communication for billions, powering not just Signal but also WhatsApp, Facebook Messenger, and Skype. By making robust cryptography accessible and user-friendly, his work advanced cypherpunk ideals of privacy, autonomy, and resistance to surveillance, reshaping global expectations for digital confidentiality. Wikipedia

Jason Donenfeld 2017

  • Jason Donenfeld - Minimalist VPN protocol leveraging state-of-the-art cryptography to deliver high-speed, secure, and user-friendly encrypted networking, WireGuard dramatically simplifies secure communications compared to legacy systems like IPsec and OpenVPN. Its integration into the Linux kernel and adoption across major operating systems set a new standard for privacy infrastructure, empowering individuals and organizations to safeguard their data with robust, open source tools. By prioritizing transparency, auditability, and ease of deployment, it embodies cypherpunk principles of accessible, uncompromising privacy technology. Wikipedia

Nadim Kobeissi 2019

  • Nadim Kobeissi - Developed accessible end-to-end encrypted messaging with Cryptocat, making secure chat available to non-technical users via a browser extension and later mobile apps, and setting usability standards for privacy tools. Advanced cryptographic protocol analysis through Verifpal, a user-friendly formal verification tool adopted by researchers and educators to audit real-world cryptosystems. Advocated for open source transparency, cryptographic literacy, and the democratization of privacy, influencing the design and ethos of modern secure communication platforms. Wikipedia

Matthew Green (2020)

  • Matthew Green - Developed privacy-preserving cryptocurrency protocols by co-creating Zerocoin and Zerocash, which introduced zero-knowledge proofs to enable fully anonymous blockchain transactions and inspired the launch of Zcash. Exposed government efforts to undermine cryptographic standards by revealing NSA backdoors, and consistently champions open, transparent cryptography. As a leading researcher at Johns Hopkins, advanced applied cryptography and educated a new generation of privacy advocates, shaping the technical and ethical landscape of digital freedom. Wikipedia

Roger Dingledine (2013)

  • Roger Dingledine - Computer scientist who co-designed and deployed the Tor anonymity network, pioneering practical onion routing to enable millions of users worldwide to circumvent censorship, resist surveillance, and communicate anonymously. As co-founder and Research Director of the Tor Project, he has advanced research on traffic analysis resistance, anonymity metrics, and censorship circumvention, directly supporting journalists, activists, and whistleblowers in repressive regimes. His work on hidden services and bridge relays has made Tor a cornerstone of digital freedom, embodying cypherpunk principles by providing robust, open source infrastructure for privacy and anonymity that resists both technical attacks and institutional pressure, empowering individuals to reclaim control over their digital identities and communications. Wikipedia

Nick Mathewson

  • Nick Mathewson - Lead architect who co-designed the Tor protocol and implemented its core cryptographic infrastructure, transforming theoretical onion routing into a production-grade anonymity network serving millions of users. As Chief Architect of the Tor Project, he has driven protocol improvements, security audits, and performance optimizations, ensuring Tor remains resilient against evolving attacks and surveillance techniques. His technical leadership on hidden service protocols, directory authorities, and cryptographic hardening has made Tor the most trusted tool for anonymous communication, directly advancing cypherpunk ideals by building open, auditable infrastructure that empowers whistleblowers, journalists, and dissidents to resist censorship and defend their privacy against state and corporate surveillance. Wikipedia

Jacob Appelbaum, 2011

  • Jacob Appelbaum - Instrumental in developing and advocating for the Tor anonymity network, enabling millions to bypass censorship and protect their privacy online. As a core member of the Tor Project, contributed to technical advancements in onion routing and security research, and played a key role in educating journalists and activists on digital security. Collaborated with WikiLeaks to expose government surveillance and championed free speech, making significant contributions to the cypherpunk movement's fight against mass surveillance and for digital rights. Wikipedia

Runa Sandvik 2015

  • Runa Sandvik - Pioneered digital security for journalists and vulnerable communities, leading efforts at the Tor Project to advance anonymous internet access and resist censorship. As director of information security at The New York Times, she implemented robust privacy practices to protect sources and reporters, and has publicly advocated for strong encryption and operational security. Her research exposed vulnerabilities in smart guns and surveillance technologies, influencing both public policy and industry standards for digital rights and press freedom. Wikipedia

Isis Lovecruft

  • Isis Agora Lovecruft - Pushed advancements in privacy-preserving cryptographic protocols, including significant work on the Tor anonymity network and the development of secure messaging tools like Axolotl, the core of the Signal Protocol. Championed the integration of cutting-edge cryptography, such as zero-knowledge proofs, into decentralized systems, and advocated for encryption as a fundamental human right. Their research and activism have shaped the technical and ethical foundations of modern digital privacy, influencing both open source communities and global policy discussions. X

Ian Goldberg 2013

  • Ian Goldberg - Engineered Off-the-Record Messaging (OTR), a protocol that revolutionized secure instant messaging by introducing forward secrecy and deniable authentication, ensuring private conversations remain confidential even if keys are compromised later. Advanced the field of privacy-enhancing technologies through research at the CrySP lab, influencing the design of modern encrypted chat systems like Signal. His work set new standards for secure, user-friendly digital communication, embodying cypherpunk principles of privacy and autonomy. Wikipedia

Micah Lee 2021

  • Micah Lee - Developed OnionShare, an open source tool enabling anonymous, censorship-resistant file sharing and secure communication over the Tor network, empowering activists, journalists, and whistleblowers to exchange sensitive information without risking exposure. As a security engineer at The Intercept, he advanced operational security practices for investigative journalism and digital rights. His book, Hacks, Leaks, and Revelations, demystifies privacy tools and threat modeling for the public, reinforcing cypherpunk principles of individual autonomy and resistance to surveillance. Micah Lee - Wikipedia

Jon Callas

  • Jon Callas - Architect of end-to-end encryption for PGP and co-founder of Silent Circle, he advanced practical, user-friendly cryptography for secure messaging and voice communications. At Apple, he shaped core security features for macOS and iOS, helping mainstream privacy by design. His work on protocols like ZRTP and advocacy for open standards empowered individuals to reclaim digital privacy, embodying cypherpunk ideals of decentralization and user sovereignty. Wikipedia

Colin Percival 2017

  • Colin Percival - Pioneered practical cryptographic security for everyday users by creating Tarsnap, a backup service designed with end-to-end encryption and strong threat modeling, ensuring user data remains private even from the service operator. Developed scrypt, a memory-hard key derivation function that significantly strengthened password-based security and became foundational in cryptocurrency wallets and secure storage systems. As FreeBSD Security Officer, advanced open source operating system security, contributing to the reliability and privacy of critical internet infrastructure. His work exemplifies cypherpunk principles by empowering individuals with robust, user-auditable privacy tools and advancing the state of cryptographic best practices. Wikipedia

Peter Eckersley (2016)

  • Peter Eckersley - Catalyzed the global adoption of web encryption by co-founding Let's Encrypt, which provides free, automated HTTPS certificates and has enabled secure connections for hundreds of millions of websites, dramatically raising the baseline for internet privacy. Developed Privacy Badger, a browser extension that automatically blocks trackers, empowering users to resist pervasive online surveillance. As Chief Computer Scientist at the Electronic Frontier Foundation, advanced research and advocacy for digital rights, encryption standards, and privacy-enhancing technologies, shaping the infrastructure of a safer, more private web. Wikipedia

Dan Kaminsky at Black Hat 2010

  • Dan Kaminsky - Exposed the critical 2008 DNS cache poisoning vulnerability, forcing global upgrades to the Domain Name System and protecting internet users from large-scale traffic hijacking and surveillance. Advocated for robust public-key cryptography deployment to secure core infrastructure, and championed responsible disclosure, transparency, and privacy-by-design in internet protocols. His research and activism shaped the security posture of the modern internet, reinforcing cypherpunk ideals of decentralized trust and user autonomy. Wikipedia

Transparency & Whistleblowing

They knew the risks and spoke anyway. They paid in freedom to show us the truth.

Julian Assange February 2024

  • Julian Assange - Publisher who founded WikiLeaks, pioneering the use of cryptography and anonymizing technologies to enable secure, anonymous submission of leaked documents. Exposed global surveillance, war crimes, and the Cablegate diplomatic leaks, catalyzing debate on government transparency and digital rights. Championed "scientific journalism," insisting on cryptographic verification of source material, and inspired cypherpunk discourse on radical transparency, accountability, and the power of decentralized information platforms. Wikipedia

Chelsea Manning 2015

  • Chelsea Manning - Whistleblower who catalyzed global debate on government transparency and digital rights by leaking the Iraq War Logs, Afghan War Diary, and Cablegate to WikiLeaks in 2010, revealing widespread surveillance, civilian casualties, and abuses concealed by state secrecy. Her disclosures inspired new generations of privacy advocates, fueled the cypherpunk movement's focus on secure communications and whistleblower protection, and highlighted the critical role of cryptography and anonymity tools in defending civil liberties against mass surveillance. Manning's actions underscored the ethical and technical challenges at the intersection of state power, digital privacy, and the right to know. Wikipedia

Edward Snowden

William Binney 2013

  • William Binney - Technical architect behind the ThinThread surveillance program, he pioneered privacy-preserving analytics within intelligence systems, embedding strong encryption and automated anonymization to protect citizens' rights. As an early whistleblower, he exposed the NSA's post-9/11 warrantless surveillance, revealing how critical privacy safeguards were deliberately removed from agency operations. His disclosures ignited public debate on mass surveillance, inspired reforms, and galvanized the cypherpunk movement's fight for transparency, accountability, and robust digital privacy. Wikipedia

Thomas A. Drake 2015

  • Thomas Drake - Whistleblower who exposed unconstitutional mass surveillance and waste within the NSA, notably revealing details of the failed Trailblazer Project and advocating for privacy-respecting alternatives like the ThinThread program. His disclosures highlighted systemic abuses of digital rights and catalyzed public debate on government overreach, inspiring reforms and influencing the cypherpunk movement's push for transparency, accountability, and robust privacy protections. Despite being charged under the Espionage Act, his eventual vindication underscored the risks and necessity of principled dissent in defense of civil liberties. Wikipedia

Ladar Levison 2013

  • Ladar Levison - Creator of the encrypted email service Lavabit, he made headlines in 2013 by shutting down the platform rather than comply with a US government order to surrender private encryption keys, protecting user privacy even under intense legal pressure. His principled stand, motivated by cypherpunk ideals, brought global attention to the risks of centralized email and government surveillance. He later co-founded the Dark Mail Alliance, pioneering the development of the DIME protocol for end-to-end encrypted email, advancing secure communications and inspiring new privacy technologies. Wikipedia

Aaron Swartz profile

  • Aaron Swartz - Open-access activist who co-authored the RSS 1.0 specification, co-founded Reddit, and helped develop Creative Commons licensing. Swartz championed digital freedom and the democratization of information, notably downloading millions of academic papers from JSTOR to protest paywalls and restrictive copyright laws. His prosecution under the Computer Fraud and Abuse Act and subsequent death galvanized the open-access movement, inspiring global efforts for transparency, privacy, and the free flow of knowledge. Wikipedia

Holmes Wilson

  • Holmes Wilson - Digital rights activist who co-founded Fight for the Future, Holmes Wilson was a principal organizer of the 2012 SOPA/PIPA Internet blackout, a landmark protest that mobilized millions to defend online freedom and privacy. He has spearheaded campaigns for net neutrality, mass surveillance reform, and open Internet access, building innovative digital activism tools that empower grassroots movements. His work has significantly advanced cypherpunk ideals by defending anonymity, resisting censorship, and shaping public discourse around digital privacy and decentralized communication. Wikipedia

Glenn Greenwald 2014

  • Glenn Greenwald - Journalist and constitutional lawyer who exposed the scope of global mass surveillance by publishing the Snowden leaks in collaboration with Laura Poitras and Ewen MacAskill, revealing the NSA's PRISM program and other secret operations. Co-founded The Intercept to advance adversarial reporting on state surveillance, encryption, and digital rights, catalyzing global debate on privacy and inspiring new generations of technologists and activists to defend secure communications and resist government overreach. Wikipedia

Educators & Philosophers

The Translators. They built the culture that made privacy a cause instead of a feature.

Andreas Antonopoulos, 2016

  • Andreas M. Antonopoulos - Educator and advocate who demystified Bitcoin and blockchain technology for the public, Antonopoulos authored the seminal guides Mastering Bitcoin and The Internet of Money, empowering millions to understand and leverage decentralized systems for privacy and financial autonomy. His global talks and writings champion cypherpunk principles like open access, censorship resistance, and individual sovereignty, inspiring a new generation to embrace cryptographic tools for digital freedom. Through clear explanations and passionate advocacy, he has made complex concepts like public-key cryptography, peer-to-peer networks, and trustless systems accessible, reinforcing the foundational ideals of the cypherpunk movement. Wikipedia

Cory Doctorow 2019 (cropped)

Lawrence Lessig by Joi Ito

  • Lawrence Lessig - Legal theorist who pushed digital rights by founding Creative Commons, enabling global sharing and remixing of creative works while preserving user freedoms. Articulated the influential "code is law" concept in Code and Other Laws of Cyberspace, arguing that software architecture and legal code jointly shape online liberty and privacy. Through works like Free Culture and activism against restrictive copyright, advanced cypherpunk ideals of decentralization, open access, and resistance to surveillance and control by centralized authorities. Wikipedia

Seth Schoen 2010

  • Seth Schoen - Senior technologist who championed digital rights at the Electronic Frontier Foundation, demystifying cryptography for courts, policymakers, and the public. Instrumental in co-founding Let's Encrypt, he helped make HTTPS encryption freely accessible, dramatically increasing web privacy and security. A leading voice against Digital Rights Management (DRM), he advocated for user freedom and transparency, embodying cypherpunk ideals by bridging technical expertise and public advocacy to defend privacy, decentralization, and open standards. Wikipedia

Policy Defenders & Legal Activists

The Courtroom Warriors. They battled the state on its own turf. They translated code into arguments and turned resistance into precedent.

Cindy Cohn 2015

  • Cindy Cohn - Civil liberties attorney who, as lead counsel in the landmark case Bernstein v. United States Department of Justice, secured the legal precedent that source code is protected speech under the First Amendment, a foundational victory for encryption rights and privacy technology. As Executive Director of the Electronic Frontier Foundation (EFF), she has championed digital due process, fought government surveillance, and defended the right to use strong cryptography, directly shaping the legal landscape that enables privacy tools and secure communication. Her advocacy has empowered cypherpunks, technologists, and activists to develop and distribute privacy-enhancing technologies without fear of censorship or prosecution, reinforcing the principle that code is law and a vital form of free expression. Wikipedia

Shari Steele 2016

  • Shari Steele - Introduced legal strategies defending strong encryption and privacy rights as Executive Director of the EFF, guiding the organization through the Crypto Wars and expanding its global influence on digital civil liberties. Later led the Tor Project, supporting the development and advocacy of onion routing technology to protect anonymity online. Her leadership fortified the legal and technical foundations of privacy tools central to cypherpunk ideals, ensuring robust defense of encryption as essential to democracy and free expression. Wikipedia

Jennifer Granick


Architects of Sovereignty

They built nations of the mind. From ideals to infrastructure, they mapped the blueprint for digital civilization itself, redefining the social contract, designing systems where citizenship, governance, and value flow across networks, not borders.

Balaji Srinivasan 2021

  • Balaji Srinivasan - Advocate for decentralized governance and digital sovereignty, he authored The Network State, articulating a blueprint for building opt-in digital societies leveraging blockchain and cryptographic tools. As former CTO of Coinbase and co-founder of Earn.com, he advanced cryptocurrency adoption and privacy-centric economic models, empowering individuals to monetize their data and communications. His thought leadership bridges cypherpunk ideals with practical strategies for digital freedom, influencing discourse on self-sovereign identity, censorship resistance, and the future of networked communities. Wikipedia

Andrew Lee (entrepreneur) 2019

  • Andrew Lee - Entrepreneur and digital sovereignty advocate who co-founded Private Internet Access (PIA), a VPN service that also engaged in heavy activism to advance user privacy and online anonymity during his tenure. He is head of Joseon, the first legally recognized network state. A significant financial supporter of privacy technologies and open source ecosystems, he also co-authored research on verifiable trusted execution environment (TEE)-based traffic mixing, collaborating with Mark Karpelès to enhance secure, anonymous communications. His work exemplifies the cypherpunk ethos by empowering individuals to control their digital identities and resist surveillance. Wikipedia

Honorary Ancestors

The Foundation. Before cypherpunks, there were the pioneers who built the substrate of freedom itself. They designed the OS layer that made the rest possible. Everything began with them.

Richard Stallman, 2019

  • Richard Stallman - Architect of the Free Software Movement, he launched the GNU Project and founded the Free Software Foundation, establishing the principle that software should respect users' freedom and privacy. By creating the GNU General Public License (GPL), he ensured legal protection for the right to use, study, modify, and share software, directly empowering privacy tools and cryptographic projects foundational to cypherpunk ideals. His advocacy for user autonomy and opposition to surveillance capitalism inspired generations of privacy activists and developers, shaping the ethical framework for anonymous communication, open source encryption, and decentralized infrastructure. Wikipedia

Linus Torvalds (2013)

  • Linus Torvalds - Architect of the Linux kernel, which underpins the majority of privacy-focused operating systems and secure server infrastructure worldwide, enabling projects like Tails, Whonix, and countless privacy-centric distributions. His commitment to open source principles fostered a transparent, auditable platform essential for cryptographic software, anonymous communications, and decentralized tools used by cypherpunks to resist surveillance and censorship. The collaborative, meritocratic development model he championed became a blueprint for global digital freedom, empowering activists, developers, and users to build and verify privacy-respecting technologies at scale. Wikipedia

Steve Jobs Headshot 2010

  • Steve Jobs - Advocated for strong user privacy within mainstream technology, famously emphasizing that users should control their own data and pushing back against invasive data collection practices. As co-founder of Apple Inc., he led the development of devices like the iPhone and Mac, which implemented robust device encryption and privacy-centric features, influencing industry standards for secure communications and local data protection. His public stance in favor of user autonomy and privacy, including resistance to government backdoors, helped shape the broader tech industry's approach to digital rights and inspired ongoing debates about encryption and surveillance. Wikipedia

Honorable Mentions

Complex Legacies. Builders who carried the mission forward through the system and sometimes against it. Not without controversy, andn ever without consequence.

Donald Trump official portrait

  • Donald J. Trump - State actor whose administration's approach to cryptocurrency was direct. His tenure saw increased mainstream attention to digital assets like Bitcoin, executive orders established a "Strategic Bitcoin Reserve" and formalized the U.S. as a "crypto capital." He pardoned Ross Ulbricht and Changpeng Zhao. His administration's policies reflected institutional engagement with crypto, but often prioritized surveillance and regulatory control over privacy, decentralization, or digital freedom, illustrating the tension between state power and cypherpunk resistance. Wikipedia

Brian Armstrong (Coinbase, 2018)

  • Brian Armstrong - Entrepreneur who co-founded Coinbase, a major platform that helped bring Bitcoin and other cryptocurrencies to mainstream adoption while navigating the tension between cypherpunk ideals of decentralization and the realities of regulatory compliance. Championed efforts to make digital assets accessible to millions, advocated for clear crypto regulation, and promoted financial inclusion by enabling broader participation in the global digital economy. His work has sparked debate within the cypherpunk community about the balance between privacy, user autonomy, and institutional oversight, shaping the discourse on how decentralized technologies can coexist with legal frameworks. Wikipedia

Gavin Andresen

  • Gavin Andresen - An early architect of the Bitcoin reference implementation who, after being entrusted with leadership by Satoshi Nakamoto, helped grow the ecosystem and founded the Bitcoin Foundation. However, his later endorsement of Craig Wright's claim to be Nakamoto and his public acknowledgement of a planned presentation to the CIA, coinciding with Nakamoto's exit, have clouded his legacy. Wikipedia

Mark Karpeles

  • Mark Karpelès - Pioneered large-scale Bitcoin exchange infrastructure as CEO of Mt. Gox, which at its peak processed over 70% of global Bitcoin transactions, catalyzing mainstream adoption and liquidity in the early cryptocurrency ecosystem. His stewardship, though ultimately marred by the exchange's collapse, highlighted critical issues in custodial risk and spurred advancements in decentralized exchange models and security practices. Later, he contributed to privacy research, co-authoring work on verifiable trusted execution environment (TEE) traffic mixing, reflecting ongoing engagement with cypherpunk ideals of privacy and trust minimization. He was later vindicated by Vitalik Buterin. Wikipedia

Closing: The Work Continues

████████╗██╗  ██╗███████╗    ██╗    ██╗ ██████╗ ██████╗ ██╗  ██╗
╚══██╔══╝██║  ██║██╔════╝    ██║    ██║██╔═══██╗██╔══██╗██║ ██╔╝
   ██║   ███████║█████╗      ██║ █╗ ██║██║   ██║██████╔╝█████╔╝ 
   ██║   ██╔══██║██╔══╝      ██║███╗██║██║   ██║██╔══██╗██╔═██╗ 
   ██║   ██║  ██║███████╗    ╚███╔███╔╝╚██████╔╝██║  ██║██║  ██╗
   ╚═╝   ╚═╝  ╚═╝╚══════╝     ╚══╝╚══╝  ╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═╝
                                                                   
 ██████╗ ██████╗ ███╗   ██╗████████╗██╗███╗   ██╗██╗   ██╗███████╗███████╗
██╔════╝██╔═══██╗████╗  ██║╚══██╔══╝██║████╗  ██║██║   ██║██╔════╝██╔════╝
██║     ██║   ██║██╔██╗ ██║   ██║   ██║██╔██╗ ██║██║   ██║█████╗  ███████╗
██║     ██║   ██║██║╚██╗██║   ██║   ██║██║╚██╗██║██║   ██║██╔══╝  ╚════██║
╚██████╗╚██████╔╝██║ ╚████║   ██║   ██║██║ ╚████║╚██████╔╝███████╗███████║
 ╚═════╝ ╚═════╝ ╚═╝  ╚═══╝   ╚═╝   ╚═╝╚═╝  ╚═══╝ ╚═════╝ ╚══════╝╚══════╝

This hall will never be complete. The fight for privacy doesn't end, it evolves.

Somewhere out there beneath the pale moonlight, someone is writing code to protect people they'll never meet. Someone is proving that technology can serve freedom.

if (you.value_privacy) { cypherpunk(you); }

The people in this hall showed us that cryptography is freedom. They proved that a few determined keyboard warriors with conviction can become the greatest heroes of the free world.

You're next.


The Projects That Changed Everything

Infrastructure for freedom. Code for sovereignty.

These projects are weapons bringing both freedom of speech and defense against surveillance. They're proof that decentralized systems can work. They're the infrastructure layer of digital freedom.

Because when you write code that liberates people, you’re programming the future.

liberation()


Foundational Cryptography (1970s–1990s)

The mathematical breakthroughs that made everything else possible. These are the protocols that turned cryptography from an academic curiosity into a tool for mass liberation.

RSA

  • RSA - As the first practical public-key cryptosystem, this algorithm revolutionized digital privacy by enabling secure, end-to-end encrypted communication and digital signatures without prior key exchange. Its mathematical foundation, based on the hardness of factoring large integers, became the cornerstone for secure email, online banking, and digital authentication, directly empowering cypherpunks to build censorship-resistant, trustless systems. By making strong cryptography accessible, it catalyzed the development of privacy tools and inspired the creation of decentralized technologies, from PGP to Bitcoin, embodying the cypherpunk ethos of individual sovereignty and secure digital freedom. Wikipedia

DH

  • Diffie–Hellman Key Exchange - Transformed digital privacy by enabling two parties to establish a shared secret over an insecure channel, the Diffie - Hellman key exchange laid the groundwork for modern public-key cryptography and secure protocols like TLS. This breakthrough made confidential online communication possible without prior trust, directly empowering cypherpunk ideals of decentralization, anonymity, and resistance to surveillance. Its influence extends to privacy-preserving technologies including encrypted messaging, VPNs, and the cryptographic foundations of cryptocurrencies. Wikipedia

DES Feistel

  • DES / Feistel Network - Pioneered modern symmetric encryption by introducing the Data Encryption Standard (DES), which became the first widely adopted block cipher for securing digital communications in government, finance, and industry. Built on Horst Feistel's innovative Feistel network structure, DES set the template for countless later ciphers, including Blowfish, Triple DES, and AES. Its design and eventual cryptanalysis fueled debates on algorithm transparency and key length, shaping cypherpunk advocacy for strong, open cryptography as a foundation for privacy and digital rights. Wikipedia

AES

  • AES (Advanced Encryption Standard) - Encryption standard that revolutionized global privacy and security by providing a robust, open, and peer-reviewed algorithm for symmetric encryption, replacing the vulnerable DES. Developed by Joan Daemen and Vincent Rijmen as Rijndael, it was selected by NIST as the Advanced Encryption Standard (AES) in 2001. AES's 128-bit block size and flexible key lengths (128, 192, 256 bits) set a new benchmark for secure communications, protecting everything from end-to-end encrypted messaging to cryptocurrencies and classified state secrets. Its public, royalty-free design embodies cypherpunk ideals of transparency, accessibility, and resistance to surveillance, underpinning countless privacy tools and protocols worldwide. Wikipedia

PGP

  • PGP (Pretty Good Privacy) - Advanced digital privacy by making public-key cryptography accessible to the masses, enabling ordinary users to encrypt and sign emails with unprecedented ease. Its release by Phil Zimmermann in 1991 sparked the first Crypto Wars, as the US government attempted to restrict its export, framing encryption as a battleground for civil liberties and free speech. PGP's open availability galvanized the cypherpunk movement, influencing later secure communication tools and establishing encryption as a fundamental right in the digital age. Wikipedia

Cypherpunks

  • Cypherpunks Mailing List - Incubator of modern digital privacy, this legendary discussion forum united cryptographers, hackers, and activists to pioneer the foundations of decentralized, anonymous communication. It was the birthplace of transformative technologies and ideas, including the design and debate of The Crypto Anarchist Manifesto and A Cypherpunk's Manifesto, and directly influenced the creation of Bitcoin, Tor, and the ethos of digital rights activism. Its open, radical discourse shaped the architecture of public-key cryptography, anonymous remailers, and the global movement for privacy-enhancing technologies, making it a cornerstone of the cypherpunk legacy. Wikipedia

Anonymous Communication & Privacy Tools

The Anonymity Layer. Privacy requires anonymity. These projects hide who you are, who you're talking to, and what you're saying.

Tor

  • Tor - Anonymous routing network enabling uncensored, surveillance-resistant communication by leveraging onion routing, which encrypts and relays traffic through a global network of volunteer-operated nodes. Originating from U.S. Naval Research Laboratory research, it was publicly released in 2002 and is now developed by the nonprofit Tor Project. Tor empowers activists, journalists, and ordinary users worldwide to bypass censorship and protect their privacy, embodying cypherpunk ideals of decentralized, user-controlled anonymity. Its impact extends to tools like the Tor Browser and hidden services, making it foundational for digital freedom and secure, pseudonymous communication. Wikipedia

I2P logo (2019)

  • I2P (Invisible Internet Project) - Anonymous overlay network enabling censorship-resistant communication, I2P employs garlic routing to bundle multiple encrypted messages, enhancing metadata resistance beyond traditional onion routing. It powers privacy-preserving hidden services, anonymous browsing, secure email, decentralized file sharing, and peer-to-peer applications, fostering a robust ecosystem for activists, journalists, and users seeking digital freedom. By decentralizing infrastructure and resisting surveillance, it advances cypherpunk ideals of privacy, autonomy, and resistance to censorship. Wikipedia

  • Mixmaster / Mixminion - Pioneered anonymous email communication by introducing the second- and third-generation anonymous remailer protocols, enabling users to send messages without revealing their identity or metadata. Mixmaster implemented fixed-size packets and layered onion encryption, thwarting traffic analysis and enhancing privacy. Mixminion advanced the design with improved reply blocks and more robust delivery, setting a technical precedent for metadata-resistant messaging and influencing later anonymity networks like Tor. These protocols embodied cypherpunk ideals by empowering individuals to communicate securely and anonymously, resisting surveillance and censorship. Wikipedia

Freenet

  • Freenet - As a decentralized, censorship-resistant platform since 2000, this project enables anonymous publishing, file sharing, and messaging by distributing encrypted data across a global volunteer network. By leveraging techniques like adaptive routing and data replication, it thwarts surveillance and takedown attempts, embodying cypherpunk ideals of privacy and free expression. Its influence extends to later anonymity networks and inspires ongoing research in distributed, privacy-preserving technologies, making it a foundational tool for activists, journalists, and dissidents worldwide. Wikipedia

GNUnet

  • GNUnet - Decentralized, censorship-resistant networking framework enabling anonymous, privacy-preserving communication and file sharing through advanced protocols like anonymous routing, distributed hash tables, and secure peer-to-peer networking. Pioneers modular, surveillance-resistant architectures for applications such as anonymous file sharing, censorship-proof websites, and secure messaging. Embodies cypherpunk principles by prioritizing user autonomy, cryptographic security, and resistance to centralized control, influencing the design of privacy-centric networks and inspiring ongoing research in digital freedom. Wikipedia

WireGuard

  • WireGuard - A registered trademark of Jason A. Donenfeld, WireGuard is a minimalist, high-performance VPN protocol that prioritizes privacy and simplicity. Leveraging state-of-the-art cryptography including Curve25519 for key exchange, ChaCha20 for encryption, and Poly1305 for authentication, it drastically reduces attack surface and configuration complexity compared to legacy protocols like OpenVPN and IPsec. Its inclusion in the Linux kernel ensures widespread, efficient, and default-available privacy for millions, embodying cypherpunk ideals of accessible, robust digital freedom. Wikipedia

OpenVPN

  • OpenVPN - Enables secure, censorship-resistant internet access by creating encrypted tunnels using SSL/TLS, shielding user traffic from surveillance and interception. As the most widely adopted open source VPN, it empowers activists, journalists, and individuals worldwide to bypass censorship, evade network monitoring, and protect sensitive communications. Its robust cryptographic design and flexible deployment have made it foundational for privacy-focused services, commercial VPN providers, and grassroots digital freedom projects, embodying cypherpunk principles of decentralization and user autonomy. Wikipedia

Signal

  • Signal - Pioneering end-to-end encrypted messenger advancing cypherpunk ideals by delivering robust privacy through the Signal Protocol, which combines the Double Ratchet algorithm and X3DH for forward secrecy, deniability, and minimal metadata retention. Its open source cryptographic framework powers the encryption behind billions of messages in mainstream apps like WhatsApp, Facebook Messenger, and Skype, setting a global standard for secure, private communication. Developed by the Signal Foundation, it champions transparency and user empowerment, making strong encryption accessible to all and resisting surveillance and censorship. Wikipedia

Element

  • Matrix / Element - Open, decentralized communication protocol enabling secure, federated real-time messaging across independent servers, Matrix advances cypherpunk ideals by resisting centralized control and surveillance. Its end-to-end encryption, powered by the Megolm cryptographic ratchet, supports large group chats and robust privacy. Matrix powers clients like Element, facilitating encrypted collaboration for activists, journalists, and organizations. By promoting interoperability and user autonomy, Matrix provides a censorship-resistant alternative to proprietary messaging platforms, embodying the cypherpunk vision of privacy and freedom through strong cryptography and open standards. Wikipedia

Jitsi

  • Jitsi - Open source encrypted video-conferencing platform enabling private, decentralized communication without mandatory registration or proprietary lock-in. By leveraging WebRTC for real-time audio and video, Jitsi Meet allows anyone to host or join secure calls directly from their browser, while Jitsi Videobridge supports scalable group meetings. End-to-end encryption options, transparency of code, and self-hosting empower users to resist surveillance and censorship, making it a vital tool for activists, journalists, and privacy advocates. Its commitment to open standards and federated operation embodies core cypherpunk values of autonomy and digital freedom. Wikipedia

Tails OS

  • Tails OS - Live privacy-focused OS that routes all internet traffic through the Tor network, ensuring strong anonymity and resistance to surveillance or censorship. Leaves no forensic trace on host machines by operating entirely from RAM, making it ideal for journalists, whistleblowers, activists, and anyone needing secure, ephemeral computing. Bundles tools like KeePassXC, Electrum, and GnuPG, embodying cypherpunk ideals of user autonomy, cryptographic privacy, and digital freedom. Widely used in high-risk environments, it advances the cause of untraceable, decentralized communication and safe information sharing. Wikipedia

GrapheneOS

  • GrapheneOS - Delivers a security-hardened, privacy-centric Android operating system designed to resist sophisticated attacks through advanced memory safety, exploit mitigation, and robust app sandboxing. Implements verified boot, minimal default app permissions, and strong isolation between user profiles, empowering users to control data exposure and thwart surveillance. Fully [open source](https://grapheneos.org/faq#open source), with reproducible builds and transparent development, it is recommended by security enthusiasts for journalists, activists, and anyone seeking to minimize mobile tracking. Advances cypherpunk ideals by providing a practical, auditable platform for secure, private communications and digital autonomy. Wikipedia

Whonix

  • Whonix - Enables robust, practical anonymity by architecting a security-focused operating system that routes all communications through the Tor network, using a two-part design: the Gateway handles all networking while the Workstation is isolated for user tasks. This architecture, based on Debian, prevents IP and DNS leaks by design, even if malware compromises the user environment. Whonix empowers activists, journalists, and privacy advocates to defend against network-level surveillance and traffic analysis, embodying cypherpunk principles of user autonomy and resistance to censorship. Wikipedia

Qubes OS

  • Qubes OS - Security-focused operating system implementing rigorous security by compartmentalization, leveraging the Xen hypervisor to isolate applications and workflows into separate virtual machines, minimizing the risk of cross-application compromise. Widely respected by privacy advocates and whistleblowers, including Edward Snowden, for its ability to enforce strong operational security and defend against advanced persistent threats. Empowers users to achieve practical digital autonomy and privacy by design, embodying cypherpunk principles of user-controlled security and minimizing trust in centralized systems. Wikipedia

Encryption & Security Tools

The Toolbox. Practical encryption tools that protect files, messages, and communications from surveillance.

Veracrypt

  • VeraCrypt - Provides robust, open source disk encryption software, empowering users to secure entire drives or virtual volumes with strong cryptographic algorithms like AES, Serpent, and Twofish, including support for complex cascaded modes. As the direct successor to the discontinued TrueCrypt, it addresses security vulnerabilities and enhances plausible deniability with hidden volumes and operating systems. Widely used across Windows, macOS, and Linux, it advances cypherpunk ideals by enabling individuals and organizations to resist surveillance, censorship, and unauthorized data access, making strong privacy accessible to all. Wikipedia

LUKS

  • LUKS (Linux Unified Key Setup) - Provides the de facto standard for Linux full-disk encryption, enabling robust protection of sensitive data at rest. By introducing a secure metadata header supporting multiple key slots, LUKS allows for flexible key management and secure password changes without re-encryption. Managed via cryptsetup, it is integrated into nearly all major Linux distributions, empowering users to control their own cryptographic keys and resist unauthorized access. LUKS embodies cypherpunk values by democratizing strong encryption, making privacy and digital autonomy accessible to millions of users and organizations worldwide. Wikipedia

  • dm-crypt - Enables robust, transparent block-level encryption within the Linux kernel, empowering users to secure entire disks or partitions against unauthorized access. As the foundational engine beneath LUKS, it supports advanced cipher modes like XTS-AES, ensuring strong cryptographic protection for sensitive data at rest. Widely adopted in privacy-centric distributions and by security professionals, it exemplifies cypherpunk principles by making strong, open source encryption accessible to all, directly countering surveillance and data theft. Its integration into mainstream operating systems has made full-disk encryption a practical default, advancing digital autonomy and resistance to coercive data disclosure. Wikipedia

age

  • age - A modern file encryption tool and format designed for simplicity, security, and usability, it leverages X25519 for public-key exchange and ChaCha20-Poly1305 for authenticated encryption, providing robust protection with a minimal attack surface. Created to be a secure, auditable, and user-friendly alternative to legacy tools like GPG, it advances cypherpunk ideals by making strong cryptography accessible to everyone, reducing the risk of implementation errors and promoting privacy by default. Its open specification and focus on interoperability empower individuals and developers to safeguard data without the complexity and pitfalls of traditional solutions, reinforcing the movement's commitment to practical, decentralized privacy technology. Wikipedia

gpg

  • GnuPG (GPG) - Free, open source implementation of the OpenPGP standard, empowering users worldwide with strong public-key cryptography for end-to-end encryption, digital signatures, and authentication. Forms the cryptographic backbone for secure communications in email clients like Enigmail and critical infrastructure such as Debian's package signing, ensuring software integrity and privacy. Widely adopted by activists, journalists, and cypherpunks, it advances digital freedom by providing decentralized, government-resistant tools for protecting sensitive data and verifying identity, embodying core cypherpunk ideals of privacy and autonomy. Wikipedia

Bitwarden

  • Bitwarden - Open source password manager delivering end-to-end encrypted vaults, Bitwarden empowers users to control their digital secrets without trusting third parties. All sensitive data is encrypted locally before cloud sync, ensuring only users hold the decryption keys. Its self-hosting option, transparent public security audits, and open APIs exemplify cypherpunk values of user sovereignty, verifiability, and resistance to centralized surveillance. By making robust cryptography accessible and auditable, Bitwarden advances privacy, digital autonomy, and the practical application of strong encryption for all. Wikipedia

Tarsnap

  • Tarsnap - Encrypted online backup service engineered for privacy advocates, it employs client-side AES encryption and data deduplication to ensure that only users control their cryptographic keys, preventing even the service operator from accessing stored data. Designed by Colin Percival, it exemplifies cypherpunk principles by prioritizing user autonomy, cryptographic rigor, and a transparent, pay-as-you-go model. Its open documentation and security-first approach have influenced best practices in secure cloud storage, making it a reference point for privacy-respecting backup solutions. Wikipedia

Operating Systems & Foundation Layer

The Infrastructure. Without these systems, privacy tools couldn't exist. Open source operating systems that can be audited, verified, and trusted.

Tux, the Linux mascot

  • Linux Kernel - Enables the backbone of modern privacy and anonymity tools by providing a robust, open source operating system kernel essential for projects like Tor, Tails, and WireGuard. Its modular architecture, process isolation, and granular permission models empower developers to build secure, censorship-resistant platforms that protect users from surveillance and control. Developed transparently via Kernel.org, it embodies cypherpunk ideals of decentralization, transparency, and user empowerment, serving as the trusted foundation for countless privacy-enhancing technologies and digital rights initiatives. Wikipedia

Heckert GNU white logo

  • GNU Project - Launched in 1983, this pioneering initiative created the foundation for free and open source software by developing essential GNU userland tools like compilers, libraries, and shells, which, when paired with the Linux kernel, form the widely used GNU/Linux operating system. Its radical free software philosophy champions user autonomy, transparency, and the right to study, modify, and share code, directly inspiring cypherpunk values of privacy, decentralization, and resistance to surveillance. By enabling cryptographic innovation and privacy-respecting systems, it laid the groundwork for tools like GnuPG and fostered a global movement for digital rights and secure communication. Wikipedia

OpenBSD

  • OpenBSD - Pioneering a "secure by default" ethos, this Unix-like operating system has set the gold standard for proactive security in open source. Through relentless code auditing and innovations like OpenSSH for encrypted communications, the PF firewall for robust network defense, and LibreSSL as a response to SSL vulnerabilities, it has empowered privacy advocates and cypherpunks worldwide. Its uncompromising focus on code correctness, minimalism, and open development has influenced countless privacy tools and inspired best practices in secure software design, making it a cornerstone for digital freedom and trust. Wikipedia

FreeBSD

  • FreeBSD - Open source operating system renowned for its robust networking stack, security features, and permissive BSD license, enabling widespread adoption in privacy-focused infrastructure. Forms the backbone of projects like pfSense (open source firewall and VPN), TrueNAS (encrypted storage), and is used by privacy-conscious organizations for its transparent development and minimal telemetry. Its codebase influenced macOS and underpins critical internet services, supporting cypherpunk ideals of user autonomy, open auditability, and decentralized control. FreeBSD's commitment to open standards and cryptographic extensibility has made it a trusted platform for secure communications, digital rights, and anonymous networking. Wikipedia

Debian

  • Debian - Universal operating system project providing a robust, privacy-respecting foundation for secure communications, anonymous browsing, and digital freedom. Its commitment to free software, transparent governance, and reproducible builds has made it the trusted base for privacy-centric distributions like Tails, which routes all traffic through Tor, and Whonix, which leverages isolation for anonymity. Debian's rigorous package vetting and open development process empower activists, journalists, and cypherpunks to build and deploy censorship-resistant, cryptographically secure systems. Its influence extends to countless derivatives, shaping the infrastructure of privacy technology and advancing the ideals of decentralization and user autonomy. Wikipedia

Cryptographic Libraries & Protocols

The Building Blocks. Cryptographic libraries that developers use to build secure applications. Easy to use correctly, hard to misuse.

libsodium

OpenSSL

  • OpenSSL - Essential cryptographic library enabling widespread adoption of TLS for secure web traffic, OpenSSL underpins the privacy and integrity of HTTPS, VPNs, email encryption, and countless secure messaging protocols. By providing robust, open source implementations of public-key cryptography, X.509 certificates, and PKI, it has empowered individuals, activists, and cypherpunks to protect communications against surveillance and censorship, making encrypted connections the Internet's default and advancing the cause of digital freedom. Wikipedia

LibreSSL

  • LibreSSL - Provides a security-hardened, open source alternative to OpenSSL, created by the OpenBSD team in response to the catastrophic Heartbleed vulnerability. LibreSSL aggressively removes legacy code, modernizes cryptographic primitives, and enforces rigorous code auditing, reducing attack surface and improving reliability for privacy-critical applications. Its focus on transparency, minimalism, and open development directly advances cypherpunk goals of trustworthy, decentralized security infrastructure, powering secure communications in privacy tools, servers, and embedded systems. Wikipedia

  • BoringSSL - Delivers a hardened, modern fork of OpenSSL designed to minimize attack surface and eliminate legacy vulnerabilities, powering secure communications in Chrome, Android, and Cloudflare. By removing outdated algorithms, tightening default security settings, and focusing on robust cryptographic primitives, it advances the cypherpunk goal of widespread, reliable encryption for billions of users. Its rigorous code review and proactive security stance set a new standard for open source cryptographic libraries, directly supporting privacy and digital freedom at global scale. Wikipedia

  • Noise Protocol Framework - Enables the creation of secure, privacy-preserving communication protocols by defining modular cryptographic handshake patterns like Noise_NN and Noise_XX, which combine Diffie-Hellman key exchange and authenticated encryption (AEAD) for robust confidentiality and forward secrecy. Widely adopted in privacy-focused tools such as WireGuard and the Lightning Network, it empowers decentralized, censorship-resistant networks by making strong cryptography accessible and auditable, embodying cypherpunk principles of user autonomy and digital freedom. Wikipedia


VPN Services

Modern Cypherpunk Privacy Layer. Selected for transparency, independence, and avoidance of telemetry or ad-tech ties. These VPNs represent privacy-first infrastructure.

Mullvad

  • Mullvad VPN - This independent service enables anonymous internet access through robust protocols like WireGuard and OpenVPN, requiring no email for signup and supporting cash payments to maximize user anonymity. Its uncompromising [no logs policy](https://mullvad.net/en/help/no logging-data-policy/) was famously validated when Swedish authorities, executing a search warrant, found no user data to seize. By prioritizing transparency, open source apps, and resistance to surveillance, it sets a gold standard for VPNs aligned with cypherpunk values of digital freedom and privacy protection. Wikipedia

VP.NET

  • VP.NET - Delivers cryptographically verifiable privacy infrastructure by leveraging Intel SGX Trusted Execution Environments and remote attestation, enabling users to independently verify the integrity and confidentiality of computations. By open-sourcing its core code (vpnetd-sgx), it empowers developers to audit and deploy privacy-preserving services without relying on blind trust. This approach advances cypherpunk ideals by making strong, hardware-backed privacy guarantees accessible for decentralized applications and secure communications, directly addressing the need for verifiable trust in a world of pervasive surveillance. Wikipedia

Obscura

  • Obscura VPN - Implements a dual-provider VPN model to enhance user privacy by splitting trust between independent entities. Traffic first enters through Obscura’s servers and then exits via Mullvad’s WireGuard infrastructure, ensuring that no single provider can correlate user identities with their internet activity. This architecture embodies cypherpunk values by minimizing data retention risks, resisting surveillance, and providing a practical, user-friendly approach to anonymity and censorship resistance. By leveraging open standards and a transparent privacy policy, it advances the cause of digital freedom and robust privacy protection for everyday users. Obscura VPN official site

Tailscale

  • Tailscale - Peer-to-peer mesh VPN built atop WireGuard, enabling users to create encrypted, zero-trust overlay networks that span devices and locations without exposing traffic to third-party infrastructure. By leveraging modern identity providers for authentication while ensuring direct, end-to-end encrypted connections, it empowers individuals and organizations to reclaim control over their network privacy. Its seamless, decentralized architecture embodies cypherpunk principles by reducing reliance on centralized VPN servers and making robust, cryptographically secure networking accessible to non-experts, advancing the cause of digital autonomy and censorship resistance. Wikipedia

Digital Currency & Decentralized Systems

Money Without Middlemen. From theoretical concepts to working systems, these projects proved that value can be exchanged without institutions controlling the flow.

  • DigiCash - Invented truly private digital payments by implementing blind signatures, enabling users to withdraw and spend e-cash tokens that banks could verify but not trace, thus separating identity from transaction history. DigiCash's architecture provided a practical demonstration of anonymous, cryptographically secure electronic cash, directly influencing the design of later cryptocurrencies like Bitcoin and foundational privacy concepts in digital finance. Its legacy endures as a blueprint for privacy-preserving money and a milestone in the cypherpunk quest for digital freedom. Wikipedia

  • b-money - Pioneered the concept of decentralized digital currency by outlining a system for electronic cash using a public, distributed ledger, proof-of-work mining, and cryptographically enforced contracts in b-money. Introduced mechanisms for digital scarcity, anonymous transactions, and consensus without trusted intermediaries, directly inspiring the design of Bitcoin and subsequent cryptocurrencies. Cited by Satoshi Nakamoto as foundational, it advanced cypherpunk ideals of privacy, autonomy, and resistance to censorship by envisioning money as a protocol, not an institution. Wikipedia

  • bit gold - Established a decentralized digital currency concept by chaining proof-of-work puzzles with timestamped public registries, enabling trustless, verifiable ownership of digital assets without intermediaries. bit gold directly inspired the architecture of Bitcoin, introducing core ideas like distributed consensus, scarcity enforced by computation, and resistance to censorship. Its design anticipated blockchain's role in privacy-preserving, peer-to-peer value transfer, making it a foundational milestone in cypherpunk efforts to undermine centralized control over money and empower individual autonomy. Wikipedia

  • Hashcash - Introduced the concept of proof-of-work to combat email spam by requiring senders to compute a SHA-based hash collision, thereby imposing a computational cost on bulk messaging and deterring abuse. Its elegant challenge - response mechanism became foundational for decentralized trustless systems, directly inspiring the mining process and consensus protocol of Bitcoin and influencing later privacy-preserving cryptocurrencies. By demonstrating how cryptographic puzzles could enable resistance to censorship and Sybil attacks without central authorities, it advanced core cypherpunk ideals of autonomy, privacy, and digital freedom. Hashcash's legacy endures in modern anti-spam tools, blockchain security, and the architecture of decentralized digital cash. Wikipedia

Bitcoin

  • Bitcoin ⭐ - Released in 2009 by the pseudonymous Satoshi Nakamoto as "A Peer-to-Peer Electronic Cash System". Combined proof-of-work, blockchains, and public-key signatures into the first trust-less digital currency. Its fixed supply, open code, and decentralized consensus birthed the cryptocurrency era. Bitcoin.org

Ethereum

  • Ethereum - Pioneering a programmable, censorship-resistant blockchain, it introduced the first Turing-complete smart contract platform, enabling decentralized applications (dApps), trustless finance via DeFi, and autonomous governance through DAOs. By decentralizing computation and value transfer, it empowers users with self-sovereign identity, cryptographic privacy tools, and permissionless innovation, advancing cypherpunk ideals of digital freedom and resistance to centralized control. Its architecture inspired privacy-preserving protocols like zk-SNARKs and privacy-focused dApps, shaping the backbone of Web3. Wikipedia

Monero

  • Monero (XMR) - Privacy-centric cryptocurrency enabling untraceable, fungible transactions through advanced cryptography, including ring signatures, stealth addresses, and RingCT for confidential amounts. By default, every Monero transaction conceals sender, recipient, and value, making it highly resistant to blockchain analysis and ensuring true financial anonymity. Its open source development and commitment to privacy-by-design have made it a cornerstone for cypherpunks seeking digital cash that defends user sovereignty and resists surveillance. Wikipedia

Zcash

  • Zcash - Pioneering privacy-focused cryptocurrency leveraging advanced zk-SNARKs (zero-knowledge proofs) to enable shielded transactions that keep sender, recipient, and transaction amount confidential while maintaining public verifiability. Developed by cryptographers from MIT, Johns Hopkins, and the Electric Coin Company, it set a new standard for on-chain privacy and influenced research in privacy-preserving blockchain protocols. Its open source code and scientific rigor have advanced the field of applied cryptography, inspiring projects like Ethereum's privacy features, and demonstrating the real-world viability of zero-knowledge proofs for financial privacy. Wikipedia

Zano

  • Zano - Enables confidential, censorship-resistant digital commerce through a privacy-centric blockchain that integrates confidential assets, a hybrid PoW/PoS consensus, and scalable hidden amounts to obscure transaction details. Developed by one of the creators of the CryptoNote codebase, the protocol foundational to Monero, it advances cypherpunk ideals by empowering users to transact securely and anonymously without reliance on centralized intermediaries. Wikipedia

Lightning Network

  • Lightning Network - Enables scalable, censorship-resistant micropayments for Bitcoin using off-chain, bidirectional payment channels and hashed time-locked contracts (HTLCs), allowing users to transact instantly and privately without broadcasting every transaction to the public blockchain. By reducing on-chain congestion and fees, it advances the cypherpunk vision of decentralized, permissionless financial systems. The Lightning Network also enhances privacy by making payment flows less transparent than on-chain transactions, and its open source protocol has inspired further research into privacy-preserving payment technologies and decentralized finance. Wikipedia

Decentralized Storage & Web Infrastructure

Breaking the Cloud Monopoly. Distributed systems that don't rely on centralized servers or corporate infrastructure.

BitTorrent

  • BitTorrent - Peer-to-peer protocol that revolutionized digital freedom by enabling efficient, decentralized file distribution without reliance on central servers. By using a "swarming" model, where files are split into pieces exchanged among many users, it made large-scale sharing resilient to censorship and takedown, inspiring later distributed systems and influencing the architecture of censorship-resistant technologies. Its open protocol and widespread adoption highlighted the power of decentralized networks in resisting control and surveillance, embodying cypherpunk principles of autonomy and robust privacy infrastructure. Wikipedia

IPFS

  • IPFS (InterPlanetary File System) - Decentralized storage protocol enabling censorship-resistant file sharing, IPFS replaces traditional location-based URLs with content addressing, allowing users to retrieve files by their cryptographic hash from a global peer-to-peer network. Developed by Protocol Labs, it empowers digital freedom by making websites and data resilient to takedowns and surveillance, supporting projects like Filecoin and the distributed web. By removing central points of control, IPFS advances cypherpunk ideals of privacy, autonomy, and resistance to censorship, providing a foundation for decentralized applications and persistent digital archives. Wikipedia

Tahoe-LAFS

  • Tahoe-LAFS (Least Authority File Store) - Decentralized storage protocol enabling censorship-resistant, privacy-preserving file sharing by encrypting and erasure-coding data client-side before distributing it across independent nodes. Even if some servers are compromised, confidentiality and integrity are maintained, embodying cypherpunk principles of user sovereignty and trust minimization. Pioneered practical applications of erasure coding and capability-based security, influencing secure backup and distributed storage systems. Open source and community-driven, it advances digital autonomy and resilience against surveillance and data loss. Wikipedia

Privacy Infrastructure & Secure Systems

The Security Stack. The protocols and systems that make secure communication possible at Internet scale.

HTTPS Everywhere

  • TLS / HTTPS Everywhere - Secured the web by making Transport Layer Security (TLS) the foundation for encrypted browser-server communication, protecting users from eavesdropping and tampering. The EFF's HTTPS Everywhere browser extension championed default HTTPS adoption, pressuring sites worldwide to implement strong encryption and defend digital privacy. TLS and HTTPS Everywhere together transformed secure web browsing from a niche option into a global norm, embodying cypherpunk principles by democratizing access to robust cryptographic protections and resisting mass surveillance. Wikipedia

Let's Encrypt

  • Let's Encrypt - Provides free, automated SSL/TLS certificates through the ACME protocol, enabling default encryption for millions of websites and dramatically expanding access to HTTPS. By eliminating cost and technical barriers, it has made strong web privacy and security accessible to everyone, not just large organizations. Backed by the Internet Security Research Group, it embodies cypherpunk ideals by decentralizing trust and empowering individuals to secure their communications without gatekeepers, fueling a massive increase in global encrypted traffic and defending users against pervasive surveillance. Wikipedia

Secure Drop

  • SecureDrop - Anonymous whistleblowing system empowering investigative journalism by enabling secure, untraceable document submission via Tor hidden services. Developed by the Freedom of the Press Foundation, it combines end-to-end encryption, robust metadata stripping, and strict operational security to protect sources from surveillance and retaliation. Adopted by major newsrooms including The Guardian and The Intercept, it embodies cypherpunk ideals by leveraging cryptography and decentralization to defend press freedom and safeguard digital dissent. Wikipedia

DNS Crypt

  • DNSCrypt - Secures the typically unencrypted DNS lookup process by authenticating and encrypting queries between users and resolvers, thwarting interception, censorship, and surveillance by ISPs or adversaries. Utilizes modern cryptography, notably X25519 for key exchange, to ensure forward secrecy and integrity. By pioneering practical deployment of encrypted DNS before widespread adoption of DNS-over-HTTPS, it empowered individuals to reclaim privacy at a fundamental layer of internet communication, embodying cypherpunk principles of decentralization and resistance to surveillance. Wikipedia

  • OTR (Off-the-Record Messaging) - Cryptographic protocol pioneering both perfect forward secrecy and deniability in real-time chat, it ensures that messages are encrypted and authenticated during transmission but cannot be proven to originate from a specific user after the conversation ends. By introducing these properties to instant messaging, it set a new standard for secure communications, directly influencing the design of modern protocols like Signal and inspiring broader adoption of ephemeral, privacy-preserving messaging. Its open source reference implementation and protocol specification have empowered activists, journalists, and privacy advocates worldwide to communicate securely, embodying cypherpunk ideals of decentralization and user autonomy. Wikipedia


Free Knowledge, Legal Defense & Activism

The Movement Infrastructure. Organizations and projects that defend digital rights, spread knowledge, and fight for freedom.

EFF

  • Electronic Frontier Foundation (EFF) - Nonprofit vanguard for digital civil liberties, this organization has set legal precedents affirming the right to use and publish strong cryptography, most notably through Bernstein v. DOJ, which established encryption code as protected free speech. It has fought for privacy in landmark Supreme Court cases like Carpenter v. United States, and developed privacy-enhancing tools such as Privacy Badger and HTTPS Everywhere. By defending whistleblowers, supporting the right to encrypt, and advocating for decentralized, anonymous communication, it has profoundly shaped the legal and technical landscape for cypherpunks and digital rights worldwide. Wikipedia

Fight for the Future

  • Fight for the Future (FFTF) - Galvanizing millions through digital campaigns, this advocacy group orchestrated the historic Internet blackout protest against the Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA), helping to preserve free expression and privacy online. FFTF has championed net neutrality, fought mass surveillance, and mobilized support for encryption and user privacy, leveraging creative digital tools and mass mobilization to defend the open Internet. Their work embodies cypherpunk ideals by defending decentralized digital rights and empowering grassroots resistance to censorship and surveillance. Wikipedia

Creative Commons

  • Creative Commons - Enabled global access to open knowledge by creating free culture licenses that empower creators to share and remix works with "some rights reserved" rather than "all rights reserved." This legal and technical framework has fueled the spread of open educational resources, scientific collaboration, and digital art, directly supporting cypherpunk values of decentralization, information freedom, and resistance to restrictive copyright regimes. By lowering legal barriers to sharing, Creative Commons has enabled privacy-enhancing projects, open source cryptography, and the free exchange of ideas essential to the cypherpunk ethos, influencing platforms like Wikipedia and countless privacy-focused communities worldwide. Wikipedia

Internet Archive

  • Internet Archive - A pioneering force in digital preservation and open access, this nonprofit created the Wayback Machine to archive billions of web pages, ensuring the public record of the internet remains accessible even as sites vanish or are censored. By hosting vast collections of books, software, and media, it combats digital erasure and supports the cypherpunk vision of resisting centralized control and information monopolies. Its advocacy for universal access to all knowledge and defense against DMCA overreach have made it a bulwark for privacy, free culture, and the right to remember, directly empowering researchers, activists, and the global public to reclaim digital history. Wikipedia

Archive.today logo

  • Archive.today - Provides a censorship-resistant archiving service that preserves full, immutable snapshots of web pages, even those later altered, paywalled, or deleted, ensuring that digital history cannot be erased or rewritten by governments, corporations, or platform owners. By operating independently of major search engines and commercial archives, it empowers activists, journalists, and researchers to document evidence and bypass information suppression. Its role as a tool for transparency and accountability aligns with cypherpunk values of decentralization, digital autonomy, and resistance to centralized control over information. Wikipedia

Freedom of the Press Foundation

  • Freedom of the Press Foundation - Nonprofit champion of press freedom and digital privacy, this organization developed and maintains SecureDrop, a secure open source whistleblower submission system used by major newsrooms to protect sources and enable anonymous leaks. It advocates for strong encryption in journalism, provides digital security training for reporters, and campaigns against government surveillance, embodying cypherpunk principles by defending the right to communicate securely and exposing threats to press autonomy in the digital era. Wikipedia

CryptoParty logo

  • CryptoParties - Grassroots initiative demystifying cryptography and privacy tools by hosting free, hands-on workshops worldwide, empowering individuals to use encryption, Tor, PGP, and secure messaging to resist surveillance and censorship. Born in 2012 as a direct response to rising concerns about mass surveillance, it embodies cypherpunk principles by making digital self-defense accessible to activists, journalists, and everyday users. CryptoParties foster decentralized, community-driven education, bridging the gap between complex privacy technologies and public understanding, and have become a vital entry point for digital rights advocacy and practical privacy literacy. Wikipedia

Open Rights Group logo

  • Open Rights Group (ORG) - Digital rights advocacy group that has significantly shaped UK policy and public awareness around privacy, surveillance, and free expression online. Instrumental in challenging mass surveillance laws, such as the Investigatory Powers Act, and opposing government overreach in data retention and internet censorship. Regularly intervenes in court cases and policy debates, defending encryption and digital privacy, and empowering citizens to resist intrusive state and corporate practices. Their campaigns, reports, and legal actions have advanced cypherpunk ideals by promoting robust privacy protections and resisting centralized control over digital communications. Wikipedia

Privacy International

  • Privacy International - Pioneering watchdog that has exposed and challenged mass surveillance, Privacy International has driven global awareness of state and corporate intrusion through landmark investigations, legal actions, and policy advocacy. Instrumental in uncovering abuses by intelligence agencies and tech companies, it has influenced reforms in data protection and surveillance law, and contributed to the cypherpunk movement by defending the right to privacy and promoting transparency in government and corporate practices. Its work has shaped debates on encryption, digital rights, and the ethical use of technology, making it a cornerstone in the fight for privacy and freedom online. Wikipedia

Access Now

  • Access Now - Global digital rights advocate advancing cypherpunk ideals by defending privacy, free expression, and secure communications worldwide. Operates the Digital Security Helpline, offering real-time assistance to journalists, activists, and at-risk organizations facing digital threats. Hosts RightsCon, the leading summit uniting technologists, policymakers, and civil society to address issues like surveillance, encryption policy, and censorship. Influences global policy debates on encryption, net neutrality, and government surveillance, and champions strong privacy standards and open internet principles. Wikipedia

Tor Project

  • Tor Project, Inc. - Pioneers of anonymous communication, this nonprofit develops and maintains the Tor network, a free, open source tool based on onion routing that shields users from surveillance and censorship. By providing strong privacy for millions, including journalists, activists, and whistleblowers in repressive environments, it has become a cornerstone of digital freedom. The Tor Project also advances research in anonymity, supports hidden services, and inspires privacy-centric projects, embodying cypherpunk ideals of decentralization and resistance to control. Wikipedia

Proto-Cypherpunk & Cultural Roots

The Origin Story. Before the term "cypherpunk" existed, these projects and manifestos laid the cultural and technical foundations.

Unix command line

  • Unix Philosophy - Design ethos that advanced digital freedom by advocating for modularity, transparency, and user empowerment, the Unix philosophy shaped the architecture of privacy tools and secure operating systems foundational to the cypherpunk movement. Its principles - simplicity, composability, and the separation of concerns - enabled the creation of robust, auditable software like OpenBSD, GnuPG, and early Tor prototypes. By fostering open source collaboration and the hacker ethic, it laid the groundwork for decentralized, privacy-respecting systems that resist surveillance and censorship, inspiring generations of cryptographers and activists to build tools for anonymity, secure communication, and digital autonomy. Wikipedia

Heckert GNU white

  • Free Software Movement - A pioneering movement that established the ethical and legal foundation for software freedom, asserting that users must have the right to use, study, modify, and share code. By launching the GNU Project and codifying the four software freedoms through the Free Software Foundation, it introduced the GNU General Public License (GPL), a copyleft license that empowered developers to create privacy-respecting, auditable, and decentralized tools. Its principles directly inspired cypherpunks to build secure communication protocols, anonymous networks, and cryptographic software, fueling the broader digital rights and privacy technology movements. Wikipedia

Timothy May

  • The Crypto Anarchist Manifesto - Seminal manifesto that articulated the vision of using strong cryptography, anonymous digital cash, and encrypted communication to undermine state surveillance and empower individual privacy. Written by Timothy C. May in 1988, it predicted the rise of decentralized, sovereign online communities and inspired the Cypherpunks mailing list, laying the philosophical groundwork for later innovations like Bitcoin and Tor. Its radical vision continues to shape debates on digital freedom, privacy, and resistance to censorship. Wikipedia

Eric Hughes

  • A Cypherpunk's Manifesto - Galvanized the cypherpunk movement by declaring privacy a fundamental right and a prerequisite for an open society in the digital era, urging activists to create and deploy cryptographic tools rather than rely on policy alone. A Cypherpunk's Manifesto articulated the philosophy behind projects like PGP, Tor, and Bitcoin, inspiring generations to use public-key cryptography and anonymous communication as acts of resistance. Its call to "write code" established the ethos that technical innovation is the most effective defense against surveillance and censorship, making it a foundational text for digital privacy advocates and developers worldwide. Activism.net

John Perry Barlow, 2012

  • Declaration of the Independence of Cyberspace - Proclaimed a radical vision of cyberspace as a realm inherently free from government control, this manifesto asserted the Internet as a self-governing domain of minds, inspiring generations of digital rights activists and cypherpunks. Its bold language - "Governments of the Industrial World, you weary giants of flesh and steel..." - galvanized movements for online privacy, anonymity, and decentralization. The text directly influenced the philosophy of groups like the EFF and the Cypherpunks mailing list, shaping debates on encryption, censorship resistance, and digital self-determination. Its legacy endures in the ongoing struggle for a free and open Internet, echoing through projects like Tor and Signal. Wikipedia

Closing: Cypherpunks Fight For Freedom

Every day, millions of people rely on these systems to communicate securely, transact privately, and resist surveillance.

The next breakthrough is being built right now. Someone is writing the protocol that will obsolete everything on this list. Someone is deploying infrastructure that will protect the next generation.

while (surveillance.exists()) { cypherpunks.code(); }

Ship freedom.


Compromised & Fallen Projects

Lessons from the Fallen

Not every privacy project stays true to its mission. Some were compromised. Some mysteriously shut down. Some made choices that betrayed their users' trust. This section documents projects that failed, were compromised, or can no longer be trusted.

The graveyard of privacy tools teaches us as much as the Hall of Fame.

"Don't trust. Verify." - Every cypherpunk who learned the hard way


Died With Honor: Seppuku

These services chose death over betrayal by choosing to shut down rather than backdoor their users. They deserve respect.

Lavabit

  • Lavabit - Founded in 2004 by Ladar Levison, Lavabit provided encrypted email to nearly half a million users, including Edward Snowden. In 2013, Levison received a secret U.S. court order demanding access to SSL keys, effectively compromising all users. Rather than comply, he shut down Lavabit with the message: "I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away." His act became symbolic of resistance to compelled decryption and government overreach. Wikipedia

Truecrypt

  • TrueCrypt - The legendary open source full-disk encryption tool, released in 2004, suddenly posted a shutdown notice on May 28, 2014: "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues." The developers never surfaced again. Its site redirected to a SourceForge page advising users to switch to BitLocker which was an unusual move that fueled speculation of a National Security Letter or coercion. Independent audits later found no critical backdoors, and the project was reborn as VeraCrypt. Wikipedia

Groklaw

  • Groklaw - Founded by Pamela Jones in 2003, Groklaw became an essential hub for legal analysis of open source and tech law, chronicling the SCO vs. IBM lawsuits and software-freedom battles. In August 2013, following the Snowden revelations about NSA surveillance, Jones announced the site's closure, writing: "There is now no shield from forced exposure… I can't write without email. And there is no way to do Groklaw without email." It remains archived as one of the last digital sanctuaries to voluntarily close in protest of mass surveillance. Wikipedia

Compromised: Backdoored or Infiltrated

These services were compromised, backdoored, blacklisted or taken over by law enforcement. They cannot be trusted.

No

  • Hushmail - Founded in 1999 in Canada, Hushmail marketed itself as an encrypted email provider offering end-to-end privacy. In 2007, court documents revealed that the company had provided decrypted user emails to U.S. and Canadian authorities by secretly altering its client-side encryption system under court order. Its encryption keys could be, and were, used to read supposedly private messages. A cautionary tale of closed-source "secure" systems. Wikipedia

No

  • Crypto AG - A Swiss encryption hardware manufacturer secretly owned by the CIA and BND from the 1970s through 2018 under Operation Rubicon (originally Operation Thesaurus). Its cryptographic machines, which were sold to 120+ countries, were deliberately backdoored, allowing Western intelligence to intercept global diplomatic and military communications for decades. Described by historians as "the intelligence coup of the century." Wikipedia

No

  • EncroChat - A French-based encrypted phone provider used by thousands of criminal networks worldwide. In 2020, French and Dutch investigators deployed malware implants onto EncroChat devices, capturing millions of supposedly encrypted messages in real time. The system was fully compromised, leading to over 6,500 arrests across Europe. The case set legal precedents for law enforcement hacking at scale. Wikipedia

No

  • Sky Global / Sky ECC - Marketed as an unbreakable encrypted phone platform, Sky ECC was dismantled in 2021 when Belgian and French police infiltrated its servers and captured 500 million messages. Sky Global executives were indicted in the U.S. for facilitating organized crime. The case revealed that its architecture allowed centralized message storage, enabling total compromise once servers were seized. Wikipedia

No

  • ANOM / AN0M - A global honeypot encrypted-phone network secretly built and operated by the FBI and Australian Federal Police under Operation Trojan Shield. Launched in 2019 after the takedown of Phantom Secure, ANOM devices were distributed through criminal channels; users believed they were secure, but every message was silently copied to law enforcement servers. The operation resulted in 800+ arrests worldwide in 2021. Wikipedia

No

  • Phantom Secure - A Canadian company (founded 2008) offering encrypted BlackBerry devices to "executive" clients, many of whom were high-level criminal organizations. In 2018, CEO Vincent Ramos was arrested and later pled guilty to RICO charges for knowingly providing secure devices for illicit use. Phantom Secure's takedown triggered law enforcement efforts that eventually spawned ANOM. Wikipedia

No

  • Samourai Wallet - A privacy-focused Bitcoin wallet known for features like CoinJoin and Whirlpool mixing. In April 2024, U.S. authorities arrested founders Keonne Rodriguez and William Hill, charging them with money laundering and unlicensed transmission. The FBI seized infrastructure and source servers, effectively ending the project. A blow to financial privacy advocates. Wikipedia

No

  • Tornado Cash - A non-custodial Ethereum mixer enabling anonymous transactions through zero-knowledge proofs (zk-SNARKs). In August 2022, the U.S. Treasury's OFAC sanctioned the protocol, the first time software code itself was blacklisted. Dutch authorities arrested developer Alexey Pertsev under money-laundering allegations. Tornado Cash remains a legal and philosophical test of whether open source privacy tools can exist under regulation. Wikipedia

Compromised by Design or Betrayed User Trust

These services made architectural choices or policy decisions that fundamentally compromise user privacy.

No

  • Proton Mail / Proton VPN - Swiss-based encrypted email and VPN provider operated by Proton AG. Despite its reputation for privacy, Proton admitted in 2021 that it had logged user IP addresses under a Swiss court order tied to Europol and French police. While Proton states it doesn't log by default, it retains the technical capability to comply. Its VPN and abuse-monitoring systems can correlate traffic between entry IPs and activity, as acknowledged by its team. Critics highlight ties to the World Economic Forum and question the company's growing institutional alignment. Wikipedia

No

  • Tutanota / Tuta - German encrypted email service claiming end-to-end encryption for messages and calendar data. Under German telecommunication law (§110 TKG), providers can be compelled to enable lawful interception and IP address logging. In 2020, a regional court order forced Tutanota to monitor inbox activity for specific users. The company complied under protest, acknowledging that targeted monitoring was technically possible. While Tuta maintains transparency via its transparency report, it illustrates how jurisdiction trumps encryption promises. Wikipedia

No

  • Telegram - Founded by Pavel Durov, Telegram markets itself as a privacy-focused messaging app but is not end-to-end encrypted by default. Group chats and cloud messages are stored on centralized servers under Telegram's control, and only "Secret Chats" use end-to-end encryption. Telegram employs proprietary cryptography (MTProto), which has been criticized by cryptographers for lacking formal security proofs and peer review. Its opaque infrastructure and data access in certain jurisdictions make it unsuitable for high-security communication. Wikipedia

No

  • Dual_EC_DRBG - A pseudorandom number generator standardized by NIST in 2006 as part of SP 800-90A. Developed by the NSA, it was later proven to contain a mathematical backdoor enabling anyone with specific internal parameters to predict outputs and decrypt traffic. In 2013, the Snowden leaks revealed that RSA Security allegedly accepted $10 million from the NSA to make Dual_EC_DRBG the default in its BSafe library. Withdrawn by NIST in 2014, it remains a textbook example of state sabotage in cryptography. Wikipedia

No

  • Juniper Networks Backdoor - In December 2015, Juniper disclosed the discovery of unauthorized code in its ScreenOS firewall software that allowed VPN decryption and administrative access. Forensic analysis by researchers like Matthew Green revealed that the code modified Juniper's random number generator, replacing NSA's Dual_EC_DRBG constants with a different unknown key, implying a second actor had hijacked an NSA backdoor. The breach demonstrated that once backdoors exist, anyone can exploit them, including rival states or hackers. Wikipedia

Acquired: Changed Hands, Lost Trust

Privacy tools that were acquired by companies with different incentives.

No

  • Wickr - Founded in 2012 as a secure messaging app offering end-to-end encryption and ephemeral communication, Wickr was once popular among journalists, military personnel, and privacy advocates. In 2021, it was acquired by Amazon Web Services (AWS), a company deeply integrated into government surveillance infrastructure, including CIA cloud contracts. Since the acquisition, Wickr has been integrated into AWS enterprise tools and discontinued its free personal service in 2023. The once-independent privacy platform is now part of corporate surveillance architecture. Wikipedia

No

  • Skype - Originally a peer-to-peer encrypted VoIP service, launched in 2003 by Niklas Zennström and Janus Friis, using technology from Kazaa. In 2011, Microsoft acquired Skype for $8.5 billion and centralized its architecture, removing P2P encryption in favor of server-based routing. Subsequent leaks revealed that Skype was part of the NSA's PRISM program, with access to decrypted calls and chats. Encryption backdoors and warrant compliance turned a once-decentralized service into a surveillance node. Wikipedia

No

  • Private Internet Access (PIA) - Once the most trusted VPN provider with strong privacy principles, PIA merged with Kape Technologies, formerly Crossrider, a company infamous for developing adware and browser hijackers. Although framed as a merger with a coming name change, Kape, a publicly traded company, further acquired more VPN companies before delisting and going private. Owning multiple VPN brands (CyberGhost, ExpressVPN) and VPN review sites create clear conflicts of interest. Security analysts have raised red flags about consolidation of privacy services under former ad-tech entities. Wikipedia

No

  • ExpressVPN - Acquired by Kape Technologies in 2021 for $936 million, ExpressVPN's reputation took further damage when its CIO, Daniel Gericke, was revealed to have been part of Project Raven, a UAE surveillance operation targeting journalists and activists. While ExpressVPN maintains it operates independently, its inclusion in the same portfolio as other Kape-owned VPNs and its leadership's history in state-level hacking undermine user confidence. Wikipedia

No

  • NordVPN / Surfshark - In 2022, Nord Security (parent of NordVPN, founded in Lithuania by Tesonet) merged with Surfshark. Tesonet's past involvement in data mining and proxy traffic monetization sparked concern about NordVPN's independence. Both VPNs now operate under a single corporate umbrella, Nord Security Group, consolidating user data pipelines while marketing "audited no log" claims. Analysts warn this growing VPN oligopoly undermines decentralization in the privacy industry. Wikipedia

No

  • StartPage - Founded in 1998 as a Dutch privacy search engine, StartPage was long considered an alternative to Google. In 2019, it sold a major ownership stake to System1, an American ad-tech firm specializing in data analytics and targeted advertising. Despite assurances that privacy policies remain unchanged, System1's business model fundamentally conflicts with StartPage's original mission. Wikipedia

Closing: What We Learn From The Fallen

Every compromised project teaches us something:

  • Centralization is a vulnerability. Single points of failure get compromised.
  • Trust but verify. Open source isn't enough. We need secure attestation, reproducible builds, and public verification.
  • Follow the money. Who owns the project? Who funds it? If it is a business, what do they do with their profits? Incentives matter.
  • Architecture determines privacy. You can't patch bad design with good intentions.
  • Metadata is surveillance. Encrypting content isn't enough if you log who talks to whom.
  • Acquisitions kill trust. When a privacy tool gets acquired, assume it's compromised until proven otherwise.
  • Governments will use any tool available. They will compel, seize, or infiltrate.

The only trusted system is one you can audit yourself, running on hardware you control or can remote attest and verify, using open protocols that can't be backdoored.

Build systems that can't betray their users, even if the developers want to.


Footer

Built with significant effort, in respect for those who put significantly more effort into the tools we use to stay free.

Privacy is freedom.

In crypto we trust.

About

Cypherpunks Hall of Fame

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published