Cipherspace
Encyclopedia
Cipherspace or cypherspace is the encrypted (and often pseudonymous
or fully anonymous
) equivalent to cyberspace
. Examples of cipherspaces include Freenet
, I2P
, Tor
, and some anonymous mail-forwarding services
.
According to its advocates, it should be impossible to know the actual identity of anyone in cipherspace. Therefore, it would be impossible to impose any censorship and to enforce any law. Because of that, they assert that concepts like copyright
would be unenforceable inside cipherspace. Some doubt the possibility of complete anonymity
, citing that real networks, even virtual private networks, need access to external resources, which tend to be trackable.
Pseudonymity
Pseudonymity is a word derived from pseudonym, meaning 'false name', and anonymity, meaning unknown or undeclared source, describing a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names...
or fully anonymous
Anonymity
Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...
) equivalent to cyberspace
Cyberspace
Cyberspace is the electronic medium of computer networks, in which online communication takes place.The term "cyberspace" was first used by the cyberpunk science fiction author William Gibson, though the concept was described somewhat earlier, for example in the Vernor Vinge short story "True...
. Examples of cipherspaces include Freenet
Freenet
Freenet is a decentralized, censorship-resistant distributed data store originally designed by Ian Clarke. According to Clarke, Freenet aims to provide freedom of speech through a peer-to-peer network with strong protection of anonymity; as part of supporting its users' freedom, Freenet is free and...
, I2P
I2P
I2P is a mixed-license, free and open source project building an anonymous network .The network is a simple layer that applications can use to anonymously and securely send...
, Tor
Tor (anonymity network)
Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis...
, and some anonymous mail-forwarding services
Anonymous remailer
An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from...
.
According to its advocates, it should be impossible to know the actual identity of anyone in cipherspace. Therefore, it would be impossible to impose any censorship and to enforce any law. Because of that, they assert that concepts like copyright
Copyright
Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time...
would be unenforceable inside cipherspace. Some doubt the possibility of complete anonymity
Anonymity
Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...
, citing that real networks, even virtual private networks, need access to external resources, which tend to be trackable.
See also
- Anonymous internet bankingAnonymous internet bankingAnonymous Internet banking is the proposed use of strong financial cryptography to make electronic bank secrecy possible. The bank issues currency in the form of electronic tokens that can be converted on presentation to the bank to some other currency...
- Crypto-anarchismCrypto-anarchismCrypto-anarchism expounds the use of strong public-key cryptography to bring about privacy and freedom. It was described by Vernor Vinge as a cyberspatial realization of anarchism. Crypto-anarchists aim to create cryptographic software that can be used to evade prosecution and harassment while...
- CryptographyCryptographyCryptography is the practice and study of techniques for secure communication in the presence of third parties...
- CypherpunkCypherpunkA cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change.Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography...
- Meatspace
- Virtual private networkVirtual private networkA virtual private network is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network....