{"id":31998,"date":"2020-11-19T06:00:17","date_gmt":"2020-11-19T04:00:17","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=31998"},"modified":"2025-08-28T06:32:19","modified_gmt":"2025-08-28T03:32:19","slug":"from-hackers-and-cypherpunks-to-online-freedom-advocates-five-software-manifests-of-the-internet","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/from-hackers-and-cypherpunks-to-online-freedom-advocates-five-software-manifests-of-the-internet\/","title":{"rendered":"From hackers and cypherpunks to online freedom advocates \u2014 five software manifests of the Internet"},"content":{"rendered":"<p>According to a recent report by the rights advocacy organisation Freedom House, the coronavirus pandemic has negatively affected global freedom on the Internet. For ten years running, users have faced a broad erosion of their rights, and this trend is contributing to a crisis of democracy worldwide.<!--more--><\/p>\n<p>Experts have identified three trends indicating a decline in freedom on the Internet:<\/p>\n<ul>\n<li>Governments are using the pandemic as a pretext to restrict access to information.<\/li>\n<li>Under the same pretext, surveillance powers are expanding and new technologies are deployed to digitise, collect and analyse individuals&#8217; personal data, without adequate safeguards against abuse.<\/li>\n<li>The race of \u201ccyber sovereignties\u201d \u2014 countries are imposing their own Internet rules to restrict information flows across national borders.<\/li>\n<\/ul>\n<blockquote class=\"wp-embedded-content\" data-secret=\"G39lg5F0YP\">\n<p><a href=\"https:\/\/forklog.com\/en\/news\/how-the-pandemic-is-killing-internet-freedom-a-freedom-house-report\">How the pandemic is killing freedom on the Internet: a Freedom House report<\/a><\/p>\n<\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"How the pandemic is killing freedom on the Internet: a Freedom House report \u2014 ForkLog\" src=\"https:\/\/forklog.com\/exclusive\/kak-pandemiya-ubivaet-svobodu-v-internete-otchet-freedom-house\/embed#?secret=RyngQFlSVd#?secret=G39lg5F0YP\" data-secret=\"G39lg5F0YP\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>As is well known, every action invites countermeasures. This is especially true for the Internet, for many users whose principles of open access to information and free expression are foundational to the development of civil society and to economic prosperity.<\/p>\n<p>The history of the World Wide Web is also the history of the struggle for fundamental human rights, whose realization has grown immeasurably as technology has advanced.<\/p>\n<p>We have collected five of the most well-known software manifestos published online that remain timely, including for cryptocurrency supporters.<\/p>\n<h2>The Hacker Manifesto<\/h2>\n<p>The first significant attempt to explain the philosophy of hackers was written in January 1986 and later published in the electronic journal Phrack as an essay titled <a href=\"http:\/\/phrack.org\/issues\/7\/3.html#article\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u00abThe Conscience of a Hacker\u00bb<\/a>. It was written by the Texas-based hacker who went by the alias The Mentor (The Mentor) <strong>Lloyd Blankenship<\/strong>.<\/p>\n<p>At the time of writing the document, which is also often called the \u201cHacker Manifesto,\u201d Blankenship was only 20, and shortly before that he had been arrested by the FBI. The reasons for the arrest remain unclear; Blankenship claimed that \u201cI didn\u2019t do anything wrong \u2014 I just accessed a computer I wasn\u2019t supposed to access.\u201d The most probable explanation is his involvement with the iconic hacker group <a href=\"https:\/\/en.wikipedia.org\/wiki\/Legion_of_Doom_(hacking)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Legion of Doom<\/a>, which is regarded as one of the most influential organisations of its kind in the history of technology and was most active from 1984 to 1991.<\/p>\n<p>Addressing the collective image of the world of adults, including teachers who think in conventional templates, Blankenship writes:<\/p>\n<blockquote>\n<p>\u00abYou, with your three-element psychology and 50s-era tech brain, have you ever looked a hacker in the eye? Have you ever wondered what drives him, what forces shaped him?\u00bb<\/p>\n<p>\u00abToday I made a discovery. I opened the computer. Wait a moment\u2026 this is wonderful! It does what I want. If it makes a mistake \u2014 it\u2019s because I messed up. Not because I don\u2019t like it\u2026 Or because it fears me\u2026 Or thinks I\u2019m too smart\u2026 Or doesn\u2019t like to learn and shouldn\u2019t be here\u2026\u00bb<\/p>\n<p>\u00abAre you ready to swear by your butt that we are all the same? In school we were all fed baby food with spoons, while we longed for a steak\u2026 Those pieces of meat we got were chewed and tasteless\u00bb.<\/p>\n<p>\u00abNow this is our world\u2026 The world of electrons and switches, the world of the beauty of bots. We use existing systems, not paying for what could have been cheaper with dirt if not governed by dirty speculators, and you call us criminals. We explore, and you call us criminals. We seek knowledge\u2026 and you call us criminals. We exist without skin colour, without nationality, without religious rifts\u2026 and you call us criminals. You build atomic bombs, you wage wars, you kill, cheat and lie to us, trying to make us believe that all this is for our own good\u00bb.<\/p>\n<p>\u00abYes, I am a criminal. My crime is curiosity. My crime is judging people not by how they look, but by what they say and think. My crime is that I am far smarter than you. This is something you will never forgive me for.\u00bb<\/p>\n<p>\u00abI am a hacker. And this is my manifesto. You can stop one of us, but you cannot stop us all\u2026 after all, we are all the same\u00bb<\/p>\n<\/blockquote>\n<p>Blankenship\u2019s work is widely regarded as the starting point of the online activism movement\u2019s clash with the real world, which later evolved into a broader struggle against governments. It was noted by the makers of the film <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A5%D0%B0%D0%BA%D0%B5%D1%80%D1%8B_(%D1%84%D0%B8%D0%BB%D1%8C%D0%BC)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u201cHackers\u201d<\/a>, featuring Angelina Jolie, who included a revised excerpt of the \u201cHacker Manifesto.\u201d<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/0tEnnvZbYek\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\n<em>Lloyd Blankenship on the history of writing the Hacker Manifesto. H2K2 conference in 2002.<\/em><\/p>\n<p>Blankenship later worked at the Austin-based company <a href=\"https:\/\/en.wikipedia.org\/wiki\/Steve_Jackson_Games\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Steve Jackson Games<\/a>, which develops tabletop role-playing and card games. He was the author of <a href=\"https:\/\/en.wikipedia.org\/wiki\/GURPS_Cyberpunk#Publication_history\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">GURPS Cyberpunk<\/a>, a rule-set for cyberpunk worlds that the U.S. Secret Service seized from the company\u2019s offices in 1990 after a raid, calling it \u201ca manual for cybercriminals.\u201d<\/p>\n<p>In 2014, after working as a programmer, technical writer and game designer at various firms, Blankenship became a private information-security consultant, and since 2016, according to his profile on <a href=\"https:\/\/www.linkedin.com\/in\/loyd-blankenship-73b6929\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">LinkedIn<\/a>, has worked at McAfee, where he heads the design department for user interfaces of applications and corporate products.<\/p>\n<h2>The Crypto-Anarchist Manifesto<\/h2>\n<p>In the 1970s, as the first working prototypes of the Internet emerged, the question of protecting data in an open environment became pressing.<\/p>\n<p>In 1978 the American cryptographer David Chaum developed the method of blind digital signatures \u2014 an open-key encryption model. It made it possible to create a base of people who could maintain anonymity while guaranteeing the authenticity of information about themselves.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"AYGfDZgmrl\">\n<p>Genesis archives: David Chaum\u2019s eCash and the birth of the dream of cypherpunks<\/p>\n<\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"Genesis Archives: David Chaum's eCash and the birth of the cypherpunk dream \u2014 ForkLog\" src=\"https:\/\/forklog.com\/exclusive\/genezis-arhivy-ecash-devida-chauma-i-rozhdenie-mechty-shifropankov\/embed#?secret=rQf8P6R0VP#?secret=AYGfDZgmrl\" data-secret=\"AYGfDZgmrl\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Chaum also dreamed of verifiable digital voting, a process that could be verified without revealing the voter\u2019s identity, but primarily about digital cash.<\/p>\n<p>In the mid-1980s he succeeded in creating a model in which users paid while preserving anonymity and guaranteeing the existence of funds. From these developments the movement of cryptographers advocating computer technologies as a means to dismantle state power emerged.<\/p>\n<p>The movement\u2019s principal ideologue was former Intel senior research fellow <strong>Timothy May<\/strong>.<\/p>\n<div id=\"attachment_117038\" style=\"width: 1078px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-117038\" class=\"size-full wp-image-117038\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/timothy-may-1068x1068-1.jpg\" alt=\"Timothy May\" width=\"1068\" height=\"1068\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/timothy-may-1068x1068-1.jpg 1068w, https:\/\/forklog.com\/wp-content\/uploads\/timothy-may-1068x1068-1-300x300.jpg 300w\" sizes=\"auto, (max-width: 1068px) 100vw, 1068px\" \/><\/p>\n<p id=\"caption-attachment-117038\" class=\"wp-caption-text\">Timothy May<\/p>\n<\/div>\n<p>Inspired by Chaum\u2019s 1985 article \u201cSecurity Without Identification: A Transaction System That Would Make Big Brother Obsolete,\u201d which described a cryptographic method that hides the buyer\u2019s identity, May began studying cryptographic protection with public-key cryptography. He was firmly convinced that, when combined with networked computing, this technology could \u201cdestroy the structures of social power.\u201d<\/p>\n<p>In 1988 May published <a href=\"https:\/\/activism.net\/cypherpunk\/crypto-anarchy.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u00abThe Crypto-Anarchy Manifesto\u00bb<\/a>, an essay written by him inspired by Karl Marx\u2019s Communist Manifesto.<\/p>\n<blockquote>\n<p>\u201cA ghost walks through the modern world, the ghost of crypto-anarchy.\u201d<\/p>\n<\/blockquote>\n<p>It asserts that information technologies will allow people to govern their lives without governments, and through cryptography, digital currencies and other decentralised tools, anonymity will be catalysed to drive profound social change. <\/p>\n<blockquote>\n<p>\u201cComputing technologies have come close to enabling individuals or groups to communicate and interact completely anonymously\u2026 This will fundamentally alter the nature of government regulation, the ability to collect taxes and control economic interaction, the ability to keep information secret, and even alter the nature of trust and reputation,\u201d \u2014 Timothy May wrote.<\/p>\n<\/blockquote>\n<p>The manifesto argued that anarcho-capitalism\u2014an offshoot of anarchism that emphasises voluntary transactions and free markets\u2014underpinned the movement.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"nNpavKueDl\">\n<p>What is crypto-anarchy?<\/p>\n<\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"What is crypto-anarchy? \u2014 ForkLog\" src=\"https:\/\/forklog.com\/cryptorium\/chto-takoe-kriptoanarhizm\/embed#?secret=FHlTkc3u9P#?secret=nNpavKueDl\" data-secret=\"nNpavKueDl\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>His essay partly inspired the creation of Bitcoin\u2019s earliest prototypes, and many cryptocurrency proponents regard Timothy May as one of those who laid substantial groundwork for its ideological foundation.<\/p>\n<p>However, in 2018, on the tenth anniversary of the Bitcoin white paper, May stated that, observing events, he felt \u201csome interest, a certain astonishment and strong disappointment,\u201d and that \u201cSatoshi would be nauseated\u201d if he saw the hype and the calls for \u201cto the moon\u201d and \u201cHODL,\u201d as well as the tightening regulation.<\/p>\n<blockquote>\n<p>\u00abI cannot know what kind of future Satoshi wanted for his creation, but I do not think his vision included cryptocurrency exchanges with their draconian know-your-customer and anti-money-laundering laws, freezing of accounts and mandatory cooperation with intelligence agencies on matters of \u201csuspicious activity.\u201d There is a high likelihood that all this talk about governance, regulation and blockchain will yield a society of total surveillance and control, where every person will have a personal file\u00bb, May said.<\/p>\n<\/blockquote>\n<p>In his view, attempts to \u201cbefriend\u201d regulators would likely kill key cryptocurrency use cases that should not resemble PayPal or Visa.<\/p>\n<p>Timothy May coined the term <a href=\"https:\/\/en.wikipedia.org\/wiki\/Four_Horsemen_of_the_Infocalypse\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u201cFour Horsemen of the Infocalypse\u201d<\/a>, denoting drug trafficking, money laundering, terrorism and pedophilia, used by governments to intimidate and justify restrictions on cryptography and, consequently, on privacy and anonymity.<\/p>\n<p>In December 2018, at the age of 66, Timothy May died of natural causes at his home in California.<\/p>\n<h2>The Cypherpunk Manifesto<\/h2>\n<p>Timothy May was also a founder of the cypherpunk movement, established in 1992 with <a href=\"https:\/\/en.wikipedia.org\/wiki\/John_Gilmore_(activist)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">John Gilmore<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Eric_Hughes_(cypherpunk)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Eric Hughes<\/a>, and championing privacy for individuals and openness of technology. The movement is said to have emerged at one of the informal gatherings organized by May, Hughes and Gilmore.<\/p>\n<p>Such gatherings became regular; to enlist others who shared the movement\u2019s values, an electronic mailing list called \u201cCypherpunk\u201d was created. It rapidly drew hundreds of subscribers who tested ciphers, exchanged ideas and discussed new developments. Communication was conducted using cutting-edge encryption methods of the time, such as PGP.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"eyJNryKOmn\">\n<p>Bitcoin and Privacy \u2014 How Cypherpunks Realize the Dream of a Free Internet of the Future<\/p>\n<\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"Bitcoin and privacy \u2014 how cypherpunks realize the dream of a free Internet of the future \u2014 ForkLog\" src=\"https:\/\/forklog.com\/exclusive\/bitkoin-i-privatnost-kak-shifropanki-realizuyut-mechtu-o-svobodnom-internete-budushhego\/embed#?secret=YMgrgQzpDZ#?secret=eyJNryKOmn\" data-secret=\"eyJNryKOmn\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Participants in the cypherpunk mailing list debated political and philosophical questions, which, combined with the study of computer science, cryptography and mathematics, gave rise to <a href=\"https:\/\/www.activism.net\/cypherpunk\/manifesto.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Cypherpunk Manifesto<\/a>. The document, outlining the movement\u2019s core ideological positions, was published in 1993 by the aforementioned <strong>Eric Hughes<\/strong>.<\/p>\n<blockquote>\n<p>\u00abCypherpunks write code. We know that someone must continue writing code to protect information, and since we do not see another way to defend our data, we keep writing code. [\u2026] Our code is available to anyone on Earth. We do not much care if some people dislike what we do. We know that our programs cannot be destroyed, and an ever-growing network cannot be stopped\u00bb.<\/p>\n<p>\u00abPrivacy is essential to an open society of the digital age. [\u2026] Privacy in an open society requires the use of cryptography. [\u2026] We, cypherpunks, are bound to create anonymous systems. We defend our privacy with cryptography, anonymous remailers, digital signatures and electronic money. [\u2026] Cryptography will inevitably spread across the world, and with it the systems of anonymous transactions that it enables\u00bb.<\/p>\n<\/blockquote>\n<p>The manifesto stressed that privacy and secrecy are not the same.<\/p>\n<blockquote>\n<p>\u00abPrivate matters are those that, in a person\u2019s view, the world should not know about; but secrecy is something that nobody should know about at all. Privacy is the ability to decide what information about yourself to reveal to the world\u00bb.<\/p>\n<\/blockquote>\n<div id=\"attachment_117039\" style=\"width: 540px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-117039\" class=\"size-full wp-image-117039\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/eric-hughes.jpeg\" alt=\"Timothy May\" width=\"530\" height=\"383\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/eric-hughes.jpeg 530w, https:\/\/forklog.com\/wp-content\/uploads\/eric-hughes-300x217.jpeg 300w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/p>\n<p id=\"caption-attachment-117039\" class=\"wp-caption-text\">Eric Hughes<\/p>\n<\/div>\n<p>And the cypherpunks\u2019 ideas later found partial realisation in cryptocurrencies. Among the mailing list\u2019s members were the creators of the Proof-of-Work algorithm Adam Back, the authors of b-money Wei Dai and Bit Gold Nick Szabo; the movement also influenced Bitcoin\u2019s creator, Zooko Wilcox-O\u2019Hearn (Zcash).<\/p>\n<p>And it was on the cypherpunk mailing list that in October 2008 someone using the pseudonym Satoshi Nakamoto <a href=\"https:\/\/forklog.com\/en\/news\/twelve-years-since-the-publication-of-satoshi-nakamotos-bitcoin-white-paper\">published<\/a> the famous white paper \u201cBitcoin: A Peer-to-Peer Electronic Cash System.\u201d<\/p>\n<h2>Declaration of the Independence of Cyberspace<\/h2>\n<p>In February 1996, the founder of the Electronic Frontier Foundation (EFF) <strong>John Perry Barlow<\/strong> published the iconic document titled <a href=\"https:\/\/www.eff.org\/cyberspace-independence\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u201cA Declaration of the Independence of Cyberspace\u201d<\/a>, which remains a classic of Internet libertarianism.<\/p>\n<p>The document consisted of hard and uncompromising statements directed at world governments, and it was a response to the telecoms \u201cConcert of Decency\u201d act signed by then-US President Bill Clinton, under which authorities sought to introduce censorship on the Internet.<\/p>\n<p>Barlow argued that if states remain capable of restricting the spread of \u201cseditious\u201d ideas in traditional media, they are powerless on the Internet, which is by its nature immune to sovereign power.<\/p>\n<blockquote>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/111576518?title=0&#038;byline=0&#038;portrait=0\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>&#8220;Governments of the Industrial World, you have grown fat and old; my home is cyberspace, the new home of the Mind. From your future I address you, those of you who are still living in the past \u2014 leave us alone. You are obsolete among us. You do not possess sovereignty here where we gather.&#8221;<\/p>\n<p>&#8220;We did not choose governments, and we are unlikely to ever have one, so I address you with no greater power than that with which freedom itself speaks. I declare that the global social space we are building is inherently not subject to the tyrannies you seek to impose on us. You have neither the moral right to rule over us, nor the means to coerce us that could really scare us.&#8221;<\/p>\n<p>&#8220;True power for governments comes from the consent of those they govern\u2026 You claim that there are problems we must solve. Many of these problems do not exist. Where real conflicts and deficiencies exist, we will identify and fix them by our own means. We establish our own Social Contract. This form of governance will arise according to the terms of our world, not yours. Our world is different.&#8221;<\/p>\n<p>&#8220;You fear your own children because they feel at home in a world where you will always be immigrants. Because you fear them, you cowardly pass your parental duties to the bureaucratic machine. \u2026 Your increasingly outdated information industry would like to perpetuate its dominance by pushing laws\u2014both in America and elsewhere\u2014that claim ownership over speech across the world.&#8221;<\/p>\n<p>&#8220;These increasingly hostile colonial measures place us in the position once occupied by advocates of freedom and self-determination, who were forced to repudiate the authority of distant uniform power. We must proclaim the freedom of our virtual \u2018selves\u2019 from your dominion, even if we agree that you continue to wield power over our bodies. We will spread our \u2018selves\u2019 across the world so that no one can arrest our thoughts.&#8221;<\/p>\n<p>&#8220;We will mould a civilization of the Mind in cyberspace. May it be more humane and honest than the world your governments have created.&#8221;<\/p>\n<\/blockquote>\n<p>Although the act signed by Bill Clinton was later found unconstitutional by a federal court in the same year, the struggle between advocates and critics of online freedom continues, and Barlow\u2019s Declaration remains highly relevant.<\/p>\n<p>Governments still practice blocking resources, seizing servers, and even making arrests, but cyberspace resists. New means of encryption, anonymity tools and circumvention techniques are emerging.<\/p>\n<blockquote>\n<p>\u00abI can speak to Edward Snowden completely freely at any time I want, despite the fact that the guys at the NSA would like to know when and what we talk about\u00bb, said John Perry Barlow in 2016 in an interview with <a href=\"https:\/\/www.wired.com\/2016\/02\/its-been-20-years-since-this-man-declared-cyberspace-independence\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Wired<\/a>, calling it another proof that governments in the physical world do not hold real power over the Internet.<\/p>\n<\/blockquote>\n<p>On 7 February 2018 John Perry Barlow, who also wrote lyrics for the legendary rock band the Grateful Dead, died at the age of 70 in his home in San Francisco. As Wired\u2019s Steven Levy noted in his obituary, Barlow was the Internet\u2019s bard.<\/p>\n<h2>Guerrilla Open Access Manifesto<\/h2>\n<p>Time, like water, flows and changes. The history of the fight for fundamental rights on the Internet was confirmed when, in 2008, the world saw Aaron Schwarz\u2019s <em>Guerrilla Open Access Manifesto<\/em>.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/IwJzgzVzYy8\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>According to Schwarz:<\/p>\n<blockquote>\n<p>\u00abInformation is power. But, as power tends to do, there are those who want to possess it single-handedly. All of the world\u2019s scientific and cultural heritage, published for centuries in diverse books and journals, is being rapidly digitised and closed off from sight by a handful of private corporations\u00bb.<\/p>\n<p>\u00abI agree, \u2014 many say, \u2014 but what can we do? Corporations own copyright and make huge money. And that is completely legal. We cannot stop them\u00bb.<\/p>\n<p>\u00abBut all these moves occur in a dark underground. This is theft or piracy. [\u2026] But sharing information is not immoral. It is a moral imperative. Only those blinded by greed disagree with this\u00bb.<\/p>\n<p>\u00abBig corporations are undoubtedly blinded by greed. The laws under which they operate require this. Their shareholders will revolt if profits are not there. And politicians bought by corporations will cover for them by drafting the laws they need\u00bb.<\/p>\n<p>\u00abWe need to take information wherever it is stored, make our own copies, and share them with the world. We need to take materials that are not subject to copyright and add them to the archive. We need to buy secret databases and put them into free access. We need to download scientific journals and publish them on file-sharing networks. We must fight for \u2018Guerrilla Open Access\u2019\u00bb.<\/p>\n<p>\u00abWith enough of us around the world, we will not only send a compelling message opposing the privatization of knowledge, we will leave this system in the past.\u00bb<\/p>\n<\/blockquote>\n<p>Born in 1986 in Chicago, Schwarz led a short but bright life, bursting onto the other side of the information space much like Jim Morrison did in the 1960s.<\/p>\n<p>By 14 he was a co-author of the RSS 1.0 specification, after which he worked under Tim Berners-Lee at W3C. Schwarz joined Y Combinator\u2019s first program with the Infogami startup, which later merged with the popular Reddit site, and later worked on projects such as Open Library, Creative Commons and watchdog.net.<\/p>\n<p>Another notable contribution to the Internet\u2019s history was the creation of DeadDrop, later renamed <a href=\"https:\/\/securedrop.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SecureDrop<\/a>, a platform for anonymously leaking information used by major media outlets. Schwarz\u2019s list of projects is long.<\/p>\n<p>On January 11, 2013, aged 26, Aaron Schwarz committed suicide. Shortly before, he faced charges of hacking into MIT\u2019s computer network, which carried up to 35 years in prison.<\/p>\n<p>*****<\/p>\n<p>Recently, many commentators say that the coronavirus pandemic will alter life indefinitely. In part this may be true. But one thing remains constant: the need for fundamental rights and, particularly, a global network where most activity now takes place.<\/p>\n<p>This implies the inevitability of new technologies, and with them new efforts by the state to bend them to its purposes.<\/p>\n<p>And the emergence of new manifestos outlining the future\u2019s agenda is only a matter of time. Indeed, they are already appearing.<\/p>\n<p>Subscribe to ForkLog\u2019s news on Telegram: <a href=\"https:\/\/t.me\/forkloglive\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog FEED<\/a> \u2014 the full stream of news, <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a recent report by the rights advocacy organisation Freedom House, the coronavirus pandemic has negatively affected global freedom on the Internet. For ten years running, users have faced a broad erosion of their rights, and this trend is contributing to a crisis of democracy worldwide.<\/p>\n","protected":false},"author":1,"featured_media":31999,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1154,1547,930,2030,1445],"class_list":["post-31998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-crimes","tag-crypto-anarchism","tag-cypherpunks","tag-genesis-archives","tag-internet"],"aioseo_notices":[],"amp_enabled":true,"views":"87","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=31998"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31998\/revisions"}],"predecessor-version":[{"id":32000,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31998\/revisions\/32000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/31999"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=31998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=31998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=31998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}