U3F1ZWV6ZTU2MTUwNTM4ODM1NzkwX0ZyZWUzNTQyNDYxNTI4MzIwMQ==

Cypherpunks: Bitcoin’s first relevant social group

 We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, anonymous mail forwarding systems, digital signatures, and electronic money. (Hughes, 1993)

 

Bitcoin was first proposed in a white paper posted to the Cryptography mailing list at metzdowd.com in 2008.27 The archives of the mailing list reveal a forum chiefly concerned with the design and development of computer networks in which user information is encrypted. In posts that detail the motives for these designs, it is possible to trace connections with texts and other mailing lists associated with Cypherpunk activists a subculture committed to creating alternative computer networks that challenge those run by powerful organizations, organizations they see as threatening the privacy and security of individuals. The development of alternative and encrypted networks was the primary means by which these actors sought to bring about social and political change: expanding anonymized and computer-­‐mediated interactions while subverting the capacities of nation-states. Of these alternative networks, an electronic payments system that encrypted user information and did not require banks was a central aim. Such projects were thus familiar to the subscribers to Cryptography, as were the obstacles and difficulties in designing them. Bitcoin emerged within this context: an apparent solution to some of the key problems that

 
 


27 The Cryptography mailing list is publicly archived, available at metzdowd (accessed 19/05/2016)


had long frustrated the attempts of Cypherpunks to construct an encrypted form of electronic money.

 

The Cryptography mailing list states its purpose as a forum for discussion on the “technical aspects of cryptosystems, social repercussions of cryptosystems, and the politics of cryptography”.28 The first of these concerns is the most frequently discussed, with extensive discussion  threads  addressing  technical  issues  with  various  encryption-­‐based  computer programs. These discussions are interspersed with concerns regarding the implications of increasing computerization in everyday life. Such computerization, it is observed, entails the recording and circulation of vast amounts of personal information across the world. Many subscribers opened discussions on the social implications of this, ranging from the development of malicious hardware devices that are specifically designed for identity fraud, to the potential levels of surveillance and corruption among corporations and intelligence agencies. One post from October 2008 for example, responds to the beginnings of the financial crisis, referencing a report on flaws in UK credit card security which led to largescale incidents of fraud. The post articulates a common concern: if criminals were able to exploit these flaws for their own gain, what capabilities were being amassed by nation-states?

 

I’ve long suspected that NSA’s (still secret) budget (approved by a tiny number of manipulated Congressmen) has been, uh, augmented, by its ability to manipulate financial markets using inside information obtained from domestic and global mass wiretaps. You don’t suppose NSA is behind the recent market volatility, do you? It’s easiest to skim off billions when trillions are hurriedly sloshing around in a panic.29


Posts such as this begin discussions regarding the incompetence of organizations responsible for data protection and the capacity for govercentersgencies to target data centers with surveillance programs. Threats to security and privacy were observed in all cases where powerful organizations were entrusted with protecting data. Instances of corruption, failure, and error among these organizations were frequently discussed. Mass

28 See metzdowd(accessed   19/05/2016) 29 Posted by John Gilmore (2008) available at mail-­‐ archive (accessed 19/05/2016)


surveillance, where it was not directly precipitating malpractice, was noted for producing alarming vulnerabilities. These concerns frame how world events are discussed and how Cypherpunks must respond. This is perhaps expressed most clearly in a post that responds to the signing of the 2001 US Patriots Act, brought in to increase the powers of the US state after the September 11th attacks. The post calls on subscribers of Cryptography to ‘go back to their roots, to develop and promote technologies that can help defeat this increased level of intrusion into private life on the part of the US government:

 

Every one of these policies is an opportunity, not a threat. To the extent that these crackdowns engender concern about privacy violations from a growing segment of the population, this is a chance for cypherpunks to spread their knowledge and their technology. You don’t have to be paranoid [sic] anymore to be afraid that the government is spying on you. John Ashcroft himself boasts that Big Government will be watching.

 

Cypherpunks should be taking advantage of this opportunity to promote their message of privacy through technology. For the first time since the group was formed, they can make a legitimate case that the threat of government surveillance is increasing. With the Bill of Rights being tossed out the window and the AG openly admitting to bending the rules to achieve its goals, a wide community is going to be receptive to this message.

 

OF course, there are presently substantial numbers who are caught up in the collectivist urge and who might view attempts to protect privacy as unpatriotic. But this is a temporary phenomenon, already fading. The flags which flew from every car and building in sight a few weeks ago are disappearing. Yet the Draconian new regulations will not go away. Inevitably there will be a growing segment of the population that sees the government as a fearsome threat.

 

It is time for cypherpunks to go back to their roots. Let us put the cipher back in cypherpunk. There are other places where people can whine about how evil Congress is or fantasize about secession from the U.S. Focus on crypto and what role it can play


in the current crisis. Believe it or not, no one else is doing that. No one in the world is speaking out to say, here are tools that can circumvent the government’s efforts to take away our privacy. If the cypherpunks don’t do it, no one will.30

As is emphatically illustrated in this post, Cypherpunks are politically committed to combating the powers of the state by developing ‘cryptosystems. Cryptosystems are a means of securing information across a computer network through the use of algorithms that convert plaintext (data that needs protecting) to ciphertext (encrypted data) and back again. Crucially, the ability to encrypt and decrypt lies only with those that possess the cryptographic key that can trigger this conversion process. In this way, Cryptosystems are discussed as a means of shifting power away from large centralized organizations to individual computer users.

 

Empowered with technologies of encryption, it is argued, individuals would no longer require large organizations to provide security and privacy as services. Instead, these tasks would be performed by algorithms. The potential for corruption and failure would therefore be minimized, as would the necessity to trust in institutions. In this, subscribers to Cryptography were pursuing the aims of   Cypherpunks and   Crypto-­‐anarchists,   online subcultures advocating and developing cryptography as a means to achieve social change. Key projects associated with Cypherpunks, such as ‘Pretty Good Privacy’ email encryption, were frequently discussed in detail. Moreover, many posts are signed with the names of key figures associated with the Cypherpunk movement, such as John Gilmore, quoted above, founder of the Electronic Frontier Foundation, and the Cypherpunks mailing list, a forum referenced in many posts.31

The development of a cryptosystem that could provide a means of making anonymous transactions was a principal aim of Cypherpunks, and efforts made in this direction were frequently scrutinized on the Cryptography mailing list. The concept of digital anonymous

 


30 Posted by R. A. Hettinga (2001) available at metzdowd (accessed 04/02/2017)

31        On         John         Gilmore’s         position          within         the         Cypherpunk          movement,         see eff (accessed 19/05/2016)


markets had been presented in the more polemical Cypherpunk texts throughout the 1990s. Timothy C May’s (1994) document The Cyphernomicon is a particularly prominent example of this. New innovations in cryptography, May stated, were to generate markets that woulthatfree from surveillance.

 

Strong crypto is here. It is widely available.

 

2.3.2.   It implies many changes in the way the world works. Private channels between parties who have never met and who never will meet are possible. Totally anonymous, unlinkable, untraceable communications and exchanges are possible.

 

2.3.3.    Transactions can only be *voluntary*since the parties are untraceable and unknown and can withdraw at any time. This has profound implications for the conventional approach of using the threat of force, directed against parties by governments or by others. In particular, threats of force will fail.

 

2.3.4.    What  emerges  from  this  is  unclear,  but  I  think  it  will  be  a  form  of  anarchy-­‐ the capitalist market system I call "crypto anarchy”

 

In texts such as May’s, new innovations in cryptography – or ‘strong crypto’ – are identified as the drivers of a sweeping social change set to liberate individuals from old hierarchies of power and control.32 ‘Crypto anarchy’ is described as a fast-approaching future in which governments are made redundant by technical progress, and individuals are subsequently freed from their coercive and supervisory forces. Cryptosystems are defined as emancipatory tools that help bring about this future, allowing groups of internet users to evade and subvert the corruption and incompetence liable to any governments or large organizations committed to recording and gathering mass amounts of personal information. Furthermore, a technical superiority is assigned to cryptosystems which gives their diffusion, and its perceived consequences, a sense of historical inevitability. As May went on to state when considering the effect of cryptosystems on governments:

 

 


32 May’s earlier (1992) document The Crypto Anarchist Manifesto and Eric Hughes’ (1993) A Cypherpunk’s Manifesto represent additional sources here.


It dawned on me that public key crypto and anonymous digital cash systems, information markets, etc. meant the end of governments as we know them… Not everyone is a fan of it. But it’s coming, and fast.

 

This technological determinism and libertarian worldview constitute the dominant frames of meaning on the Cryptography mailing list. In a word, cryptosystems are defined as disruptive networks which allow groups to enact and prefigure a crypto-anarchist society. Digital cash systems, it is argued, will inevitably grow in importance, and inevitably cause the decline of the nation-state. At the heart of the ‘crypto-­‐anarchy’ vision are free markets. Replacing governmental law which relies on ‘threats of force’, are laws of the market, and this is made possible by anonymous communication and electronically-­‐mediated exchange.

 

The earliest posts in the Cryptography archives reference David Chaum’s commercial efforts to devise an electronic cash system that encrypted transaction information, protecting the identity of its users.33 Chaum had instigated a series of attempts to create encrypted payment systems with his 1981 paper Blind Signatures for Untraceable Payments. A professor of computer science at the University of California, Santa Barbara, Chaum outlined the design for a cryptosystem in which the digital signatures of users could be encrypted to ensure a high level of anonymity. Such a system was necessary, Chaum explained, as leading designs in the field were threatening to impact substantially on personal privacy by placing third parties in a position to record all information related to user transactions. “A new kind of cryptography, blind signatures”, Chaum explained, “allows realization of untraceable payments systems which offer improved audibility and control compared to current systems, while at the same time, offering increased personal privacy” (1998: 203). Chaum’s own efforts included Ecash and Digicash, and as a subscriber to Cryptography commented, by the late 1990s these efforts were in decline.34 Chaum’s work had presented to the


33 The earliest posts accessible in the Cryptography archives are from 2001. Of these, one is entitled ‘ECash Technologies (digicash.com) announces layoffs’ and is available here: metzdowd (accessed 19/05/2016) Many later posts also reference Chaum’s work.

34 Chaum’s vision for ECash and Digicash ultimately culminated in commercial efforts to provide electronic payments systems. By the late 1990s these ventures were in decline, and Chaum  had been removed as CEO. The story of Digicash is available here: Cryptome (accessed 19/05/2016)


Cypherpunks the possibilities but also the obstacles of designing electronic cash systems, and these issues would continue to fuel discussions on the Cryptography and Cypherpunk mailing lists.35

Various other attempts to create electronic cash systems are discussed in the posts of Cryptography. Wei Dai, a computer engineer who frequented the Cypherpunk mailing lists, had in 1998 proposed a protocol for achieving an untraceable medium of exchange, and named it B-­‐money. In outlining the purpose for B-­‐money, Dai stressed the importance of an anonymous decentralised monetary system to the crypto-­‐anarchy vision.

 

I  am  fascinated  by  Tim  May's  crypto-­‐anarchy.  Unlike  the  communities  traditionally associated  with  the  word  "anarchy",  in  a  crypto-­‐anarchy  the  government  is  not temporarily destroyed but permanently forbidden and permanently unnecessary. It's a community where the threat of violence is impotent because violence is impossible, and violence is impossible because its participants cannot be linked to their true names or physical locations.

 

Until now it's not clear, even theoretically, how such a community could operate. A community is defined by the cooperation of its participants, and efficient cooperation requires a medium of exchange (money) and a way to enforce contracts. Traditionally these services have been provided by the government or government sponsored institutions and only to legal entities. In this article I describe a protocol by which these services can be provided to and by untraceable entities.36

Dai proposed a network in which transactions were publicly broadcast. This would replace the need for a third party to record transaction information on central servers. Instead, transaction information would be encrypted and recorded by other users on the network.

 


At the crux of Dai’s design was a means of ensuring the identities of users could not be linked to the identities they used when participating in the network. “The protocol proposed

35 For a discussion of Chaum’s influence to the Cypherpunk movement more broadly, see Julian Assange’s (2012) book Cypherpunks: Freedom and the Future of the Internet. OR books: London

36  This  extract  from  Dais  bmoney  proposal  is  taken  from  his  personal  website.  It  is  undated. Available here weidai(accessed 15/06/16)


in this article” Dai wrote, “allows untraceable pseudonymous entities to cooperate with each other more efficiently… I hope this is a step toward making crypto-­‐anarchy a practical as  well  as  theoretical  possibility (1998:  1).  Dai’s  b-­‐money  designs  proved  influential, particularly for the most frequently discussed digital cash project on the Cryptography mailing list, Hashcash.

 

Adam Back, a frequent poster to Cryptography, in 1997 published a paper in response to some of the key problems that arose when developing electronic cash systems: Hashcash A Denial of Service Counter-­‐Measure, was initially announced on a Cypherpunk mailing list.37 A denial of service attack is an attempt to disrupt a computer network by overloading its servers with ‘useless traffic’. As Back explains, Hashcash “was originally proposed as a mechanism  to  throttle  systematic  abuse  of  un-­‐metered  internet  resources  such  as  email, and anonymous remailiers.” (2002: 1) These were issues affecting all projects based on free-­‐ to-­‐access computer networks, the most common of which becoming well-­‐known as email ‘spamming’.

 

Back proposed a system in which sending data across the network was a costly process. At the centre was a cryptographic puzzle that required a certain amount of time and computational power to solve before data could be sent. This ensured that sending data across the network would be unproductive for those wanting to flood the network with useless traffic. Solving the cryptographic puzzle involved generating a hash, a string of data with a fixed size. This hash must pass a series of tests written into the Hashcash algorithm. If the data passes these tests, a ‘token’ is created and attached to the data, which would demonstrate what Back called ‘proof-­‐of-­‐work’: proof that the sender of the data has taken the time to generate the token. The processing time to match the conditions for one email address was small enough to ensure it would not significantly inconvenience a regular PC. To send emails to multiple addresses however, the hashing process would be large enough to obstruct email spam or denial of service attacks. Back outlined how this served as a counter-­‐measure to malicious attacks. He also specified in his design that there were many possible applications for Hashcash. These applications reveal much about the context within


37 Back provides the link on his personal website -­‐ cypherspace -­‐ to the original posting of the HashCash paper.


which they were presented and developed. It is hoped a brief discussion on micropayments will help to illustrate the interpretative flexibility of these technical innovations.

 

Hashcash drew together many technical elements and innovations found in designs for micropayment systems. The concept of micropayments was in the 1990s garnering particular interest among corporations involved in information markets and electronic finance.  Micropayments  could  allow  for  the  sale  of  internet  content  in  a  “pay-­‐per-­‐click” system that would empower internet vendors (Herzberg & Yochai, 1997). The cost to users would be fractional, yet the scale of use would lead to considerable profits for content providers. Micropayments could also allow financial organisations to provide services for small transactions across computer networks, which had previously been considered unfeasible due to the costs incurred. As one article published by the IBM Research Division claimed,  micropayments  would  “require  the  inclusion  of  a  third  party  such  as  a  micro-­‐ payment broker” (Hauser et al, 1996: 1) that would render the operation unfeasible. That is to say, offering third party verification on transactions below a certain value was unprofitable. Hauser et al thus proposed a solution bringing together symmetric cryptography  and  digital  signatures:  “each  individual  micro-­‐payment  is  digitally  signed  by the buyer with a highly efficient but specialised signature scheme… chains of coupons can be  used  to  implement  efficient  one-­‐time  signatures”  (1996:  3).  This  is  significant  as  it effectively proposes a system of micropayments built on cryptographic proof rather than third party verification. Each transaction would generate a digital signature, made unique through encryption. This would make transactions near-­‐impossible to reverse. This process would act as automated verification, eliminating the need for a third party to actively maintain records of every transaction.

 

Hauser et al credit the design for this process to a number of computer scientists working in the 1980s, stating ‘several applications of this idea are known’. 38 The aim of the Hauser et al paper was to apply these ideas to enhance systems of electronic payments under


38 The initial reference given by Hauser et al for a micropayments system based on cryptographic proof is: Ralph C. Merkle (1987) ‘A digital signature based on a conventional encryption function’. In Carl Pomerance, editor, Advances in Cryptology { CRYPTO '87, number 293 in Lecture Notes in Computer  Science,  pages  369{378,  Santa  Barbara,  CA,  USA,  August  1987.  SpringerVerlag,  Berlin Germany.


development by corporations, specifically IBM’s ‘Internet Keyed Payments Protocol’. As we shall see, their work anticipates many of the innovations eventually brought together as Bitcoin twelve years later.39 The immediate point is that technical innovations in encrypted electronic payments systems appear in multiple contexts in the 1990s. Cryptographic hash functions and digital signatures are techniques which illustrate interpretative flexibility, on the one hand brought together in designs for micropayments that aim to increase the efficiency of central servers, and on the other in designs for digital cash that seek to establish ‘decentralised’ networks in which data is processed across many nodes. As a frequenter of the Cypherpunk and Cryptography mailing lists, Adam Back’s design for Hashcash emerged within a context of the Cypherpunk movement, committed to replacing centralised  computer  networks  altogether.  Technical  innovations  such  as  one-­‐time  digital signatures and hash functions were in this context defined as ways of subverting and supplanting institutions. Since the expansion of Bitcoin as a technology, many users have understood its technical elements as evidence that decentralised monetary systems are superior and inevitable.40 Hauser et al’s paper shows that other applications of these techniques defined them as ways of bolstering centralised networks and the organisations running them. Only through the extensive efforts of many cyber-­‐libertarian developers were these technical elements brought together to construct digital cash systems, and as we will see in the following sections, many problems had to be solved before Bitcoin ultimately became a successful concatenation of these technical elements.

 

In the initial 1997 posting of his Hashcash paper, Back concludes by detailing some potential usages for his designs, including ways to improve Chaum’s Digicash system. In a 2002 republication, Back proposes the idea of “hashcash as a minting mechanism for Wei Dai’s b-­‐ money electronic cash proposal, an electronic cash scheme without a banking interface” (2002:  7).  The  token  generated  by  the  ‘proof-­‐of-­‐work’  function  could  act  as  a  unit  of currency. Specifically, a currency without banks. This concatenation of flexible technical

 


39  This  idea  for  a  ‘chain  of  coupons  based  on  onetime  signatures  is  the  essentially  the  idea underpinning the ‘block chain’ in the bitcoin network, detailed in the next section.

40 See chapter 6, ‘Incorporation’. Libertarian groups of Bitcoin users see its technical functionality as a justification for the superiority and inevitability of a decentralised monetary system that will replace many functions of nation states.


innovations was brought together in response to the shared interests and values of the Cypherpunks. This was to happen again in the design for bitcoin.

 

 

 

1.2   The ‘Block Chain’: Delegating banking to an algorithm

 

Announcing the first release of Bitcoin, a new electronic cash system  that  uses  a  peer-­‐to-­‐peer  network  to  prevent  double-­‐ spending. It's completely decentralized with no server or central authority (Satoshi Nakamoto)41

The archives of the Cryptography mailing list show frequent discussions on the problems that occur in designing electronic cash systems. The most common is the ‘double-­‐spending problem’. In rejecting the authority of a trusted third party to verify when a transaction has taken place, problems arise in ensuring that particular tokens are not duplicated, effectively allowing users to spend money they don’t have. Banks solve this problem through vigorous authentication processes, ensuring physical money is difficult to forge, and verifying that all electronic  transactions  result  in  the  correct  adjustments  to  account  balances.  A  cyber-­‐ libertarian cash system therefore required a decentralised process to carry out authentication and prevent fraudulent transactions. This was the key innovation proposed in the design of Bitcoin. The solution, now known as the blockchain, made possible a process in which proof of publication was secured through the actions of individual nodes across the network.42 This section examines this key innovation in the design of Bitcoin and interprets how it brings together many technical elements and social meanings to perform a libertarian program of action: automated and ‘decentralised’ banking.

 

 

 


41 Post to the Cryptography mailing list. Available here: metzdowd (accessed 21/06/2016)

42 In the initial design and forum discussions, ‘chains’ of ‘blocks’ are discussed without the direct labelling of ‘block chain’ as a distinct entity. This term develops later among groups of enthusiasts and entrepreneurs as the innovation underlying cryptocurrencies. See chapter 6, Incorporation’.


On October 31st 2008 Satoshi Nakamoto first announced to the Cryptography mailing list a new decentralised currency system. An abstract for the design was posted, along with a link to  a  white  paper  entitled  Bitcoin:  A  Peer-­‐to-­‐Peer  Electronic  Cash  System’.  This  was Nakamoto’s first post to the mailing list, and it received no replies until it was reposted three months later. Little is known about Nakamoto’s true identity. Unlike other subscribers such as Adam Back and Wei Dai, there are no available connections to trace his/her activities preceding the first proposal for Bitcoin.43 This is problematic for identifying the conditions that led Nakamoto to write the paper. However, the document brings together many of the issues, actors and texts prominent on the Cryptography mailing list. Moreover, it outlines a concatenation of technical elements that were already being circulated on the forum; articulates them within a framework of meaning consistent with that expressed in other posts; and triggers a collaborative effort that takes place across three internet forums, where various actors contribute to discussions regarding the direction of its development. 44

The ‘electronic cash system’ Nakamoto proposes in the white paper expresses the Cypherpunk aim of constructing a form of digital cash that does not require centralised financial institutions. As outlined in previous designs for digital cash systems, Bitcoin was to be a cryptosystem that provided individuals with the privacy and security normally delivered by banks.

 

 

 


43 At the time of writing the true identity of Nakamoto is still unconfirmed, although current evidence now suggests Australian cryptographer Craig Wright. Andrew O’Hagan presents this evidence in a publication for the London Review of Books, accessible here: lrb  (accessed  21/06/16).  This  issue  is not addressed in the research, and neutral pronouns are used where necessary.

44 The initial post by Nakamoto announcing the design for bitcoin is accessible in the archives here metzdowd                        (accessed 02/06/16). It received no responses, prompting the author to repost the announcement on the 8th of January       2009,       available       here:       metzdowd (accessed 02/06/16) as well as posting it on another forum, the P2P Foundation                                         on                   11th                  February                   2009,                   available                   here p2pfoundation     (accessed            02/06/2016). BitcoinTalk was subsequently set up as a forum dedicated to developing Bitcoin, from which time discussions moved from Cryptography and the P2P Foundation to BitcoinTalk. Nakamoto’s contributions to these discussions is archived here: satoshi nakamotoinstitute (accessed 02/06/2016)


A  purely  peer-­‐to-­‐peer  version  of  electronic  cash  would  allow  online  payments  to  be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-­‐spending. We propose a solution to the double-­‐spending problem using a peer-­‐to-­‐peer network. (Nakamoto, 2008: 1)

 

The influence of Chaum and other developers from the Cryptography forum is immediately visible in the identification of digital signatures as a key technique for constructing a digital cash system. The major addition offered in Nakamoto’s white paper is the design of a public ledger,  comparable  to  the  record-­‐keeping  carried  out  by  banks.  Banks  manage  electronic finance through the verification of transactions and adjustments to account balances. All information on transactions and balances is kept securely within databases on central servers that banks alter on request from clients, who are subject to security checks to confirm their identities. The design for Bitcoin hinges on an attempt to replace this ‘centralised’  system  of  record-­‐keeping  with  a  ‘decentralised’  peer-­‐to-­‐peer  network.  This entails that all information on transactions and balances is broadcast to every node in the network, and these nodes are then responsible for storing the data and verifying transactions. Nodes are encouraged to carry out this service through an incentive-­‐structure called mining, which will be the focus of the next section. The result is an ever-­‐increasing record of verified transactions encrypted and stored in servers across the entire network. In brief,  this  solves  the  double-­‐spending  problem  by  ensuring  all  users  are  committed  to maintaining the integrity of the ledger. Significantly, this addresses a key concern of the Cypherpunks, and does so by modifying their previous efforts.

 

As discussed previously, users of the Cryptography mailing list had identified the construction of a digital cash system as an essential element of crypto-­‐anarchy: a vision for society in which encryption technologies diminish the power of nation states and liberate individuals. Digital cash would function without the need for ‘trusted third parties’ or institutions, and would thus be ‘decentralised’. These convictions, shared among the subscribers to Cryptography, involved the identification of certain problems with existing monetary systems, including criticisms of their own efforts to construct cryptosystems that could function as currencies. The design for Bitcoin is thoroughly shaped by this context.


From the shared meanings that define the purpose of such a system, and the specific problems with constructing one that Bitcoin proposes to solve, to the technical elements from the previous efforts of Cypherpunks that Bitcoin brings together in its design.

 

The white paper starts by outlining the strengths of the Cypherpunk aim to replace contemporary banking systems with cryptosystems. Starting with some dilemmas common in the development of technologies for internet commerce, the justification for Bitcoin swiftly moves on to a critique of the contemporary financial systems per se, due to the necessity for users to trust institutions.

 

Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model (ibid: 1)

 

Trusting financial institutions to mediate electronic transactions means the public are required to pay significant fees. This is particularly problematic, Nakamoto argues, when two individuals want to transfer small amounts electronically. Here, the paper echoes the earlier issues identified by designers of micropayment systems: “The cost of mediation increases transaction costs, limiting the minimum practical transaction size and cutting off the possibility for small casual transactions.” (ibid: 1) This is problematic, as it precludes the development of an electronic cash system.

 

Cash represents the untraceable type of money consistent with Cypherpunk values. Cash allows for everyday transactions between individuals that, in the moment of transaction, require no third party to record or verify the event. Due to the relative anonymity of internet users however, third parties are necessary for recording transactions and mediating disputes that may occur. This leads precisely to the type of surveillance anathema to Cypherpunks.  The  record-­‐keeping  of  third  party  organisations  involves  the  gathering  of immense amounts of their clients’ personal information in order to make security checks:

 

Merchants must be wary of their customers, hassling them for more information than they would otherwise need… These costs and payments uncertainties can be avoided


in person by using physical currency, but no mechanism exists to make payments over a communications channel without a trusted third party (ibid: 1)

 

The current model of internet commerce, it is argued, therefore requires escalating levels of trust. The more transactions that take place through the internet, the more information required by financial institutions, and the more individuals are required to trust them to store and use it responsibly. The scope of Bitcoin thus goes beyond that of micropayments, which aimed to increase the efficiency of online commerce, to challenge the entire ‘trust-­‐ based model’ of finance on the internet. “What is needed” the author concludes, “is an electronic payments system based on cryptographic proof instead of trust” (ibid: 1).

 

This emphasis on trust significantly distinguishes Bitcoin from designs for micropayments technologies aimed at improving existing monetary systems, and reveals its Cypherpunk influences. Like the digital cash projects of Adam Back and Wei Dai, Bitcoin prioritises delegating to an algorithm the actions of recording and validating financial transactions, as algorithms  are  perceived  as  more  trustworthy  and  efficient  than  human-­‐run  institutions. Indeed, Nakamoto lists Wei Dai in the footnotes, referencing how Dai’s B-­‐money broadcasts transactions across its entire network. “Without a trusted party”, Nakamoto agrees, “transactions must be publicly announced” (ibid. 2). The design for Bitcoin modifies and advances this technical aspect of B-­‐money, as well as carrying its ideological objective. As with B-­‐money, in the Bitcoin network transaction information is automatically broadcast to all the other nodes for validation because this precludes the need for corruptible financial institutions to record it. A further connection is the definition of digital signatures as a new form of ‘physical’ money.

 

In outlining Bitcoin as a new monetary system, Nakamoto details the technical existence of units of currency. Units of currency in Bitcoin are encrypted records: digital signatures representing account balances that may only be altered by those that can operate a corresponding cryptographic key. Nakamoto refers to these records as ‘coins’:


We define an electronic coin as a chain of digital signatures. Each owner transfers the coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin (ibid: 2)

 

The terminology of physical currencies is used in line with the stated aim of designing electronic cash. The unit of currency is thus a ‘coin’ to represent the familiar process in which an object signifying value is moved from one owner to another. This assists the author in explaining how a chain of digital signatures can function as money. It also maintains focus on the construction of Bitcoin as electronic ‘cash’, as opposed to the credit offered by banks. Electronic coins are thus referred to like cash – things in the possession of owners despite a technical explanation which effectively describes credit money, an agreed-­‐upon balance attributed to a client.

 

Nakamoto explains that coins in the Bitcoin network are designed to exist only as digital signatures registered on a public ledger. When a transaction occurs, the addresses (personal accounts) of the two users involved are altered on the public ledger, the respective values updated when every node in the network accepts, processes and validates the transaction. In other words, the signatures that represent coins remain exactly where they are, but new signatures are created that signify changes in ownership. The terminology of coins being transferred from one owner to the next signifies a meaning attached to Bitcoin in its design. A particular concatenation of technical elements, elaborated below, is defined as electronic cash in Bitcoin’s design, carrying the meanings consistent with the efforts of a network of actors committed to developing digital cash systems.

 

The technical element Nakamoto’s paper brings into focus are ‘time-­‐stamp servers’. Digital signatures,  proof-­‐of-­‐work  cryptographic  hash  functions,  and  automated  broadcasting  of transactions  information  across  a  peer-­‐to-­‐peer  network,  are  elements  in  Bitcoin’s  design that were already being circulated and modified by actors on the Cryptography mailing list (associated with the work of Chaum, Back, and Dai, respectively). Bitcoin brings these techniques together alongside designs for time-­‐stamp servers first articulated in a paper by Stuart Haber and W. Scott Stornetta in 1991. Haber and Stornetta’s paper considered changes in intellectual property rights triggered by the “prospect of a world in which all text,


audio, picture, and video documents are in digital form on easily modifiable media” (1991: 0). They proposed a means of attaching a time to a digital signature that would be ‘unforgeable’. Digital documents, they stated, are too easy to tamper with. What is needed is an automated means of time-­‐stamping the data, without the need for a third party:

 

First, one must find a way to time-­‐stamp the data itself, without any reliance on the characteristics of the medium on which the data appears, so that it is impossible to change even one bit of the document without the change being apparent. Second, it should be impossible to stamp a document with a time and date different from the actual one. (1991: 1)

 

To do this, Haber and Stornetta outlined a design for a server which would include a hash function. A cryptographic hash function generates a fixed value for a string of data. Hashes are a form of encryption commonly used in data storage, as large amounts of information (strings of data) can be reduced to much smaller fixed values. They also act as a security mechanism: while it is relatively simple for a computer to inspect that a hash accurately contains the data it is supposed to, the function is practically impossible to reverse engineer.45

Haber and Stornetta described a process in which “the hashes of documents submitted to TSS [time-­‐stamp servers] are linked together, and certificates recording the linking of a given document are distributed to other clients” (1991: 11). This means all the information contained in a document could be registered on the server at a particular time, and an automated hash function would instantly compress the information, along with the time of publication, into a string of code near-­‐impossible to invert. It would therefore be possible to use a computer to check what the registered information was, in its entirety, and when it was published. It would not be possible however, to modify any of this information. In this


45 This timestamping technique has recently emerged as a key functionality and purpose for Bitcoin among particular groups of artists (see for example, Ascribe: ascribe) and academics researching ways of developing ‘blockchain technology’ as a computer network that records and verifies authorship and copyright information (see Open Music Initiative, mdx).          These ‘relevant social groups’ are not examined in the thesis, yet their activities illustrate the interpretative flexibility of Bitcoin, something that is examined in the next chapter.


way, an algorithm that encrypts and distributes data could record user information securely, rather than a third party organisation. Haber and Stornetta referred to this as ‘distributed trust’.

 

After  outlining  the  need  for  a  new  monetary  system  within  a  Cyber-­‐libertarian  frame  of meaning, and explaining the major obstacle to overcome in the double-­‐spending problem, Satoshi Nakamoto states “the solution we propose begins with a timestamp server” (2008: 2). Nakamoto’s insight was to employ Haber and Stornetta’s innovation as currency. A cryptographic hash function, instead of timestamping digital documents, would timestamp digital cash. This would ensure all digital signatures or coins’ would be near-­‐impossible to duplicate or manipulate. It would do this by ensuring that each new digital signature submitted to the server would be grouped together with all the information of previous transactions  and  time-­‐stamped:  “each  timestamp  includes  the  previous  timestamp  in  its hash, forming a chain, with each additional timestamp reinforcing the ones before it” (ibid.).


Figure 7 -­‐ The Block Chain

 

Transaction information broadcast to the network is grouped together in blocks, ‘time-­‐ stamped’, and encrypted with a hash function. (Image from Nakamoto: 2008: 2)

 

Every time a transaction takes place, information (a digital signature) is broadcast to the network stating that the balance of one user is lower, and the balance of another user is higher. This transaction information is then grouped together with other transaction information happening on the network around the same time (other digital signatures) and compressed into a hash. This hash includes a timestamp registering when the hashing


function took place. Hashes also include the hash of the previous grouping, or block, of transaction information. The resulting chain of encrypted information, ‘a chain of blocks’, thus acts as a ledger recording all transaction information, confirming the time of transactions and preventing the manipulation of accounts balances. As with Haber and Stornetta’s digital documents, the cryptographic hash function would allow users to check the information stored on the network, while at the same time preventing any modifications to it. It may be updated but not retrospectively altered – new digital signatures can be produced, but those confirmed to the ‘block chain’ may not be altered.

Figure 8 -­‐ BitcoinTalk Posts

 

The early discussion threads on BitcoinTalk.46

 

The chain of transaction history and account balances, the ledger, is accessible for all to see. Shortly after Nakamoto’s paper had been circulated on the Cryptography mailing list and the P2P Foundation forum, a new forum, BitcoinTalk, was set up as a space for people to collaborate on Bitcoin’s development. The early discussions oriented around one question: how to make Bitcoin anonymous.

 

As discussed earlier a key value of the Cypherpunks is the protection of personal privacy on computer networks. The visibility of the block chain is therefore problematic. Nakamoto sought to address this by ensuring that the ‘keys’ individual users used to make changes to their addresses were kept anonymous:


46 Archived at satoshi nakamotoinstitute (accessed 08/05/2017)


The traditional banking model achieves a level of privacy by limiting access to information to the parties involved and the trusted third party. The necessity to announce all transactions publicly precludes this method, but privacy can still be maintained by breaking the flow of information in another place: by keeping public keys anonymous. (2008: 6)

 

While information on the block chain is possible to see, the only means of updating account balances is through the use of encryption keys. A user of the Bitcoin network has two encryption keys that enable them to modify balance information on the parts of the block chain assigned to them. The first encryption key is the public key. This signifies the particular part of the block chain assigned to that user, their address. This address can be broadcast to other users that may wish to make a deposit there. The second key is the private key. This key is known only to the specific user, the ‘owner’ of the address. For a user to complete a transaction, the public key must be signed by the private key. This process forms a digital signature and the information is broadcast to the network so that it may be ‘hashed’ and written into the block chain, as described above.

 

This use of cryptographic keys allows users to maintain a fixed identity on the network (their address) without any necessary connection to an identity outside of the network (the actor using the cryptographic key). As Nakamoto concludes, “the public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone” (ibid: 8). Through the block chain, Nakamoto advances the Cypherpunk project of constructing a cryptosystem for electronic cash. The block chain solved the problem of double-­‐spending  within  the  acceptable  parameters  of  action  delimited  by  Cypherpunk values; of personal privacy, decentralised power, and individualised security measures.

 

This section has focused on the block chain as the central innovation in the design of Bitcoin. At the heart of this innovation is a program of action rooted in the aims and shared meanings  of  Cypherpunks.  The  cyber-­‐libertarian  worldview  of  these  actors  informed  their efforts to construct and use encrypted digital cash systems. The design for Bitcoin responds to these goals and the problems identified by other actors by bringing together and modifying ideas and techniques from the network of Cryptography subscribers and beyond.


The  block  chain  brings  together  technical  elements  of  time-­‐stamping,  one-­‐time  digital signatures, hash functions, and cryptographic keys; with nontechnical elements of individual privacy concerns and imperatives for ‘decentralising’ finance by replacing institutions with algorithms. This culminates in a program of action to: (1) record transactions, (2) encrypt and time-­‐stamp transactions, (3) broadcast them to the network, and (4) validate them by writing them into an unmodifiable ledger. These actions are delegated to an algorithm which is given the name Bitcoin and assigned a meaning which constitutes it as ‘electronic cash’.  Bitcoin  is  designed  to  facilitate  cyber-­‐libertarian  modes  of  association   private exchange – by continuously performing this program action. For this action to be sustained, the network required a continuously expanding number of users and this presented a further problem, which was solved with the ‘mining’ incentive structure.

 

 

 

1.1   Bitcoin Becomes an Actor: Enrolling ‘miners’ into the network

 

The steady addition of a constant amount of new coins is analogous to gold miners expending resources to add gold to circulation. In our case, it is CPU time and electricity that is expended (Nakamoto, 2008: 4)

 

The functionality of the block chain rests on its constant maintenance. As described above, transactions must be grouped together in blocks and encrypted as a hash before they can be published to the block chain as confirmed transactions. The algorithm that performs this process is run on the hardware devices of users across the network. To encourage individual users to contribute their time and computational energy to the network’s maintenance, Bitcoin is designed with an incentive structure which rewards users in units of Bitcoin. This aspect of Bitcoin’s design plays three crucial roles in the expansion of Bitcoin as a sociotechnical network. Firstly, the incentive structure prescribes a program of action back onto human users, specifying a particular type of usage necessary for the network’s overall construction, maintenance, and growth. Secondly, this prescribed program of action is designed to be competitive, in such a way that it enrols a continuously expanding quantity


of human users and hardware devices. Put briefly, for Bitcoin to function the amount of computational power in the network must increase in proportion to the total number of transactions being made, and the incentive structure is designed to ensure this continuous growth. Thirdly, the mining incentive structure condenses technical elements with an ideological choice, consequently carrying that ideology to new users in a modified form: as a politically neutral, technical fact. This section focuses on the first and second functions of Bitcoin’s ‘mining’ process: how it prescribes a program of action and incentivises the enrolment of additional machines and actors to expand the network.

 

At the centre of the incentive structure proposed in Bitcoin’s design is Adam Back’s Hashcash model. As described above, Back had proposed a system in which sending data across a network was a costly process. For data to be confirmed on the network and sent, a cryptographic test had to be passed. A set of conditions were set in the Hashcash algorithm, and for data to be accepted, a hash must be generated by a user’s computer that met these conditions.

 

Generating a hash involved ‘brute computational force’ a computer would generate thousands of alternative hashes until one was found that matched the conditions set in the algorithm, an arduous process of trial and error. The difficulty could be set in the core algorithm by making the conditions harder or easier to meet, calculated by the probable time it would take a computer to generate enough hashes. Back proposed to set this difficulty at a relatively low level to combat email spam. The hashing process would require a probable amount of processing time small enough to go by unnoticed by a node sending one email, yet large enough to obstruct a node attempting to send multiple emails at once. Back also proposed in his conclusion that this process could provide a ‘minting mechanism for  Wei  Dai’s  b-­‐money  electronic  cash  proposal’.  With  multiple  computers  performing  a more difficult hashing process, the successful hash could act as a trigger for a new unit of currency: ‘proof-­‐of-­‐work’ would be rewarded with electronic cash. Nakamoto applied this to the public ledger design.

 

To implement a distributed timestamp server on a peer-­‐to-­‐peer basis, we will need to use  a  proof-­‐of-­‐work  system  similar  to  Adam  Back’s  Hashcash…  For  our  timestamp


network, we implement the proof-­‐of-­‐work by incrementing a nonce in the block until the value is found that gives the block’s hash the required zero bits (Nakamoto: 2008: 3)

 

The  use  of  Back’s  proof-­‐of-­‐work  model  allowed  Nakamoto  to  set  a  particular  value  in  the cryptographic hash function. Nodes in the network would hash the transaction information in blocks as described above. If their hash met the conditions set in the algorithm, it would be accepted. These conditions are set by the use of a nonce, an arbitrary number generated by the core algorithm. The successful hash would have to ‘find’ this nonce, through generating as many random numbers as possible.

 

Once achieved, a successful hash would be broadcast to the network whose nodes could check that the hash did indeed meet the conditions. Compressed into this successful hash would be transaction information, a hash of the previous block, a timestamp signalling when the conditions were successfully met, the correct nonce, and also all of the generated hashes  representing  the  proof-­‐of-­‐work  carried  out.  Nodes  in  the  network  confirm  their acceptance of the block by incorporating this successful hash into their ongoing process. It would make up the first part of their search for the next successful block.

 

As  with  Back’s  model,  a  token  would  be  generated  once  the  proof-­‐of-­‐work  had  been successfully carried out. This would take the form of a digital signature produced by the core algorithm representing value for the node that successfully hashed the block. The address of that node would be updated with a new balance.

 

As the confirmation of blocks is the only time a balance can be updated without a transaction between two nodes, this acts as a minting mechanism. New currency units come into the network. The incentive structure thus acts as the network’s monetary policy:

 

The first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them. The steady addition of a constant amount of new coins is


analogous to gold miners expending resources to add gold to circulation. In our case, it is CPU time and electricity that is expended. (ibid: 4)

 

The user is thus rewarded for maintaining the currency network in new units of the currency. This acts as a dual incentive for users to both serve the network and advance its value as currency more broadly. To the key technical innovation of Nakamoto’s paper, the block chain, is added an incentive structure for users to contribute to its development and expand the network with more computational power, and with more human users of the currency.

Figure 9 -­‐ The Mining Incentive Structure

 

Users of the Bitcoin network, ‘miners’, are encouraged to program their computers to generate hashes. The computer that generates a hash matching conditions set in the algorithm receives a reward in Bitcoins.

 

 

 

This aspect of Bitcoin prescribes a program of action back onto human users. For the network to function, a sufficient amount of individual users of Bitcoin must become competitive ‘miners’ who organize and manage hardware devices that continually run an


energy-­‐intensive  process  of  ‘hashing’:  grouping  data  and  generating  hashes.  In  its  early development, this task required a relatively small amount of energy as there was less data to be grouped together and processed. The BitcoinTalk archives illustrate how this process was initially undertaken by Bitcoin’s early developers and supporters, such as software coder Martti Malmi, and a group of libertarian enthusiasts named ‘New Liberty Standard’ which helped to test the software.47 The mining feature of Bitcoin however appeals beyond the  voluntarism  of  cyber-­‐libertarian  actors  and  aims  to  provide  a  profit  incentive  for  a broader range of actors to contribute their hardware to the network. Furthermore, this profit incentive is designed to secure the network:

 

The incentive may help encourage nodes to stay honest. If a greedy attacker is able to assemble more CPU power than all the honest nodes, he would have to choose between using it to defraud people by stealing back his payments, or using it to generate new coins. He ought to find it more profitable to play by the rules, such rules that favour him with more new coins than everyone else combined, than to undermine the system and the validity of his own wealth. (ibid. 4)

 

The future security of the incentive structure is thus founded on the rational self-­‐interest of profit-­‐seeking users that will see more value in competing to mine a new block of Bitcoin than they will in augmenting their influence over the network itself. Mining therefore prescribes particular types of usage based on a particular logic. Namely, assembling hardware devices to continuously run the Bitcoin algorithm in order to make a profit. This prescribed usage is competitive, as the more hashing power a ‘miner’ possesses, the more chance they have of obtaining the reward. This entails that ‘miners’ are likely to seek out new ways of introducing more computational power in the network, a process which triggers continuous expansion, a practice which is further incentivised by predetermined increase in hashing difficulty.

 

The mining incentive structure is designed to increase with difficulty as the number of users in the network increases. The conditions set in the algorithm are programmed to increase in difficulty with each block that is hashed, entailing that the network requires more


47 See bitcoin talk (accessed 27/08/17)


computational power as time goes on. This is intended to maintain a balance in the network, and avoid the type of problem envisaged in the quote above, as the increases required in computational power make it more difficult for a user to obtain enough hashing power to exert undue influence over the network. As blocks of transactions are confirmed when a majority of nodes in the network accept them, this means that a user, or group of users, with a majority of hashing power could theoretically confirm blocks of transactions that suit their interests, updating multiple balances during the same transaction (i.e. ‘double-­‐spend’).48  The  difficulty  of  hashing  a  block  is  therefore  set  to  increase  in  tandem with the increase of computational power in the network.

 

A consequence of this design choice however is to ensure the continuous expansion of the network, and this happens in two ways. Firstly, ‘miners’ are incentivised to run the Bitcoin algorithm on their machines for a profit; yet their chances of obtaining the reward in Bitcoins are diminished unless they continuously increase their hashing power. Secondly, for Bitcoins to constitute value, more users must be attracted to the network, and this involves the expansion of Bitcoin’s meaning: more people must recognise the purpose of using Bitcoin. In these two senses, the program of action prescribed by Bitcoin’s design involves the continuous enrolment of further actors and/or machines into the network, by users. This prescribed activity is examined further in chapter six, with groups of libertarian users seeking to expand the network through various means. The immediate point here is that this logic was present in the design of Bitcoin. Bitcoin achieves the Cypherpunk aim of constructing a monetary cryptosystem by advancing previous attempts to delegate banking services to an algorithm, yet its design reveals that Bitcoin goes beyond this to prescribe a set of practices for human users that require the enrolment of further machines and actors. To continue with Latour’s vocabulary, an assessment of Bitcoin’s early development brings to light the action devised and constructed by Cypherpunks, now performed in part by an algorithm, Bitcoin, and a network of actors, ‘miners’, which make it possible for people to use Bitcoin as currency. Moreover, this action carries meanings from the site of its construction through to an expanding number of users. Here Bitcoin becomes an actor in a


48 This problem was widely discussed among developers on BitcoinTalk, who came to term it ‘the 51% attack’. See a discussion thread from 2011, bitcoin talk (accessed 27/08/17)


cyber-­‐libertarian  panorama:  enrolling,  convincing,  enlisting  actors  into  programs  of  action which involve a particular logic and worldview.

 

Latour’s concepts help identify the activity that constructs, sustains, and expands Bitcoin as a set of practices and meanings. Bitcoin is an algorithm that has been constructed through the modification and development of technical and nontechnical elements that were circulating in a network of Cypherpunks. The action delegated to Bitcoin during its history of development continues to structure the action of many Bitcoin users, structuring practices that are examined in chapter six. What the history of Bitcoin’s design also reveals, however, is the contingency of its development upon context. As outlined in earlier sections, the technical elements which were brought together as Bitcoin in the design process were demonstrative of interpretative flexibility: many were being developed differently to address different problems in designs for micropayments. As discussed above, the ‘block chain’ brings together many of these elements as a digitally-­‐mediated means for private exchange to address the concerns of Cypherpunks. The mining incentive structure also demonstrates contingency, and reveals the influence of libertarian economic concepts traceable to hegemonic discourses of neoliberalism. This is the subject of the next section.

 

 

 

1.1   The Contingency of Mining: Neoliberal values condensed in design

 

I think the internet is going to be one of the major forces for reducing the role of government, and the one thing that’s missing,  but  will  soon  be  developed,  is  a  reliable  e-­‐cash:  a method on the internet whereby you can transfer funds from A to B without A knowing B or B knowing A. (Milton Friedman, 1999a)

 

So far this chapter has examined the local context in which Bitcoin was constructed, focusing on how choices in design reflect the values of a relevant social group, Cypherpunks, and how these choices delegate particular forms of action, as well as prescribing types of action for future users. The beliefs shared in this local context, those circulated on


Cryptography and BitcoinTalk, are informed by broader discourses from which knowledge is derived. As one website popularised on the BitcoinTalk forum puts it when referring to a list of texts produced by libertarians, crypto-­‐anarchists, and ‘Austrian economists, Bitcoin was not forged in a vacuum. These works serve to contextualize Bitcoin in the broader story of cryptography and freedom.”49 Informing those engaging with Bitcoin in its early stages were discourses that define money as a commodity, and something that should be freely traded outside of regulatory controls. In examining Bitcoin’s design, we see how these meanings are condensed with technical logic, with the mining structure simultaneously existing as a necessary functionality and an ideological choice. This is affirmed by subsequent adaptations of Bitcoin which have revealed the mining feature to be particularly flexible and contingent on the meanings of the social groups involved in its development. In this final section, I draw on Feenberg’s critical constructionism to interpret Bitcoin’s incentive structure as neoliberal discourse expressed in technical form.

 

As described above, the mining process acts as a minting mechanism for the Bitcoin network. New Bitcoins are generated when a block of transactions is successfully hashed. The user that groups together all existing transaction information and meets the correct hashing criteria is rewarded with Bitcoins. This feature of the mining process is the only instance in which new units of currency are issued in the Bitcoin network. Additionally, the number of Bitcoins generated in this way is programmed to decrease over time, ultimately terminating entirely, at which point miners will be rewarded not with new Bitcoins but with transaction fees.

 

Once a predetermined number of coins have entered circulation, the incentive can transition entirely to transaction fees and be completely inflation-free (Nakamoto, 2008: 4)

 

This design choice, as well as incentivizing miners, regulates and predetermines the number of Bitcoins in the network, and this is done, as Nakamoto states, as a deflationary measure.


49 Quote from the Satoshi Nakamoto Institute, which aims to promote Bitcoin through research, archiving, and advocacy: nakamotoinstitute Popularised and discussed on BitcoinTalk               here:                                   bitcoin talk                                            and              here  bitcoin talk (all accessed 20/06/2016)


The increasing difficulty of hashing a block ensures that the rate of Bitcoin creation is slower than the rate of user adoption. In the first three years that Bitcoin was operational, 2009-­‐ 2011, miners received 50 Bitcoins for successfully hashing a block, which many were able to do on personal computers.50 In 2012 the number of Bitcoins generated as rewards halved to 25, while the time and energy it took to hash a block continued to expand, along with the number of users making transactions.51 Demand has thus exceeded supply both intentionally and extensively, a deflationary measure that has created value through scarcity.

 

In subsequent adaptations of Bitcoin, the proof-­‐of-­‐work hashing program, on which Bitcoin mining is founded, has been redesigned. In Peercoin for example, a group of developers prioritizing sustainability modify the hashing process, devising a ‘proof-­‐of-­‐stake’ system that validates transactions by verifying the records of randomly selected users. This is far less energy intensive as there is no competition between miners. The selected users, who contribute to maintaining the network by making their encrypted transaction history open for inspection, are rewarded with a 1% increase in their holdings. This entails that Peercoin’s version of mining, a process they call ‘minting’, is consistently inflationary.52 This does not constitute a problem for Peercoin’s developers, who prioritize ‘long term sustainability’ over deflation. In the words of one Peercoin developer, “’ inflation’ is a dirty word in the Bitcoin community, who think that Bitcoin’s deflationary aspects are revolutionary,” a post which differentiates between views of the Bitcoin and Peercoin ‘communities’.53  In  another  adaptation  of  Bitcoin,  Faircoin,  the  proof-­‐of-­‐work  hashing program is redesigned differently to make it accountable to its community of users.  Faircoin’s  developers  call  this  ‘proof-­‐of-­‐cooperation’,  as  its  users  select  ‘trusted’ members of a cooperative organization to perform the hashing process, making it


50 See, for example, this discussion thread between miners on BitcoinTalk  bitcoin talk (accessed 20/06/2016)

51 See bitcoin talk (accessed 20/06/2016)

52 The Peercoin developers forum elaborates on these processes: talk peercoin (accessed 28/08/17)

53 This quote is taken from a fascinating post by a Peercoin developer who addresses criticisms of Bitcoin made by economist Paul Krugman, and how they relate to Peercoin, in the process clearly differentiating the views of Peercoin developers from their Bitcoin counterparts. Available here: talk peercoin (accessed 28/08/17)


collaborative instead of competitive.54 Here too, a finite supply of ‘coins’ is not a priority and is actually seen as something that may encourage hoarding and speculation, and deter exchange. Faircoin developers, therefore, opted to incorporate and modify a minting mechanism similar to Peercoin. These examples illustrate the flexibility of Bitcoin’s design and its contingency on the meanings shared by those developing it. As outlined in Bitcoin’s design, the network specifically targets a future state in which the electronic cash system is ‘completely inflation free’. This begs the question, why is ‘deflation’ and a finite supply prioritized in Bitcoin’s design?

 

In  the  cyber-­‐libertarian  texts  shared  on  the  Cryptography,  Cypherpunk,  and  BitcoinTalk forums, free markets are envisaged at the heart of ‘crypto-­‐anarchy’, an ‘anarcho-­‐capitalist’ future in which governments, as Wei Dai stated, are ‘permanently unnecessary’ as digital technologies make the possible free and private exchange. In Langdon Winner’s analysis of cyber-­‐libertarianism, he analyzed the work of popular writers on digital culture in the 1980s and 90s, such as Alvin Toffler, Stewart Brand, and John Perry Barlow. He identified three elements of cyber-­‐libertarianism as a political ideology.55 Firstly, the rapid development of digital technology is understood as the driving force of social change, often expressed as “a kind of evolution that can be explained in   quasi-­‐biological   terms”   (1997:   15).   This technological determinism sees social deliberation on directions of technical development as something that can only be obstructive. Secondly, radical individualism characterizes this  ideology.  New  digital  technologies  enable  the  full  pursuit  of  rational  self-­‐interest without the burdens of cumbersome traditional social structures. Indeed, “because inherited structures of social, political, and economic organization pose barriers to the exercise  of  personal  power  and  self-­‐realization,  they  simply  must  be  removed”  (ibid).  The final element identified by   Winner was the concept o free-­‐market   capitalism as reformulated by Milton Friedman. Winner notes that particular writers in the 1980s, such as George Gilder, helped bridge the utopian ideals of cyber-­‐libertarians with the tenets of the Chicago School SchoolnomiEconomicsEconomicssuch as his 1989 book Microcosm.

 


54 See Faircoin case study, next chapter.

55 For further analysis of the ideology of these writers, see Turner, F. (2006) ‘From Counter Culture to Cyber Culture’


In Gilder’s view, the wedding of free market economics with the overthrow of matter by digital technology is a development that will liberate humankind by generating unprecedented levels of wealth (Winner, 1997: 15).

 

These elements that together comprise the ideology of cyber-­‐libertarianism offered a vision, Winner states, that many found coherent and appealing. The growth of this ideology spread the concepts and logic of free market capitalism to many technology enthusiasts who saw a compatibility between the decentralized architecture of computer networks, and the decentralizing strategies of free market economics. A prominent example of this about crypto-­‐currencies is seen in the work of Nick Szabo.

 

Nick Szabo is a cryptographer that writes frequently on decentralized digital currencies. In 1997 Szabo outlined first his own proposal for ‘BitGold’ which brought together the vision of David  Chaum,  Haber  and  Stornettas  time-­‐stamping  function,  and  various  aspects of  B-­‐ money and HashCash. His proposal was thus remarkably similar to that of Nakamoto, leading to speculation on BitcoinTalk that Szabo is Nakamoto.56 In introducing his proposal, Szabo reiterated the Cypherpunk concern with powerful third parties in financial systems. In doing so, however, Szabo focused on specific economic concerns with inflation:

 

The problem, in a nutshell, is that our money currently depends on trust in a third party for its value. As many inflationary and hyperinflationary episodes during the 20th Century demonstrated, this is not an ideal state of affairs (2005)

 

Szabo had previously analyzed the protocols of Chaum and successors such as HashCash and attempted to advance elements of their respective protocols in which he focused solely on issues of mathematics (1996, 1997, 1999). Szabo had elsewhere discussed crypto-­‐currency projects in the context of a history of cryptography (2002). In the above proposal for BitGold however, Szabo brings together a concatenation of these efforts with the concepts of free market economics. In particular, Szabo advanced the concept of gold as possessing intrinsic value, in part due to its ultimately finite supply.


56See bitcoin talk (accessed 28/08/17) This opinion was also held by one of my interviewees, Suzanne Tarkowski Templehoff, founder of BitNation.


Gold, Szabo claimed, is scarce and has an unforgeable quality. As such, it carries intrinsic properties for dealing with issues of authenticity and stability, issues typically entrusted to a third  party  with  government-­‐authorised  forms  of  money.  Problems  occur , however,  in assaying and transporting gold, which inevitably involve powerful third parties. BitGold was designed to address these issues, nominally offering a system for the trading of digital commodities that resemble the characteristics of precious metals.

 

Precious metals are understood in the monetary theory of Carl Menger to have emerged historically as the most suitable commodities to represent value. Due to their physical properties, individuals engaging in trade increasingly valued precious metals and this gave rise to their emergence as money. The process was thus “no accident, nor the consequence of state compulsion… it was the just apprehending of their [actors in the market] individual self-­‐interest  which  brought  it  to  pass,  that  all  the  more  economically  advanced  nations accepted the precious metals as money” (Menger, 2009: 48-­‐9). While the gold standard, the direct linking of currency to quantities of gold, fell out of favor in mainstream economics, as Nigel Dodd explains in The Social Life of Money (2014), Menger’s theory continued to resonate in circles committed to limiting the capacity of governments:

 

Menger’s theory is especially popular among libertarians, who believe that money is best organized by markets, not states. The argument that money began as an easily traded commodity offers persuasive support for the view that currencies should be linked to the value of a precious metal such as gold, which is naturally scarce (21)

 

The understanding that money is a commodity that’s valued is best determined by the laws of the market was taken up in discussions of monetary policy by key figures of neoliberalism in  the  1960s  and  70s.  In  A  Monetary  History  of  the  United  States  1867-­‐1960,  Milton Friedman (1963) argues that inflation is the direct result of expansions to the money supply. If the money supply expands, the purchasing power of that currency decreases and prices are driven up. Control of the money supply thus bestows central planners considerable leverage over an economy, without the same recourse to democratically accountable actions such as taxation. Friedman posits a fixed monetary policy the k-­‐percent rule’ in which the money supply would increase by a set percentage each year, fixing and limiting


supply, like the gold standard. One of the effects this would have is to reduce the power of governments to direct or intervene in economies, actions which Friedman argues lay behind the collapse of global markets in the aftermath of the Wall Street Crash an era he describes as ‘The Great Contraction’. The k-­‐percent rule could be imposed by central banks such as the US Federal Reserve. Though Friedman recognises this as an imperfect solution due to the corruptibility of such organisations and their subjection to government influence, he nonetheless sees it as a realistic one. For Friedrich Hayek (1976), this is an unnecessary compromise on the part of Friedman: “The present political necessity ought to be no concern of the economic scientist,” Hayek states in The Denationalisation of Money, “His task ought to be, as I will not cease repeating, to make politically possible what today may be politically impossible.” Hayek continues,

 

I am in complete agreement with Professor Friedman on the inevitability of inflation under the existing political and financial institutions. But I believe it will lead to the destruction of our civilisation unless we change the political framework. In this sense I will admit that my radical proposal concerning money will probably be practicable only as  part  of  a  much  more  far-­‐reaching  change  in  our  political  institutions,  but  an essential part of such a reform which will be recognised as necessary before long. The two distinct reforms which I am proposing in the economic and the political order are indeed complimentary: the sort of monetary system I propose may be possible only under a limited government such as we do not have, and a limitation of government may require that it be deprived of the monopoly of issuing money. Indeed the latter should necessarily follow from the former (84)

 

For Hayek, a denationalised currency with a fixed supply was envisioned as the central technique of a political strategy to transform the capacities and responsibilities of governments. As he had argued emphatically in The Road to Serfdom (1944), in taking on the management of economies all world governments were preparing the way for totalitarianism. The only way centrally planned market sectors could function, he posited, would be to increasingly deprive people of choice. As more and more aspects of peoples’ lives were dependent on the economic activities of others, this removal of choice would inevitably penetrate every sphere of action. It was therefore possible for Hayek to state, in


concluding The Denationalisation of Money, that the development of competing denationalised currencies represents “the one way in which we may still hope to stop the continuous progress of all governments towards totalitarianism” (1976: 134). Hayek’s argument here is, along with those Menger and Friedman, implicit in the writings of Cypherpunks  and  Crypto-­‐Anarchists,  examined  above,  in  which  stateless  currencies  were envisioned to protect individuals from the overreaching power of nation states. Indeed, as Langdon Winner notes, the ideas and arguments of free market capitalism are a crucial component of cyber-­‐libertarianism.

 

The decision in Bitcoin’s design to steadily reduce the reward for mining is, as stated, a deflationary measure aimed at creating value through scarcity. This intentionally imitates the finite supply of gold. As Nakamoto states, “the steady addition of a constant amount of new coins is analogous to gold miners expending resources to add gold to circulation. In our case, it is CPU time and electricity that is expended” (Nakamoto, 2008: 4). Dodd documents the influence of Menger’s monetary philosophy on Bitcoin, yet points out that many ‘Austrian’ economists remain critical of Bitcoin because, “firstly, Bitcoins are not actually gold – indeed, according to this view, they have no intrinsic value; and second, because Bitcoins did not evolve as money because of their high use value, as Menger’s theory would suggest” (2014: 362). While these tensions exist with Menger’s theory proper, Nakamoto’s design choices reflect an influence of the free market monetary theory originating in Menger’s work and augmented by the later concepts of Friedman and Hayek. Indeed, the fixed  rate  of  monetary  expansion  is  better  understood  in  terms  of  Friedman’s  k-­‐percent rule, which advocates stable expansion to control inflation.57 Discoveries of gold ensure its supply is not entirely stable; there is no possibility of a ‘gold rush’ equivalent in the Bitcoin network. Furthermore, the open source nature of Bitcoin and its proposal as one of many designs for encrypted payments discussed on the Cryptography and BitcoinTalk forums implies its competition with other alternative currencies. In this way, Bitcoin is a manifestation of Hayek’s proposal to Friedman. It maintains Friedman’s logic of fixed


57 Indeed, in a 1999(b) interview with the libertarian think tank the Cato Institute, Friedman states: “I have, for many years, been in favour of replacing the Fed with a computer… it would print out a specified number of paper dollars… Same number, month after month, week after week, year after year.”


monetary expansion yet opens currency to a “control of value by competition” (Hayek, 1976: 48).

 

In the critical constructionist approach of Feenberg, we see how values may be ‘condensed’ with technical logic in a ‘technical code’: a framework of meaning that defines technology (1999:  87-­‐8).  In  the  design  of  Bitcoin,  we  see  a  similar  process.  The  mining  incentive structure is a feature in Bitcoin that is due not to inherent features of the technical architecture but the influence of free market concepts. As stated above, adaptations of Bitcoin have come to show the range of alternatives in designing incentive structures and rates of coin creation. The choice to algorithmically predetermine the number of Bitcoins in the network and the rate of their creation follows the logic of a particular monetary philosophy in free market economics. The monetary theory underlying this choice thus plays a significant role in the social construction of Bitcoin. Moreover, as a key component of the hashing process that underpins the network, the mining function condenses these concepts within the technical logic of design.

 

The functionality of Bitcoin rests on an increasing amount of computational power to maintain the network. Users are incentivised to contribute this power through accepting digital signatures as ‘rewards’ that denote monetary value. As value is conceptualised within the  free  market  concepts  of  supply-­‐side  economics   namely  that  money  is  a  commodity and a fixed rate of supply is superior – users are introduced to these arguments on what constitutes monetary value in technical form. The functionality of the technology as outlined in design is therefore fundamentally linked to this economic doctrine. The meanings in neoliberal discourse are carried through widely circulated texts, modified in the writings  and  discussions  of  cyber-­‐libertarians,  condensed  in  the  designs  for  Bitcoin,  and presented to users in a technical form. This is not to say that Bitcoin’s libertarian influences are concealed to users, but that neoliberal meanings are transformed by this process. Where Hayek’s proposals existed as a theoretical argument, they now exist as a technique. Bitcoin, as a ‘mediator’ in Latour’s terms, has transformed the meanings from neoliberal discourse it was meant to carry. ‘Denationalised money’ is now an entity that is encountered by actors, something that prescribes to them certain practices which involve the enrolment of others, and not unimportantly, offers them a means of making profit. This


is a radically different form of neoliberalism, most closely aligned to the various techniques analysed by Dardot and Laval (2013). Such techniques, they observe, brought into existence via a pervasive discourse, subtly guide behaviour through “motivation, incentivization, and stimulation” (260). Significantly, Bitcoin illustrates the capacity for such techniques to emanate from the disparate activities of various actors, connecting meanings and technical elements in collaborative networks. The flexibility of these technical elements also reveals however, the capacity for ‘counter-­‐conducts’ to emerge. As already stated, other actors that have encountered Bitcoin have done so in contexts that prioritise other meanings and have adapted Bitcoin accordingly, acting in what Feenberg terms ‘the margin of manoeuvre’. These actors constitute the other relevant social groups in Bitcoin’s development, and are examined in the next chapter.

 

 

 

Summary

 

This  chapter  has  aimed  to  show  the  role  of  non-­‐technical  values  in  the  construction  of Bitcoin. Throughout the 1980s and 90s various innovations were made in the digitisation of communication, exchange, and the recording of documents. Many of these ideas were discussed and developed on the Cryptography mailing list, a forum for the discussion of cryptosystems and their social repercussions. In other contexts, such as commercial research into micropayment systems, these innovations were developed in different ways to suit the interests of various organisations. On the Cryptography mailing list however, as examined   in   sectio 4.1,   the   prevalence   o cyber-­‐libertarian   meanings   cast   these innovations as tools for ‘decentralising’ banking by delegating the services financial institutions perform to a cryptosystem. Cypherpunks, Bitcoin’s first relevant social group, advanced developments in encryption technology as a means of achieving ‘crypto-­‐anarchy’

 an  ‘anarcho-­‐capitalist’  system  in  which  individuals  were  able  to  engage  in  digitally-­‐ mediated private exchange and communication, free from the ‘coercive’ power of nation states. At the heart of this utopia was a decentralised and encrypted payments system. In this context, Bitcoin was first proposed to the subscribers of the Cryptography and developed by users of the BitcoinTalk forum. Bitcoin outlined the design for a peer-­‐to-­‐peer


electronic cash system that required no ‘centralised’ organisation to function, and as such was   defined   in   contrast   to   the   ‘trust-­‐based   model’   o conventional   commerce.   This addressed key concerns of Cypherpunks and the problems they had encountered in their efforts  to  construct  digital  cash  systems,  most  notably  the  ‘double-­‐spending  problem’.  It purported to solve this problem by designing a public ledger that is encrypted and maintained by its users.

 

On examination of Bitcoin’s design, it is possible to trace the connections made between meanings and technical elements. In the first instance, this is observable in Bitcoin’s ‘block chain’ innovation. As discussed in section 4.2, the block chain brings together many technical elements that were circulated and frequently discussed on the Cryptography mailing list, to address the aims and concerns of Cypherpunks. Nakamoto’s paper proposes to delegate the services provided by banks to an algorithm which is run across many servers and maintained by a network of disparate users. To incentivise users to run this program, Bitcoin provides a reward system. As outlined in section 4.3, this reward system prescribes a type of usage based on a particular logic. Namely, the assembling and maintenance of hardware devices for a profit. This incentive structure is designed to be intensely competitive to ensure the expansion of the network, which encourages users to enrol additional machines and actors into the network. In section 4.4, we saw how this feature of Bitcoin also acts as a minting mechanism, issuing currency at a fixed rate. As subsequent designs have come to show, this feature of Bitcoin’s design was not an inherent feature of its technical architecture but contingent on the interests and beliefs shared by its developers. These beliefs are informed by broader neoliberal discourses and a ‘technical code analysis’ reveals how these meanings are condensed in design and transformed into a technique. For many, these meanings continue to shape how they encounter Bitcoin and prescribe how they use it. Others however, have interpreted Bitcoin in significantly different ways, challenging the ideas expressed in its design. It is to these latter groups analysis now turns.

Comments
No comments
Post a Comment

Post a Comment

NameEmailMessage