The Good Tech Companies - Cypherpunks Write Code: Suelette Dreyfus & Free Speech
Episode Date: February 12, 2025This story was originally published on HackerNoon at: https://hackernoon.com/cypherpunks-write-code-suelette-dreyfus-and-free-speech. The Australian Suelette Dreyfus can... be considered a cypherpunk. She's worked with Julian Assange, and has founded its own NGO for free speech. Check more stories related to society at: https://hackernoon.com/c/society. You can also check exclusive content about #whistleblowers, #suelette-dreyfus, #julian-assange, #free-speech, #rubber-hose-cryptanalysis, #cypherpunks-write-code, #obyte, #good-company, and more. This story was written by: @obyte. Learn more about this writer by checking @obyte's about page, and for more stories, please visit hackernoon.com. Suelette Dreyfus is an Australian-American researcher, writer, and academic. She is the co-author of ‘Underground: Tales of Hacking’, a groundbreaking book on the hacker subculture written with Julian Assange. She also co-authored something else with Assange: the book Rubberwork.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
Cypherpunks Writecode, Sulet Dreyfus and Free Speech, by Obite.
Cypherpunks are a privacy activists who advocate for freedom of speech and apply cryptographic
tools to protect our data or funds, in the case of those who work with cryptocurrencies
and related endeavors. For instance, Satoshi Nakamoto is, of course, a cypherpunk, and also is the Wikileaks
founder, Julian Assange. Closer to the latter, we also have Sulet Dreyfus, who can be called a
cypherpunk in her own right. An Australian-American researcher, writer, and academic, Dreyfus holds a
BA from Barnard College at Columbia University and a. from Monash University. She's currently a senior
lecturer at the University of Melbourne in the Department of Computing and Information Systems,
where her work explores the intersection of technology and society. Her diverse research
fields include cybersecurity, digital privacy, whistleblower protection systems, e-education,
and health. She also has a background in journalism and is the co-author of
Underground, Tales of Hacking, a groundbreaking book on the hacker subculture written with Julian
Assange. Underground, Tales of Hacking. Released in 1997, Underground plunges readers into the
chaotic, exhilarating world of hacking in the late 1980s and early 1990s, focusing on an eclectic group of hackers from
Australia, the US, and the UK through the lens of real incidents, the book unveils the exploits
of characters like the enigmatic Mendix, a young Julian Assange, Phoenix, and Gandalf, among others.
These hackers didn't just tinker, they infiltrated major networks like the US Defense Data Network,
DDN, and Nortel,
a Canadian telecom company, even leaving their mark on global organizations.
The opening chapter recounts the wank worm attack on DEC VMS systems, including NASA's,
an audacious act of digital rebellion that set the tone for the tales of obsession and
ingenuity that followed. The creation of Underground was a feat in itself.
Sue let Dreyfus and Julian Assange dove deep into over 40,000 pages of documents,
including intercepts and court records, conducting more than a hundred interviews with hackers,
lawyers, and law enforcement. The result is a narrative so detailed and vivid it feels like
fiction, though every event is meticulously corroborated. From perniv-wracking evasion of the Secret Service
to the global connections forged in underground bulletin board systems, the stories are brought
to life with a now most cinematic intensity. The book's popularity proved its resonance.
Upon making it freely available online in 2001, demand was so high that servers hosting it
crashed. In just two years, it was downloaded around 400,000 times.
A 2002 documentary, In the Realm of the Hackers, spotlighted the exploits of Phoenix and Electron,
further cementing Underground as a cornerstone in the lore of cyber culture.
Whether in print, digital, or onscreen, the book's influence has reached audiences worldwide.
Rubber Hose, Deniable deniable encryption. Besides the book,
Dreyfus also co-authored something else with Assange, the deniable encryption program Rubber
Hose, or Maruchuku. To start, we must know that deniable encryption is a cryptographic concept
that allows users to conceal the existence of encrypted data. Introduced in 1996 by cryptographers
Ran Kaneti, Cynthia Dwork, Moni Nair, and Rafael Ostrovsky,
it is designed to protect privacy even under coercion. Using this method, a user could
plausibly deny the presence of sensitive information on a storage medium. For example,
if someone demands access to encrypted files, the user could provide a
decoy key that reveals harmless data while masking the existence
of other hidden files. This system ensured that adversaries couldn't prove the presence or
quantity of encrypted information without full cooperation from the user. Rubber Hose was
released by Julian Assange, Sulet Dreyfus, and Ralph Weinman in 1997 to safeguard human rights
activists' sensitive data. The program encrypts storage
devices and obfuscates data's presence by scattering encrypted fragments across the
disk alongside randomized, chaff, data. The name is a reference to rubber hose cryptanalysis,
humorously alluding to extracting encryption keys through force, like when beating someone
with a rubber hose. Its core idea is to let users store multiple
datasets, each accessible via a unique key, while adversaries remain unaware of the data's full
extent. For instance, activists could store decoy files like recipes while hiding critical evidence
of human rights abuses. That being said, while groundbreaking at its inception,
rubber hose is largely outdated today due to advancements in encryption technology, increased computing power, and more sophisticated adversarial
techniques.
Still, this program is considered an important historical milestone in cryptography.
Blueprint for Free Speech
Dreyfus was a member of the Wikileaks advisory board, but her efforts to promote free speech
didn't end there.
She's also the founder and executive
director of Blueprint for Free Speech, an international NGO dedicated to protecting
freedom of expression for everyone, and whistleblowers in particular. A whistleblower
is someone who exposes wrongdoing, corruption, or illegal activities within an organization,
often to protect public interest or uphold free speech. Anyone with access to inside information,
like employees, contractors, or stakeholders, can be a whistleblower. They're often persecuted and
threatened for it, though. A great example of this was the case of Edward Snowden.
Blueprint, among other activities, offers legal protection and annual prizes to whistleblowers worldwide. This non-profit strengthens public debate and empowers individuals
to combat corruption and injustice. The organization emphasizes the importance of
privacy while supporting transparency for institutional accountability.
To protect those at risk, Blueprint also develops secure software like Ricochet Refresh and Gosling,
which enable anonymous communication for whistleblowers and activists.
It also offers tailored advice and training on digital security,
helping individuals safeguard their rights and speak out safely. Through the CIF forts, Blueprint ensures that freedom of
expression remains protected. Let's make a little trouble. Dreyfus is one of those people trying to
fight for privacy but also for change. She's used the available software tools or even created new
ones to advance civilization a little more. To quote her greater than,
civilization advances slowly, and traditionally it is human rights greater than campaigners,
free-thinking academics and community activists who propel it greater than forward.
Society often resists these gingerly placed prods, and the entrenched greater than moguls
punish those who dare to upset the status quo. They label the activists greater than as
troublemakers or whistleblowers to justify misusing quo. They label the activists greater than as troublemakers
or whistleblowers to justify misusing them. Where there is greater than injustice, we like to upset
the status quo too, and to support others who want greater than to do the same. Our motto is,
let's make a little trouble, feel free to greater than make a little trouble yourself.
In a world where fighting injustice could be punished, Obite offers a powerful tool for making change.
Its fully decentralized nature removes middlemen and big power centers,
providing individuals with true autonomy.
Just as civil rights activists and whistleblowers confront unfairness,
Obite empowers anyone to disrupt established systems, free from censorship or interference.
By offering, among other features, a decentralized cryptocurrency, smart contracts, encrypted messaging, and even a privacy coin,
Blackbytes, Obytenables secure, anonymous communication and transactions, perfect for
those who wish to challenge oppressive structures or simply protect their own right to privacy and
online freedom. The network's absence of centralized control makes it an ideal platform
for activists, free thinkers, and average users to collaborate, exchange ideas, and drive societal
progress without fear of retribution. Let's make a little trouble, read more from Cypherpunk's
right code series Tim May and Crypto Anarchism. Way Die and Be Money. Nick Sabo and Smart Contracts.
Adam Back and Hashgash. Eric Hughes and Remailer.
Saint Jude and Community Memory. Julian Assange and Wikileaks. Hal Finney and RPOW. John Gilmore
and F. Satoshi Nakamoto and Bitcoin. Gregory Maxwell and Bitcoin Core. David Chom and Ecash.
Vinay Gupta and Materium, Jim Bell and Assassination Politics,
Peter Todd and Bitcoin Core, Len Sassaman and Remailers, Eva Galperin against Stockerware,
Eric Blossom and New Radio, Featured Vector Image by Gary Killian,
Freepik Photograph of Sulet Dreyfus from Blueprint for Free Speech
Thank you for listening to this Hackernoon story, read by Artificial Intelligence.
Visit hackernoon.com to read, write, learn and publish.