Crypto anarchism, also known to the world as Crypto-anarchy, is a cyber-spatial realization of anarchism.
The solemn goal of crypto-anarchist is simple: employing cryptographic software to evade prosecution and harassment while sending and receiving information over computer networks, in an effort to protect their privacy and political freedom.
By using these kinds of cryptographic softwares, the association between the identity of a certain user or organization that is on the dark side of this connection is commonly hard to find, or either impossible to do so. It is also, pretty difficult to say which country’s laws will be ignored or diminished, as even the location of a certain participant is remaining unknown. However, participants do have the luxury to voluntarily create new laws using smart contracts or, if the user is pseudonymous, depend on online reputation. But, this is only possible in theory so far.
Crypto-anarchism got its name by the origin of the word crypto (Ancient Greek- means concealed, private, hidden, secret) and anarchy (a state without laws). The term itself refers to anarchist politics who were founded on cryptographic methods, as well as form of anarchism that operates a secret. There are multiple motives that are high priority to these organizations. One of the motives is to defend against surveillance of computer networks communications.
Crypto-anarchists try to protect one against government mass surveillance, also known to the world as the organizations: PRISM, Tempora, telecommunications data retention, the NSA warrantless surveillance controversy, Room 641A, the FRA, etc.
The second highest concern to crypto-anarchists is the evasion of censorship, particularly Internet censorship, on the grounds of freedom of expression.
Many of the programs that are used by crypto anarchists often make it possible to both publish and read information off the internet or other computer networks anonymously. The third reason and concern which is rising day by day is to build and participate in counter economics, which includes development of viable alternatives to banking systems, and development of alternative financial systems which provide the user with options for as greater privacy as possible, as well as anonymity.
There are several law-things that crypto anarchists argue about. One of them is that without these encryption abilities, messages, private life, personal information will be under a great danger with severe damages to these sectors. They do argue that a ban on cryptography will be equal to the eradication of secrecy of correspondence. Their statements are clear: Only draconian-state would criminalize cryptography.
However, using cryptography is already illegal in many countries around the world, while in many there are export laws that are on force for cryptography. The crypto-anarchism relies heavily on plausible deniability to avoid censorship. This means that they create this deniability in order to send encrypted messages to interlinked proxies and computer networks. A payload of routing information is bundled with the message; the message is encrypted with each one of the proxies', and the receiver's, public keys. Each node can only decrypt its own part of the message, and only obtain the information intended for itself. That is, from which node it got the message, and to which node it should deliver the message. With only access to this information, it is thought to be impossible for nodes in the network to know what information they are carrying or who is communicating with whom.