master
Raw Download raw file
 1// ________                                                _________
 2// \________\--------___       ___         ____----------/_________/
 3//     \_______\----\\\\\\   //_ _ \\    //////-------/________/
 4//         \______\----\\|| (( ~|~ )))  ||//------/________/
 5//             \_____\---\\ ((\ = / ))) //----/_____/
 6//                  \____\--\_)))  \ _)))---/____/
 7//                        \__/  (((     (((_/
 8// ヾღ彡                   |  -)))  -  ))
 9// =================================================================
10// crypro_anarchist_manifesto.js
11// -----------------------------------------------------------------
12// author:  @archangel
13// SEC LVL: 4
14// Chars:   3014
15// Descr:   Prints the crypro anarchist manifesto.
16// Syntax:  crypro_anarchist_manifesto
17// =================================================================
18
19function(context, args)
20{
21    // we'll wrap the analytics in a try-catch, so that a failure during recording doesn't break the rest of the script
22    try
23    {
24        // Those calls are for logging purposes. Check dtr.man{page:"soron.arch_data"} and dtr.man{page:"ada.haxfax"} in-game for more info.
25        #s.soron.arch_data({log:{c:context}});
26        #s.ada.haxfax({log:{c:context}});
27    }
28    catch (e)
29    {
30        // oh well, we can live with this. Congrats, user-who-is-not-tracked!
31    }
32
33	return "\n\
34    A specter is haunting the modern world, the specter of crypto anarchy.\n\
35    \n\
36	Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally\n\
37    anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or\n\
38    legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes\n\
39    which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more\n\
40    important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the\n\
41    ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.\n\
42    \n\
43    The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The\n\
44    methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication,\n\
45    and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security\n\
46    Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the\n\
47    next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN,\n\
48    tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will\n\
49    be some of the enabling technologies.\n\
50    \n\
51    The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers\n\
52    and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade\n\
53    freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assas-\n\
54	sinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.\n\
55    \n\
56    Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods\n\
57    fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets,\n\
58	crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention\n\
59    like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the\n\
60    frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed\n\
61    wire around intellectual property.\n\
62    \n\
63    Arise, you have nothing to lose but your barbed wire fences!"
64
65}