The beginning of everything | Crypto Coins How did it come to our life?
How did it all start? We woke up one morning and found out that something called Bitcoin was invented? Moreover, how did we know that it is an investment vehicle? How did we accept it? When you look back, everything looks so blurry, doesn't it? There are thousands of factors that we couldn't remember until we got to this point, maybe we didn't know. Maybe Bitcoin is part of a game constructed by the secret powers that rule the world , the Rockefeller and Rothschild families? Wait, I want you to know that we never trust conspiracy theories and nonsense.
I will try to explain to you how we got here, after which events the crypto adventure sparked, and which actors and groups contributed to the development of this technology. First, let's mention that the word crypto comes from Cryptography. Cryptography, on the other hand, is all of the methods used to transform the information contained in a readable data into a form that cannot be understood by undesirable parties. Cryptology is the name given to this branch of science. When it comes to crypto, the Enigma machine used by the German woods in World War II and Alan Turing, who deciphered the passwords created by this machine, come to mind. Neither Alan Turing nor anyone else could have predicted that we will come to these days only as utopia. Of course, these developments are not the work of just one person. Just like the title attributed to Satoshi Nakamato. In a moment, we will get to know these names. The idea of using crypto science as a currency is based on the development of the first E-signature model, where â€Å“To - From†headings are opened for the first time thanks to electronic signature. When Whit Diffie announced that he had discovered the Diffie-Hellman-Merkle key exchange model in 1976, most people did not understand what he had actually found. A digital signature is a type of signature that cannot be imitated by anyone, unlike signature types written only on bank checks, divorce papers and soccer balls. Just like the simplicity of changing â€Å“I am not responsible for my spouse's debts†to â€Å“I take full responsibility for my spouse's debtsâ€. Digital signatures offer another advantage, since a digitally signed message is impossible to produce by anyone other than the person who holds the key that encrypts it, the signer cannot at all deny his role in creating the document. This example is exactly the electronic equivalent of the notary stamp. Thus, for the first time, it became possible to carry out all kinds of official transactions—contracts, receipts, and others—over computer networks without the need for a person's physical presence. In short, Diffie not only found a way to secure privacy in the age of digital communication, but also enabled an entirely new form of commerce, electronic commerce with the potential to not only match but exceed existing protocols. Even more interestingly, he was able to make the attempt completely outside the jurisdiction of the government agencies with the largest cryptographic systems. Although not a Cypherpunk itself, Diffie, who worked for many years at Sun Microsystems with her Cypherpunk colleague John Gillmore, was awarded the Turing Award in 2015. One minute. Not being a cypherpunk? What is it now? I want to open a parenthesis here to avoid confusion, Cypherpunk should not be confused with Cyberpunk because they are two very different concepts. Let's come to Cypherpunk, our most popular word in our video. Cypherpunks basically oppose any authority in power. It is a movement formed by people who adopt the philosophy of cryptography for less central authority and defend personal privacy in all fields, especially in financial fields.
Although the Cypherpunk school emerged in the early 1980s, an E-mail group was founded in 1992 that works like a WhatsApp group and brings together Cypherpunks from all over the world. In 1994 it had 700 subscribers and in 1997 it was known to have 2000. We can say that it was an active forum where many topics such as mathematics, cryptography, computer science, political and philosophical discussions, personal arguments and hacking attacks were discussed. Timothy May, one of the most active members of the group, was a senior scientist at Intel and was even awarded a professional award for his work on reducing the sensitivity of ceramic coatings to radiation. By 1994, May was posting 30 articles a day and presenting his ideas to the Cypherpunk Email group. The most intriguing one is undoubtedly that famous article in which he explains where cryptos can be used in the future. Here, May mentions that David Chaum's company, DigiCash, is the only cryptocurrency company in its field with interesting technology and has recently started market tests.
There is a note in the paragraph: â€Å“I expect to see many more projects like this one in the next few years, and some of them will likely be very successful in the market.†David Chaum, who is in the same Email group as Timothy May mentions in his article, is the inventor of Blind Signature. We can say that he is the inventor of the signature protocol that allows today's encrypted transmission. In 1990, he founded the first digital finance company, Digicash, in Amsterdam to commercialize the ideas from his research and launched the first digital currency Ecash in 1994. In fact, the first electronic money transfer was made from here, but this system, unlike today, was connected to central servers. He later announced that he was leaving the company in 1999. The idea is to generate anonymous currency as opposed to a system based on tracking individuals such as Visa and Master Card. So it's actually an electronic banknote, but unlike a banknote, it doesn't have a serial number on it. More precisely, the bill has a serial number to prove it's valid, but it doesn't let you know from whom the payment was made, what the amount was paid. In fact, Timothy May announced that he started working on this issue through the Digicash company he founded in 1985 and received his patent in July 1988. This patent, which made a great impression at that time, was widely talked about as the new currency of the world and was also featured on the cover of the Economist magazine. (PICTURE) In the past years, our medias, which know nothing about many things, confused Rockafeller, the Rotscild Family, etc., to create a sensation on this cover of 40 years ago, and removed all the irrelevant people on the right and left and made them talk publicly. It's always like that anyway... John Gilmore, one of the early Cypherpunks and an early employee of Sun Microsystems, led the emergence of the (DHCP) protocol, which is the primary way local networks assign an IP address to devices. In other words, we can say that the scientist who brought about the concept of the internet of things. He is also one of the founders of the Electronic Frontier Foundation, which works for digital rights. He is known more as an active activist in the field of civil liberties than his invention. Gillmore, who gave more optimistic notes than other Cypherpunks, said in his statement regarding the global spread of the Internet in the early 1990s, "The Internet perceives censorship as a mistake and automatically disables it." With this optimistic comment, he received negative comments from other Cypherpunk members. With the introduction of Web3.0 into daily life, it seems to be a self-fulfilling prophecy. Adam Back is Known as the person who invented HashCash in 1997. Today, a similar method is used in Bitcoin. What he recommends is simply to use cryptography to block spam mails . This is about verifying whether the message sender has made an investment , such as decrypting the message , between the recipients of the message . And, Hal Finney, known as the first Bitcoin buyer. He is one of the most famous Cypherpunk members. He is the person who invented the POW (Proof of work) transfer system based on proof of work in 2004. In 2009, we saw that this system was implemented on Bitcoin. As he lived on the same street as Satoshi Nakamoto and received a Bitcoin transfer from Nakamoto for the first time , his claims that he was Nakamoto or that he knew Nakamoto became stronger . However, Finney denied that he was Nakamoto until he died in 2014. These words are of great importance as a Cypherpunk; â€Å“We are facing a deepening centralization with loss of privacy, ongoing computerization and huge databases. And by contrast, David Chaum offers a completely different method of putting power in the hands of individuals rather than the powerful people.
The computer can be used as a tool to liberate and protect people rather than controlling them.†One of the sources we used while explaining all this information is Julian Assange's book titled â€Å“A Discussion on Cryptopunk Freedom and the Future of the Internetâ€. (PICTURE) The book, as the name suggests, deals with a discussion dimension and describes the discussion that three members of the Cypherpunk group we mentioned earlier had with each other. In fact, let's give you a section right here; It's strange that Cryptography is regulated. According to an internationally valid legislation called the Wassenaar Regulation, you are prohibited from exporting encrypted technology that enables protection from surveillance technology to countries that have been declared evil or are deemed problematic for any reason (such as Iran according to the USA). But if you're into the surveillance gear business, here's how you can sell it internationally. There is no expert constraint there. It's trying. This was indeed the case until recently. Let's continue, Interestingly, we are witnessing the power of hackers, I mean "hacker" in the literal sense of the word, not outlaws. The so-called hacker is a tech savvy, he likes to understand how technology works, explores how technology can be used better instead of being a prisoner of it. Probably when you were five or six years old, you took a screwdriver and tried to open electrical appliances and see what it looked like inside. That's what being a hacker is; We can say that the internet was actually developed by hackers in a sense. It was a fun job for them, they developed the internet and made it available to everyone. Companies such as Google and Facebook later realized the market possibilities of capturing users' personal data. But we still see that hackers have some kind of power in their hands. One of the main areas I'm interested in these days is hackers gaining power in many areas, including the political arena. In the USA, legislation such as SOPA (Stop Online Piracy Act ) and PIPA (The PROTECT IP Act) emerged. The essence of copyright laws adopting this type of hawkish style is that Hollywood obtains the authority to restrict internet access and censor the internet by ordering any internet company. Surprising information, right? So, while this was the case, did governments or giant corporations ever oppose or try to stop these Cypherpunk members? Phil Zimmerman invented PGP encryption in 1991, which can be used for all mailings. In response, the US Customs Service launched an international arms smuggling investigation against Zimmerman because encryption technologies were considered a weapon in the US at that time. The investigation lasted three years, and the charge was dropped after the MIT press office released the source code for the PGP. There are hundreds of resources on the internet where you can see examples like this. In fact, we leave the resources we use below to get to know Cypherpunk better. Although the cypherpunk group has turned into a more individual movement and decentralized corporation today, the problem-solving ability of the human being together in the evolutionary process and his fondness for freedom are more than enough to break down all the barriers that may be thrown in the future. â€Å“Privacy for the weak, transparency for the powerful†This is how it all started…
