4.1 copyright
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
1994-09-10, Copyright Timothy C. May. All rights reserved.
See the detailed disclaimer. Use short sections under "fair
use" provisions, with appropriate credit, but don't put your
name on my words.
4.2 - SUMMARY: Goals and Ideology -- Privacy, Freedom, New Approaches
4.2.1. Main Points
4.2.2. Connections to Other Sections
- Crypto Anarchy is the logical outgrowth of strong crypto.
4.2.3. Where to Find Additional Information
- Vernor Vinge's "True Names"
- David Friedman's "Machinery of Freedom"
4.2.4. Miscellaneous Comments
- Most of the list members are libertarians, or leaning in
that direction, so the bias toward this is apparent.
- (If there's a coherent _non_-libertarian ideology, that's
also consistent with supporting strong crypto, I'm not sure
it's been presented.)
4.3 - Why a Statement of Ideology?
4.3.1. This is perhaps a controversial area. So why include it? The
main reason is to provide some grounding for the later
comments on many issues.
4.3.2. People should not expect a uniform ideology on this list.
Some of us are anarcho-capitalist radicals (or "crypto
anarchists"), others of us are staid Republicans, and still
others are Wobblies and other assored leftists.
4.4 - "Welcome to Cypherpunks"
4.4.1. This is the message each new subscriber to the Cypherpunks
lists gets, by Eric Hughes:
4.4.2. "Cypherpunks assume privacy is a good thing and wish there
were more of it. Cypherpunks acknowledge that those who want
privacy must create it for themselves and not expect
governments, corporations, or other large, faceless
organizations to grant them privacy out of beneficence.
Cypherpunks know that people have been creating their own
privacy for centuries with whispers, envelopes, closed doors,
and couriers. Cypherpunks do not seek to prevent other
people from speaking about their experiences or their
opinions.
"The most important means to the defense of privacy is
encryption. To encrypt is to indicate the desire for privacy.
But to encrypt with weak cryptography is to indicate not too
much desire for privacy. Cypherpunks hope that all people
desiring privacy will learn how best to defend it.
"Cypherpunks are therefore devoted to cryptography.
Cypherpunks wish to learn about it, to teach it, to implement
it, and to make more of it. Cypherpunks know that
cryptographic protocols make social structures. Cypherpunks
know how to attack a system and how to defend it.
Cypherpunks know just how hard it is to make good
cryptosystems.
"Cypherpunks love to practice. They love to play with public
key cryptography. They love to play with anonymous and
pseudonymous mail forwarding and delivery. They love to play
with DC-nets. They love to play with secure communications
of all kinds.
"Cypherpunks write code. They know that someone has to write
code to defend privacy, and since it's their privacy, they're
going to write it. Cypherpunks publish their code so that
their fellow cypherpunks may practice and play with it.
Cypherpunks realize that security is not built in a day and
are patient with incremental progress.
"Cypherpunks don't care if you don't like the software they
write. Cypherpunks know that software can't be destroyed.
Cypherpunks know that a widely dispersed system can't be shut
down.
"Cypherpunks will make the networks safe for privacy." [Eric
Hughes, 1993-07-21 version]
4.5 - "Cypherpunks Write Code"
4.5.1. "Cypherpunks write code" is almost our mantra.
4.5.2. This has come to be a defining statement. Eric Hughes used it
to mean that Cypherpunks place more importance in actually
changing things, in actually getting working code out, than
in merely talking about how things "ought" to be.
- Eric Hughes statement needed here:
- Karl Kleinpaste, author of one of the early anonymous
posting services (Charcoal) said this about some proposal
made: "If you've got serious plans for how to implement
such a thing, please implement it at least skeletally and
deploy it. Proof by example, watching such a system in
action, is far better than pontification about it."
[Karl_Kleinpaste@cs.cmu.edu, news.admin.policy, 1994-06-30]
4.5.3. "The admonition, "Cypherpunks write code," should be taken
metaphorically. I think "to write code" means to take
unilateral effective action as an individual. That may mean
writing actual code, but it could also mean dumpster diving
at Mycrotronx and anonymously releasing the recovered
information. It could also mean creating an offshore digital
bank. Don't get too literal on us here. What is important
is that Cypherpunks take personal responsibility for
empowering themselves against threats to privacy." [Sandy
Sandfort, 1994-07-08]
4.5.4. A Cypherpunks outlook: taking the abstractions of academic
conferences and making them concrete
- One thing Eric Hughes and I discussed at length (for 3 days
of nearly nonstop talk, in May, 1992) was the glacial rate
of progress in converting the cryptographic primitive
operations of the academic crypto conferences into actual,
workable code. The basic RSA algorithm was by then barely
available, more than 15 years after invention. (This was
before PGP 2.0, and PGP 1.0 was barely available and was
disappointing, with RSA Data Security's various products in
limited niches.) All the neat stuff on digital cash, DC-
Nets, bit commitment, olivioius transfer, digital mixes,
and so on, was completely absent, in terms of avialable
code or "crypto ICs" (to borrow Brad Cox's phrase). If it
took 10-15 years for RSA to really appear in the real
world, how long would it take some of the exciting stuff to
get out?
- We thought it would be a neat idea to find ways to reify
these things, to get actual running code. As it happened,
PGP 2.0 appeared the week of our very first meeting, and
both the Kleinpaste/Julf and Cypherpunks remailers were
quick, if incomplete, implementations of David Chaum's 1981
"digital mixes." (Right on schedule, 11 years later.)
- Sadly, most of the abstractions of cryptology remain
residents of academic space, with no (available)
implementations in the real world. (To be sure, I suspect
many people have cobbled-together versions of many of these
things, in C code, whatever. But their work is more like
building sand castles, to be lost when they graduate or
move on to other projects. This is of course not a problem
unique to cryptology.)
- Today, various toolkits and libraries are under
development. Henry Strickland (Strick) is working on a
toolkit based on John Ousterhout's "TCL" system (for Unix),
and of course RSADSI provides RSAREF. Pr0duct Cypher has
"PGP Tools." Other projects are underway. (My own longterm
interest here is in building objects which act as the
cryptography papers would have them act...building block
objects. For this, I'm looking at Smalltalk of some
flavor.)
- It is still the case that most of the modern crypto papers
discuss theoretical abstractions that are _not even close_
to being implemented as reusable, robust objects or
routines. Closing the gap between theoretical papers and
practical realization is a major Cypherpunk emphasis.
4.5.5. Prototypes, even if fatally flawed, allow for evolutionary
learning and improvement. Think of it as engineering in
action.
4.6 - Technological Empowerment
4.6.1. (more needed here....)
4.6.2. As Sandy Sandfort notes, "The real point of Cypherpunks is
that it's better to use strong crypto than weak crypto or no
crypto at all. Our use of crypto doesn't have to be totally
bullet proof to be of value. Let *them* worry about the
technicalities while we make sure they have to work harder
and pay more for our encrypted info than they would if it
were in plaintext." [S.S. 1994-07-01]
4.7 - Free Speech Issues
4.7.1. Speech
- "Public speech is not a series of public speeches, but
rather one's own
words spoken openly and without shame....I desire a society
where all may speak freely about whatever topic they will.
I desire that all people might be able to choose to whom
they wish to speak and to whom they do not wish to speak.
I desire a society where all people may have an assurance
that their words are directed only at those to whom they
wish. Therefore I oppose all efforts by governments to
eavesdrop and to become unwanted listeners." [Eric Hughes,
1994-02-22]
- "The government has no right to restrict my use of
cryptography in any way. They may not forbid me to use
whatever ciphers I may like, nor may they require me to use
any that I do not like." [Eric Hughes, 1993-06-01]
4.7.2. "Should there be _any_ limits whatsoever on a person's use of
cryptography?"
- No. Using the mathematics of cryptography is merely the
manipulation of symbols. No crime is involved, ipso facto.
- Also, as Eric Hughes has pointed out, this is another of
those questions where the normative "should" or "shouldn't"
invokes "the policeman inside." A better way to look at is
to see what steps people can take to make any question of
"should" this be allowed just moot.
- The "crimes" are actual physical acts like murder and
kidnapping. The fact that crypto may be used by plotters
and planners, thus making detection more difficult, is in
no way different from the possibility that plotters may
speak in an unusual language to each other (ciphers), or
meet in a private home (security), or speak in a soft voice
when in public (steganography). None of these things should
be illegal, and *none of them would be enforceable* except
in the most rigid of police states (and probably not even
there).
- "Crypto is thoughtcrime" is the effect of restricting
cryptography use.
4.7.3. Democracy and censorship
- Does a community have the right to decide what newsgroups
or magazines it allows in its community? Does a nation have
the right to do the same? (Tennessee, Iraq, Iran, France.
Utah?)
- This is what bypasses with crypto are all about: taking
these majoritarian morality decisions out of the hands of
the bluenoses. Direct action to secure freedoms.
4.8 - Privacy Issues
4.8.1. "Is there an agenda here beyond just ensuring privacy?"
- Definitely! I think I can safely say that for nearly all
political persuasions on the Cypherpunks list. Left, right,
libertarian, or anarchist, there's much more to to strong
crypto than simple privacy. Privacy qua privacy is fairly
uninteresting. If all one wants is privacy, one can simply
keep to one's self, stay off high-visibility lists like
this, and generally stay out of trouble.
- Many of us see strong crypto as the key enabling technology
for a new economic and social system, a system which will
develop as cyberspace becomes more important. A system
which dispenses with national boundaries, which is based on
voluntary (even if anonymous) free trade. At issue is the
end of governments as we know them today. (Look at
interactions on the Net--on this list, for example--and
you'll see many so-called nationalities, voluntary
interaction, and the almost complete absence of any "laws."
Aside from their being almost no rules per se for the
Cypherpunks list, there are essentially no national laws
that are invokable in any way. This is a fast-growing
trend.)
+ Motivations for Cypherpunks
- Privacy. If maintaining privacy is the main goal, there's
not much more to say. Keep a low profile, protect data,
avoid giving out personal information, limit the number
of bank loans and credit applications, pay cash often,
etc.
- Privacy in activism.
+ New Structures. Using cryptographic constructs to build
new political, economic, and even social structures.
- Political: Voting, polling, information access,
whistleblowing
- Economic: Free markets, information markets, increased
liquidity, black markets
- Social: Cyberspatial communities, True Names
- Publically inspectable algorithms always win out over
private, secret algorithms
4.8.2. "What is the American attitude toward privacy and
encryption?"
+ There are two distinct (and perhaps simultaneously held)
views that have long been found in the American psyche:
- "A man's home is his castle." "Mind your own business."
The frontier and Calvinist sprit of keeping one's
business to one's self.
- "What have you got to hide?" The nosiness of busybodies,
gossiping about what others are doing, and being
suspicious of those who try too hard to hide what they
are doing.
+ The American attitude currently seems to favor privacy over
police powers, as evidenced by a Time-CNN poll:
- "In a Time/CNN poll of 1,000 Americans conducted last
week by Yankelovich Partners, two-thirds said it was more
important to protect the privacy of phone calls than to
preserve the ability of police to conduct wiretaps. When
informed about the Clipper Chip, 80% said they opposed
it." [Philip Elmer-Dewitt, "Who Should Keep the Keys,"
_TIME_, 1994-03-04.]
- The answer given is clearly a function of how the question
is phrased. Ask folks if they favor "unbreakable
encryption" or "fortress capabilities" for terrorists,
pedophiles, and other malefactors, and they'll likely give
a quite different answer. It is this tack now being taken
by the Clipper folks. Watch out for this!
- Me, I have no doubts.
- As Perry Metzger puts it, "I find the recent disclosures
concerning U.S. Government testing of the effects of
radiation on unknowing human subjects to be yet more
evidence that you simply cannot trust the government with
your own personal safety. Some people, given positions of
power, will naturally abuse those positions, often even if
such abuse could cause severe injury or death. I see little
reason, therefore, to simply "trust" the U.S. government --
and given that the U.S. government is about as good as they
get, its obvious that NO government deserves the blind
trust of its citizens. "Trust us, we will protect you"
rings quite hollow in the face of historical evidence.
Citizens must protect and preserve their own privacy -- the
government and its centralized cryptographic schemes
emphatically cannot be trusted." [P.M., 1994-01-01]
4.8.3. "How is 1994 like 1984?"
- The television ad for Clipper: "Clipper--why 1994 _will_ be
like 1984"
+ As Mike Ingle puts it:
- 1994: Wiretapping is privacy
Secrecy is openness
Obscurity is security
4.8.4. "We anticipate that computer networks will play a more and
more important role in many parts of our lives. But this
increased computerization brings tremendous dangers for
infringing privacy. Cypherpunks seek to put into place
structures which will allow people to preserve their privacy
if they choose. No one will be forced to use pseudonyms or
post anonymously. But it should be a matter of choice how
much information a person chooses to reveal about himself
when he communicates. Right now, the nets don't give you
that much choice. We are trying to give this power to
people." [Hal Finney, 1993-02-23]
4.8.5. "If cypherpunks contribute nothing else we can create a real
privacy advocacy group, advocating means of real self-
empowerment, from crypto to nom de guerre credit cards,
instead of advocating further invasions of our privacy as the
so-called privacy advocates are now doing!" [Jim Hart, 1994-
09-08]
4.9 - Education Issues
4.9.1. "How can we get more people to use crypto?"
- telling them about the themes of Cypherpunks
- surveillance, wiretapping, Digital Telephony, Clipper, NSA,
FinCEN, etc....these things tend to scare a lot of folks
- making PGP easier to use, better integration with mailers,
etc.
- (To be frank, convincing others to protect themselves is
not one of my highest priorities. Then why have I written
this megabyte-plus FAQ? Good question. Getting more users
is a general win, for obvious reasons.)
4.9.2. "Who needs to encrypt?"
+ Corporations
- competitors...fax transmissions
+ foreign governments
- Chobetsu, GCHQ, SDECE, Mossad, KGB
+ their own government
- NSA intercepts of plans, investments
+ Activist Groups
- Aryan Nation needs to encrypt, as FBI has announced their
intent to infiltrate and subvert this group
- RU-486 networks
- Amnesty International
+ Terrorists and Drug Dealers
- clearly are clueless at times (Pablo Escobar using a
cellphone!)
- Triads, Russian Mafia, many are becoming crypto-literate
- (I've been appoached-'nuff said)
+ Doctors, lawyers, psychiatrists, etc.
- to preserve records against theft, snooping, casual
examination, etc.
- in many cases, a legal obligation has been attached to
this (notably, medical records)
- the curious situation that many people are essentially
_required_ to encrypt (no other way to ensure standards
are met) and yet various laws exists to limit
encryption...ITAR, Clipper, EES
- (Clipper is a partial answer, if unsatisfactory)
4.9.3. "When should crypto be used?"
- It's an economic matter. Each person has to decide when to
use it, and how. Me, I dislike having to download messages
to my home machine before I can read them. Others use it
routinely.
4.10 - Libertarian Issues
4.10.1. A technological approach to freedom and privacy:
- "Freedom is, practically, given as much (or more) by the
tools we can build to protect it, as it is by our ability
to convince others who violently disagree with us not to
attack us. On the Internet we have tools like anon
remailers and PGP that give us a great deal of freedom
from coercion even in the midst of censors. Thus, these
tools piss off fans of centralized information control, the
defenders of the status quo, like nothing else on the
Internet." [ (Nobody), libtech-
l@netcom.com, 1994-06-08]
+ Duncan Frissell, as usual, put it cogently:
- "If I withhold my capital from some country or enterprise
I am not threatening to kill anyone. When a "Democratic
State" decides to do something, it does so with armed
men. If you don't obey, they tend to shoot....[I]f
technological change enhances the powers of individuals,
their power is enhanced no matter what the government
does.
"If the collective is weakened and the individual
strengthened by the fact that I have the power of cheap
guns, cars, computers, telecoms, and crypto then the
collective has been weakened and we should ease the
transition to a society based on voluntary rather than
coerced interaction.
"Unless you can figure out a new, improved way of
controlling others; you have no choice." [D.F., Decline
and Fall, 1994-06-19]
4.10.2. "They that can give up essential liberty to obtain a little
temporary safety deserve neither liberty nor safety."
[Benjamin Franklin]
4.10.3. a typical view of government
- "As I see it, it's always a home for bullies masquerading
as a collective defense. Sometimes it actually it actually
has to perform its advertised defense function. Like naked
quarks,
purely defensive governments cannot exist. They are
bipolar by nature, with some poles (i.e., the bullying
part) being "more equal than others." [Sandy Sandfort, 1994-
09-06]
4.10.4. Sadly, several of our speculative scenarios for various laws
have come to pass. Even several of my own, such as:
- "(Yet Another May Prediction Realized)...The text of a
"digital stalking bill" was just sent to Cyberia-l." [L.
Todd Masco, 1994-08-31] (This was a joking prediction I
made that "digital stalking" would soon be a crime; there
had been news articles about the horrors of such
cyberspatial stalkings, regardless of there being no real
physical threats, so this move is not all that surprising.
Not surprising in an age when free speech gets outlawed as
"assault speech.")
4.10.5. "Don't tread on me."
4.10.6. However, it's easy to get too negative on the situation, to
assume that a socialist state is right around the corner. Or
that a new Hitler will come to power. These are unlikely
developments, and not only because of strong crypto.
Financial markets are putting constraints on how fascist a
government can get...the international bond markets, for
example, will quickly react to signs like this. (This is the
theory, at least.)
4.10.7. Locality of reference, cash, TANSTAAFL, privacy
- closure, local computation, local benefits
- no accounting system needed
- markets clear
- market distortions like rationing, coupons, quotas, all
require centralized record-keeping
- anything that ties economic transactions to identity
(rationing, entitlements, insurance) implies identity-
tracking, credentials, etc.
+ Nonlocality also dramatically increases the opportunities
for fraud, for scams and con jobs
- because something is being promised for future delivery
(the essence of many scams) and is not verifiable locally
- because "trust" is invoked
- Locality also fixes the "policeman inside" problem: the
costs of decisions are borne by the decider, not by others.
4.11 - Crypto Anarchy
4.11.1. The Crypto Anarchy Principle: Strong crypto permits
unbreakable encrypion, unforgeable signatures, untraceable
electronic messages, and unlinkable pseudonomous identities.
This ensures that some transactions and communications can be
entered into only voluntarily. External force, law, and
regulation cannot be applied. This is "anarchy," in the sense
of no outside rulers and laws. Voluntary arrangements, back-
stopped by voluntarily-arranged institutions like escrow
services, will be the only form of rule. This is "crypto
anarchy."
4.11.2. crypto allows a return to contracts that governments cannot
breach
- based on reputation, repeat business
- example: ordering illegal material untraceably and
anonymously,,,governments are powerless to do anything
- private spaces, with the privacy enforced via cryptographic
permissions (access credentials)
- escrows (bonds)
4.11.3. Technological solutions over legalistic regulations
+ Marc Ringuette summarized things nicely:
- "What we're after is some "community standards" for
cyberspace, and what I'm suggesting is the fairly
libertarian standard that goes like this:
" Prefer technological solutions and self-protection
solutions
over rule-making, where they are feasible.
"This is based on the notion that the more rules there
are, the more people will call for the "net police" to
enforce them. If we can encourage community standards
which emphasize a prudent level of self-protection, then
we'll be able to make do with fewer rules and a less
intrusive level of policing."[Marc Ringuette, 1993-03-14]
+ Hal Finney has made cogent arguments as to why we should
not become too complacent about the role of technology vis-
a-vis politics. He warns us not to grow to confident:
- "Fundamentally, I believe we will have the kind of
society that most people want. If we want freedom and
privacy, we must persuade others that these are worth
having. There are no shortcuts. Withdrawing into
technology is like pulling the blankets over your head.
It feels good for a while, until reality catches up. The
next Clipper or Digital Telephony proposal will provide a
rude awakening." [Hal Finney, POLI: Politics vs
Technology, 1994-01-02]
- "The idea here is that the ultimate solution to the low
signal-to-noise ratio on the nets is not a matter of
forcing people to "stand behind their words". People can
stand behind all kinds of idiotic ideas. Rather, there
will need to be developed better systems for filtering news
and mail, for developing "digital reputations" which can be
stamped on one's postings to pass through these smart
filters, and even applying these reputations to pseudonyms.
In such a system, the fact that someone is posting or
mailing pseudonymously is not a problem, since nuisance
posters won't be able to get through." [Hal Finney, 1993-
02-23]
4.11.4. Reputations
4.11.5. I have a moral outlook that many will find unacceptable or
repugnant. To cut to the chase: I support the killing of
those who break contracts, who steal in serious enough ways,
and who otherwise commit what I think of as crimes.
+ I don't mean this abstractly. Here's an example:
- Someone is carrying drugs. He knows what he's involved
in. He knows that theft is punishable by death. And yet
he steals some of the merchandise.
- Dealers understand that they cannot tolerate this, that
an example must be made, else all of their employees will
steal.
- Understand that I'm not talking about the state doing the
killing, nor would I do the killing. I'm just saying such
things are the natural enforcement mechanism for such
markets. Realpolitik.
- (A meta point: the drug laws makes things this way.
Legalize all drugs and the businesses would be more like
"ordinary" businesses.)
- In my highly personal opinion, many people, including most
Congressrodents, have committed crimes that earn them the
death penalty; I will not be sorry to see anonymous
assassination markets used to deal with them.
4.11.6. Increased espionage will help to destroy nation-state-empires
like the U.S., which has gotten far too bloated and far too
dependent on throwing its weight around; nuclear "terrorism"
may knock out a few cities, but this may be a small price to
pay to undermine totally the socialist welfare states that
have launched so many wars this century.
4.12 - Loose Ends
4.12.1. "Why take a "no compromise" stance?"
- Compromise often ends up in the death of a thousand cuts.
Better to just take a rejectionist stance.
- The National Rifle Association (NRA) learned this lesson
the hard way. EFF may eventually learn it; right now they
appear to be in the "coopted by the power center" mode,
luxuriating in their inside-the-Beltway access to the Veep,
their flights on Air Force One, and their general
schmoozing with the movers and shakers...getting along by
going along.
- Let's not compromise on basic issues. Treat censorship as a
problem to be routed around (as John Gilmore suggests), not
as something that needs to be compromised on. (This is
directed at rumblings about how the Net needs to "police
itself," by the "reasonable" censorship of offensive posts,
by the "moderation" of newsgroups, etc. What should concern
us is the accomodation of this view by well-meaning civil
liberties groups, which are apparently willing to play a
role in this "self-policing" system. No thanks.)
- (And since people often misunderstand this point, I'm not
saying private companies can't set whatever policies they
wish, that moderated newsgroups can't be formed, etc.
Private arrangements are just that. The issue is when
censorship is forced on those who have no other
obligations. Government usually does this, often aided and
abetted by corporations and lobbying groups. This is what
we need to fight. Fight by routing around, via technology.)
4.12.2. The inherent evils of democracy
- To be blunt about it, I've come to despise the modern
version of democracy we have. Every issue is framed in
terms of popular sentiment, in terms of how the public
would vote. Mob rule at its worst.
- Should people be allowed to wear blue jeans? Put it to a
vote. Can employers have a policy on blue jeans? Pass a
law. Should health care be provided to all? Put it to a
vote. And so on, whittling away basic freedoms and rights.
A travesty. The tyranny of the majority.
- De Toqueville warned of this when he said that the American
experiment in democracy would last only until citizens
discovered they could pick the pockets of their neighbors
at the ballot box.
- But maybe we can stop this nonsense. I support strong
crypto (and its eventual form, crypto anarchy) because it
undermines this form of democracy. It takes some (and
perhaps many) transactions out of the realm of popularity
contests, beyond the reach of will of the herd. (No, I am
not arguing there will be a complete phase change. As the
saying goes, "You can't eat cyberspace." But a lot of
consulting, technical work, programming, etc., can in fact
be done with crypto anarchic methods, with the money gained
transferred in a variety of ways into the "real world."
More on this elsewhere.)
+ Crypto anarchy effectively allows people to pick and choose
which laws they support, at least in cyberspatial contexts.
It empowers people to break the local bonds of their
majoritarian normative systems and decide for themselves
which laws are moral and which are bullshit.
- I happen to have faith that most people will settle on a
relatively small number of laws that they'll (mostly)
support, a kind of Schelling point in legal space.
4.12.3. "Is the Cypherpunks agenda _too extreme_?"
- Bear in mind that most of the "Cypherpunks agenda," to the
extent we can identify it, is likely to provoke ordinary
citizens into _outrage_. Talk of anonymous mail, digital
money, money laundering, information markets, data havens,
undermining authority, transnationalism, and all the rest
(insert your favorite idea) is not exactly mainstream.
4.12.4. "Crypto Anarchy sounds too wild for me."
- I accept that many people will find the implications of
crypto anarchy (which follows in turn from the existence of
strong cryptography, via the Crypto Anarchy Principle) to
be more than they can accept.
- This is OK (not that you need my OK!). The house of
Cypherpunks has many rooms.