CZ:Featured article/Current: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Chunbum Park
mNo edit summary
imported>John Stephenson
(template)
 
(197 intermediate revisions by 8 users not shown)
Line 1: Line 1:
A '''[[cypherpunk]]'''  is an activist advocating widespread use of strong cryptography as a route to social and political change. Cypherpunks have been engaged in an active movement since the late 1980s, heavily influenced by the hacker tradition and by libertarian ideas. Many cypherpunks were quite active in the intense political and legal controversies around cryptography of the 90s, and most have remained active into the 21st century.
{{:{{FeaturedArticleTitle}}}}
 
<small>
The basic ideas are in this quote from the ''Cypherpunk Manifesto'':
==Footnotes==
 
{{reflist|2}}
{{quotation|Privacy is necessary for an open society in the electronic age. ...
</small>
 
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy ...
 
We must defend our own privacy if we expect to have any. ...
 
Cypherpunks write code. We know that someone has to write software to defend privacy, and ... we're going to write it. ... }}
 
Many cypherpunks are technically quite sophisticated; they do understand ciphers and are capable of writing software. Some are or were quite senior people at major hi-tech companies and others are well-known researchers. However, the "punk" part of the name indicates an attitude:
 
{{quotation|We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.}}
 
{{quotation|This is crypto with an attitude, best embodied by the group's moniker: Cypherpunks.}}
 
The first mass media discussion of cypherpunks was in a 1993 Wired article by Steven Levy titled ''Code Rebels'':
 
{{quotation|The people in this room hope for a world where an individual's informational footprints -- everything from an opinion on abortion to the medical record of an actual abortion -- can be traced only if the individual involved chooses to reveal them; a world where coherent messages shoot around the globe by network and microwave, but intruders and feds trying to pluck them out of the vapor find only gibberish; a world where the tools of prying are transformed into the instruments of privacy.}}
 
{{quotation|There is only one way this vision will materialize, and that is by widespread use of cryptography. Is this technologically possible? Definitely. The obstacles are political -- some of the most powerful forces in government are devoted to the control of these tools. In short, there is a war going on between those who would liberate crypto and those who would suppress it. The seemingly innocuous bunch strewn around this conference room represents the vanguard of the pro-crypto forces. Though the battleground seems remote, the stakes are not: The outcome of this struggle may determine the amount of freedom our society will grant us in the 21st century. To the Cypherpunks, freedom is an issue worth some risk.}}
 
The three masked men on the cover of that edition of Wired were prominent cypherpunks Tim May, Eric Hughes and John Gilmore.
 
Later, Levy wrote a book ''Crypto: How the Code Rebels Beat the Government &mdash; Saving Privacy in the Digital Age'' covering the "crypto wars" of the 90s in detail. "Code Rebels" in the title is almost synonymuous with "cypherpunks".
 
The term "cypherpunk" is mildly ambiguous. In most contexts in means anyone advocating cryptography as a tool for social change. However, it can also be used to mean a participant in the cypherpunks mailing list described below. The two meanings obviously overlap, but they are by no means synonymous.
 
Documents exemplifying cypherpunk ideas include the ''Crypto Anarchist Manifesto'', the ''Cypherpunk Manifesto'' and the ''Ciphernomicon''.
''[[Cypherpunk|.... (read more)]]''

Latest revision as of 10:19, 11 September 2020

Nuclear weapons proliferation is one of the four big issues that have held back worldwide deployment of peaceful nuclear power. This article will address the proliferation questions raised in Nuclear power reconsidered.

As of 2022, countries with nuclear weapons have followed one or both of two paths in producing fissile materials for nuclear weapons: enrichment of uranium to very high fractions of U-235, or extraction of fissile plutonium (Pu-239) from irradiated uranium nuclear reactor fuel. The US forged the way on both paths during its World War II Manhattan Project. The fundamental aspects of both paths are well understood, but both are technically challenging. Even relatively poor countries can be successful if they have sufficient motivation, financial investment, and, in some cases, direct or illicit assistance from more technologically advanced countries.

The International Non-proliferation Regime

The International Atomic Energy Agency (IAEA) has a vigorous program to prevent additional countries from acquiring nuclear weapons. The Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is the cornerstone arrangement under which strategic rivals can trust, by independent international verification, that their rivals are not developing a nuclear weapons threat. The large expense of weapons programs makes it very unlikely that a country would start its own nuclear weapons program, if it knows that its rivals are not so engaged. With some notable and worrying exceptions, this program has been largely successful.

Paths to the Bomb

It is frequently claimed that building a civil nuclear power program adds to the weapons proliferation risk. There is an overlap in the two distinct technologies, after all. To build a bomb, one needs Highly Enriched Uranium (HEU) or weapons-grade plutonium (Pu-239). Existing reactors running on Low Enriched Uranium (LEU, under 5% U-235) or advanced reactors running on High Assay LEU (HALEU,up to 20% U-235) use the same technology that can enrich uranium to very high levels, but configured differently. Enrichment levels and centrifuge configurations can be monitored using remote cameras, on-site inspections, and installed instrumentation -- hence the value of international inspections by the IAEA. Using commercial power reactors as a weapons plutonium source is an extremely ineffective, slow, expensive, and easily detectable way to produce Pu. Besides the nuclear physics issues, refueling pressurized water reactors is both time-consuming and obvious to outside observers. That is why the US and other countries developed specialized Pu production reactors and/or uranium enrichment to produce fissile cores for nuclear weapons.

Future Threats and Barriers

Minimizing the risk of future proliferation in states that want to buy nuclear reactors or fuel might require one or more barriers:
1) Insisting on full transparency for all nuclear activities in buyer states, including monitoring and inspections by the International Atomic Energy Agency (IAEA).
2) Limiting fuel processing to just a few supplier states that already have weapons or are approved by the IAEA.
3) Ensuring that fuel at any stage after initial fabrication has an isotopic composition unsuitable for weapons. "Spiking" the initial fuel with non-fissile isotopes, if necessary.
4) Limiting the types of reactors deployed to buyer states. In general, breeders are less secure than burners. Sealed reactor modules are more secure than reactors with on-site fuel processing.
5) Providing incentives and assurances for buyer states to go along with all of the above.
6) Application of diplomatic pressure, sanctions, and other economic measures to non-compliant states.
7) Agreement that any reactor declared rogue by the IAEA will be "fair game" for any state feeling threatened.

Footnotes