Avatar
Max
b7ed68b062de6b4a12e51fd5285c1e1e0ed0e5128cda93ab11b4150b55ed32fc
Praxeologist ~ Cryptoanarchist ~ Cypherpunk

New in this edition of the book is a dedicated chapter about nostr with much more depth about Why it works, what is possible with it, and where it needs improvement.

It's probably the first praxological treatise mentioning Nostr!

nostr:naddr1qqgrsdrxveskgvrzv3nrgdmrvcmkvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wpx3yl3

nostr:nevent1qqsx7y0m5hwtf9xprhejay64yegerpql69gxzwgdjkwzhf0xlxh72dcpramhxue69uhhyetvv9ujuar0washyernd35kyetjw3ujucm0d5hsyg9ha45tqck7dd9p9egl6559c8s7pmgw2y5vm2f6kyd5z594tmfjlspsgqqqqqqs3vejrh

Compared to this, the first version was very bad, sloppy logic all over the place.

"If you're not embarrassed by your first release, you've released too late."

Let's see how this one ages.

nostr:nevent1qqsx7y0m5hwtf9xprhejay64yegerpql69gxzwgdjkwzhf0xlxh72dcpramhxue69uhhyetvv9ujuar0washyernd35kyetjw3ujucm0d5hsyg9ha45tqck7dd9p9egl6559c8s7pmgw2y5vm2f6kyd5z594tmfjlspsgqqqqqqs3vejrh

Nah, nostr:nprofile1qqstsw3gkljwt5stm9svt7htvcjlj4ffze4chkcyt4pxxj30xkgeg5qpr9mhxue69uhhqun9d45h2mfwwpexjmtpdshxuet59uq3wamnwvaz7tmjv4kxz7fwdehhxarj9e3xzmny9uqsuamnwvaz7tmwdaejumr0dshs257akr did too I think?

No, I'll wait for some more review of the logic and keep fiddling with it for a bit before it goes in print & audio.

Replying to Avatar waxwing

Warning: do NOT use travala.com any more, if you did.

They directly stole my money.

Here is my response to the customer service agent:

(Customer service agent),

> Sorry for the delay, im ahmed from compliance department, for refund or either processing the booking, the verification is a mandatory step, we require the minimum and basic info for that, and you can pass it easily through the following link :

Let's establish the facts: I have been a regular customer of Travala for years, have done probably a hundred or more bookings through your site - mentioning this *not* to claim some status as a customer (which I do not want, and do not have), but to point out that ZERO times on the website or through any of those transactions was it mentioned that you could simply keep my money and provide no service - i.e. STEAL my money - if I did not pass a verification process -handing over extensive and intrusive personal documents - that you never documented anywhere. And indeed for this booking, again, no such advance warning was given.

So you (that is to say Travala, not you personally!) act exactly as a kidnapper: to give me back the money which is mine, you insist that I hand over security sensitive information. Which I will not do. There are an endless stream of documented violent theft events of cryptocurrency holders, so spreading one's personal information is stupid, and any claim you make to "keep my data safe" is ridiculous, given the equally endless stream of reported hacking events. I do not trust your company with my personal information because I don't trust *any* company with it.

I have been doing Bitcoin development work for over a decade, I will make sure that a lot of people in the community know that Travala steals its customers money, directly, with no apology.

Feel free to pass this message to any management, I would appreciate that.

(me)

That sucks, sorry for the loss, hope you get it back.

Just curious and somewhat sensitive, but was there a coinjoin in the recent transaction history?

This book is in the making for a couple years, just not got the time to rework it for v0.2.0.

The other articles recently where when I got distracted from this work...

I finished the second version of my book!

## The Praxeology of Privacy

### Economic Logic in Cypherpunk Implementation

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both traditions into a unified strategy for making the state irrelevant.

Three axioms. Twenty-one chapters. One conclusion: cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers.

Public Domain. v0.2.0. Published on Nostr.

Thanks a lot to Stephan Kinsella and Eric Voskuil for their tough feedback on the first version, please join them in demolishing the logic of this second edition and help me make the arguments better!

---

Table of Contents

Preface

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.

nostr:naddr1qqgrvvpjx33kgvtrxgen2vfcvcurjqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cwhph63

Part I: Introduction

Chapter 1: The Nature of Privacy

Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.

nostr:naddr1qqgxvdpc8pjrywryxv6nwv3kxsungqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cmtv33p

Chapter 2: Two Traditions, One Conclusion

Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.

nostr:naddr1qqgxzctpxvenverrx93rwv35v3snzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4p7jlc

Part II: Philosophical Foundations

Chapter 3: The Action Axiom

The Action Axiom proves privacy is structural to human action. Deliberation is internal; preferences are subjective; information asymmetry is inherent.

nostr:naddr1qqgxyvecvgexvcnzxyekvefkxvukxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c83cqzs

Chapter 4: The Argumentation Axiom

Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership.

nostr:naddr1qqgxvcfhx5unjdpk8quxxdp3xvcrsqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c3n4fxz

Chapter 5: The Axiom of Resistance

The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.

nostr:naddr1qqgrgvmrxfjxgvmpxg6nqvt9xuurwqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c2v0h9m

Part III: Economic Foundations

Chapter 6: Information, Scarcity, and Property

Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property.

nostr:naddr1qqgx2dr9vv6kgwf5xe3ngdee8y6nzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cgpp3hh

Chapter 7: Exchange Theory and Privacy

Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.

nostr:naddr1qqgrsdfcv5mx2vmxxe3nzvf4xqmxzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4hcvgf

Chapter 8: Capital Theory and Entrepreneurship

Privacy infrastructure is capital requiring present sacrifice for future capability. Entrepreneurial discovery drives innovation. Markets coordinate heterogeneous privacy tools most effectively.

nostr:naddr1qqgxgdeev5ckzer9xy6rvwpnxyukvqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cxcc5c2

Chapter 9: Monetary Theory and Sound Money

Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools.

nostr:naddr1qqgxgwf3xqensef5vvcrvcfs8yuxxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823ceca8xr

Part IV: The Adversary

Chapter 10: Financial Surveillance and State Control

Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.

nostr:naddr1qqgrsdmpvv6n2wfhv5ervdmpxa3kxqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wcwwf6m

Chapter 11: Corporate Surveillance and Data Extraction

Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.

nostr:naddr1qqgrydekxumxvvm9xp3n2vtr89jrxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cduqmxa

Chapter 12: The Crypto Wars

The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.

nostr:naddr1qqgxycfjvyck2vrpxvunycfcxsuk2qgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cwnenzp

Part V: Technical Implementation

Chapter 13: Cryptographic Foundations

Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.

nostr:naddr1qqgxzdt9xcexvef5v3jrsefexsunzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c94u5pd

Chapter 14: Anonymous Communication Networks

The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.

nostr:naddr1qqgrydphv9nrgcfcxg6ryvrzx56kzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cvp8fcy

Chapter 15: Bitcoin: Resistance Money

Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.

nostr:naddr1qqgrwv33xvenvdnyxc6ngv3hv5mxxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4qzyqz

Chapter 16: Zero-Knowledge Proofs

Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.

nostr:naddr1qqgrjd33vvcxyv3kvyurydfexscrgqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65we3mut9

Chapter 17: Decentralized Social Infrastructure

Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.

nostr:naddr1qqgrsdrxveskgvrzv3nrgdmrvcmkvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wpx3yl3

Part VI: Praxis

Chapter 18: Lessons from History

DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives.

nostr:naddr1qqgxydmpv56nqefnv4jnwepcxdjx2qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wm4wp04

Chapter 19: Operational Security

Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.

nostr:naddr1qqgrxep3vscrzc3kxyenqdpex9jnzqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wyp98rv

Chapter 20: Implementation Strategy

Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.

nostr:naddr1qqgxvdtyx43nwvmxvcckgerx8qmnvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wmuawxl

Chapter 21: Building the Parallel Economy

The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.

nostr:naddr1qqgxxefj89nrxvtrxcerxvfs8q6xvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wat25hx

You've been trained since childhood to believe you cannot function without state permission and provision. The programming runs so deep that even reading this, you'll feel resistance to acting on it.

But learned helplessness has a cure: you must demonstrate to yourself that you have control by actually exercising it. This post maps the escape routes. The only question is whether you'll take one.

nostr:naddr1qqgxzceevenrgcnzvf3r2epsvsur2q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wxhqpjk

This is great, been in the works for a while.

nostr:naddr1qqgrgwrpxq6rxv3n8qurxvf4x33ryqg4waehxw309aex2mrp0yhxgctdw4eju6t09upzqg42s9gsae3lu2cketskuzfp778fh2vg9c5x3elx8ttdpzhfkk25qvzqqqr4gud03mcy

Replying to Avatar Delta, Dirac

Given how information can spread, any attempt to influence another person, any exchange of information becomes sort of political.

My premise is that there is something psychological that makes bitcoin very difficult for people to understand, even if they seem like the sort of person who should get it. Rather than trying to get more people directly, bitcoiners can think about the values they have, and how that relates to the world can look like, and start building that world today even if people don't know they are moving toward decentralization.

For instance, if I can get various nations that have stronger anti-communist positions to have conventional weapons that secure their sovereignty, it is similar to an individual having firearms rather than calling the police. Given the massive swings in different regions, left or right, there are various places not necessarily to change people who cannot be changed, but to strengthen and align with those that are forming environments conducive to bitcoin by protecting property rights.

It is within right wing nations that the drive for individual sovereignty then can propagate.

Bitcoiners should actually become powerful, influencing political organizations and industrial production at a global scale. The fact that the Samurai devs are still in prison shows how weak bitcoiners are. The fact that no bitcoiner had control of a public company worth a billion or so in 2020 until Saylor came along shows the extent to which OG bitcoiners are not really doing much.

Instead of asking the world to adopt bitcoin and waiting for them, bitcoiners should just take the world. Every political influencer is usually controlled by capital, as is every industrialist, but bitcoin enables operating with an irreverence toward existing power structures that is magnetic in any field. The world is changing so quickly now, and so much wealth is being generated, an import export perspective means bitcoin grows purely on "exports" regardless of new adopters.

My premise is the "total crypto-anarchy" utopianism, which is always full of lots of hand waving, is not so much about true ideals, but an excuses for inaction in various domains.

I agree on many points.

Just a nuance is that I define "political means" as acquiring wealth through coercion, from Oppenheimer.

Something as important as healthcare cannot be left in the hands of monopolistic bureaucrats.

Go to a freer place like south east Asia and see the private healthcare there, it'll blow your mind.

What if a state court says that the murder was accidental and doesnt punish the neighbor? In the state system you cannot do anything about that. In a free system the entire village might come for your defense.

You do notice that you repeated the main premise of the question, so I'd suggest you contemplate and broaden your imagination. You don't need to steal to get healthy or get justice!

Privacy IS.

Privacy OUGHT TO BE.

Privacy CAN BE.

Phil Zimmermann's 1992 vision for decentralized trust collapsed under its own weight. Key signing parties, trust levels, keyring management: the people who most needed encrypted communication couldn't navigate the bureaucracy.

Nostr inverts the model entirely. Every follow is an endorsement. Every mute is a warning. Every zap is an economic vote. Trust emerges from actions users already take, computed by tools like Vertex and npub.world into personalized reputation scores. The cypherpunk lesson: the best cryptographic systems are the ones users don't notice.

nostr:naddr1qqgrwd34vvek2wf5ve3nwcmrxycrxq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wrp5t4t

Most resolutions dissolve by February. These are not those. They are not self-improvement projects or lifestyle optimizations. They are the ethical commitments that separate those who talk about freedom from those who live it. Seven principles, each actionable, together forming the foundation of a society built on consent rather than coercion.

nostr:naddr1qqgrxcenxanr2e33vyervcee8qurjq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wfmv9qx

History remembers the revolutions that seized power. It forgets the quieter departures: the people who simply stopped showing up, stopped believing, stopped feeding the machine.

The latter changed more. We are not marching on anything. We are walking away from everything that requires our compliance to exist, and building something that does not.

nostr:naddr1qqgxvetxvc6xgcejvdjkywfh893xxq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wxs58dr

nostr:nprofile1qqszpxr0hql8whvk6xyv5hya7yxwd4snur4hu4mg5rctz2ehekkzrvcpz4mhxue69uhkummnw3ezuvtnv96zummjvuhsz9thwden5te0dehhxarj9cc8sdm99eu8j730qyv8wumn8ghj7un9d3shjtnsd3jkyum5wghxxmmd9ujkmvl8 the latest release breaks opening the file explorer for adding an image, the file manager crashes after opening.

Everyone overcomplicates wealth. They chase credentials, connections, luck, or schemes.

The mechanism is simpler: find problems, solve them, trade the solution. This works because value is subjective, your own frustrations are your greatest asset, and solving problems pays you twice: once in satisfaction, once in money.

nostr:naddr1qqgrzvtxvvmkzd3jx93rvvnyv5mxyq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wpwwem5

The cryptoanarchist vision is forty years old. The theory is complete. The tools exist. Yet we have almost nothing to show for it.

The bottleneck was never ideas or technology. It was always people willing to build. This is a call to those ready to act, and an honest warning about what that requires. nostr:naddr1qqgrqcmxvdskzetzxcmrxdmrxy6r2q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65w62jx9s

It's difficult to sue the state in courts that are funded by the state...

Forty thousand Americans die on government roads every year, and nobody holds anyone accountable. Yet when libertarians suggest private alternatives, the response is always the same: "But who will build the roads?" The question itself is more interesting than people realize. It reveals not the impossibility of markets, but the depth of the state's success in making people unable to imagine alternatives to its failures. nostr:naddr1qqgxywfsxccxgdmxxscngcnx8qcnyq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wu8l4h8