Amir Taaki was one of Bitcoins first-ever dedicated developers and perhaps the one most infamously focused on maintaining privacy and freedom from authority.
In 2014, Forbes listed Taaki on its 30 Under 30 list of technology stars for creating Dark Wallet, the first privacy-focused Bitcoin wallet to include a CoinJoin mixer. That same year, Taaki received even more notoriety as Dark Wallet was twice named in the Financial Action Task Forces (FATF) report on the potential money-laundering and terrorist-financing risks posed by cryptocurrencies.
In 2015, Taaki traveled to Rojava, Syria, to serve with the YPG Military, a component of the Syrian Democratic Forces fighting the Islamic State of Iraq and Syria (ISIS). After months of fighting on the front, he spent more than a year working with Rojavas economics committee.
Taaki also created Libbitcoin and Bitcoins BIP proposal system as well as DarkMarket, the prototype for what eventually became OpenBazaar, an open-source protocol for e-commerce. Outside of his development work, Taaki also founded the anarchist group UnSystem, which included Cody Wilson, creator of a 3D-printable gun, and Mihai Alisie, co-founder of Bitcoin Magazine and Ethereum.
Now, Taaki has returned as a contributor to multiple projects, many of which have not yet been revealed to the public. Although he is not ready to completely reveal his hand, the dissident technologist expressed a strong appreciation for the people in the crypto community, as well as a loss of confidence in its leadership and overarching direction.
For Taaki, what became a lifelong dedication to building technology free from authoritarian intervention started with an interest in what draws many people to Bitcoin: the promise of open-source development for breaking from authority.
I happened to be 16 when I discovered the open-source movement, which, for me, was absolutely incredible that there are people around the world who build this technology which plays a foundational role in our infrastructure and our internet, Taaki told Bitcoin Magazine. I kind of decided, Im going to devote my life to make this dream happen. And it was something that captured my mind for the next decade.
From his open-source involvement, Taaki found other technologists who were deeply concerned with politics. Of the many ideologies he was exposed to, he found anarchy especially interesting. It led him to ask questions about the nature of society and hierarchy and how a richer and more sophisticated society could be created. He saw Bitcoin as an unstoppable force to this end.
[At] my first talk about Bitcoin in Amsterdam, it was the EPCA conference I said, look guys, this is a radical technology. Now were here, you cant stop us, Taaki recalled. This is what were going to do for you.
Sometimes, his strong anti-middleman stance put him in direct conflict with other early Bitcoin developers another group he saw as a roadblock to free and open development as he defined it.
Gavin Andressen reached out to me and said, I didnt really like how you were talking at the conference. I think you should stop talking about Bitcoin publicly, Taaki said. Gavin preceded to put up roadblocks for me to participate in developing Bitcoin to sideline me from Bitcoin. Every time I tried to commit code to the Bitcoin Core project, it was blocked and I realized it was impossible for me to work with those people. Thats why I started working on Libbitcoin, to rewrite Bitcoin source code to have alternative implementation.
Taakis work on the BIP review system was originally intended to establish some standardization for implementations and public review of changes to the code. But he now sees the system as a hindrance on development in Bitcoin that favors the status quo over technological progress.
The problem is that the culture we initiated in those early days has completely overtaken the mindspace of Bitcoin, explained Taaki. That was not the original intent. Originally, the intent was to have Bitcoin be a conservative against changes. But it wasnt to stop any kind of progress from happening inside of Bitcoin. Its very poorly engineered. Its very inefficient. The developments in cryptography that are happening now are going to lead to a system thats eventually going to supersede Bitcoin.
Looking back at the Bitcoin community he had been a part of in the early 2010s, Taaki sees distance between the philosophies that first drew him to the technology and the philosophical camps that have been established today.
What weve seen happen since then is that those simplistic ideologies, which initially converged around Bitcoin, havent really been able to guide us, he said. And so weve seen a diversification from these ideologies Theres this weird, regressive or reactionary Bitcoin culture ... and its opposed to any kind of change or progress or development or advancement.
Taaki also noted concerns about the cryptocurrency space he had been a part of years ago now being co-opted by outsiders business- or authority-focused groups who want to take technology out of the hands of the idealistic cypherpunks who worked with Satoshi to usher in the era.
Were in this very strange place inside of crypto culture where were facing significant challenges to the technology, of it being co-opted by external actors, by actors who dont necessarily have a philosophical vision or goal we originally had in mind, he said. Maybe Im talking about people like ConsenSys, or maybe Im talking about central bank digital currencies or Facebook Bottom line: The only way that were going to overcome these challenges is by having coherent analysis, a system of organization and some kind of narrative so that we can develop something thats coordinated.
After leading the technological development and ideological conversation around Bitcoin for nearly five years, Taaki traveled to Rojava, an autonomous region in Northern Syria where forces were trying to build and defend a direct democracy based on Libertarian, socialist and anarchist principles that promoted decentralization, gender equality, environmental sustainability as well as religious, political and cultural tolerance and diversity.
Despite seeking a technology development role, Taaki spent his first year in Rojava serving on the front lines of a war with ISIS.
It was mad, Taaki explained. I was literally shipped to war, handed a kalashnikov as we were driving to the frontlines and told, Dont worry, if youre not dead in two weeks, youll know everything there is to know about fighting in a war. It was a mad time. It was chaos, but I managed to get out of that position after a few months.
Taaki returned to Syria in 2019, this time in a role reviewing technical projects for the region.
I was looking at open-source solutions, like how to build a mobile phone network, he said. I also looked at how we could deploy cryptocurrencies. The so-called leaders I reached out to were very limited in their thinking and did not offer much support Theres so much to consider and if your goal is to create the infrastructure for five million people, its so different from making individual accounts for an app-based marketplace you can download.
If this seems like an opportunity for one of Bitcoins most prominent developers to implement the technology in a region that could clearly benefit from it, Taaki emphasized that it wasnt.
The reality is if any administration in the world were to say that they wanted to deploy Bitcoin in a region of their country, there is no group that has the software infrastructure ready to set up a reliable financial network, Taaki explained. For example, if in Hong Kong, theres a guy who has Bitcoin, he can extend a line of credit to Syria, and he can cash out to a local pool of dollars. Or people in Syria who have assets like oil can issue futures or upper-finance instruments on that asset so that they can get investment to build their infrastructure. Theres a really great application of this technology, but were just not thinking on that level.
Taaki lists oft-lauded use cases in places like Venezuela, Cyprus and Iran as distractions that keep the Bitcoin community from truly preparing the technology to help distressed places around the world before they are too far gone.
Those were lost opportunities, he said. Its sad, thats our failure as a community. And those future opportunities should be what we choose to face and engage in our market so we can develop better technology. But were not doing that right now. Instead, its a bunch of technologists playing around with blockchain technology. I see no practical basis in reality to what were doing right now.
In addition to his work promoting a freer society in Syria, Taaki is establishing an academy in Barcelona that incubates new technology projects and offers training in cryptocurrency development. Hes also working on Nym, which he described as an alternative to Tor. Of course, his mission to strengthen the privacy and freedom from authority inherent in technologies like Bitcoin is an ongoing focus as well.
Im also working on anonymization of cryptocurrencies and products, Taaki said. The same same technology I am building out will be a platform or a library that we can use to build other products like decentralized exchanges, marketplaces and also a generalized platform for issuing anonymous smart contracts and other financial instruments A lot of people are asking for a new release of Dark Wallet, but Im not going to release a bad product. CoinJoin is broken but I will develop something thats better.
Ultimately, Taakis is a working life dedicated to strengthening tools in the hands of dissidents those who seek to communicate and transact without interference from political authorities, who hope to establish a better and freer society.
The legacy of the civilization that we live in is a state-based civilization based off of a hierarchical system of control and specialization of labor, which leads to all of the modern problems we have, Taaki said. We want to create a different kind of society, which is free, where people have liberty and the natural wealth of peoples creative energies is developed and nurtured. The emerging field of cryptography offers us a power that we can use to create new financial instruments and networks that can be used as a tool to stop state power and control, and create space where marginalized communities can operate outside of state control.
An expanded version of this conversation will be released on the Bitcoin Magazine Podcast.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
See the rest here:
Amir Taaki on Bitcoin and Building Dissident Technology in 2020 - Nasdaq
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]