Mailing List

Welcome to Cypherpunks Tonga! is a center for research and development of cypherpunk projects such as remailers, anonymous peer-to-peer services, secure network tunnels, mobile voice encryption, untraceable electronic cash, secure operating environments, etc.

The slides from Lucky Green’s DEFCON X talk, Trusted Computing Platform Alliance: The mother(board) of all Big Brothers, are now available in the following formats:

If you have questions or comments regarding this site, please contact The Cypherpunks Webmaster.

Information (see also: Security Resources)

Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on cryptology… (Original Cypherpunks Home Page)
A group of thinkers, programmers and researchers dedicated to preserve everyone’s freedom of speech through action.

See also: Cypherpunk Mailing List Archive
Crypto Archive (Quadralay)
Lots of good links!
EPIC report: Cryptography and Liberty 2000
An International Survey of Encryption Policy
The Jargon File – a hacker lexicon [ frames]
Privacy, Profiling & Commerce Protocols from the W3C
Note especially the Platform for Privacy Preferences Project (P3P)
Security News Network (SNN1)
used to be HNN (Hacker News Network)


CoMedia Consulting
Network security consulting.
Primary developer of OpenPrivacy and Broadcatch.
Cryptography Research (commercial)
Check out the attack on SmartCards called Differential Power Analysis
used to be L0pht Heavy Industries
Sword & Shield (consulting)
Security Site Links
Financial Cryptography based on Ian Grigg’s Cryptix Java cryptography toolkit

Hacking Cracking / Phreaking Resources
(see also: Testing Network Security)

2600 Magazine
The Hacker Quarterly
AntiOnline – educating you about the weaknesses in your system
„A Rick’s Cafe in the Casablanca world of hacking”
Fight Back! (against people hacking into your system)
Phreaking box archive
Anarchy Now (RIP)
Fravia (if down, try here)
Software reverse engineering and web survival arguments
See e.g. Academy of Reverse Engineering
Humor? Worth a visit — thought provoking & fun.
Neophyte Text File Haven
Guide to Lock Picking
Additional Lock-Picking Resources
„The Links”
Silicon Toad (RIP)


The Anonymizer
A service that allows you to surf the web without revealing any personal information
Crowds operates by grouping users into a large and geographically diverse group (crowd) that collectively issues requests on behalf of its members.
„enables responsible corporations to control their online personal information practices in a dynamically changing environment”
provides anonymous web access services
iProxy: An Agent-Based Middleware
„designed to give Internet users the privacy that they deserve and to counter the attempts by certain organizations and groups to police the minds of people participating in a global community.”
The Lucent Personalized Web Assistant (LPWA)
A research demonstration tool that enables you to enjoy personalized services on the Web while preserving your privacy.
Onion Routing (See also:
A Navy research project working to build Internet systems that are strongly resistant to traffic analysis, eavesdropping, etc.
Onion routing is used by ZKS and was originally by the cypherpunk‘s encrypting anonymous remailers.
A next-generation anonymizer
Zero Knowledge Systems
Freedom – Privacy technology that empowers you to manage your identity on the Internet

Remailers and Privacy-Enhanced Email (see also: PGP)

web-based email with end-to-end security
Mixmaster Remailers
Mixmaster is the next generation of remailers, using advanced techniques to make most methods of tracing remailed messages useless.
Remailer List at
An excellent resource with lots of useful information and links, including
The original cypherpunks remailers page
More remailers, and still more from Yahoo!

Censorship-resistant Anonymous Publishing

Eternity Service
A distributed document store which is hard to censor.
Based on Ross Anderson‘s paper The Eternity Service
Free haven
a system for distributed data storage which is robust against attempts by powerful adversaries to find and destroy stored data
The Freenet Project
a peer-to-peer network designed to allow the distribution of information over the Internet in an efficient manner, without fear of censorship.
Anonymity for content providers in the World Wide Web
Or do you want to use
Mojo Nation
Mojo Nation creates a digital marketplace for the exchange of idle disk space, bandwidth, and CPU cycles
An open source, crytographically secure, transparent to the user, distributed platform for creating, maintaining, and selectively sharing profile information
a Web publishing system that is highly resistant to censorship and provides publishers with a high degree of anonymity
TAZ Servers and the Rewebber Network
Enabling Anonymous Publishing on the World Wide Web

Ban spam


Boycott Internet Spam!
The Coalition Against Unsolicited Commercial Email (CAUCE)
CAUCE Resources
Pending Legislation
The Network Abuse Clearinghouse
WSRCC Spam Archives

Technical (See also: Inter-network Security)

Anti-relaying provisions in Sendmail 8.9
Anti-Spam provisions in Sendmail 8.8
Using check_* in Sendmail 8.8
The WSRCC sendmail-8.8.8 spamfilt.m4 file
Mail Abuse Prevention System (MAPS)
MAPS Realtime Blackhole List (RBL)
MAPS Relay Spam Stopper (RSS)
Open Relay Behaviour-modification System (ORBS)
a validated database of open mail relays and open mail relay output points, accessable via DNS lookup
Qmail home page

Algorithms and Code

AES – Advanced Encryption Standard
The government’s successor to the broken DES based on the Finnish Rijndael algorithm.
„An international volunteer effort to produce robust, open-source cryptographic software libraries.”
Cryptix maintains an excellent resources page.
home of crypto++, a public domain crypto library
cryptopp links to algorithms, products and libraries
Netscape Security Services (NSS)
NSS for Java (JSS)
based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson
a free Java-only implementation of the SSLv3 and TLSv1 (RFC2246) protocols
PGP – Pretty Good Privacy
The International PGP Home Page (EFF)
PGP (Pretty Good Privacy) is a program that gives your electronic mail something that it otherwise doesn’t have: Privacy. PGP can also be used to apply a digital signature to a message without encrypting it. Find out more, and use this valuable tool for democracy!
GPG – The GNU Privacy Guard
GPG is the Free Software (GNU) version of PGP
See also: the xPrivacy Guard
PGP/GPGKey Servers
List of Public Key Servers (from PGPi)
The WWW Based PGP 5.0 Key Server System
University of Paderborn
More links
PGP 2.6.2 Hypertext documentation
PGP 2.6.2: FAQ, Known Bugs, and Improvements
PGP – MIT distribution page
PGPfone – turns your desktop or notebook computer into a secure telephone
A Simple Distributed Security Infrastructure (SDSI)
SPKI/SDSI Certificates
Common Data Security Architecture (CDSA) by Intel
CDSA sourceforge code repository
a Python implementation of the SPKI Certificate standard
XML Security Suite for Java (IBM)
This is essentially an implementation of public standards. Please email [email protected] and ask them to release this excellent enabling technology – otherwise, we (or someone else) will simple have to recreate it.

Documentation and Resources

A Cryptographic Compendium
by John Savard
Cryptography A-Z
SSH Communications Security (Finland)
Cryptography FAQ
from RSA Labs
Cryptography and Security resources
compiled by Ron Rivest
OpenBSD Crypto Page
the OpenBSD project has embedded cryptography into numerous places in the operating system
Standard Cryptographic Algorithm Naming
an excellent source of references for definitions and cryptanalysis of various algorithms.


a new suite of internet protocols that perform the function of DNS, TCP, and UDP in a manner that’s both untraceable and untappable.
IP Security Protocol (ipsec)
designed to flexibly support combinations of authentication, integrity, access control, and confidentiality
Linux FreeS/WAN
The idea is to deploy PC-based boxes that will sit between your local area network and the Internet (near your firewall or router) which opportunistically encrypt your Internet packets

Other stuff
Purveyors of Stronghold, a secure apache-based web-server
Data Hiding
the concealing of information in some other form of media
ReadThis! Java Encoder/Decoder
Works in conjunction with ReadThis! Palm software
Secure Shell (SSH)
SSH Communications Security (Finland)
Makers of SSH IPSEC Express