Change Prefix of files:
for file in Prefix*; do mv "$file" WhatUWant"${file#Prefix}"; done
Diff:
diff <(find /etc | sort) <(find /mnt/remote/etc | sort)
chmod 754:
chmod u=rwx,g=rx,o=r myfile
Calc:
echo $((3*37+12)) # Outputs 123
echo $((2**16-1)) # Two to the power of sixteen minus one; outputs 65535
echo $((103/10)) # Outputs 10, as all these operations are integer arithmetic
echo $((103%10)) # Outputs 3, which is the remainder of 103 divided by 10
Bitwise:
echo $((0xdeadbeef)) # Outputs 3735928559
echo $((0127)) # Outputs 87
Floating Point:
echo 'scale=12; 2.5*2.5' | bc # Outputs 6.25
echo 'scale=12; sqrt(14)' | bc # Outputs 3.741657386773
Kill:
screen -X -S #screen quit
Over ssh:
ssh -t user@host screen -x #screen
Detach:
cntrl + a, d
Next:
cntrl + a, n
Prev:
cntrl + a, p
Search:
awk '/start_pattern/,/stop_pattern/' file.txt
Scroll:
Cntrl + a then esc, enter to exit
Ram reader:
sudo cat /proc/kcore | strings | awk 'length > 20' | less
Hardhat compile:
npx hardhat compile
Hardhat test:
npx hardhat test
Deploy contract:
npx hardhat run scripts/deploy.js --network mainnet
Verify contract:
npx hardhat verify --network mainnet DEPLOYED_CONTRACT_ADDRESS
Check balance:
cast balance ADDRESS --rpc-url $RPC_URL
Send transaction:
cast send ADDRESS "function()" --rpc-url $RPC_URL --private-key $PRIVATE_KEY
About
Founder & CTO @ Azos Finance
Web3 Developer, Builder, and Blockchain Enthusiast
Interests
Web3, DeFi, Smart Contracts, Blockchain Security, Coding, Bioinformatics, SecOps
Location
CA, USA
Contact
penguin@azos.tech
Projects & Work
GitHub - Open source contributions and projects
Azos Finance - DeFi platform and protocols
Links of interest
Ethereum - The world's programmable blockchain
Hacker News - Tech news and discussions
Waterdeep - City of Splendors
[root@c0mput3rxz ~]# uptime
Press & Media
Podcasts
MetaRadio - Humans of MetaGame #2 — Penguin The High Flying Flightless Bird
MetaRadio - Share What You're Makin' w/ Chair & Bacon #1 — Penguin on Never Touch Fiat Again
Mattereum — The Future of Stuff - Ep. 2: From Asset-Backed Finance to Art with a Message
Articles
Toilet Paper NFTs Wipe Out $7 Million in Medical Debt - Fortune
Partnership with Azos Finance to Power the Collateral Layer of Climate Impact Assets - DIA Oracles
MetaSpecial — MetaFest Is aLive! - MetaGame Substack
A Cypherpunk's Manifesto
Eric Hughes — 9 March 1993 — activism.net
The founding document of the cypherpunk movement. Privacy is not something governments will give you — it must be built. Ten principles that predicted the internet, surveillance capitalism, and Bitcoin.
Secrecy hides from everyone. Privacy is selective disclosure — sharing different things with different people. This single distinction dismantles the “nothing to hide” argument before it can be made.
Privacy is about autonomy, not wrongdoing. You can live entirely in public — no secrets at all — while exercising privacy: choosing what to share, with whom, and when. End-to-end encryption implements this: the message flows openly; only the intended reader decodes it.
Why it matters now
- A doctor shares your diagnosis with insurers — no secret, but a privacy violation
- 40 apps know your location — you hide nothing, but you are not private
- GDPR Art. 5 encodes this as “data minimisation” — thirty years after Hughes wrote it
Every transaction leaves a trace. Individually harmless; aggregated, a surveillance-grade profile. Laws can’t stop people talking. The fix is architecture: don’t create data that can be combined.
Name: harmless. Employer: harmless. Neighborhood: harmless. Name + employer + neighborhood + commute + purchases = dossier. Hughes saw this in 1993, before Google, before Facebook, before Cambridge Analytica.
Validated by history
- NSA PRISM (2013): metadata aggregation across millions of innocent people
- Cambridge Analytica: 87M profiles harvested from innocuous quiz data
- Data broker industry: $200B/yr selling aggregated personal records
Don’t give what isn’t needed. Cash completes the exchange without binding identity. Hughes invented GDPR’s “data minimisation” thirty years before it became law.
Cash is the gold standard: payment completes, identity never enters. No database, no profile. Hughes wanted digital systems to inherit this property.
Technical implementations today
- Zero-knowledge proofs: prove you’re over 18 without revealing your birthdate
- Signal sealed sender: server doesn’t know who is messaging whom
- Zcash shielded transactions: amount and participants both private
- Apple App Tracking Transparency: opt-in required for cross-app data
Further reading
Cash is anonymous without being secret. Hughes called for digital systems with this same property — sixteen years before the Bitcoin genesis block.
Anonymous ≠ secret. Value moved, the transaction is real — but neither party is identified. The lineage to Bitcoin is direct:
The lineage
- 1989 — David Chaum invents DigiCash (blind signatures)
- 1997 — Adam Back invents Hashcash (proof-of-work)
- 1998 — Wei Dai proposes b-money (decentralised digital cash)
- 2009 — Satoshi Nakamoto mines the Bitcoin genesis block
- 2016 — Zcash: zero-knowledge anonymous transactions go live
Further reading
Encryption is not a feature — it is an expression of intent. Weak crypto is almost an insult to the principle. Strong cryptography is what privacy means in digital form.
In 1993 strong cryptography was a US munition. Exporting it was a federal crime. Hughes wrote this in direct defiance of those controls.
Tools Hughes was referencing
- PGP (1991) — Phil Zimmermann, asymmetric encryption for email
- RSA — public-key cryptography enabling encrypted communications
- Anonymous remailers — chains of encrypted hops obscuring message origin
Modern descendants
- Signal Protocol — end-to-end encrypted messaging
- TLS/HTTPS — now covers ~95% of web traffic
- Tor — onion routing for anonymous browsing
- GPG — PGP successor, still used for code signing today
Further reading
Privacy will never be given — it must be taken. No law or terms of service substitutes for a technical guarantee. Thirty years of mass surveillance revelations have validated every word of this.
Government surveillance since 1993
- 2013: Snowden reveals NSA PRISM — bulk collection from major tech companies
- GCHQ Tempora: bulk interception of undersea fibre cables
- China Social Credit System: comprehensive behavioural surveillance
Corporate data collection
- Cambridge Analytica: 87M profiles harvested without consent
- Google: tracks across sites, apps, and physical location
- Data brokers: dossiers with thousands of data points per person
Further reading
Privacy protection is an ancient human tradition, not a radical new idea. The digital age needs digital equivalents. And it requires collective participation: if only dissidents encrypt, encryption becomes a red flag.
Individual privacy depends on collective behaviour. If only activists use encrypted email, encryption marks them as suspicious. If everyone uses it, it’s just email.
Historical tools → digital equivalents
- Whispers → end-to-end encrypted messaging (Signal)
- Sealed envelopes → HTTPS everywhere
- Locked doors → full-disk encryption
- Couriers → Tor onion routing
- Secret handshakes → cryptographic signatures
Further reading
Don’t lobby — build. Open-source code distributed worldwide cannot be seized by any one jurisdiction. Code that spreads cannot be uninvented. PGP, Tor, Signal, Bitcoin all followed this imperative.
Publishing code is not just generosity — it’s strategy. Code in one jurisdiction spreads everywhere instantly. A widely-dispersed open-source project cannot be shut down by any single authority.
Direct cypherpunk projects
- PGP (1991) — Phil Zimmermann, email encryption, still used 30+ years on
- SSL/TLS (1995) — encrypted web, now universal as HTTPS
- Tor (2002) — onion routing, used by journalists and dissidents worldwide
- Bitcoin (2009) — Satoshi Nakamoto, decentralised anonymous digital cash
- Signal (2013) — Moxie Marlinspike, E2E encrypted messaging at scale
Further reading
Morally: encrypting is private speech. Practically: laws end at borders, the internet doesn’t. Hughes wrote “ineluctably” — unavoidably. Written during the US Crypto Wars of 1993. He was right.
The First Crypto War (1990s)
- NSA Clipper Chip: backdoored encryption standard for all US comms
- ITAR export controls: treating encryption as a weapon
- Phil Zimmermann prosecuted for releasing PGP internationally
- Result: controls lifted by 1999. Cypherpunks won.
The Second Crypto War (2010s–present)
- FBI vs Apple: demanding iPhone backdoor after San Bernardino
- EARN IT Act: legislation to undermine E2E under child safety framing
- Australia Assistance and Access Act 2018: compelled backdoors
Further reading
Tools alone aren’t enough — privacy requires social adoption. Hughes admits Cypherpunks can be wrong and need dialogue. A commons, not a club. Anyone can use the code. Anyone can join the conversation.
Progress since 1993
- HTTPS: ~0% → ~95% of web traffic over 20 years
- Signal: 40M+ active users
- Tor: ~2M daily users
- But: surveillance capitalism still dominates mainstream internet
The unfinished project
Hughes ends with “Onward.” — not “done.” Thirty years later the work continues. Anyone can use the code. Anyone can join the conversation.
Further reading
Original text: activism.net/cypherpunk/manifesto.html
Author: Eric Hughes — 9 March 1993