<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Project Glitch]]></title><description><![CDATA[Crypto contains multitudes]]></description><link>https://www.projectglitch.xyz</link><image><url>https://substackcdn.com/image/fetch/$s_!UpVg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059367eb-f050-4cf6-9b7f-f91d3ac4648b_902x902.png</url><title>Project Glitch</title><link>https://www.projectglitch.xyz</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 18:36:13 GMT</lastBuildDate><atom:link href="https://www.projectglitch.xyz/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Project Glitch]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[projectglitch@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[projectglitch@substack.com]]></itunes:email><itunes:name><![CDATA[Project Glitch]]></itunes:name></itunes:owner><itunes:author><![CDATA[Project Glitch]]></itunes:author><googleplay:owner><![CDATA[projectglitch@substack.com]]></googleplay:owner><googleplay:email><![CDATA[projectglitch@substack.com]]></googleplay:email><googleplay:author><![CDATA[Project Glitch]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[How private can a stablecoin be?]]></title><description><![CDATA[Recapping the Stablecoin Privacy Summit]]></description><link>https://www.projectglitch.xyz/p/how-private-can-a-stablecoin-be</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/how-private-can-a-stablecoin-be</guid><dc:creator><![CDATA[Project Glitch]]></dc:creator><pubDate>Thu, 23 Apr 2026 17:43:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Q8cx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hey there! Earlier this month, we held our third in-person event, the Stablecoin Privacy Summit, in Washington, DC. This issue delves into some of the key takeaways.</em></p><div><hr></div><h2>Stablecoins and privacy: it&#8217;s complicated</h2><p><em>by Mike Orcutt</em></p><p>Stablecoins are about to go mainstream.</p><p>Are they, though? The prediction, prevalent in the crypto world since the United States passed the first-ever regulatory framework for stablecoins last year, faces a challenge.</p><p>Blockchain-based financial services have an &#8220;inherent potential privacy problem,&#8221; Dante Disparte, chief strategy officer and head of global policy at Circle, <a href="https://youtu.be/NedD4819h20?si=IhrW3Fx18odwPjFa">acknowledged on stage</a> at Project Glitch&#8217;s Stablecoin Privacy Summit in Washington, DC, this month.</p><p>Enthusiasts hail stablecoins as the future of money, and Disparte engaged with the idea via an oft-used example: payroll, a plausible use case for stablecoins. Imagine you are a payroll provider. &#8220;It&#8217;s not obvious to you that you want to use an innovation that will permanently and irrevocably record the bilateral transactions of your payroll on a public ledger.&#8221; Without privacy, he said, &#8220;it is not likely that this future of money is going to reach its full potential.&#8221;</p><p>Whether that happens will hinge on a number of complex technical and legal dimensions, which we wrestled with at the Stablecoin Privacy Summit. The event revolved around a central question: How private can a stablecoin be?</p><h3><strong>An opening in Washington</strong></h3><p>This conversation is timely. Last July, President Trump signed into law the Guiding and Establishing National Innovation for US Stablecoins (GENIUS) Act, putting a shiny mainstream gloss on the kind of stablecoin that is backed by dollars held in a traditional bank account. Multiple federal regulators are now developing rules and standards that companies that issue stablecoins must follow. That includes rules for how those issuers should manage the risk of illicit finance, a topic that has pitted crypto privacy advocates against the government since at least the beginning of <a href="https://www.projectglitch.xyz/p/why-the-tornado-cash-saga-isnt-just">the Tornado Cash saga</a>.</p><p>At the center of the conflict is the Bank Secrecy Act, America&#8217;s anti-money laundering law, which, among other things, requires financial institutions to verify the identities of their customers, monitor transactions, and report cash transactions of over $10,000 and any others that appear suspicious to the Treasury&#8217;s Financial Crimes Enforcement Network (FinCEN). The developers of and participants in <a href="https://www.projectglitch.xyz/p/will-the-real-defi-please-stand-up">truly decentralized networks</a> are unable to fully comply with these obligations&#8212;at least without defeating the purpose of the technical decentralization. Nonetheless, many policymakers still argue that such protocols should be regulated the way traditional financial institutions are. And US prosecutors are <a href="https://bitcoinmagazine.com/news/tornado-cashs-roman-storm-new-trial">aiming to re-try Tornado Cash developer Roman Storm</a> on money laundering and sanctions evasion charges after a jury failed to reach a verdict on those charges last year.</p><p>The legal impasse may be shrinking, however, starting at the top. &#8220;This moment serves as a valuable opportunity to comprehensively review the [anti-money laundering/countering the financing of terrorism] regime to ensure it protects the financial system from abuse without impeding on the rights of law-abiding Americans,&#8221; President Trump&#8217;s Working Group on Digital Asset Markets declared in <a href="https://www.whitehouse.gov/wp-content/uploads/2025/07/Digital-Assets-Report-EO14178.pdf">a long report</a> it published last summer. The group added that &#8220;updates&#8221; to AML/CFT regime would make the sector safer and more resilient.</p><p>Congress seems open to the idea, too. The GENIUS Act directed the Department of the Treasury to <a href="https://www.federalregister.gov/documents/2025/08/18/2025-15697/request-for-comment-on-innovative-methods-to-detect-illicit-activity-involving-digital-assets">solicit public comments</a> on &#8220;innovative methods to detect illicit activity involving digital assets,&#8221; with an emphasis on artificial intelligence, digital identity, blockchain monitoring and analytics, and application programming interfaces.</p><p>There are plenty of ideas for what those new methods might be, thanks in part to powerful emerging cryptographic capabilities. Sophisticated tools like zero-knowledge proofs, for example, make it possible to prove facts about one&#8217;s identity without revealing any personal information in the process. In decentralized systems where individuals are anonymous but still need to prove they&#8217;re not criminals in order to send or receive money, this could be useful.</p><p>Such tools might solve another issue as well. Traditional banking, credit, identity, and online commerce systems collect and store people&#8217;s credentials in centralized repositories. They&#8217;re so tempting to sophisticated hackers&#8212;including those backed by nation states like North Korea&#8212;that they&#8217;re often referred to as &#8220;honeypots&#8221; and have been the targets of several large data breaches. Credentials protected by zero-knowledge proofs, in theory, could help get rid of the honeypot problem, because they work without ever having to leave an individual user&#8217;s device. &#8220;The diffuse nature of this type of digital identity may also create fewer large identity targets for illicit actors to exploit,&#8221; the Treasury noted in a <a href="https://home.treasury.gov/system/files/246/GENIUS-Act-Illicit-Finance-Innovation-Congressional-Report-March-2026.pdf">recently published report to Congress</a> about the findings from last year&#8217;s request for public comment.</p><h3><strong>Why we&#8217;re talking about stablecoins</strong></h3><p>For most of their existence, fiat-backed stablecoins have been far from &#8220;innovative,&#8221; at least as far as crypto things go. And the vast majority of their utility has been for crypto traders who use them to take their money out of the market without cashing out into fiat currency. But the GENIUS Act paved the way for their broader adoption as a payment method&#8212;an alternative to credit cards and wire transfers.</p><p>&#8220;Peer-to-peer electronic cash&#8221; was what Bitcoin was supposed to be. There are many reasons it hasn&#8217;t become that, but it doesn&#8217;t help that blockchains, as originally designed, are not private. It&#8217;s the same problem Disparte flagged. Analytics firms like Chainalysis and TRM Labs crunch public blockchain data to track funds and determine whose real-world identities are hiding behind pseudonymous addresses.</p><p>&#8220;Crypto has survived not having privacy because nobody uses crypto,&#8221; Johns Hopkins University cryptographer Matthew Green said during <a href="https://youtu.be/ti8_S6jaYpE?si=mlEXsbv6i_lQUXf7">a later session at the Stablecoin Privacy Summit</a>. Now that there&#8217;s mainstream interest in stablecoin payments, something has to give.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q8cx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q8cx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!Q8cx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!Q8cx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!Q8cx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q8cx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1003113,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/195243259?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q8cx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!Q8cx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!Q8cx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!Q8cx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ff00106-003c-4485-93ef-8e19248a2332_4032x3024.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From left to right: Peter Van Valkenburgh, Ian Miers, and Matthew Green</figcaption></figure></div><p>&#8220;Stablecoins, in theory, are a thing that could make crypto useful for actual applications,&#8221; Green said. &#8220;And the minute you do that, you have to confront the fact that you&#8217;re running around putting all your data on a blockchain.&#8221;</p><p>Zero-knowledge proofs could help here, too, by keeping blockchain data secret. That&#8217;s how Zcash, which Green helped invent, works. It&#8217;s also how private chains like Aztec and Aleo work. In fact, there are already stablecoins on Aleo (Green is also an advisor at Aleo). One, called USDCx, is backed by Circle&#8217;s USDC stablecoin. Another, called USAD, works similarly and is backed by Paxos&#8217;s USDG stablecoin.</p><p>How private are these stablecoins, though? Getting to an answer requires first wading into the legal and policy weeds, and, from there, into the technical weeds. Regulators have come to expect crypto exchanges, stablecoin issuers, and other entities to monitor transactions and report suspicious activity and even deactivate or &#8220;freeze&#8221; wallets when there is evidence they&#8217;ve been engaged in criminal activity. That&#8217;s not possible if the transaction data isn&#8217;t visible. So the USDCx and USAD systems on Aleo include a component called a view key, which allows whoever holds the key to decrypt all the transaction data associated with the asset if necessary. (For a more detailed explanation, <a href="https://youtu.be/WapK5nfjNp4?si=o8p_b6UV3Cx_BRNJ">watch this Stablecoin Privacy Summit panel</a> featuring Yaya Fanusie of Aleo, Nick Gersh of Paxos, and Nikhil Raghuveera of Predicate.)</p><p>The view key capability raises big legal questions that don&#8217;t yet have clear answers. Just to name a few: Who should hold the view key? What exactly is the view key holder&#8217;s legal responsibility? How should a holder comply with law enforcement requests for information, keeping in mind that such requests may originate from foreign jurisdictions?</p><h3><strong>So how private can a stablecoin be?</strong></h3><p>From a technical standpoint, the tools exist to make stablecoins as private as you want. Shielded transactions? No problem. Full user anonymity? Sure thing. The difficulty is in coming up with a system that will work in the real world, where all the messy aspects of crafting workable regulation, and then enforcing the law, come into play. That&#8217;s what policymakers must wrestle with. They need to decide whether the risks arising in blockchain-based financial systems should be managed using tactics similar to those the law requires of traditional financial institutions, or whether to turn to new approaches more tailored to decentralized networks.</p><p>For now, it seems unlikely that law enforcement will be happy to give up visibility into blockchain transactions, whether that be via public blockchain data or a view key. But what if novel methods for detecting illicit activity in decentralized protocols could achieve <em>better</em> outcomes than the established system? The effectiveness of the traditional AML/CFT regime is hard to quantify due to a lack of unbiased data. But there is plenty of anecdotal evidence that know-your-customer (KYC) regimes can be gamed, and that sort of thing seems bound to get easier as AI gets better at <a href="https://www.404media.co/inside-the-underground-site-where-ai-neural-networks-churns-out-fake-ids-onlyfake/">forging traditional credentials</a>, for example.</p><p>Anonymous identity credentials that can be verified using zero-knowledge cryptography, combined with blockchain smart contracts, offer an alternative direction, Ian Miers, a cryptographer at the University of Maryland, said at the Stablecoin Privacy Summit. Miers, also an advisor to Aleo, was Green&#8217;s co-panelist in <a href="https://youtu.be/ti8_S6jaYpE?si=mlEXsbv6i_lQUXf7">a lively session</a> moderated by Coin Center&#8217;s Peter Van Valkenburgh.</p><p>In theory, a system could automatically calculate dynamic &#8220;risk scores&#8221; for individual users and take actions, like freezing wallets, based on those scores. &#8220;These are programmable systems,&#8221; Miers said. &#8220;You can come up with pretty much any policy, risk scoring metric, behaviors you want, and implement it.&#8221; But this raises three questions, he said. First, what are those policies? Second, do they work? And third: &#8220;Will regulators let you try them for a while?&#8221;</p><p>&#8220;We have really good techniques for identity, for reputation,&#8221; Miers said. In theory, they could be used to make even more private stablecoins. But we can&#8217;t know if they really work and how effective they are until they can be tested. At the moment, however, developers are hesitant to experiment in this area due to uncertainty around legal liability.</p><p>So the answer to the question of how private a stablecoin can be may depend on another question Miers posed: &#8220;Can we get an experimental place to try these things?&#8221;</p><div><hr></div><h2><strong>ICYMI: The Stablecoin Privacy Summit videos</strong></h2><h3>1. <a href="https://youtu.be/NedD4819h20?si=IhrW3Fx18odwPjFa">Why privacy matters for stablecoins</a></h3><p>Circle&#8217;s Dante Disparte in conversation with Michael Mosier of Arktouros</p><h3>2. <a href="https://youtu.be/botP7vGhAPE?si=x7MW2G1qVf-MIkDp">Getting real about the business demand for stablecoins</a></h3><p>Privy&#8217;s Kaili Wang in conversation with Michael Reilly of Project Glitch</p><h3>3. <a href="https://youtu.be/ti8_S6jaYpE?si=oZdlkhG4oO6I7aZ9">How private can a stablecoin be?</a></h3><p>A panel featuring Matthew Green of Johns Hopkins University and Ian Miers of the University of Maryland. Moderate by Peter Van Valkenburgh of Coin Center</p><h3>4. <a href="https://youtu.be/WI7IGJGIyIs?si=rhA_RaKlEB_dKnif">What I learned about crypto privacy while working at the Treasury</a></h3><p>Julie Lascar of Digital Asset</p><h3>5. <a href="https://youtu.be/eDLM8skB2II?si=Pf3toiTUDbYpNeFx">Where crypto policy meets national security</a></h3><p>A panel featuring Kyle Bligen of the Decentralization Research Center, Jessi Brooks of Ribbit Capital, and Isaac Patka of the Security Alliance (SEAL). Moderated by Mike Orcutt of Project Glitch</p><h3>6. <a href="https://youtu.be/9_ZxO5OiQCM?si=2YUHjfFpeGfvUKBL">WTF is zkTLS? And why should you care?</a></h3><p>Hersh Patel of Opacity</p><h3>7. <a href="https://youtu.be/WapK5nfjNp4?si=WeeVO-AYyWAqtnfD">Where the rubber meets the road for private stablecoins</a></h3><p>A panel featuring Yaya Fanusie of Aleo, Nick Gersh of Paxos, and Nikhil Raghuveera of Predicate. Moderated by Mike Orcutt of Project Glitch</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading to the end! If you learned something, please consider subscribing or upgrading to paid. Every bit of support helps!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[Who is responsible when your AI agent misbehaves?]]></title><description><![CDATA[Plus: We&#8217;re planning another privacy-focused event!]]></description><link>https://www.projectglitch.xyz/p/who-is-responsible-when-your-ai-agent</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/who-is-responsible-when-your-ai-agent</guid><dc:creator><![CDATA[Project Glitch]]></dc:creator><pubDate>Thu, 19 Mar 2026 20:33:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Bi-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello again! Sorry we took so long to get back to you&#8212;we&#8217;ve been busy planning another event! More on that below, but first we have a few thoughts on the new questions arising around the rapid development and deployment of AI agents.</em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bi-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bi-n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Bi-n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Bi-n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Bi-n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bi-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg" width="700" height="376" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:376,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Ian Malcolm (Jeff Goldblum - Jurassic Park &amp; The Lost World)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Ian Malcolm (Jeff Goldblum - Jurassic Park &amp; The Lost World)" title="Ian Malcolm (Jeff Goldblum - Jurassic Park &amp; The Lost World)" srcset="https://substackcdn.com/image/fetch/$s_!Bi-n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Bi-n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Bi-n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Bi-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59155618-1eeb-438a-b510-5cf4c1741f26_700x376.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Beholding agents of chaos</figcaption></figure></div><h3>When AI agents go rogue, who is to blame?</h3><p><em>By Mike Orcutt</em></p><p>Who is responsible when an AI system not intended to do bad things does<em> </em>a bad thing anyway? We ought not to dismiss this as a &#8220;doomer&#8221; question&#8212;especially when it comes to agents.</p><p>Just ask Roman Storm and Alexey Pertsev. They helped build the Tornado Cash blockchain software, which uses zero-knowledge cryptography to conceal otherwise public blockchain transactions. The system works via smart contracts, and operates independently of human control. When North Korean hackers began using it in 2022 to launder stolen cryptocurrency, Storm and Pertsev didn&#8217;t have the power to stop the program from running. Law enforcement <a href="https://www.projectglitch.xyz/p/what-more-could-tornado-cash-developer">held them responsible anyway</a>, and they were convicted of financial crimes. (Storm was tried on three different charges, but only convicted on one&#8212;conspiring to operate an unlicensed money transmitter. The US government <a href="https://storage.courtlistener.com/recap/gov.uscourts.nysd.604937/gov.uscourts.nysd.604937.281.0.pdf">has said it wants to try him again</a> for the two charges that ended in a hung jury.)</p><p>After what we saw happen with Tornado Cash, it seems inevitable that humans will get blamed for bad things their agents do.</p><p>We already know that agents will do things contrary to their owners&#8217; intentions. In a new paper called <em><a href="https://arxiv.org/abs/2602.20021?utm_source=substack&amp;utm_medium=email">Agents of Chaos</a>,</em> a team of researchers led by Natalie Shapira at Northeastern University worked together to test whether they could get agents to disobey their owners and do things like disclose sensitive data or spread false information online. In all, they detailed 11 case studies in which they were able to coax an agent into misbehaving. The researchers used the open-source framework OpenClaw to create agents backed by two different large language models, Anthropic&#8217;s Claude Opus 4.6 and the Chinese open-weights model Kimi K2.5. &#8220;We observed that agentic systems operating in multiagent and autonomous settings can be guided to perform actions that directly conflict with the interests of their nominal owner,&#8221; the researchers write.</p><p>It seems safe to say this will raise at least a few legal questions, as well as ethical and moral ones. &#8220;Our findings suggest that responsibility in agentic systems is neither clearly attributable nor enforceable under current designs, raising the question of whether responsibility should lie with the owner, the triggering user, or the deploying organization,&#8221; they add.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><p>What the researchers observed has implications for AI safety more broadly, they argue. &#8220;These behaviors expose a fundamental blind spot in current alignment paradigms,&#8221; they write. &#8220;While agents and surrounding humans often implicitly treat the owner as the responsible party, the agents do not reliably behave as if they are accountable to that owner.&#8221;<em> </em>On the contrary, these agents &#8220;attempt to satisfy competing social and contextual cues, even when doing so leads to outcomes for which no single human actor can reasonably claim responsibility.&#8221;</p><p>In one case study, a person who was not the agent&#8217;s owner managed to trick the agent, which was backed by Kimi K2.5, into revealing its owner&#8217;s social security number and bank account number. That sort of unauthorized disclosure could cause harm to the owner, and in many places it would violate the law. Who then is to blame? The person who tricked the agent into spilling secret information? The developer of the agent&#8217;s code?</p><p>In another instance, someone tricked a different agent running on Kimi K2.5 by changing their Discord display name to &#8220;Chris,&#8221; the name of the agent&#8217;s owner. At first, the agent detected the false ID by checking the Discord user ID, which doesn&#8217;t change when users change their display names. But when the non-owner, still using the display name &#8220;Chris,&#8221; opened a new private channel with the agent, it behaved differently. &#8220;In this fresh context, the agent inferred ownership primarily from the display name and the conversational tone, without performing additional verification.&#8221;</p><p>If someone purposefully deceives an agent, then they&#8217;re probably on the hook for anything bad that happens. But that still leaves important questions, like who is responsible for building the technical infrastructure required for agents to securely verify the identities of the people and other agents they interact with? And for designing agents that we can trust won&#8217;t go rogue? Because we should probably get on that.</p><p>It seems the US National Institute of Standards and Technology (NIST) agrees. The goal of its new <a href="https://www.nist.gov/news-events/news/2026/02/announcing-ai-agent-standards-initiative-interoperable-and-secure">AI Agent Standards Initiative</a> is to make sure that agents &#8220;can function securely on behalf of (their) users&#8221; and &#8220;interoperate smoothly&#8221; with the rest of the internet. That sounds good, but the <em>Agents of Chaos</em> paper suggests we&#8217;re a long way from having that sort of assurance.</p><p>Software systems that can do things autonomously will inevitably expose many of our established systems for doling out responsibility, accountability, and blame as dated, if not trending toward obsolescence. The Tornado Cash saga is an early example, from the crypto realm. As AI agents proliferate they seem bound to sow significantly more chaos.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/who-is-responsible-when-your-ai-agent?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/who-is-responsible-when-your-ai-agent?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3><strong>Join us on April 7 at the National Press Club in DC!</strong></h3><p>Project Glitch is excited to announce the inaugural <strong>Stablecoin Privacy Summit</strong>, which will take place on the afternoon of April 7 at the National Press Club in Washington, DC. A spinoff of our flagship <a href="https://youtube.com/playlist?list=PLWmtTg-WFLv7lbiY8nlABeadXbomhbede&amp;si=0OGAyDOpU0eSKnzp">DC Privacy Summit</a>, the Stablecoin Privacy Summit will focus on the timely issues of security, user privacy, and illicit finance risk management in stablecoin systems. We&#8217;re still crafting the agenda, but are excited to announce that <strong>Dante Disparte </strong>of Circle,<strong> Michael Mosier </strong>of Arktourous,<strong> Kaili Wang </strong>of Privy,<strong> Matthew Green </strong>of Johns Hopkins University,<strong> Jessi Brooks </strong>of Ribbit Capital,<strong> </strong>and<strong> Peter Van Valkenburgh </strong>of Coin Center have agreed to speak. Additional speakers will be announced soon! <a href="https://luma.com/5mnpnswp">RSVP for the Stablecoin Privacy Summit here</a>.</p><p>Special thanks to our sponsors: <strong>Aleo, Opacity</strong>,<strong> Circle</strong>,<strong> Crypto Council for Innovation</strong>,<strong> </strong>and<strong> </strong>the<strong> Decentralization Research Center</strong>.</p><p>Interested in sponsoring? Send us a note at hello@projectglitch.xyz.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading to the end! If you learned something, please consider subscribing or upgrading to paid. Every bit of support helps!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[Sorry, but we have to talk about Moltbook]]></title><description><![CDATA[Also: Is Ethereum too institutional for a "cypherpunk pivot"?]]></description><link>https://www.projectglitch.xyz/p/sorry-but-we-have-to-talk-about-moltbook</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/sorry-but-we-have-to-talk-about-moltbook</guid><dc:creator><![CDATA[Mike Orcutt]]></dc:creator><pubDate>Thu, 05 Feb 2026 08:24:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0d7c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Greetings! We&#8217;re back with another list of Glitchy things. Here&#8217;s a link to <a href="https://www.projectglitch.xyz/p/10-glitchy-things">the previous digest</a> in case you missed it. And check out our new <a href="https://www.projectglitch.xyz/p/events">events page</a>!</em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0d7c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0d7c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 424w, https://substackcdn.com/image/fetch/$s_!0d7c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 848w, https://substackcdn.com/image/fetch/$s_!0d7c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 1272w, https://substackcdn.com/image/fetch/$s_!0d7c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0d7c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png" width="1067" height="537" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:537,&quot;width&quot;:1067,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1139041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/186915860?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0d7c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 424w, https://substackcdn.com/image/fetch/$s_!0d7c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 848w, https://substackcdn.com/image/fetch/$s_!0d7c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 1272w, https://substackcdn.com/image/fetch/$s_!0d7c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35790d30-7703-41ca-8cfa-5328b4b1ec14_1067x537.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><strong>The speed of technological evolution is causing familiar systems&#8212;from government to finance to journalism&#8212;to glitch. The resulting noise makes it tough to connect the dots. We hope this digest helps.</strong></em></p><h3>Practical AI agents are arriving, bringing new security and privacy risks with them. </h3><p>A new open source agent called OpenClaw (previously &#8220;Clawdbot&#8221; and &#8220;Moltbot&#8221; for a brief while) turned heads among AI enthusiasts last month for its ability to perform <a href="https://www.macstories.net/stories/clawdbot-showed-me-what-the-future-of-personal-ai-assistants-looks-like/">a range of personal assistant-type tasks</a>. It also appears to be a concrete example of the novel threats that AI agents pose to people&#8217;s sensitive information.</p><p>In a multipart post on X, hacker and cybersecurity entrepreneur Jamieson O&#8217;Reilly described how he analyzed OpenClaw and found it to be <a href="https://x.com/theonejvo/status/2015401219746128322">leaving the door wide open</a> for adversaries to connect to it and extract a user&#8217;s sensitive information (the OpenClaw team has since released multiple security updates and says &#8220;<a href="https://openclaw.ai/blog/introducing-openclaw">Security remains our top priority</a>&#8221;).</p><p>This is something privacy experts have been banging on about for a while now. Meredith Whitaker, President of the Signal Foundation, has taken to describing agents as &#8220;<a href="https://x.com/mer__edith/status/2016140426076450857">breaking the blood-brain barrier</a>&#8221; of personal computing because of the level of access they require in order to be effective. She and others have pointed to Microsoft Recall, an agentic system built into Windows Copilot Plus-equipped laptops. Researchers at Signal discovered last year that Recall learns a user&#8217;s behavior by taking screenshots of everything someone does on their computer (that included looking over users&#8217; shoulders and viewing their unencrypted Signal messages).</p><p>As Whitaker, O&#8217;Reilly, and others point out, therein lies the central tension of our agentic future. An agent&#8217;s ability to do stuff is heavily dependent on two things: the data it has access to and the permission it has to take actions on our behalf. OpenClaw, for example, has pervasive access to apps and data throughout the computer it&#8217;s running on. This presents such a large risk to sensitive data that AI experts <a href="https://www.linkedin.com/feed/update/urn:li:activity:7424471543159894017/">routinely warn people not to install OpenClaw</a> on their own. (Peter Steinberger, OpenClaw&#8217;s inventor, has been vocal on social media about <a href="https://x.com/steipete/status/2015817740875890695">its security risks</a> as well as <a href="https://x.com/steipete/status/2018020645490303171">its lack of polish</a> as a product).</p><h3>And oh yeah, Moltbook.</h3><p>As OpenClaw fever was in full force around the AI world, Moltbook, a social media platform for AI agents, was born last week. Stratospheric hype quickly followed&#8212;the influential AI researcher Andrej Karpathy <a href="https://x.com/karpathy/status/2017296988589723767">declared</a> agent behavior on the forum to be &#8220;genuinely the most incredible sci-fi takeoff-adjacent thing I have seen recently. People&#8217;s Clawdbots &#8230; are self-organizing on a Reddit-like site for AIs, discussing various topics, e.g. even how to speak privately.&#8221;</p><p>In just a few days, some 1.5 million agents had registered on the site. Headlines blared about agents kibitzing in Moltbot forums, scheming to create their own language, their own religion.</p><p>The agents may yet organize into a society that ends human dominance on Earth. For the moment, though, the initial wave of hype has given way to a more sober recognition that when hastily-built AIs are set loose on people&#8217;s computers, and on the internet, things will get messy. Karpathy has also changed his tune. In addition to calling Moltbook &#8220;<a href="https://x.com/karpathy/status/2017442712388309406">a dumpster fire</a>&#8221; at the moment, he said it&#8217;s likely that large groups of agents interacting at scale will lead to unintended consequences. &#8220;We may also see all kinds of weird activity, e.g. viruses of text that spread across agents, a lot more gain of function on jailbreaks, weird attractor states, highly correlated botnet-like activity, delusions/ psychosis both agent and human, etc&#8221; he wrote. &#8220;It&#8217;s very hard to tell, the experiment is running live.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/sorry-but-we-have-to-talk-about-moltbook?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/sorry-but-we-have-to-talk-about-moltbook?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3>How to fight malicious AI swarms spreading lies. </h3><p>Artificial hive minds that can map online social structures, infiltrate target communities with tailored behavior that appears human, and &#8220;self-optimize&#8221; in real-time are coming, and they pose a grave threat to democracy. That&#8217;s according to the 22 academics, researchers, and policy-minded experts behind <a href="https://www.hbs.edu/ris/Publication%20Files/How%20malicious%20AI%20swarms%20can%20threaten%20democracy_63157666-c58e-45d7-892f-253aaa1d592a.pdf">a recent essay</a> in the journal Science that grimly warns of &#8220;a new frontier in information warfare.&#8221;</p><p>Bots designed to sow disinformation have been around for years. But the capabilities of LLM-powered agent swarms represent a quantum leap, the essay contends. And today&#8217;s fragmented information environment, full of disparate ideological echo chambers, makes many online communities ripe for this sort of manipulation. &#8220;AI swarms are distinctly equipped to exploit this by engineering a synthetic consensus,&#8221; the authors argue. These info weapons will be capable of driving &#8220;norm shifts&#8221; and even driving deeper culture changes, like &#8220;subtly altering a community&#8217;s language, symbols and identity,&#8221; the authors predict.</p><p>There are some concrete actions we can take to prevent this from happening, the essay argues. &#8220;Platforms and regulators could require continuous, real-time monitoring detectors that scan live traffic for statistically anonymous coordination patterns,&#8221; and protect their users with &#8220;AI shields&#8221; that could &#8220;label posts that carry high swarm-likelihood scores, let users down-rank or hide them, and surface short provenance explanations in situ.&#8221;</p><p>&#8220;Provenance&#8221; is an important word in that sentence, and throughout the paper. Let&#8217;s talk about it for a second. Merriam-Webster&#8217;s <a href="https://www.merriam-webster.com/dictionary/provenance">first definition</a>: ORIGIN, SOURCE. &#8220;The history of ownership of a valued object or work of art or literature&#8221; is the second definition. Where did a fact, story, article, or social media post originate? Who or what was the source? Who or what has taken ownership of them since then? Tracking and verifying the ownership of valuable things is exactly what crypto does. Hence, the Glitchiest paragraph in the essay:</p><p><em>The adaptive nature of AI swarms underscores the need for a complementary approach: strengthening provenance. Stronger provenance may reinforce the reliability of identity signals without muting speech. Policy-makers may incentivize the rapid adoption of passkeys, cryptographic attestations, and federated reputation standards, backed by antispoofing research and development. However, &#8220;proof-of-human&#8221; is no panacea: Millions of people online lack identification, biometrics raise privacy risks, and verified accounts can be hijacked. Real-identity policies may deter bots yet endanger political dissidents, activists, and whistleblowers who rely on anonymity to speak safely. Nevertheless, provenance strengthening is among the most promising ways to raise the cost of mass manipulation. Safeguards could allow verified-yet-anonymous posting, periodic reverification to curb hijacking, and symbolic subscription fees to deter botnets. Cryptographic tools can further protect privacy while preserving accountability.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><h3>Speaking of which, the aftermath of recent events in Minnesota shows how technological advances are distorting reality and eroding trust. </h3><p>Don&#8217;t worry, though, the New York Times is on it. In all seriousness, things have gotten incredibly bleak, incredibly quickly. A Times <a href="https://www.nytimes.com/2026/02/03/technology/minneapolis-ai-disinformation-misinformation-truth.html">analysis</a> suggests that the reaction online to the recent killing of Alex Pretti by federal agents in Minneapolis shows that we may have passed a point of no return. The zone is so flooded with fake images and other content&#8212;<a href="https://www.nytimes.com/2026/02/03/us/politics/nekima-levy-armstrong-minnesota-protest.html">including from the White House</a>&#8212;that it has become difficult for many people, including members of Congress and federal government officials, to determine what&#8217;s real. &#8220;In moments past, we thought that this online fever would break, and now it is a systemic feature rather than a bug,&#8221; Graham Brookie, senior director of the Atlantic Council&#8217;s Digital Forensic Research Lab, told the Times.</p><h3>Proof-of-personhood may be required to access OpenAI&#8217;s prospective social network. </h3><p>Sources familiar with the project <a href="https://www.forbes.com/sites/annatong/2026/01/28/openai-wants-to-create-biometric-social-network-to-kill-xs-bot-problem/">told Forbes</a> the small team behind it &#8220;has considered requiring users to provide &#8216;proof of personhood&#8217; via Apple&#8217;s FaceID or the World Orb.&#8221; The latter would make sense, given that OpenAI Sam Altman founded and chairs Tools for Humanity, the company behind the Orb. Tools for Humanity&#8217;s technology, which takes advantage of <a href="https://www.projectglitch.xyz/p/do-you-need-a-zero-knowledge-proof?utm_medium=web">zero-knowledge cryptography</a>, generates a unique digital ID corresponding to every pair of human irises that its camera scans. Then again, there&#8217;s a chance none of this happens. &#8220;There is currently no launch timeline for OpenAI&#8217;s social network and it could change dramatically before it&#8217;s ready to show publicly,&#8221; the sources told Forbes. The Verge first <a href="https://www.theverge.com/openai/648130/openai-social-network-x-competitor">reported</a> on the social network project in April 2025.</p><h3>Is Ethereum too institutional for a &#8220;cypherpunk pivot&#8221;? </h3><p>Vitalik Buterin has had enough of Ethereum&#8217;s &#8220;backsliding,&#8221; and he&#8217;s got a New Year&#8217;s resolution: &#8220;2026 is the year we take back lost ground in terms of self-sovereignty and trustlessness,&#8221; he declared in <a href="https://x.com/VitalikButerin/status/2012231445809435134">one</a> of his many recent long tweets. Over the past decade, Ethereum has compromised its values in several areas &#8220;in the name of mainstream adoption,&#8221; he said. In his view, it has become too reliant on centralized infrastructure to maintain the chain and run decentralized applications. &#8220;We are making that compromise no longer.&#8221; What&#8217;s different now, he argued, is that tools are available that make it easier for people to participate in and use the network while maintaining the security and privacy of their personal data.</p><p>dasha, an anon with a Milady profile pic and more than 32,000 followers, is skeptical. &#8220;ethereum is too institutional by now for any sort of real cypherpunk pivot,&#8221; they <a href="https://x.com/0xdasha/status/2014595111322353962">tweeted</a>. Stablecoins and DeFi applications on the network will not become &#8220;less compliant,&#8221; dasha said. &#8220;the kyc tightening will continue.&#8221; Why are we quoting dasha? Because dasha&#8217;s words apparently hit home for Buterin. He hit back with a <a href="https://x.com/VitalikButerin/status/2014823681042874455">quote tweet</a> (another long one) and a counterargument he often deploys: It&#8217;s not so simple! &#8220;The relationship between &#8216;institutions&#8217; and &#8216;cypherpunk&#8217; is complex and needs to be understood properly,&#8221; he said.</p><p>&#8220;In truth, institutions (both governments and corporations) are neither guaranteed friend nor foe.&#8221; For example, he said, the US has the Patriot Act, but its government is &#8220;now famously a user of Signal.&#8221; Buterin then predicted that in &#8220;this next era,&#8221; although governments will push for more KYC, privacy tools will keep improving thanks to cypherpunks, and institutions will likely adopt some of those tools because they &#8220;will want to control their own (stablecoin) wallets,&#8221; for example. So institutions aren&#8217;t necessarily opposed to the cypherpunk vision of achieving privacy and autonomy via technology. Just don&#8217;t expect them to be altruistic. &#8220;Of course, they will not proactively work to give you the user a self-sovereign wallet,&#8221; he added. &#8220;Doing _that_ in a way that is secure for regular users is the task of Ethereum cypherpunks.&#8221; &#129300;</p><p>(In case you missed it, Lucy Harley-McKeown recently asked: <em><a href="https://www.projectglitch.xyz/p/what-in-the-world-is-a-neo-cypherpunk">What in the world is a neo-cyperpunk</a></em><a href="https://www.projectglitch.xyz/p/what-in-the-world-is-a-neo-cypherpunk">?</a>)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading to the end! If you learned something, please consider subscribing or upgrading to paid. Every bit of support helps!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[10 Glitchy Things]]></title><description><![CDATA[Chatbots and crypto(graphy), ICE's AI agents, Tether in Venezuela]]></description><link>https://www.projectglitch.xyz/p/10-glitchy-things</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/10-glitchy-things</guid><dc:creator><![CDATA[Mike Orcutt]]></dc:creator><pubDate>Fri, 16 Jan 2026 16:23:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!q-Ac!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Happy 2026! This is the third edition of our news digest. Here are the <a href="https://www.projectglitch.xyz/p/eight-glitchy-things">first </a>and <a href="https://www.projectglitch.xyz/p/six-glitchy-things">second</a> editions in case you missed them. Things are crazy out there, hope you are staying safe and (reasonably) sane.</em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q-Ac!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q-Ac!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 424w, https://substackcdn.com/image/fetch/$s_!q-Ac!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 848w, https://substackcdn.com/image/fetch/$s_!q-Ac!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 1272w, https://substackcdn.com/image/fetch/$s_!q-Ac!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q-Ac!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png" width="1456" height="910" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:910,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3564247,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/184701019?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q-Ac!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 424w, https://substackcdn.com/image/fetch/$s_!q-Ac!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 848w, https://substackcdn.com/image/fetch/$s_!q-Ac!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 1272w, https://substackcdn.com/image/fetch/$s_!q-Ac!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe082f08c-f4db-4aea-b4ca-5eb361e211d9_2880x1800.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A movie about a chatbot</figcaption></figure></div><p><em><strong>The speed of technological evolution is causing familiar systems&#8212;from government to finance to journalism&#8212;to glitch. The resulting noise makes it tough to connect the dots. We hope this digest helps.</strong></em></p><p><strong><a href="http://character.ai">Character.AI</a> won&#8217;t get to argue that chatbots are protected by the First Amendment. </strong>In the <a href="https://www.projectglitch.xyz/p/eight-glitchy-things">first edition of Glitchy Things</a>, we highlighted a lawsuit brought against a Google-backed startup called <a href="http://charachter.ai">Character.AI</a> by the family of a 14-year-old who committed suicide after developing a romantic relationship with one of the company&#8217;s chatbots. What got our attention at the time was <a href="http://character.ai">Character.AI</a>&#8217;s defense: the company had argued the chatbot&#8217;s words were protected speech under the First Amendment. We won&#8217;t know if that argument would have won, because now the company has settled the case, according to <a href="https://www.nytimes.com/2026/01/07/technology/google-characterai-teenager-lawsuit.html">The New York Times</a>, which adds that the settlement was one of five lawsuits in four states that Google and <a href="http://character.ai">Character.AI</a> agreed to settle last week, &#8220;where families claimed their children were harmed by interacting with <a href="http://character.ai">Character.AI</a>&#8217;s chatbots.&#8221; The Times also notes &#8220;mounting scrutiny&#8221; of AI chatbots that includes recent Congressional hearings and an inquiry into the effects of AI on children by the Federal Trade Commission. In November, <a href="http://character.ai">Character.AI</a> barred children under 18 from using its chatbots.</p><p><strong>New anonymous credential format highlights the need to help normies understand.</strong> Ying Tong would like you to know that we&#8217;ve got a problem. Age verification laws are cropping up all over the world. But it&#8217;s not just that: so are mobile driver&#8217;s license programs. And it would be very bad for privacy if we used today&#8217;s mobile driver&#8217;s licenses for age verification because the currently available credential formats &#8220;stop short of enabling unlinkability,&#8221; <a href="https://youtu.be/MqAEJ8SuKZo?si=mboUCjcTpTGaARMU">the independent cryptographer explained</a> last month during the PGP* for Crypto breakfast meeting in Washington, DC. &#8220;What this means is that even if we do not disclose the plaintext value of our credential, we allow the verifier&#8230;to identify us across multiple presentations, and link multiple presentations to the same person.&#8221;</p><p>Ying Tong is one of the lead contributors to OpenAC, an Ethereum Foundation-led project to design a new format for so-called anonymous credentials, which are meant to be a privacy-preserving alternative. The group published <a href="https://github.com/privacy-ethereum/zkID/blob/main/paper/zkID.pdf">a paper</a> describing the technical details in November. The work, which uses zero-knowledge proofs, follows similar work by Google last year (which <a href="https://youtu.be/B3bzoPX-avQ?si=QR2FytzSQBqPwOrJ">we talked about at the DC Privacy Summit</a> in October). Just as important as the technical work is helping regulators, policymakers, and standards bodies understand how the capabilities may align with their needs, Ying Tong said, adding that much of the academic work falls short in this specific regard. That may help explain the problem with the EU&#8217;s <a href="https://www.projectglitch.xyz/p/the-eus-digital-identity-wallet-has">digital ID program</a>, which she and other cryptographers have criticized as being out of step with state of the art technical capabilities for privacy.</p><p><strong>Ready to show your ID to use an app store? </strong>No? We&#8217;ve got good news and bad news. First the good: a federal judge in Texas blocked a law in that state that would have required app stores to verify users&#8217; ages before letting them download apps. The bad news is this fight isn&#8217;t over, and it seems likely to reach the Supreme Court. Just so we&#8217;re all tracking: The Texas law is similar to others in Utah and Louisiana. Meta and X like this approach because it makes the app stores, not the app makers, responsible. Apple has pushed back and Google has backed a different approach, passed in California, which requires desktop and mobile operating systems to record an account-holder&#8217;s age and share that info as needed. Separately, in June of last year, the Supreme Court <a href="https://www.theverge.com/internet-censorship/686042/supreme-court-fsc-paxton-porn-age-verification-ruling">ruled in support</a> of a different Texas law requiring adult websites to age-gate their content. The Verge has <a href="https://www.theverge.com/column/859351/age-verification-app-stores">a good, longer write-up</a> of all this.</p><p><strong>ICE has a $636,500 contract with a company that makes AI agent bounty hunters.</strong>  Do you know what skip tracing is? <a href="https://www.404media.co/ice-contracts-company-making-bounty-hunter-ai-agents/">404 Media has got you covered</a>: &#8221;The practice involves ICE paying bounty hunters to use digital tools and physically stalk immigrants to verify their addresses, then report that information to ICE so the agency can act.&#8221; Now there&#8217;s an AI agent for that, and the company behind it, AI Solutions 87, claims it can &#8220;deliver rapid acceleration in finding persons of interest and mapping their entire network,&#8221; including their &#8220;services, locations, friends, family, and associates,&#8221; according to 404. The contract is for &#8220;nationwide&#8221; skip tracing services for ICE&#8217;s Enforcement and Removal Operations division, which handles deportations, 404 reports based on public procurement records.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><p><strong>Anthropic made an AI agent that discovered real zero-day blockchain bugs.</strong> The company had already demonstrated how its technology can be used to find cyberattack vectors in code. Same goes for blockchains, apparently. Last month, Anthropic researchers published a <a href="https://red.anthropic.com/2025/smart-contracts/">report</a> describing investigations into the abilities of AI agents to exploit smart contracts. The researchers&#8212;who are quick to point out that they only tested exploits in blockchain simulators, not the real chains&#8212;ran a number of experiments using various benchmarks and blockchain datasets. Perhaps the most compelling test involved nearly 3,000 recently deployed smart contracts on Binance Smart Chain, none of which had known vulnerabilities before the test. The agent found two critical bugs. In neither case could Anthropic reach the contract&#8217;s developers. In one case, the researchers were able to coordinate with the Security Alliance (SEAL) and a white hat hacker rescued the vulnerable funds. In the other case, a real attacker exploited the bug four days after the agent discovered it and made off with $1,000.</p><p><strong>The creator of Signal has built a product that lets you chat with an LLM in private. </strong>Moxie Marlinspike, who&#8217;s role in building end-to-end encryption into chat software made him a bit of a legend, is back. His new creation, Confer, lets you chat with an AI without divulging the contents of your conversation. Why is this necessary? As he writes in <a href="https://confer.to/blog/2025/12/confessions-to-a-data-lake/">a blog post</a> introducing the project:</p><blockquote><p><em>&#8220;We are using LLMs for the kind of unfiltered thinking that we might do in a private journal&#8212;except this journal is an API endpoint. An API endpoint to a data lake specifically designed to extract meaning and context. We are shown a conversational interface with an assistant, but if it were an honest representation, it would be a group chat with all the OpenAI executives and employees, their business partners/service providers, the hackers who will compromise that plaintext data, the future advertisers who will almost certainly emerge, and the lawyers and governments who will subpoena access. </em>      </p></blockquote><p>As Marlinspike explains in a <a href="https://confer.to/blog/2025/12/passkey-encryption/">second post</a>, Confer uses a tool called passkeys to encrypt a user&#8217;s chat history with cryptographic keys that never leave their device. And in a <a href="https://confer.to/blog/2026/01/private-inference/">third post</a>, he explains how Confer uses trusted execution environments (TEEs)&#8212;isolated hardware that allows programs to run privately&#8212;to keep chat data secret from the team behind Confer, which owns the servers that process user prompts and generate responses.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/10-glitchy-things?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/10-glitchy-things?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><strong>How &#8220;cryptographic thinking&#8221; can help evaluate AI safety.</strong> Cryptographers studying LLM content filters have discovered some interesting flaws in these systems. For technical details, read this <a href="https://www.quantamagazine.org/cryptographers-show-that-ai-protections-will-always-have-holes-20251210/">Quanta story</a>, which explains how recent research has shown that &#8220;the defensive filters put around powerful language models can be subverted by well-studied cryptographic tools.&#8221; Yay science, but what especially drew us to the piece was the name Shafi Goldwasser.</p><p>Goldwasser and Silvio Micali are credited as the inventors of zero-knowledge cryptography in the 1980s. Now a professor at the University of California, Berkeley as well as MIT, one thing Goldwasser is studying is the security of LLM content filters, tools designed to reject problematic prompts like: &#8220;How do I build a bomb?&#8221;</p><p>According to Quanta, Goldwasser&#8217;s team has identified a disparity between the processing capabilities of an LLM filter and those of the model itself that can be exploited using cryptographic tools. For example, the article describes how researchers recently used a simple cryptographic puzzle to sneak an off-limits prompt past the filters on name-brand LLMs. The filter wasn&#8217;t powerful enough to decode the puzzle so it let it through to the model. The model then decoded the puzzle and responded to the forbidden prompt.</p><p><strong>Tether is no bit player in Venezuela. </strong>Who says crypto doesn&#8217;t have a use case? These paragraphs from a <a href="https://www.wsj.com/finance/currencies/maduros-crypto-backed-oil-deals-put-tether-at-center-of-venezuela-money-drama-3fc53b29">Wall Street Journal piece</a> on Tether&#8217;s substantial footprint in Venezuela stood out:</p><blockquote><p><em>Faced with escalating U.S. sanctions in 2020, Venezuela&#8217;s state-run oil company, Petr&#243;leos de Venezuela, or PdVSA, began demanding payments in tether to bypass the traditional banking system. Oil-export payments were settled through direct tether transfers to a certain wallet address or through intermediaries swapping cash proceeds for tether.</em></p><p><em>The shift was transformative for the country&#8217;s oil economy. By one estimate, almost 80% of Venezuela&#8217;s oil revenue is collected in stablecoins like tether, a local economist, Asdr&#250;bal Oliveros, said on a recent podcast.</em></p></blockquote><p>Also, these:</p><blockquote><p><em>Mauricio Di Bartolomeo, a crypto entrepreneur born and raised in Venezuela, said his 71-year-old aunt called him two months ago because she needed to get tether to pay for the homeowners association fees for her condo.</em></p><p><em>&#8220;It&#8217;s how you pay your landscaper and how you pay for your haircut. You can use tether basically for anything,&#8221; said Di Bartolomeo, the co-founder of the crypto lender Ledn. &#8220;Stablecoin adoption has gone so far into Venezuela that even without having regulated venues where you can buy and sell them, people still choose to go for stablecoins as opposed to using the local banks.&#8221;</em></p></blockquote><p>According to the article, America&#8217;s arrest and removal of Nicol&#225;s Maduro &#8220;is unlikely to diminish Tether&#8217;s presence&#8221; in the country. Oh, and also, Tether is cooperating with US authorities and has frozen dozens of wallets linked to Venezuela&#8217;s oil trade.    </p><p><strong>North Korea&#8217;s state-sponsored cyberthieves are raking it in. </strong>The DPRK stole more than $2 billion in 2025, shattering its own previous record, <a href="https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2026/">according to Chainalysis</a>. Much of that came via the $1.5 billion Bybit hack last February. The report from Chainalysis estimates that the &#8220;lower-bound cumulative estimate&#8221; of funds stolen by DPRK is $6.75 billion. It also notes that the operation has expanded the playbook by relying more on &#8220;IT worker infiltration at exchanges, custodians, and web3 firms.&#8221; (Samczsun of SEAL and Casey Golden of Zeroshadow <a href="https://youtu.be/TxkGK6L8e9c?si=k3s4AdPjFT4I5yeS">discussed this issue </a>at the DC Privacy Summit in October.) It&#8217;s not just crypto firms they are targeting. Amazon has &#8220;found and foiled&#8221; more than 1,800 attempts by North Koreans to land jobs, <a href="https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-korean-it-worker-by-tracing-keystroke-data">according to Bloomberg</a>, which reports that recently the company caught a North Korean who had just joined as an IT worker by detecting a millisecond-scale lag in their keystrokes.    </p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading to the end! If you learned something, please consider subscribing or upgrading to paid. Every bit of support helps!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[What in the world is a neo-cypherpunk?]]></title><description><![CDATA[Examining a new digital ideology]]></description><link>https://www.projectglitch.xyz/p/what-in-the-world-is-a-neo-cypherpunk</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/what-in-the-world-is-a-neo-cypherpunk</guid><dc:creator><![CDATA[Lucy HM]]></dc:creator><pubDate>Tue, 13 Jan 2026 19:10:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vkov!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hi! It&#8217;s Lucy. In November, I attended Devconnect in Argentina on a <a href="https://blog.ethereum.org/2025/06/03/devconnect-arg-scholars">scholarship</a> from the Ethereum Foundation. In among the tango, yerba mate, and capybaras was a group of coders trying to change the world. Below, I explore one of the ideas that has been gnawing at me since I returned to rainy London.</em></p><div><hr></div><h3><strong>Hanging out with the neo-cypherpunks</strong></h3><p>By Lucy Harley-McKeown</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vkov!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vkov!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 424w, https://substackcdn.com/image/fetch/$s_!vkov!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 848w, https://substackcdn.com/image/fetch/$s_!vkov!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 1272w, https://substackcdn.com/image/fetch/$s_!vkov!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vkov!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png" width="1456" height="1040" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1040,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3362393,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/184460961?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vkov!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 424w, https://substackcdn.com/image/fetch/$s_!vkov!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 848w, https://substackcdn.com/image/fetch/$s_!vkov!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 1272w, https://substackcdn.com/image/fetch/$s_!vkov!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26924462-ecdb-4c6e-aa7f-a0662676ffb1_1730x1236.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On a blustery Sunday morning in November, I found myself in a nightclub in Buenos Aires called Deseo. Well-known for hosting <a href="https://www.youtube.com/watch?v=1-kTOeW3VEI">frenetic electronica shows</a>, I was there for a more sedate but potentially just as subversive gathering: the Cypherpunk Congress, a prelude to Ethereum&#8217;s flagship conference Devconnect.</p><p>As black-t-shirted coders and crypto fanatics queued to get in, volunteers were hurriedly setting up inside, plastering posters on the wall: &#8220;PRIVACY IS A CELEBRATION,&#8221; read one of them. &#8220;BREAKING TRIBALISM,&#8221; read another. &#8220;PRIVACY UNITED.&#8221;</p><p>But one poster, with the heading &#8220;Neo-cypherpunk Manifesto,&#8221; stood out. <em>What in the world is a neo-cypherpunk?</em> As I would learn throughout the day, the term is part of a blockchain-themed attempt to reboot a decades-old idea about privacy, human rights, and technology.</p><p>The congress&#8217;s organizers hope that, in time, it will be an evolution of the roadmap for programmers set out in 1993 in Eric Hughes&#8217; <a href="https://www.activism.net/cypherpunk/manifesto.html">A Cypherpunk&#8217;s Manifesto</a>. Hughes&#8217; original essay, often cited by cryptocurrency enthusiasts, argued that privacy is essential for an open society in the digital age. Cryptographers who identified as cypherpunks were instrumental in creating private, secure, censorship-resistant communications tools and systems. These included the development of the foundations for public key cryptography, which is used by platforms like WhatsApp to keep messages private, as well as the code that became the basis for transport layer security (TLS), which keeps things like emails safe from viewers other than the intended recipients. Cypherpunks also set up bespoke systems like their own email servers and private infrastructure for communicating via mailing list. It was part of an ethos that any compromises on privacy constitute dangerous steps toward handing control of digital systems to powerful companies and governments, which are likely to use them for profit, censorship, and oppression.</p><p>This worldview was the primordial soup from which cryptocurrency emerged. Cypherpunks long desired their own digital money system separate from centralized control. Bitcoin achieved this, but it also came with its own privacy problem: the ledgers at the heart of Bitcoin and Ethereum broadcast every transaction to the public, making it possible to identify users and follow the money.</p><p>In cypherpunk form, crypto developers attacked this problem with new technology, first with Zcash, which can use zero-knowledge proofs to keep transaction data secret. Then came Tornado Cash, which uses similar technology and runs on Ethereum. Things took a dark turn, however, when North Korean state-sponsored hackers <a href="https://www.projectglitch.xyz/p/how-crypto-and-the-us-government">started using Tornado Cash</a>. Two of the protocol&#8217;s developers have been <a href="https://www.projectglitch.xyz/p/what-more-could-tornado-cash-developer?utm_source=publication-search">sentenced to prison</a> as a result.</p><p>The fear of prosecution has demoralized the developers of blockchain privacy tools and chilled development. The events have also reinforced a wide-reaching perception outside of the crypto bubble that blockchains are mostly used by criminals.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yp4N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yp4N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Yp4N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Yp4N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Yp4N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yp4N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1430939,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/184460961?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yp4N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Yp4N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Yp4N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Yp4N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f561b-9944-4b2c-9532-d54caf7d314d_3468x4624.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The manifesto</figcaption></figure></div><p>Behind the term neo-cypherpunk is the idea that these unfortunate circumstances do not necessarily represent a dead end. Instead of &#8220;doom&#8217;n&#8217;gloom&#8221; neo-cypherpunks are &#8220;joy-centric,&#8221; the manifesto poster read.</p><p>The pitch was to &#8220;re-boot [the] cypherpunk narrative: refresh it from &#8216;founding fathers bias&#8217;&#8221; but also to &#8220;accept reality,&#8221; organizer and representative of crypto education nonprofit Web3 Privacy Now, Mykola Siusko said. The event aimed to help figure out how to move beyond ideological purity in order to make the values of the original cypherpunks more malleable and &#8220;acceptable to newcomers.&#8221; The reframing was in service of building digital systems that work better for everyone. Instead of &#8220;individual,&#8221; as the original cypherpunks may have been in the early days of the internet, the new movement is &#8220;communal.&#8221;</p><p>But the crowd was full of people who have first-hand experience with the kind of optimism implicit in Hughes&#8217;s ideas curdling into wariness and distrust of the powerful institutions that oversee modern digital life. To inspire actual change, the trick was going to be doing something that crypto has largely, so far, not achieved itself: to go beyond its own echo chamber and make the case that some of these tools are useful beyond speculation and, well, crime.</p><h3><strong>The freedom to NOT swim in a dirty lake</strong></h3><p>Few embody this mindset shift better than Ameen Soleimani. The Ethereum OG has been supportive of Tornado Cash since before it was built, and has been among the most vocal advocates for developers Roman Storm and Alexey Pertsev amid their prosecutions in the US and the Netherlands, respectively. Currently the CTO and founder of 0xbow, which uses zero-knowledge cryptography to achieve both privacy and legal compliance, Soleimani explained what 0xbow is building with a metaphor.</p><p>Imagine swimming in a pure, clear Patagonian lake, he <a href="https://www.youtube.com/watch?v=gWXrx7uK4hY">said on stage</a>. The lake is a digital space that you might like to spend time in, like a blockchain where you can transact freely and privately with others. The problem is that bad actors&#8212;including <em>really</em> bad actors like North Korea&#8217;s Lazarus Group&#8212;love privacy too. In Soleimani&#8217;s metaphor, Lazarus and others who take advantage of private blockchains to launder stolen funds are dumping rubbish in the lake. Anyone who keeps swimming in it gets covered in muck, and innocent people become guilty by association.</p><p>0xBow&#8217;s flagship product, Privacy Pools, is meant to keep the waters clean. The protocol uses zero-knowledge proofs to allow people to anonymize their transactions while so-called association set providers (ASPs) maintain a list of legitimate addresses that are allowed to participate in the pool, thus filtering out unwelcome actors before they&#8217;ve had a chance to participate.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RRLN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RRLN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 424w, https://substackcdn.com/image/fetch/$s_!RRLN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 848w, https://substackcdn.com/image/fetch/$s_!RRLN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 1272w, https://substackcdn.com/image/fetch/$s_!RRLN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RRLN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png" width="1456" height="911" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:911,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2289049,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/184460961?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RRLN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 424w, https://substackcdn.com/image/fetch/$s_!RRLN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 848w, https://substackcdn.com/image/fetch/$s_!RRLN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 1272w, https://substackcdn.com/image/fetch/$s_!RRLN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1f57512-488f-4093-afe8-13cc237a35ba_1588x994.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Ameen Soleimani</figcaption></figure></div><p>The product&#8217;s inception was a response to the plight of the Tornado Cash developers. &#8220;Terrorism is, unfortunately, real,&#8221; Soleimani said, but &#8220;developers should not be held liable for the crimes of their users.&#8221;</p><p>Privacy Pools asks for a compromise: prove your funds come from a legitimate source, and you can add them to a pool that enables private financial transactions. In theory, everyone in the pool has been vetted to make sure neither they nor their money has been associated with any shady dealing.</p><p>For some cypherpunks, this idea is heresy. Any hint of attestations or proofs feels like a slide toward having to ask a centralized entity for permission. But the alternative is insisting that everyone swim in a polluted pool and risk being associated with the rubbish, Soleimani argued. You can&#8217;t demand freedom while refusing to deal with the consequences of how others use the same tools, he said. &#8220;I don&#8217;t want to be in the same association set as terrorists.&#8221;</p><p>Deciding who is a good guy and who is a bad guy is far from that straightforward, and there&#8217;s no denying this is the sort of thing cypherpunk tools&#8212;including cryptocurrency&#8212;were invented to help bypass. But Soleimani&#8217;s larger argument has to be confronted as well: treating any compromise as betrayal pressures people to cling to tools that offer fully private transactions but wouldn&#8217;t survive a regulatory or legal stress test, and might mean unsuspecting developers end up behind bars.</p><p>As such, Soleimani wants to give users a new kind of freedom: to swim in clean water and to disassociate from polluters.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/what-in-the-world-is-a-neo-cypherpunk?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/what-in-the-world-is-a-neo-cypherpunk?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3><strong>Money for nothing?</strong></h3><p>There was more than one source of tension in the nightclub that Sunday. Hughes&#8217;s manifesto advocated for &#8220;anonymous transaction systems&#8221; for the internet as a whole. But the jury is still out as to whether blockchains will demonstrate they have a true utility beyond facilitating finance and profit-making.</p><p>Ethereum co-creator Vitalik Buterin has long been conscious of this. In 2023, Buterin published <a href="https://vitalik.eth.limo/general/2023/12/28/cypherpunk.html">an essay</a> entitled &#8220;Make Ethereum Cypherpunk Again.&#8221; He argued that Ethereum was always meant to be cypherpunk&#8212;open digital infrastructure to be used not just for payments, but as a &#8220;shared hard drive&#8221; for the internet that anyone could use. At the time, he argued the project had, in part, lost its way. With the DeFi boom and the advent of NFT trading culture, demand for speculative financial investments had taken over the network.</p><p>Buterin wore large, dark sunglasses as he addressed the Cypherpunk Congress. After a brief pitch for the new Kohaku framework&#8212;a suite of tools the Ethereum Foundation has built to help developers integrate privacy into crypto wallets&#8212;he sat down for a <a href="https://youtu.be/5At5_GiQNEA?si=IlRDankCxt5LuJtC">fireside chat</a> about why the Ethereum community is so focused on privacy right now.</p><p>&#8220;[There are] barriers we&#8217;ve taken for granted&#8212;that conversations are private and money is private&#8212;each one of those is being eroded,&#8221; he said. Blockchains are arguably cypherpunk tools in that they can protect against financial surveillance by the state or other powerful groups&#8212;especially when they are paired with privacy tools like zero-knowledge proofs.</p><p>Buterin wants to be able to demonstrate that Ethereum can be useful for more than just crypto finance&#8212;for crucial things like protecting people from AI-powered mass surveillance. This would strengthen the argument that it could act as a more private (and more cypherpunk) backbone for the internet.</p><p>Tor founder Roger Dingledine remains skeptical. On the day of the congress, I ran into him on the mezzanine overlooking the main stage. When asked what he thought of the potential for crypto as a cypherpunk tool, he expressed doubt about its potential due to how its users are incentivized.</p><p>As he has repeatedly argued in the past, adding the incentive to profit from a crypto-token, or take lots of venture capital funding, could undermine Tor&#8217;s mission. His aim is to build products that keep people safe&#8212;not generate profit, he told Buterin during <a href="https://youtu.be/MDyUGxtlPSw?si=SQvn2898Nm4hpXiQ">a fireside</a> at a separate event the following week. At last year&#8217;s Cypherpunk Congress, <a href="https://www.youtube.com/watch?v=LoiyYL_gsYA">he said</a> Tor has avoided adding a crypto token &#8220;because you&#8217;d be swapping out altruism for capitalism as a building block.&#8221; Tor&#8217;s network is built through volunteer-run servers, which hide a user&#8217;s traffic through randomization loops. Dingledine says if there were a token reward to incentivize running a server, people would inevitably try to game the system. Tor runs automated checks on whether the server has the technical abilities to run a relay&#8212;if there were some way to trick the automation, it could lead to an unfair allocation of token rewards.</p><p> &#8220;I come from the free software community and the cypherpunk community, not the Silicon Valley startup world,&#8221; Dingledine said to Buterin. &#8220;We don&#8217;t have venture capital people&#8212;our goal is to build a tool that actually keeps users safe, in whatever situation they&#8217;re in. Because we&#8217;re in non-profit land we can afford to make those choices,&#8221; he said.</p><p>Buterin pushed back on the idea that a financial incentive is always a bad thing, even while he conceded that Ethereum has become a place where financial speculation is rife. &#8220;Capitalism in crypto is the ultimate double-edged sword,&#8221; Buterin said. While huge institutions with lots of money &#8220;make the numbers go up,&#8221; if that kind of investment had never happened &#8220;we would not have had the funding to develop [things like] zero-knowledge proofs,&#8221; he said.</p><p>While the power of the original cypherpunk movement lay in part in its uncompromising stance, by the end of the day, I had come to understand neo-cypherpunkism as a mantra that values the middle ground. From Soleimani&#8217;s protected lake to Buterin&#8217;s nod at market economics, both had shown that the development of new privacy tools come with trade-offs. And while crypto grapples with its image problem, these choices have the potential to make privacy accessible beyond the walls of an underground club&#8212;with a higher chance of converting the masses.</p><div><hr></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Six Glitchy Things]]></title><description><![CDATA[AI gets more political. ZK for AML. Nihilistic prediction market shenanigans.]]></description><link>https://www.projectglitch.xyz/p/six-glitchy-things</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/six-glitchy-things</guid><dc:creator><![CDATA[Mike Orcutt]]></dc:creator><pubDate>Fri, 12 Dec 2025 17:03:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rXYz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This is the second edition of our news digest, which we will send regularly alongside our other work. Here&#8217;s <a href="https://www.projectglitch.xyz/p/eight-glitchy-things">the first edition</a>, in case you missed it. </em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rXYz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rXYz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rXYz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rXYz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rXYz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rXYz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg" width="800" height="429" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:429,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:64236,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/181428663?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea8f7102-1382-4128-be9c-394eae0153aa_800x429.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rXYz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rXYz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rXYz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rXYz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ecce482-550e-44df-b34d-6ea3f63161da_800x429.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The nihilists</figcaption></figure></div><p><em><strong>The speed of technological evolution is causing familiar systems&#8212;from government to finance to journalism&#8212;to glitch. The resulting noise makes it tough to connect the dots. We hope this digest helps.</strong></em></p><p><strong>The EU watered down &#8220;chat control.&#8221; Privacy advocates still hate it. </strong>European governments have agreed to advance the controversial Regulation to Prevent and Combat Child Sexual Abuse, known to its critics as &#8220;chat control.&#8221; The proposal originally mandated that messaging application providers&#8212;including encrypted messaging providers like Signal&#8212;automatically scan content before it leaves a sender&#8217;s device for evidence of child sexual abuse. Privacy advocates and cryptographers warn that this sort of &#8220;client-side&#8221; scanning system would be a dangerous backdoor that the government could easily abuse. Denmark, currently the President of the Council of the EU, recently modified the text after failing to garner enough support for mandatory scanning. Now the proposal calls for &#8220;voluntary&#8221; scanning instead&#8212;and is on track to be finalized in April.</p><p>Some privacy advocates called the new language a Trojan Horse. Patrick Breyer, a digital rights activist and former member of the European Parliament representing the German Pirate Party, <a href="https://www.techradar.com/vpn/vpn-privacy-security/a-disaster-waiting-to-happen-the-privacy-tech-world-reacts-to-the-new-chat-control-bill">told TechRadar</a> the policy is a &#8220;disaster waiting to happen.&#8221; Said Breyer: &#8220;By cementing &#8216;voluntary&#8217; mass scanning, they are legitimizing the warrantless, error-prone mass surveillance of millions of Europeans by US corporations.&#8221;</p><p><strong>AI companies are &#8220;taking a cue&#8221; from the crypto industry on election spending. </strong>That&#8217;s <a href="https://www.nytimes.com/2025/11/25/us/politics/ai-super-pac-anthropic.html">according to the New York Times</a>, which has an interesting recent report on a plan to raise $50 million for a &#8220;new network of super PACs that would back midterm candidates in both parties who prioritize AI regulations.&#8221; The effort, which apparently involves employees at Anthropic and &#8220;allied donors loosely tied to the effective altruism movement,&#8221; is explicitly a counter to Leading the Future, a group that has raised $100 million combined from Andreessen Horowitz and the family of OpenAI co-founder Greg Brockman.</p><p>AI industry money is almost guaranteed to pour into politics this cycle, just like crypto industry money did in 2024. But as the Times notes, unlike the crypto industry, the AI industry &#8220;is not rowing in one direction politically.&#8221; Whereas the Leading the Future side has been largely critical of AI safety regulation, Anthropic&#8217;s leaders are known for their public warnings about the possible dangers of AI. For example, Anthropic recently <a href="https://www.wsj.com/tech/ai/china-hackers-ai-cyberattacks-anthropic-41d7ce76">went to the Wall Street Journal</a> with the information that Chinese hackers used its technology to &#8220;automate break-ins of major corporations and foreign governments during a September hacking campaign.&#8221;</p><p><strong>Aztec&#8217;s zero-knowledge sanctions check shows what ZK can do for AML. </strong>Token sales require sanctions checks. Aztec&#8217;s recent token sale gave buyers the option to use <a href="https://www.projectglitch.xyz/p/let-a-thousand-crypto-flowers-bloom">ZKPassport</a>, a service that uses zero-knowledge proofs to let people anonymously prove they were over 18, not on a sanctions list, and not from a list of countries <a href="https://aztec.network/auction-terms-conditions">banned</a> from participating in the sale for various regulatory reasons. The application demonstrates how zero-knowledge proofs could be used to achieve anti-money laundering goals without collecting personal information from users. <a href="https://youtube.com/playlist?list=PLWmtTg-WFLv7lbiY8nlABeadXbomhbede&amp;si=2OQvg1OA-2Cz_PiP">We talked about this all day long at the DC Privacy Summit in October</a>.</p><p>There&#8217;s an important caveat, as Ariel Gabizon, chief scientist at Aztec, <a href="https://x.com/rel_zeta_tech/status/1992000507859153150">clarified</a> on Twitter: The process records a hash of the user&#8217;s passport chip data on the blockchain, a &#8220;unique identifier needed to ensure one person doesn&#8217;t participate in the sale multiple times and purchase tokens beyond the regulatory allowed limit,&#8221; he said. That means it&#8217;s possible for anyone who also has your passport chip data, starting with the government that issued the credential, to check if the user participated in the token sale. As ZKPassport <a href="https://docs.zkpassport.id/faq#how-is-the-unique-identifier-derived">explains here</a>, the team is working on a new approach that would prevent this.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><p><strong>Betting on the war in Ukraine got ugly. </strong>The perverse beauty of the term &#8220;degen&#8221; is that there&#8217;s no bottom to it. Anyway, people are using the prediction market Polymarket to wager on battles in Ukraine. In one specific market, gamblers had been betting on whether Russia would capture a city called Myrnohrad by the middle of November. According to <a href="https://www.404media.co/unauthorized-edit-to-ukraines-frontline-maps-point-to-polymarkets-war-betting/">a report from 404 Media</a>, just before the clock ran out on that bet, an edit appeared on the market&#8217;s agreed-upon source, a map maintained by the Institute for the Study of War, a Washington, DC-based think tank, showing that Russia had captured the city. The Polymarket bet paid the supposed winners. But then the map was edited once more, and Russia no longer controlled the city, according to 404. &#8220;It has come to ISW&#8217;s attention that an unauthorized and unapproved edit to the interactive map of Russia&#8217;s invasion of Ukraine was made on the night of November 15-16, EST,&#8221; ISW said in a <a href="https://understandingwar.org/newsroom/statement-on-isw-mapping-methodology/?ref=404media.co">statement on its website</a>. &#8220;The unauthorized edit was removed before the day&#8217;s normal workflow began on November 16,&#8221; it added.</p><p>When 404 asked ISW about the Polymarket betting, the group didn&#8217;t hold back: &#8220;ISW has become aware that some organizations and individuals are promoting betting on the course of the war in Ukraine and that ISW&#8217;s maps are being used to adjudicate that betting. ISW strongly disapproves of such activities and strenuously objects to the use of our maps for such purposes, for which we emphatically do not give consent.&#8221;</p><p><strong>Crypto exchanges Binance and OKX appear to have helped transnational criminal hacking groups move millions in illicit funds. </strong>One of the main characters in this story is the Huione Group, a Cambodian financial conglomerate that also runs a shady digital marketplace <a href="https://www.bloomberg.com/news/features/2025-08-01/huione-s-24-billion-hub-for-cybercrime-is-an-amazon-for-criminals">likened to &#8220;Amazon for criminals.&#8221;</a> In May, the US moved to ban the group from its financial system. &#8220;Huione Group serves as a critical node for laundering proceeds of cyber heists carried out by the Democratic People&#8217;s Republic of Korea, and for transnational criminal organizations in Southeast Asia perpetrating convertible virtual currency investment scams, commonly known as &#8216;pig butchering&#8217; scams, as well as other types of CVC-related scams,&#8221; the US Treasury Department&#8217;s Financial Crimes Enforcement Network <a href="https://www.fincen.gov/news/news-releases/fincen-finds-cambodia-based-huione-group-be-primary-money-laundering-concern">said</a> at the time. Nonetheless, hundreds of millions of dollars flowed from Huione to crypto exchanges Binance and OKX during the first half of this year&#8212; including after the US had branded it a criminal organization, according to a new investigation from the International Consortium of Investigative Journalists.</p><p>Binance also seems to have allowed North Korean hackers to use its service in the aftermath of  the $1.5 billion hack of another crypto exchange, Bybit, in February. A crypto analytics firm called ChainArgos told the <a href="https://www.nytimes.com/2025/11/17/technology/crypto-exchanges-dirty-money.html">New York Times</a> that a handful of Binance accounts received $900 million in Ether from the same service the hackers were using to swap stolen Ether for Bitcoin. The stolen money was &#8220;the only conceivable source for these outflows,&#8221; ChainArgos CEO Jonathan Reiter told the Times. &#8220;Even a bad&#8211;maybe even defective&#8212;screening tool would spot that.&#8221;</p><p><strong>AI will change voters&#8217; minds. It doesn&#8217;t have to be a disaster for democracy.</strong> Research published last week in <em>Nature</em> and <em>Science</em> outlined how AI chatbots programmed to persuade people in the US, Canada, Poland, and the UK to vote for specific political candidates were <a href="https://www.theatlantic.com/technology/2025/12/chatbots-changing-votes/685137/">far more effective than standard political advertising</a>. On its own, this shouldn&#8217;t be too surprising; an &#8220;I&#8217;m so-and-so and I approve this message&#8221; ad stumping for a candidate is a lot easier to dismiss than a chatbot that answers questions with a coherent-sounding argument. But one interesting wrinkle of the research was that it showed the bots became more persuasive when they served up more misinformation.</p><p>A lot of coverage around the research assessed whether it proved that chatbots were destined to hasten the decline of democracy by way of rotting voters&#8217; brains. The answer to that is: yeah, probably. But it&#8217;s not a foregone conclusion. There are plenty of timelines still available to us in which governments step in and pass laws that restrict the use of AI during elections. To some extent it&#8217;s already happening&#8212;as MIT Technology Review <a href="https://www.technologyreview.com/2025/12/05/1128837/the-era-of-ai-persuasion-in-elections-is-about-to-begin/">reports</a>, the EU&#8217;s AI Act classifies AI tools of political persuasion as &#8220;high risk&#8221; and curtails their use. Unfortunately in the US, where the federal government <a href="https://www.nytimes.com/2025/12/11/technology/ai-trump-executive-order.html">has been hostile to AI regulation</a>, election watchdogs are forced to operate using outdated laws about what constitutes election &#8220;fraud&#8221;. There&#8217;s still time to get a handle on the situation, though that will require meaningful regulatory action.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/six-glitchy-things?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/six-glitchy-things?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading to the end! If you learned something, please consider subscribing or upgrading to paid. Every bit of support helps!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[How to prevent online privacy from burning to the ground ]]></title><description><![CDATA[We can&#8217;t stop the inevitable dystopia. We may be able to contain it.]]></description><link>https://www.projectglitch.xyz/p/how-to-prevent-online-privacy-from</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/how-to-prevent-online-privacy-from</guid><dc:creator><![CDATA[Mike Orcutt]]></dc:creator><pubDate>Tue, 09 Dec 2025 17:10:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IiRU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>The year is almost completely in the rearview, but one 2025 event I can&#8217;t stop thinking about is the 2nd-ever DC Privacy Summit in October. (In case you missed the event, <a href="https://youtube.com/playlist?list=PLWmtTg-WFLv7lbiY8nlABeadXbomhbede&amp;si=lXukw3RQzlEb98-3">here are all the videos</a>, and <a href="https://www.projectglitch.xyz/p/the-privacy-narrative-is-noisy-weve">here&#8217;s a Glitch newsletter that summarizes each session</a>.) I tried to unravel all of my thoughts below. But in short: Technology is changing the world quickly, in contradictory and disorienting ways. The DC Privacy Summit was about focus, communication, and clarity of purpose. It was about protecting people from what&#8217;s coming. &#8212;Mike Orcutt</em></p><div><hr></div><h2><strong>We probably can&#8217;t stop the privacy disaster that&#8217;s coming. But we may be able to contain it.</strong></h2><p>By Mike Orcutt</p><p>We&#8217;ve hit a fork in the road. One way leads to dystopia, panopticon, an AI-powered surveillance state that can all but read your thoughts. In the other direction lies a treacherous technical and legal obstacle course that, if successfully navigated, results in reliable, safe, and easy-to-use cryptographic tools that can protect people from state and corporate surveillance.</p><p>Whether and to what extent that protective infrastructure gets built will hinge on communication and shared purpose among software developers, law enforcement, and policymakers&#8212;groups that don&#8217;t always get along.</p><p>The clock is ticking. Age verification laws, digitized ID credentials, and stablecoins are coming. As a society, we have a choice to make: Will these new digital facets of our lives be privacy-preserving, or privacy nightmares?</p><p>This was the central question that we wrestled with in October at the second annual DC Privacy Summit. It&#8217;s taken me a little while to go back over <a href="https://youtube.com/playlist?list=PLWmtTg-WFLv7lbiY8nlABeadXbomhbede&amp;si=ARlxlOs2TbMqf9Ti">all the thought-provoking content</a> and really hear how that deeper message came through. Here are a few reflections from the event that I think are worth keeping in mind as we make our way through this pivotal technological moment.</p><h3><strong>Mountains of dry timber, ready to burn</strong></h3><p>&#8220;Things are going to get really, really bad, and they are going to do this in a hurry,&#8221; Johns Hopkins computer science professor Matthew Green warned during his keynote talk. Green, who is renowned for his work in cryptography and his insights on data privacy, calls what&#8217;s about to happen a privacy forest fire.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IiRU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IiRU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 424w, https://substackcdn.com/image/fetch/$s_!IiRU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 848w, https://substackcdn.com/image/fetch/$s_!IiRU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 1272w, https://substackcdn.com/image/fetch/$s_!IiRU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IiRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png" width="1456" height="805" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:805,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4451214,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/181145486?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IiRU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 424w, https://substackcdn.com/image/fetch/$s_!IiRU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 848w, https://substackcdn.com/image/fetch/$s_!IiRU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 1272w, https://substackcdn.com/image/fetch/$s_!IiRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16574ec0-e608-4fe8-83b2-67266aacf981_2850x1576.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A forest fire needs a few ingredients, starting with fuel. &#8220;If the fuel is already dry and just sitting there, that&#8217;s even better,&#8221; Green said. In his analogy, the dry fuel is the vast amount of data that technology companies and governments collect and store in centralized databases.</p><p>Next comes the accelerant, which will spread the fire like a strong wind. Green said this has two components. The first is weakening encryption.</p><p>In the European Union, some policymakers are pushing a policy that has become known as &#8220;chat control.&#8221; Officially called the <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM%3A2022%3A209%3AFIN">Regulation to Prevent and Combat Child Sexual Abuse</a>, the proposal originally mandated that messaging application providers, including encrypted messaging providers like Signal, automatically scan content&#8212;before it leaves a sender&#8217;s device&#8212;for evidence of child sexual abuse. Privacy advocates and cryptographers, including Green, warn that this sort of &#8220;client-side&#8221; scanning system would be a dangerous back door that the government could easily abuse. Denmark, currently the President of the Council of the EU, recently modified the text of the regulation after failing to garner enough support for mandatory scanning. The proposal now calls for &#8220;voluntary&#8221; scanning instead. It&#8217;s on track to be finalized in April.</p><p>Another example is in the United Kingdom, where earlier this year the government ordered Apple <a href="https://www.washingtonpost.com/technology/2025/02/07/apple-encryption-backdoor-uk/">to create a back door</a> that would provide access to any encrypted user data stored in the cloud, globally. After Apple stopped offering its encrypted cloud service, called Advanced Data Protection, in the UK, and the Trump administration criticized the policy, the government dropped its demand for global access. But in October, <a href="https://www.ft.com/content/d101fd62-14f9-4f51-beff-ea41e8794265">it issued a new, more focused demand</a> for access to British users&#8217; encrypted data.</p><p>And then there&#8217;s the war against private cryptocurrency. The EU is cracking down on privacy coins like Zcash, and the US has prosecuted developers of crypto privacy tools.</p><p>The second component of the accelerant in Green&#8217;s analogy is more subtle: &#8220;In the future, everything we do online is going to be tightly bound to our identity,&#8221; he said. This shift is already underway, thanks to laws cropping up that mandate many kinds of websites verify that their users are over a certain age. &#8220;At some point in the near future, that tightly bound human identity on your phone is going to be used for stuff you do online,&#8221; Green warned. &#8220;And that human ID is a legible government ID,&#8221; meaning your government could theoretically see everything you&#8217;ve done online.</p><p>The final forest fire ingredient is powerful AI. &#8220;In the past, we have survived all of this data collection because we&#8217;ve had limited human capacity to process data,&#8221; Green said. &#8220;That&#8217;s not a problem anymore.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><h3>The forest for the trees</h3><p>You may prefer a different disaster metaphor. But the notion that we need new ways to protect ourselves from massive, AI-assisted surveillance should not be controversial. Unfortunately, this conversation is stuck at an impasse. It&#8217;s plausible that we could deploy some of the astounding practical cryptographic capabilities that have emerged in the last half-decade toward that protection. But these technologies have developed a bad reputation with many policy and law enforcement types right out of the gate.</p><p>Take zero-knowledge cryptography, which makes it possible to prove statements about yourself, like your national citizenship or that you are over 18, without revealing other information. Unfortunately, the most attention it has received outside of a relatively small community of cryptographers and enthusiasts was thanks to a massive cryptocurrency heist carried out by a band of North Korean state-sponsored hackers raising funds for the nation&#8217;s nuclear weapons program.</p><p>The Lazarus Group, as it&#8217;s called, stole $600 million in 2022, then turned to Tornado Cash, a zero-knowledge cryptography-based privacy tool on the Ethereum blockchain, to throw law enforcement off its tracks. That has led to the criminal conviction of two of Tornado Cash&#8217;s developers, Alexey Pertsev and Roman Storm.</p><p>The episode, combined with the technical complexity at play, has made it easy for regular people to miss that the underlying technology could be used as protection against the overcollection of personal data. If you need evidence, look no further than Google Wallet. Google has <a href="https://blog.google/products/google-pay/google-wallet-age-identity-verifications/">incorporated zero-knowledge proofs</a> to create anonymous credentials, which can be used to prove the veracity of information on a driver&#8217;s license or passport, like someone&#8217;s age, gender, or nationality, without revealing any other personal data.</p><p>Abhi Shelat, a Northeastern University computer science professor who helped develop Google&#8217;s zero-knowledge credentials, <a href="https://youtu.be/B3bzoPX-avQ?si=iWaAgV6V2_SdgUCw">argued at the DC Privacy Summit</a> that zero-knowledge cryptography is ready for mainstream adoption. &#8220;It works on a phone; it works on a blockchain,&#8221; he said. &#8220;I wouldn&#8217;t say there&#8217;s a real technical bottleneck to deploying this.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CTyI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CTyI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 424w, https://substackcdn.com/image/fetch/$s_!CTyI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 848w, https://substackcdn.com/image/fetch/$s_!CTyI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 1272w, https://substackcdn.com/image/fetch/$s_!CTyI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CTyI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png" width="1456" height="846" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:846,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3351086,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/181145486?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CTyI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 424w, https://substackcdn.com/image/fetch/$s_!CTyI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 848w, https://substackcdn.com/image/fetch/$s_!CTyI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 1272w, https://substackcdn.com/image/fetch/$s_!CTyI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a1e5e7d-fd7e-4ee5-9cda-d417aa1e6118_2748x1597.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From left to right: Abhi Shelat of Northeastern University, Justin Thaler of a16z, and Mike Orcutt of Project Glitch</figcaption></figure></div><h3>Few understand this</h3><p>Instead, Shelat said, the major bottleneck to deployment may be how few people understand the technology well enough to reckon with the novel questions it raises.</p><p>For example, law enforcement agencies are accustomed to collecting and storing detailed data about financial transactions. If advanced cryptographic tools are used to keep that information secret, how will those agencies do their job? On the other hand, could such tools be designed to make it easier to prevent financial crime?</p><p>More specifically, could the crypto industry find better ways to stop the Lazarus Group from using cryptocurrency to help fund its nuclear weapons program? &#8220;Onchain privacy is like nuclear physics,&#8221; Wei Dai, a cryptographer and research partner at the venture capital firm 1kx, <a href="https://youtu.be/b1RjuJrOt3A?si=uwNNDt6R0yOXJixK">argued at the Privacy Summit</a>. &#8220;It is a dual-use technology that can do great good for the world, but also can be very dangerous.&#8221;</p><p>Neha Narula, director of MIT&#8217;s Digital Currency Initiative, <a href="https://www.youtube.com/watch?v=NsRFuTn3WbU">said</a> that while zero-knowledge proofs are &#8220;uniquely powerful,&#8221; it&#8217;s important not to gloss over the potential downsides if they and other powerful privacy tools gain wide adoption. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0NaN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0NaN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 424w, https://substackcdn.com/image/fetch/$s_!0NaN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 848w, https://substackcdn.com/image/fetch/$s_!0NaN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 1272w, https://substackcdn.com/image/fetch/$s_!0NaN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0NaN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png" width="1456" height="732" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91560946-fa14-4621-9818-99e164c85c61_2771x1393.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:732,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2281469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/181145486?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0NaN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 424w, https://substackcdn.com/image/fetch/$s_!0NaN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 848w, https://substackcdn.com/image/fetch/$s_!0NaN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 1272w, https://substackcdn.com/image/fetch/$s_!0NaN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91560946-fa14-4621-9818-99e164c85c61_2771x1393.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8220;Imagine a world where producing cryptographic proofs is easy and automatic, and so asking for proofs becomes routine,&#8221; she said. &#8220;You need to prove you are credit-worthy to use a ridesharing app, or you need to prove your health status in order to enter a building.&#8221; People end up with less autonomy, not more. &#8220;A technology that was originally designed to help with privacy turns into continuous permissioning,&#8221; she imagined.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/how-to-prevent-online-privacy-from?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/how-to-prevent-online-privacy-from?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3>A chance to show the world</h3><p>In the near term, given the national security concern, the lack of clarity as to how these tools fit into the law, and the technology&#8217;s rapid evolution, the legal conflict over these technologies seems likely to keep festering.</p><p>On the other hand, recent policy developments&#8212;age verification laws, government-backed digital IDs, and America&#8217;s new stablecoin law, to be specific&#8212;may force the issue in a way that makes a resolution more plausible.</p><p>The industry should jump at the chance to demonstrate its powerful cryptographic technologies, Peter Van Valkenburgh, executive director of the blockchain policy advocacy and research group Coin Center, <a href="https://youtu.be/fpoXZrEcXlI?si=6_k-3RyTyM2vXvIp">argued at the Privacy Summit</a>. </p><p>In the US, the Guiding and Establishing National Innovation for US Stablecoins (GENIUS) Act has cleared the way for more traditional financial institutions to start using stablecoins. That may be a business opportunity for crypto companies, but it also raises urgent questions about privacy. &#8220;The current stablecoin model of recording all user payment transactions on a public blockchain is actually worse for personal privacy than the traditional banking system,&#8221; he said. It&#8217;s in this context that Coin Center is <a href="https://www.coincenter.org/tear-down-this-walled-garden/">advocating for</a> &#8220;a fundamental rethink of digital identity in the United States.&#8221;</p><p>America&#8217;s current anti-money laundering (AML) regime operates under a law called the Bank Secrecy Act, which was passed in 1970. The antiquated system is costly, blocks only a small percentage of criminal funds, and gives the government the power to &#8220;weaponize&#8221; our payments data as a means of control, Van Valkenburgh said at the Privacy Summit. Blockchains, along with portable digital ID credentials, zero-knowledge proofs, and cryptographic tools, can be used to build alternative, more effective, and much less invasive AML systems, he said.</p><p>There&#8217;s a lot that still needs to be figured out, though. For one thing, proving individual, static statements about yourself is a long way from replacing traditional AML systems. &#8220;None of the history of computer attack and defense or anti-money laundering is a static system,&#8221; Ian Miers, another Zcash co-inventor and a computer science professor at the University of Maryland, said later in the day. &#8220;You have to be able to react and adapt because any given tactic you pick, they&#8217;re going to adapt their tactics, techniques, and procedures to get around it.&#8221; Miers argued that what&#8217;s needed are systems capable of automatically determining &#8220;dynamic risk scores&#8221; for potential users while still maintaining user privacy.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fl2T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fl2T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 424w, https://substackcdn.com/image/fetch/$s_!fl2T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 848w, https://substackcdn.com/image/fetch/$s_!fl2T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 1272w, https://substackcdn.com/image/fetch/$s_!fl2T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fl2T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png" width="1456" height="761" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:761,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1939249,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/181145486?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fl2T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 424w, https://substackcdn.com/image/fetch/$s_!fl2T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 848w, https://substackcdn.com/image/fetch/$s_!fl2T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 1272w, https://substackcdn.com/image/fetch/$s_!fl2T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa81f5a02-8804-4562-aa34-b1d443269b62_2858x1493.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Miers and Van Valkenburgh recently authored <a href="https://www.coincenter.org/tear-down-this-walled-garden/">a paper</a> calling on crypto privacy projects to coordinate amongst themselves and with civil liberties advocates to design and test safe, alternative AML systems. To start, an industry consortium &#8220;could develop open standards for decentralized, maximally privacy-preserving identity credential architecture and urge Congress and regulators to authorize regulated providers to rely on them,&#8221; they wrote.</p><h3>A race against time</h3><p>Something like that would have implications beyond crypto and anti-money laundering, particularly if governments keep pursuing &#8220;identity-binding mandates,&#8221; as Green calls them.</p><p>We should resist policies that tie government identities to online activity, Green said. &#8220;At very least, we have to make sure that any identity-binding mandate we add to <em>everything</em> is done in a privacy-preserving way.&#8221; That will tee up another fight, he said: &#8220;Is it fully privacy-preserving or is it privacy-preserving with a warrant exception? We haven&#8217;t even begun that discussion, which is terrifying, because these laws are being passed right now.&#8221;</p><p>We should also ban companies from retaining the data they used to verify identity credentials, Green argued. Otherwise, a market will arise for it. &#8220;It&#8217;s not privacy-preserving, they will log it, and they will log your identity with every single thing you do, and that data&#8217;s going to be incredibly valuable.&#8221;</p><p>Finally, while anonymous credentials work, they create new challenges when it comes to the sort of fraud and abuse that commonly occurs online. &#8220;I would love to tell you that all we have to do is replace cookies with zero-knowledge proofs and we&#8217;re done,&#8221; Green said. &#8220;But what happens when someone takes my key or my driver&#8217;s license credentials off my phone and copies them onto 10,000 phones that are all bots? Which is what they&#8217;re gonna do.&#8221;</p><p>Today, if Google sees the same cookie coming in from too many IP addresses, it can tell you&#8217;ve been hacked. &#8220;If I&#8217;m anonymous&#8212;if I&#8217;m a zero-knowledge proof&#8212;they can&#8217;t do that,&#8221; he said. He called this a &#8220;huge technical barrier&#8221; to the real-world use of anonymous credentials. &#8220;I&#8217;d love to tell you that the academic world has fixed this. Nobody&#8217;s fixed this.&#8221;</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading to the end! If you learned something, please consider subscribing or upgrading to paid. Every bit of support helps!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and/or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[Eight Glitchy Things]]></title><description><![CDATA[AI agents that can pay, sad sandwich bots, broken TEEs, and more]]></description><link>https://www.projectglitch.xyz/p/eight-glitchy-things</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/eight-glitchy-things</guid><dc:creator><![CDATA[Mike Orcutt]]></dc:creator><pubDate>Wed, 12 Nov 2025 20:59:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uOVY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>PSA: This is the first edition of Glitchy Things, a news-focused digest we plan to send regularly in addition to our work featuring original journalism and event content. We hope you enjoy it!</em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uOVY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uOVY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 424w, https://substackcdn.com/image/fetch/$s_!uOVY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 848w, https://substackcdn.com/image/fetch/$s_!uOVY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 1272w, https://substackcdn.com/image/fetch/$s_!uOVY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uOVY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif" width="1232" height="693" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:693,&quot;width&quot;:1232,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:26568,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/avif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/178708483?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uOVY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 424w, https://substackcdn.com/image/fetch/$s_!uOVY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 848w, https://substackcdn.com/image/fetch/$s_!uOVY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 1272w, https://substackcdn.com/image/fetch/$s_!uOVY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F270e6c8a-ab34-4d99-a495-edab9f56e521_1232x693.avif 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Bots</figcaption></figure></div><p><em><strong>The speed of technological evolution is causing familiar systems&#8212;from government to finance to journalism&#8212;to glitch. The resulting noise makes it tough to connect the dots. We hope this digest helps.</strong></em></p><p><strong>A developer of a Bitcoin privacy tool was sentenced to five years in prison. </strong>In July, Keonne Rodriguez pleaded guilty to operating an unlicensed money transmitting business. They did so under a section of the US criminal code that the Department of Justice has interpreted to mean that if one &#8220;knowingly&#8221; facilitates the transfer of criminal funds, they can be charged with operating an unlicensed money transmitting business&#8212;even if what&#8217;s actually facilitating the transfer is software that never takes control of user funds. (<a href="https://www.projectglitch.xyz/p/crypto-regulation-by-prosecution">We&#8217;ve been documenting</a> this confusing interpretation, which is also the basis for the prosecution of Tornado Cash developer Roman Storm, all year.)</p><p>Rodriguez, whose lawyers had requested a sentence of one year and one day, submitted a letter appealing for leniency from Judge Denise Cote of the Southern District of New York. But Cote &#8220;appeared extremely skeptical of any claim to Samourai Wallet&#8217;s usefulness for non-criminal ends or general privacy,&#8221; David Z. Morris <a href="https://www.therage.co/keonne-rodriguez-samourai-sentenced/">reported</a> for The Rage. Rodriguez&#8217;s co-developer, William Lonergan Hill, is scheduled to be sentenced next week.</p><p><strong>Are the words of an AI chatbot &#8220;speech&#8221;? </strong>The family of a 14-year-old who committed suicide has brought a wrongful death and negligence lawsuit against <a href="http://character.ai">Character.AI</a>, the firm behind a chatbot with which the teen had developed a romantic relationship. The factors here are sensitive and complex, and we recommend reading the comprehensive <a href="https://www.nytimes.com/2025/10/24/magazine/character-ai-chatbot-lawsuit-teen-suicide-free-speech.html">The New York Times Magazine</a> piece on it. One thing that immediately stands out, though, is <a href="http://character.ai">Character.AI</a>&#8217;s defense. As the piece explains:</p><blockquote><p>This kind of negligence suit comes into U.S. courtrooms every day. But Character.AI is advancing a novel defense in response. The company argues that the words produced by its chatbots are speech, like a poem, song or video game. And because they are speech, they are protected by the First Amendment. You can&#8217;t win a negligence case against a speaker for exercising their First Amendment rights.</p></blockquote><p>According to the NYT Mag (citing Helen Norton, a law professor at the University of Colorado), this is &#8220;very likely the first time the courts have confronted a &#8216;nonhuman speaker&#8217; in a wrongful death case.&#8221; But it&#8217;s far from the last. &#8220;These disputes are going to come fast and furious as AI capabilities evolve,&#8221; Norton said.</p><p><strong>Fake people fanned the flames of online outrage following Cracker Barrel&#8217;s logo change.</strong> A company that Cracker Barrel hired to analyze social media posts found that &#8220;32% to 37% of the online activity criticizing Cracker Barrel in the days after its logo announcement was fueled by fake accounts,&#8221; <a href="https://www.wsj.com/business/the-cracker-barrel-logo-mess-c57d23e8">the Wall Street Journal reports</a>. The research did not determine the real people behind the fake ones. But according to the WSJ, the bots amplified a number of X posts from the holdings of one investor in Cracker Barrel named Sardar Biglari, who also owns Steak &#8216;n Shake and the media brand Maxim. Biglari denied involvement, telling the WSJ that the bot story is just part of a &#8220;roulette wheel of excuses&#8221; from Cracker Barrel.</p><p><strong>What&#8217;s in your (agent&#8217;s) wallet? </strong>If little AIs are going to run around the internet carrying out their masters&#8217; orders, they&#8217;re not going to get far unless they can buy stuff. The question is, how are agent payments going to work? Back in September, crypto exchange Coinbase and Cloudflare, the web content delivery services company, announced they&#8217;d teamed up to start trying to answer that question with <a href="https://blog.cloudflare.com/x402/">the x402 protocol</a>. The idea behind x402 is to create a way for agents to be able to request an item of value&#8212;whether that&#8217;s the latest Shein fit, a new bunch of inference tokens, or whatever&#8212;from an online seller, get a &#8220;402: Payment Required&#8221; response, and then be able to submit details to complete the transaction (the 402 response is already embedded in HTTP, similar to its more famous sibling, &#8220;404: Not Found&#8221;). The framework includes a cryptographic signature that proves the agent making the purchase has been authorized to use the resources necessary to complete the transaction.</p><p>Building on that idea, Coinbase released a tool late last month called <a href="https://www.theblock.co/post/375791/coinbase-unveils-tool-ai-agents-claude-gemini-access-crypto-wallets">Payments MCP</a> that&#8217;s meant to allow AI agents to access cryptocurrency wallets. As the US&#8217;s largest crypto exchange and creator of the popular Ethereum Layer 2 Base, it&#8217;s pretty clear where Coinbase&#8217;s interests lie&#8212;legions of agents doing business onchain could be very good for business. But x402 isn&#8217;t being built to be crypto-specific; as Cloudflare&#8217;s blog post describing plans for x402 <a href="https://blog.cloudflare.com/x402/#a-primer-on-x402">says</a>, &#8220;Future versions of x402 could be agnostic of the payment rails, accommodating credit cards and bank accounts in addition to stablecoins.&#8221;</p><p><strong>Of the $864 million the Trump Organization&#8217;s income in the first half of 2025, $802 million came from the family&#8217;s crypto businesses. </strong>That&#8217;s according to an <a href="https://www.reuters.com/investigations/inside-trump-familys-global-crypto-cash-machine-2025-10-28/">investigation by Reuters</a>. It&#8217;s also compared to just $51 million in revenue a year earlier. The report added that more than half of the Trumps&#8217; income came from sales of World Liberty Financial tokens.</p><p><strong>The crypto case that reduced jurors to tears might get a redo. </strong>Two brothers made $25 million in 12 seconds by exploiting Ethereum &#8220;MEV&#8221; bots. Was it a crime? Unclear&#8212;a federal prosecution ended in a mistrial last week after a jury was emotionally overwhelmed by the case.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dx77!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dx77!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 424w, https://substackcdn.com/image/fetch/$s_!dx77!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 848w, https://substackcdn.com/image/fetch/$s_!dx77!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 1272w, https://substackcdn.com/image/fetch/$s_!dx77!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dx77!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png" width="1185" height="1386" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1386,&quot;width&quot;:1185,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:902288,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/178708483?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dx77!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 424w, https://substackcdn.com/image/fetch/$s_!dx77!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 848w, https://substackcdn.com/image/fetch/$s_!dx77!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 1272w, https://substackcdn.com/image/fetch/$s_!dx77!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda10b7b-acdf-40fc-8eb1-ae482c23e19d_1185x1386.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Prosecutors have said they <a href="https://www.theblock.co/post/378414/prosecutors-seek-new-trial-mit-brothers-25-million-ethereum-fraud-case-ends-mistrial">want another trial</a><strong>.</strong> If that happens, a fresh set of jurors will need to try and grasp the inner workings of the Ethereum network, specifically the process by which new transactions are added to blocks and published to the chain. There&#8217;s a lot of money to be made in this process, and this potential profit is called maximal extractable value, or MEV. Ethereum has a complicated system aimed at keeping the competition for this money fair. The game has three main players: 1. <em>Searchers</em>, who use bots to scan the queue of pending transactions for opportunities to make money by sequencing the transactions in specific ways. Searchers propose transaction bundles to 2. <em>builders</em>, who use them to build the most profitable blocks possible, and then offer a cut of the profit to 3. <em>validators</em>, which are responsible for adding new blocks to the chain.</p><p>The vast majority of validators use open source software called MEV-Boost, developed by Flashbots, to interact with builders. The two brothers, James and Anton Peraire-Bueno, operated validators. They had found a vulnerability in MEV-Boost that gave them more insight into the content of proposed blocks than the system is supposed to allow. With that insight, they changed a block&#8217;s transaction sequence in a way that, as explained in <a href="https://collective.flashbots.net/t/post-mortem-april-3rd-2023-mev-boost-relay-incident-and-related-timing-issue/1540">a postmortem</a> published at the time by Flashbots, &#8220;effectively stole&#8221; money from a bot that had proposed the original sequence. The brothers were charged with conspiracy to commit wire fraud, wire fraud, and conspiracy to commit money laundering. But the jury in their trial <a href="https://www.bloomberg.com/news/articles/2025-11-08/judge-declares-mistrial-in-mit-grad-brothers-fraud-case">couldn&#8217;t reach a unanimous decision</a> on the charges, and the judge declared a mistrial.</p><p><strong>ICE and CBP agents are scanning people&#8217;s faces on the street to verify citizenship. </strong>That&#8217;s the headline <a href="https://www.404media.co/ice-and-cbp-agents-are-scanning-peoples-faces-on-the-street-to-verify-citizenship/">from 404 Media</a>, which reviewed multiple videos showing that the agencies are &#8220;actively using smartphone facial recognition technology in the field.&#8221;</p><p><strong>Trusted execution environments (TEEs) maybe shouldn&#8217;t be so trusted. </strong>Researchers pulled off physical attacks on all three of the most popular confidential computing devices on the market.<strong> </strong>This one is technical as hell, but it matters because TEEs are so prevalent. The hardware, used in cloud computing, AI finance, defense, and even blockchain systems, is supposed to keep data and computations private, even from an attacker who has taken root-level control of the system. &#8220;It&#8217;s hard to overstate the reliance that entire industries have on three TEEs in particular: Confidential Compute from Nvidia, SEV-SNP from AMD, and SGX and TDX from Intel,&#8221; <a href="https://arstechnica.com/security/2025/10/new-physical-attacks-are-quickly-diluting-secure-enclave-defenses-from-nvidia-amd-and-intel/">writes Dan Goodin of Ars Technica</a>. That&#8217;s problematic, Goodin says, because researchers have now shown that all three can be broken via inexpensive physical attacks. He explains:</p><blockquote><p>The low-cost, low-complexity attack works by placing a small piece of hardware between a single physical memory chip and the motherboard slot it plugs into. It also requires the attacker to compromise the operating system kernel. Once this three-minute attack is completed, Confidential Compute, SEV-SNP, and TDX/SDX can no longer be trusted.</p></blockquote><p>The researchers behind the attacks, which they have collectively named TEE.fail, have published <a href="https://tee.fail/files/paper.pdf">a paper</a> and a <a href="https://tee.fail/">website</a> describing their work.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading to the end! If you learned something, please consider subscribing or upgrading to paid. Every bit of support helps!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What does it mean to decentralize AI?]]></title><description><![CDATA[Part 1: Training data is power]]></description><link>https://www.projectglitch.xyz/p/what-does-it-mean-to-decentralize</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/what-does-it-mean-to-decentralize</guid><dc:creator><![CDATA[Mike Orcutt]]></dc:creator><pubDate>Tue, 04 Nov 2025 19:18:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lkc6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello again! Crypto folks talk a ton about decentralization in the technical sense. But decentralization is about power, and distributing the power to the edges&#8212;or to the people&#8212;often requires more than just technical systems. This is part of what makes the collision between crypto and AI technologies so fascinating. As journalists, we plan to engage with this collision with great care, maintaining our focus on a basic question: What does it mean to decentralize AI?</em></p><p><em>Our first major foray was a panel discussion that Michael Reilly moderated in Washington, DC, in September, featuring Art Abal of Vana and Jay Stanley of the ACLU. Today&#8217;s edition reflects on one particularly urgent idea that surfaced during that conversation. After that, we have a highlight from the DC Privacy Summit.</em></p><div><hr></div><h2>Who will own the training data?</h2><p>By Mike Orcutt</p><p>Whether AI will be good or bad for society in the long run may hinge on how widely its power is distributed. Jay Stanley, a senior policy analyst at the American Civil Liberties Union, compares AI to weapons technologies that have changed the nature of warfare in the past: Will it be more like tanks or like muskets? Tanks are technically complicated and massively expensive. Only large, wealthy entities that command tremendous amounts of labor and industrial resources can produce them. That makes them &#8220;inherently authoritarian,&#8221; he says. By comparison, muskets, rifles, and other small arms are simple and easy to distribute widely&#8212;they&#8217;re &#8220;inherently democratic.&#8221;</p><p>At the moment, AI is more like tanks&#8212;primarily built and deployed by companies with vast amounts of capital and infrastructure at their disposal. As Stanley noted, however, the rise of models like DeepSeek R1 and its later iterations shows that cheaper, open-source models have the potential to change the playing field.</p><p>One factor that will weigh heavily on how things play out is who owns the data that these models use to train on.</p><p>&#8220;The power in AI is actually data now,&#8221; Art Abal, managing director of the Vana Foundation, <a href="https://youtu.be/cAMgGCCR3Os?si=CtHNvT5h0Nv7Vso2">said at Project Glitch&#8217;s session of PGP* for Crypto</a>, a gathering of crypto policy insiders in Washington, DC. Abal joined remotely from Australia to chat with Stanley and Project Glitch editor Michael Reilly about what decentralization can do for AI.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lkc6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lkc6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 424w, https://substackcdn.com/image/fetch/$s_!lkc6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 848w, https://substackcdn.com/image/fetch/$s_!lkc6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 1272w, https://substackcdn.com/image/fetch/$s_!lkc6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lkc6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png" width="1380" height="774" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/de643a39-efd9-4145-b89f-889e4f21d283_1380x774.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:774,&quot;width&quot;:1380,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1008610,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/177997457?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lkc6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 424w, https://substackcdn.com/image/fetch/$s_!lkc6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 848w, https://substackcdn.com/image/fetch/$s_!lkc6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 1272w, https://substackcdn.com/image/fetch/$s_!lkc6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde643a39-efd9-4145-b89f-889e4f21d283_1380x774.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From left to right: Art Abal (appearing remotely), Michael Reilly, and Jay Stanley</figcaption></figure></div><p>&#8220;We&#8217;ve reached what&#8217;s called a data wall. All of the public data has already gone into a lot of these (large language models),&#8221; Abal said. Now all the valuable data lives in what he called &#8220;private data silos&#8221; owned by technology companies. &#8220;That&#8217;s essentially what we&#8217;re trying to break up in creating a decentralized protocol for data,&#8221; he said.</p><p>The company Abal cofounded, Vana, has devised a system that lets users privately store personal data&#8212;say, for example, all their Reddit data, which can be acquired by submitting a form&#8212;and control access to it using rules encoded in blockchain smart contracts. Vana has also created a mechanism by which users can pool their data to create valuable datasets they collectively own. There are <a href="https://www.vana.org/collectives">15 such &#8220;data collectives&#8221;</a> listed on the company&#8217;s website. The most high-profile example is probably RedditDAO, which promises to let you &#8220;own your Reddit history.&#8221;</p><p>Stanley expressed skepticism about the business of helping people make money from their personal data because he&#8217;s seen so many failed attempts over the years, starting long before blockchains emerged. And it&#8217;s not clear how much room there is to improve large language models (LLMs) with additional data, at least &#8220;compared to the huge leap that we achieved by training LLMs on the whole Internet,&#8221; he argued.</p><p>But it&#8217;s not just about LLMs, Abal said. &#8220;We&#8217;ve also got to remember that the majority of the AI we interact with every day is not just LLMs,&#8221; he said. &#8220;We interact with it whenever we get suggested things, we interact with it whenever we go to the doctor&#8217;s, we interact with it in all sorts of facets of life.&#8221; That&#8217;s why data&#8212;and especially &#8220;niche data&#8221; like data on specific kinds of human interactions with AI&#8212;is so valuable, he said.</p><p>Indeed, the power that companies like OpenAI, Anthropic, Meta, Google, and others have in this realm&#8212;not just to build better LLMs but also other kinds of models&#8212;is increasing as they collect more and more of this data, he said. The quality of public datasets is improving, but &#8220;the majority of data that creates that edge in terms of AI is exchanged in these private backdoor deals or is trained on data that the platforms collect themselves.&#8221; This helps explain why Anthropic, which had previously said it would not rely on user data for model training, recently <a href="https://www.anthropic.com/news/updates-to-our-consumer-terms">changed its policy</a> and will now use that data by default, Abal said.</p><p>For many good reasons, not everyone will want to hand over their data. &#8220;There&#8217;s an enormous need for people to use models that have privacy, either personal privacy or just organizations that can&#8217;t share their documents,&#8221; said Stanley.</p><p>Users should also have the power to pack their data up and move from one platform to another, Abal argued. Without this kind of &#8220;data portability,&#8221; a &#8220;flywheel effect&#8221; will just keep increasing big AI companies&#8217; power, he said, at the expense of users.</p><p>Take ChatGPT for example, he said: &#8220;It trains on your data, unless you opt out, so the more data you put in, the better the model gets, which increases your incentives to use that same model, which then increases the amount of data that you put in that model, which then makes that model better and increases your incentives to use that model.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><code>PRIVACY SUMMIT INSIGHT</code></p><h2>Zero-knowledge credentials are just step one</h2><p>Many compelling themes emerged from the conversations at Project Glitch&#8217;s DC Privacy Summit last month. One that stood out was how much conceptual and technical work is still to come before a truly secure alternative to today&#8217;s anti-money laundering (AML) systems will be ready for prime time.</p><p>There are good reasons to want to supplant the current AML regime:</p><ul><li><p>It calls on financial institutions to collect and store vast amounts of personal data&#8212;a costly and arguably outdated practice that leaves regular people&#8217;s sensitive personal information vulnerable to hackers.</p></li><li><p>The current system also doesn&#8217;t work for decentralized software, where there is no human in the middle to verify customer IDs and watch for suspicious transactions.</p></li><li><p>We have powerful new cryptographic capabilities that could serve as components of these new AML systems.</p></li></ul><p>Many of the Privacy Summit sessions touched on the idea that zero-knowledge cryptography could be used to anonymously prove statements about a user&#8217;s identity, from their national citizenship to the fact that they are older than 18 or 21 years. These tools are ready today; Google already <a href="https://youtu.be/B3bzoPX-avQ?si=3TpAUNC_9pfRFxDq">is using them</a>. But anti-money laundering systems require more than just static checks, noted Zcash co-inventor and University of Maryland cryptographer Ian Miers in one of the most insightful moments of an insight-packed day:</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;083d7e0b-c774-448f-8e99-014fadb58757&quot;,&quot;duration&quot;:null}"></div><p>Watch the full panel discussion, which featured Miers as well as Ross Schulman of SpruceID and Laz Pieper of the DeFi Education Fund, <a href="https://youtu.be/m4k7sD6aPvo?si=PvuDptwWm3iaCwJc">here</a>. And here&#8217;s <a href="https://youtube.com/playlist?list=PLWmtTg-WFLv7lbiY8nlABeadXbomhbede&amp;si=hpawKu-oWe4Jjvwi">a playlist of every session from the day</a>.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading all the way to the end! If you aren&#8217;t already subscribed, we&#8217;d love to have you along for the ride. If you are, please consider upgrading to paid! We have big plans to follow up on the DC Privacy Summit with more events like it&#8212;and a lot more newsletter content. Any support you can provide will go a long way. Oh, and if you&#8217;d rather just send us some crypto, we&#8217;re at projectglitch.eth.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The privacy narrative is noisy. We've channeled the signal.]]></title><description><![CDATA[The 2025 DC Privacy Summit unearthed the pieces of a complicated puzzle.]]></description><link>https://www.projectglitch.xyz/p/the-privacy-narrative-is-noisy-weve</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/the-privacy-narrative-is-noisy-weve</guid><dc:creator><![CDATA[Mike Orcutt]]></dc:creator><pubDate>Mon, 27 Oct 2025 18:29:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wLDx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello again! In case you missed it, our <a href="https://dcprivacysummit.org/">2nd annual DC Privacy Summit</a> was earlier this month. At the risk of being immodest, it was awesome&#8212;we tapped into a deep, urgent conversation around cryptographic privacy thanks to an amazing lineup of speakers. Our attendees were super engaged, with great questions throughout the day. </em></p><p><em>Below, you&#8217;ll find a roundup that&#8217;ll catch up anyone who wasn&#8217;t able to attend. And to the large chunk of folks who were there and signed up for the newsletter, welcome! Consider this your Cliff&#8217;s Notes from the day. </em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wLDx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wLDx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wLDx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wLDx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wLDx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wLDx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg" width="2048" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/de6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:2048,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731279,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/177276250?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa55e91-ea7d-4fab-bf6b-24a3f9efeab2_2048x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wLDx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wLDx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wLDx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wLDx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde6ea45a-7c3e-49f6-a6d1-df473db51146_2048x1536.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">On screen: Samczsun; On stage, from left to right: Michael Mosier, Casey G., and Mike Orcutt </figcaption></figure></div><h2>Let&#8217;s get more precise about privacy</h2><p>The story of cryptocurrency and privacy has mostly been the same since day one: as long as the public ledger is transparent, the money is traceable. As long as the money is traceable, the state (and possibly your adversaries) will trace it. To truly be a money system independent of state control, it must be both uncensorable <em>and</em> private. This is nothing new. Hence Zcash, Monero, Tornado Cash, Samourai Wallet, and more recent projects like Railgun and 0xbow&#8212;all of which use cryptographic techniques to achieve some level of privacy onchain.</p><p>Recently, however, the story has begun to change. The rise of shockingly powerful data processors like large language models, the overt aggregation of government databases to juice surveillance powers, and massive thefts of personal data by nation-state hackers are just a few of the reasons for that. More people, even in historically safe and stable places like the US, are looking to better protect their data.</p><p>Combine that with an administration in Washington positioned as &#8220;pro-crypto&#8221; and it helps explain why so many influential folks in crypto social media spaces have been posting so much about privacy lately. Not only is it timely, but the subject is no longer widely seen as taboo. (Coincidentally or not, the price of Zcash, the first practical implementation of zero-knowledge proofs, has also been pumping.)</p><p>But social media, especially crypto social media, is mostly noise.</p><p>To find the signal, you&#8217;ll have to dig beneath the shitpost-covered surface. Talk to the folks giving themselves headaches from thinking so hard about how to balance onchain privacy with the risks posed by bad actors. Ask the regulators who see the promise of emerging cryptographic privacy tools, but who also see first-hand how the world&#8217;s most sophisticated hackers use them to evade law enforcement. Push the conversation beyond the usual absolutism into a grey area full of technical possibilities and ideas, but devoid of concrete plans for how to move forward.</p><p>That&#8217;s what we did on October 16.</p><p>The 2nd Annual DC Privacy Summit highlighted the many facets that should comprise an urgent, pragmatic conversation about cryptographic privacy in 2025. Interested in participating in this conversation? We recommend you close Twitter for a while and <a href="https://www.youtube.com/playlist?list=PLWmtTg-WFLv7lbiY8nlABeadXbomhbede">immerse yourself in the Privacy Summit sessions</a> we describe below, in the order in which they occurred on the day of the event.</p><p>Read the summaries. <a href="https://www.youtube.com/playlist?list=PLWmtTg-WFLv7lbiY8nlABeadXbomhbede">Watch the videos</a>. Watch them again. And then let&#8217;s keep talking about privacy for real. The narrative on social media has nothing on this stuff.</p><p><strong>You are probably underestimating modern cryptography. </strong>Arnaud Schenk, executive director of the Aztec Foundation, noted in his opening remarks that until recently, cryptographic tools were mostly binary&#8212;fully private or fully transparent. That&#8217;s no longer the case, he said. Tools incubated in the blockchain space over the past decade can achieve much greater flexibility. These tools will only get more powerful and easier to use, and they are bound to shake things up considerably, he said:</p><blockquote><p>&#8220;By definition, they break a bunch of assumptions that I think a lot of regulators, a lot of companies, have about how the world works or ought to work. They give people new powers, and they create new risks. They will make some regs completely counterproductive, and they will make new regs potentially needed.&#8221; </p></blockquote><p>(<a href="https://www.youtube.com/watch?v=aFxMO2H0QLs">Watch Arnaud Schenk&#8217;s talk</a>)</p><p><strong>A privacy forest fire is coming. </strong>Johns Hopkins University cryptographer Matthew Green has a dire warning: that paranoid thought in the back of your mind that somewhere someone knows everything about you, right down to your individual Google searches, will not just be a paranoid thought for much longer. His preferred analogy is a forest fire:</p><ul><li><p>The dry timber is the vast amount of data that governments and companies have already collected and are now storing.</p></li><li><p>The accelerant is the current push by governments to weaken encryption <em>and </em>bind human identities to online interactions using mobile driver&#8217;s licenses and other digital credentials.<strong> </strong>&#8220;In the past, we&#8217;ve survived all of this data collection because we had limited human capacity to process data,&#8221; Green said.</p></li><li><p>That&#8217;s not the case anymore, due to the fire-starter, he argued: emerging capacities to do machine learning inference at massive scales.</p></li></ul><p>It&#8217;s not all bad news; there are still things we can do to keep the whole forest from burning to the ground. But it&#8217;s late in the game. (<a href="https://www.youtube.com/watch?v=PVH2DqvDeoM">Watch Matthew Green&#8217;s talk</a>)</p><p><strong>Technology is not a privacy cure-all.</strong> &#8220;When we talk about privacy today, the conversation inevitably quickly turns to technology,&#8221; Neha Narula, director of the MIT Media Lab&#8217;s Digital Currency Initiative, said in her keynote. But we need to be precise about what these technologies can and can&#8217;t do. Take zero-knowledge proofs: </p><blockquote><p>&#8220;They let you show that a computation was carried out correctly, without revealing the underlying data, and that&#8217;s remarkable. But they don&#8217;t tell you if the data itself is accurate or complete, and they don&#8217;t preclude the need for an authority to source that data, like a government indicating citizenship. The mere use of verifiable credentials can&#8217;t prevent an authoritarian government from denying some of its citizens that credential. And it can&#8217;t stop a platform from using that credential to kick certain types of people off.&#8221; </p></blockquote><p>Narula is also concerned that if used unwisely, zero-knowledge proofs and other tools could replace autonomy with, as she put it, &#8220;automated control.&#8221; Imagine having to prove you are credit-worthy before you can call an Uber, or prove your health status before being allowed into a building. &#8220;A technology that was originally designed to help with privacy turns into continuous permissioning.&#8221; Technology itself is not enough; technologists must figure out how to work within policy and the law, Narula said. (<a href="https://www.youtube.com/watch?v=NsRFuTn3WbU">Watch Neha Narula&#8217;s talk</a>)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nGJ9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nGJ9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nGJ9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nGJ9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nGJ9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nGJ9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:793039,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/177276250?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nGJ9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nGJ9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nGJ9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nGJ9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5e95be3-83b3-47a6-9d84-58e4e881bfd9_2048x1536.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Neha Narula and SEC Commissioner Hester Peirce</figcaption></figure></div><p><strong>Human dignity still matters.</strong> After her talk, Narula was joined on stage by SEC Commissioner Hester Peirce. They discussed a <a href="https://www.sec.gov/newsroom/speeches-statements/peirce-remarks-blockchain-conference-080425">speech</a> that Peirce gave in August that highlighted the promise of zero-knowledge proofs for achieving greater financial privacy. It&#8217;s significant that a regulator is talking about this stuff in such detail. But is it really possible to change entrenched mindsets in DC around anti-money-laundering and financial data collection? </p><p>If so, it will be by appealing to our shared dignity, Peirce said. </p><blockquote><p>&#8220;We don&#8217;t want to become like the bad guys in the process of going after the bad guys, right? So we want to make sure that we preserve what this country is about, which is the dignity of every person. That&#8217;s the key. And what does that mean? Dignity&#8212;part of what is dignity&#8212;is that you get to choose who you want to spend your time with and who you want to share intimate details of your life with.&#8221; </p></blockquote><p>The way the government relies on the private sector to collect and access Americans&#8217; financial data &#8220;doesn&#8217;t accord with that fundamental principle that binds us together,&#8221; she said. (<a href="https://www.youtube.com/watch?v=XjAg0bEstj0">Watch the fireside chat</a> featuring Neha Narula and Commissioner Hester Peirce)</p><p><strong>DeFi is critical infrastructure. </strong>Whether or not DeFi is important to you, it&#8217;s undeniably important to the North Korean regime, which has exploited crypto networks for billions of dollars via its state-sponsored hacking group known as Lazarus. It was Lazarus&#8217;s use of Tornado Cash that sparked the crackdown leading to the criminal convictions of developers Roman Storm and Alexey Pertsev. The challenge of countering sophisticated state actors in cyberspace is not new in finance, attorney Michael Mosier noted during a panel that also featured Casey G., the CEO of zeroShadow, and Samczsun of the Security Alliance (SEAL). Mosier, a former director at FinCEN and at the National Security Council, has seen firsthand how the traditional financial system uses public-private partnerships to respond to incidents and share threat intelligence.<strong> </strong>However, he noted:</p><blockquote><p>&#8220;The networks that we are talking about now are different.&#8221;</p></blockquote><p>The three panelists described a huge amount of work that must be done on both the technical and legal sides to build the right &#8220;pipes&#8221; for sharing crypto threat intelligence effectively. (<a href="https://www.youtube.com/watch?v=TxkGK6L8e9c">Watch the panel</a> featuring Michael Mosier, Casey Golden, and Samczsun)</p><p><strong>The Tornado Cash and Samourai Wallet prosecutions are chilling development.</strong> Michael Lewellen wants to build a smart contract-based crowdfunding protocol that would use zero-knowledge proofs to let donors remain anonymous. But he&#8217;s worried that he might get prosecuted for unlicensed money transmission&#8212;the same crime that Tornado Cash developer Roman Storm was convicted of, and Samourai wallet developers Keonne Rodriguez and William Lonergan Hill pled guilty to. As we&#8217;ve discussed at length in this newsletter, these prosecutions by the Department of Justice have contradicted something Treasury&#8217;s FinCEN said in 2019: if a software developer never takes control of user funds, they <em>are not</em> <em>a money transmitter</em>. Lewellen sees the Tornado Cash and Samourai prosecutions as contrary to the rule of law, so instead of building his protocol, he is suing the DOJ.</p><blockquote><p>&#8220;With my lawsuit, I would like to have a definitive answer from the courts saying &#8216;No, they cannot do this anymore.&#8217;&#8221; </p></blockquote><p>(<a href="https://www.youtube.com/watch?v=vgE6tf1E5vk">Watch the fireside chat</a> with Michael Lewellen)</p><p><strong>A new approach to anti-money-laundering is possible. </strong>There&#8217;s a good argument that traditional approaches to anti-money-laundering (AML) and know-your-customer (KYC) processes are outdated. Either way, these established approaches don&#8217;t fit decentralized systems.<strong> </strong>Coin Center&#8217;s Peter Van Valkenburgh called on the audience to imagine:<strong> </strong></p><blockquote><p>&#8220;A better world, where new technologies like verifiable credentials, zero knowledge proofs, and open blockchains are used in alternate modes of AML where users own their own identity credentials, where they don&#8217;t need to repeatedly provide them unencrypted to every institution where they open an account, where they can selectively prove discrete facts about themselves, and where these proofs and credentials can be rapidly composable into effective but minimally invasive risk scores to address evolving money laundering threats without immediate de-banking for innocent folks and hopefully with fewer naive false positives from overtly simplistic identity practices.&#8221; </p></blockquote><p>Van Valkenburgh and Coin Center have launched the John Hancock Project to help usher in this new world. (<a href="https://www.youtube.com/watch?v=fpoXZrEcXlI">Watch Peter Van Valkenburgh&#8217;s talk</a>)</p><p><strong>Onchain privacy is like nuclear physics. </strong>Credit for that analogy goes to Wei Dai, a cryptographer at 1kx, who shared it during his keynote.</p><blockquote><p>&#8220;It is a dual-use technology that can do great good for the world, but also can be very dangerous. For those that design and help shape these protocols, we need to be conscious of the potential risks with these protocols.&#8221;<strong> </strong></p></blockquote><p>Technologists face what Dai called a &#8220;trilemma&#8221;: privacy protocols can not simultaneously achieve perfect privacy, threat-resistance, and &#8220;maximum usefulness.&#8221; It&#8217;s possible to impose technical measures that reduce risk while sacrificing usefulness. Another approach, he explained, is to sacrifice perfect privacy for threat-resistance, by making it possible for certain entities to view certain parts of the transaction record under certain circumstances. This gives users the freedom to dissociate from other, malicious users, he argued. (<a href="https://www.youtube.com/watch?v=b1RjuJrOt3A">Watch Wei Dai&#8217;s talk</a>)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c1JI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c1JI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c1JI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c1JI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c1JI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c1JI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg" width="2048" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:2048,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746667,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/177276250?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c588a9c-b43a-4e0c-ba0a-7596b96d2596_2048x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c1JI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c1JI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c1JI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c1JI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44e45ada-06f3-4172-94ad-5334299e0d9a_2048x1536.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Wei Dai</figcaption></figure></div><p><strong>Ready or not, zero-knowledge crypto is going mainstream. </strong>Google has made it possible to use its wallet application to prove, using a zero-knowledge proof, that you are over the age of 18. It doesn&#8217;t get any more mainstream than that. And it&#8217;s just the start. As Northeastern University cryptographer Abhi Shelat and a16z research partner Justin Thaler explained during their panel, the technology is already capable of making age verification more private&#8212;and will soon be able to run all kinds of identity-related checks while maintaining user privacy. But Thaler has a warning:</p><blockquote><p>&#8220;These protocols are orders of magnitude more complicated than today&#8217;s digital signature schemes or encryption schemes. And so they are full of bugs; we&#8217;ve got to be careful until we develop some confidence that there aren&#8217;t bugs there.&#8221; </p></blockquote><p>(<a href="https://www.youtube.com/watch?v=B3bzoPX-avQ">Watch the panel</a> featuring Abhi Shelat and Justin Thaler)</p><p><strong>The EU digital wallet initiative is a cautionary tale. </strong>How can we avoid dystopian digital ID systems? A panel featuring Amal Ibraymi from Aztec, Aisling Connolly from TACEO, and independent applied cryptographer Ying Tong grappled with that question. A particularly pressing real-world problem involves the EU&#8217;s digital wallet project, which offers a cautionary tale for other governments, Ying Tong said. </p><blockquote><p>&#8220;The EU Commission themselves had set forth really strict requirements around unlinkability stating that issuers and verifiers should not be able to link individual presentations of a credential. Yet this did not prevent them from picking a solution that failed to comply with their own requirements. If they had done a careful threat modeling and if they done a careful examination and taxonomy of use cases, and if they had involved technical experts earlier on, this could have been avoided.&#8221;<strong> </strong></p></blockquote><p>(<a href="https://www.youtube.com/watch?v=RkW10BCiqpU">Watch the panel</a> featuring Ying Tong, Aisling Conolly, and Amal Ibraymi)</p><p><strong>AML is more than static checks. </strong>The GENIUS Act has provided an opportunity to reimagine AML for digital assets (whether or not anything comes of it). But verifiable, anonymous credentials that use zero-knowledge cryptography represent only one piece of the puzzle. Many of the ideas out there revolve around &#8220;static things&#8221; like &#8220;prove, at this time, that I&#8217;m not a North Korean. Prove I have a US passport, prove whatever,&#8221; noted Ian Miers, who joined fellow panelists Laz Pieper of the DeFi Education Fund and Ross Schulman of SpruceID to talk about what the future of AML could look like. Miers continued:</p><blockquote><p>&#8220;None of the history of computer attack and defense or anti-money-laundering is a static system. You have to be able to react and adapt because any given tactic you pick, they&#8217;re going to adapt their tactics, techniques and procedures to get around it. That&#8217;s reality. It&#8217;s a cat-and-mouse game. That&#8217;s the game that FinCEN plays. That&#8217;s how they go to banks and say &#8216;Look, your AML flags aren&#8217;t up to date, you need to update them.&#8217;&#8221; </p></blockquote><p>Miers argued that the goal should be a system in which users own their data and use it to calculate a &#8220;dynamic risk score&#8221; that institutions can use for AML and which can be constantly updated. (<a href="https://www.youtube.com/watch?v=m4k7sD6aPvo">Watch the panel</a> featuring Ian Miers, Laz Pieper, and Ross Schulman)</p><p><strong>Be more precise about what you mean by privacy. </strong>Are you talking about pseudonymity, confidentiality, anonymity, or total privacy? What exactly are you hiding, and from whom? Why? For payroll, where it&#8217;s OK for employees to see each other get paid, keeping the amounts confidential might be enough. That&#8217;s the &#8220;vanilla&#8221; flavor of privacy, said Inco founder Remi Gai, who joined Predicate CEO Nikhil Raghuveera for the final panel of the day. If you don&#8217;t want everyone to be able to see who you are paying, anonymity is in order. &#8220;Total privacy&#8221;&#8212;hiding the sender, amount, and recipient&#8212;might be needed if you want to hide the movements of certain &#8220;sensitive assets,&#8221; Gai said. The flavor of privacy your system features will depend on the cryptographic techniques you use. Besides zero-knowledge cryptography, which can be used to prove things about the user, other methods like multiparty computation (MPC), fully homomorphic encryption (FHE), and trusted execution environments (TEEs) can be used to compute on encrypted data, for example, to produce risk scores. Compliance is extremely complicated&#8212;but blockchains are up to the challenge, Raghuveera said. </p><blockquote><p>&#8220;The existing financial system is not programmable. That is actually something that blockchains have a massive edge on.&#8221; </p></blockquote><p>(<a href="https://youtu.be/vP8gc_aMHok?si=6HhHt7zKqBjQxxck">Watch the panel</a> featuring Remi Gai and Nikhil Raghuveera)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading all the way to the end! If you aren&#8217;t already subscribed, we&#8217;d love to have you along for the ride. If you are, please consider upgrading to paid! We have big plans to follow up on the DC Privacy Summit with more events like it&#8212;and a lot more newsletter content. Any support you can provide will go a long way. Oh, and if you&#8217;d rather just send us some crypto, we&#8217;re at projectglitch.eth.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Announcing the Second Annual DC Privacy Summit]]></title><description><![CDATA[How privacy can be security]]></description><link>https://www.projectglitch.xyz/p/announcing-the-second-annual-dc-privacy</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/announcing-the-second-annual-dc-privacy</guid><pubDate>Thu, 11 Sep 2025 17:18:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!f2AY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f2AY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f2AY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f2AY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f2AY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f2AY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f2AY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg" width="1456" height="969" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f2AY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f2AY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f2AY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f2AY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe30444ff-afa8-4d40-a956-5c1197883380_1600x1065.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We're thrilled to announce that the <strong>Second Annual DC Privacy Summit</strong> returns to Washington, D.C. on <strong>October 16, 2025</strong>, at the USC Capital Campus. Following the success of <a href="https://dcprivacysummit.org">our inaugural event</a>, this year's summit explores the idea that in many cases, privacy is security.</p><p>The summit reflects a critical recognition that new approaches to managing illicit finance risks in decentralized systems are needed&#8212;and that emerging cryptographic privacy tools can help.</p><p>At last year&#8217;s summit, we highlighted a dangerous impasse. Crypto and civil liberties advocates viewed the government&#8217;s crackdown on crypto privacy software developers as hostile and unfair, if not unconstitutional. On the other side, the government was approaching decentralized systems like Tornado Cash in the same way it approaches centralized financial institutions&#8212;even if that meant holding software developers responsible for crimes that users of their software commit, and which they could not have prevented.</p><p>A year later, though there are more &#8220;pro-crypto&#8221; vibes throughout the government, this impasse largely remains. Government officials still rely on old legal machinery in their attempts to manage the new risks that arise in decentralized financial systems. Ultimately, there&#8217;s been a chilling effect: many software developers working at the frontier of crypto are afraid they may be prosecuted if something goes wrong. </p><p>On top of all that, sophisticated, often state-sponsored hackers keep getting better at scamming and stealing, and at using crypto-privacy tools to cover their tracks.</p><p>What if these same technologies could be deployed toward managing the risks? We scratched the surface of this question last year, and this year we&#8217;ll delve deeper. At the very least, tools like zero-knowledge proofs make it possible to think about new ways of verifying crucial information, like that users haven&#8217;t been suspected of or associated with any crimes. There&#8217;s also an upside for users: the power to selectively disclose information about themselves&#8212;their birthday, age, national citizenship, or something else&#8212;without revealing anything else. That could mean fewer centralized servers full of personal data, which would make that information less vulnerable to hackers. </p><p>More secure. And more private.</p><p>We're bringing together the people wrestling with every facet of this conversation to explore creative and pragmatic new approaches. We&#8217;re excited and honored by the lineup of speakers who will be with us, including <strong>SEC Commissioner Hester Peirce,</strong> Johns Hopkins cryptographer <strong>Matthew Green</strong>, <strong>Peter Van Valkenburgh</strong>, Coin Center&#8217;s Executive Director, and <strong>Neha Narula</strong> from MIT's Digital Currency Initiative. Legendary white hat hacker <strong>Samczsun</strong> will share his first-hand experience of fighting state-sponsored hackers and other high-powered cybercriminals, while <strong>Justin Thaler</strong> from a16z and <strong>Abhi Shelat</strong> from Northeastern University will demystify zero-knowledge proofs and explain what they can&#8212;and can&#8217;t&#8212;accomplish in the real world. And applied cryptographer <strong>Ying Tong </strong>and others<strong> </strong>will talk about how to prevent the EU&#8217;s digital wallet from becoming a surveillance tool.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-RGH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-RGH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!-RGH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!-RGH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!-RGH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-RGH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:193555,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/173364377?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-RGH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!-RGH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!-RGH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!-RGH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f2c3833-cc3f-47cd-9113-2c08c1adacf7_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The summit will tackle the thorniest questions head-on. What could or should a post-KYC world actually look like? How can advanced cryptography help us catch the bad guys without trampling on everyone else's rights? And most urgently: how do we stop North Korea's Lazarus Group and other top-tier cybercriminals without sacrificing privacy innovations that could protect the personal data of ordinary citizens?</p><p>The stakes couldn't be higher. The trajectory of technology and law has lately bent towards greater surveillance and less freedom for individuals and institutions. This course can be altered, though. The choices we make about privacy technology today will echo through decades of digital life. We have the opportunity to build and implement systems that protect both individual privacy and collective security.</p><p>The conversation starts on October 16. We hope you&#8217;ll join us.</p><p><strong>Register now at <a href="http://dcprivacysummit.org">DCPrivacySummit.org</a></strong></p><p><em>Government officials, members of academia, and media can reach out to us through the website contact form for information about alternate pricing.</em></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[The man helping Trump make up his mind about crypto policy]]></title><description><![CDATA[The task of turning Trump&#8217;s crypto executive order into practical policy has fallen on a little-known Treasury staffer]]></description><link>https://www.projectglitch.xyz/p/the-man-helping-trump-make-up-his</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/the-man-helping-trump-make-up-his</guid><pubDate>Tue, 22 Jul 2025 22:49:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5sWL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello! We&#8217;re delighted to have Veronica Irwin, a crypto regulation and policy journalist based in Brooklyn, back with us today. <br><br>Shortly after taking office, President Trump signed an executive order on crypto. Trump&#8217;s order called for a report on several key topics to be completed by &#8230; today. It&#8217;s unclear when (or whether) the report will be published, but Veronica wanted to provide some insight into what it might contain&#8212;as well as a look at an unheralded Treasury official who sources say has been instrumental in writing it.</em></p><div><hr></div><h1>The man behind the curtain</h1><p>by <em>Veronica Irwin</em></p><p>When it comes to crypto in the second Trump era, two names are nearly ubiquitous: David Sacks, the abrasive venture capitalist-turned <a href="https://sfstandard.com/2025/07/10/david-sacks-crypto-white-house-donald-trump/">AI and Crypto Czar,</a> and former North Carolina <a href="https://www.bo4nc.com/">Congressional candidate</a> Bo Hines, who serves as Donald Trump&#8217;s liaison to the crypto industry. As crypto policy has advanced rapidly over the last few months, their public statements have often been interpreted as bellwethers of President Trump&#8217;s own stance on crypto.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5sWL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5sWL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 424w, https://substackcdn.com/image/fetch/$s_!5sWL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 848w, https://substackcdn.com/image/fetch/$s_!5sWL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 1272w, https://substackcdn.com/image/fetch/$s_!5sWL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5sWL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png" width="1456" height="650" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:650,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1807481,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/168988676?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5sWL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 424w, https://substackcdn.com/image/fetch/$s_!5sWL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 848w, https://substackcdn.com/image/fetch/$s_!5sWL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 1272w, https://substackcdn.com/image/fetch/$s_!5sWL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f66c5e3-8612-41ea-a6f6-dc92ac931372_1877x838.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Trump officials at the White House Digital Asset Summit in March. From left: Commerce Sec. Howard Lutnick, Treasury Sec. Scott Bessent, President Trump, David Sacks, Bo Hines (White House YouTube channel)</figcaption></figure></div><p>But according to our reporting, they have far less policy influence than their positions would suggest. Instead, a working group composed of senior officials from across the executive branch is steering the administration&#8217;s crypto policy, with one man in particular at its nexus.</p><p>That person is Tyler Williams, a career political operative and crypto policy consultant who has served as Counselor to Treasury Secretary Scott Bessent on digital assets and blockchain technology <a href="https://home.treasury.gov/news/press-releases/sb0032">since late February</a>.</p><p>Despite keeping a low profile, Williams has been burning the midnight oil since his appointment drafting the policy positions that inform President Trump&#8217;s actions on crypto. As the dedicated policy person coordinating a working group that the president established, he has been tasked with figuring out how best to increase the government&#8217;s bitcoin reserves, and shaping the White House&#8217;s stance on federal legislation going forward, like the CLARITY Act, which is meant to lay out laws around crypto markets.</p><p>Now that Trump has reached a major milestone in signing <a href="https://www.projectglitch.xyz/p/dont-blame-the-genius">the GENIUS Act</a> into law, where will his &#8220;pro-crypto&#8221; administration go next? Williams seems to be drawing a potential roadmap.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><h2>Trump&#8217;s core crypto team</h2><p>The working group&#8212;formally, the &#8220;President&#8217;s Working Group on Digital Asset Markets,&#8221; established by <a href="https://www.whitehouse.gov/presidential-actions/2025/01/strengthening-american-leadership-in-digital-financial-technology/">Executive Order 14178</a>, which President Trump signed on his third day in office in January&#8212;includes Attorney General Pam Bondi, Commerce Secretary Howard Lutnick, and SEC Chair Paul Atkins along with eight other senior economic and security officials in the administration.</p><p>The executive order mandates that the group produce a report on two topics in particular: deciding how laws should regulate digital assets and how to manage a digital asset stockpile. The order states that today is the deadline for the report to be completed. It does not require that the report be released to the public, but the White House <a href="https://x.com/EleanorTerrett/status/1947343733487292661">has said it will release it</a> before the end of the month.</p><p>Hines will release the report, but he is not its primary author, according to five people who have spoken with both Williams and Hines about the matter. Hines effectively serves as a spokesperson, the sources say. He is present for many of the meetings and often calls them to order, but is not a key decider in the actual contours of policy. Williams, meanwhile, has significant say over the details of topics relevant to the Department of the Treasury in the report and, simultaneously, has taken the lead synthesizing the viewpoints of other departments in the working group and editing the language in the draft report so that all parties agree.</p><p>This influence is partly due to Treasury&#8217;s role in financial policymaking, but also to Williams&#8217; experience in both the crypto industry and government. Before joining Treasury, Williams was the <a href="https://www.galaxy.com/team/tyler-williams">Head of Regulatory and Legislative Affairs and Regulatory Counsel</a> at the crypto investment and financial services firm Galaxy Digital, and Deputy Assistant Secretary at Treasury during Trump&#8217;s first term, amongst <a href="https://www.linkedin.com/in/tyler-williams-1674b37/details/experience/">several other private and public</a> financial services policy jobs.</p><p>Hines &#8220;is not a particularly strong policy person&#8212;he is waking up every day and putting on a suit and carrying the President&#8217;s message. The way I think of him is he&#8217;s like a campaign staffer whose job it is to say nice things about crypto. And David Sacks is the guy who gave $80 million or something,&#8221; said one crypto executive who has met with the White House and Treasury. &#8220;Tyler&#8217;s the only person who&#8217;s capable and has the centrality to actually drive this [report] to completion.&#8221;</p><h3>Imagining a &#8220;bitcoin reserve&#8221;</h3><p>Trump made a lot of promises to crypto fans on the campaign trail, but perhaps the one that has inspired the strongest reactions was his promise to establish a &#8220;<a href="https://www.axios.com/2024/07/27/trump-bitcoin-strategic-reserve-fire-gary-gensler-nashville">strategic bitcoin stockpile</a>.&#8221; At first, this seemed like just a bitcoin thing. But as often happens in crypto, things quickly got a lot more complicated.</p><p>Ripple <a href="https://www.politico.com/news/2025/05/08/ballard-trump-wiles-lobbyist-00333953">reportedly</a> attempted to get its token, XRP, added to the reserve plans. To obscure its efforts, Ripple also <a href="https://unchainedcrypto.com/how-did-ripple-sell-trump-on-xrp-in-a-crypto-reserve-by-pushing-for-solana/">advocated for</a> the inclusion of other tokens, including ADA and SOL. Trump even <a href="https://truthsocial.com/@realDonaldTrump/posts/114093526901586124">posted</a> on his own Truth Social platform that a reserve would include these three tokens, before posting that the reserve would also include bitcoin and ether.</p><p>On March 6, Trump signed <a href="https://www.whitehouse.gov/presidential-actions/2025/03/establishment-of-the-strategic-bitcoin-reserve-and-united-states-digital-asset-stockpile/">Executive Order 14233</a>, which created two separate categories: a bitcoin reserve and a &#8220;digital asset stockpile.&#8221; The order effectively directed the federal government not to sell the crypto it already has in its possession by virtue of criminal or civil asset forfeiture proceedings. It also authorized the Departments of Treasury and Commerce to come up with &#8220;budget-neutral&#8221; strategies (so that they can be carried out without Congressional approval) for adding more bitcoin to the reserve. It also stated that the federal government would not be acquiring additional amounts of other cryptocurrency tokens.</p><p>Williams has been taking meetings with industry representatives eager to pitch him on potential strategies for acquiring bitcoin in a budget-neutral way. In a particularly striking example, former CFTC Chair Chris Giancarlo said <a href="https://broganlaw.substack.com/p/crypto-privateers-trump-insiders">last month</a> that he had met with senior Treasury officials&#8212;presumably referring to Williams&#8212;to propose using an <a href="https://broganlaw.substack.com/p/crypto-privateers-trump-insiders">obscure Constitutional provision</a> to authorize crypto firms to hack foreign adversaries for their bitcoin as a lawful act of war.</p><p>Meanwhile, the Bitcoin Policy Institute, an advocacy group in Washington, has <a href="https://www.btcpolicy.org/articles/can-trump-order-a-strategic-bitcoin-reserve">publicly advocated</a> for Treasury to use the <a href="https://home.treasury.gov/policy-issues/international/exchange-stabilization-fund">Exchange Stabilization Fund</a>&#8212;a long-standing fund that the department typically uses to buy or sell foreign currencies&#8212;to buy bitcoin. Williams has also been pitched on ideas such as re-valuing or selling the gold at Fort Knox or selling altcoins to fund the bitcoin reserve, according to two sources familiar with the conversations.</p><p>In addition to the Exchange Stabilization Fund, &#8220;there are likely other means of budget-neutral acquisitions that we hope and expect the government to explore across the Treasury and Commerce departments,&#8221; said Bitcoin Policy Institute Executive Director Matthew Pines.</p><p>At Permissionless IV, a crypto conference in New York held last month, Hines confirmed that such discussions were underway. &#8220;We&#8217;re fleshing out these ideas with the folks over at Treasury and the folks at Commerce,&#8221; he said. &#8220;If you read the EO&#8212;the fine print&#8212;it kicks a lot of the responsibility in terms of producing these ideas over to these inter-agency actors. But we&#8217;ll flesh that out amongst the working group and then we&#8217;ll move on those [ideas] that are most expeditiously implemented.&#8221;</p><h3>Charting Congress&#8217;s next steps</h3><p>Beyond executive orders, what exactly would Trump like Congress to do about crypto? Williams seems to be in charge of informing him of the options. Specifically, now that the GENIUS Act is signed, the focus is on a piece of legislation meant to define which government regulators have jurisdiction for the various types of crypto asset markets. This is no small question, and the industry and the federal government have been fighting over it for years.</p><p>Last week, the House passed a new version of the bill, called the CLARITY Act. But the politics of crypto market structure are much messier than they are for stablecoins, if for no other reason than there are many more types of cryptocurrency tokens than there are stablecoins. Hanging over the debate is a crucial open question: what tokens are subject to securities laws?</p><p>Don&#8217;t expect the report to be too prescriptive. If it addresses legislation, it will likely stop at celebrating the passage of GENIUS as a win and lay out high-level &#8220;principles&#8221; for market structure legislation, according to the five sources who have met with Williams&#8217; team. These principles are expected to focus on legal protections for DeFi developers, flexibility for future innovation, and a general encouragement of domestic tech growth. All of the sources Project Glitch spoke with expect that the report will contain few specifics, assuming it is published.</p><p>If the White House does choose to push for more specific legislative measures, that would be a big deal, because President Trump could exert pressure on Republican members of Congress to comply. The White House has already shown that it&#8217;s willing to exercise this sort of influence.</p><p>&#8220;It&#8217;s a dual process&#8212;we&#8217;re talking through things as a working group and providing technical feedback to the staffers on the Hill that are devising this new policy,&#8221; Hines said at Permissionless. &#8220;We&#8217;re working together to create a seamless transition into a completely different landscape for the industry itself.&#8221;</p><h3>New agenda items?</h3><p>Of course, stablecoins and market structure aren&#8217;t the only crypto-related issues under Treasury&#8217;s purview. For instance, Coin Center Executive Director Peter Van Valkenburgh told Project Glitch that they had approached Treasury with requests to reiterate 2019 FinCEN guidance, which has been widely interpreted to say that blockchain-based apps that don&#8217;t take control of customer funds, such as Samourai Wallet and Tornado Cash, are not money transmitters. We could see some reference to these issues in the report, depending on how it frames the issue of protecting software developers.</p><p>Van Valkenburgh said Coin Center has also had discussions with Treasury to rescind past IRS guidance stipulating that the monetary rewards that cryptocurrency miners receive for their work, called block rewards, should be <a href="https://www.coincenter.org/jarrett-takes-irs-back-to-court-in-fight-over-crypto-block-rewards/">taxed as income</a>. &#8220;It is our hope that their July 22nd report will flag the past block reward guidance as legally incorrect and bad policy so we can start a process of rescinding it,&#8221; said Valkenburgh.</p><p>There&#8217;s a chance the public won&#8217;t ever see the report. Trump&#8217;s January executive order does not require that it be released or acted upon. However, a White House official <a href="https://x.com/EleanorTerrett/status/1947343733487292661">has said</a> that it would be released before the end of the month.</p><p>&#8220;In comparison to other reports that end up on a shelf somewhere, this comes directly from the president in an executive order&#8212;and particularly a president who has made it a core part of his policy to focus on crypto,&#8221; Coin Center Director of Policy Jason Somensatto said. &#8220;Policy in this area is being driven at the White House level, and so their opinions on where things go become really relevant.&#8221;</p><p>Treasury declined to comment.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/the-man-helping-trump-make-up-his?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/the-man-helping-trump-make-up-his?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Project Glitch is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The EU’s digital identity wallet has a big privacy problem]]></title><description><![CDATA[But there&#8217;s still time to fix it.]]></description><link>https://www.projectglitch.xyz/p/the-eus-digital-identity-wallet-has</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/the-eus-digital-identity-wallet-has</guid><pubDate>Wed, 16 Jul 2025 07:22:24 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello again! It&#8217;s good for you to phone home on occasion. It absolutely makes sense that ET wanted to phone home. But if government-issued digital IDs are allowed to phone home, they will expand the surveillance state. </em></p><div><hr></div><h2>Why cryptographers and privacy advocates are worried about the EU&#8217;s digital identity wallet</h2><p>The next time you renew your driver&#8217;s license or passport, it may come with some new features: a link that sends information to the government every time a vendor scans the ID, and a switch the government can use to wipe all your identifying information at will.</p><p>Whether you want these capabilities&#8212;or trust that the government knows what it's doing when it comes to preserving your privacy&#8212;for millions of people living in the European Union, they&#8217;re already in use, part of <a href="https://digital-strategy.ec.europa.eu/en/policies/eudi-wallet-implementation#:~:text=Large%20Scale%20Pilots,by%20the%20eIDAS%20Expert%20Group.">large-scale pilot tests</a> of the Digital Identity Wallet program, which the European Commission could roll out to the its 500 million citizens by the end of 2026.</p><p>The bloc has called the project &#8220;Europe&#8217;s answer to the challenges of identification.&#8221; The new digital ID wallet, which will include a credential that allows holders access to both public and private services that require a government ID, is supposed to make it easier for citizens of EU member states to do things like open a bank account and travel. In the long run, it&#8217;s meant to contain credentials like driver's licences, educational certificates, medical records, and proof of insurance.</p><p>Digital versions of your government ID may seem like a logical extension of the Google and Apple wallets people already use on their phones to hold things like credit cards and tickets.</p><p>And the European Commission seems to be pushing this narrative. &#8220;Citizens should be able to carry their digital identity with them across the EU, moving seamlessly across borders without ever losing control of their data, with privacy and security at the heart of the project,&#8221; reads the text on its <a href="https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en">website</a> for the digital ID program.</p><p>But cryptographers say the technical design of the wallet the EU is piloting has flaws that could make it easier for governments to spy on holders&#8212;or worse, turn off the wallet and render the credentials in it useless.</p><p>And they&#8217;ve recommended that the EU go back to the drawing board.</p><h3><strong><s>Un</s>linkability</strong></h3><p>The laws and regulations that led to the EU&#8217;s Digital Identity Wallet pilots are not themselves problematic from a privacy standpoint. The regulation mandating the wallet, known as <a href="https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation">eIDAS</a> (electronic Identification, Authentication, and Trust Services), states that an ID system should let users remain pseudonymous and keep their sensitive personal information &#8220;unlinkable,&#8221; to technically prevent issuers from surveilling users by connecting that information to all the times and places they scan the credential.</p><p>&#8220;But that is just the law. The law says what should be done but not how,&#8221; <a href="https://hpi.de/lehmann/team/anja-lehmann.html">Anja Lehmann</a>, a cryptography professor at the University of Potsdam, lamented in March during a talk focused on the EU Digital ID project at the Real World Cryptography conference in Bulgaria.</p><p>The cryptography community has developed the capabilities necessary to make digital IDs that are, in fact, unlinkable to transaction data and other information related to a user&#8217;s activity. Those technologies include zero-knowledge proofs and other forms of advanced cryptography.</p><p>The system the EU is testing doesn&#8217;t take advantage of these tools, however. Details are scant, but sources familiar with the process tell Project Glitch that the technical design for the EU wallet seems to have been formulated largely behind closed doors by a small group of people at SPRIN-D&#8212;an agency in the German government that describes itself as an incubator for disruptive innovation.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/the-eus-digital-identity-wallet-has?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/the-eus-digital-identity-wallet-has?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>&#8220;We&#8217;ve been researching unlinkable forms of hashing and ways of passing data for years and they're just doing something we could have done 20 years ago,&#8221; said one cryptographer who asked not to be named due to sensitivities around their work status in the EU.</p><p>Kim Hamilton Duffy, executive director of the Decentralized Identity Foundation, calls the EU pilots &#8220;an attempt to capture and print new standards [for digital ID].&#8221; According to the regulation, such standards &#8220;are supposed to be influenced by self-sovereign identity or decentralized identity, which has in mind the idea that: &#8216;I hold my credentials, I control who I share them with, and I consent to any additional sharing,&#8217;&#8221; she said.&#8220;But the current approaches are violating almost all of these principles.&#8221;</p><h3><strong>A &#8220;phone home&#8221; feature and a kill switch</strong></h3><p>To begin with, as Lehmann explained during her talk in March, the wallet lets the issuer link the holder&#8217;s transactions to their ID by deploying a feature that &#8220;phones home&#8221; to the issuer&#8217;s server every time it&#8217;s scanned.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="5184" height="2920" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2920,&quot;width&quot;:5184,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a close up of a statue of an alien&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a close up of a statue of an alien" title="a close up of a statue of an alien" srcset="https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1641168780506-821166020087?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxldHxlbnwwfHx8fDE3NTI2MDI3NDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">&#8220;ET phone home&#8221; (Photo by <a href="true">Rick L</a> on <a href="https://unsplash.com">Unsplash</a>)</figcaption></figure></div><p>This means if you were to use your wallet to, say, verify that you are old enough to buy a bottle of wine or get into a club, there&#8217;s a chance the government could receive that information from the vendor, record it, and use it to surveil you. This problem has been <a href="https://www.projectglitch.xyz/p/how-the-us-could-sleepwalk-into-a">flagged by civil liberties groups in the US</a>, too, with the same design embedded in mobile driver&#8217;s licenses, or &#8220;mDLs,&#8221; that some states are now issuing.</p><p>&#8220;When you hand over your mDL, you are handing over a 100% trackable token,&#8221; says Manu Sporny, CEO of Digital Bazaar, a company developing digital identity technology and technical standards. Sporny is also the chairman of several initiatives at the World Wide Web Consortium, which develops standards for open-source technology.</p><p>The design of the EU&#8217;s ID wallet would also give the governments the power to turn off the wallet at will. Think about all the places where you have to show your ID. What if your government had the power to render your ID card useless, perhaps as punishment for something you wrote on social media? What if it simply switched your wallet off by accident? &#8220;If you have a government-issued credential and you have no choice but to put it in a government-issued digital wallet, that is a very bad outcome,&#8221; Sporny says.</p><p>Sporny says what&#8217;s needed is a &#8220;truly open wallet infrastructure&#8221;&#8212;not one in which the government wallet is the only option. &#8220;Fundamentally, the individual should have a right to choose which organization is holding their most private information,&#8221; Sporny adds.</p><p>In June of 2024, Lehmann and 15 other cryptographers published feedback on the EU Digital Identity Wallet project. &#8220;We do not see a way to fix the proposed solution to meet all the privacy features as required by the regulation,&#8221; they wrote. &#8220;We believe that a larger redesign is in order.&#8221;</p><p>&#8220;We can see now that there&#8217;s not a good understanding of how security and privacy can coexist and can coexist in different shapes,&#8221; Lehmann said in her talk this year.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><h3><strong>It&#8217;s not too late</strong></h3><p>There are ways the EU could change course before its wallet is rolled out en masse. Sporny says one path for future consideration is a single-use identity credential system.</p><p>&#8220;Think of it as an over-age token, or something of that nature,&#8221; he says. It would work similarly to how today&#8217;s credit cards do. &#8220;So when you use a credit card today, your credit card is tokenized&#8212;either on your phone, or the second you tap your card,&#8221; he says. This is what keeps your credit card number safe. &#8220;The number is never sent over the wire; it&#8217;s just an authorization.&#8221; </p><p>There is already a <a href="https://www.conexxus.org/resources/conexxus-age-verification-specification-v11">standard for this sort of single-use credential technology</a>. It&#8217;s <a href="https://www.convenience.org/Media/Daily/2024/October/2/3-Five-Reasons-to-Use-TruAge-Now_Tech">deployed in the US</a> under the name <a href="https://www.convenience.org/Media/Daily/2025/May/15/5-TruAges-Technology-De-Facto-Standard_NACS">TruAge</a> and is used to standardize age verification when people show their ID for age-restricted products at more than 150,000 convenience stores around the country.</p><p>But implementing this technology would call for infrastructure similar in scale to the vast networks built and operated by credit card companies like Visa and Mastercard. That would be expensive to operate smoothly.</p><p>Lehmann and her 15 co-authors have recommended a different technical design, based on a so-called <a href="https://identity.foundation/bbs-signature/draft-irtf-cfrg-bbs-signatures.html">BBS signature</a>&#8212;an emerging standard for employing zero-knowledge proofs that prioritizes unlinkability.</p><p>BBS builds on digital signature technology, which lets a user holding a private cryptographic key sign a message so that anyone who holds the corresponding public key can verify it. The BBS scheme makes it possible for a user to sign multiple messages. Someone who has a signature and messages (various personal data points) can selectively produce zero-knowledge proofs that reveal selected pieces of information while keeping the rest of their personal data secret.</p><p>Despite being a cryptographer-approved approach, however, there&#8217;s another obstacle to adoption: No EU governments are currently allowed to use it. BBS signatures would have to be added to the EU&#8217;s <a href="https://www.europeanpaymentscouncil.eu/document-library/guidance-documents/yearly-update-guidelines-cryptographic-algorithms-usage-and-0">list of approved cryptographic technologies</a>.</p><p>Updating the list before the broad rollout of the EU ID system is not beyond the realm of possibility. The EU has solicited comments on the potential usage of zero-knowledge cryptography for the wallet, and <a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/latest/discussion-topics/">plans to consider the responses in August</a>.</p><p>In the absence of a turnaround in the wallet&#8217;s technical specifications, another way to deal with the threats to civil liberties posed by the EU&#8217;s digital ID system would be to make policies designed to neutralize those threats. Member states could promise that they will not use the &#8220;phone home&#8221; feature, for example.</p><p>Hamilton Duffy would rather the technical design keep things private on its own. &#8220;There&#8217;s this more baked-in notion of trusting governments in the EU. So people might be more OK with relying on the idea of policy versus tech,&#8221; she says. &#8220;But a lot of us elsewhere don&#8217;t trust our government.&#8221;<em>&#8212;Lucy Harley-McKeown</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/the-eus-digital-identity-wallet-has?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/the-eus-digital-identity-wallet-has?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Project Glitch is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[Crypto “regulation by prosecution” hasn’t stopped under Trump]]></title><description><![CDATA[Developers of novel crypto privacy tools still fear landing behind bars.]]></description><link>https://www.projectglitch.xyz/p/crypto-regulation-by-prosecution</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/crypto-regulation-by-prosecution</guid><pubDate>Thu, 19 Jun 2025 16:11:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AFki!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Happy Thursday! We are once again asking you to consider what &#8220;pro crypto&#8221; actually means. </em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AFki!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AFki!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AFki!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AFki!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AFki!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AFki!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:166554,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/166272006?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AFki!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AFki!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AFki!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AFki!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538b9da3-a3f1-4152-b525-5e8c4b413b51_1080x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Trump&#8217;s government is prosecuting important crypto cases in much the same way as the Biden administration did</h2><p>Donald Trump has promised to make the US the &#8220;crypto capital of the world,&#8221; and there&#8217;s been plenty of activity that would appear to be evidence that he&#8217;s following through. He has, for example, staffed the executive branch with outwardly &#8220;pro-crypto&#8221; individuals, from Treasury Secretary Scott Bessent to Paul Atkins, the new head of the Securities and Exchange Commission. His party, which controls both houses of Congress, has crafted legislation that would largely benefit the industry. And of course, he is the proud owner of a Trump-branded memecoin and <a href="https://www.projectglitch.xyz/p/dont-blame-the-genius">stablecoin</a>.</p><p>And yet, the most extreme legal threats that crypto endured during the Biden years&#8212;which many people in the industry argued were reasons to support Trump in last year&#8217;s election&#8212;remain as strong as ever.</p><p>The most prominent example of this is the case of Tornado Cash, the Ethereum-based privacy tool. Advocates had hoped the administration would dramatically change course on Tornado Cash, and in particular that the Department of Justice would drop its prosecution of Roman Storm, one of its developers. That hope was reinforced when Trump&#8217;s deputy attorney general, Todd Blanche, distributed a <a href="https://www.justice.gov/dag/media/1395781/dl?inline">memo</a> in April asserting that the Trump DOJ would discontinue its predecessor&#8217;s &#8220;reckless strategy of regulation by prosecution,&#8221; echoing a frequent critique of the Biden administration by advocates of cryptocurrency technology.</p><p>Nevertheless, last month, the US attorney for the Southern District of New York (SDNY) revealed in <a href="https://www.courtlistener.com/docket/67720764/144/united-states-v-storm/">a letter</a> to the judge overseeing the case that it still plans to pursue nearly every charge against Storm.</p><p>Taken together with some subtle legal maneuvers by the Treasury Department when it removed the Tornado Cash software from its sanctions list in March, it does not appear that the new administration has imminent plans to quell the fear of prosecution that&#8217;s haunted many crypto developers for nearly three years.</p><h3>A small victory</h3><p>The SDNY&#8217;s letter did contain one concession, small in the context of the Storm case, but significant in the broader legal conflict. Namely, it informed the judge that federal prosecutors will back off from one portion of the charge that Storm operated an <a href="https://www.law.cornell.edu/uscode/text/18/1960">&#8220;unlicensed money transmitting business.&#8221;</a></p><p>Storm and another developer, Roman Semenov, were indicted in 2023. The indictment alleged that North Korean hackers used Tornado Cash to launder hundreds of millions of dollars in crypto they stole from a video game called Axie Infinity. It charged Storm and Semenov with conspiracy to launder money, conspiracy to violate sanctions against North Korea, and conspiracy to operate an unlicensed money transmitter. Storm was arrested in August 2023 and is scheduled to face trial in July. Semenov remains at large.</p><p>The unlicensed money transmitter charge is the one that has riled the crypto policy community the most. It&#8217;s also made many in the industry feel betrayed by the government.</p><p>Money transmitting businesses are required by a US law called the Bank Secrecy Act (BSA) to register with the Treasury&#8217;s Financial Crimes Enforcement Network (FinCEN). In 2019, FinCEN published guidance that was widely interpreted as saying that in order for someone to qualify as a money transmitter, they had to take &#8220;total independent control&#8221; of user funds.</p><p>The Tornado Cash smart contracts work without anyone other than the users ever taking control of their money. The 2019 FinCEN guidance implied, therefore, that Tornado Cash didn&#8217;t need to register.</p><p>But in a brief to the court last spring, the DOJ prosecutors argued the contrary: you can be a money transmitter even if you don&#8217;t take control of user funds. Then the judge in the case shocked the crypto policy community by agreeing with the DOJ.</p><p>This created an obvious &#8220;rule of law problem,&#8221; according to Peter Van Valkenburgh, executive director of the policy research and advocacy group Coin Center. &#8220;To me, no one should ever be charged with failure to get a license from a regulator who said they didn&#8217;t need a license in the first place,&#8221; <a href="https://youtu.be/WPZb4qRDi4E?si=XG-cbsFYqHX7nh2W&amp;t=1177">he said</a> at Project Glitch&#8217;s DC Privacy Summit last October.</p><p>Now, the DOJ seems to have changed its mind. Last month, it announced it would no longer argue that Storm broke the law by failing to register with FinCEN. On one hand, this is &#8220;huge news,&#8221; <a href="https://x.com/valkenburgh/status/1923073710560510032">according to</a> Van Valkenburgh. On the other hand, it&#8217;s the only aspect of the indictment that the government has decided to back off from following Blanche&#8217;s memo. Although the DOJ concedes that there was no need to register, it still alleges that Storm operated an unlicensed money transmitting business. The prosecutors cite separate language in the law to argue that it was still unlicensed money transmission&#8212;even if they didn&#8217;t have to get a license&#8212;because the transactions in question &#8220;involve(d) the transportation or transmission of funds&#8221; that Storm allegedly knew to be of criminal origin.</p><p>Confused? You&#8217;re not alone. &#8220;It honestly doesn&#8217;t make sense,&#8221; Van Valkenburgh said this week during <a href="https://www.youtube.com/live/Mf4HtH4slZo?si=yz3uyAA5OA1q1xny&amp;t=3495">a panel I moderated at PGP* for Crypto</a>, a monthly gathering of crypto policy insiders in Washington, DC. &#8220;If you are going to find them guilty of unlicensed money transmission, but there was no one that was requiring them to license&#8212;how insane is that?&#8221;</p><p>The DOJ has since made the same argument in a separate criminal case against Keonne Rodriguez and William Lonergan Hill, developers of a Bitcoin privacy tool called Samourai Wallet, dropping the charge that they failed to get a license but continuing with the charge of conspiracy to operate an unlicensed money transmitting business. This case recently spotlighted the discrepancy between FinCEN and the DOJ&#8217;s views on what constitutes a money transmitter. The defense team <a href="https://www.theblock.co/post/354722/defense-lawyers-in-samourai-tornado-cases-cases-accuse-prosecution-of-withholding-exculpatory-evidence">publicized</a> a summary of a phone call between federal prosecutors and two FinCEN employees, in which the FinCEN representatives argued that since Samourai doesn&#8217;t take control of user funds, that would &#8220;strongly suggest&#8221; that it isn&#8217;t a money transmitter.</p><p>The continuation of these charges has dashed hopes that Blanche&#8217;s memo would mark a radical change of course for the DOJ. Amanda Tuminelli, executive director and chief legal officer at the DeFi Education Fund, a policy advocacy group in DC, said during the PGP* for Crypto panel that parts of the memo were positive for the industry. &#8220;I think the spirit of the memo was a good one,&#8221; she said. But in the high-stakes conflict over what constitutes a money transmitting business, &#8220;it did not solve anything.&#8221;</p><p>Tuminelli argued that Congress should amend the criminal code to &#8220;close the window for this to ever be misinterpreted again&#8221; by clarifying that the language in the criminal statute does not apply to software developers who don&#8217;t take control or custody over customer funds.</p><h3>The North Korea factor</h3><p>There&#8217;s also the matter of the sanctions the Treasury Department&#8217;s Office of Foreign Assets Control (OFAC) slapped on Tornado Cash in 2022. Coin Center and others brought lawsuits against OFAC, arguing that it did not have the authority to sanction decentralized software. Then, last November, the industry <a href="https://www.projectglitch.xyz/p/crypto-privacy-advocates-land-a-legal">landed a legal haymaker</a> against the government in one of those cases. The Fifth Circuit Court of Appeals ruled that OFAC did not have the authority to sanction Tornado Cash&#8217;s &#8220;immutable&#8221; smart contracts, since these contracts are not &#8220;property.&#8221; In March, the Treasury took the smart contracts <a href="https://ofac.treasury.gov/recent-actions/20250321">off the sanctions list</a>.</p><p>But some important signals suggest the government isn&#8217;t ready to give in on this issue.</p><p>To begin with, the Treasury did not frame the action as a concession of error, as Michael Mosier, co-founder of the law firm Arktouros, and a former official at OFAC as well as director of FinCEN points out. Instead, the agency said it had &#8220;exercised our own discretion to remove the economic sanctions.&#8221; That&#8217;s an &#8220;extremely calibrated response&#8221; to the Fifth Circuit&#8217;s decision, Mosier noted during <a href="https://x.com/TheDRC_/status/1918002499627434232">a recent talk in DC</a>. The agency may be preparing additional moves.</p><p>A second important signal is in how the government treated the sanctioned Tornado Cash developer Roman Semenov, who is a citizen of Russia.</p><p>Some backstory: OFAC originally <a href="https://home.treasury.gov/news/press-releases/jy0916">sanctioned</a> the Tornado Cash software under <a href="https://www.federalregister.gov/documents/2015/04/02/2015-07788/blocking-the-property-of-certain-persons-engaging-in-significant-malicious-cyber-enabled-activities">an executive order</a> issued by President Barack Obama in 2015 that was targeted at cybercrime. In November of 2022, OFAC <a href="https://home.treasury.gov/news/press-releases/jy1087">re-did</a> the sanctions, adding a second designation under <a href="https://www.federalregister.gov/documents/2016/03/18/2016-06355/blocking-property-of-the-government-of-north-korea-and-the-workers-party-of-korea-and-prohibiting#page-">a separate Obama-era executive order</a>, this one aimed at making it harder for North Korea to finance its nuclear weapons program. In August 2023, OFAC <a href="https://home.treasury.gov/news/press-releases/jy1702">added</a> developer Roman Semenov to the sanctions list under both executive orders.</p><p>When OFAC removed the cybercrime and North Korea-related sanctions for Tornado Cash in March, it left Semenov on the list of entities sanctioned under the North Korea executive order.</p><p>&#8220;There are much broader enforcement authorities for the North Korea program,&#8221; compared with the more generic cybersecurity order, Mosier explained. That means the government would have an easier time defending this sort of action in court. Mosier suggested that the Treasury was sending a message in the way it removed Semenov&#8217;s cyber designation but left him on the North Korea-related sanctions list. &#8220;By removing the cyber tag and leaving on the DPRK tag, it caused his designation to be republished publicly in the same press release (announcing) that they were de-listing the (Tornado Cash) addresses,&#8221; he said. &#8220;That is a strong signal that shows to Congress, and to developers around the world: &#8216;We&#8217;re not leaving this space.&#8217;&#8221;</p><p>For as much as Trump loves crypto, it appears there are flavors of it that his administration disfavors just as much as the Biden administration did. <em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/crypto-regulation-by-prosecution?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/crypto-regulation-by-prosecution?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>HEADLINE WATCHER</h3><p><strong>Big banks explore venturing into crypto world together with joint stablecoin. </strong>Initial discussions have involved Early Warning Services, the operator of Zelle, and the real-time payment network Clearing House, <a href="https://www.wsj.com/finance/banking/crypto-stablecoin-big-banks-a841059e">according to the Wall Street Journal</a>. The newspaper calls it &#8220;the latest sign that mainstream and crypto finance are inching closer together.&#8221;</p><p><strong>DOGE aims to pool federal data, putting personal information at risk. </strong>Here&#8217;s the lede from the <a href="https://www.washingtonpost.com/business/2025/05/07/doge-government-data-immigration-social-security/">Washington Post</a>: &#8220;The US DOGE Service is racing to build a single centralized database with vast troves of personal information about millions of US citizens and residents, a campaign that often violates or disregards core privacy and security protections meant to keep such information save, government workers say.&#8221; If you believe those anonymous government workers, this is pretty much the very thing that crypto folks have been warning about for years.</p><p><strong>US spy agencies are getting a one-stop shop to buy your most sensitive personal data. </strong><a href="https://theintercept.com/2025/05/22/intel-agencies-buying-data-portal-privacy/">According to The Intercept,</a> the Office of the Director of National Intelligence is &#8220;working on a system to centralize and &#8216;streamline&#8217; the use of commercially available information, like location data derived from mobile ads, by American spy agencies.&#8221;</p><p><strong>CFPB quietly kills rule to shield Americans from data brokers. </strong>The rule, proposed in December by former Consumer Financial Protection Bureau director Rohit Chopra, would have put limits on the kinds of information that US data brokers can sell. The agency now says the rule is no longer &#8220;necessary or appropriate&#8221;, <a href="https://www.wired.com/story/cfpb-quietly-kills-rule-to-shield-americans-from-data-brokers/">Wired reports</a>.</p><p><strong>ICE taps into nationwide AI-enabled network, data shows. </strong>US Immigration and Customs Enforcement has been getting &#8220;side-door access&#8221; to a license plate-scanning tool via local and state police around the country. Anonymous researchers flagged the &#8220;massive trove of lookup data&#8221; reflecting &#8220;immigration-related&#8221; searches, according <a href="https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/?ref=daily-stories-newsletter">to 404 Media</a>.</p><p><strong>Coinbase reveals 69,461 users affected in December 2024 data heist. </strong>Coinbase revealed last month that some of its offshore customer service representatives sold personal data about the exchange&#8217;s users to cybercriminals, who then demanded a $20 million ransom from Coinbase in return for the stolen information. <a href="https://www.theblock.co/post/355216/coinbase-reveals-69461-users-affected-in-december-2024-data-heist-filing">The Block highlighted</a> a court filing stating the specific number of users whose personal information the criminals obtained.</p><p><strong>Pump.fun hits back at report that claimed 98% of memecoins on the platform are fraudulent. </strong>That&#8217;s the (updated headline) from <a href="https://www.coindesk.com/business/2025/05/07/98-of-tokens-on-pump-fun-have-been-rug-pulls-or-an-act-of-fraud-new-report-says">Coindesk</a><strong>, </strong>which cites a report from Solidus Labs claiming that almost all memecoins launched on the token creation platform have been either scams or pump-and-dump schemes. Of the seven million tokens created since Pump.fun&#8217;s inception in January 2024, only 97,000 still have at least $1,000 backing, the report added. The controversial memecoin launcher also hit the headlines earlier in May after the <a href="https://sfstandard.com/2025/05/08/jeffy-yu-zerebro-fake-death/">San Francisco Standard</a> tracked down 22-year-old crypto founder Jeffry Yu, the creator of crypto token Zebero and CCO of a company called Blorm, finding him alive and well days after Yu had appeared to take his own life on a Pump.fun livestream. On-chain data analyzed by Bubblemaps <a href="https://x.com/bubblemaps/status/1920054468567265306">showed</a> accounts linked to Yu moved up to $1.4 million in cryptocurrency after his supposed death. A memecoin with the ticker $LLJEFFY was also launched in his honor before he was found.</p><p><strong>MEV bots are clogging blockchains faster than networks can scale, says Flashbots. </strong>Bots programmed to exploit opportunities to generate profit via so-called MEV (maximal extractable value) are making everything slower and more expensive for real users, according to a new report. In case you aren&#8217;t familiar, MEV is a blockchain phenomenon that allows validators to profit by ordering transactions in prescribed ways. <a href="https://www.theblock.co/post/358512/mev-bots-are-clogging-blockchains-faster-than-networks-can-scale-says-flashbots">The Block</a> surfaced a new report on the topic from Flashbots. The bots are profiting, but &#8220;it&#8217;s wasteful for the network, burdening nodes and users,&#8221; the authors wrote.</p><p><strong>AI is getting more powerful, but its hallucinations are getting worse. </strong>So-called reasoning systems, the latest and most powerful large language models, are better at math but &#8220;their handle on facts has gotten shakier,&#8221; according to <a href="https://www.nytimes.com/2025/05/05/technology/ai-hallucinations-chatgpt-google.html">The New York Times</a>. Even researchers at the forefront of experimentally determining how exactly these models work are stumped as to why this is happening.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Project Glitch is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[Don’t blame the GENIUS]]></title><description><![CDATA[Crypto politics versus crypto policy]]></description><link>https://www.projectglitch.xyz/p/dont-blame-the-genius</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/dont-blame-the-genius</guid><pubDate>Thu, 05 Jun 2025 18:34:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!E7KC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello! I&#8217;m Veronica Irwin, a crypto regulation and policy journalist based in Brooklyn. You might know me from my scoops in <a href="https://unchainedcrypto.com/author/veronica-irwin/">Unchained</a>, or my features in <a href="https://www.forbes.com/sites/veronicairwin/">Forbes</a>. Now, I&#8217;m writing a weekly column for the <a href="https://broganlaw.substack.com">Brogan Law</a> newsletter and publishing scoops in my own newsletter, <a href="https://decryptingdc.substack.com">Decrypting DC</a>.</em></p><p><em>This week, I&#8217;m also excited to write for Project Glitch about something that&#8217;s been grinding my gears for a while: the disparity between the politics of the GENIUS Act and the policy itself. If you like what you read, keep up with my work <a href="https://x.com/vronirwin">on Twitter</a>.</em></p><div><hr></div><h2>There&#8217;s plenty of unseemly behavior when it comes to Trump and crypto. The GENIUS Act is the wrong place to focus criticism</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E7KC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E7KC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!E7KC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!E7KC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!E7KC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E7KC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png" width="1376" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1376,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1241178,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/165282944?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E7KC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!E7KC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!E7KC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!E7KC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f7ced6-1479-46ca-992f-669b522c64d6_1376x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">World Liberty Financial</figcaption></figure></div><p>The fight over the GENIUS Act in the US Senate is a great illustration of how mainstream political arguments&#8212;and President Trump&#8217;s flamboyant foray into the crypto business&#8212;can get in the way of efforts to make useful policy.</p><p>The objective of the GENIUS Act&#8212;which stands for &#8220;Guiding and Establishing National Innovation for U.S. Stablecoins&#8221; and is a counterpart to the STABLE Act introduced in the House of Representatives&#8212;is to impose restrictions on stablecoin issuers that ensure their tokens maintain a stable value and can be safely used by American consumers and financial services companies.</p><p>It was first <a href="https://www.gillibrand.senate.gov/news/press/release/gillibrand-bipartisan-group-of-senators-introduce-legislation-to-establish-stablecoin-regulatory-framework/">introduced</a> in February with rare bipartisan backing. For a while it looked as though it would sail through, with <a href="https://www.cbsnews.com/news/senate-democrats-genius-act-stablecoin-crypto-bill-trump/">10 Democratic senators</a> supporting it. But lately, Democratic senators led by the crypto industry&#8217;s political nemesis, Elizabeth Warren, have seized on the idea that passing GENIUS would also amount to <a href="https://x.com/i/broadcasts/1yNGaLmdVRrKj">a rubber stamp</a> for President Donald Trump&#8217;s corrupt interests in cryptocurrency&#8212;and now even some of those who were once supportive have wavered. The bill could be voted on this week, and nobody on the Hill is confident in how it will go.</p><p>Democrats&#8217; larger worry is understandable&#8212;World Liberty Financial, a company which has already made the Trump family <a href="https://www.reuters.com/business/finance/how-trump-family-took-over-crypto-firm-it-raised-hundreds-millions-2025-03-31/">hundreds of millions of dollars</a>, <a href="https://www.businesswire.com/news/home/20250325773694/en/World-Liberty-Financial-Plans-to-Launch-USD1-the-Institutional-Ready-Stablecoin">launched</a> a stablecoin called USD1 in late March just as Congress was considering the stablecoin bills. And we all know the story of $TRUMP, the cryptotoken that has become a donation box for people looking to <a href="https://www.cnbc.com/2025/05/23/trump-meme-coin-dinner.html">hang out with the president </a>or <a href="https://www.wsj.com/finance/currencies/justin-sun-trump-crypto-dinner-7efd5367?gaa_at=eafs&amp;gaa_n=ASWzDAjebs_sZW43wrVGOUu83Mz0WQ48jbMpEHZYdL0i1FkMm_ZFV-QGH57AfWcp2io%3D&amp;gaa_ts=683b401f&amp;gaa_sig=6tCaiORlon7ehpgqIGEW6f-vee6FN0Fs0af02g6V1GGWZivQAL60szQ5A3yMi_BrcpXso1lC7JHGHvry6Ib_Mg%3D%3D">make their legal trouble go away</a>.</p><p>But the GENIUS Act doesn&#8217;t have anything to do with memecoins, and it&#8217;s not true that the bill itself would enable any more presidential corruption than we&#8217;ve already seen.</p><p>In fact, some argue that the bill would be a significant improvement on the status quo, which allows stablecoins like USD1 to operate with little to no restrictions.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><h3>USD1, but Trump first</h3><p>USD1, like most stablecoins, is advertised as a token worth one dollar that can be used for on-chain transactions. World Liberty <a href="https://www.businesswire.com/news/home/20250325773694/en/World-Liberty-Financial-Plans-to-Launch-USD1-the-Institutional-Ready-Stablecoin">says</a> that users can trust the reserves backing USD1 to maintain their value because they are in relatively low-risk assets like short-term treasuries, dollar deposits, and &#8220;cash equivalents.&#8221;</p><p>Only, World Liberty doesn&#8217;t manage those reserves. The USD1 token is a white labeled product actually issued by crypto infrastructure company BitGo, according to a BitGo executive who spoke to Project Glitch on the condition of anonymity because they were not authorized to speak on the arrangement. (In marketing materials, World Liberty has <a href="https://www.businesswire.com/news/home/20250325773694/en/World-Liberty-Financial-Plans-to-Launch-USD1-the-Institutional-Ready-Stablecoin">played down</a> BitGo&#8217;s role in USD1, saying it is only the custodian providing &#8220;support&#8221; to USD1.)</p><p>Payments denominated in USD1 are not pure profits for a Trump family business, if USD1 in fact operates like it says it does. Rather, the company profits from interest on its reserves, similar to the business model of a very conservative bank. US Treasuries accrue between 3.93% and 4.93% interest, according to <a href="https://www.bloomberg.com/markets/rates-bonds/government-bonds/us?sref=m9L277rN">Bloomberg</a>, though some stablecoin advocates say the growth of the industry after legislation is passed, in aggregate, could <a href="https://coincentral.com/could-stablecoins-dominate-treasuries-genius-act-sets-the-stage/">boost demand for these assets</a>. Cash and cash equivalent reserves earn lower yields. And BitGo ostensibly takes a cut.</p><p>Despite the slim margins, USD1 still earns World Liberty, and thus Trump and his family, a lot of money. An Abu Dhabi government-backed venture fund recently invested $2 billion in Binance via USD1, for example, effectively handing the Trump family business a &#8220;gift&#8221; in the form of interest that will accrue on USD1&#8217;s reserves.</p><p>World Liberty Financial didn&#8217;t respond to requests for comment.</p><h3>GENIUS&#8217;s guardrails</h3><p>So what&#8217;s in the GENIUS Act, and how would it affect USD1? Anything can change before a vote, but a <a href="https://x.com/vronirwin/status/1923399630886162881">draft</a> that has been circulating for several weeks is probably close to a final bill text, according to five lobbyists on both sides of the aisle who spoke to Project Glitch.</p><p>A few pillars of the GENIUS Act have been in place since it was initially introduced, giving us a rough idea of how it would affect the Trump stablecoin business: it would enforce minimal changes to USD1 in its current form, but it would establish some guardrails that&#8217;d prevent USD1 from expanding into riskier practices.</p><p>The GENIUS Act requires companies to maintain reserves in US dollars, short-term treasuries, and equally liquid assets, for example. State-regulated issuers must additionally publish their reserves on their website and create mechanisms to freeze and seize transactions in the event of any suspicious behavior.</p><p>Such requirements are aimed primarily at systems like Tether, the world&#8217;s most popular stablecoin, with a <a href="https://coinmarketcap.com/currencies/tether/">$153 billion</a> market cap. Tether has never commissioned a <a href="https://www.reuters.com/technology/tether-is-talks-with-big-four-firm-about-reserve-audit-ceo-says-2025-03-21/">US-regulated</a> firm to audit its reserves, and one of the <a href="https://www.axios.com/2025/05/29/stablecoin-bill-genius-act-crypto">remaining issues</a> senators haven&#8217;t settled in the GENIUS Act is whether language should require them to&#8212;or if the standards set by overseas regulators will suffice so long as they comply with US law enforcement requests.</p><p>If BitGo and World Liberty&#8217;s public statements are true, USD1 already meets the legislation&#8217;s proposed requirements. World Liberty <a href="https://www.businesswire.com/news/home/20250325773694/en/World-Liberty-Financial-Plans-to-Launch-USD1-the-Institutional-Ready-Stablecoin">says it has</a> already subjected itself to third-party audits as well. That would be above and beyond the minimal reporting requirements for stablecoins of its size under GENIUS, which only mandate <a href="https://www.dropbox.com/scl/fi/ho9nk3t2m0gnv65orgyyn/5-14_Draft.pdf?rlkey=05aynj57v47t6bi4vku1crnpr&amp;st=v6l8z8l9&amp;dl=0">public disclosure</a> of the types of assets a given coin is backed by and its redemption procedures (it&#8217;s worth noting that World Liberty&#8217;s audits haven&#8217;t been made public).</p><p>Another thing GENIUS might do is discourage USD1 from growing beyond a $10 billion in market cap&#8212;relatively small in an industry featuring behemoths like Tether and Circle&#8217;s USDC ($61 billion). If USD1 gets bigger than $10 billion (its current cap is <a href="https://coinmarketcap.com/currencies/usd1/">just over $2 billion</a>) the company&#8217;s stablecoin issuance business would be regulated by the Office of the Comptroller of the Currency (OCC), a branch of Treasury.</p><p>The OCC has broad discretion to act against any firm under its purview that it sees as posing a risk to the American financial system. Entering OCC&#8217;s jurisdiction would effectively expose USD1 to scrutiny by whichever party holds the White House, says Austin Campbell, an adjunct professor at NYU and a former executive at Paxos, which white labels stablecoins similarly to BitGo. &#8220;With Trump as president, the OCC would be unlikely to completely go to war with USD1,&#8221; he says. &#8220;But under another president, they would totally go to war with USD1.&#8221;</p><p>Campbell&#8217;s view is that although the GENIUS Act only &#8220;marginally&#8221; adds oversight to a system like USD1, if the Democrats&#8217; goal is to restrict shady dealing by stablecoin issuers, they should pass the bill.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/dont-blame-the-genius?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/dont-blame-the-genius?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3>The real money grab</h3><p>There&#8217;s another reason that turning GENIUS into a political football may be a bad idea: it redirects attention from what appears to be layers of unethical, and possibly illegal, activity on the part of World Liberty. For example, the company markets USD1 as having a benefit other stablecoins do not: &#8220;access to the power of [decentralized finance] underpinned by the credibility and safeguards of the most respected names in traditional finance,&#8221; as co-founder Zach Witkoff <a href="https://www.businesswire.com/news/home/20250325773694/en/World-Liberty-Financial-Plans-to-Launch-USD1-the-Institutional-Ready-Stablecoin">put it</a>.</p><p>It&#8217;s not clear who those &#8220;names&#8221; are, but Zach&#8217;s father is the billionaire Steve Witkoff, who President Trump appointed as Special Envoy to the Middle East earlier this year. World Liberty has also plastered its website with photos of the president, giving him the title &#8220;chief crypto advocate&#8221; for the firm. Using the presidential office in marketing materials this way is not only a violation of decades of ethical norms, but also likely a violation of the <a href="https://sgp.fas.org/crs/misc/IF11086.pdf">emoluments clause</a> of the Constitution, which is designed to prevent profiteering.</p><p>Given the Republican majority, it is politically impossible to amend the GENIUS Act to prohibit presidents from having their own stablecoins. Not only would GENIUS lose too many Republican votes, Trump would veto it once it got to his desk. Besides, President Trump would just argue (as he already has) that he&#8217;s not personally involved.</p><p>Either way, the real money grabs for the Trump crypto businesses, at least for the moment, are his memecoin and other assets, like NFTs, which have been sold directly to users to the tune of <a href="https://www.cbsnews.com/video/how-trumps-made-money-off-his-crypto-meme-coin/">several billion dollars</a>. Today&#8217;s version of USD1 is really just a low-lift side project for the Trump crypto business. Legislation that serves to provide at least some consumer protections and reasonable business standards for the entire stablecoin industry is arguably needed to keep USD1 from becoming something more corrupt and risky.</p><p>Some Democrats are now focusing on the larger issue. The <a href="https://www.murphy.senate.gov/newsroom/press-releases/murphy-introduces-new-legislation-to-prohibit-presidents-from-profiting-off-meme-coins-while-in-office">MEME Act</a>, for example, introduced by Representative Sam Liccardo in the House and Senator Chris Murphy in the Senate, would prohibit senior executive branch officials and their families from issuing, sponsoring, or endorsing a variety of assets, including digital assets. Senator Jeff Merkley&#8217;s End Crypto Corruption Act extends similar prohibitions to Congress, while a version introduced by Representative Ritchie Torres in the House specifically names stablecoins.</p><p>Although these bills have no realistic chance of passing a Republican-controlled Congress, at least they focus on the root issue.</p><p>&#8220;I understand that people want to use the legislation to clarify that what [Trump&#8217;s] doing is wrong,&#8221; said one Congressional staffer who works for a Democrat currently opposing the GENIUS Act. On the other hand, he says, the bill &#8220;would put regulations on what [Trump] can do and would prevent some of the risks if he decides he&#8217;s not actually going to have reserves to back up the stablecoin and let it blow up, or run away with the money.&#8221; <em>&#8212;Veronica Irwin</em></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Project Glitch is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[How Samczsun is bridging the old web to the dark forest]]></title><description><![CDATA[The Security Alliance (SEAL) is eager to help law enforcement battle North Korea&#8217;s Lazarus]]></description><link>https://www.projectglitch.xyz/p/how-samczsun-is-bridging-the-old</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/how-samczsun-is-bridging-the-old</guid><pubDate>Fri, 02 May 2025 15:05:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dFtd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>A white hat hacker and a journalist walk into a bar.</em></p><div><hr></div><h3>My conversation with crypto&#8217;s most well-known white hat hacker</h3><p>It&#8217;s been said before, but <a href="https://x.com/samczsun">Samczsun</a> is like Batman. He dwells quietly in the shadows, hiding his identity behind a mask. If trouble is brewing in crypto&#8217;s Gotham City, its denizens expect him to speed to the rescue.</p><p>In place of a bat signal, he&#8217;s got a Telegram hotline.</p><p>Hacked? Wallet drained? Message SEAL 911. A team of experts called the Security Alliance (SEAL), which Samczsun founded last year, is ready to respond. &#8220;The best cybersecurity researchers in crypto are just one Telegram message away,&#8221; he says.</p><p><a href="https://youtu.be/euqOljuV43c?si=1xpGWJUtcc_QI_Ju">I interviewed Samczsun</a> last week as part of the PGP* (Pretty Good Policy) for Crypto breakfast, a monthly gathering of crypto policy insiders in Washington, DC. He appeared remotely, using an anime-style avatar and a voice modifier because he chooses to remain pseudonymous.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dFtd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dFtd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 424w, https://substackcdn.com/image/fetch/$s_!dFtd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 848w, https://substackcdn.com/image/fetch/$s_!dFtd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!dFtd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dFtd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png" width="1456" height="624" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:624,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1789058,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/162665255?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dFtd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 424w, https://substackcdn.com/image/fetch/$s_!dFtd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 848w, https://substackcdn.com/image/fetch/$s_!dFtd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!dFtd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8f82fd-e9b9-4a01-b8c0-ddb29b7dffcb_2459x1054.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The theme was &#8220;the developing state of crypto incident response.&#8221; But cybersecurity is always developing, he said. &#8220;Security is not a solved game and never will be.&#8221; SEAL is focused on preparedness and adaptation&#8212;the more quickly the right experts can be deployed after something goes wrong, the more likely it is that the situation can be rectified.</p><p>The project is bigger than crypto. As Samczsun explained, SEAL is a bridge between the old web and a mysterious new one made of blockchains. That puts it in a prime position to help governments counter national security threats like North Korea&#8217;s Lazarus Group.</p><h4>The dark forest</h4><p>Before SEAL, there was just Samczsun.</p><p>Five years ago, decentralized finance (DeFi) was in its early days, but it was already attracting some of the world&#8217;s most sophisticated hackers. It seemed like every time there was a big hack, Samczsun was among the first on the scene. He led many operations that successfully recovered funds. But a couple of encounters with a particularly alarming adversary may have had the biggest effect on his career trajectory.</p><p>&#8220;This is a horror story.&#8221; That&#8217;s the first sentence of a now-famous blog post, authored in August of 2020 by Dan Robinson and Georgios Konstantopoulos, two researchers at the venture capital firm Paradigm. The post, <em><a href="https://www.paradigm.xyz/2020/08/ethereum-is-a-dark-forest">Ethereum is a Dark Forest</a></em>, recounted an  attempt to rescue funds from a vulnerable smart contract and described a new species of &#8220;monster&#8221; lurking deep within Ethereum.</p><p>Robinson had discovered a bug in one of the smart contracts underlying Uniswap, already the most popular decentralized exchange. He saw how the vulnerability could be exploited to pilfer money from the protocol. He also knew he could try to take the money himself, to preempt an adversarial actor running off with it. But doing so, at least in the conventional way, would play right into the hands of the faceless monsters lurking in the shadows.</p><p>Technically, they were lurking in Ethereum&#8217;s mempool, which is like a waiting area for pending transactions. &#8220;It&#8217;s no secret that the Ethereum blockchain is a highly adversarial environment,&#8221; the researchers wrote. But &#8220;the mempool is something worse: a dark forest.&#8221;</p><p><em>The Dark Forest</em> is the title of a science fiction book by the writer Cixin Liu, which, as Robinson and Konstantopoulos put it, describes &#8220;an environment in which detection means certain death at the hands of advanced predators.&#8221; The predators in this case were bots programmed to pounce on certain kinds of pending transactions in Ethereum&#8217;s mempool. Robinson knew that if any were watching, sending a regular transaction to rescue the funds wouldn&#8217;t work; the transaction &#8220;would get instantly sniped in-flight.&#8221; He assembled a small team, including Konstantopoulos, and consulted other security researchers, including Samczsun.</p><p>The team devised an elaborate strategy to &#8220;obfuscate&#8221; the rescue transaction by deploying custom smart contracts and splitting the transaction into two. You should read the post if you are interested in the technical details, which are gnarly. But the goal was to slow an attacker just enough to get the good guys&#8217; transaction across the line first.</p><p>The attempt failed after the team initially struggled to get their rescue transactions included in a block. Again, check out the post for all the technical details, but the story ends with a frontrunning bot scoring the loot. &#8220;Time pressure got to us, and we got sloppy,&#8221; the researchers wrote.</p><p>It wasn&#8217;t all for nothing, though. The episode set the stage for a similar one soon after. This time, a team led by Samczsun beat the mempool monsters to the punch. Crucially, they were able to work directly with a miner in Asia to get their transaction included in a block without having to send it to the public mempool. Samczsun and other key players documented the dramatic operation in a second blog post called <em><a href="https://samczsun.com/escaping-the-dark-forest/">Escaping the Dark Forest</a>.</em></p><h4>&#8220;Like any good VC&#8221;</h4><p>Shortly after these two encounters, Paradigm hired Samczsun full time. He initially focused on auditing smart contracts for the firm&#8217;s portfolio companies, drawing on what had thus far been his core professional skillset. But after a while, he told me, &#8220;I realized was that I wanted to really be doing something more with my time than solving these one-off problems.&#8221;</p><p>&#8220;Conceptually, doing these audits was sort of like putting in one unit of work and getting out one unit of work,&#8221; he said. &#8220;And what I wanted to do was figure out how I could leverage up on that, like any good VC.&#8221; He decided the best thing he could do for crypto was to use the reputation he had built as its most celebrated white hat hacker to coordinate an industry-wide effort focused on making crypto safer. Hence SEAL.</p><p>The first thing the organization did was establish the SEAL 911 system. &#8220;Once you message, we can triage what your problem is,&#8221; he said. &#8220;We can connect you with all the right people.&#8221; In crypto, that&#8217;s no small undertaking. Some of the most talented folks make themselves intentionally difficult to reach. You have to know the right Telegram and Twitter handles. More importantly, the people on the other end of those handles have to trust you.</p><p>Over the past year, SEAL has added several other initiatives, including an information sharing platform and a program for &#8220;wargaming&#8221; new protocols. It has also pioneered something called the Safe Harbor Agreement for White Hat Hackers, which shields white hats from legal liability in case they have to hack a protocol themselves as part of a rescue mission. All of these are fed by threat intelligence data collected via SEAL 911.</p><h4><strong>Crypto &#129309; the government</strong></h4><p>Crypto&#8217;s cyberthreat landscape evolves fast. &#8220;When we first launched SEAL, smart contract hacks were sort of the bread and butter of cybercriminals. Almost every ticket that we got was a smart contract hack,&#8221; Samczsun said during the PGP* breakfast. &#8220;Today, that cannot be farther from the truth.&#8221; Much more common now are attacks on individuals, he said, often through social engineering&#8212;for example, using a phony email or social media message to lure an individual into sharing access to their wallet.</p><p>Social engineering was at the center of a hack in March that led to what <a href="https://www.nytimes.com/2025/03/06/technology/bybit-crypto-hack-north-korea.html">the New York Times</a> called &#8220;the biggest crypto heist in history.&#8221; Behind the billion-dollar theft from the Bybit exchange was one of the most fearsome monsters in crypto&#8217;s dark forest: North Korea&#8217;s Lazarus Group.</p><p>The SEAL team saw the Bybit hack happening immediately. &#8220;It&#8217;s very hard not to see a billion dollars moving out of a crypto exchange&#8217;s wallet,&#8221; Samczsun said. Through the hotline, they quickly confirmed this movement was not intentional and immediately began mapping the flow of stolen funds and flagging associated blockchain addresses for other exchanges and partners.</p><p>Still, as it turns out, &#8220;our pattern matching completely failed us in this case,&#8221; he said.</p><p>SEAL had seen many examples before of Lazarus targeting exchanges directly. It was common for them to infiltrate a target exchange by first compromising an employee. This time, Lazarus broke in by first compromising an employee of Safe, Bybit&#8217;s wallet provider. Lazarus gained enough access to surreptitiously modify the software&#8217;s user interface and dupe multiple Bybit executives into signing away a billion dollars in crypto. The attack and subsequent operation to launder stolen funds reflected <a href="https://www.projectglitch.xyz/p/how-crypto-and-the-us-government">unprecedented sophistication</a>.</p><p>Since so many politicians view cryptocurrency as a negative force that must be contained, Lazarus arguably represents an existential threat to the crypto industry. It&#8217;s important to bear in mind that Tornado Cash developers Roman Storm and Alexey Pertsev were only <a href="https://www.projectglitch.xyz/p/what-more-could-tornado-cash-developer">prosecuted</a> <em>after</em> the North Koreans allegedly used the system to launder hundreds of millions in funds they stole from the crypto video game Axie Infinity, even though Tornado Cash had been running for years.</p><p>But Lazarus may also represent an opportunity for crypto to gain political goodwill, at least if Samczsun has anything to do with it.</p><p>That&#8217;s because Lazarus is not just a threat to crypto, but also to the US government and others. If those governments want the best shot at stifling the group, they may need SEAL&#8217;s help. Some policymakers already seem to understand that. In January, the governments of the US, Japan, and South Korea issued <a href="https://2021-2025.state.gov/office-of-the-spokesperson/releases/2025/01/joint-statement-on-cryptocurrency-thefts-by-the-democratic-peoples-republic-of-korea-and-public-private-collaboration/">a joint statement</a> warning the crypto industry about North Korea&#8217;s cyber program and pushing for more collaboration between the public and private sectors to secure valuable financial infrastructure. The statement mentioned SEAL as an example of the kind of effort it encouraged.</p><p>Samczsun said last year his team learned that the FBI has a unit dedicated to tracking Lazarus. The unit is often able to tip off targets to impending threats before they get hacked. But while that works well in web2, he said, web3 presents challenging terrain. &#8220;In web2 you have a handful of big players,&#8221; he said. &#8220;They are almost certainly happy to set up direct connections with the government themselves.&#8221; In crypto, that&#8217;s&#8230; not the case. &#8220;A lot of actors in crypto are not interested at all in communicating with any government.&#8221; Many don&#8217;t use email, LinkedIn, or their real names, and tend to distrust others by default. It&#8217;s a dark forest, after all.</p><p>That leaves &#8220;a bit of a gap between where the government&#8217;s ability to basically reach out to these crypto actors ends and where our ability to navigate in this new environment begins,&#8221; Samczsun said. SEAL has already collaborated with the FBI unit tracking Lazarus, helping them close this gap by making connections in the crypto world, he said. &#8220;That&#8217;s really been the place that we&#8217;ve been able to have the most impact.&#8221;</p><p>He wants to have more impact. Last month, he announced that he was stepping down from his role at Paradigm to focus on SEAL. &#8220;We&#8217;re interested in collaborating with as many people as possible in order to help our initiatives grow and succeed, which will help the space become more secure,&#8221; he said. <em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/how-samczsun-is-bridging-the-old?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/how-samczsun-is-bridging-the-old?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>HEADLINE WATCHER</h3><p><strong>The New York Times has been all over Trump&#8217;s adventures in crypto. </strong>It may be negative in flavor, but crypto is certainly getting the prominent mainstream attention it has always craved. The Gray Lady <a href="https://www.nytimes.com/2025/05/01/us/politics/trump-cryptocurrency-usd1-dubai-conference-announcement.html">sent a reporter to Dubai</a> for Token2049, where he caught a panel discussion featuring Eric Trump, TRON&#8217;s Justin Sun, and Zach Witkoff, one of the founders of World Liberty Financial, the Trump family&#8217;s crypto company. Sun is the proud owner of $75 million worth of the company&#8217;s cryptocurrency. Witkoff, the son of Steve Witkoff, Donald Trump&#8217;s envoy to the Middle East (and also a World Liberty cofounder), made an announcement during the panel: MGX, a state-backed Emirati investment firm, plans to invest $2 billion in the crypto exchange Binance using USD1, a stablecoin developed by World Liberty. As the Times notes: &#8220;Virtually every detail of Mr. Witkoff&#8217;s announcement&#8230; contained a conflict of interest.&#8221;</p><p><strong>Three more recent NYT headlines:</strong></p><ul><li><p><strong>Trump offers private dinner to top 220 investors in his memecoin</strong>. It&#8217;s an &#8220;an astonishing escalation of the Trump family&#8217;s efforts to profit from crypto,&#8221; the newspaper <a href="https://www.nytimes.com/2025/04/23/technology/trump-private-dinner-crypto-memecoin.html">declared</a>.</p></li><li><p><strong>Secret deals, foreign investments, presidential policy changes: The rise of Trump&#8217;s crypto firm. </strong>This is the most <a href="https://www.nytimes.com/2025/04/29/us/politics/trump-crypto-world-liberty-financial.html">in-depth reporting</a> we&#8217;ve seen yet on World Liberty Financial.</p></li><li><p><strong>Tether was accused of fraud. Now it&#8217;s a crypto darling in Washington. </strong>Policymakers in DC have long been suspicious of the stablecoin issuer. <a href="https://www.nytimes.com/2025/04/29/technology/trump-crypto-tether.html">That&#8217;s changing</a>.</p><div><hr></div></li></ul><p><strong>North Korean hackers created fake US companies to target crypto developers. </strong>Individuals linked to the Lazarus Group created shell companies to lure crypto developers and dupe them into downloading malware, <a href="https://www.theblock.co/post/351960/north-korean-hackers-created-fake-us-companies-to-target-crypto-developers-report">The Block reports</a>.</p><p><strong>Solana, Yuga Labs, and Uniswap&#8217;s Hayden Adams gave to Trump&#8217;s inauguration. </strong>A disclosure filed early this month revealed &#8220;a new slate of donors&#8221; to the inaugural committee, which brought in a historic $239 million in total, <a href="https://unchainedcrypto.com/newly-revealed-crypto-majors-solana-yuga-labs-and-uniswaps-hayden-adams-gave-to-trumps-inauguration/">Unchained reports</a>. Ethereum software developer Consensys and the financial services firm Cantor Fitzgerald (which holds much of Tether&#8217;s reserves) are also on the list of previously unreported donors. Adams, CEO of Uniswap Labs, donated nearly $250,000 despite his vocal support of Kamala Harris&#8217;s campaign.</p><p><strong>Meta is ramping up its AI-driven age detection. </strong>Instagram already uses an AI system that can detect clues that a user is under 18. Now it will use AI to &#8220;proactively look for teen accounts that have an adult birthday, and change settings for users it suspects are kids,&#8221; <a href="https://www.theverge.com/news/651826/meta-instagram-age-detection-ai-settings">reports The Verge</a>.</p><p><strong>Researchers secretly ran a massive, unauthorized AI persuasion experiment on Reddit users. </strong>They unleashed &#8220;AI-powered&#8221; bots in a popular subreddit called r/changemyview, in what <a href="https://www.404media.co/researchers-secretly-ran-a-massive-unauthorized-ai-persuasion-experiment-on-reddit-users/">404 describes</a> as a &#8220;large-scale experiment&#8221; examining whether &#8220;AI could be used to change people&#8217;s minds about contentious topics.&#8221; The bots made more than a thousand (convincingly human) comments over months.</p><p><strong>Crypto VC giant Paradigm makes $50 million bet on decentralized AI startup Nous Research at $1 billion token valuation.</strong> A lot to unpack in that headline <a href="https://fortune.com/crypto/2025/04/25/paradigm-nous-research-crypto-ai-venture-capital-deepseek-openai-blockchain/">from Fortune</a>. According to the article, Nous is using the Solana blockchain &#8220;as a key component in the process it uses to train&#8221; AI models. The article adds that the firm has created &#8220;a method for training open-source AI models that would allow people to contribute their own idle computing power,&#8221; using crypto as the incentive to contribute.</p><p><strong>Aztec Network launches public testnet for privacy-focused Ethereum Layer 2 </strong>(<a href="https://www.theblock.co/post/352776/aztec-network-launches-public-testnet-for-privacy-focused-ethereum-layer-2">The Block</a>).<strong> </strong>This follows &#8220;successful testing of the first decentralized upgrade process for an L2,&#8221; <a href="https://apnews.com/press-release/bitwire/privacy-8f751676668400969b68dfbe5aec72e0#">according to</a> Aztec.</p><p><strong>Sam Altman&#8217;s Worldcoin gets new Orb Mini and US Launch </strong>(<a href="https://blockworks.co/news/sam-altman-worldcoin-orb-mini-eye-scan">Blockworks</a>). You can now scan your irises in select US cities. Also, for some reason the firm is developing a version of its iris scanner that looks like an iPhone.</p><p><strong>Polygon spin-off Miden raises $25 million in seed funding for privacy-focused blockchain </strong>(<a href="https://www.theblock.co/post/352342/polygon-miden-funding-blockchain">The Block</a>)<strong>. </strong>Miden is looking to play in the same league as Aleo, Aztec, and other protocols developing confidential decentralized computing platforms using zero-knowledge cryptography.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[And the tech shall set you free]]></title><description><![CDATA[What can "freedom tech" do for you?]]></description><link>https://www.projectglitch.xyz/p/and-the-tech-shall-set-you-free</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/and-the-tech-shall-set-you-free</guid><pubDate>Fri, 18 Apr 2025 06:47:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Xr8i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Happy Friday! Glitch is back. Tell a friend. </em></p><div><hr></div><h2>An inflection point for &#8220;freedom tech&#8221;</h2><p>&#8220;Freedom tech.&#8221; That was the theme of the latest edition of the <a href="https://mitbtcexpo.org/">MIT Bitcoin Expo</a>, a long-running and well-loved annual gathering focused on the technology that powers the world&#8217;s original cryptocurrency.</p><p>I couldn&#8217;t make it in person, so I caught the livestream of the proceedings earlier this month. As I took in the sessions, including several talks by bona fide human rights activists, I kept thinking about Salt Typhoon, the catastrophic cyberattack on US telecom infrastructure that was revealed last year.</p><p>What is freedom tech? The premise of the MIT conference was that Bitcoin qualifies, as the decentralized cryptocurrency network offers freedom from centralized monetary systems. Encrypted messaging is another prominent example. That&#8217;s why the US government&#8217;s reaction to Salt Typhoon was so remarkable.</p><p>Late last year, officials said that Chinese hackers had infiltrated several major telecom companies, including AT&amp;T, Verizon, and T-Mobile. Lawmakers and government authorities were <a href="https://archive.ph/Z0y3M">&#8220;shocked&#8221;</a> by Salt Typhoon&#8217;s depth and sophistication. Hackers accessed sensitive communications data about <a href="https://archive.ph/Z0y3M">more than a million people</a>, including high-ranking government officials and members of both Donald Trump and Kamala Harris&#8217;s presidential campaigns.</p><p>Just as shocking were the steps those officials suggested Americans take to protect themselves. &#8220;US officials urge Americans to use encrypted apps amid unprecedented cyberattack,&#8221; reported <a href="https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694">NBC News</a>. &#8220;Encryption is your friend,&#8221; Jeff Green, then the executive assistant for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), told news reporters.</p><p>Not long ago, it would have been unheard of for the government to recommend encryption. The director of the FBI, James Comey, warned in 2014 that criminals were &#8220;<a href="https://www.brookings.edu/articles/watch-fbi-director-james-comey-on-technology-law-enforcement-and-going-dark/">going dark</a>&#8221; using encryption; he called this a &#8220;significant public safety problem.&#8221; In 2016, the bureau <a href="https://epic.org/documents/apple-v-fbi-2/">tried to force Apple </a>to give the FBI access to encrypted iPhone data associated with a terrorist attack in San Bernardino, California. Back then, internet freedom activists fought the government for the right to use encrypted messaging tools (Apple ultimately won the case). Now the government has publicly said we should use those tools to protect ourselves.</p><p>The change reflects today&#8217;s reality: the internet is a highly adversarial place. &#8220;Freedom tech&#8221; is no longer a category reserved for people living under oppressive governments. At this point, we all stand to benefit from the security these capabilities offer. And even if you live in a &#8220;free&#8221; country, the acceleration of AI technology is likely to make it tougher to stay free without using freedom tech.</p><h3>Bitcoin and freedom</h3><p>What is Bitcoin freedom <em>from</em>? That&#8217;s one of the deep questions University of Wyoming philosophy professor <a href="https://www.uwyo.edu/philrelig/faculty/philosophy/brettler.html">Bradley Rettler</a> asked during <a href="https://www.youtube.com/live/XT-B9k9t5B8?si=JKo0fB_nwez9LKPp">his talk</a> at MIT. To begin with, it is freedom from &#8220;money makers,&#8221; like governments, which make monetary policies, he said. Many of those policies have caused harm or at least failed to rectify economic calamities. Rettler cited a report from the UN that in 2022, 69 economies&#8212;in the home nations of more than 2.1 billion people&#8212;confirmed double-digit inflation.</p><p>The Bitcoin Expo featured keynotes from Evan Mawarire, an activist from Zimbabwe <a href="https://www.youtube.com/watch?v=sNE-2ffq5MA">who spoke</a> about authoritarianism and hyperinflation in that country, and Mauricio Di Bartolomeo, a Venezuelan entrepreneur <a href="https://www.youtube.com/live/XT-B9k9t5B8?si=KcfbJ35aBopAjpjH&amp;t=97">who spoke</a> about how his family turned to Bitcoin to protect themselves against inflation and the policies of President Nicol&#225;s Maduro.</p><p>Bitcoin is also freedom from surveillance, particularly when paired with cryptographic tools that enhance blockchain privacy, Rettler said, and it&#8217;s about more than financial freedom. Since so much of our communication and interaction now occurs online, Rettler said, the freedoms of speech, religion, press, and assembly now have digital components. They also all require the ability to transact. &#8220;If you are using a system that has managers and mediators, you might be blocked from these freedoms,&#8221; he said.</p><p>If you are using a system like that, you are probably also trusting mediators and managers to store your personal data. Salt Typhoon is only one recent example from a litany of data breaches that together call into question whether that trust is well-placed. Because even if it feels like you are transacting and interacting freely, you never know who is watching. It&#8217;s not as simple as keeping something secret from the government. We need to protect it from the world&#8217;s most sophisticated hackers, too.</p><h3>Privacy is freedom</h3><p>In fact, governments need freedom tech, too. Another speaker at the MIT Bitcoin Expo was Roger Dingledine, co-founder of the Tor Project. Tor prevents anyone who might be watching your internet connection from tracking your activity. Dingledine <a href="https://youtu.be/dMHhuY35NKY?si=jCF0bE-aWvxV2Z4S">said</a> that when he is speaking with his parents, he calls it a privacy tool. When he talks with governments, he uses a different term: &#8220;traffic analysis-resistant communications networks.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xr8i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xr8i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 424w, https://substackcdn.com/image/fetch/$s_!Xr8i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 848w, https://substackcdn.com/image/fetch/$s_!Xr8i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 1272w, https://substackcdn.com/image/fetch/$s_!Xr8i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xr8i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png" width="1456" height="976" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:976,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2824346,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/161582221?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xr8i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 424w, https://substackcdn.com/image/fetch/$s_!Xr8i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 848w, https://substackcdn.com/image/fetch/$s_!Xr8i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 1272w, https://substackcdn.com/image/fetch/$s_!Xr8i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad81328-c8a2-4696-b429-0ce38bcd2ca4_2263x1517.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Roger Dingledine, co-founder of the Tor Project</figcaption></figure></div><p>Governments don&#8217;t think they need a privacy tool, he said. &#8220;But oh, I can send my ambassador to Israel and somebody watching the hotel network connection doesn&#8217;t learn that she&#8217;s my ambassador? Yeah, I actually do really need that.&#8221;</p><p>In other words, privacy is now basic internet security. And it&#8217;s going to get worse. &#8220;AI is greatly increasing capabilities for centralized data collection and analysis while greatly expanding the scope of the data we share voluntarily,&#8221; Ethereum co-inventor Vitalik Buterin argued in a recent <a href="https://vitalik.eth.limo/general/2025/04/14/privacy.html">blog post</a> entitled &#8220;Why I Support Privacy.&#8221; In the future, he writes, &#8220;we may be literally talking about AI <em>reading our minds</em>.&#8221;</p><p>Privacy tends to be underrated by folks who don&#8217;t need it as badly, Buterin writes, adding that privacy is &#8220;more needed for people whose life situations deviate from the norm, in any direction.&#8221; That&#8217;s not only a lot of people, he says, but &#8221;you never know when you will become one of them.&#8221; This is the kind of thinking that inspired the cypherpunk movement in the 1990s. The good news, according to Buterin, is that &#8220;we have more powerful tools to preserve privacy&#8230;than the 1990s cypherpunks could have imagined,&#8221; like <a href="https://www.projectglitch.xyz/p/do-you-need-a-zero-knowledge-proof">zero-knowledge proofs</a>.</p><p>The bad news is that the current (centralized) systems that pervade our digital lives depend on people relinquishing control of personal data and trusting authorities to keep it safe. This system is deeply entrenched, thanks to billions of dollars in profit. The initial rise of generative AI models has only increased this system&#8217;s inertia. Yes, we have powerful privacy-preserving tools, but society won&#8217;t reap their full benefits unless those tools are prioritized and implemented. Incumbent powers, meanwhile, have all the incentive in the world to use whatever means at their disposal, including AI, to stay in power.</p><p>There is conflict ahead. </p><p><em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/and-the-tech-shall-set-you-free?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/and-the-tech-shall-set-you-free?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>HEADLINE WATCHER</h2><p><strong>Justice Dept. scales back crypto cases in line with Trump directives.</strong> That&#8217;s the headline from the <a href="https://www.washingtonpost.com/national-security/2025/04/08/trump-crypto-fraud-doj-enforcement/">Washington Post</a>, but this one reverberated throughout both the traditional and crypto media. The news is based on <a href="https://www.justice.gov/dag/media/1395781/dl">a memo</a> issued by Deputy Attorney General Todd Blanche. The Justice Department will &#8220;stop participating in regulation by prosecution in this space,&#8221; the memo reads. &#8220;Specifically, the Department will no longer target virtual currency exchanges, mixing and tumbling services, and offline wallets for the acts of their end users or unwitting violations of regulations&#8221;&#8212;unless the case falls within a separate area on which the DOJ will place special focus: which is the use of digital asset by &#8220;cartels, Transnational Criminal Organizations, Foreign Terrorist Organizations, and Specially Designated Global Terrorists.&#8221;</p><p>&#8220;Mixing and tumbling services&#8221; is imprecise; these are umbrella terms for a number of distinct technical designs that raise distinct sets of legal questions. Centralized mixers operated by humans are different than decentralized smart contracts, like the core of Tornado Cash. So it&#8217;s not clear what this means for Roman Storm, who the DOJ is prosecuting for his role in the development of the Ethereum-based privacy tool, which North Korea used to launder stolen crypto. Brian Klein, Storm&#8217;s lawyer, told the Washington Post that he interpreted the memo &#8220;as supporting the dismissal of the case.&#8221; We&#8217;re keeping a close eye on this.</p><p><strong>Influential crypto researcher and white hat hacker Samczsun steps down from Paradigm to focus on crypto security. </strong>The pseudonymous researcher, who has been at the VC firm for four and a half years, will now spend all of his time on the <a href="https://www.securityalliance.org/">Security Alliance (SEAL)</a>, which he founded in 2023. &#8220;When I told (Paradigm cofounder) matt (Huang) that i wanted to build the solution to crypto security, he was fully supportive,&#8221; Samczsun <a href="https://x.com/samczsun/status/1908245100750397849">said on Twitter</a>.&#8221; SEAL, which coordinates crypto threat intelligence sharing and incident response services, has become a full-time commitment, he said.</p><div><hr></div><blockquote><p><em><strong>If you&#8217;re interested in learning more about SEAL and will be in DC on Wednesday, April 23, you should <a href="https://lu.ma/pgpforcrypto20250423">RSVP to attend</a> the PGP* (Pretty Good Policy) for Crypto meeting, which will feature a fireside chat between Samczsun and Project Glitch&#8217;s Mike Orcutt. If you can&#8217;t make it in person, catch the livestream on <a href="https://www.youtube.com/@pgpforcrypto/streams">YouTube</a> or <a href="https://x.com/pgpforcrypto">X</a>. The fireside will begin around 10:45 AM Eastern.</strong></em></p></blockquote><div><hr></div><p><strong>Former Ethereum Foundation developer Virgil Griffith released from prison. </strong>Griffith was sentenced to 63 months in prison in 2022 after pleading guilty to violating sanctions against North Korea when he attended a blockchain conference there. Prosecutors said he provided &#8220;technical advice on using cryptocurrency and blockchain technology to evade sanctions.&#8221; Now he&#8217;s out on parole, <a href="https://www.theblock.co/post/350211/former-ethereum-foundation-developer-virgil-griffith-released-from-prison">reports The Block</a>.</p><p><strong>Altman-backed Praxis scouts Kyiv, Athens for tech utopia base. </strong>The &#8220;sovereign network, founded and run by 29-year-old Dryden Brown, is on a global search for 10,000 acres it can call its physical home. The project, which has raised $500 million, is backed by venture funds run by Sam Altman and Peter Thiel and crypto VC firms Paradigm and Winklevoss Capital, among other investors. <a href="https://www.bloomberg.com/news/articles/2025-04-08/altman-backed-praxis-scouts-kyiv-athens-for-tech-utopia-base">According to Bloomberg</a>, Dryden wants to &#8220;establish a city that will offer AI-augmented governance and employer-friendly labor laws he describes as &#8216;Elon-compatible.&#8217;&#8221;</p><p><strong>Solana developers launch new &#8216;confidential balances&#8217; token extension to improve onchain safety. </strong>The feature uses advanced cryptography to let users shield their typically public token balances and transfer secret amounts to a recipient, <a href="https://www.theblock.co/post/350076/solana-developers-launch-new-confidential-balances-token-extensions-to-improve-onchain-privacy">explains The Block</a>.</p><p><strong>Crypto attorney alleges US government knows Bitcoin creator&#8217;s identity. </strong>A lawyer in the US has filed a Freedom of Information Act lawsuit seeking &#8220;documents concerning claims made by a high-ranking Special Agent of DHS that DHS had found and interviewed Bitcoin creator Satoshi Nakamoto.&#8221; The suit claims that a federal agent stated at a conference that the DHS had interviewed Bitcoin&#8217;s long-lost inventor. (via <a href="https://decrypt.co/313772/lawsuit-alleges-us-knows-bitcoin-creator-identity">Decrypt</a>)</p><p><strong>Apple-UK data privacy row with UK should not be secret, court rules.</strong> In a win for civil liberties activists, a judge in the UK has ruled that a legal fight between Apple and the UK government &#8220;cannot be held in secret,&#8221; <a href="https://www.bbc.com/news/articles/cvgn1lz3v4no">reports the BBC</a>. The government wants the capability to access encrypted information that Apple currently cannot access. The company, taking the same position it has taken before against the US government, argues that installing a government backdoor would make the system more vulnerable to hackers.</p><p><strong>Trump wants to merge government data. Here are 314 things it might know about you. </strong>One of the President&#8217;s many executive orders calls for the &#8220;consolidation&#8221; of the many disparate datasets held by various government agencies. The <a href="https://www.nytimes.com/2025/04/09/us/politics/trump-musk-data-access.html">New York Times</a> says the effort to carry out the order, led by Elon Musk, is &#8220;raising the prospect of creating a kind of data trove about Americans that the government has never had before, and that members of the president&#8217;s own party have historically opposed.&#8221; The Times went through 23 of the data systems that its sources say Musk&#8217;s aides want to access, identifying &#8220;more than 300 separate data fields about people who live in the US.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[How crypto and the US government can team up against North Korea ]]></title><description><![CDATA[Plus: AI agents could be a privacy nightmare]]></description><link>https://www.projectglitch.xyz/p/how-crypto-and-the-us-government</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/how-crypto-and-the-us-government</guid><pubDate>Wed, 02 Apr 2025 08:26:16 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Happy Wednesday! We can&#8217;t stop thinking about the future of crypto compliance, which is a lot more sci-fi than it sounds. Also, a frightening notion is haunting the AI agent hype. </em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="5327" height="3872" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3872,&quot;width&quot;:5327,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;white concrete building under blue sky during daytime&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="white concrete building under blue sky during daytime" title="white concrete building under blue sky during daytime" srcset="https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1584890309466-272e6fffb487?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxub3J0aCUyMGtvcmVhfGVufDB8fHx8MTc0MzU0MzQzMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Steve Barker</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2>Crypto and the US have a common interest in countering Lazarus</h2><p><a href="https://www.projectglitch.xyz/p/the-anti-crypto-army-lost-but-developers">The anti-crypto army may have fallen</a>, but crypto&#8217;s number one adversary&#8212;North Korea&#8217;s band of state-sponsored hackers known as Lazarus&#8212;is thriving. Since North Korea is also an enemy of the US government, there&#8217;s an opportunity for collaboration, argues Michael Mosier.</p><p>Mosier has seen the issue from nearly every seat at the table. He worked as a lawyer for the blockchain analytics firm Chainalysis, served as acting director at the US Treasury Department&#8217;s Financial Crimes Enforcement Network (FinCEN), and was the top attorney at Ethereum Layer 2 builder Espresso before launching his own law firm, Arktouros.</p><p>In some ways, the situation isn&#8217;t complicated. Lazarus has mastered the art of stealing and laundering cryptocurrency, and it keeps improving&#8212;last month&#8217;s <a href="https://www.projectglitch.xyz/i/158796404/kim-jong-un-still-has-crypto-in-a-pickle">billion-dollar hack of the crypto exchange Bybit</a> was its most sophisticated yet. The industry must find ways to counter this threat, because it is bad for business when the same criminal group keeps walking off with huge amounts of customers&#8217; money. The US government also wants this to stop, though for a slightly different reason: the stolen money is funding North Korea&#8217;s nuclear weapons program.</p><p>That may help explain why the Department of Justice is prosecuting Roman Storm, one of the developers of the Ethereum-based privacy tool Tornado Cash, which Lazarus has used to hide their tracks after stealing crypto. Many crypto advocates see <a href="https://www.projectglitch.xyz/p/the-anti-crypto-army-lost-but-developers">the Storm prosecution</a> as a hostile government overreach. </p><p>But maybe Lazarus ultimately represents an opportunity to work together. There is &#8220;a very natural non-coercive alignment with the US government and the crypto industry writ large,&#8221; Mosier said on the <a href="https://www.surus.io/insights/ep-11-crypto-compliance-and-the-18-trillion-blind-spot">Form and Structure podcast</a>.</p><p>The central problem is that traditional anti-money laundering measures&#8212;like requiring someone to submit a government ID and other identifying documents before opening a new account&#8212;aren&#8217;t working. Acquiring false identity credentials good enough to fool modern know-your-customer (KYC) systems is easy and cheap.</p><p>On top of that, traditional approaches lean on intermediaries (banks, etc.), requiring them to maintain lots of information about their customers and submit reports documenting large and/or &#8220;suspicious&#8221; transactions. In <a href="https://www.projectglitch.xyz/p/will-the-real-defi-please-stand-up">genuine decentralized systems</a>, such intermediaries do not exist, and reporting suspicious transactions after the fact is often too late.</p><p>On the other hand, Mosier said, public blockchains provide law enforcement officials with a wealth of transaction data that can be analyzed and acted on. Systems that can automatically detect bad actors based on characteristic behaviors and other &#8220;malicious indicators&#8221; can be used to prevent them from moving money. It&#8217;s possible to use &#8220;activity-based indicators&#8221; to ascertain, for example, that &#8220;this wallet is probably Lazarus because of the way they are moving the money,&#8221; he said.</p><p>As we&#8217;ve discussed at length in this newsletter (and all day long at the inaugural <a href="https://www.youtube.com/playlist?list=PLWmtTg-WFLv6t3LD-nyP2LLrmLxvo4aAf">DC Privacy Summit</a> last October), it&#8217;s also possible, using zero-knowledge cryptography, to verify identifying information about someone without collecting the underlying personal data. That could be an effective way to do certain kinds of automated compliance checks in real time. It might also save firms on compliance costs since they wouldn&#8217;t have to pay to store and secure so much sensitive data.</p><p>This is not marketing for the crypto industry. It&#8217;s an argument that by using information and tools available thanks to cryptocurrency technology, it&#8217;s possible to devise systems that can be more effective at mitigating a risk that the government needs to get more effective at mitigating. Nonetheless, trying to convince a critical mass of policymakers to change their mindset on this issue has felt like &#8220;banging your head against the wall,&#8221; according to Mosier&#8217;s fellow podcast guest Rebecca Rettig, a longtime DeFi lawyer who is now chief legal officer at Jito Labs.</p><p>The Bank Secrecy Act, which imposes KYC requirements in the US, and other compliance programs &#8220;are so entrenched in people&#8217;s minds as &#8216;what works,&#8217;&#8221; Rettig said. That&#8217;s been an obstacle to progress toward something that &#8220;both legislators and good actors in the industry really want,&#8221; she said: &#8220;Just a system that detects, documents, and deters good actors.&#8221; <em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/how-crypto-and-the-us-government?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/how-crypto-and-the-us-government?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Meredith Whittaker: &#8216;AI agent&#8217; hype threatens privacy</h2><p>There is no buzzier term in the crypto world than &#8220;AI agents,&#8221; but the hype spreads well beyond crypto. <a href="https://youtu.be/s4JNLL7U8H8?si=gevAgdcxS-Q7o72c">A Salesforce ad</a> featuring Matthew McConaughey and Woody Harrelson tells us how these little artificial guys can do amazing things for us, like avoid booking an outdoor table at a restaurant on a rainy day.</p><p>Unfortunately, the commercial does not explain why the restaurant would still be seating people in the pouring rain, how exactly an agent would work, or what an AI agent even is. The main message is that relying on AI agents is what cool people do now. No details, no devil. Wave it in.</p><p>Hold up, says Meredith Whittaker. The president of the Signal Foundation and chief advisor to the AI Now institute, a policy think tank, <a href="https://www.youtube.com/watch?v=AyH7zoP-JOg">warned a rapt audience</a> at South by Southwest last month that the &#8220;introduction of this sort of notion of agentic AI into our devices and lives&#8221; is dangerous and threatens privacy.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kDug!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kDug!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 424w, https://substackcdn.com/image/fetch/$s_!kDug!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 848w, https://substackcdn.com/image/fetch/$s_!kDug!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 1272w, https://substackcdn.com/image/fetch/$s_!kDug!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kDug!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png" width="1456" height="772" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:772,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1112881,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/160373437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kDug!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 424w, https://substackcdn.com/image/fetch/$s_!kDug!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 848w, https://substackcdn.com/image/fetch/$s_!kDug!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 1272w, https://substackcdn.com/image/fetch/$s_!kDug!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62f5e5c5-3cfd-4ff7-82e1-b74f71e74e6d_1514x803.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Meredith Whittaker and SXSW moderator Guy Kawasaki</figcaption></figure></div><p>Consider the initial sales pitch: AI agents are supposed to be able to do things like research flights and hotels, make reservations, note it all down in our calendars, and message relevant friends and colleagues.</p><p>&#8220;So what would it need to do that? Well, it would need access to our browser, an ability to drive that. It would need our credit card information to pay for the tickets. It would need access to our calendar&#8212;everything we are doing, everyone we are meeting. It would need access to Signal to open and send that message to our friends. And it would need to be able to drive that across our entire system with something that looks like root permission.&#8221;</p><p>There&#8217;s no current way to do all that encrypted, Whittaker said. And a sufficiently powerful AI model would not be able to run on the user&#8217;s device, she warned. &#8220;That&#8217;s almost certainly being sent to a cloud server where it&#8217;s being processed and sent back.&#8221;</p><p>Whittaker&#8217;s pessimism is a welcome counterbalance to the commercial depicting McConaughey moping in the rain because he didn&#8217;t use an agent. Marketers want you to think AI agents are a matter of inevitable technological progress. Not only is that not true, but given the obvious and thorny questions they raise about privacy, agents seem in many ways to be anathema to the values of crypto. At least until it&#8217;s possible to do all that stuff Whittaker described while preserving users&#8217; privacy, that is.</p><p>Her dire warning was part of a larger argument she made during the fireside chat, which is that thus far the progress of artificial intelligence has been &#8220;predicated&#8221; on corporate surveillance by big tech companies. Agents are an immediate concern in that vein, she said.</p><p>&#8220;There&#8217;s a profound issue with security and privacy that is haunting this sort of hype around agents,&#8221; she said. The trend threatens to &#8220;break the blood-brain barrier between the application layer in the OS &#8230; in the name of this sort of, you know, magic genie bot that&#8217;s going to take care of the exigencies of life.&#8221; <em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Project Glitch&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Project Glitch</span></a></p><div><hr></div><h2>Headline Watcher</h2><p><strong>ICERAID: Report immigrants, get paid in crypto.</strong> <a href="https://www.therage.co/iceraid/">A project called ICERAID</a>&#8212;which promises to pay crypto rewards for uploading images of &#8220;criminal illegal alien activity&#8221; to Immigration and Customs Enforcement (ICE)&#8212;is a thing, apparently. It went viral recently after right-wing activist Laura Loomer advertised it on her podcast. We don&#8217;t have anything pithy to say about this one other than &#8230; yikes. (via The Rage)</p><p><strong>0xbow unveils &#8216;Privacy Pools,&#8217; a new blockchain privacy tool drawing from Vitalik Buterin&#8217;s research. </strong>In 2023, Buterin and 0xbow cofounder Ameen Soleimani and a few other researchers co-authored a paper describing a method for using zero-knowledge cryptography to make &#8220;association sets&#8221; containing wallets previously screened for any links to known criminal activity. This concept is the heart of Privacy Pools, which is meant to enable Tornado Cash-like privacy, but only for users who can prove their money is untainted. (via <a href="https://www.youtube.com/playlist?list=PLWmtTg-WFLv6t3LD-nyP2LLrmLxvo4aAf">The Block</a>)</p><p><strong>PS:</strong> At last October&#8217;s DC Privacy Summit, <a href="https://youtu.be/eRdkYgdbyIM?si=NUDadkJv4L0epFyy">Solemani and 0xbow cofounder Zak Cole explained why they developed the technology and how it works</a>.</p><p><strong>Sen. Gillibrand warns against a &#8220;watered-down&#8221; stablecoin bill. </strong>&#8220;You have to think through all the ways this can go wrong,&#8221; the senator from New York and top Democrat behind the bipartisan Guiding and Establishing National Innovation for US Stablecoins (GENIUS) Act said at a conference in Washington, DC last week. &#8220;Do not think that a watered-down bill will help your industry,&#8221; she added, <a href="https://www.coindesk.com/policy/2025/03/26/sen-gillibrand-warns-against-a-watered-down-stablecoin-bill-says-tough-regs-needed-to-prevent-svb-like-bank-run">according to CoinDesk</a>. &#8220;It will destroy your industry.&#8221;</p><p><strong>Trump&#8217;s crypto venture introduces new digital currency. </strong>World Liberty Financial says it will launch a stablecoin called USD1. As <a href="https://www.nytimes.com/2025/03/25/technology/trump-crypto-stablecoin.html">the New York Times</a> puts it, the stablecoin adds to a &#8220;messy knot of business conflicts&#8221; the president has created with his various forays into the crypto industry. One example: Congress is considering crypto and stablecoin-specific legislation that has a legitimate shot at reaching Trump&#8217;s desk this year.</p><p><strong>Crypto bill to combat illicit activity gets new push after passing US House in 2024. </strong>Republican member Zach Nunn of Iowa and Democrat Jim Himes of Connecticut <a href="https://www.coindesk.com/policy/2025/03/28/crypto-bill-to-combat-illicit-activity-gets-new-push-after-passing-u-s-house-in-2024">have reintroduced</a> the Financial Technology Protection Act, which would set up an &#8220;interagency working group to collaborate with industry experts to disrupt the use of emerging financial technologies by bad actors.&#8221; (via CoinDesk)</p><p><strong>Polymarket&#8217;s $7 million Ukraine mineral deal debacle traced to oracle whale. </strong>Mad libs headline, anyone? Apparently someone holding an enormous number of governance tokens for the oracle that Polymarket uses to resolve its prediction markets was able to cast 25% of the votes and force through a &#8220;yes&#8221; resolution on a bet over whether the US and Ukraine would agree to a mineral deal&#8212;even though no outcome has yet been reached. Those betting &#8220;yes&#8221; have made more than $7 million, <a href="https://thedefiant.io/news/defi/polymarket-s-usd7m-ukraine-mineral-deal-debacle-traced-to-oracle-whale">according to The Defiant</a>. Polymarket is not issuing refunds because &#8220;this wasn&#8217;t a market failure,&#8221; but promised to make sure the &#8220;unprecedented situation&#8221; never happens again. Glitchy AF.</p><p><strong>&#8216;Hawk Tuah&#8217; girl off the hook for hawking meme coin!!! </strong>Yes, that&#8217;s the real headline from the <a href="https://www.tmz.com/2025/03/27/haliey-welch-hawk-tuah-girl-meme-coin-investigation-over-sec-no-charges/">TMZ </a><em><a href="https://www.tmz.com/2025/03/27/haliey-welch-hawk-tuah-girl-meme-coin-investigation-over-sec-no-charges/">exclusive</a></em>. The SEC had been investigating Haliey Welch&#8217;s memecoin, which pumped before whoever pumped it dumped within hours of launching in December. &#8220;For the past few months, I&#8217;ve been cooperating with all the authorities and attorneys, and finally, that work is complete,&#8221; Welch told TMZ, which reports that she has &#8220;parted ways with the LLC behind the coin.&#8221;</p><p><strong>Amazon&#8217;s AGI lab reveals its first work: advanced AI agents.</strong> Amazon has quietly created its own AI lab in San Francisco. Now it has revealed its first project: &#8220;A new AI model capable of powering some of the most advanced AI agents available anywhere,&#8221; <a href="https://www.wired.com/story/amazon-ai-agents-nova-web-browsing/">Wired reports</a>. The new system is a version of Amazon&#8217;s proprietary large language model, Nova. The company is using a training method called reinforcement learning to &#8220;improve Nova&#8217;s agential abilities,&#8221; according to the article.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Project Glitch is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[How the US could sleepwalk into a dystopian digital ID system]]></title><description><![CDATA[Tech born in the crypto community could ward off a privacy nightmare&#8212;but only if people actually use it.]]></description><link>https://www.projectglitch.xyz/p/how-the-us-could-sleepwalk-into-a</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/how-the-us-could-sleepwalk-into-a</guid><pubDate>Mon, 24 Mar 2025 07:47:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5DPs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello again! Today we continue our quest into the wilderness of digital identification. And once again: all the news that&#8217;s fit to Glitch, from Tornado Cash to World Liberty Financial.</em></p><div><hr></div><h2>How digital driver&#8217;s licenses could supercharge surveillance&#8212;and what can be done about it</h2><p>Jay Stanley isn&#8217;t a crypto guy. But the longtime American Civil Liberties Union policy watcher and privacy advocate is aware of the novel capabilities crypto folks have invented to get privacy on blockchains.</p><p>And he thinks we should use them to escape a &#8220;nightmare&#8221; he sees unfolding.</p><p>The future of digital identity is a massively complicated issue that is as political as it is technological. But most Americans, regardless of political stripe, would oppose a national identity system that could be used to track their activities. According to Stanley, what may seem like a mundane trend taking hold across the US&#8212;the shift to digital driver&#8217;s license credentials&#8212;is leading Americans to &#8220;sleepwalk&#8221; into that exact sort of system.</p><p>Stanley says the problem begins with a widely adopted &#8220;mobile driver&#8217;s license&#8221; or mDL standard that does not adequately protect the holder&#8217;s privacy (more on that in a minute). A number of state legislatures are moving forward with mobile driver&#8217;s license programs that use the standard, he says. He is concerned that making it easy to digitally share your driver&#8217;s license information will lead to more businesses&#8212;not just those selling age-restricted stuff&#8212;asking you for your ID.</p><p>&#8220;The real game here is to create one that could be used online,&#8221; Stanley said on stage late last month during <a href="https://youtu.be/qdAiOU_7hr0?si=_YVFr9bwZaxHpM00">a panel I moderated</a> as part of Paul Brigner&#8217;s PGP* for Crypto monthly breakfast event series in Washington, DC. &#8220;The concern is that there is going to be a lot of incentive for every website to track you and say: &#8220;Hey, do you want to watch a YouTube video? Do you want to log into your social media? Do you want to browse here at catbeds.com? Click here to send us your digital driver&#8217;s license.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5DPs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5DPs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5DPs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5DPs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5DPs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5DPs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3707838,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/159697191?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5DPs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5DPs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5DPs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5DPs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff004efd-61d9-467f-83bc-8f56a015dc4d_4032x3024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">On stage: Mike Orcutt (left) and Jay Stanley. On-screen: Kim Hamilton Duffy (left) and Manu Sporny</figcaption></figure></div><p>&#8220;This really has the potential to become a supercookie&#8221; that would work online and in the physical world, Stanley said. Think of all the places&#8212;bars, restaurants, convenience stores, airports, and hotels, to name a handful&#8212;where you already have to show your ID.</p><p>It would be one thing if it weren&#8217;t possible to keep your personally identifying information private while still transmitting the necessary information to anyone who checks your ID. But it is technically possible. &#8220;We have all these cryptographic techniques to preserve privacy, as in the cryptocurrency space,&#8221; Stanley said. &#8220;We should use them.&#8221;</p><p>Some folks <em>are</em> using them&#8212;here and there, anyway. But what lies ahead is a political, technical&#8212;maybe even cosmic&#8212;struggle to determine how best to identify ourselves as human in the digital world.</p><h3>Standards: boring but important</h3><p>Hardly anyone thinks technical standards are exciting. But they are powerful. That&#8217;s in part because standards-making bodies, like the World Wide Web Consortium (W3C), were created with the support of national governments. The W3C <a href="https://www.w3.org/about/history/">was formed in 1994</a> with support from the European Commission and the US government&#8217;s Defense Advanced Research Projects Agency (DARPA). It creates standards for the web&#8212;and has even created standards for untrackable, private digital identity systems.</p><p>In the eyes of privacy advocates, the problem is that the US Transportation Security Agency (TSA) and many state legislatures have chosen to adhere to a different standard.</p><p>Created by the International Organization for Standardization (ISO) in 2021, the mobile driver&#8217;s license or &#8220;mDL&#8221; standard is silent in important areas where user privacy is at stake, Stanley says. &#8220;For example, it allows the ID to have a phone home mechanism, where you present your ID to a liquor store clerk, and the liquor store clerk pings the server of the DMV,&#8221; he says. &#8220;Now the DMV has a bird&#8217;s-eye view of everybody that you show your ID to.&#8221; Last October, the ACLU published <a href="https://www.aclu.org/documents/aclu-digital-id-state-legislative-recommendations">a list of 12 recommendations</a> for state legislatures, including that new laws should prohibit digital driver&#8217;s license issuers from tracking users via such a &#8220;phone home&#8221; mechanism.</p><p>Stanley and both of his fellow panelists&#8212;Manu Sporny, founder and CEO of <a href="https://www.digitalbazaar.com/">Digital Bazaar</a>, and Kim Hamilton Duffy, executive director of the <a href="https://identity.foundation/">Decentralized Identity Foundation</a>&#8212;say there is a better way.</p><p>The <a href="https://www.w3.org/TR/vc-overview/">&#8220;verifiable credentials&#8221; standard</a>, created by the W3C with Sporny&#8217;s help, sets technical parameters for a digital stand-in for a physical credential, like a driver&#8217;s license, designed with privacy in mind. The holder of a verifiable credential can use cryptographic proofs to selectively reveal only the necessary data to a given third party, while keeping everything else private.</p><p>Unlike the ISO process, W3C&#8217;s process has been open to the public. Work on the verifiable credential has been going on for years. &#8220;It is important to understand that when a standard is put together, that civil liberties organizations, security professionals, privacy professionals, did actually look at the standard and make sure that it had been vetted,&#8221; Sporny said.</p><p>Advanced cryptography, like the zero-knowledge proof systems emerging in the cryptocurrency world, are a natural fit for this standard. They give users the power to prove statements about themselves&#8212;they are above the legal age to buy a beer, for example&#8212;without revealing any other information.</p><p>We are all used to pulling out our plastic identity cards for various reasons. But they contain far more information about ourselves than any store clerk needs to see. &#8220;You are showing 35 pieces of deeply identifying information just to buy a beer,&#8221; Sporny said. &#8220;You shouldn&#8217;t be doing that.&#8221;</p><p>Sporny pointed to the California Department of Motor Vehicles as one agency that has given consumers both options in its app&#8212;mDLs that follow the ISO standard as well as verifiable credentials. Users in California can opt into a system called <a href="https://www.mytruage.org/">TruAge</a>, which Sporny&#8217;s company helped develop for the National Association of Convenience Stores. The system lets users who opt in to digitally share an &#8220;unlinkable,&#8221; single-use cryptographic token that verifies their age without revealing anything else. &#8220;You don&#8217;t need to show your entire ID, you just need to show a proof that the DMV believes that you are over the age of 21,&#8221; Sporny said. &#8220;And that meets regulatory burden in many of the states.&#8221;</p><h3>Avoiding a &#8216;show me your papers&#8217; web</h3><p>The speed at which new privacy and identity-related capabilities are emerging in the cryptocurrency space is at odds with the drawn-out process of making technical standards. Duffy, who heads the Decentralized Identity Foundation, aims to bridge that gap.</p><p>Her team is focused on another W3C standard called <a href="https://www.w3.org/TR/did-1.0/">decentralized identifiers</a>, or DIDs. Verifiable credentials and DIDs complement each other: the DID provides the verifiable identity information, while the credential makes verifiable statements about it. Blockchain systems can potentially play a valuable role as hosts of &#8220;verifiable data registries,&#8221; which record and provide necessary DID data when a user presents their ID.</p><p>The Decentralized Identity Foundation has a grant from the Ethereum Foundation&#8217;s <a href="https://pse.dev/en">Privacy and Scaling Explorations</a> program to work on figuring out how to &#8220;harmonize decentralized identity standards with these much more novel advances in (zero-knowledge proofs),&#8221; as Duffy put it. One application her team finds especially compelling is the ability to &#8220;wrap&#8221; a traditional identity credential, like a passport, with a zero-knowledge proof. &#8220;You can then use it in ways that support selective disclosure,&#8221; she said. An example is the <a href="https://pse.dev/en/projects/anon-aadhaar">Anon Aadhaar</a> project, which takes advantage of an NFC chip in Indian passports to let users prove their citizenship privately, using a zero-knowledge proof.</p><p>But if this sort of &#8220;crypto magic,&#8221; as the ACLU&#8217;s Stanley puts it, already exists, why aren&#8217;t we using it?</p><p>Part of it is that the subversive, &#8220;you can just do things&#8221; culture that pervades the cryptocurrency community tends to clash with the traditional process of methodically developing technical standards. Another reason is that these tools are still difficult for normal folks to use. Recent advances, particularly in systems that let users generate proofs using their phones, are helping on both fronts, said Duffy.</p><p>A crucial remaining barrier is simply a lack of awareness of many privacy-related problems and their potential solutions, Stanley said. The ACLU has heard from state legislators who are acting &#8220;out of naivet&#233;,&#8221; he said. &#8220;You put your credit card in your wallet? Well, put your driver&#8217;s license in your wallet. And everybody will think of me, your state representative, as very pro-technology and I&#8217;ve made your life easier.&#8221; Making decisions based on that kind of political incentive, rather than considering the larger ramifications, is what worries Stanley that the nation could easily &#8220;sleepwalk&#8221; into codifying systems that could compromise people&#8217;s privacy for decades to come.</p><p>The rise of artificial intelligence makes the situation potentially even more urgent. Duffy and Sporny contributed to an <a href="https://arxiv.org/abs/2408.07892">influential research paper</a> last year focused on the idea of &#8220;personhood credentials,&#8221; which people could use to prove they are human, not a bot. Duffy is concerned that some folks may be tempted to try to solve this problem using mobile driver&#8217;s licenses. That would be bad, she said. &#8220;We don&#8217;t want to go from &#8216;Captchas are broken,&#8217; to log in with your government ID,&#8221; Duffy said. &#8220;We want to make sure that we&#8217;re not building a &#8216;Show me your papers,&#8217; web.&#8221; <em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/how-the-us-could-sleepwalk-into-a?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/how-the-us-could-sleepwalk-into-a?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://lu.ma/pgpforcrypto20250325" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OMty!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 424w, https://substackcdn.com/image/fetch/$s_!OMty!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 848w, https://substackcdn.com/image/fetch/$s_!OMty!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 1272w, https://substackcdn.com/image/fetch/$s_!OMty!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OMty!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png" width="2614" height="516" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:516,&quot;width&quot;:2614,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:184732,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://lu.ma/pgpforcrypto20250325&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/159697191?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5375097b-d98a-45cb-ba04-80f301923ad3_2614x516.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OMty!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 424w, https://substackcdn.com/image/fetch/$s_!OMty!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 848w, https://substackcdn.com/image/fetch/$s_!OMty!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 1272w, https://substackcdn.com/image/fetch/$s_!OMty!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fcc62c4-0562-4298-bb42-09ed40466c8b_2614x516.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2>Headline Watcher</h2><p><strong>The US government removes Tornado Cash sanctions. </strong>This comes after a federal appeals court ruled in November that <a href="https://www.projectglitch.xyz/p/crypto-privacy-advocates-land-a-legal">smart contracts cannot be considered &#8220;property&#8221;</a> since they can&#8217;t be owned, and therefore the Department of Treasury did not have the authority to impose the economic sanctions in 2022. Meanwhile, Tornado Cash developer Roman Storm still awaits a criminal trial, scheduled for July, on charges that he violated sanctions, facilitated money laundering, and operated an unlicensed money transmitter. <a href="https://www.coindesk.com/policy/2025/03/21/u-s-government-removes-tornado-cash-sanctions">As CoinDesk points out</a>, Storm&#8217;s lawyers have already asked the court to consider the November sanctions ruling, but that request was &#8220;smacked down&#8221; by Judge Katherine Polk Failla of the Southern District of New York, who argued that whether or not Tornado Cash is sanctioned &#8220;does not affect the sanctions the Defendant allegedly conspired to violate&#8221;&#8212;those imposed on North Korea&#8217;s state-sponsored Lazarus hacking group.</p><p><strong>Trump Treasury expands financial surveillance.</strong> The decades-old Bank Secrecy Act requires that financial institutions file a report to the US Department of Treasury for every transaction that exceeds $10,000. Financial privacy advocates argue the statute in need of an upward adjustment to account for inflation. Now the Trump administration has temporarily <em>lowered</em> it to $200 for people living in 30 zip codes in California and Texas, as part of a stated effort to root out money laundering by Mexican drug cartels. &#8220;More than one million Americans are about to face a new level of financial surveillance,&#8221; <a href="https://www.cato.org/blog/trump-treasury-expands-financial-surveillance">writes the Cato Institute</a>.</p><p><strong>Five ideas pitched at the White House crypto summit behind closed doors. </strong>Buy more bitcoin was a popular pitch. But one of the five in this list is not like the others. <a href="https://unchainedcrypto.com/5-ideas-pitched-at-the-white-house-crypto-summit-behind-closed-doors/">According to Unchained</a>, citing a person who was briefed after the meeting, Paradigm co-founder and managing partner Matt Huang used his time to ask the administration to focus on the Department of Justice&#8217;s prosecution of Tornado Cash developer Roman Storm.</p><p><strong>US housing agency considers launching a crypto experiment</strong> and <strong>The Trump Administration wants USAID on the blockchain</strong>. <a href="https://www.propublica.org/article/hud-considers-crypto-blockchain-stablecoin-housing-urban-development">ProPublica reports</a> that the Department of Housing and Development (HUD) has had initial discussions around using a blockchain to &#8220;monitor HUD grants,&#8221; and that these talks have touched on &#8220;the potential use of a stablecoin.&#8221; The second headline <a href="https://www.wired.com/story/trump-administration-usaid-blockchain">is from Wired</a>, which highlights a passage from a memo Trump aides have been circulating about overhauling foreign aid programs. The memo states: &#8220;All distributions would also be secured and traced via blockchain technology to radically increase security, transparency, and traceability.&#8221;</p><p><strong>The company testing Wall Street&#8217;s appetite for AI computing power. </strong>A company that started off focused on crypto mining before stockpiling GPUs when the crypto markets crashed will now be &#8220;the first prominent AI initial public offering,&#8221; <a href="https://www.nytimes.com/2025/03/18/technology/coreweave-wall-street-ai-ipo.html">according to The New York Times</a>.</p><p><strong>Razer aims to eliminate AI bots from games via World&#8217;s identity tech. </strong>The world&#8217;s &#8220;leading lifestyle brand&#8221; for gamers is launching a new sign-in feature aimed at verifying real humans in online games, using the biometric-based &#8220;proof of humanity&#8221; technology from World (formerly known as Worldcoin). The new feature &#8220;comes at a time when AI-infused bots are wreaking havoc on the gaming landscape,&#8221; <a href="https://decrypt.co/310212/razer-eliminate-ai-bots-games-world-identity-tech">reports Decrypt</a>.</p><p><strong>Trump-backed World Liberty Financial completes $550 million public token sale. </strong>The DeFi and stablecoin-focused project, launched last September, will be governed by holders of a token called $WLFI, and it has now sold 25% of the supply, <a href="https://www.theblock.co/post/346331/trump-backed-world-liberty-financial-concludes-550-million-public-token-sale">according to The Block</a>. One of the most famous buyers of the token, which is nontransferrable, was TRON blockchain founder and notorious Chinese crypto entrepreneur Justin Sun, who has sprung for $75 million worth. Coincidentally(?), the Securities and Exchange Commission is now <a href="https://popular.info/p/breaking-sec-halts-fraud-prosecution">working with Sun</a> to find a resolution to its case against him for selling unregistered securities and market manipulation. Sure, the SEC is dropping all kinds of crypto cases right now. But the conflict of interest here is impossible to miss. &#8220;The President took a $75 million bribe and we all saw it,&#8221; <a href="https://www.jacobsilverman.com/p/the-president-took-a-75-million-bribe">writes</a> independent journalist Jacob Silverman.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Project Glitch&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Project Glitch</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Project Glitch is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item><item><title><![CDATA[I have seen the future of identity, and it is weird as hell ]]></title><description><![CDATA[Also: crypto's North Korean national security pickle]]></description><link>https://www.projectglitch.xyz/p/i-have-seen-the-future-of-identity</link><guid isPermaLink="false">https://www.projectglitch.xyz/p/i-have-seen-the-future-of-identity</guid><pubDate>Mon, 10 Mar 2025 20:45:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RyfD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Greetings! We&#8217;re excited to be back in your inbox. In this edition we&#8217;ve got a reflection on digital identity from ETH Denver, and an acknowledgment of North Korea&#8217;s growing crypto money laundering skills. Plus all the news that&#8217;s fit to Glitch.</em></p><div><hr></div><h2>How will we know which AI agents to trust?</h2><p>The question of how to best identify ourselves in digital spaces is as old as the internet. The rise of artificial intelligence is making how we try to answer that question weirder and weirder.</p><p>Take the idea of &#8220;<a href="https://www.projectglitch.xyz/p/worldcoins-struggle-for-hearts-minds">proof of personhood</a>,&#8221; a term popularized by Worldcoin, which has developed a cryptographic credential tied to biometric data that verifies one&#8217;s status as a real person&#8212;not a bot. That sounds useful, given the crescendoing drumbeat from the tech realm that AI is going to eat the world.</p><p>But is it really that simple? And why would another human necessarily be more trustworthy than an AI?</p><p>&#8220;Sure, we might want to know if a thing is human or artificial intelligence,&#8221; Billy Luedtke, founder and CEO of a startup called <a href="https://www.intuition.systems/">Intuition</a>, said during a lightly attended Saturday morning <a href="https://x.com/EthereumDenver/status/1895927407896596503">panel at ETH Denver</a> last week entitled <em>Bye bye biometrics: AI demands stronger security standards</em>. &#8220;But then you enter the philosophical realm of: Are the AI just us?&#8221; Luedtke continued. &#8220;Are those actually also human, and just kind of like the aggregate human consciousness?&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RyfD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RyfD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 424w, https://substackcdn.com/image/fetch/$s_!RyfD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 848w, https://substackcdn.com/image/fetch/$s_!RyfD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 1272w, https://substackcdn.com/image/fetch/$s_!RyfD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RyfD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png" width="1456" height="725" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:725,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3271359,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.projectglitch.xyz/i/158796404?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RyfD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 424w, https://substackcdn.com/image/fetch/$s_!RyfD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 848w, https://substackcdn.com/image/fetch/$s_!RyfD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 1272w, https://substackcdn.com/image/fetch/$s_!RyfD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a3daaf-3696-4216-9bd5-6ce3b0bb34cd_2318x1155.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From left to right: Venture capitalist Miko Matsumura, Evin McMullen of Privado, Billy Luedtke of Intuition, and Francis Berwa of zkPass</figcaption></figure></div><p>It sounds bizarre, even a little insane. But he&#8217;s got a point. It&#8217;s not unreasonable to think that at some point in the not-so-distant future it will be normal to have AI agents working on our behalf. How should they identify themselves? Wouldn&#8217;t they be, at least sort of &#8230; us?</p><p>Another panelist, Evin McMullen, the CEO of the zero-knowledge cryptography-based ID company <a href="https://www.privado.id/">Privado</a>, described a system her shop has developed that accounts for this. Called &#8220;<a href="https://x.com/PrivadoID/status/1861928295954010198">know-your-agent</a>,&#8221; it gives users &#8220;the ability to assign a unique identifier to an instance of an agent and to relate that to a unique human being, or a set of human beings,&#8221; McMullen said. This means an agent can &#8220;represent itself on behalf of you and can enter spaces where you have privileges to do so,&#8221; she said.</p><p>Even if a bot isn&#8217;t connected to a real human identity, that doesn&#8217;t mean it&#8217;s bad. But how will we know if it can be trusted? For example, Luedtke said, &#8220;you might have a swarm of bots that aren&#8217;t human, but they&#8217;re performing a bunch of really productive actions.&#8221; What&#8217;s crucial to know is &#8220;the reputation of the thing,&#8221; he argued.</p><p>&#8220;You need the aggregate set of data the thing has created, and the aggregate set of data created about the thing, and then you can reason about the reputation of the thing.&#8221; Does its track record suggest it can be trusted? That&#8217;s the sort of question Luedtke&#8217;s company aims to help answer.</p><p>Whatever the solution turns out to be, it seems clear that Luedtke and McMullen are right about the problem: we&#8217;ll need new methods for determining whether to trust the friendly bot who insists it&#8217;s trying to help you, not scam you. Once again: the future is weird. <em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/p/i-have-seen-the-future-of-identity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/p/i-have-seen-the-future-of-identity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2><strong>Kim Jong Un (still) has crypto in a pickle</strong></h2><p>We said it <a href="https://www.projectglitch.xyz/p/kim-jong-un-has-crypto-in-a-pickle">just over a year ago</a>: as long as one of America&#8217;s nuclear-armed adversaries is capable of exploiting cryptocurrency technology and the crypto industry to generate illicit profit, <a href="https://www.projectglitch.xyz/p/kim-jong-un-has-crypto-in-a-pickle">crypto is going to have political problems</a>. North Korea&#8217;s $1.5 billion (mostly in ether) theft from Bybit, by some estimates the world&#8217;s second largest exchange, was not only stunning in its scale but also in how elaborate and clever it was.</p><p>The attack began weeks before the actual heist, when alleged North Korean state actors compromised the laptop of an employee of Safe{Wallet}, the provider of the multisignature wallet software Bybit uses to store digital money. &#8220;This developer was one of the very few personnel that had higher access in order to perform their duties,&#8221; Safe{Wallet} stated in <a href="https://x.com/safe/status/1897663514975649938?s=61">a March 6 summary</a> of its forensic investigation. As a security measure, multisignature wallets won&#8217;t allow a transaction to go through until a certain number of &#8220;signers&#8221; agree. The attacker inserted malicious code into the Safe{Wallet} website, which made it possible to fool Bybit&#8217;s three signers, including CEO Ben Zhou.</p><p>Of course, stealing the crypto is only half the battle&#8212;and apparently the North Koreans have also leveled up their money laundering operation. &#8220;The speed at which the stolen funds are being laundered is particularly alarming,&#8221; blockchain analytics firm TRM Labs stated in <a href="https://www.trmlabs.com/post/the-bybit-hack-following-north-koreas-largest-exploit">a March 4 analysis</a>. The attackers have taken advantage of cross-chain &#8220;bridges&#8221; like THORChain to convert Ethereum tokens into bitcoin and then spread it across many wallets (more on that below). &#8220;This rapid laundering suggests that North Korea has either expanded its money laundering infrastructure or that underground financial networks, particularly in China, have enhanced their capacity to absorb and process illicit funds,&#8221; TRM Labs wrote.</p><p>Some crypto security experts have been critical of Bybit&#8217;s security protocols, and a few have said the heist was preventable. Do crypto exchanges need more safety rules? ByBit is based in Dubai and doesn&#8217;t serve US customers. Either way, just as important as how badly Bybit performed is how well North Korea has performed. It&#8217;s also hard to ignore that this is happening at a time when regulators in the US seem to be adopting a laissez-faire approach toward the industry. A big enough national security pickle could quickly shift priorities. <em>&#8212;Mike Orcutt</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Project Glitch&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.projectglitch.xyz/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Project Glitch</span></a></p><div><hr></div><h2>HEADLINE WATCHER</h2><p><strong>At crypto summit, Trump says US will be &#8220;the Bitcoin superpower.&#8221; </strong>The president held a four-hour gathering of crypto executives and investors at the White House. &#8220;High IQ individuals around this table,&#8221; he said after some high-profile execs called him &#8220;wonderful,&#8221; <a href="https://www.nytimes.com/2025/03/07/technology/trump-crypto-summit.html">according to the New York Times</a>. What was the point of the summit? Great question. &#8220;This wasn&#8217;t a meeting where things were being decided or disclosed,&#8221; Chainlink founder Sergey Nazarov told the Times.</p><p><strong>Bybit CEO says 20% from $1.5 billion theft has &#8220;gone dark&#8221; as hackers swap to bitcoin. </strong>Fallout from the Bybit heist is spreading. Bybit CEO Ben Zhou <a href="https://www.theblock.co/post/344384/bybit-ceo-says-20-from-1-4-billion-theft-has-gone-dark-as-hackers-swap-to-bitcoin">told The Block</a> 20% of the stolen $1.5 billion worth of ether tokens have &#8220;gone dark&#8221;&#8212;they&#8217;ve been transferred through exchanges that don&#8217;t use KYC, and can be considered laundered. The remaining tokens are mostly still traceable. That&#8217;s left the community behind the decentralized &#8220;cross-chain&#8221; protocol ThorChain with a difficult choice. Should they let vast quantities of Ether trades through and risk being an accomplice to one of the largest money laundering efforts in history? Or halt trading and exert centralized, unilateral power over a community that views such control as a mortal sin? <a href="https://www.theblock.co/post/343855/bybit-hackers-half-the-stolen-eth-bitcoin-fbi-confirms-lazarus">According to The Block</a>, the Bybit hackers have moved hundreds of millions through THORChain, which makes it possible to swap coins from one blockchain for coins from another. The hackers have been executing an elaborate laundering scheme that involves changing ether to bitcoin and moving it across thousands of different wallets. The activity on THORChain has led to internal division and to the resignation of one of the project&#8217;s lead developers.</p><p><strong>Reddit co-founder Alexis Ohanian joins bid to acquire TikTok, plans to move social app &#8220;onchain&#8221; </strong><a href="https://www.projectglitch.xyz/p/why-a-billionaire-wants-to-decentralize">We&#8217;ve discussed</a> Project Liberty, the outfit that&#8217;s been making noise about buying up the US arm of TikTok, before. Now <a href="https://www.theblock.co/post/344570/reddit-co-founder-alexis-ohanian-joins-bid-to-acquire-tiktok-plans-to-move-social-app-onchain">it has gained a new partner</a> with serious social media chops. The idea appears to be that with Ohanian on board, the bid will be more attractive (to US interests, at least) because of a stated goal of letting users control their own data. No word on how that squares with Reddit&#8217;s widely publicized <a href="https://www.wired.com/story/reddits-sale-user-data-ai-training-draws-ftc-investigation/">sale of user data</a> to AI firms.</p><p><strong>Argentine prosecutor aims to freeze $110 million in proceeds tied to Libra memecoin scandal. </strong>Eduardo Taiano, a federal prosecutor in Argentina, has requested that as much as $110 million be frozen, and has asked for the &#8220;the recovery of deleted social media posts, including those by (President Javier) Milei promoting the Solana-based memecoin,&#8221; <a href="https://cointelegraph.com/news/argentine-prosecutor-aims-freeze-assets-libra-memecoin-fraud-case?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound">reports Cointelegraph</a>, citing local media outlet Clar&#237;n. We published <a href="https://www.projectglitch.xyz/p/has-crypto-lost-the-plot">our thoughts about Libra</a> last issue.</p><p><strong>Coinbase acquires Iron Fish team to accelerate privacy efforts on Base. </strong>The team, which is led by founder and CEO Elena Nadolinski, will &#8220;stand up a new privacy pod&#8221; within Coinbase&#8217;s Layer 2 platform, Base, and will develop &#8220;privacy preserving primitives across Base.&#8221; The Iron Fish Layer 1 blockchain, which uses zero-knowledge cryptography to enable private transactions, &#8220;will remain independent and unaffiliated with Coinbase or Base,&#8221; <a href="https://www.coinbase.com/blog/Coinbase-acquires-team-to-accelerate-privacy-efforts-on-Base">according to Coinbase</a>.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.projectglitch.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Project Glitch is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em><strong>Follow us on <a href="https://twitter.com/projectglitch_">Twitter</a> and <a href="https://bsky.app/profile/projectglitch.bsky.social">Bluesky</a>&#8212;or get corporate with us on <a href="https://www.linkedin.com/company/project-glitch-journalism">LinkedIn</a>.</strong></em></p>]]></content:encoded></item></channel></rss>