Second Crypto War
Crypto Basics

Second Crypto War

Created 4mo ago, last updated 4mo ago

Explore the history, key players and implications of the Second Crypto War in balancing privacy and government surveillance — and how it impacts the cryptocurrency space.

Second Crypto War

Table of Contents


The Second Crypto War, much like the First Crypto War, brought together a diverse cast of players: cryptography experts, privacy advocates, government agencies and tech companies. The conflict was about balancing the competing demands of individual privacy and government surveillance.

In this article, we'll delve into the history surrounding the Second Crypto War, explore its roots in the First Crypto War, the key players involved, and the implications for the cryptocurrency community.

Join us in showcasing the cryptocurrency revolution, one newsletter at a time. Subscribe now to get daily news and market updates right to your inbox, along with our millions of other subscribers (that’s right, millions love us!) — what are you waiting for?

The Roots of the Second Crypto War: Lessons From the First Crypto War

The First Crypto War took place in the 1990s and erupted in the early days of the internet as governments and privacy advocates fought for control over encryption technologies. It laid the foundation for the application of decentralized cryptographic technologies in the creation of digital currencies. The lasting influence of the First Crypto War can be seen even today:
  • The development of Bitcoin: Bitcoin was created as a direct response to the centralization of financial systems and the perceived lack of privacy and control over one's funds. Its creation aligned with the principles of the First Crypto War: facilitating private, secure transactions and financial sovereignty for its users.
  • The growing importance of privacy-focused cryptocurrencies: Privacy-enhancing cryptocurrencies like Monero and Zcash emerged as another extension of the battle for digital privacy rights.
  • Decentralized cryptographic technologies: Technological advancements like the invention of the proof-of-work mechanism were inspired by the development of decentralized technologies during the First Crypto War.

The Emergence of the Second Crypto War

The Second Crypto War was ignited by several significant events, which served as catalysts for a renewed global debate over encryption, privacy and security.

In 2013, Edward Snowden, a former NSA contractor and whistleblower, revealed that the US government engaged in extensive mass surveillance — collecting metadata and other information from millions of citizens worldwide. Snowden's disclosures ignited public debates on privacy rights, government access and encryption.

Another crucial development in the Second Crypto War was the widespread shift towards end-to-end encryption in communication platforms. Prominent examples include:

  • WhatsApp (2014): WhatsApp introduced end-to-end encryption in 2014, which became fully implemented in 2016, ensuring that message content is only accessible to the sender and receiver.
  • Signal (2013): Signal was launched in 2013 as an encrypted messaging app with a focus on privacy and security features.
  • Apple's iMessage (2011): Apple introduced iMessage in 2011, and with the release of iOS 8 in 2014, the messaging app became end-to-end encrypted by default.

The Second Crypto War was a broader, more comprehensive conflict than its predecessor. For instance, during the First Crypto War in the 1990s, the debate primarily revolved around the distribution and exportation of specific encryption technologies (like PGP, first released in 1991).

In contrast, the Second Crypto War discusses the broader adoption of encryption throughout the digital landscape. It  was more global in its scope — key players were governments and their agencies (NSA), tech companies and privacy advocates. With the internet and digital technologies increasingly integrating into daily life worldwide, the impact and implications of the Second Crypto War extended far beyond a single nation or region. Moreover, digital infrastructure and technology are expanding rapidly. As technology continues to innovate and spread, so does the use of encryption and privacy tools.

Key Issues in the Second Crypto War

One of the critical issues in the Second Crypto War is the debate over end-to-end encryption. It enables secure communication between users by ensuring that only the sender and receiver can decrypt the message content. While this technology protects user privacy and data confidentiality, it also raises concerns among law enforcement and government agencies who argue it hinders their ability to combat crime and terrorism. As a result, some governments have called for the creation of "backdoors" to permit access to encrypted data in specific circumstances. Notable examples include:
  • The US "Clipper Chip" proposal (1993): This was an early attempt by the US government to create a system where communication could be encrypted but with a "backdoor" for law enforcement to decrypt messages using a legal process. However, the proposal faced strong opposition and was eventually abandoned due to technical vulnerabilities and public backlash.
  • The UK Investigatory Powers Act (2016): Also known as the "Snooper's Charter," this legislation granted UK law enforcement and intelligence agencies the ability to access user communication metadata and, in some cases, require the removal of electronic protection applied by a company or individual.

The Apple vs. FBI Case (2016)

A high-profile legal battle illustrating the debate around encryption and government access is the 2016 Apple vs. FBI case. In the aftermath of the San Bernardino terrorist attack, the FBI sought Apple's assistance in unlocking an iPhone belonging to one of the deceased perpetrators. Apple refused, arguing that creating a software "backdoor" would undermine the security of its devices and set a dangerous precedent. After a protracted standoff, the FBI eventually gained access to the device using a third-party tool, abandoning its legal efforts against Apple.
The Apple vs FBI case made the issue of encryption and government access to headline news. It prompted widespread public discourse on the balance between privacy rights, security and law enforcement needs. The case further intensified the ongoing conflict between technology companies and government agencies, with both sides doubling down on their positions surrounding encryption and backdoor access.

Encryption, Terrorism and Legislative Responses

The rise of global terrorism brought on new challenges, with extremist groups using encrypted communication platforms to plan and execute attacks covertly. This prompted governments to consider implementing legislative responses to address the potential threat posed by encryption. For example:

  • The Australian Assistance and Access Act (2018): This law grants Australian law enforcement the power to compel companies to provide technical assistance to access encrypted communications, if necessary. Many critics argue this legislation sets a dangerous precedent and poses potential risks to digital security and privacy.
  • The US EARN IT Act (2020-ongoing): The Eliminating Abusive and Rampant Neglect of Interactive Technologies (EARN IT) Act aims to hold companies accountable for user-generated content that promotes child exploitation. However, critics argue it poses a threat to online privacy and freedom of speech. They argue that the bill would weaken encryption standards and could lead to government overreach and censorship. Critics also argue that the bill's focus on child sexual exploitation is a pretext for undermining online privacy and security.

These examples and issues demonstrate the complexity of the Second Crypto War. As encryption technology continues to evolve and global security threats persist, the debate over encryption and its regulation will undoubtedly remain a significant challenge in the coming years.

Differing Perspectives and Stakeholders

The Second Crypto War encompasses various stakeholders, each with differing priorities and objectives.

These stakeholders have competing interests, leading to a dynamic landscape of perspectives and conflict:

  • Governments aim to protect national security and ensure public safety. National and international agencies like the United States' FBI and the UK's Government Communications Headquarters (GCHQ), focused on maintaining national security and combating crime and terrorism.
  • Tech Companies, like Apple, Google and Microsoft, often outwardly prioritize user privacy and security to maintain trust and market competitiveness. Apple denied the FBI's request to create a backdoor into the iPhone, arguing that it would weaken overall security and compromise the product's integrity.
  • Privacy advocates groups, like the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU), argue that weakening encryption or allowing government access to encrypted data constitutes an infringement on civil liberties and individual privacy rights.
  • Public users of encrypted technologies have an interest in balancing privacy and their governments' ability to protect citizens from harm. For example, the 2013 surveillance revelations involving the NSA and whistleblower Edward Snowden shifted public opinion towards valuing privacy and questioning government surveillance practices.

The conflicting views and interests of these stakeholders shape policy, regulation and public opinion. Finding a balance is no easy feat.

The Impact on Cryptocurrencies and the Blockchain Community

The Second Crypto War has direct implications for the world of cryptocurrencies and the blockchain community. The core principles of encryption — providing privacy, security and trust — resonate with the foundational objectives of decentralized digital currencies.

For example, prominent cryptocurrencies such as Bitcoin, Monero and Zcash utilize cryptographic techniques to achieve these goals:

  • Bitcoin: Encryption in Bitcoin secures wallet addresses and private keys, allowing for the safe storage and transfer of funds as well as confirmation of ownership.
  • Monero: With stronger privacy features than Bitcoin, Monero utilizes ring signatures and stealth addresses to obfuscate transaction details, enhancing user anonymity and security.
  • Zcash: Zcash offers selective transparency employing zero-knowledge proofs, enabling users to prove transaction authenticity without revealing personal information.

The Second Crypto War also affects the debate about government access and encryption regulation:

  • Regulatory challenges: Privacy-focused cryptocurrencies may face regulatory hurdles and increased scrutiny due to their potential use in illicit activities, such as money laundering or funding terrorism.
  • Hindered development: Increasingly restrictive legislation could hinder the development of privacy-enhancing features in existing digital currencies or delay the introduction of new privacy-oriented cryptocurrencies.
  • Adoption barriers: Public perception of privacy-focused cryptocurrencies and potential regulation might affect user willingness to adopt these digital currencies, either due to confusion or fear of potential legal repercussions.

The outcome will shape the future of cryptocurrencies and the broader blockchain community, with particular implications for privacy-focused digital currencies.

Current Status and Future Implications

The Second Crypto War remains ongoing. The United States, Australia and the European Union have all recently proposed or implemented encryption-regulating legislation, sparking further discussions on the global stage. Additionally, recent developments in privacy-preserving technologies, such as homomorphic encryption and secure multiparty computation, have further contributed to the discourse of privacy and data security challenges.
Various scenarios could influence the future of encryption, privacy rights and government surveillance. For example, a compromise between stakeholders could be reached, aiming for a balanced approach that considers government needs without undermining encryption technologies or privacy rights. This could possibly involve the development of new technologies or legal frameworks that meet both privacy and security concerns.
On the other hand, strict government regulations might impose limitations or backdoors in encryption technologies, potentially weakening privacy rights and driving consumers and businesses towards unregulated technologies to maintain privacy and security.

In conclusion, the Second Crypto War's ultimate outcome will significantly affect the future of encryption, privacy rights, government surveillance and the cryptocurrency landscape. The various stakeholders' influence and intertwined interests will continue to shape policies, technologies and public opinions on this crucial topic.

This article contains links to third-party websites or other content for information purposes only (“Third-Party Sites”). The Third-Party Sites are not under the control of CoinMarketCap, and CoinMarketCap is not responsible for the content of any Third-Party Site, including without limitation any link contained in a Third-Party Site, or any changes or updates to a Third-Party Site. CoinMarketCap is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement, approval or recommendation by CoinMarketCap of the site or any association with its operators. This article is intended to be used and must be used for informational purposes only. It is important to do your own research and analysis before making any material decisions related to any of the products or services described. This article is not intended as, and shall not be construed as, financial advice. The views and opinions expressed in this article are the author’s [company’s] own and do not necessarily reflect those of CoinMarketCap.
2 people liked this article