I finished the second version of my book! ## The Praxeology of Privacy ### Economic Logic in Cypherpunk Implementation Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both traditions into a unified strategy for making the state irrelevant. Three axioms. Twenty-one chapters. One conclusion: cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Public Domain. v0.2.0. Published on Nostr. Thanks a lot to Stephan Kinsella and Eric Voskuil for their tough feedback on the first version, please join them in demolishing the logic of this second edition and help me make the arguments better! --- Table of Contents Preface Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant. View article → Part I: Introduction Chapter 1: The Nature of Privacy Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance. View article → Chapter 2: Two Traditions, One Conclusion Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions. View article → Part II: Philosophical Foundations Chapter 3: The Action Axiom The Action Axiom proves privacy is structural to human action. Deliberation is internal; preferences are subjective; information asymmetry is inherent. View article → Chapter 4: The Argumentation Axiom Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership. View article → Chapter 5: The Axiom of Resistance The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption. View article → Part III: Economic Foundations Chapter 6: Information, Scarcity, and Property Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property. View article → Chapter 7: Exchange Theory and Privacy Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets. View article → Chapter 8: Capital Theory and Entrepreneurship Privacy infrastructure is capital requiring present sacrifice for future capability. Entrepreneurial discovery drives innovation. Markets coordinate heterogeneous privacy tools most effectively. View article → Chapter 9: Monetary Theory and Sound Money Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools. View article → Part IV: The Adversary Chapter 10: Financial Surveillance and State Control Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable. View article → Chapter 11: Corporate Surveillance and Data Extraction Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand. View article → Chapter 12: The Crypto Wars The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying. View article → Part V: Technical Implementation Chapter 13: Cryptographic Foundations Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links. View article → Chapter 14: Anonymous Communication Networks The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model. View article → Chapter 15: Bitcoin: Resistance Money Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin. View article → Chapter 16: Zero-Knowledge Proofs Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing. View article → Chapter 17: Decentralized Social Infrastructure Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts. View article → Part VI: Praxis Chapter 18: Lessons from History DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives. View article → Chapter 19: Operational Security Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible. View article → Chapter 20: Implementation Strategy Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters. View article → Chapter 21: Building the Parallel Economy The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist. View article →

Replies (55)

Default avatar
Duvel 1 month ago
Wow, a whole book on a great topic written on Nostr. Congratulations! I'm going to read this.
Diyana's avatar
Diyana 1 month ago
I am like "I need someone to read this for me on audio... Or I'm gonna have to record myself reading it for others".... Just recorded myself reading chapter one (not without a couple hickups, and mostly in the way that helps my own comprehension). If I could figure out where to upload you can listen and let me know if I should record reading the rest. This is material highly relevant to what I am investigating and building... I'm adding another bridge to the equation @Max and would love to connect soon and share. I expect it to be an evolving body of work and protective sanctuary for all looking to participate in building the parallel societies. Here's a screenshot of a lil section of the document I just completed working on yesterday. View quoted note → image
No, I'll wait for some more review of the logic and keep fiddling with it for a bit before it goes in print & audio.
Often the shortest books are the best. Their ideas are sharp, distilled, and meant to be carried further.
₿Ñ's avatar
₿Ñ 1 month ago
Muchas gracias Max. Increíble
"Austrian economists theorize but cannot build. Cypherpunks build but lack theory." OBJECTION!
If you have the time, would be great to hear your feedback on the difference between v1 and v2. If you don't want to spend so much time, rather just start again with v2
merisoul's avatar
merisoul 1 month ago
I'm looking forward to seeing what this book has to say about the Austrian economist and #bitcoin. I stopped reading 'The Bitcoin Standard' halfway through, as I sensed some misinformation and found that it was written with a very narrow scope of thought. Moving on to the next source, to discover what insights it offers. 🤓 View quoted note →
I'm halfway through and will recommend your book to my family. Gibt es auch eine deutsche Ausgabe? I was thoroughly impressed by how accessible and comprehensible it is. The book genuinely closes knowledge gaps for me because it takes the reader by the hand and guides through the argumentative complexities without letting go. It explains both the side paths and the main roads clearly, making it obvious which path to take for clarity, all without pressure.
That's great to hear, thanks a lot! I was planning on translate the final version, still not 100% with it, so there will be another major version coming some when this year.
Huge congratulations on completing the second version of your masterpiece! Your approach of bridging the gap between economic theory and cypherpunk action is truly revolutionary. This kind of vision is exactly what we need to protect our freedom in this digital age. Thank you for your incredible contribution to the community! 🤝🫂📚📕
Rodrigo's avatar
Rodrigo 1 month ago
This is great, can't wait to read it. Well done 🙌
How do you tie responsibility into self-ownership? Self-ownership is not absolute liberation from relation.
“Part II: Philosophical Foundations Chapter 3: The Action Axiom The Action Axiom proves privacy is structural to human action.” what do you mean by “structural”? not sure what that term is doing. non-volentary disclosure is also structural to human action. So unless you are talking about the relation between the two, ur not talking about reality as it is, but rather how you imagine it. like talking about matter without form
“Deliberation is internal; preferences are subjective; information asymmetry is inherent.” Correct, but every action is still public. meaning it happens in reality, it contacts reality, ripples through. If the play is an attempt to make privacy prime, it’s DOA is it a necessary property, yes, but we can’t put the cart before the horse doing so invalidates the anthropology
#1. „Austrian economists theorize but cannot build.“ Needs nuance. Overlap is rare but does exist.