{"id":14,"date":"2022-05-09T16:02:19","date_gmt":"2022-05-09T21:02:19","guid":{"rendered":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/?page_id=14"},"modified":"2023-02-02T09:36:50","modified_gmt":"2023-02-02T15:36:50","slug":"crypto-and-cypherpunk-ethics","status":"publish","type":"page","link":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/teaching-modules\/crypto-and-cypherpunk-ethics\/","title":{"rendered":"Crypto and Cypherpunk Ethics"},"content":{"rendered":"<div class=\"row\">\n<div class=\"entry-content large-12 columns\">\n<p class=\"intro\">In the early-1990s, the cypherpunks emerged as a grassroots movement criticizing the emerging government mass surveillance made possible by the computer revolution and advocating for the widespread use of digital encryption as the best means for individuals to protect their personal privacy from such surveillance.<\/p>\n<p class=\"intro\">This module draws upon cypherpunk and cypherpunk-related ethical analyses of cryptography to explore the ongoing debates involving personal privacy, national security, system\/device security and the meaning of an open society. Through reading, discussion and small group work, students will develop conceptual and practical knowledge about the ethics of cryptography.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-content\/uploads\/sites\/141\/2022\/05\/Crypto-and-Cypherpunk-Ethics-Module-Overview.docx\" target=\"_blank\" rel=\"noreferrer noopener\">Overview<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-content\/uploads\/sites\/141\/2022\/05\/Crypto-and-Cypherpunk-Ethics-Instructor-Guide.docx\" target=\"_blank\" rel=\"noreferrer noopener\">Instructor Guide<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-content\/uploads\/sites\/141\/2022\/05\/Crypto-and-Cypherpunk-Ethics-Instructor-Slides.pptx\" target=\"_blank\" rel=\"noreferrer noopener\">Instructor Slides<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-content\/uploads\/sites\/141\/2022\/05\/Crypto-and-Cypherpunk-Ethics-Student-Handout-Lesson-A-Reading-Questions.docx\" target=\"_blank\" rel=\"noreferrer noopener\">Student Handout, Lesson A<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-content\/uploads\/sites\/141\/2022\/05\/Crypto-and-Cypherpunk-Ethics-Student-Handout-Lesson-B-Reading-Questions.docx\" target=\"_blank\" rel=\"noreferrer noopener\">Student Handout, Lesson B<\/a><\/li>\n<\/ul>\n<hr class=\"wp-block-separator\">\n<p class=\"has-small-font-size\">These materials were developed by Patrick Anderson as part of the Mozilla Foundation Responsible Computer Science Challenge. These works are licensed under a <a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License<i title=\"External link\" class=\"bsu-icon bsu-icon-external-link small ms-1\"><\/i><\/a>.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the early-1990s, the cypherpunks emerged as a grassroots movement criticizing the emerging government mass surveillance made possible by the computer revolution and advocating for the widespread use of digital encryption as the best means for individuals to protect their personal privacy from such surveillance. This module draws upon cypherpunk and cypherpunk-related ethical analyses of [&hellip;]<\/p>\n","protected":false},"author":33,"featured_media":0,"parent":3,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":4,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":227,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/14\/revisions\/227"}],"up":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/3"}],"wp:attachment":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}