Emphasis on the word possibility; as Sarah Smith notes, even cypherpunks recognize the impossibility of absolute anonymity. For a range of discussion on the complexities of defending anonymity within maintaining security (against terrorism e.g.), see Sarah E. Smith, "Threading the First Amendment Needle: Anonymous Speech, Online Harassment, and Washington's Cyberstalking Statute", Washington Law Review 93/3 (Oct. 2018): 1563-1608; Julian Assange, Jacob Appelbaum, Andy Muller-Maguhn, and Jérémie Zimmermann, Cypherpunks: Freedom and the Future of the Internet (OR Books, 2012/2016). ISBN978-1-939293-00-8, Ebook ISBN978-1-939293-01-5; Dennis Bailey, The Open Society Paradox : Why the 21st Century Calls for More Openness — Not Less (Dulles VA: Potomac, 2004), 28-29; and Eric Hughes <hughes@soda.berkeley.edu>, "A Cypherpunk's Manifesto" (9 March 1993): https://www.activism.net/cypherpunk/manifesto.htmlArchived 2021-03-24 at the Wayback Machine
Matt Blaze (1994), "Protocol failure in the escrowed encryption standard", Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94, pp. 59–67, doi:10.1145/191177.191193, ISBN0897917324, S2CID14602435
Grigg, Ian (2001). "Financial Cryptography in 7 Layers". In Frankel, Yair (ed.). Financial Cryptography. 4th International Conference on Financial Cryptography, FC 2000 Anguilla, British West Indies, February 20–24, 2000. Lecture Notes in Computer Science. Vol. 1962. Berlin, Heidelberg: Springer. pp. 332–348. doi:10.1007/3-540-45472-1_23. ISBN978-3-540-45472-4. Archived from the original on 2020-10-26. Retrieved 2020-10-23.
eff.org
"Jillian York". Electronic Frontier Foundation. 2011-10-07. Archived from the original on 2021-04-11. Retrieved 2014-09-23.
Zurko, Marie Ellen (1998-10-07). "Crypto policy costs the US a citizen". Electronic CIPHER: Newsletter of the IEEE Computer Society's TC on Security and Privacy. No. 29. Archived from the original on 2017-01-12. Retrieved 2013-10-11.
ifca.ai
"IFCA". Ifca.ai. Archived from the original on 2021-03-20. Retrieved 2013-11-20.
Matt Blaze (1994), "Protocol failure in the escrowed encryption standard", Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94, pp. 59–67, doi:10.1145/191177.191193, ISBN0897917324, S2CID14602435
springer.com
link.springer.com
Grigg, Ian (2001). "Financial Cryptography in 7 Layers". In Frankel, Yair (ed.). Financial Cryptography. 4th International Conference on Financial Cryptography, FC 2000 Anguilla, British West Indies, February 20–24, 2000. Lecture Notes in Computer Science. Vol. 1962. Berlin, Heidelberg: Springer. pp. 332–348. doi:10.1007/3-540-45472-1_23. ISBN978-3-540-45472-4. Archived from the original on 2020-10-26. Retrieved 2020-10-23.
John Gilmore, home page, archived from the original on 2010-04-27, retrieved 2010-08-15
Emphasis on the word possibility; as Sarah Smith notes, even cypherpunks recognize the impossibility of absolute anonymity. For a range of discussion on the complexities of defending anonymity within maintaining security (against terrorism e.g.), see Sarah E. Smith, "Threading the First Amendment Needle: Anonymous Speech, Online Harassment, and Washington's Cyberstalking Statute", Washington Law Review 93/3 (Oct. 2018): 1563-1608; Julian Assange, Jacob Appelbaum, Andy Muller-Maguhn, and Jérémie Zimmermann, Cypherpunks: Freedom and the Future of the Internet (OR Books, 2012/2016). ISBN978-1-939293-00-8, Ebook ISBN978-1-939293-01-5; Dennis Bailey, The Open Society Paradox : Why the 21st Century Calls for More Openness — Not Less (Dulles VA: Potomac, 2004), 28-29; and Eric Hughes <hughes@soda.berkeley.edu>, "A Cypherpunk's Manifesto" (9 March 1993): https://www.activism.net/cypherpunk/manifesto.htmlArchived 2021-03-24 at the Wayback Machine
"Yahoo! Groups". groups.yahoo.com. 2002-10-31. Archived from the original on 2019-02-25. Retrieved 2019-02-25.
Zurko, Marie Ellen (1998-10-07). "Crypto policy costs the US a citizen". Electronic CIPHER: Newsletter of the IEEE Computer Society's TC on Security and Privacy. No. 29. Archived from the original on 2017-01-12. Retrieved 2013-10-11.
Grigg, Ian (2001). "Financial Cryptography in 7 Layers". In Frankel, Yair (ed.). Financial Cryptography. 4th International Conference on Financial Cryptography, FC 2000 Anguilla, British West Indies, February 20–24, 2000. Lecture Notes in Computer Science. Vol. 1962. Berlin, Heidelberg: Springer. pp. 332–348. doi:10.1007/3-540-45472-1_23. ISBN978-3-540-45472-4. Archived from the original on 2020-10-26. Retrieved 2020-10-23.
"IFCA". Ifca.ai. Archived from the original on 2021-03-20. Retrieved 2013-11-20.
"Jillian York". Electronic Frontier Foundation. 2011-10-07. Archived from the original on 2021-04-11. Retrieved 2014-09-23.
wired.com
Levy, Steven (May 1993). "Crypto Rebels". Wired. Archived from the original on 2014-03-01. Retrieved 2017-03-06.