visit
“Cypher” alludes to encryption and cryptography, while “punks” talk about rebellious people. Rebellious people who use encryption and cryptography tools as shields and weapons: they’re the privacy activists known as Cypherpunks. Satoshi Nakamoto was one of them, but the founding members appeared long before. Judith Milhon, known as “St. Jude,” was the person who first suggested this name for the group. And made a lot of other things too.
Her first job as a programmer was at the Horn & Hardart vending machine company in New York. However, she soon relocated to Berkeley, California, as part of the counterculture movement. She was also employed by the Berkeley Computer Company (BCC), where she played a role in installing the communications controller for the BCC time-sharing system. This is a precursor of modern computing paradigms where resources are shared among many users, such as cloud computing and virtualization.
In 1971, just after divorcing her first husband and moving to San Francisco, Milhon teamed up with other community activists and technology enthusiasts at Project One, an
In 1973, a subgroup of individuals from the Resource One team, including Milhon, decided to split off and establish their own project. This initiative eventually became known as
All of this was before the massive creation and adoption of personal computers, and even before the release of the World Wide Web by Tim Berners Lee in 1989. Despite its humble beginnings, Community Memory laid the groundwork for modern online communication platforms. It fostered local community engagement, particularly among artists, and its legacy can be traced to the bulletin board services (BBS) and newsgroups that inspired the World Wide Web.
Her tenure at Mondo 2000, considered a precursor of the currently renowned Wired, further solidified her status as a voice of the cyber community. Serving as a senior editor, Milhon leveraged the platform to explore cutting-edge topics at the intersection of technology, society, and human consciousness. Her writings and editorials not only reflected the avant-garde spirit of the magazine but also contributed to shaping the discourse around emerging digital phenomena.
Beyond her editorial role, Milhon's influence as a cypherpunk underscored her commitment to individual freedoms in the digital age. She viewed hacking not just as a technical pursuit but as a form of resistance against oppressive systems, emphasizing the importance of circumventing imposed limitations. Just as she shared in her “
“Hacking is the clever circumvention of imposed limits, whether imposed by your government, your IP server, your own personality, or the laws of Physics (...) Hacking doesn't stop with computers. Every revolutionist is a hacker, hacking the social system. The nerd-heroic Wright brothers hacked bicycles before they started hacking airplanes (...) The hacker approach works for everything in life. At least, it will make you more likely to analyze the elements of your life. At best it will make you want to transform those elements like an alchemist.”
She also left behind several published books: How to Mutate & Take Over the World: An Exploded Post-Novel (1997), Cyberpunk Handbook: The Real Cyberpunk Fakebook (1995), and Hacking the Wetware: The NerdGirl’s Pillow Book (1994). She passed away in 2003, not without
As she and her teammates, the cypherpunks, knew very well, the best way to defend ourselves in this censored and monitored digital world is by using encrypted and decentralized technology to protect our privacy and freedom.
This platform stands out primarily due to its Directed Acyclic Graph (DAG) system. Unlike blockchain networks, which rely on linear chains of blocks and miners or “validators” who create them, Obyte's DAG architecture enables users to register their transactions themselves, without middlemen.
Read more from Cypherpunks Write Code series:
Featured Vector Image by Garry Killian /
Jude Milhon Photograph by