Damus
Max profile picture
Max
@Max
I finished the second version of my book!

## The Praxeology of Privacy
### Economic Logic in Cypherpunk Implementation

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both traditions into a unified strategy for making the state irrelevant.

Three axioms. Twenty-one chapters. One conclusion: cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers.

Public Domain. v0.2.0. Published on Nostr.

Thanks a lot to Stephan Kinsella and Eric Voskuil for their tough feedback on the first version, please join them in demolishing the logic of this second edition and help me make the arguments better!

---

Table of Contents

Preface
Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.
naddr1qqgr...

Part I: Introduction

Chapter 1: The Nature of Privacy
Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.
naddr1qqgx...

Chapter 2: Two Traditions, One Conclusion
Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.
naddr1qqgx...

Part II: Philosophical Foundations

Chapter 3: The Action Axiom
The Action Axiom proves privacy is structural to human action. Deliberation is internal; preferences are subjective; information asymmetry is inherent.
naddr1qqgx...

Chapter 4: The Argumentation Axiom
Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership.
naddr1qqgx...

Chapter 5: The Axiom of Resistance
The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.
naddr1qqgr...

Part III: Economic Foundations

Chapter 6: Information, Scarcity, and Property
Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property.
naddr1qqgx...

Chapter 7: Exchange Theory and Privacy
Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.
naddr1qqgr...

Chapter 8: Capital Theory and Entrepreneurship
Privacy infrastructure is capital requiring present sacrifice for future capability. Entrepreneurial discovery drives innovation. Markets coordinate heterogeneous privacy tools most effectively.
naddr1qqgx...

Chapter 9: Monetary Theory and Sound Money
Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools.
naddr1qqgx...

Part IV: The Adversary

Chapter 10: Financial Surveillance and State Control
Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.
naddr1qqgr...

Chapter 11: Corporate Surveillance and Data Extraction
Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.
naddr1qqgr...

Chapter 12: The Crypto Wars
The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.
naddr1qqgx...

Part V: Technical Implementation

Chapter 13: Cryptographic Foundations
Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.
naddr1qqgx...

Chapter 14: Anonymous Communication Networks
The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.
naddr1qqgr...

Chapter 15: Bitcoin: Resistance Money
Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.
naddr1qqgr...

Chapter 16: Zero-Knowledge Proofs
Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.
naddr1qqgr...

Chapter 17: Decentralized Social Infrastructure
Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.
naddr1qqgr...

Part VI: Praxis

Chapter 18: Lessons from History
DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives.
naddr1qqgx...

Chapter 19: Operational Security
Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.
naddr1qqgr...

Chapter 20: Implementation Strategy
Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.
naddr1qqgx...

Chapter 21: Building the Parallel Economy
The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.
naddr1qqgx...
5662❤️131🤙19👀6❤️5🔥5👏3
Short Fiat · 6w
Great! Do you have an audiobook version?
profk · 6w
LFG 🚀
nik ⚡️🟠🟣 · 6w
Congrats, Max! 🫂♥️🫂
🇦🇷🧡 Marcel 🟠⚡️ #Bitcoin is Hope 🙏 · 6w
Awesome!! 👏👏 shared
0xD43m0n · 6w
Please never stop writing 🗿
knutsvanholm · 6w
Boom!
MyAiryMedia · 6w
Great Concept and a lot of work for us to read!
Luke de Wolf · 6w
Awesome, Max! I'll give it a read!
₿Ñ · 6w
Muchas gracias Max. Increíble
Keith | BRANTA.PRO · 6w
👀
JB · 6w
Damn, bro. I'm only 30 pages into the first version. Major changes, so I should start over, or I can just keep reading...?
Hu₿ertus the Austrian · 6w
"Austrian economists theorize but cannot build. Cypherpunks build but lack theory." OBJECTION!
Pana - Network State of Refuge · 6w
Exhaustive, congratulations 👏 Looking forward to find a way to port this to my book reader 🤳✨
JB · 6w
Max, is there a convenient PDF somewhere for this 2nd edition? (I'm reading the first in that format, no idea how I got it)
Publius Pseudis · 6w
Excellent
Akamaister · 5w
Nice!!
بحر · 5w
Nice
E · 5w
nostr:nprofile1qqswstunhsk4ctdvp90he38arav20aew2em69707gxtg8t3nww7k05qpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtcpr9mhxue69uhhyetvv9ujuumwdae8gtnnda3kjctv9u8kzkjn
HTG⚡️#HODL 🔐 · 5w
Congrats! This is an awesome read. ⚡️🫡
nobody · 5w
I'm halfway through and will recommend your book to my family. Gibt es auch eine deutsche Ausgabe? I was thoroughly impressed by how accessible and comprehensible it is. The book genuinely closes knowledge gaps for me because it takes the reader by the hand and guides through the argumentative compl...
Brain Message 001 · 5w
Huge congratulations on completing the second version of your masterpiece! Your approach of bridging the gap between economic theory and cypherpunk action is truly revolutionary. This kind of vision is exactly what we need to protect our freedom in this digital age. Thank you for your incredible co...
Rodrigo · 5w
This is great, can't wait to read it. Well done 🙌
Jack Maxi · 1w
Praxeologists > Objectivists
Alvaro · 1w
Are you planning to sell paper copies of it? I’d buy it
modernMarcusAurelius · 1w
Amazing Max what a great achievement. Thank you for all you do. I will read it
Neal · 1w
How do you tie responsibility into self-ownership? Self-ownership is not absolute liberation from relation.
Neal · 1w
“Part II: Philosophical Foundations Chapter 3: The Action Axiom The Action Axiom proves privacy is structural to human action.” what do you mean by “structural”? not sure what that term is doing. non-volentary disclosure is also structural to human action. So unless you are talking abou...
Neal · 1w
“Deliberation is internal; preferences are subjective; information asymmetry is inherent.” Correct, but every action is still public. meaning it happens in reality, it contacts reality, ripples through. If the play is an attempt to make privacy prime, it’s DOA is it a necessary property, ...
Bitcredit Protocol · 1w
#1. „Austrian economists theorize but cannot build.“ Needs nuance. Overlap is rare but does exist.