True Names1 is really a story about AI, but most people in the bitcoin/cypherpunk space have probably heard about it because of how Vinge describes nyms and the consequences of having your nym2 connected to your legal name. This horrible fate is exactly what happens to Mr Slippery.
They had discovered Mr Slippery's True Name and it was Roger Andrew Pollack TIN/SSAN 0959-34-2861, and no amount of evasion, tricky programming, or robot sources could ever again protect him from them.
Mr Slippery is a hacker and a member of a collective of other hackers called the Warlocks. Hacking in True Names is way cooler than real life because Vinge imagined the internet as an immersive virtual experience more like being in the Matrix than typing on a keyboard. But instead of some slick simulation of the 1990s, Mr Slippery and friends wander around swamps and mountains full of sprites and other virtual monsters and their coven meets in a castle defended by a very robust firewall program called Alan.3 Instead of keying in commands, they speak spells that bend the fabric of cyberspace.4
The dynamics of nyms are front and center. Can you trust your cyber-friends? Probably not. If they discover your true name, they basically own you. Vinge calls it becoming a thrall. It doesn't sound pleasant. The Warlocks are all in an uneasy soft war with each other, cooperating against their enemies,5 but also willing to take a shot at a fellow Warlock should the opportunity arise.
Writing in 1979, Vinge even describes the beginning of the dead internet theory: Mr Slippery is quite sure he won't be fooled if his online friends are replaced by some other entity--or even if they are a program themselves--that little sprite you saw in the meadow could turn out to be a horrific, hardware damaging virus, but Mr Slippery thinks he knows how to tell the difference.
But do you think you could ever be fooled? Frankly, no. If you talk to one of those things long enough, they display a repetitiveness, an inflexibility that's a giveaway.
Enter the Mailman: a mysterious new hacker who never shows himself even in cyberspace. He joins up with the Warlocks and quickly astounds them with his abilities. But pretty soon it starts to seem like the Great Enemy isn't his only target and several members of the Warlocks quickly become his thralls. But the Mailman's aspirations are far greater than defeating a few hackers; he's got his eye on global domination.
Remember how we began with Mr Slippery getting doxxed? It was the Great Enemy that found his true name. And throughout all the ensuing excitement, we are constantly reminded that the government knows where he lives and will kill him if he steps out of line. Messy cyber warfare ensues.

Footnotes

  1. True Names is expensive on Amazon and other booksellers. And my local libraries didn't have a copy. But I was able to track it down on archive.org where you can borrow a digital copy.
  2. If you haven't started using a nym yet, you really ought to think about it.
  3. Yup, another Turing reference. It isn't cyberpunk if it doesn't mention Turing.
  4. One of the best parts of True Names is how Vinge describes the difference between this fantastical way of interacting with computers almost by analogy and the more logical--and entirely less effective--manner used by the government. When I was younger and full of exciting thoughts, I liked to believe that arguing by analogy was the great alternative to logic (a lot like analog and digital are the two main ways of representing a signal: one is fuzzy and full of gradients while the other is crisp and black and white). It's like using leverage in finance: when you say XX is like YY, it let's you jump past a lot of reasoning and simply see a new understanding--but the implication of just such an analogy is that you can get totally wrecked thinking this way, too. The Warlocks use analogy programming and are very powerful.
  5. I definitely appreciated how all the hackers call the government 'the Great Enemy.'
Classic. This collection of essays around the story was one of the things that got me really excited about all the stuff going on around the internet, long ago. Includes one by Tim May for heavy cypherpunk energy.
reply
I'll have to give those a read (especially since it has Tim May in it). Thanks for pointing it out!
reply
144 sats \ 0 replies \ @siggy47 2 Feb
This post and @elvismercury's link gave me some homework. I never heard of True Names, but it sounds like I'll have fun exploring and learning. Thanks
reply
Great review (and footnotes!).
The Warlocks use analogy programming and are very powerful.
This seems worth buying the book.
reply
It gets vaguely referred to very often in bitcoin circles, so it's good to know what people are talking about. Also: it's a pretty fun read!
reply
Started reading this but got distracted. Maybe worth another shot. Thanks for the review.
reply
It's pretty short. You could probably read it in one sitting.
reply
It is! Have it on Kindle and must've gotten it confused for an entire book. Another reason why I prefer physical copies.
reply
I’ve read a few Vinge pieces, novels and shorter forms. I really loved ‘Across Realtime’.
reply
The only other Vinge book I've read is A Fire Upon the Deep--which was excellent. It makes True Names feel a little amateurish.
reply
40 sats \ 1 reply \ @bitdern 2 Feb
for anyone coming across this poast that has not read True Names yet: absolutely buy this book IMMEDIATELY.
very very fun read, you can crush it in a morning or two.
reply
Yes, it's not a super long story, less than 100pp. Also, you can borrow it for free on archive.org (see link in footnote 1)
reply
It can be extremely painful to lose access to bitcoins, especially given their high potential value. Comprehending the significance of dependable and secure Bitcoin recovery methods to avert irreversible loss is crucial. By having effective recovery mechanisms in place, individuals can regain access to their funds, maintaining confidence in Bitcoin and the overall blockchain technology. Advanced software tools specifically designed for Bitcoin recovery play a critical role in the retrieval process. These tools utilize advanced algorithms and techniques to analyze blockchain data, encrypted wallets, and other relevant information to recover lost bitcoins. Muyern Trust Hacker is a trusted and reliable solution for recovering lost bitcoins. With their team of expert professionals and advanced software tools, they specialize in retrieving inaccessible funds from various situations. Once the lost bitcoins have been successfully recovered, Muyern Trust Hacker doesn't stop there. They understand the importance of verification and security in the process. The team thoroughly verifies the recovered bitcoins to ensure their authenticity and completeness. Once verified, the recovered bitcoins are securely transferred to your designated wallet, bringing your lost wealth back into your hands. Telegram: ( at ) muyerntrusthacker Regards