
Ethereum Privacy Ecosystem mapping

Web3Privacy Awards 2025: Projects Category Longlist
The Privacy Awards are back for 2025 — and what an extraordinary year it has been for privacy innovation.

The Neo-Cypherpunk Era begins now
Carrying the torch from the first generation into a new wave of internet liberation.

Ethereum Privacy Ecosystem mapping

Web3Privacy Awards 2025: Projects Category Longlist
The Privacy Awards are back for 2025 — and what an extraordinary year it has been for privacy innovation.

The Neo-Cypherpunk Era begins now
Carrying the torch from the first generation into a new wave of internet liberation.
Subscribe to Week in Privacy
Subscribe to Week in Privacy
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers


With growing regulatory pressures, centralised control over communication and financial systems, and the rapid evolution of AI and surveillance technologies, we are at a crossroads.

The coming years represent one of our last windows to build and use secure and privacy-preserving technologies before the current paradigm solidifies for a decade or more. The challenge is clear: secure global communications cannot depend on incremental adoption by existing systems. We need a fundamental shift in internet infrastructure, developed and deployed by builders who prioritize privacy and censorship resistance at the protocol level.
This led Web3Privacy Now and Protocol Labs to bring together leading builders, researchers, and advocates working across privacy infrastructure to identify the most pressing challenges, define the most impactful levers of influence, and double down on efforts to address them. Discussions and reflections from the gathering were later documented and shared across the ecosystem, including participant reports and ecosystem summaries such as Threads from the Cypherpunk Retreat and community reflections shared by participants and partner organizations Web3Privacy and Protocol Labs.

The Cypherpunk Retreat was an invite-only, hands-on gathering that brought together leading builders and front-line organizers in digital privacy. Designed to foster deep collaboration and activate field-building, the retreat focused on aligning technical roadmaps, driving coordination, and accelerating the development of a more private and resilient internet.
Over the course of 40+ sessions, change makers from different realms came together to co-create tangible solutions.
The outcomes of these interactions are poised to resonate well beyond the retreat: through new partnerships, shared standards, joint projects, and a strengthened foundation for long-term collaboration.
100 active participants from across human rights orgs, web3 protocols, ranging from privacy-focused Brave, through universities like Oxford and Harvard, Ethereum Foundation and all the way to people from Internet Archive and Tor.

The Cypherpunk Retreat brought together a diverse group spanning academia, protocol development, privacy engineering, and digital rights advocacy. Researchers such as Fazl Barez (Oxford University) joined protocol builders including Juan Benet (Protocol Labs), Sebastian Bürgel (Gnosis), and Theo Beutel (Ethereum Foundation) to exchange ideas on decentralized infrastructure and privacy-preserving systems. Privacy engineers and ecosystem builders such as Amit Chaudhary (Veilnyx), Juan Caballero (


The objective of the retreat’s participatory programming format was to create space for actionable connection and alliances between the experts and leaders present at the retreat.

This was conducted by submission of workshop session proposals ahead of the retreat, as well as on whiteboards during the first evening. These were ranked for interest with dot-voting, surfacing which topics to cover and clustering these into groups.
Over the course of the second and third days of the retreat, participants broke into small groups and covered a total of 32 sessions, of an hour each.

Take a look at short video shot at Cypherpunk Retreat, highlighting the importance of people collaborating


Discussions in this category examined how decentralized communication systems can remain secure, private, and resilient in environments where censorship and surveillance are increasingly common. Participants analyzed the structural limitations of existing anonymity and messaging networks, including the trade-offs between latency, usability, and strong privacy guarantees. Systems such as Tor, mixnets, and peer-to-peer overlays were discussed alongside real-world examples of governments blocking privacy-preserving communication tools.
The workshops also explored emerging cryptographic approaches that could enable verifiable and censorship-resistant information infrastructure. Concepts such as remote-attested TLS and zkTLS were discussed as ways to allow users to verify the authenticity of web content without relying on centralized trust assumptions. Participants examined architectures where verified servers could download, sign, and redistribute websites, enabling peer-to-peer sharing of cached content in censored environments. Discussions also explored emerging tools for censorship-resistant publishing such as Onion Press and related work on privacy-preserving information access through the Private Retrieval Fund initiative.

Workshops in this category explored how decentralized identity systems can enable users to maintain control over their digital identity and data. Participants examined architectures built around decentralized identifiers (DIDs) and personal data servers, where users manage their identity through cryptographic keys while storing and controlling their data independently from centralized platforms. These systems rely on verifiable data structures that allow identities and content to move across applications while maintaining integrity and provenance.
The discussions also addressed governance and moderation challenges within decentralized ecosystems. Participants explored layered moderation models involving relays, annotation layers, and proxies that allow communities to shape norms without centralizing control over user data. Interoperability and testing frameworks were highlighted as critical components for enabling decentralized identity systems to operate across platforms and regulatory environments. Related discussions around decentralized messaging and identity infrastructure were reflected in initiatives such as the Germ Cypherpunk Fellowship supporting open-source development of Messaging Layer Security (MLS).

This category focused on how privacy-preserving technologies can enable secure data processing and financial transactions without exposing sensitive information. Participants compared several approaches to confidential computation, including trusted execution environments, multi-party computation, fully homomorphic encryption, zero-knowledge proofs, and differential privacy. While each technique offers valuable protections, discussions emphasized that no single method currently provides complete confidentiality on its own.
The workshops highlighted the need for systems that provide end-to-end confidentiality across both data storage and computation layers. Participants examined mechanisms such as attestations and verification frameworks that could allow systems to prove that sensitive computations were performed securely and privately. Discussions also highlighted emerging coordination mechanisms supporting research and development in privacy infrastructure, including initiatives such as the Private Retrieval Fund.


Participants explored how decentralized technologies can operate in environments where internet connectivity, electricity, or access to global infrastructure cannot be assumed. Workshops examined systems designed for fragile communities where connectivity is intermittent or censored, emphasizing tools capable of operating offline or through delayed synchronization.
Examples included systems combining hardware wallets with Chaumian e-cash protocols to enable offline transactions within local communities. Local mints can maintain community ledgers that later synchronize with blockchain infrastructure once connectivity is restored. Participants also discussed grassroots communication technologies such as mesh networks, Bluetooth messaging, and radio-based systems that allow peer-to-peer interaction without relying on centralized internet infrastructure. Experimental infrastructure projects such as Onion Press were discussed as examples of how decentralized tools could enable censorship-resistant hosting and distribution of information.

Beyond technical infrastructure, the retreat also addressed the broader political and social context in which decentralized technologies operate. Participants explored how democratic decision-making can adapt to a digital environment marked by declining trust in institutions and increasing political polarization. Discussions examined whether civic participation systems should rely on verified identity or whether anonymity can coexist with legitimate governance processes.
Case studies from countries experimenting with digital civic participation were discussed to illustrate how technology might support more inclusive and participatory governance. However, participants emphasized that technology alone cannot restore democratic processes; effective systems must also support deliberation, debate, and collective decision-making within communities. A broader overview of these discussions and emerging collaborations is documented in the Protocol Labs recap of the Cypherpunk Retreat.

Participants from Tor, Nym, Taceo, Web3Privacy now, Mask brainstorming
Interop Alignment
Protocol teams compared architectures and approaches across communication, identity, and privacy infrastructure.
These discussions clarified shared assumptions and surfaced opportunities for interoperability and coordination across projects.
New Workstreams Identified
Workshops revealed high-leverage technical gaps across confidential compute, decentralized identity, and censorship-resistant infrastructure.

Participants mapped these gaps into potential collaborative workstreams and concrete research directions.
Builder Matching
The retreat connected researchers, protocol developers, and infrastructure builders working on related problems.
Participants identified where their skills and projects could contribute directly to active problem spaces.
Next Milestone
Participants discussed follow-up checkpoints to maintain collaboration beyond the retreat.
Upcoming ecosystem gatherings, including Devconnect in Buenos Aires, were identified as opportunities to review progress and continue coordination.

Cashu Integration for AT Protocol: Private Payments at Scale
Rudy Fraser, Blacksky Algorithms
Integrating Cashu, a Chaumian ecash protocol, to enable confidential peer-to-peer payments while preserving the decentralized ethos of AT Protocol. This will set a critical precedent for privacy-preserving financial infrastructure on open social protocols.
Distributed MLS
Mark Xue and Anna Mistele, Germ Network

Finalize the design for a decentralized configuration of Messaging Layer Security, implement it in an MIT licensed library, and analyze the design through testing to prepare for IETF standardization
Remote Attestation with Exported Authenticators
Peg, Independent
This project implements "Remote Attestation with Exported Authenticators," an IETF draft protocol that securely binds hardware attestation to TLS sessions without modifying TLS itself. The Rust library will enable projects to verify confidential workloads (TEEs) using existing TLS clients, solving a common pain points with current attestation methods.
Simple Private Payment L2
Aleph_V, Independent
A design for private stablecoin payments at near-zero cost, using zero-knowledge proofs for privacy and a simple challenge protocol for security, funded by interest rather than transaction fees.

Partnerships unlocked:
Tor & Ethereum Foundation’s privacy leadership connected & fostered collaboration.

Over 2000 visitors came to Ethereum Cypherpunk Congress 2 at Buenos Aires. Among speakers were here pictured, founder of Ethereum Foundation Vitalik Buterin talking about their new collaboration with Tor Project here with Roger Dingledine.
2. The Internet Archive expanded it's European presence by finding local coordinator

Watch a video with Brewster Khale from Internet Archive talking about centralized control over knowledge, why we need many independent archives, how we could rebuild a decentralized web using tools like Tor and much more here
3. Bluesky matched with Germ, Matrix, and Cashu

Germ has integrated end-to-end encrypted messaging into the Bluesky via the AT Protocol, becoming the first private messenger to launch natively within Bluesky.
The retreat translated urgency into alignment. Across 32 small-group sessions with 80+ active participants, builders, researchers, and organizers used the retreat format to surface shared priorities, compare roadmaps, and identify where coordination was most needed across secure communications, decentralized identity, confidential computing, and resilient infrastructure.
The result was not just discussion, but a clearer map of where interoperability work, cross-project collaboration, and partnership building could unlock progress across Web2 privacy, Web3, and internet-freedom communities. A broader overview of these discussions and outcomes is documented in the Protocol Labs summary of the Cypherpunk Retreat.

Just as importantly, the retreat produced visible follow-on work. The Dweb Server conversation described in the discussions is already reflected in Onion Press, a repository centered on packaging a web server with a Tor onion service for censorship-resistant publishing. Work on privacy-preserving communication and retrieval is also reflected in the Private Retrieval Fund, which supports research and development on reader-private communications. The retreat’s decentralized messaging and identity discussions carried forward into the Germ Cypherpunk Fellowship for Distributed MLS and into Germ’s later end-to-end encrypted integration with Bluesky via the AT Protocol.
The fellowship also included Cashu Integration for AT Protocol: Private Payments at Scale, led by Rudy Fraser / BlackSky Algorithms, Remote Attestation with Exported Authenticators done by Peg, and Simple Private Payment L2 by Alpeh_V. Continued censorship-circumvention experimentation is also visible in Tor-js and its underlying Rust / Web Assembly implementation, demonstrating how the retreat’s conversations have translated into concrete repositories, funded experiments, and ongoing collaborations across the privacy infrastructure ecosystem.
‘A Decentralized Platform For Sharing Intelligent Thoughts’ whitepaper has been crafted post-Retreat: palliora.org/whitepaper

Thanks to all the connections, networking and support participants of Cypherpunk Retreat created during these three days, many inspiring thoughts, collaborations and ideas has sparked. Months after the event we can still see how effective and enjoyable the Retreat was. Bellow are just few examples of participants reflecting on the event and sharing some of the many ideas and thoughts that Cypherpunk Retreat brought.

Participants reflecting on Cypherpunk Retreat at Berlin Ethereum Meetup.

Juan Benet from Protocol Labs talking about how to turn Retrean work into a movement at Ethereum Cypherpunk Congress 2 in Buenos Aires.

Another of Cypherpunk Retreat participants, Will Scott from Protocol Labs, during panel discussion at Ethereum Cypherpunk 2 about programmable cryptography meeting decentralisation (featuring Aztec, Status, Mask, Calimero).
Products like Freedom Browser by Meinhard Benn & Florian Glatz has been evolving: https://github.com/solardev-xyz/freedom-browser & results will be presented at Neo-cypherpunk Summit in Berlin.
Ethereum continuing Tor exploration:

Sebastian Vogelsang from Eurosky continue to implement retreat discussions: "Track 2 of the proposal includes „quantum-resistant, privacy-preserving zero-knowledge credentials (attribute-based/anonymous credentials, linkable ring signatures) for age-gating, reputation, and anti-abuse without tracking“.

Germ team integrating into Bluesky & being endorsement by EFF Head Of Cybersecurity.

Fellows continue to showcase their progress


About Cypherpunk Retreat
A Retreat on Privacy, Freedom, and Open Networks organised by Protocol Labs & Web3Privacy Now: https://cypherpunk.camp

[1] Web3Privacy Now. Organization website. URL: https://x.com/web3privacy.
[2] Protocol Labs. Organization website. URL: https://www.protocol.ai/.
[3] Protocol Labs. Threads from the 2025 Cypherpunk Retreat. URL: https://www.protocol.ai/blog/threads-from-the-2025-cypherpunk-retreat/.
[4] Freedom Browser. Project website. URL: https://freedombrowser.eth.limo/.
[5] Cypherpunk Retreat. Official event website. URL: https://cypherpunk.camp/.
[6] University of Oxford. Dr. Fazl Barez – Research profile. URL: https://www.ox.ac.uk/news-and-events/find-an-expert/dr-fazl-barez.
[7] University of Oxford. Official website. URL: https://www.ox.ac.uk/.
[8] Gnosis. Organization website. URL: https://www.gnosis.io/.
[9] Ethereum Foundation. Organization website. URL: https://ethereum.foundation/.
[10] Learning Proof. Project website. URL:
With growing regulatory pressures, centralised control over communication and financial systems, and the rapid evolution of AI and surveillance technologies, we are at a crossroads.

The coming years represent one of our last windows to build and use secure and privacy-preserving technologies before the current paradigm solidifies for a decade or more. The challenge is clear: secure global communications cannot depend on incremental adoption by existing systems. We need a fundamental shift in internet infrastructure, developed and deployed by builders who prioritize privacy and censorship resistance at the protocol level.
This led Web3Privacy Now and Protocol Labs to bring together leading builders, researchers, and advocates working across privacy infrastructure to identify the most pressing challenges, define the most impactful levers of influence, and double down on efforts to address them. Discussions and reflections from the gathering were later documented and shared across the ecosystem, including participant reports and ecosystem summaries such as Threads from the Cypherpunk Retreat and community reflections shared by participants and partner organizations Web3Privacy and Protocol Labs.

The Cypherpunk Retreat was an invite-only, hands-on gathering that brought together leading builders and front-line organizers in digital privacy. Designed to foster deep collaboration and activate field-building, the retreat focused on aligning technical roadmaps, driving coordination, and accelerating the development of a more private and resilient internet.
Over the course of 40+ sessions, change makers from different realms came together to co-create tangible solutions.
The outcomes of these interactions are poised to resonate well beyond the retreat: through new partnerships, shared standards, joint projects, and a strengthened foundation for long-term collaboration.
100 active participants from across human rights orgs, web3 protocols, ranging from privacy-focused Brave, through universities like Oxford and Harvard, Ethereum Foundation and all the way to people from Internet Archive and Tor.

The Cypherpunk Retreat brought together a diverse group spanning academia, protocol development, privacy engineering, and digital rights advocacy. Researchers such as Fazl Barez (Oxford University) joined protocol builders including Juan Benet (Protocol Labs), Sebastian Bürgel (Gnosis), and Theo Beutel (Ethereum Foundation) to exchange ideas on decentralized infrastructure and privacy-preserving systems. Privacy engineers and ecosystem builders such as Amit Chaudhary (Veilnyx), Juan Caballero (


The objective of the retreat’s participatory programming format was to create space for actionable connection and alliances between the experts and leaders present at the retreat.

This was conducted by submission of workshop session proposals ahead of the retreat, as well as on whiteboards during the first evening. These were ranked for interest with dot-voting, surfacing which topics to cover and clustering these into groups.
Over the course of the second and third days of the retreat, participants broke into small groups and covered a total of 32 sessions, of an hour each.

Take a look at short video shot at Cypherpunk Retreat, highlighting the importance of people collaborating


Discussions in this category examined how decentralized communication systems can remain secure, private, and resilient in environments where censorship and surveillance are increasingly common. Participants analyzed the structural limitations of existing anonymity and messaging networks, including the trade-offs between latency, usability, and strong privacy guarantees. Systems such as Tor, mixnets, and peer-to-peer overlays were discussed alongside real-world examples of governments blocking privacy-preserving communication tools.
The workshops also explored emerging cryptographic approaches that could enable verifiable and censorship-resistant information infrastructure. Concepts such as remote-attested TLS and zkTLS were discussed as ways to allow users to verify the authenticity of web content without relying on centralized trust assumptions. Participants examined architectures where verified servers could download, sign, and redistribute websites, enabling peer-to-peer sharing of cached content in censored environments. Discussions also explored emerging tools for censorship-resistant publishing such as Onion Press and related work on privacy-preserving information access through the Private Retrieval Fund initiative.

Workshops in this category explored how decentralized identity systems can enable users to maintain control over their digital identity and data. Participants examined architectures built around decentralized identifiers (DIDs) and personal data servers, where users manage their identity through cryptographic keys while storing and controlling their data independently from centralized platforms. These systems rely on verifiable data structures that allow identities and content to move across applications while maintaining integrity and provenance.
The discussions also addressed governance and moderation challenges within decentralized ecosystems. Participants explored layered moderation models involving relays, annotation layers, and proxies that allow communities to shape norms without centralizing control over user data. Interoperability and testing frameworks were highlighted as critical components for enabling decentralized identity systems to operate across platforms and regulatory environments. Related discussions around decentralized messaging and identity infrastructure were reflected in initiatives such as the Germ Cypherpunk Fellowship supporting open-source development of Messaging Layer Security (MLS).

This category focused on how privacy-preserving technologies can enable secure data processing and financial transactions without exposing sensitive information. Participants compared several approaches to confidential computation, including trusted execution environments, multi-party computation, fully homomorphic encryption, zero-knowledge proofs, and differential privacy. While each technique offers valuable protections, discussions emphasized that no single method currently provides complete confidentiality on its own.
The workshops highlighted the need for systems that provide end-to-end confidentiality across both data storage and computation layers. Participants examined mechanisms such as attestations and verification frameworks that could allow systems to prove that sensitive computations were performed securely and privately. Discussions also highlighted emerging coordination mechanisms supporting research and development in privacy infrastructure, including initiatives such as the Private Retrieval Fund.


Participants explored how decentralized technologies can operate in environments where internet connectivity, electricity, or access to global infrastructure cannot be assumed. Workshops examined systems designed for fragile communities where connectivity is intermittent or censored, emphasizing tools capable of operating offline or through delayed synchronization.
Examples included systems combining hardware wallets with Chaumian e-cash protocols to enable offline transactions within local communities. Local mints can maintain community ledgers that later synchronize with blockchain infrastructure once connectivity is restored. Participants also discussed grassroots communication technologies such as mesh networks, Bluetooth messaging, and radio-based systems that allow peer-to-peer interaction without relying on centralized internet infrastructure. Experimental infrastructure projects such as Onion Press were discussed as examples of how decentralized tools could enable censorship-resistant hosting and distribution of information.

Beyond technical infrastructure, the retreat also addressed the broader political and social context in which decentralized technologies operate. Participants explored how democratic decision-making can adapt to a digital environment marked by declining trust in institutions and increasing political polarization. Discussions examined whether civic participation systems should rely on verified identity or whether anonymity can coexist with legitimate governance processes.
Case studies from countries experimenting with digital civic participation were discussed to illustrate how technology might support more inclusive and participatory governance. However, participants emphasized that technology alone cannot restore democratic processes; effective systems must also support deliberation, debate, and collective decision-making within communities. A broader overview of these discussions and emerging collaborations is documented in the Protocol Labs recap of the Cypherpunk Retreat.

Participants from Tor, Nym, Taceo, Web3Privacy now, Mask brainstorming
Interop Alignment
Protocol teams compared architectures and approaches across communication, identity, and privacy infrastructure.
These discussions clarified shared assumptions and surfaced opportunities for interoperability and coordination across projects.
New Workstreams Identified
Workshops revealed high-leverage technical gaps across confidential compute, decentralized identity, and censorship-resistant infrastructure.

Participants mapped these gaps into potential collaborative workstreams and concrete research directions.
Builder Matching
The retreat connected researchers, protocol developers, and infrastructure builders working on related problems.
Participants identified where their skills and projects could contribute directly to active problem spaces.
Next Milestone
Participants discussed follow-up checkpoints to maintain collaboration beyond the retreat.
Upcoming ecosystem gatherings, including Devconnect in Buenos Aires, were identified as opportunities to review progress and continue coordination.

Cashu Integration for AT Protocol: Private Payments at Scale
Rudy Fraser, Blacksky Algorithms
Integrating Cashu, a Chaumian ecash protocol, to enable confidential peer-to-peer payments while preserving the decentralized ethos of AT Protocol. This will set a critical precedent for privacy-preserving financial infrastructure on open social protocols.
Distributed MLS
Mark Xue and Anna Mistele, Germ Network

Finalize the design for a decentralized configuration of Messaging Layer Security, implement it in an MIT licensed library, and analyze the design through testing to prepare for IETF standardization
Remote Attestation with Exported Authenticators
Peg, Independent
This project implements "Remote Attestation with Exported Authenticators," an IETF draft protocol that securely binds hardware attestation to TLS sessions without modifying TLS itself. The Rust library will enable projects to verify confidential workloads (TEEs) using existing TLS clients, solving a common pain points with current attestation methods.
Simple Private Payment L2
Aleph_V, Independent
A design for private stablecoin payments at near-zero cost, using zero-knowledge proofs for privacy and a simple challenge protocol for security, funded by interest rather than transaction fees.

Partnerships unlocked:
Tor & Ethereum Foundation’s privacy leadership connected & fostered collaboration.

Over 2000 visitors came to Ethereum Cypherpunk Congress 2 at Buenos Aires. Among speakers were here pictured, founder of Ethereum Foundation Vitalik Buterin talking about their new collaboration with Tor Project here with Roger Dingledine.
2. The Internet Archive expanded it's European presence by finding local coordinator

Watch a video with Brewster Khale from Internet Archive talking about centralized control over knowledge, why we need many independent archives, how we could rebuild a decentralized web using tools like Tor and much more here
3. Bluesky matched with Germ, Matrix, and Cashu

Germ has integrated end-to-end encrypted messaging into the Bluesky via the AT Protocol, becoming the first private messenger to launch natively within Bluesky.
The retreat translated urgency into alignment. Across 32 small-group sessions with 80+ active participants, builders, researchers, and organizers used the retreat format to surface shared priorities, compare roadmaps, and identify where coordination was most needed across secure communications, decentralized identity, confidential computing, and resilient infrastructure.
The result was not just discussion, but a clearer map of where interoperability work, cross-project collaboration, and partnership building could unlock progress across Web2 privacy, Web3, and internet-freedom communities. A broader overview of these discussions and outcomes is documented in the Protocol Labs summary of the Cypherpunk Retreat.

Just as importantly, the retreat produced visible follow-on work. The Dweb Server conversation described in the discussions is already reflected in Onion Press, a repository centered on packaging a web server with a Tor onion service for censorship-resistant publishing. Work on privacy-preserving communication and retrieval is also reflected in the Private Retrieval Fund, which supports research and development on reader-private communications. The retreat’s decentralized messaging and identity discussions carried forward into the Germ Cypherpunk Fellowship for Distributed MLS and into Germ’s later end-to-end encrypted integration with Bluesky via the AT Protocol.
The fellowship also included Cashu Integration for AT Protocol: Private Payments at Scale, led by Rudy Fraser / BlackSky Algorithms, Remote Attestation with Exported Authenticators done by Peg, and Simple Private Payment L2 by Alpeh_V. Continued censorship-circumvention experimentation is also visible in Tor-js and its underlying Rust / Web Assembly implementation, demonstrating how the retreat’s conversations have translated into concrete repositories, funded experiments, and ongoing collaborations across the privacy infrastructure ecosystem.
‘A Decentralized Platform For Sharing Intelligent Thoughts’ whitepaper has been crafted post-Retreat: palliora.org/whitepaper

Thanks to all the connections, networking and support participants of Cypherpunk Retreat created during these three days, many inspiring thoughts, collaborations and ideas has sparked. Months after the event we can still see how effective and enjoyable the Retreat was. Bellow are just few examples of participants reflecting on the event and sharing some of the many ideas and thoughts that Cypherpunk Retreat brought.

Participants reflecting on Cypherpunk Retreat at Berlin Ethereum Meetup.

Juan Benet from Protocol Labs talking about how to turn Retrean work into a movement at Ethereum Cypherpunk Congress 2 in Buenos Aires.

Another of Cypherpunk Retreat participants, Will Scott from Protocol Labs, during panel discussion at Ethereum Cypherpunk 2 about programmable cryptography meeting decentralisation (featuring Aztec, Status, Mask, Calimero).
Products like Freedom Browser by Meinhard Benn & Florian Glatz has been evolving: https://github.com/solardev-xyz/freedom-browser & results will be presented at Neo-cypherpunk Summit in Berlin.
Ethereum continuing Tor exploration:

Sebastian Vogelsang from Eurosky continue to implement retreat discussions: "Track 2 of the proposal includes „quantum-resistant, privacy-preserving zero-knowledge credentials (attribute-based/anonymous credentials, linkable ring signatures) for age-gating, reputation, and anti-abuse without tracking“.

Germ team integrating into Bluesky & being endorsement by EFF Head Of Cybersecurity.

Fellows continue to showcase their progress


About Cypherpunk Retreat
A Retreat on Privacy, Freedom, and Open Networks organised by Protocol Labs & Web3Privacy Now: https://cypherpunk.camp

[1] Web3Privacy Now. Organization website. URL: https://x.com/web3privacy.
[2] Protocol Labs. Organization website. URL: https://www.protocol.ai/.
[3] Protocol Labs. Threads from the 2025 Cypherpunk Retreat. URL: https://www.protocol.ai/blog/threads-from-the-2025-cypherpunk-retreat/.
[4] Freedom Browser. Project website. URL: https://freedombrowser.eth.limo/.
[5] Cypherpunk Retreat. Official event website. URL: https://cypherpunk.camp/.
[6] University of Oxford. Dr. Fazl Barez – Research profile. URL: https://www.ox.ac.uk/news-and-events/find-an-expert/dr-fazl-barez.
[7] University of Oxford. Official website. URL: https://www.ox.ac.uk/.
[8] Gnosis. Organization website. URL: https://www.gnosis.io/.
[9] Ethereum Foundation. Organization website. URL: https://ethereum.foundation/.
[10] Learning Proof. Project website. URL:
No activity yet