Definitions
from The American Heritage® Dictionary of the English Language, 5th Edition.
- noun One who covertly supports a certain doctrine, group, or party.
- noun Cryptography.
from The Century Dictionary.
- noun An element in words of Greek origin, meaning ‘hidden, concealed, not evident or obvious.’ See
calypto- .
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- noun a
secret supporter orfollower - noun uncountable, informal
cryptography - adjective
secret orcovert
Etymologies
from The American Heritage® Dictionary of the English Language, 4th Edition
Support
Help support Wordnik (and make this page ad-free) by adopting the word crypto.
Examples
-
The term crypto-libertarian pops up all over the politicosphere where everybody uses it but nobody bothers to define it.
-
The term crypto-libertarian pops up all over the politicosphere where everybody uses it but nobody bothers to define it.
-
And this is, again, what I call the crypto-industrial complex.
-
Tickets are $35, with proceeds going to EFF -- the organization that legalized crypto, is fighting the NSA's secret wiretapping, and that is suing Viacom for censoring a political video off YouTube.
Boing Boing 2007
-
Known as anusim, a Hebrew word for Jews who forcibly converted, many Latin American 'crypto-Jews' have rediscovered the faith of their ancestors in recent years.
Archive 2005-08-01 2005
-
Known as anusim, a Hebrew word for Jews who forcibly converted, many Latin American "crypto-Jews" have rediscovered the faith of their ancestors in recent years.
Archive 2005-08-01 2005
-
But the strongest crypto is gossamer protection if malevolent people have access to the computers on the other end.
Homeland Insecurity 2002
-
But the strongest crypto is gossamer protection if malevolent people have access to the computers on the other end.
Homeland Insecurity 2002
-
But the strongest crypto is gossamer protection if malevolent people have access to the computers on the other end.
Homeland Insecurity 2002
-
But the strongest crypto is gossamer protection if malevolent people have access to the computers on the other end.
Homeland Insecurity 2002
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.