Before Blockchain Existed, the Katipunan Already Used Cryptography: The Secret Codes of 1896

 


When people think of the Katipunan, they imagine bolos, blood compacts, and brave revolutionaries fighting for independence.


What they don’t realize is this:


The Katipunan wasn’t just a revolutionary army.

It was a highly advanced information network using cryptography, verification systems, and data encryption — decades before computers existed.


In short, Bonifacio and his men were doing blockchain-level security using nothing but pen, paper, symbols, and pure Filipino genius.


Let’s decode their system.





1. The “Blood Compact” = Biometric Verification



The ritual of signing documents with blood wasn’t dramatic flair —

it was an early form of identity authentication.


Blood =

• unique

• unforgeable

• verified

• tamper-proof

• identity-linked


This is the 1896 version of:


“This is my private key.”





2. The Katipunan Code Alphabet = Early Encryption



The Katipunan developed their own alphabet, replacing Spanish letters with symbolic strokes.


No outsider could read their messages unless they knew the key.


That’s manual encryption —

the exact logic behind:


• encoded data

• private keys

• secure communication


Their messages were unreadable without the cipher.


Just like encrypted files today.





3. Membership Process = Multi-Step Authentication



Joining the Katipunan required:


• interviews

• referrals

• oath-taking

• background checks

• ritual verification

• layered approval from existing members


This is your classic multi-factor authentication (MFA):


Something you know

Something you have

Something you are





4. “Balangay” Network = Decentralized Nodes



The Katipunan was divided into small, independent units called balangays.


Each balangay knew only:


• their members

• their tasks

• their immediate superior


This minimized risk of infiltration and allowed the organization to survive arrests.


It was decentralized —

the exact structure of:


• peer-to-peer networks

• blockchain nodes

• distributed ledgers


No single point of failure.





5. Passwords & Code Names = Key-Based Access Control



Katipunan members used:


• secret passwords

• pseudonyms

• symbolic signatures

• animal or nature-based code names

• hidden hand signs


This is primitive but effective:


Access Control Lists (ACLs)

and

Public/Private Key system


Only those with the right “key” could access meetings or information.





6. Messages Passed in Layers = Hashing & Data Integrity



Messages were often passed through trusted layers:


Member A → B → C → D


Each layer checked if the message was consistent.


If one detail changed,

the system knew it was compromised.


That’s early hashing logic —

ensuring data integrity across transmissions.





**7. The Conclusion:



Bonifacio’s Katipunan ran on pure Filipino cryptographic brilliance.**


Long before Silicon Valley,

long before Bitcoin,

long before cybersecurity…


Filipinos were already practicing:


• encryption

• verification

• distributed networks

• identity authentication

• secure communication

• anti-tampering methods

• decentralized coordination


History x AI isn’t just about the past.

It’s about rediscovering how future-minded we were all along.


The Katipunan wasn’t just a rebellion.

It was a proto-digital resistance movement —

the first Filipino version of secure, encrypted communication.


Now, as AI and blockchain reshape the world,

Filipinos aren’t catching up.


We’re simply returning to what we’ve always been good at:


decoding systems, securing truth,

and fighting for freedom through information.


🇵🇭🤖✨