SlideShare a Scribd company logo
G R A N N Y W A S
A H A C K E R
P H O T O : L I S A C O C K B U R N
K N I T T I N G
=
C O D E
F L I C K R : S T E P H A N I E A S H E R
96 st = 12 ASCII
characters in binary at
8 stitches each
“ D E C O D E R H A T ” B Y Z A B E T S T E W A R T
Source code of
ravelry.com (knitting
website)
“ B I N A R Y S C A R F ” B Y H E Y C A R R I E A N N
Code Red
computer virus
(2001)
“ T H E V I R A L K N I T T I N G P R O J E C T ”
B Y K I R S T Y R O B E R T S O N & O T H E R S
S T E G A N O G R A P H
Y
F L I C K R : B E E P 1 O
R A V E L R Y : C Y NF L I C K R : D E V A B U R G E R
F L I C K R : A D A M K N I T S
F L I C K R : J A C Q U E L I N E - W
Left mitten reads
“My Left Mitten”;
thumb reads
“Thumb”, etc
“ M O R S E C O D E ” B Y K A T E A T H E R L E Y
Letters converted to
base 6, graphed, and
mirrored
“ P E A C E ” B Y N A O M I P A R K H U R S T
Encodes a stanza
from Dr. Seuss’s
Oh, The Places
You'll Go!
“ B R A I L L E S O C K S ” B Y J E S S I C A L A N D E R S
L E T ’ S G E T
H I G H -
T E C H
F L I C K R : B E R Z O W S K A
F L I C K R : B E K A T H W I A
F L I C K R : B E K A T H W I A
FLICKR:DEVABURGER
F L I C K R : K A T H Y R E I D
F L I C K R : S T 3 F 4 N
Kris Howard

More Related Content

Viewers also liked

Rm issue oct 07
Rm issue oct 07Rm issue oct 07
Rm issue oct 07
Paul Lai
 
Presentation angelica c. mawili
Presentation   angelica c. mawiliPresentation   angelica c. mawili
Presentation angelica c. mawili
An Gel
 
470b_World Trade Symposium_SUMMARY REPORT
470b_World Trade Symposium_SUMMARY REPORT470b_World Trade Symposium_SUMMARY REPORT
470b_World Trade Symposium_SUMMARY REPORT
Ben Jarrold
 

Viewers also liked (9)

企画セッションPpt 160806終了
企画セッションPpt 160806終了企画セッションPpt 160806終了
企画セッションPpt 160806終了
 
Rm issue oct 07
Rm issue oct 07Rm issue oct 07
Rm issue oct 07
 
Aardappelplantbak final
Aardappelplantbak finalAardappelplantbak final
Aardappelplantbak final
 
Presentation angelica c. mawili
Presentation   angelica c. mawiliPresentation   angelica c. mawili
Presentation angelica c. mawili
 
Sindrom srednjeg deteta
Sindrom srednjeg detetaSindrom srednjeg deteta
Sindrom srednjeg deteta
 
Asi technology
Asi technologyAsi technology
Asi technology
 
470b_World Trade Symposium_SUMMARY REPORT
470b_World Trade Symposium_SUMMARY REPORT470b_World Trade Symposium_SUMMARY REPORT
470b_World Trade Symposium_SUMMARY REPORT
 
Java one2016 con3054-watsonap-is
Java one2016 con3054-watsonap-isJava one2016 con3054-watsonap-is
Java one2016 con3054-watsonap-is
 
շվեցարիա
շվեցարիաշվեցարիա
շվեցարիա
 

More from Kristine Howard

More from Kristine Howard (20)

Machine Learning for Software Developers (...and Knitters)
Machine Learning for Software Developers (...and Knitters)Machine Learning for Software Developers (...and Knitters)
Machine Learning for Software Developers (...and Knitters)
 
Knitted Disruption - Build Stuff LIthuania 2019
Knitted Disruption - Build Stuff LIthuania 2019Knitted Disruption - Build Stuff LIthuania 2019
Knitted Disruption - Build Stuff LIthuania 2019
 
Knitted Disruption - Build Stuff Ukraine 2019
Knitted Disruption - Build Stuff Ukraine 2019Knitted Disruption - Build Stuff Ukraine 2019
Knitted Disruption - Build Stuff Ukraine 2019
 
Building Software That Lasts - Voxxed Days Singapore
Building Software That Lasts - Voxxed Days SingaporeBuilding Software That Lasts - Voxxed Days Singapore
Building Software That Lasts - Voxxed Days Singapore
 
Building Software That Lasts
Building Software That LastsBuilding Software That Lasts
Building Software That Lasts
 
All About Ravelry (Weavers and Spinners edition!)
All About Ravelry (Weavers and Spinners edition!)All About Ravelry (Weavers and Spinners edition!)
All About Ravelry (Weavers and Spinners edition!)
 
Traversing the Org Chart
Traversing the Org ChartTraversing the Org Chart
Traversing the Org Chart
 
The Campsite Rule - Leaving the Tech Industry Better Than We Found It
The Campsite Rule - Leaving the Tech Industry Better Than We Found ItThe Campsite Rule - Leaving the Tech Industry Better Than We Found It
The Campsite Rule - Leaving the Tech Industry Better Than We Found It
 
My Website is Old Enough to Vote - My Website Can Vote - Building Sites That ...
My Website is Old Enough to Vote - My Website Can Vote - Building Sites That ...My Website is Old Enough to Vote - My Website Can Vote - Building Sites That ...
My Website is Old Enough to Vote - My Website Can Vote - Building Sites That ...
 
Knit One Compute One - For Knitters!
Knit One Compute One - For Knitters!Knit One Compute One - For Knitters!
Knit One Compute One - For Knitters!
 
My Website Can Vote - Building Sites That Last
My Website Can Vote - Building Sites That LastMy Website Can Vote - Building Sites That Last
My Website Can Vote - Building Sites That Last
 
Knit One, Compute One - Software Art Thou?
Knit One, Compute One - Software Art Thou?Knit One, Compute One - Software Art Thou?
Knit One, Compute One - Software Art Thou?
 
Knit One, Compute One - YOW! Night Perth
Knit One, Compute One - YOW! Night PerthKnit One, Compute One - YOW! Night Perth
Knit One, Compute One - YOW! Night Perth
 
Knit One, Compute One - YOW! 2016
Knit One, Compute One - YOW! 2016Knit One, Compute One - YOW! 2016
Knit One, Compute One - YOW! 2016
 
My Website Can Vote - The Challenges of Maintaining a 20-year-old Website
My Website Can Vote - The Challenges of Maintaining a 20-year-old WebsiteMy Website Can Vote - The Challenges of Maintaining a 20-year-old Website
My Website Can Vote - The Challenges of Maintaining a 20-year-old Website
 
Granny Was a Hacker - TEDx Melbourne
Granny Was a Hacker - TEDx MelbourneGranny Was a Hacker - TEDx Melbourne
Granny Was a Hacker - TEDx Melbourne
 
Taking the Management Leap
Taking the Management LeapTaking the Management Leap
Taking the Management Leap
 
Intro to Ravelry
Intro to RavelryIntro to Ravelry
Intro to Ravelry
 
Granny Was a Hacker (CampJS Version)
Granny Was a Hacker (CampJS Version)Granny Was a Hacker (CampJS Version)
Granny Was a Hacker (CampJS Version)
 
The Tyranny of the Business Card
The Tyranny of the Business CardThe Tyranny of the Business Card
The Tyranny of the Business Card
 

Recently uploaded

Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (16)

Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Topology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdfTopology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdf
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 

Granny Was a Hacker [Ignite Talk]

  • 1. G R A N N Y W A S A H A C K E R P H O T O : L I S A C O C K B U R N
  • 2. K N I T T I N G = C O D E F L I C K R : S T E P H A N I E A S H E R
  • 3. 96 st = 12 ASCII characters in binary at 8 stitches each “ D E C O D E R H A T ” B Y Z A B E T S T E W A R T
  • 4. Source code of ravelry.com (knitting website) “ B I N A R Y S C A R F ” B Y H E Y C A R R I E A N N
  • 5. Code Red computer virus (2001) “ T H E V I R A L K N I T T I N G P R O J E C T ” B Y K I R S T Y R O B E R T S O N & O T H E R S
  • 6. S T E G A N O G R A P H Y F L I C K R : B E E P 1 O
  • 7.
  • 8. R A V E L R Y : C Y NF L I C K R : D E V A B U R G E R
  • 9. F L I C K R : A D A M K N I T S
  • 10. F L I C K R : J A C Q U E L I N E - W
  • 11. Left mitten reads “My Left Mitten”; thumb reads “Thumb”, etc “ M O R S E C O D E ” B Y K A T E A T H E R L E Y
  • 12. Letters converted to base 6, graphed, and mirrored “ P E A C E ” B Y N A O M I P A R K H U R S T
  • 13. Encodes a stanza from Dr. Seuss’s Oh, The Places You'll Go! “ B R A I L L E S O C K S ” B Y J E S S I C A L A N D E R S
  • 14. L E T ’ S G E T H I G H - T E C H F L I C K R : B E R Z O W S K A
  • 15. F L I C K R : B E K A T H W I A
  • 16.
  • 17. F L I C K R : B E K A T H W I A
  • 19. F L I C K R : K A T H Y R E I D
  • 20. F L I C K R : S T 3 F 4 N Kris Howard

Editor's Notes

  1. A few days ago I dropped off my entries for the knitting competition at this year’s Easter Show. I also build websites and apps for a living. To some people, this is totally incongruous, like I’m being deliberately anachronistic. But to me it makes perfect sense. After all, knitting is pretty much just code.
  2. Anybody who’s ever tried it knows there’s just two stitches: knit and purl, combined in lots of different ways. So it’s inherently binary. And for those of us geeky computer types, that means we can use it to encode messages in a lot of different ways. For instance, if I combine knits and purls…
  3. For instance, if I combine knits and purls to make ribbing, I can make a beanie. This is a free pattern called Decoder Hat, and it encodes up to 12 ASCII characters in binary at 8 stitches each. Obviously, message length is determined by the size of your head. But what if my message is longer?
  4. How about a scarf? This scarf is actually the source code for ravelry.com, a knitting site. The knitter has used knit stitches to represent ones, and purls for zero. You could represent pretty much anything this way. If you’re more of a “black hat,” you can even knit a virus…
  5. For the Viral Knitting Project, a team of activists knitted the source code to the code red computer virus into a scarf. So much for firewalls. This is contraband code you could carry across a border and no one would notice. All of these are examples of…
  6. All of these are examples of steganography - the art of hiding a secret message in plain view. Nowadays the news freaks out about terrorists embedding messages in pictures on eBay, but did you know in WW2 the Belgian resistance recruited little old ladies who lived near rail yards to encode train movements into their knitting?
  7. Granny doesn’t look so sweet and innocuous anymore, does she? She could be knitting anything into that jumper. Of course, binary knits and purls are only the beginning. There are lots of other ways to encode secret messages in your knitting. Personally I like the look of cables…
  8. Personally, I like the look of cables. The hat on the left represents the numbers from 0-15 in binary notation, depending on where the crosses occur. The scarf on the right uses cables that actually look like little zeroes and ones. Maybe you like colour more than texture…
  9. Another option is stripes. The width of knitted stripes in different colours could be used to represent a character set. The stripes on this jumper, for example, actually spell out the classic first programming exercise “Hello World”. If you want to get super literal…
  10. If you want to get super literal, you can actually knit little ones and zeros into a scarf. You may be interested to learn that your average scarf will hold about 120 bytes of information. That’s just shy of a tweet! Not that the Belgian knitting nanas…
  11. Not that the Belgian knitting nanas would’ve known what Twitter was. But they may have known Morse code! These mittens here use colour to create the dots and dashes of Morse code to spell out “My Left Mitten”; “My Right Mitten”; and “Thumb”. How meta. Another encoding method is to turn your characters into a repeating graphical motif…
  12. Another encoding method is to turn your characters into a repeating graphical motif. Here the word PEACE has been converted to base 6, graphed, mirrored, and tweaked to make a repeating pattern. But what about accessibility? you might be thinking…
  13. But what about accessibility? you might be thinking. Well, these knitted socks take advantage of the texture of knitted stitches to encode in Braille. The pattern repeat is a stanza from Dr. Seuss’s “Oh the Places You’ll Go.” So that’s all pretty cool…
  14. So that’s all pretty cool, but I get that most of you when you see the word “hacker” are expecting something a little more futuristic and “disruptive,” preferably involving an app of some kind. I got that covered.
  15. How about a real working knitted QR code? The mittens on the right - which won me a 2nd place at the Show - encode a URL from my personal site that has the pattern for the mittens. They’re self-replicating! But they’re not exactly subtle.
  16. This is more subtle. This is a jumper I knitted for my husband a few years back using a technique called illusion knitting. From the front, just stripes. From the side, he’s secretly an Autobot from the planet Cybertron. This next one is also subtle. It’s not actually code…
  17. This next one is also subtle. It’s not actually code; more like scientific output. The stripes on this scarf are actually a graphical representation of the emission spectrum of the element Molybdenum. And to get super super nerdy…
  18. This piece is a crochet version of the Arecibo Message, which was broadcast into space in 1974 towards a star cluster 25,000 light years away. I for one welcome our new knitting overlords…
  19. And lastly - if you’re not inspired by knitting code, how about sewing a circuit? You can now get an Arduino kit called the Lilypad that comes with conductive thread you can use to sew into your knits to create e-textiles.
  20. I hope some of this inspired you. For those of us who push pixels around all day, knitting can be a creative, tactile way to relax… and even hack a bit. Come see me if you want to learn. Or hey, just call your grandma!