SlideShare a Scribd company logo
1 of 28
Download to read offline
Hackers
Don’t
Matter
Talk 4218
@IHC2018
DataKnightmare
What’s A Hacker, Anyway?
●
Cambridge English
a person who is skilled in the use of computer systems
●
Merriam-Webster
an expert at programming and solving problems with a computer
●
Oxford English
an enthusiastic and skilful computer programmer or user
●
Urban Dictionary
●
a person skilled with the use of computers that uses his talents to gain
knowledge
Jargon File
●
hacker ethic: n.
1.The belief that information-sharing is a powerful
positive good, and that it is an ethical duty of hackers to
share their expertise by writing open-source code and
facilitating access to information and to computing
resources wherever possible.
2.The belief that system-cracking for fun and exploration
is ethically OK as long as the cracker commits no theft,
vandalism, or breach of confidentiality
To sum it up
Professionally
●
passion-driven
●
world through tech
●
“Just Do It”
●
info libertarian
●
status conscious
Socially
●
challenged
●
disrespect of norms
●
individualist
●
self-centred
●
selective attention
...a keyboard cowboy
What else?
A gifted, male teenager
Myth
Hackers are heroes of the Revolution
In the Beginning,
Hackers. Weren’t. Cool.
Careers before the ‘10s
Sales:
1.Junior acct
2.Area Mgr
3.Mktg Dir
4.CEO
Finance
1.Admin Asst
2.Int. Auditor
3.Admin Dir
4.CEO
ICT
1.Jr Prog
2.Senior Prg
3.Senior Prg
4.Contractor
Then capitalism happened.
Gentrification ensued.
Inconvenient Truth/1
Cowboys are a libertarian trope.
So are hackers.
Inconvenient Truth/2
Hackers built surveillance capitalism.
Because it was cool and fuck lusers.
Inconvenient Truth/3
Tech is now a religion.
Where we are today
●
Tech as religion (data “science” anybody?)
●
Ageism
●
Techno-classism
●
Solutionism/Transhumanism
●
Financial speculation (aka blockchain)
Hackers as useful idiots of the right-wing
Repeat After me…
Social problems aren’t solved by technology.
Applies. To. Everything.
Tech won’t save us
●
Surveillance
capitalism
●
Reactionary drift
●
Global warming
●
Overpopulation
●
Idiocracy
●
Death…
no Mars shuttle,
no transcendence,
no hack*
out of this shit.
*Also possibly no way out altogether.
If all you have
is a hammer
Everything looks
like a nail.
Technology
is a hammer.
Hackers don’t matter.
Citizens do.
Thank you.
Questions?
DataKnightmare@[Twitter, Mastodon, Spreaker, Patreon]
CC-BY-SA 4.0 Walter Vannini
“Breaking Free of Screens version 1&2” ©2009 Andy Singer, used with permission

More Related Content

What's hot

What's hot (7)

Harris resume
Harris resumeHarris resume
Harris resume
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
ResumeJenniferHe
ResumeJenniferHeResumeJenniferHe
ResumeJenniferHe
 
Cs
CsCs
Cs
 
Hackers final
Hackers finalHackers final
Hackers final
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 

Similar to What's a Hacker Anyway? Exploring the Evolution of the Term and Ethos Over Time

Skills-Required-to-Become-a-Ethical-Hacker.pptx
Skills-Required-to-Become-a-Ethical-Hacker.pptxSkills-Required-to-Become-a-Ethical-Hacker.pptx
Skills-Required-to-Become-a-Ethical-Hacker.pptxNarangYadav
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interactionYavuz Paksoy
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
History of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker CultureHistory of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker CultureHiro Yoshioka
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
The academy of creative cooking CIS2200
The academy of creative cooking CIS2200The academy of creative cooking CIS2200
The academy of creative cooking CIS2200Mervenur Aydin
 
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.MaryConcepcion10
 
ビジネスアプリケーション特論 HIstory of IT industry, Internet and Hackers
ビジネスアプリケーション特論 HIstory of IT industry, Internet and Hackersビジネスアプリケーション特論 HIstory of IT industry, Internet and Hackers
ビジネスアプリケーション特論 HIstory of IT industry, Internet and HackersHiro Yoshioka
 

Similar to What's a Hacker Anyway? Exploring the Evolution of the Term and Ethos Over Time (20)

Hacking
HackingHacking
Hacking
 
Skills-Required-to-Become-a-Ethical-Hacker.pptx
Skills-Required-to-Become-a-Ethical-Hacker.pptxSkills-Required-to-Become-a-Ethical-Hacker.pptx
Skills-Required-to-Become-a-Ethical-Hacker.pptx
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
hacking
hackinghacking
hacking
 
Dark Net
Dark NetDark Net
Dark Net
 
hackers
hackershackers
hackers
 
Hacking
HackingHacking
Hacking
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interaction
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
History of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker CultureHistory of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker Culture
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
The academy of creative cooking CIS2200
The academy of creative cooking CIS2200The academy of creative cooking CIS2200
The academy of creative cooking CIS2200
 
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.
 
ビジネスアプリケーション特論 HIstory of IT industry, Internet and Hackers
ビジネスアプリケーション特論 HIstory of IT industry, Internet and Hackersビジネスアプリケーション特論 HIstory of IT industry, Internet and Hackers
ビジネスアプリケーション特論 HIstory of IT industry, Internet and Hackers
 

More from Walter Vannini

Come far fallire un progetto data-driven in modo certo e doloroso
Come far fallire un progetto data-driven in modo certo e dolorosoCome far fallire un progetto data-driven in modo certo e doloroso
Come far fallire un progetto data-driven in modo certo e dolorosoWalter Vannini
 
Competenze digitali per Smart Cities
Competenze digitali per Smart CitiesCompetenze digitali per Smart Cities
Competenze digitali per Smart CitiesWalter Vannini
 
Crescere (i) digitali 3 cosa fare
Crescere (i) digitali 3   cosa fareCrescere (i) digitali 3   cosa fare
Crescere (i) digitali 3 cosa fareWalter Vannini
 
Crescere (i) digitali 2 cosa fanno
Crescere (i) digitali 2   cosa fannoCrescere (i) digitali 2   cosa fanno
Crescere (i) digitali 2 cosa fannoWalter Vannini
 
Crescere (i) digitali 1
Crescere (i) digitali 1Crescere (i) digitali 1
Crescere (i) digitali 1Walter Vannini
 
Merende scientifiche 2014
Merende scientifiche 2014Merende scientifiche 2014
Merende scientifiche 2014Walter Vannini
 
Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...
Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...
Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...Walter Vannini
 
Merende Scientifiche 2013
Merende Scientifiche 2013Merende Scientifiche 2013
Merende Scientifiche 2013Walter Vannini
 
Come farsi capire dagli Informatici (Smau Roma 2013)
Come farsi capire dagli Informatici (Smau Roma 2013)Come farsi capire dagli Informatici (Smau Roma 2013)
Come farsi capire dagli Informatici (Smau Roma 2013)Walter Vannini
 
Deep DISC - From Better Personal Awareness to DISC And Back
Deep DISC - From Better Personal Awareness to DISC And BackDeep DISC - From Better Personal Awareness to DISC And Back
Deep DISC - From Better Personal Awareness to DISC And BackWalter Vannini
 
Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...
Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...
Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...Walter Vannini
 

More from Walter Vannini (15)

Gdpr For Nerds
Gdpr For NerdsGdpr For Nerds
Gdpr For Nerds
 
GDPR vs ISO27001 en
GDPR vs ISO27001 enGDPR vs ISO27001 en
GDPR vs ISO27001 en
 
GDPR vs 27001 ITA
GDPR vs 27001 ITAGDPR vs 27001 ITA
GDPR vs 27001 ITA
 
Come far fallire un progetto data-driven in modo certo e doloroso
Come far fallire un progetto data-driven in modo certo e dolorosoCome far fallire un progetto data-driven in modo certo e doloroso
Come far fallire un progetto data-driven in modo certo e doloroso
 
Competenze digitali per Smart Cities
Competenze digitali per Smart CitiesCompetenze digitali per Smart Cities
Competenze digitali per Smart Cities
 
Crescere (i) digitali 3 cosa fare
Crescere (i) digitali 3   cosa fareCrescere (i) digitali 3   cosa fare
Crescere (i) digitali 3 cosa fare
 
Crescere (i) digitali 2 cosa fanno
Crescere (i) digitali 2   cosa fannoCrescere (i) digitali 2   cosa fanno
Crescere (i) digitali 2 cosa fanno
 
Crescere (i) digitali 1
Crescere (i) digitali 1Crescere (i) digitali 1
Crescere (i) digitali 1
 
Merende scientifiche 2014
Merende scientifiche 2014Merende scientifiche 2014
Merende scientifiche 2014
 
Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...
Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...
Il futuro è dato: Data Science e Network Science e l'azienda del XXI secolo (...
 
Merende Scientifiche 2013
Merende Scientifiche 2013Merende Scientifiche 2013
Merende Scientifiche 2013
 
Come farsi capire dagli Informatici (Smau Roma 2013)
Come farsi capire dagli Informatici (Smau Roma 2013)Come farsi capire dagli Informatici (Smau Roma 2013)
Come farsi capire dagli Informatici (Smau Roma 2013)
 
Disc now
Disc nowDisc now
Disc now
 
Deep DISC - From Better Personal Awareness to DISC And Back
Deep DISC - From Better Personal Awareness to DISC And BackDeep DISC - From Better Personal Awareness to DISC And Back
Deep DISC - From Better Personal Awareness to DISC And Back
 
Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...
Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...
Non tutti i gusti sono alla menta; il modello Extended DISC(r) e la gestione ...
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

What's a Hacker Anyway? Exploring the Evolution of the Term and Ethos Over Time

  • 2. What’s A Hacker, Anyway? ● Cambridge English a person who is skilled in the use of computer systems ● Merriam-Webster an expert at programming and solving problems with a computer ● Oxford English an enthusiastic and skilful computer programmer or user ● Urban Dictionary ● a person skilled with the use of computers that uses his talents to gain knowledge
  • 3. Jargon File ● hacker ethic: n. 1.The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open-source code and facilitating access to information and to computing resources wherever possible. 2.The belief that system-cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality
  • 4. To sum it up Professionally ● passion-driven ● world through tech ● “Just Do It” ● info libertarian ● status conscious Socially ● challenged ● disrespect of norms ● individualist ● self-centred ● selective attention ...a keyboard cowboy
  • 5. What else? A gifted, male teenager
  • 6. Myth Hackers are heroes of the Revolution
  • 7.
  • 8. In the Beginning, Hackers. Weren’t. Cool.
  • 9. Careers before the ‘10s Sales: 1.Junior acct 2.Area Mgr 3.Mktg Dir 4.CEO Finance 1.Admin Asst 2.Int. Auditor 3.Admin Dir 4.CEO ICT 1.Jr Prog 2.Senior Prg 3.Senior Prg 4.Contractor
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16.
  • 17.
  • 18. Inconvenient Truth/1 Cowboys are a libertarian trope. So are hackers.
  • 19. Inconvenient Truth/2 Hackers built surveillance capitalism. Because it was cool and fuck lusers.
  • 20.
  • 21. Inconvenient Truth/3 Tech is now a religion.
  • 22.
  • 23. Where we are today ● Tech as religion (data “science” anybody?) ● Ageism ● Techno-classism ● Solutionism/Transhumanism ● Financial speculation (aka blockchain) Hackers as useful idiots of the right-wing
  • 24.
  • 25. Repeat After me… Social problems aren’t solved by technology. Applies. To. Everything.
  • 26. Tech won’t save us ● Surveillance capitalism ● Reactionary drift ● Global warming ● Overpopulation ● Idiocracy ● Death… no Mars shuttle, no transcendence, no hack* out of this shit. *Also possibly no way out altogether.
  • 27. If all you have is a hammer Everything looks like a nail. Technology is a hammer. Hackers don’t matter. Citizens do.
  • 28. Thank you. Questions? DataKnightmare@[Twitter, Mastodon, Spreaker, Patreon] CC-BY-SA 4.0 Walter Vannini “Breaking Free of Screens version 1&2” ©2009 Andy Singer, used with permission