Skip to main content
 

The Evolution of Hacker Culture

10 min read

Growing up during the 1980's, I quickly developed a fascination for technology and computing. I'm a bit too young to have experienced the very early glory days of the computer revolution, missing the Homebrew Computer Club and the innovations at Bell Labs and MIT. That said, my life was greatly influenced by early "hacker culture."

The Birth of Hacker Culture

Steven Levy's "Hackers: Heroes of the Computer Revolution," was published in 1984, and attempts to capture and define what Levy calls "hacker culture." Levy's central concept is that of the Hacker Ethic, a set of principles that he believes will bring forth a better world, if carefully adhered to:

  1. Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-on Imperative!

  2. All information should be free.

  3. Mistrust authority—promote decentralization.

  4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position.

  5. You can create art and beauty on a computer.

  6. Computers can change your life for the better.

—The "Hacker Ethic," Steven Levy

I didn't hear of the Hacker Ethic until my early teens, but it immediately resonated with me because of my curiousity about technology, mistrust of authority, and Robin Hood-esque desire to hack the world through computing.

Ocean's Geeky Eleven

In my Senior year of High School in 1997-98, I was President of my school's Computer Club (look out, ladies). The list of our exploits was impressive, and included, but was not limited to:

  1. Deploying a Slackware Linux-powered server on our school's T1 line, which we used to host websites, to learn to program/script, and to host other services. I still remember using upwards of 40 AOL free trial floppies to install Slackware on that server.

  2. Causing an overly-protective MCSE administrator at our school so much frustration that he resigned in protest of our continued ability have a Linux server on "his" network. Mind you, our server was the most secure device on the network...

  3. Providing free training for parents and other students on how to use the Internet, including Gopher training, and a comparison of World Wide Web search engines (we were all pretty big on AltaVista, preferring it to Lycos and Yahoo).

I have so many fond memories of those days, where I fed my curiousity, and truly believed that I could change the world with technology.

My favorite, and perhaps most illustrative, story from that time in my life concerns our Computer Club's participation in the Distributed RC5 challenge.

Before I recount the story, I'll note that the facts have gone through years of filtration in my brain, and some of the specific numbers may not be accurate. But, the general strucuture and spirit of the story is very much true.

The goal of the RC5 challenge was to claim a $10,000 prize funded by RSA Labs as part of their "Secret Key Challenge." Teams could register to join a massive distributed computing effort to claim the prize, installing a simple piece of software, an "agent", onto computers under their control that would use spare cycles to eventually find the winning key.

The RC5 challenge embodied everything we cared about: harnessing the power of computing to make a dent in the world. Our merry band of computing misfits had a real chance at hacker glory! The Computer Club attacked the problem in earnest, registering our team, and installing the agent on our Linux server and our home computers.

The contest had a leaderboard, where you could see how your team stacked up against other teams globally, including a few university and commercial supercomputer projects. At the beginning, our ranking was shamefully low, and we decided that we had to do something about it.

Our first course of action was, of course, harnessing all of the computing power at our disposal. This involved several weeks of covert effort getting the agent installed on every computer in the school, without any of the teachers or administrators noticing. At the time, it was pretty easy to hide the agent in plain-sight on the vintage Macintosh computers on campus, but the Windows computers were a bit trickier. Through some deft programming, we were eventually able to hide our agents on those as well, and we saw our team begin to rocket up the leaderboard, stalling just outside of the top 25.

Unsatisfied with our ranking, the Computer Club decided to take radical action. We would break into our rival high school, who had a very large computer lab filled with new computers, and covertly hide our agent on their network. At the time, I felt like Danny Ocean in Ocean's Eleven. We cleverly disguised ourselves as students, and made our way into the computer lab in the hours after school had closed, but before the doors were locked. Using our Windows and Mac forks of the agents, designed to hide themselves, we were quickly able to deploy our code throughout the entire computer lab.

The rival high school's network turned out to be locked down a bit more than we planned, and was blocking all outgoing traffic on ports other than the very basic services (HTTP, FTP, SMTP, POP3). We quickly adapted, building new versions of the agents that sent traffic over port 25 (SMTP), and then relayed it through our Linux server.

Twenty four hours later, our team was ranked in the top 10, alongside supercomputers and massive university-supported teams. We were doing something big! Soon enough, we felt that we'd crack the top 5, and have a real shot at the prize and glory.

Our excitement was short-lived, and over the next week, we were caught, and nearly expelled from school. We had to apologize to our rival high school, and point out how we exploited their systems. The jig was up.

Parrish's New Hacker Ethic

I was reminded of this time of my life as I recently watched Allison Parrish's talk, "Programming is Forgetting: Toward a New Hacker Ethic" from the 2016 Open Hardware Summit. Allison Parrish is a computer programmer, poet, and educator from Brooklyn, NY.

In her talk, Parrish shares her experiences with hacker culture, and proposes an evolution toward a new hacker ethic that she believes will "foster a technology culture in which a high value is placed on understanding and being explicit about your biases about what you’re leaving out, so that computers are used to bring out the richness of the world instead of forcibly overwriting it."

The "philosophical kernel" of Levy's hacker ethic that Parrish takes issue with is the "Hands-On Imperative," which is referenced in rule 1 of his hacker ethic.

Hackers believe that essential lessons can be learned about the systems—about the world—from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things. They resent any person, physical barrier, or law that tries to keep them from doing this.

This is especially true when a hacker wants to fix something that (from his point of view) is broken or needs improvement. Imperfect systems infuriate hackers, whose primal instinct is to debug them.

—Hackers, p. 28

Parrish asserts that the Hands-On Imperative assumes that the world is a system that can be understood perfectly and broken down into components that can also be understood. When stated this way, its clear that the imperative has inherent hubris. The world is a complex place, and every person has a point of view and bias. In addition to personal bias, the divide between the analog and the digital world is problematic:

The process of computer programming is taking the world, which is infinitely variable, mysterious, and unknowable... and turning it into procedures and data.... The world, which consists of analog phenomena infinite and unknowable, is reduced to the repeatable and the discrete. In the process of programming, or scanning or sampling or digitizing or transcribing, much of the world is left out or forgotten. Programming is an attempt to get a handle on a small part of the world so we can analyze and reason about it. But a computer program is never itself the world.

—Allison Parrish, "Programming is Forgetting: Toward a New Hacker Ethic"

Due to this impedence mismatch between reality and the Hands-On Imperative, Parrish proposes a revised hacker ethic which is, instead of a set of black and white assertions, a series of questions more well-suited to the analog and variable world that we live in:

  1. Access to computers should be unlimited and total. Who gets to use what I make? Who am I leaving out? How does what I make facilitate or hinder access?

  2. All information should be free. What data am I using? Whose labor produced it and what biases and assumptions are built into it? Why choose this particular phenomenon for digitization or transcription? And what do the data leave out?

  3. Mistrust authority—promote decentralization. What systems of authority am I enacting through what I make? What systems of support do I rely on? How does what I make support other people?

  4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position. What kind of community am I assuming? What community do I invite through what I make? How are my own personal values reflected in what I make?

—"Hacker Questions," Allison Parrish

Parrish's questions are a direct response to the first four tenets of Levy's Hacker Ethic, but she leaves his last two assertions alone, as she believes that they're valuable:

  1. You can create art and beauty on a computer.

  2. Computers can change your life for the better.

After all, every hacker believes that computers can change lives in real, and beautiful ways.

Bringing out the Richness of the World

I'd encourage you to watch Parrish's talk to get the full story, as it resonated with me strongly, and caused me to reflect on my own life's journey through hacker culture, and my experiences with the darker and more subtle side-effects of Levy's seminal work on the hacker ethic.

How would my journey be different if hacker culture had been influenced by Parrish's Hacker Questions, rather than Levy's Hacker Ethic? How would my high school Computer Club story have changed? What would the technology industry look like today if hacker culture looked more like Parrish's vision, rather than Levy's?

Above all, I share Parrish's desire to shape a hacker culture that "brings out the richness of the world, instead of forcibly overwriting it." The world today is more connected and impacted by technology and computing than ever before, but there are also a lot of truly frightening things happening. Hackers who embrace this new ethic have the potential to change the world for the better: to create opportunities and access for people who may otherwise be left behind; to call out bias and strive to surface more points of view; to invite the formation of more welcoming communities.

More often than not, the average person engages with computing and the internet through avenues so fundamentally tainted with systematic algorithmic bias, that major governments are capable of being sabatoged by exploiting these systems. I, for one, believe that hackers united around an ethic that surfaces bias, improves access to important and contextualized information, and creates more authentic community, can change the world for the better.

So, go forth, fellow hackers, and bring out the richness of the world.

 

Does it get any better?

 

Remembering some epic trolling by @DreamHostBrett

Back in 2013, @DreamHostBrett made these visors proclaiming DreamHost's sponsorship of the DreamHost + OpenStack Invitational Golf Tournament in Hong Kong. We wore them the whole week, but there was no such golf tournament. Good times.

 

Brunch with my babies

Momma wasn't feeling up to leaving the house, so we are having some daddy time!

 

Checked into HopSaint Brewing Company

Date night! Delicious food and beer.

 

Love my church

We are "a church of open hearts, open minds, and open doors. Truly all are welcome here."

 

Rocketship park with the kiddos

 

Yes: See you at the Homebrew Website Club in Portland next week!

 

January 29, 2011

My Colette was itty bitty.

 

February 12, 2011

My baby girl was getting to know her pug brother.

 

My refurbished vintage Gillette Slim Adjustable arrived

For comparison, see my original unrestored Slim on the right. The refurb was performed by Razor Emporium, who sourced a vintage razor, disassembled, cleaned, re-plated it in rhodium, then re-assembled and polished it for me. Can't wait to shave with this beautiful piece of kit!

 

Valentine's Day William

 

Valentine's Day Colette

 

Peace

 

Guess who is six?!

 

Supporting the Open Web

1 min read

Today, my employer announced its backing of Manton Reece's excellent Indie Microblogging Kickstarter campaign. I wrote a few words about it over on our blog, and you should check it out. If you haven't already become a backer, I'd encourage you to consider contributing to the cause.

2016 was a really interesting year for DreamHost, and I think the thing that I am most proud of is our revised Vision statement, which is in support of an overall Noble Cause.

  • Noble Cause: We help people own their digital presence.
  • Vision: People have the freedom to choose how their digital content is shared.

Its great to be a part of a company that has a passion for the open web, freedom of information, and privacy.

 

Recipe: Pressure cooker risotto


Ingredients

  • 2 cups arborio rice
  • 4 cups flavorful liquid (e.g. stock, broth, white wine, vermouth, etc., in any combination)
  • 1 onion or shallot, finely diced
  • 2 tablespoons fat (e.g. olive oil, butter)
  • Salt and pepper

Takes . Serves 4.

Pressure cookers are a great way to make incredible risotto in a fraction of the time of the traditional method. This recipe describes a base method to make a plain risotto in your pressure cooker, and can be used as the foundation for any number of delicious risottos. The key is the 1:2 ratio of arborio rice to liquid, and a 6 minute, high pressure cook. In this recipe, I use an Instant Pot electric pressure cooker, but you can use a different pressure cooker.

  1. Turn your pressure cooker to "sauté," and add fat to the cooker.
  2. Once fat comes to temperature, add the onions, salt, and pepper, and cook until translucent.
  3. Add your rice and stir to coat the rice with the fat.
  4. Add your liquid and seal your pressure cooker, setting for 6 minutes on high pressure.
  5. Once cook is complete, quick release your pressure cooker, stir, and serve!

Interesting variations on the base include:

  • Mushroom risotto – use three cups of mushroom broth and one cup of dry white wine for your liquid. Add minced garlic to the onions during the sauté, and add dried mushrooms before you seal the pressure cooker. Finish with white truffle oil and tons of grated parmesan cheese.
  • Carbonara risotto – this is what you see in the above photo that I recently prepared. Start the sauté with diced pancetta or thick cut bacon sliced into lardons, until the meat is nicely browned and the fat has rendered. Use three cups of chicken broth and one cup of white wine for your liquid and add lots of pamesan to the pot before the seal. Finish with more parmesan and lots of black pepper. I like to stir in frozen english peas at the end and serve with an egg that has been cooked sous-vide for one hour at 145°F.
  • Add a dollop of mascarpone cheese at the end for an extra creamy risotto.
  • Try using salted, diced ham and english peas, with ham stock as the liquid.

The possibilities are endless!

 

Quick Friday dinner

Pressure cooker truffle, bacon, and pea risotto with a sous vide egg.

 

Fire-pittin' fam

 

Discovered at my local grocery store...

Tim Tam Slam? Here I come!