OS theme
Dark theme
Light theme
My iPhone battery
My iPhone Wi-Fi
Current motion
Click for current location
👈🏼 🕸💍 👉🏼
Skip to main content

Learn more about me. Email me at













Listened to 05. Little Fear of Lightning

The show puts the spotlight on Looking Glass’s shiny head and the gang goes bonkers! Plus: A game is played! See how you know your squid facts! TopgallantRadio.com - Radio for sailors

By Watchmen: On the Clock


Tom Petty:

1. Overrated.
2. Not Alive.


Listened to Shutdown Fullcast 7.32 - BLOOD WEEK 2017

Let’s review some true facts about the 2017 season after this week:Rutgers has more conference wins than Indiana, the team that just took Michigan to overtimeSyracuse had the exact same final score - a 27-24 win - against Clemson as they did against PittBoston College had more rushing yards, passing yards, and points than AlabamaTennessee outscored Washington, tripled up Wazzu, and still lost to South CarolinaNotre Dame and UVa have the same recordAnd that isn’t a diss, somehow Welcome to BLOOD WEEK, y’all.

By Shutdown Fullcast


The Evolution of Hacker Culture

10 min read

Growing up during the 1980's, I quickly developed a fascination for technology and computing. I'm a bit too young to have experienced the very early glory days of the computer revolution, missing the Homebrew Computer Club and the innovations at Bell Labs and MIT. That said, my life was greatly influenced by early "hacker culture."

The Birth of Hacker Culture

Steven Levy's "Hackers: Heroes of the Computer Revolution," was published in 1984, and attempts to capture and define what Levy calls "hacker culture." Levy's central concept is that of the Hacker Ethic, a set of principles that he believes will bring forth a better world, if carefully adhered to:

  1. Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-on Imperative!

  2. All information should be free.

  3. Mistrust authority—promote decentralization.

  4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position.

  5. You can create art and beauty on a computer.

  6. Computers can change your life for the better.

—The "Hacker Ethic," Steven Levy

I didn't hear of the Hacker Ethic until my early teens, but it immediately resonated with me because of my curiousity about technology, mistrust of authority, and Robin Hood-esque desire to hack the world through computing.

Ocean's Geeky Eleven

In my Senior year of High School in 1997-98, I was President of my school's Computer Club (look out, ladies). The list of our exploits was impressive, and included, but was not limited to:

  1. Deploying a Slackware Linux-powered server on our school's T1 line, which we used to host websites, to learn to program/script, and to host other services. I still remember using upwards of 40 AOL free trial floppies to install Slackware on that server.

  2. Causing an overly-protective MCSE administrator at our school so much frustration that he resigned in protest of our continued ability have a Linux server on "his" network. Mind you, our server was the most secure device on the network...

  3. Providing free training for parents and other students on how to use the Internet, including Gopher training, and a comparison of World Wide Web search engines (we were all pretty big on AltaVista, preferring it to Lycos and Yahoo).

I have so many fond memories of those days, where I fed my curiousity, and truly believed that I could change the world with technology.

My favorite, and perhaps most illustrative, story from that time in my life concerns our Computer Club's participation in the Distributed RC5 challenge.

Before I recount the story, I'll note that the facts have gone through years of filtration in my brain, and some of the specific numbers may not be accurate. But, the general strucuture and spirit of the story is very much true.

The goal of the RC5 challenge was to claim a $10,000 prize funded by RSA Labs as part of their "Secret Key Challenge." Teams could register to join a massive distributed computing effort to claim the prize, installing a simple piece of software, an "agent", onto computers under their control that would use spare cycles to eventually find the winning key.

The RC5 challenge embodied everything we cared about: harnessing the power of computing to make a dent in the world. Our merry band of computing misfits had a real chance at hacker glory! The Computer Club attacked the problem in earnest, registering our team, and installing the agent on our Linux server and our home computers.

The contest had a leaderboard, where you could see how your team stacked up against other teams globally, including a few university and commercial supercomputer projects. At the beginning, our ranking was shamefully low, and we decided that we had to do something about it.

Our first course of action was, of course, harnessing all of the computing power at our disposal. This involved several weeks of covert effort getting the agent installed on every computer in the school, without any of the teachers or administrators noticing. At the time, it was pretty easy to hide the agent in plain-sight on the vintage Macintosh computers on campus, but the Windows computers were a bit trickier. Through some deft programming, we were eventually able to hide our agents on those as well, and we saw our team begin to rocket up the leaderboard, stalling just outside of the top 25.

Unsatisfied with our ranking, the Computer Club decided to take radical action. We would break into our rival high school, who had a very large computer lab filled with new computers, and covertly hide our agent on their network. At the time, I felt like Danny Ocean in Ocean's Eleven. We cleverly disguised ourselves as students, and made our way into the computer lab in the hours after school had closed, but before the doors were locked. Using our Windows and Mac forks of the agents, designed to hide themselves, we were quickly able to deploy our code throughout the entire computer lab.

The rival high school's network turned out to be locked down a bit more than we planned, and was blocking all outgoing traffic on ports other than the very basic services (HTTP, FTP, SMTP, POP3). We quickly adapted, building new versions of the agents that sent traffic over port 25 (SMTP), and then relayed it through our Linux server.

Twenty four hours later, our team was ranked in the top 10, alongside supercomputers and massive university-supported teams. We were doing something big! Soon enough, we felt that we'd crack the top 5, and have a real shot at the prize and glory.

Our excitement was short-lived, and over the next week, we were caught, and nearly expelled from school. We had to apologize to our rival high school, and point out how we exploited their systems. The jig was up.

Parrish's New Hacker Ethic

I was reminded of this time of my life as I recently watched Allison Parrish's talk, "Programming is Forgetting: Toward a New Hacker Ethic" from the 2016 Open Hardware Summit. Allison Parrish is a computer programmer, poet, and educator from Brooklyn, NY.

In her talk, Parrish shares her experiences with hacker culture, and proposes an evolution toward a new hacker ethic that she believes will "foster a technology culture in which a high value is placed on understanding and being explicit about your biases about what you’re leaving out, so that computers are used to bring out the richness of the world instead of forcibly overwriting it."

The "philosophical kernel" of Levy's hacker ethic that Parrish takes issue with is the "Hands-On Imperative," which is referenced in rule 1 of his hacker ethic.

Hackers believe that essential lessons can be learned about the systems—about the world—from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things. They resent any person, physical barrier, or law that tries to keep them from doing this.

This is especially true when a hacker wants to fix something that (from his point of view) is broken or needs improvement. Imperfect systems infuriate hackers, whose primal instinct is to debug them.

—Hackers, p. 28

Parrish asserts that the Hands-On Imperative assumes that the world is a system that can be understood perfectly and broken down into components that can also be understood. When stated this way, its clear that the imperative has inherent hubris. The world is a complex place, and every person has a point of view and bias. In addition to personal bias, the divide between the analog and the digital world is problematic:

The process of computer programming is taking the world, which is infinitely variable, mysterious, and unknowable... and turning it into procedures and data.... The world, which consists of analog phenomena infinite and unknowable, is reduced to the repeatable and the discrete. In the process of programming, or scanning or sampling or digitizing or transcribing, much of the world is left out or forgotten. Programming is an attempt to get a handle on a small part of the world so we can analyze and reason about it. But a computer program is never itself the world.

—Allison Parrish, "Programming is Forgetting: Toward a New Hacker Ethic"

Due to this impedence mismatch between reality and the Hands-On Imperative, Parrish proposes a revised hacker ethic which is, instead of a set of black and white assertions, a series of questions more well-suited to the analog and variable world that we live in:

  1. Access to computers should be unlimited and total. Who gets to use what I make? Who am I leaving out? How does what I make facilitate or hinder access?

  2. All information should be free. What data am I using? Whose labor produced it and what biases and assumptions are built into it? Why choose this particular phenomenon for digitization or transcription? And what do the data leave out?

  3. Mistrust authority—promote decentralization. What systems of authority am I enacting through what I make? What systems of support do I rely on? How does what I make support other people?

  4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position. What kind of community am I assuming? What community do I invite through what I make? How are my own personal values reflected in what I make?

—"Hacker Questions," Allison Parrish

Parrish's questions are a direct response to the first four tenets of Levy's Hacker Ethic, but she leaves his last two assertions alone, as she believes that they're valuable:

  1. You can create art and beauty on a computer.

  2. Computers can change your life for the better.

After all, every hacker believes that computers can change lives in real, and beautiful ways.

Bringing out the Richness of the World

I'd encourage you to watch Parrish's talk to get the full story, as it resonated with me strongly, and caused me to reflect on my own life's journey through hacker culture, and my experiences with the darker and more subtle side-effects of Levy's seminal work on the hacker ethic.

How would my journey be different if hacker culture had been influenced by Parrish's Hacker Questions, rather than Levy's Hacker Ethic? How would my high school Computer Club story have changed? What would the technology industry look like today if hacker culture looked more like Parrish's vision, rather than Levy's?

Above all, I share Parrish's desire to shape a hacker culture that "brings out the richness of the world, instead of forcibly overwriting it." The world today is more connected and impacted by technology and computing than ever before, but there are also a lot of truly frightening things happening. Hackers who embrace this new ethic have the potential to change the world for the better: to create opportunities and access for people who may otherwise be left behind; to call out bias and strive to surface more points of view; to invite the formation of more welcoming communities.

More often than not, the average person engages with computing and the internet through avenues so fundamentally tainted with systematic algorithmic bias, that major governments are capable of being sabatoged by exploiting these systems. I, for one, believe that hackers united around an ethic that surfaces bias, improves access to important and contextualized information, and creates more authentic community, can change the world for the better.

So, go forth, fellow hackers, and bring out the richness of the world.