Jump to content

Hacker Culture

From Archive
Revision as of 18:59, 5 June 2025 by Ejfox (talk | contribs) (Created page with "{| class="wikitable" ! Thing !! Type !! Entry Point !! Deep Dive !! Cultural Context | |- | PGP/GPG encryption || Technical || Generate your first key pair || Web of trust, key signing parties || Crypto Wars, Phil Zimmermann's legal battles |- | Lockpicking || Technical || Buy a clear practice lock || TOOOL meetings, Defcon lockpick village || MIT roof and tunnel hacking tradition |- | Phone phreaking || Technical || Learn about blue boxes || Build a red box, explore VoI...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Thing Type Entry Point Deep Dive
PGP/GPG encryption Technical Generate your first key pair Web of trust, key signing parties Crypto Wars, Phil Zimmermann's legal battles
Lockpicking Technical Buy a clear practice lock TOOOL meetings, Defcon lockpick village MIT roof and tunnel hacking tradition
Phone phreaking Technical Learn about blue boxes Build a red box, explore VoIP Cap'n Crunch, Woz & Jobs' origins
Linux installation Technical Ubuntu on old laptop Gentoo, compile custom kernel "I'd just like to interject for a moment..."
Soldering Technical LED throwie project SMD work, circuit design Hackerspace equipment sharing
IRC usage Social Join #2600 on EFnet Run a bouncer, learn DCC Where hackers actually talk
Being trans/queer Identity Find your local queer hackerspace Hormone biohacking, name change guides Lynn Conway, Sophie Wilson, huge overlap with hacker culture
Anarchism Political Read "The Abolition of Work" Start affinity group, practice security culture Crypto-anarchism, temporary autonomous zones
Psychedelics Lifestyle Research harm reduction Underground chemistry, darknet markets LSD's role in personal computing history
Dumpster diving Lifestyle Check local laws, go at night Build a trash picking route Anti-waste, finding discarded tech
Urban exploration Lifestyle Find local storm drains Tunneling, rooftopping "Take nothing but pictures, leave nothing but footprints"
Polyamory Identity Read "The Ethical Slut" Navigate jealousy, communication protocols Relationship anarchy, hacker openness
MIT hacks Cultural Read IHTFP gallery Plan and execute harmless prank "Hacks" vs "pranks" vs "crimes"
Nootropics Lifestyle Start with L-theanine + caffeine Research peptides, RC stimulants Biohacking, cognitive enhancement
Tor usage Technical Download Tor Browser Run a relay, understand onion routing Privacy as resistance
Social engineering Social Practice pretexting Physical pentesting, OSINT Kevin Mitnick's techniques
Hackerspaces Social Visit your local space Start one, consensus governance Community ownership, gift economy
Zine making Cultural Photocopy and fold Silkscreen, bindery access Samizdat tradition, information freedom
Programming Technical Python on Codecademy Contribute to FOSS, code golf "Code is speech" legal arguments
Gender hacking Identity Experiment with presentation DIY HRT, voice training Biohacking meets gender liberation
Cryptocurrency Technical Buy $20 of Bitcoin Run a full node, use Monero Cypherpunk origins, financial autonomy
Ham radio Technical Get technician license Packet radio, mesh networks Emergency comms, decentralization
3D printing Technical Use library printer Build RepRap, design parts Right to repair, means of production
Amphetamine use Lifestyle Understand risks, test substances Optimize productivity safely Paul Erdős, hacker productivity culture
Furry culture Identity Make a fursona Commission art, attend cons Huge tech overlap, self-expression
CTF competitions Technical Try PicoCTF DEFCON CTF quals Gamification of hacking skills
Food hacking Lifestyle Try Soylent DIY complete foods, dumpster meals Efficiency culture, body as system
Freight hopping Lifestyle Research extensively, find mentor Cross-country travel Hacker nomadism, freedom of movement
Consensus process Social Attend activist meeting Facilitate, block wisely Anarchist decision making
BDSM/kink Identity Read about consent, negotiate Build St. Andrew's cross, rope skills Hacker consent culture, DIY equipment
Conference attendance Social Local BSides DEFCON, CCC Hallway track, village culture
Mesh networking Technical Join local mesh Deploy nodes, routing protocols Decentralized infrastructure
Body modification Identity Get first piercing Magnetic implants, RFID chips Cyborg identity, bodily autonomy
Direct action Political Banner drop Lockdown techniques, know your rights Hacktivism IRL
Mutual aid Social Share skills at hackerspace Start tool library "From each according to ability..."
Van life Lifestyle Weekend car camping Convert van, mobile hackerspace Digital nomadism, housing liberation
Piracy Technical Use BitTorrent Run seedbox, scene releases Information wants to be free
Anonymous culture Cultural Lurk moar Opsec, collective action "We are legion"
Stimulant optimization Lifestyle Track caffeine intake Modafinil, research chemicals Productivity hacking, know your limits
Anarchist theory Political Conquest of Bread Security culture, affinity groups Prefigurative politics
Burner culture Cultural Regional burn Build art car, radical self-reliance Temporary autonomous zones
Darknet markets Technical Research Tor + Bitcoin Vendor opsec, drug testing Silk Road legacy, harm reduction
Hacktivism Political Support EFF Direct action hacking Aaron Swartz, free information
Digital nomadism Lifestyle Work remote for a month Visa runs, coworking spaces Location independence
Infosec Technical Update your passwords Bug bounties, responsible disclosure Security researcher ethics
Prison abolition Political Read "Are Prisons Obsolete?" Support prisoner tech education Hacker solidarity with prisoners
Squat culture Lifestyle Visit social center Open a squat, know the law Space reclamation, autonomy
Hardware hacking Technical Arduino blink LED Reverse engineering, chip decapping Right to repair movement
Queer theory Identity Read "Gender Trouble" Apply to tech culture Gender as social construct to hack
Food Not Bombs Political Serve at local chapter Start chapter, dumpster for ingredients Mutual aid + direct action
Biohacking Technical Quantified self tracking CRISPR, grinder culture Body as system to optimize
Rave culture Cultural Find underground party DJ/VJ, harm reduction volunteer PLUR, temporary autonomous zones
Seed saving Lifestyle Save tomato seeds Guerrilla gardening, seed bombs Open source genetics
Police abolition Political Know your rights Copwatch, protest tactics Surveillance resistance
Fermentation Lifestyle Make kombucha Brew beer, wild fermentation DIY food systems
Community defense Political De-escalation training Form affinity group, know medic basics Protecting vulnerable communities
Alternative energy Technical Solar phone charger Off-grid setup, battery banks Energy independence
Cyberpunk fashion Identity Thrift tech wear DIY LED clothing, tactical gear "High tech, low life"
Mental health hacking Lifestyle Meditation app Psychedelic therapy, peer support Destigmatization, community care
Sex work Lifestyle Understand SW rights Tech for SW safety Bodily autonomy, economic freedom
Whistleblowing Political Use SecureDrop Operational security, dead drops Transparency, accountability
Language learning Cultural Duolingo Esperanto Contribute translations, conlangs Breaking cultural barriers
Parkour Lifestyle Basic vaults Flow state, urban navigation City as playground
Community networks Technical Share WiFi password Build LibreRouter network Internet as human right
Harm reduction Social Carry Narcan Test substances, educate peers Keeping each other safe
Cooperative ownership Political Join food co-op Start worker co-op Economic democracy
Reality hacking Cultural Situationist pranks Culture jamming, tactical media "Another world is possible"
Bash scripting Technical Write first .sh file One-liners, process substitution "Unix philosophy" in action
Buffer overflow Technical Smash the stack tutorial ROP chains, heap exploitation Morris worm legacy
Packet sniffing Technical Wireshark on your network tcpdump mastery, protocol analysis "Trust but verify"
Lock impressioning Technical Clay + blank key File your own keys Covert entry techniques
SQL injection Technical DVWA practice Blind SQLi, sqlmap Bobby Tables comic
Assembly language Technical Hello world in x86 Shellcode writing Speaking directly to metal
Red boxing Technical Learn ACTS tones Build tone generator Phone fraud history
Vim mastery Technical vimtutor Write plugins, no arrow keys Editor wars veteran
OSINT Technical Google dorking Maltego, facial recognition Information is everywhere
Reverse engineering Technical Strings command IDA Pro, radare2 Understanding > consuming
Pick guns Technical Buy cheap electric pick Tune tension, feel feedback Speed vs stealth
Network pivoting Technical SSH tunnels Meterpreter, proxy chains Lateral movement
Beige boxing Technical Understand lineman handset Build your own Phone tech archaeology
Regex mastery Technical Basic pattern matching Perl one-liners, sed/awk Text as data stream
ARP spoofing Technical Understand ARP tables MITM attacks, ettercap Layer 2 is forgotten
Bump keys Technical File your first bump key Every lock type 999 cuts
Blue boxing Technical 2600 Hz history In-band signaling exploitation Woz's first business
Git internals Technical Beyond add/commit/push Rewrite history, plumbing commands Distributed resistance
WiFi cracking Technical Monitor mode basics WPA handshake capture "Free as in WiFi"
Electronics debugging Technical Use multimeter Oscilloscope, logic analyzer Trust no black box
Tubular locks Technical Ace/Chicago locks Impressioning tools Vending machine liberation
Black boxing Technical Loop current basics Ring without billing Infrastructure exploration
Make/Makefiles Technical Compile hello world Cross-compilation, kernel builds Automation philosophy
DNS hijacking Technical Edit hosts file DNS cache poisoning Name resolution attack
Car locks Technical Slim jim basics Decode VIN for cuts Vehicle liberation
Rainbow tables Technical Understand time-memory tradeoff Generate custom tables Precomputation attacks
Steganography Technical Hide text in image LSB encoding, frequency analysis Hidden in plain sight
High-security locks Technical Medeco basics Sidebar mechanics Security through obscurity fails
Metasploit Technical Run basic exploit Write custom modules Point-click-pwn
Radio direction finding Technical Fox hunting basics Build Yagi antenna Track the signal
Wafer locks Technical File cabinet picking Master keying systems Office infiltration
Side-channel attacks Technical Timing attack concept Power analysis, EM leaks Physics betrays crypto
Elevator hacking Technical Service mode access EPCO keys, fire service Vertical transportation
Format strings Technical printf vulnerabilities Arbitrary write primitive %n is dangerous
SDR (Software Defined Radio) Technical RTL-SDR dongle GNU Radio, replay attacks RF is just data
Safe manipulation Technical Understand false gates Dial manipulation Patience and graph paper
Cross-site scripting Technical Alert popup BeEF framework, filter bypass JavaScript everywhere
JTAG/SWD Technical Bus Pirate basics Dump firmware, debug hardware Hardware has no secrets
Impressioning Technical Blank key + file Reading marks, progressive cuts Keys tell their secrets
Heap exploitation Technical Understand malloc House of Spirit, tcache Memory allocator abuse
RFID/NFC cloning Technical Proxmark3 basics Build coil antenna Your badge is my badge
Handcuff picking Technical Bobby pin method Shim techniques Emergency skills
ROP chains Technical Return to libc Gadget finding, ASLR bypass Code reuse attacks
Frequency analysis Technical Break Caesar cipher Statistical attacks Patterns reveal secrets
Hacker Manifesto Cultural Read "Conscience of a Hacker" Understand hacker rage "I am a criminal. My crime is curiosity."
DEF CON attendance Social Save money, book early Villages, parties, linecon Hacker summer camp
Aaron Swartz story Political Read about JSTOR case PACER liberation, SecureDrop Information martyrdom
Cypherpunks list Cultural Read archives Deploy remailers "Privacy is necessary for an open society"
The Jargon File Cultural Learn basic terms Contribute definitions How hackers speak
Chaos Communication Congress Social Watch streams Present research, build installations "We lost control"
Stallman/FSF Political Read GNU Manifesto Copyleft everything "Free as in freedom"
2600 Magazine Cultural Buy at Barnes & Noble Submit article Hacker quarterly since 1984
Homebrew Computer Club Cultural Study history Start local hardware group Where Apple began
Tor Project Technical Run relay Contribute code, run exit Anonymity infrastructure
EFF membership Political Donate $65 File FOIA requests Digital rights defense
Kevin Mitnick saga Cultural Read "Ghost in the Wires" FREE KEVIN movement Social engineering legend
Bitcoin whitepaper Technical Read Satoshi's paper Run full node "Chancellor on brink..."
Hackers (1995) Cultural Watch ironically Quote "hack the planet" Our beautiful trash fire
CCC Camp Social Survive German field Build village Hacker burning man
Snowden revelations Political Read leaked docs Understand PRISM/XKeyscore Mass surveillance confirmed
Linux kernel contribution Technical Fix typo in docs Submit driver code Largest human collaboration
WikiLeaks/Assange Political Read cables Understand dead man switch Radical transparency
The WELL Cultural Read about history Find modern equivalent Proto-social network
Phrack magazine Cultural Read prophile Write exploit article "Smashing The Stack"
HOPE conference Social NYC every 2 years Hotel Pennsylvania East coast hacker con
Chelsea Manning Political Read chat logs Support whistleblowers Trans hacker hero
MIT AI Lab culture Cultural Read Levy's "Hackers" Tourist vs real hacker Where it started
Cult of the Dead Cow Cultural Read releases textfiles.com diving Hacktivismo origins
Anonymous ops Political Understand LOIC OpSec practices "Expect us"
Demoscene Cultural Watch demos Size-coded intros Art in 64k
Morris Worm Cultural Understand impact Read source code First major worm
Hacker ethics Political Hands-on imperative Information freedom Judge by merit
BBS culture Cultural Telnet to remaining Run Synchronet Pre-web community
l0pht/L0phtCrack Cultural Read testimony "Own the Internet in 30 minutes" Hacking goes to Congress
Neuromancer Cultural Read Gibson Understand cyberspace origin Coined the term
Captain Crunch Cultural Learn about Draper 2600 Hz whistle Phreaking pioneer
Open source economics Political Cathedral vs Bazaar Gift economy participation Status through giving
IRC culture Social Learn netsplits Run IRCD Where hackers live
RSA Conference Social Attend parties not talks Understand dual nature Corporate vs hacker
Pirate Bay trial Political Read court docs Understand resilience "Copy me, I want to travel"
Hacker News Social Get karma Understand culture SV echo chamber
Black Hat vs DEF CON Social Understand split Choose your side Suits vs t-shirts
The Cuckoo's Egg Cultural Read Stoll's book Understand old Internet First cyber thriller
John Perry Barlow Political Declaration of Independence Cyberspace sovereignty "Governments of the Industrial World..."
Hackerspace founding Social 501c3 vs anarchist Consensus hell Community building
Xbox modding Technical Original Xbox hack Bunnie's book Consumer rights
NSA ANT catalog Technical Read leaked tools Understand capabilities What they have
WarGames (1983) Cultural "Shall we play a game?" Understand impact First hacker movie
Telephreak zines Cultural BIOC, TUC archives Textfiles preservation Pre-internet sharing
Shmoocon Social DC in winter Attend ShmooBall East coast technical
Free Software vs Open Source Political Understand the split Pick a side Freedom vs pragmatism
Crypto Wars Political Clipper Chip fight Export restrictions Code as speech
Defacement archives Cultural Zone-H history Understand motivations Digital graffiti
Hardware implants Technical USB Rubber Ducky Build keystroke injector Physical access game over
Sneakers (1992) Cultural "My voice is my passport" Social engineering film Hacker heist
DMCA resistance Political DeCSS t-shirt Illegal numbers Code as protest
Hacker kōans Cultural Learn the classics Write your own Wisdom through paradox
Information wants to be free Political Understand Brand quote Apply to daily life Core tension of info age
Temporary Autonomous Zone Political Read Hakim Bey Create TAZ Spaces beyond control
Phone losers Cultural PLA radio show Prank call mastery Comedy meets phreaking
Textfiles.com Cultural Browse for hours Mirror archives Pre-web knowledge
Burning Chrome Cultural Read Gibson stories Understand cyberpunk origins "The street finds its own uses"
Do-ocracy Social Just fucking do it Don't ask permission Action over meetings
UUCP networks Technical Understand bang paths Historical protocols Decentralized by necessity
Hardware hacking manifesto Political Bunnie Huang's work Right to repair advocacy Own your devices
The Conscience of a Hacker Cultural Memorize it Live it "You may stop this individual..."
Fidonet Technical BBS networking history Mesh before mesh Store and forward
No Starch Press Cultural Collect the set Write for them Hacker publisher
Telecomix Political Syrian blackout response Emergency mesh networks Hackers in crisis
Maker Faire Social Display project Teach kids to solder Show and tell
Citizen Lab Political Read research reports Contribute OSINT Academic hacktivism
The Crypto Museum Cultural Visit online collection Understand Enigma History of secrets
Ham radio emergency nets Technical ARES/RACES participation When internet fails Resilient comms
Hackaday Cultural Daily hardware porn Get featured Build logs
Operation Sundevil Political Read EFF coverage Steve Jackson Games raid Early hacker crackdown
FOSDEM Social Brussels in February Developer rooms European FOSS gathering
Hardware security modules Technical Understand trust roots Break HSMs Where keys live
The Scene Cultural Topsites, couriers 0day release culture Warez hierarchy
Halt and Catch Fire Cultural Watch all seasons Understand Cardiff Electric Tech history drama
Onion routing Technical Understand mix networks Traffic analysis resistance Layers of encryption
PARC history Cultural Alto, ethernet origins Xerox fumbles Where future was invented
Mr. Robot Cultural Spot the real hacks fsociety mask Accurate hacking on TV
Hacktivist ops Political DDoS ethics debate Target selection Digital direct action
Silicon Valley (HBO) Cultural Middle-out compression Tabs vs spaces Startup culture satire
Vintage computing Technical Restore old hardware Write assembly for C64 Preserve history
The Dark Web Technical .onion navigation Understand markets Beyond Google
Mondo 2000 Cultural Cyberdelic magazine Tech meets counterculture Pre-Wired weird
Hardware random generators Technical Atmospheric noise Lava lamps at Cloudflare True randomness
The Phone Phreak's Handbook Cultural Classic UK text BT system exploitation British phreaking
GNU/Linux naming debate Political Stallman's argument Pick your side Credit where due
The Hacker Crackdown Cultural Sterling's book Operation Sundevil fallout Law comes to cyberspace
Chaos Computer Club Social Understand Wau Holland Bildschirmtext hack European hacker roots
Exploit development Technical Write shellcode Bypass ASLR/DEP Weaponize bugs
The Anarchist Cookbook Cultural Understand problems Find better sources What not to do
Usenet culture Social Eternal September Learn hierarchies Pre-web forums
Hardware kill switches Technical Laptop mic/camera Phone baseband isolation Physical security
The Mentor Cultural Loyd Blankenship story Hacker manifesto author Legion of Doom
Data diodes Technical One-way information flow Air gap networks Unidirectional security
31337 speak Cultural Understand but don't overuse Historical importance How hackers typed
Capture The Flag Technical Start with picoCTF DEFCON CTF finals Competitive hacking
Hackerspaces.org Social Find your local Start new space Global directory
The Orange Book Technical Trusted systems criteria Security levels Government standards
Cyberpunk 2020 Cultural Tabletop RPG Netrunning rules Gaming meets hacking
Side projects Lifestyle Always have three Ship something "Real artists ship"
The Crypto Anarchist Manifesto Political Tim May's vision Understand implications "Just as printing altered..."
Hardware implant detection Technical Physical inspection X-ray verification Trust but verify
The Electronic Frontier Cultural Understand frontier metaphor Digital manifest destiny Cyberspace colonization
Silk Road saga Political Ross Ulbricht case Darknet market ethics Free market absolutism
Swartz's "Guerilla Open Access" Political Read manifesto LibGen contribution "Information is power"
DEFCON badges Technical Electronic puzzle badges Design your own Hardware conference art
Maker spaces vs hacker spaces Social Understand the split Navigate politics Tools vs ideology
The Pirate Party Political Swedish origins Run for office Copyright reform
Exploit-DB Technical Search vulns Submit exploits Public vulnerability database
Grey hat ethics Political Responsible disclosure debate Full disclosure Ethics of exposure
The Gibson Cultural Hacker slang mastery Cultural references "Hack the Gibson!"
Warrant canaries Political Understand concept Check canaries Passive resistance
Hardware trojan horses Technical Supply chain attacks Ken Thompson hack Trusting trust
Gopherspace Technical Pre-web protocol Run gopher server Alternative internet
SMTP exploitation Technical Open relay abuse Email spoofing Protocol trust
The Darknet Diaries Cultural Podcast binging Understand stories Modern hacker tales
Shodan Technical Search exposed systems Responsible use Internet's search engine
War driving Technical WiFi mapping Kismet + GPS Digital cartography
The Undernet Social IRC network culture Understand splits Where hackers went
Physical pentesting Technical Lockpicks + social engineering Red team ops Full scope testing
The Gift Economy Political Status through contribution Potlatch culture Beyond capitalism
Stack smashing Technical Buffer overflow mastery NOP sleds Classic exploitation
Diybio/Biohacking Technical Kitchen CRISPR Garage biotech Democratize biology
The Parallax Cultural Hacker newspaper Submit articles Print lives
War dialing Technical Scan for modems ToneLoc/THC-Scan Finding forgotten systems
Credit card fraud Technical Understand carding Don't do it How money moves
OSINT framework Technical Reconnaissance tools Build profiles Information aggregation
The New Hacker's Dictionary Cultural Eric Raymond's version Jargon File evolution How we speak
Zero-knowledge proofs Technical Understand ZK-SNARKS Privacy tech Prove without revealing
Sneakernet Technical Physical data transfer Dead drops Bandwidth of station wagon
The Hacker Ethic book Political Pekka Himanen Protestant work ethic critique Philosophy of passion
Threat modeling Technical STRIDE/DREAD Personal opsec Think like attacker
Cryptocurrency mining Technical GPU rigs Understand consensus Proof of work
BBSes you can still call Cultural Telnet to active boards Run your own Living history
Police scanner apps Technical Monitor local Understand trunking Public airwaves
Chaos Communication Camp Social German hacker camping Village organization Outdoor congress
RFID implants Technical Dangerous Things Become cyborg Upgrade yourself
The Dark Net book Cultural Jamie Bartlett Understand communities Digital underworld
Solarpunk movement Political Tech + sustainability Build the future Hope through action
Hardware fault injection Technical Glitch attacks Clock/voltage manipulation Physics vs security
The Whole Earth Catalog Cultural Proto-internet Tools for living "Access to tools"
Police tactics Political Kettling, IMSI catchers Counter-surveillance Know thy enemy
The Anarchist's Workbench Political Build furniture Self sufficiency Literal building
Firmware modification Technical JTAG extraction Backdoor implants Own the hardware
Dead man's switches Technical Automated disclosure Insurance files Leverage through exposure
The Surveillance Self-Defense Political EFF guide Threat modeling Practical privacy
Open hardware Technical Design PCBs KiCad mastery Hardware freedom
The Homebrew CPU Technical Build from 74xx chips Understand computation Demystify computers
Reality Winner Political Leaked NSA docs Printer dots betrayal Youngest whistleblower
The Phone Phreakers Cultural Joybubbles story Blind kid genius Perfect pitch exploitation
Cognitive security Technical Defend against disinfo Memetic warfare Hack human minds
The Revolution Will Not Be Televised Political Gil Scott-Heron Media critique But it will be livestreamed
Assembly democode Technical 256 byte intros Procedural graphics Beauty in constraints
Garbage files Technical /dev/urandom creativity Glitch art Aesthetics of chaos
The TAO of Programming Cultural Read the koans Zen meets code "The Tao that can be compiled..."
Operational Security Technical Compartmentalization Dead drops, burner phones Trust no one
The Proof of Work Political Labor theory of value Mining as metaphor Energy into trust
Graffiti culture Cultural Understand tagging Digital vandalism Make your mark
The Poisoned NUL Byte Technical String termination bugs Path traversal Classic technique
Mutual aid networks Social Actually help people Food/mask distros Solidarity not charity
The Vulnerable By Design Technical HackTheBox, TryHackMe Practice legally Gamified learning
Rage Against Machines Political Luddism updated Critical tech theory Not all "progress" is
The Demoscene Cultural 4k intros, 64k demos Pouët.net Competitive art
Phone Phreaking Boxes Technical Red, blue, beige, black Rainbow connection Colorful crime
The Hacker Diet Lifestyle Engineering weight loss Quantified self Body as system
Net neutrality Political Understand the fight Packet equality Bits don't discriminate
The Glider (Game of Life) Cultural Hacker emblem Conway's creation Simple rules, complex behavior
Root the box Technical Physical security CTF Break into things Legal B&E
The Cathedral and Bazaar Political ESR's essay Open vs closed Development philosophy
War texting Technical SMS exploitation Car hacking Everything has antenna
The Cyphernomicon Political Tim May's FAQ Crypto anarchy manual Blueprint for freedom
Stealth camping Lifestyle Urban survival Invisible living Hide in plain sight
The Ken Thompson Hack Technical Trusting trust Compiler backdoors Turtles all the way down
Hackers on Planet Earth Social HOPE conference NYC hacker gathering Hotel Pennsylvania lives
The Blue Screen of Death Cultural Kernel panic aesthetic System failure art When computers die
Algorithmic warfare Political Drone swarms, AI targeting Autonomous weapons Code that kills
The Hacker's Manifesto Cultural Not just Mentor's Various versions We are everywhere