Hacker Culture
Appearance
Thing | Type | Entry Point | Deep Dive | |
---|---|---|---|---|
PGP/GPG encryption | Technical | Generate your first key pair | Web of trust, key signing parties | Crypto Wars, Phil Zimmermann's legal battles |
Lockpicking | Technical | Buy a clear practice lock | TOOOL meetings, Defcon lockpick village | MIT roof and tunnel hacking tradition |
Phone phreaking | Technical | Learn about blue boxes | Build a red box, explore VoIP | Cap'n Crunch, Woz & Jobs' origins |
Linux installation | Technical | Ubuntu on old laptop | Gentoo, compile custom kernel | "I'd just like to interject for a moment..." |
Soldering | Technical | LED throwie project | SMD work, circuit design | Hackerspace equipment sharing |
IRC usage | Social | Join #2600 on EFnet | Run a bouncer, learn DCC | Where hackers actually talk |
Being trans/queer | Identity | Find your local queer hackerspace | Hormone biohacking, name change guides | Lynn Conway, Sophie Wilson, huge overlap with hacker culture |
Anarchism | Political | Read "The Abolition of Work" | Start affinity group, practice security culture | Crypto-anarchism, temporary autonomous zones |
Psychedelics | Lifestyle | Research harm reduction | Underground chemistry, darknet markets | LSD's role in personal computing history |
Dumpster diving | Lifestyle | Check local laws, go at night | Build a trash picking route | Anti-waste, finding discarded tech |
Urban exploration | Lifestyle | Find local storm drains | Tunneling, rooftopping | "Take nothing but pictures, leave nothing but footprints" |
Polyamory | Identity | Read "The Ethical Slut" | Navigate jealousy, communication protocols | Relationship anarchy, hacker openness |
MIT hacks | Cultural | Read IHTFP gallery | Plan and execute harmless prank | "Hacks" vs "pranks" vs "crimes" |
Nootropics | Lifestyle | Start with L-theanine + caffeine | Research peptides, RC stimulants | Biohacking, cognitive enhancement |
Tor usage | Technical | Download Tor Browser | Run a relay, understand onion routing | Privacy as resistance |
Social engineering | Social | Practice pretexting | Physical pentesting, OSINT | Kevin Mitnick's techniques |
Hackerspaces | Social | Visit your local space | Start one, consensus governance | Community ownership, gift economy |
Zine making | Cultural | Photocopy and fold | Silkscreen, bindery access | Samizdat tradition, information freedom |
Programming | Technical | Python on Codecademy | Contribute to FOSS, code golf | "Code is speech" legal arguments |
Gender hacking | Identity | Experiment with presentation | DIY HRT, voice training | Biohacking meets gender liberation |
Cryptocurrency | Technical | Buy $20 of Bitcoin | Run a full node, use Monero | Cypherpunk origins, financial autonomy |
Ham radio | Technical | Get technician license | Packet radio, mesh networks | Emergency comms, decentralization |
3D printing | Technical | Use library printer | Build RepRap, design parts | Right to repair, means of production |
Amphetamine use | Lifestyle | Understand risks, test substances | Optimize productivity safely | Paul Erdős, hacker productivity culture |
Furry culture | Identity | Make a fursona | Commission art, attend cons | Huge tech overlap, self-expression |
CTF competitions | Technical | Try PicoCTF | DEFCON CTF quals | Gamification of hacking skills |
Food hacking | Lifestyle | Try Soylent | DIY complete foods, dumpster meals | Efficiency culture, body as system |
Freight hopping | Lifestyle | Research extensively, find mentor | Cross-country travel | Hacker nomadism, freedom of movement |
Consensus process | Social | Attend activist meeting | Facilitate, block wisely | Anarchist decision making |
BDSM/kink | Identity | Read about consent, negotiate | Build St. Andrew's cross, rope skills | Hacker consent culture, DIY equipment |
Conference attendance | Social | Local BSides | DEFCON, CCC | Hallway track, village culture |
Mesh networking | Technical | Join local mesh | Deploy nodes, routing protocols | Decentralized infrastructure |
Body modification | Identity | Get first piercing | Magnetic implants, RFID chips | Cyborg identity, bodily autonomy |
Direct action | Political | Banner drop | Lockdown techniques, know your rights | Hacktivism IRL |
Mutual aid | Social | Share skills at hackerspace | Start tool library | "From each according to ability..." |
Van life | Lifestyle | Weekend car camping | Convert van, mobile hackerspace | Digital nomadism, housing liberation |
Piracy | Technical | Use BitTorrent | Run seedbox, scene releases | Information wants to be free |
Anonymous culture | Cultural | Lurk moar | Opsec, collective action | "We are legion" |
Stimulant optimization | Lifestyle | Track caffeine intake | Modafinil, research chemicals | Productivity hacking, know your limits |
Anarchist theory | Political | Conquest of Bread | Security culture, affinity groups | Prefigurative politics |
Burner culture | Cultural | Regional burn | Build art car, radical self-reliance | Temporary autonomous zones |
Darknet markets | Technical | Research Tor + Bitcoin | Vendor opsec, drug testing | Silk Road legacy, harm reduction |
Hacktivism | Political | Support EFF | Direct action hacking | Aaron Swartz, free information |
Digital nomadism | Lifestyle | Work remote for a month | Visa runs, coworking spaces | Location independence |
Infosec | Technical | Update your passwords | Bug bounties, responsible disclosure | Security researcher ethics |
Prison abolition | Political | Read "Are Prisons Obsolete?" | Support prisoner tech education | Hacker solidarity with prisoners |
Squat culture | Lifestyle | Visit social center | Open a squat, know the law | Space reclamation, autonomy |
Hardware hacking | Technical | Arduino blink LED | Reverse engineering, chip decapping | Right to repair movement |
Queer theory | Identity | Read "Gender Trouble" | Apply to tech culture | Gender as social construct to hack |
Food Not Bombs | Political | Serve at local chapter | Start chapter, dumpster for ingredients | Mutual aid + direct action |
Biohacking | Technical | Quantified self tracking | CRISPR, grinder culture | Body as system to optimize |
Rave culture | Cultural | Find underground party | DJ/VJ, harm reduction volunteer | PLUR, temporary autonomous zones |
Seed saving | Lifestyle | Save tomato seeds | Guerrilla gardening, seed bombs | Open source genetics |
Police abolition | Political | Know your rights | Copwatch, protest tactics | Surveillance resistance |
Fermentation | Lifestyle | Make kombucha | Brew beer, wild fermentation | DIY food systems |
Community defense | Political | De-escalation training | Form affinity group, know medic basics | Protecting vulnerable communities |
Alternative energy | Technical | Solar phone charger | Off-grid setup, battery banks | Energy independence |
Cyberpunk fashion | Identity | Thrift tech wear | DIY LED clothing, tactical gear | "High tech, low life" |
Mental health hacking | Lifestyle | Meditation app | Psychedelic therapy, peer support | Destigmatization, community care |
Sex work | Lifestyle | Understand SW rights | Tech for SW safety | Bodily autonomy, economic freedom |
Whistleblowing | Political | Use SecureDrop | Operational security, dead drops | Transparency, accountability |
Language learning | Cultural | Duolingo Esperanto | Contribute translations, conlangs | Breaking cultural barriers |
Parkour | Lifestyle | Basic vaults | Flow state, urban navigation | City as playground |
Community networks | Technical | Share WiFi password | Build LibreRouter network | Internet as human right |
Harm reduction | Social | Carry Narcan | Test substances, educate peers | Keeping each other safe |
Cooperative ownership | Political | Join food co-op | Start worker co-op | Economic democracy |
Reality hacking | Cultural | Situationist pranks | Culture jamming, tactical media | "Another world is possible" |
Bash scripting | Technical | Write first .sh file | One-liners, process substitution | "Unix philosophy" in action |
Buffer overflow | Technical | Smash the stack tutorial | ROP chains, heap exploitation | Morris worm legacy |
Packet sniffing | Technical | Wireshark on your network | tcpdump mastery, protocol analysis | "Trust but verify" |
Lock impressioning | Technical | Clay + blank key | File your own keys | Covert entry techniques |
SQL injection | Technical | DVWA practice | Blind SQLi, sqlmap | Bobby Tables comic |
Assembly language | Technical | Hello world in x86 | Shellcode writing | Speaking directly to metal |
Red boxing | Technical | Learn ACTS tones | Build tone generator | Phone fraud history |
Vim mastery | Technical | vimtutor | Write plugins, no arrow keys | Editor wars veteran |
OSINT | Technical | Google dorking | Maltego, facial recognition | Information is everywhere |
Reverse engineering | Technical | Strings command | IDA Pro, radare2 | Understanding > consuming |
Pick guns | Technical | Buy cheap electric pick | Tune tension, feel feedback | Speed vs stealth |
Network pivoting | Technical | SSH tunnels | Meterpreter, proxy chains | Lateral movement |
Beige boxing | Technical | Understand lineman handset | Build your own | Phone tech archaeology |
Regex mastery | Technical | Basic pattern matching | Perl one-liners, sed/awk | Text as data stream |
ARP spoofing | Technical | Understand ARP tables | MITM attacks, ettercap | Layer 2 is forgotten |
Bump keys | Technical | File your first bump key | Every lock type | 999 cuts |
Blue boxing | Technical | 2600 Hz history | In-band signaling exploitation | Woz's first business |
Git internals | Technical | Beyond add/commit/push | Rewrite history, plumbing commands | Distributed resistance |
WiFi cracking | Technical | Monitor mode basics | WPA handshake capture | "Free as in WiFi" |
Electronics debugging | Technical | Use multimeter | Oscilloscope, logic analyzer | Trust no black box |
Tubular locks | Technical | Ace/Chicago locks | Impressioning tools | Vending machine liberation |
Black boxing | Technical | Loop current basics | Ring without billing | Infrastructure exploration |
Make/Makefiles | Technical | Compile hello world | Cross-compilation, kernel builds | Automation philosophy |
DNS hijacking | Technical | Edit hosts file | DNS cache poisoning | Name resolution attack |
Car locks | Technical | Slim jim basics | Decode VIN for cuts | Vehicle liberation |
Rainbow tables | Technical | Understand time-memory tradeoff | Generate custom tables | Precomputation attacks |
Steganography | Technical | Hide text in image | LSB encoding, frequency analysis | Hidden in plain sight |
High-security locks | Technical | Medeco basics | Sidebar mechanics | Security through obscurity fails |
Metasploit | Technical | Run basic exploit | Write custom modules | Point-click-pwn |
Radio direction finding | Technical | Fox hunting basics | Build Yagi antenna | Track the signal |
Wafer locks | Technical | File cabinet picking | Master keying systems | Office infiltration |
Side-channel attacks | Technical | Timing attack concept | Power analysis, EM leaks | Physics betrays crypto |
Elevator hacking | Technical | Service mode access | EPCO keys, fire service | Vertical transportation |
Format strings | Technical | printf vulnerabilities | Arbitrary write primitive | %n is dangerous |
SDR (Software Defined Radio) | Technical | RTL-SDR dongle | GNU Radio, replay attacks | RF is just data |
Safe manipulation | Technical | Understand false gates | Dial manipulation | Patience and graph paper |
Cross-site scripting | Technical | Alert popup | BeEF framework, filter bypass | JavaScript everywhere |
JTAG/SWD | Technical | Bus Pirate basics | Dump firmware, debug hardware | Hardware has no secrets |
Impressioning | Technical | Blank key + file | Reading marks, progressive cuts | Keys tell their secrets |
Heap exploitation | Technical | Understand malloc | House of Spirit, tcache | Memory allocator abuse |
RFID/NFC cloning | Technical | Proxmark3 basics | Build coil antenna | Your badge is my badge |
Handcuff picking | Technical | Bobby pin method | Shim techniques | Emergency skills |
ROP chains | Technical | Return to libc | Gadget finding, ASLR bypass | Code reuse attacks |
Frequency analysis | Technical | Break Caesar cipher | Statistical attacks | Patterns reveal secrets |
Hacker Manifesto | Cultural | Read "Conscience of a Hacker" | Understand hacker rage | "I am a criminal. My crime is curiosity." |
DEF CON attendance | Social | Save money, book early | Villages, parties, linecon | Hacker summer camp |
Aaron Swartz story | Political | Read about JSTOR case | PACER liberation, SecureDrop | Information martyrdom |
Cypherpunks list | Cultural | Read archives | Deploy remailers | "Privacy is necessary for an open society" |
The Jargon File | Cultural | Learn basic terms | Contribute definitions | How hackers speak |
Chaos Communication Congress | Social | Watch streams | Present research, build installations | "We lost control" |
Stallman/FSF | Political | Read GNU Manifesto | Copyleft everything | "Free as in freedom" |
2600 Magazine | Cultural | Buy at Barnes & Noble | Submit article | Hacker quarterly since 1984 |
Homebrew Computer Club | Cultural | Study history | Start local hardware group | Where Apple began |
Tor Project | Technical | Run relay | Contribute code, run exit | Anonymity infrastructure |
EFF membership | Political | Donate $65 | File FOIA requests | Digital rights defense |
Kevin Mitnick saga | Cultural | Read "Ghost in the Wires" | FREE KEVIN movement | Social engineering legend |
Bitcoin whitepaper | Technical | Read Satoshi's paper | Run full node | "Chancellor on brink..." |
Hackers (1995) | Cultural | Watch ironically | Quote "hack the planet" | Our beautiful trash fire |
CCC Camp | Social | Survive German field | Build village | Hacker burning man |
Snowden revelations | Political | Read leaked docs | Understand PRISM/XKeyscore | Mass surveillance confirmed |
Linux kernel contribution | Technical | Fix typo in docs | Submit driver code | Largest human collaboration |
WikiLeaks/Assange | Political | Read cables | Understand dead man switch | Radical transparency |
The WELL | Cultural | Read about history | Find modern equivalent | Proto-social network |
Phrack magazine | Cultural | Read prophile | Write exploit article | "Smashing The Stack" |
HOPE conference | Social | NYC every 2 years | Hotel Pennsylvania | East coast hacker con |
Chelsea Manning | Political | Read chat logs | Support whistleblowers | Trans hacker hero |
MIT AI Lab culture | Cultural | Read Levy's "Hackers" | Tourist vs real hacker | Where it started |
Cult of the Dead Cow | Cultural | Read releases | textfiles.com diving | Hacktivismo origins |
Anonymous ops | Political | Understand LOIC | OpSec practices | "Expect us" |
Demoscene | Cultural | Watch demos | Size-coded intros | Art in 64k |
Morris Worm | Cultural | Understand impact | Read source code | First major worm |
Hacker ethics | Political | Hands-on imperative | Information freedom | Judge by merit |
BBS culture | Cultural | Telnet to remaining | Run Synchronet | Pre-web community |
l0pht/L0phtCrack | Cultural | Read testimony | "Own the Internet in 30 minutes" | Hacking goes to Congress |
Neuromancer | Cultural | Read Gibson | Understand cyberspace origin | Coined the term |
Captain Crunch | Cultural | Learn about Draper | 2600 Hz whistle | Phreaking pioneer |
Open source economics | Political | Cathedral vs Bazaar | Gift economy participation | Status through giving |
IRC culture | Social | Learn netsplits | Run IRCD | Where hackers live |
RSA Conference | Social | Attend parties not talks | Understand dual nature | Corporate vs hacker |
Pirate Bay trial | Political | Read court docs | Understand resilience | "Copy me, I want to travel" |
Hacker News | Social | Get karma | Understand culture | SV echo chamber |
Black Hat vs DEF CON | Social | Understand split | Choose your side | Suits vs t-shirts |
The Cuckoo's Egg | Cultural | Read Stoll's book | Understand old Internet | First cyber thriller |
John Perry Barlow | Political | Declaration of Independence | Cyberspace sovereignty | "Governments of the Industrial World..." |
Hackerspace founding | Social | 501c3 vs anarchist | Consensus hell | Community building |
Xbox modding | Technical | Original Xbox hack | Bunnie's book | Consumer rights |
NSA ANT catalog | Technical | Read leaked tools | Understand capabilities | What they have |
WarGames (1983) | Cultural | "Shall we play a game?" | Understand impact | First hacker movie |
Telephreak zines | Cultural | BIOC, TUC archives | Textfiles preservation | Pre-internet sharing |
Shmoocon | Social | DC in winter | Attend ShmooBall | East coast technical |
Free Software vs Open Source | Political | Understand the split | Pick a side | Freedom vs pragmatism |
Crypto Wars | Political | Clipper Chip fight | Export restrictions | Code as speech |
Defacement archives | Cultural | Zone-H history | Understand motivations | Digital graffiti |
Hardware implants | Technical | USB Rubber Ducky | Build keystroke injector | Physical access game over |
Sneakers (1992) | Cultural | "My voice is my passport" | Social engineering film | Hacker heist |
DMCA resistance | Political | DeCSS t-shirt | Illegal numbers | Code as protest |
Hacker kōans | Cultural | Learn the classics | Write your own | Wisdom through paradox |
Information wants to be free | Political | Understand Brand quote | Apply to daily life | Core tension of info age |
Temporary Autonomous Zone | Political | Read Hakim Bey | Create TAZ | Spaces beyond control |
Phone losers | Cultural | PLA radio show | Prank call mastery | Comedy meets phreaking |
Textfiles.com | Cultural | Browse for hours | Mirror archives | Pre-web knowledge |
Burning Chrome | Cultural | Read Gibson stories | Understand cyberpunk origins | "The street finds its own uses" |
Do-ocracy | Social | Just fucking do it | Don't ask permission | Action over meetings |
UUCP networks | Technical | Understand bang paths | Historical protocols | Decentralized by necessity |
Hardware hacking manifesto | Political | Bunnie Huang's work | Right to repair advocacy | Own your devices |
The Conscience of a Hacker | Cultural | Memorize it | Live it | "You may stop this individual..." |
Fidonet | Technical | BBS networking history | Mesh before mesh | Store and forward |
No Starch Press | Cultural | Collect the set | Write for them | Hacker publisher |
Telecomix | Political | Syrian blackout response | Emergency mesh networks | Hackers in crisis |
Maker Faire | Social | Display project | Teach kids to solder | Show and tell |
Citizen Lab | Political | Read research reports | Contribute OSINT | Academic hacktivism |
The Crypto Museum | Cultural | Visit online collection | Understand Enigma | History of secrets |
Ham radio emergency nets | Technical | ARES/RACES participation | When internet fails | Resilient comms |
Hackaday | Cultural | Daily hardware porn | Get featured | Build logs |
Operation Sundevil | Political | Read EFF coverage | Steve Jackson Games raid | Early hacker crackdown |
FOSDEM | Social | Brussels in February | Developer rooms | European FOSS gathering |
Hardware security modules | Technical | Understand trust roots | Break HSMs | Where keys live |
The Scene | Cultural | Topsites, couriers | 0day release culture | Warez hierarchy |
Halt and Catch Fire | Cultural | Watch all seasons | Understand Cardiff Electric | Tech history drama |
Onion routing | Technical | Understand mix networks | Traffic analysis resistance | Layers of encryption |
PARC history | Cultural | Alto, ethernet origins | Xerox fumbles | Where future was invented |
Mr. Robot | Cultural | Spot the real hacks | fsociety mask | Accurate hacking on TV |
Hacktivist ops | Political | DDoS ethics debate | Target selection | Digital direct action |
Silicon Valley (HBO) | Cultural | Middle-out compression | Tabs vs spaces | Startup culture satire |
Vintage computing | Technical | Restore old hardware | Write assembly for C64 | Preserve history |
The Dark Web | Technical | .onion navigation | Understand markets | Beyond Google |
Mondo 2000 | Cultural | Cyberdelic magazine | Tech meets counterculture | Pre-Wired weird |
Hardware random generators | Technical | Atmospheric noise | Lava lamps at Cloudflare | True randomness |
The Phone Phreak's Handbook | Cultural | Classic UK text | BT system exploitation | British phreaking |
GNU/Linux naming debate | Political | Stallman's argument | Pick your side | Credit where due |
The Hacker Crackdown | Cultural | Sterling's book | Operation Sundevil fallout | Law comes to cyberspace |
Chaos Computer Club | Social | Understand Wau Holland | Bildschirmtext hack | European hacker roots |
Exploit development | Technical | Write shellcode | Bypass ASLR/DEP | Weaponize bugs |
The Anarchist Cookbook | Cultural | Understand problems | Find better sources | What not to do |
Usenet culture | Social | Eternal September | Learn hierarchies | Pre-web forums |
Hardware kill switches | Technical | Laptop mic/camera | Phone baseband isolation | Physical security |
The Mentor | Cultural | Loyd Blankenship story | Hacker manifesto author | Legion of Doom |
Data diodes | Technical | One-way information flow | Air gap networks | Unidirectional security |
31337 speak | Cultural | Understand but don't overuse | Historical importance | How hackers typed |
Capture The Flag | Technical | Start with picoCTF | DEFCON CTF finals | Competitive hacking |
Hackerspaces.org | Social | Find your local | Start new space | Global directory |
The Orange Book | Technical | Trusted systems criteria | Security levels | Government standards |
Cyberpunk 2020 | Cultural | Tabletop RPG | Netrunning rules | Gaming meets hacking |
Side projects | Lifestyle | Always have three | Ship something | "Real artists ship" |
The Crypto Anarchist Manifesto | Political | Tim May's vision | Understand implications | "Just as printing altered..." |
Hardware implant detection | Technical | Physical inspection | X-ray verification | Trust but verify |
The Electronic Frontier | Cultural | Understand frontier metaphor | Digital manifest destiny | Cyberspace colonization |
Silk Road saga | Political | Ross Ulbricht case | Darknet market ethics | Free market absolutism |
Swartz's "Guerilla Open Access" | Political | Read manifesto | LibGen contribution | "Information is power" |
DEFCON badges | Technical | Electronic puzzle badges | Design your own | Hardware conference art |
Maker spaces vs hacker spaces | Social | Understand the split | Navigate politics | Tools vs ideology |
The Pirate Party | Political | Swedish origins | Run for office | Copyright reform |
Exploit-DB | Technical | Search vulns | Submit exploits | Public vulnerability database |
Grey hat ethics | Political | Responsible disclosure debate | Full disclosure | Ethics of exposure |
The Gibson | Cultural | Hacker slang mastery | Cultural references | "Hack the Gibson!" |
Warrant canaries | Political | Understand concept | Check canaries | Passive resistance |
Hardware trojan horses | Technical | Supply chain attacks | Ken Thompson hack | Trusting trust |
Gopherspace | Technical | Pre-web protocol | Run gopher server | Alternative internet |
SMTP exploitation | Technical | Open relay abuse | Email spoofing | Protocol trust |
The Darknet Diaries | Cultural | Podcast binging | Understand stories | Modern hacker tales |
Shodan | Technical | Search exposed systems | Responsible use | Internet's search engine |
War driving | Technical | WiFi mapping | Kismet + GPS | Digital cartography |
The Undernet | Social | IRC network culture | Understand splits | Where hackers went |
Physical pentesting | Technical | Lockpicks + social engineering | Red team ops | Full scope testing |
The Gift Economy | Political | Status through contribution | Potlatch culture | Beyond capitalism |
Stack smashing | Technical | Buffer overflow mastery | NOP sleds | Classic exploitation |
Diybio/Biohacking | Technical | Kitchen CRISPR | Garage biotech | Democratize biology |
The Parallax | Cultural | Hacker newspaper | Submit articles | Print lives |
War dialing | Technical | Scan for modems | ToneLoc/THC-Scan | Finding forgotten systems |
Credit card fraud | Technical | Understand carding | Don't do it | How money moves |
OSINT framework | Technical | Reconnaissance tools | Build profiles | Information aggregation |
The New Hacker's Dictionary | Cultural | Eric Raymond's version | Jargon File evolution | How we speak |
Zero-knowledge proofs | Technical | Understand ZK-SNARKS | Privacy tech | Prove without revealing |
Sneakernet | Technical | Physical data transfer | Dead drops | Bandwidth of station wagon |
The Hacker Ethic book | Political | Pekka Himanen | Protestant work ethic critique | Philosophy of passion |
Threat modeling | Technical | STRIDE/DREAD | Personal opsec | Think like attacker |
Cryptocurrency mining | Technical | GPU rigs | Understand consensus | Proof of work |
BBSes you can still call | Cultural | Telnet to active boards | Run your own | Living history |
Police scanner apps | Technical | Monitor local | Understand trunking | Public airwaves |
Chaos Communication Camp | Social | German hacker camping | Village organization | Outdoor congress |
RFID implants | Technical | Dangerous Things | Become cyborg | Upgrade yourself |
The Dark Net book | Cultural | Jamie Bartlett | Understand communities | Digital underworld |
Solarpunk movement | Political | Tech + sustainability | Build the future | Hope through action |
Hardware fault injection | Technical | Glitch attacks | Clock/voltage manipulation | Physics vs security |
The Whole Earth Catalog | Cultural | Proto-internet | Tools for living | "Access to tools" |
Police tactics | Political | Kettling, IMSI catchers | Counter-surveillance | Know thy enemy |
The Anarchist's Workbench | Political | Build furniture | Self sufficiency | Literal building |
Firmware modification | Technical | JTAG extraction | Backdoor implants | Own the hardware |
Dead man's switches | Technical | Automated disclosure | Insurance files | Leverage through exposure |
The Surveillance Self-Defense | Political | EFF guide | Threat modeling | Practical privacy |
Open hardware | Technical | Design PCBs | KiCad mastery | Hardware freedom |
The Homebrew CPU | Technical | Build from 74xx chips | Understand computation | Demystify computers |
Reality Winner | Political | Leaked NSA docs | Printer dots betrayal | Youngest whistleblower |
The Phone Phreakers | Cultural | Joybubbles story | Blind kid genius | Perfect pitch exploitation |
Cognitive security | Technical | Defend against disinfo | Memetic warfare | Hack human minds |
The Revolution Will Not Be Televised | Political | Gil Scott-Heron | Media critique | But it will be livestreamed |
Assembly democode | Technical | 256 byte intros | Procedural graphics | Beauty in constraints |
Garbage files | Technical | /dev/urandom creativity | Glitch art | Aesthetics of chaos |
The TAO of Programming | Cultural | Read the koans | Zen meets code | "The Tao that can be compiled..." |
Operational Security | Technical | Compartmentalization | Dead drops, burner phones | Trust no one |
The Proof of Work | Political | Labor theory of value | Mining as metaphor | Energy into trust |
Graffiti culture | Cultural | Understand tagging | Digital vandalism | Make your mark |
The Poisoned NUL Byte | Technical | String termination bugs | Path traversal | Classic technique |
Mutual aid networks | Social | Actually help people | Food/mask distros | Solidarity not charity |
The Vulnerable By Design | Technical | HackTheBox, TryHackMe | Practice legally | Gamified learning |
Rage Against Machines | Political | Luddism updated | Critical tech theory | Not all "progress" is |
The Demoscene | Cultural | 4k intros, 64k demos | Pouët.net | Competitive art |
Phone Phreaking Boxes | Technical | Red, blue, beige, black | Rainbow connection | Colorful crime |
The Hacker Diet | Lifestyle | Engineering weight loss | Quantified self | Body as system |
Net neutrality | Political | Understand the fight | Packet equality | Bits don't discriminate |
The Glider (Game of Life) | Cultural | Hacker emblem | Conway's creation | Simple rules, complex behavior |
Root the box | Technical | Physical security CTF | Break into things | Legal B&E |
The Cathedral and Bazaar | Political | ESR's essay | Open vs closed | Development philosophy |
War texting | Technical | SMS exploitation | Car hacking | Everything has antenna |
The Cyphernomicon | Political | Tim May's FAQ | Crypto anarchy manual | Blueprint for freedom |
Stealth camping | Lifestyle | Urban survival | Invisible living | Hide in plain sight |
The Ken Thompson Hack | Technical | Trusting trust | Compiler backdoors | Turtles all the way down |
Hackers on Planet Earth | Social | HOPE conference | NYC hacker gathering | Hotel Pennsylvania lives |
The Blue Screen of Death | Cultural | Kernel panic aesthetic | System failure art | When computers die |
Algorithmic warfare | Political | Drone swarms, AI targeting | Autonomous weapons | Code that kills |
The Hacker's Manifesto | Cultural | Not just Mentor's | Various versions | We are everywhere |