Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
hacker_culture [2018/06/21 00:12]
nathanairplane [What should I be checking out to keep up with hacker culture?]
hacker_culture [2024/04/23 18:40] (current)
ntnsndr [13. Singularity]
Line 7: Line 7:
 ## What is this course about? ## What is this course about?
  
-Are we all hackers now? This course ​chronicles the story of a kind of identity that began among geeky tinkerers and a murky criminal underground,​ only to be adopted by management consultants and CEOs. How has hacker culture helped form our technological lives? Do hacker formations like Wikileaks, Anonymous, and open-source software represent a new kind of politics, or a rejection of politics as we know it? We will explore the contested figure of the hacker in the past, present, and science-fiction of the internet.+Are we all hackers now? This course ​plays with a kind of identity that began among geeky tinkerers and a murky criminal underground,​ only to be adopted by management consultants and CEOs. How has hacker culture helped form our technological lives? Do hacker formations like Wikileaks, Anonymous, and open-source software represent a new kind of politics, or a rejection of politics as we know it? How does this culture manage boundaries of access and power in the online economy? We will explore the contested figure of the hacker in the past, present, and science-fiction of the Internet.
  
-This course includes assigned ​texts, class discussions,​ guest speakers, and a significant component of hands-on practice. All levels of technological prowess are welcome, but expect to learn some skills and to help teach others. Hacker culture is not a spectator sport.+This course includes assigned ​sources, class discussions,​ guest speakers, and a significant component of hands-on practice. All levels of technological prowess are welcome, but expect to learn some skills and to help teach others. Hacker culture is not a spectator sport.
  
 ## Instructor ## Instructor
  
-Nathan Schneider ​  ​ +Nathan Schneider ​("​Nathan"​ or "​Professor Schneider"​)  ​ 
-<​nathan.schneider@colorado.edu> ​  ​ +<​nathan.schneider@colorado.edu> ​([[:​email_etiquette|tips]]) ​     ​ 
-Armory 1B24, meetings ​by appointment ​via email   ​+Armory 1B24    
 +Office hours Wednesdays 3-5 pm or by appointment ​  
 Website: [nathanschneider.info](https://​nathanschneider.info) Website: [nathanschneider.info](https://​nathanschneider.info)
  
Line 22: Line 23:
   * Gain familiarity with the varieties of meaning and mystique surrounding hacker culture   * Gain familiarity with the varieties of meaning and mystique surrounding hacker culture
   * Acquire some hacker skills and the confidence to acquire more independently   * Acquire some hacker skills and the confidence to acquire more independently
-  * Apply lessons from and against hacker cultures in entrepreneurial ​practice+  * Apply lessons from and against hacker cultures in creative ​practice
  
 ## What are the expectations?​ ## What are the expectations?​
  
-Basically, students are expected to hack it. This can take different forms for different people. We'll work together to make the expectations clear, and then it's up to you how and to what degree you'd like to meet them.+### Infrastructure
  
-We will use two platforms to carry out our work for the course:+All students are expected to use two software ​platforms to carry out work for the course: 
 + 
 +  * **[Canvas](https://​canvas.colorado.edu)** is an [open-source](https://​github.com/​instructure/​canvas-lms/​) learning management system developed by a for-profit company, Instructure. It is currently our campus'​s official LMS, and we will use it for a variety of tasks, from announcements to evaluation. 
 +  * **[[Hypothesis]]** is a non-profit, [open-source](https://​github.com/​hypothesis/​) annotation platform that enables users to annotate the Web. Each week we'll use this to annotate and discuss the assigned sources. 
 + 
 +### Bounties 
 + 
 +Grades are not especially conducive to hacking, but we need some equivalent in order for this course to be legible to the university. Therefore, work will be rewarded with [bounties](https://​en.wikipedia.org/​wiki/​Bug_bounty_program). These are functionally the same as grades, but perhaps giving them a different name will prevent them from killing the learning process in the way that grades normally do. 
 + 
 +Bounties will be compiled in (more or less) real time on Canvas for easy access. The final grade will be calculated by adding up the bounties each student has earned. Final grades will be awarded as follows: A (94-100), A- (90-93), B+ (87-89), B (83-86), B- (80-82), C+ (77-79), C (73-76), C- (70-72), D+ (67-69), D (63-66), D- (60-62), F (0-59). 
 + 
 +Extensions under extenuating circumstances are possible by arrangement with the instructor prior to the due date; otherwise, late work is subject to a penalty of approximately one-tenth of the total bounty per day.
  
-  * **[Canvas](https://​canvas.colorado.edu)** is an [open-source](https://​github.com/​instructure/​canvas-lms/​) learning management system developed by a for-profit company, Instructure. It is currently our campus'​s official LMS, and we will use it for a variety of tasks, from announcements to grading. 
-  * **[[Hypothesis]]** is a non-profit, [open-source](https://​github.com/​hypothesis/​) annotation platform that enables users to annotate the internet. Each week we'll use this to annotate and discuss the assigned texts. 
  
 ### Objective 0: Contribute ### Objective 0: Contribute
  
-Students are responsible for contributing to both meatspace ​and virtual ​discussions. No attendance will be taken in class. However, showing up and participating in all scheduled meetings will help you get the most you can out of the course, and absence is not particularly compatible with participation. ​Most weeks will follow a common pattern:+*25 points* 
 + 
 +Computers count from zero, so hackers do too. 
 + 
 +Students are responsible for contributing to discussions ​both in class and through online annotations. Annotations and class participation will be evaluated twice in the semester---at the midterm and at the end. 
 + 
 +#### Annotations 
 + 
 +Using Hypothesis on the assigned readings each week, aim for at least 3-5 thoughtful annotations in each assigned reading, or more if it is helpful for you. At least one should be a reply to a fellow student.  
 + 
 +A strong annotation is one that reflects an understanding of the text and builds on it in some thoughtful way. If you're marking that a certain passage seems important, explain why in your own words. If the passage rubs you the wrong way, explain what you think the author is trying to say and how you see the issue at hand differently. 
 + 
 +Some course materials cannot be annotated, and annotations are not expected for those. 
 + 
 +Bounty rubric: 
 + 
 +  * Critical thinking and prolificacy in online ​discussions ​(15 points) 
 + 
 +#### Class discussions 
 + 
 +Plan to have completed the assigned sources for in-class discussion. Be ready to raise insights and questions from the sources. If we have a guest speaker, be prepared to ask excellent questions. One strategy is to make great annotations on each week's readings, print them out, and bring them to class. 
 + 
 +Also, be ready for a more practice-oriented time. Plan to have done some preparatory thinking on that week's Exploit---the skill we'll be learning together. We'll share our ideas, however preliminary,​ and we'll work on them in class. 
 + 
 +No attendance will be taken in class. However, showing up and participating in all scheduled meetings will help you get the most you can out of the course, and absence is not particularly compatible with participation. 
 + 
 +Bounty rubric: 
 + 
 +  * Geeky enthusiasm, insight, and attention to others in class (10 points) 
 + 
 +Before this assignment is due, you are welcome to propose the bounty you think you have earned with a one-paragraph explanation. The instructor will determine final bounties, taking your input into account.
  
-  * **The first meeting**, plan to have completed the assigned texts for in-class discussion. Be ready to raise insights and questions from the texts. If we have a guest speaker, be prepared to ask excellent questions. Annotations on the texts are due at this time. One strategy is to take great notes on Hypothesis, print them out from your profile page, and bring them to class. 
-  * **The second meeting**, be ready for a more practice-oriented [DiscoTech](http://​detroitprojectarchive.com/​client/​DDJC_amc2012.pdf.zip). Plan to have done some preparatory work on that week's Exploit---the skill we'll be learning together. We'll share our ideas, however preliminary,​ and we'll work on them in class, so plan to have a screen device with you. 
  
 ### Objective 1: Hack ### Objective 1: Hack
  
-Each week, each student should contribute an Exploit---a hack that addresses the week's topic in a creative way, reflecting technical ingenuity (though not necessarily expertise) and engagement with the week'​s ​texts. Exploits are due in Canvas by sunrise on Saturday morning.+*30 points* 
 + 
 +Each week, each student should contribute an Exploit---a hack that addresses the week's topic in a creative way, reflecting technical ingenuity (though not necessarily expertise) and engagement with the week'​s ​sources. Exploits are due in Canvas by sunrise on Saturday morning. 
 + 
 +The format of the Exploits can vary based on the assignment. They might be primarily graphic or primarily textual, or code. Show, don't just tell---provide screenshots,​ diagrams, source code, and other media. If your media are not self-explanatory,​ include a [README](https://​en.wikipedia.org/​wiki/​README) text that explains the nature and rationale of the hack.  
 + 
 +Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Create enough material for about one side of a sheet of paper. Just be sure to include [[engagement with assigned sources|engagement with at least one assigned source]] from the week. Also: do not break the law. 
 + 
 +Bounty rubric:
  
-Each Exploit ​should include a README text that explains the nature and rationale ​of the hack, referencing relevant ​assigned ​texts. You may add supplementary files (code, screenshots,​ videos, etc.) in any [open format](https://​en.wikipedia.org/​wiki/​Open_format) you like. But the README text should include a full explanation and rationale. Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Also: do not break the law.+  * Clear explanation of the Exploit ​along with supporting evidence 
 +  * Creative implementation ​that develops skills 
 +  * Sophisticated engagement with at least one of the module'​s ​assigned ​sources
  
 ### Objective 2: Teach ### Objective 2: Teach
  
-We learn from each other. Each week, usually during the second meeting, a group of students will present to the class about a hacker skill related to that week's topic and Exploit assignment. This presentation will generally precede the week's DiscoTech, so aim to offer something useful---a skill that fellow students may or may not choose to use as part of their own Exploits. Each presentation should be no more than 10 minutes long, with slides and/or a live demo. Slides should be turned in on Canvas before the class period of the presentation begins.+*20 points*
  
-Following ​the presentationstudent presenters ​will lead the DiscoTech, using whatever format they like to invite participation,​ collaboration, ​and sharing ​of ideas.+Hackers learn from each other. Each week, usually during ​the second meetinga group of students ​will present to the class about a hacker skill related ​to that week's topic and Exploit assignment. Each presentation should be no more than 10 minutes long, with slides. One student in the group should turn in the group'​s slides on Canvas before the class period ​of the presentation begins.
  
-### Objective 3Master+At the end of the presentation,​ student presenters will lead an accessible, interactive [DiscoTech](https://​detroitcommunitytech.org/​sites/​default/​files/​librarypdfs/​how-to-discotech.pdf) exercise for the class, using whatever format they like to invite participation,​ collaboration,​ and the sharing of ideas.
  
-Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack for a relevant establishmentarian organization. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it.+Bounty rubric:
  
-The final product itself should be convincing hoax in the voice and visual character of the organization it supposedly represents. For examples of what this could look likeperuse Imperva'​s ​[Hacker Intelligence Reports](http://​www.imperva.com/​DefenseCenter/​HackerIntelligenceReportsor _Wired_'​s ​[Hack Briefs](https://​www.wired.com/​tag/​hack-brief/​).+  * Completion of an accessible and fun introduction to skill and its significance (5 points) 
 +  * Engage with assigned materials, demonstrating both comprehension and critical engagement (5 points) 
 +  * Contextualize ​in culture ​and historydocumenting additional research with both [[:​scholarly_sources|scholarly]] and primary sources, [[:citation_standards|appropriately cited]] in APA format in APA format on slides (5 points) 
 +  * Teach a skill with a well-planned,​ effective DiscoTech exercise relevant to the week'​s ​Exploit ​(5 points)
  
-This project includes a built-in debugging and revision process.+### Objective 3: Master
  
 +*25 points*
  
-### Bounties+Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.
  
-Grades are not especially conducive to hacking, but we need some equivalent ​in order for this course ​to be legible ​to the universityThereforework will be rewarded ​with bounties. These are functionally the same as gradesbut perhaps giving them a different name will prevent them from killing ​the learning process in the way that grades normally ​do. The maximum bounty awarded for each portion of the course is as follows:+If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying ​to figure out how to capitalize on itIn any case, with clear language and documented researchexplain ​the nature of the hack, its significance,​ and a recommendation for what your organization should ​do about it.
  
-  * Objective 0: 25 points +The final product itself should be a convincing hoax in the voice and visual character ​of the organization ​it supposedly represents. For examples of what this could look likeperuse reports from [Cisco](https://​www.cisco.com/​c/​en/​us/​products/​security/​cybersecurity-reports.htmlor [FireEye](https://​www.fireeye.com/​current-threats/​threat-intelligence-reports.html)or _Wired_'​s [Hack Briefs](https://​www.wired.com/​tag/​hack-brief/).
-    * impressive listening and contributions ​in class discussion (10 points) +
-    * impressive critical thinking ​and prolificacy in online annotations (10 points) +
-    * geeky enthusiasm in both (5 points) +
-  * Objective 1: 30 points +
-    * clear explanation along with supporting files in open formats +
-    * adventuresome and rigorous thinking +
-    * creative implementation and stretching of skills +
-    * sophisticated engagement with at least one of the module'​s assigned texts +
-  * Objective 2: 20 points +
-    * accessible and fun introduction to a skill and its significance (5 points) +
-    * how others can go about learning ​it---what basic stepswhat resources? ​(5 points) +
-    * cultural context and history that surrounds it, relation to hacker culture ​(5 points) +
-    * well-planned,​ effective DiscoTech facilitation (5 points) +
-  * Objective 325 points +
-    * project proposal (2 points) +
-    * complete beta version (5 points) +
-    * participation in debugging with substantive comments (5 points) +
-    * revised final (15 points) +
-      * 1,800-to-2,000-word length with correct grammarcorrect spelling, coherence +
-      * comprehension of the hack and convincing, accessible analysis of it +
-      * voice and layout in character with instructive illustrations +
-      * impressive and documented research with both scholarly and primary sources +
-      * appropriate references to at least three assigned texts+
  
-Bounties will be compiled ​in (more or less) real time on Canvas for easy access. The final grade will be calculated by adding up the bounties each student has earned. Based on the stated bounty structuregrades will be awarded ​as follows: A (94-100), A- (90-93), B+ (87-89), B (83-86), B- (80-82), C+ (77-79), C (73-76), C- (70-72), D+ (67-69), D (63-66), D- (60-62), F (0-59).+This project includes a built-in debugging and revision process, as well as a one-minute presentation on the last day of class.
  
 +Bounty rubric:
 +
 +  * Beta version and participation in debugging with substantive comments on two fellow students'​ betas (5 points)
 +  * One-minute presentation,​ with a compelling slide, on the last day of class (5 points)
 +  * Revised final (15 points)
 +    * Complete report, 1,​800-to-2,​000-word length, written clearly and with instructive illustrations
 +    * Comprehension of the hack and convincing, accessible analysis of it
 +    * Impressive and documented research with both [[:​scholarly_sources|scholarly]] and primary sources, [[:​citation_standards|appropriately cited]] in APA format
 +    * Sophisticated [[engagement with assigned sources|engagement with at least two assigned sources]]
  
 ### Terms and conditions ### Terms and conditions
  
-  ​* This syllabus is a living document and may be revised ​by consent of a quorum of all present at any given class time. The current, binding form will be maintained on Canvas. +* This syllabus is a living document and may be revised ​during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement
-  When problems arise, we will seek to address them collaboratively---first through dialogue, then through revision ​of this document, and only if those are inadequate through recourse to outside authorities+We will be intentional about any use of screen deviceswhich [[:​screen_devices|risk]] interfering with our learning experience ​and that of students around us
-  * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission. +* We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission. 
-  * Use of laptops and other screen devices is not permitted in class, except during DiscoTech sessions or for purposes of accessibility. Such devices are [[screen_devices|highly likely]] to interfere with your learning experience and that of students around you. Most class discussions,​ unless otherwise stated, neither require nor will be improved by them. +* We adhere to basic [[:university policies]] regarding accessibility and [[:academic ​honesty]]; we take responsibility for understanding relevant ​policies and procedures. *Verbum sat sapienti est.*
-  ​* We adhere to basic [[university policies]] regarding accessibility and academic ​integrity; we take responsibility for understanding ​them and the relevant procedures. *Verbum sat sapienti est.*+
  
 ## Schedule ## Schedule
  
-All due dates are at p.m. Mountain Time.+Each week's annotations are due at 3 p.m. that Tuesday and Exploits are due on Saturday at sunrise. ​All other due dates are at p.m. Mountain Time:
  
-  * Project proposal ​due: April 3 +  * Project proposal: April 9 
-  * Project beta version ​due: April 19 +  * Project beta version: April 30 
-  * Debugging comments dueApril 24 +  * Final presentationsMay 2 
-  * Final project ​due: May 3+  * Final project: May 2
  
 ## What topics will be covered? ## What topics will be covered?
  
-### 1Whois?+The following is the schedule of readings for the course. One book is required that must be acquired independently:​ Edward Snowden, _Permanent Record_ (Metropolitan Books, 2019).
  
-  ​[Urban Dictionary: "​Hacker"​](http://​www.urbandictionary.com/​define.php?​term=hacker)+### 1. Version history 
 + 
 +  ​Edward Snowden, _Permanent Record_ ​(Metropolitan Books, 2019)Part I
   * Steven Levy, _Hackers: Heroes of the Computer Revolution_ [chapters 1 and 2](https://​www.gutenberg.org/​ebooks/​729) (1984)   * Steven Levy, _Hackers: Heroes of the Computer Revolution_ [chapters 1 and 2](https://​www.gutenberg.org/​ebooks/​729) (1984)
-  * Stewart Brand, "​['​Keep Designing':​ How the Information Economy is being created and shaped by the Hacker Ethic](http://​www.textfiles.com/​hacking/​eslf0006.txt)",​ _Whole Earth Magazine_ (May 1985); too bad the first letter of every line is missing 
-    * For context, read the section on Stewart Brand here: Fred Turner and Christine Larson, "​[Network Celebrity: Entrepreneurship and the New Public Intellectuals](http://​fredturner.stanford.edu/​wp-content/​uploads/​Turner-Larson-Network-Celebrity-PC-2015.pdf),"​ _Public Culture_ 27, no. 1 (2015) 
-  * Robert Graham, "[No, '​Hacker'​ Really Does Mean '​Hacker'​](http://​blog.erratasec.com/​2012/​08/​no-hacker-really-does-mean-hacker.html),"​ _Errata Security_ (August 8, 2012) 
  
-**Exploit: ​How are you already a hacker?** The word *hacker* can mean a lot of thingsAlthough it has tended to be associated with certain breeds of techies, let'​s ​use it capaciously to help introduce ourselves to each other. How have you tinkered ​or tweaked in your lifeHow have you broken in, broken out, or revealed something that was supposed to be hiddenReview the _Urban Dictionary_ definitions,​ find yourself in there, and tell us about it+**Exploit: ​Do something worthwhile with an old machine.** Dig up an obsolete machine and have fun with itWhat'​s ​lying around your house or dorm collecting dustWhat neat software ​have most people forgotten aboutWhat can it do that a fancy smartphone can't? Pay a [visit](http://mediaarchaeologylab.com/visit/) to the Media Archaeology Lab on campus ​and play aroundShow us what you can do with a neglected tool.
- +
-### 2. School +
- +
-  * Eric Steven Raymond, "[How to Become ​Hacker](http://​catb.org/​~esr/​faqs/​hacker-howto.html)"​ (2001-2015) +
-  * Shawna Scott, "[The Code School-Industrial Complex](https://​modelviewculture.com/​pieces/​the-code-school-industrial-complex),"​ _Model View Culture_ (January 21, 2015) +
-  * Paul Ford, "[What Is Code?](http://www.bloomberg.com/graphics/​2015-paul-ford-what-is-code/)" _Businessweek_ (June 11, 2015) +
-  * _[How to DiscoTech](https://​alliedmedia.org/​files/​ddjc_zine_4.pdf)_ Detroit Digital Justice Coalition 4 (2012) +
-  * Sarabeth Berk et al., _[Future-casting CU Boulder as the First Public University that Hacks the Academy](https://​www.colorado.edu/​academicfutures/​2017/​12/​20/​future-casting-cu-boulder-first-public-university-hacks-academy-berk-greenstein-karas)_,​ CU Boulder Academic Futures Whitepaper (December 2017) +
- +
-**Exploit: Teach yourself a bit of a computer language ​and make a program that does something neat.** It might seem scary or fancy, but it's completely possible to start learning how to code online, and lots of hackers are more or less self-taught. Whatever ​you know already, use this Exploit to learn a new programming language or trick. You can do something as simple as the classic "​[Hello World!](https://​en.wikipedia.org/​wiki/​Hello_world_program)"​ or [make your own chatbot](https://​chatbotlab.io/​). Try the elegant language [Python on CodeAcademy](https://​www.codecademy.com/​learn/​learn-python),​ or get visual ​with [JavaScript at Khan Academy](https://​www.khanacademy.org/​computing/​computer-programming/​programming),​ or play with [MIT's Scratch](https://​scratch.mit.edu/​). The [Hour of Code project](https://​code.org/​learn) has tons of activity ideas on top of that.+
  
-### 3Craft+### 2White, black, gray
  
 +  * Edward Snowden, _Permanent Record_ (Metropolitan Books, 2019): Part II
 +  * Charlton McIlwain, _Black Software: The Internet and Racial Justice, from the AfroNet to Black Lives Matter_ (Oxford University Press, 2020): {{:​lib:​mcilwain-blacksoftware.pdf|28-43,​ 55-58}}
   * The Mentor, "[The Conscience of a Hacker (aka Hacker Manifesto)](http://​phrack.org/​issues/​7/​3.html),"​​ _Phrack_ 1, no. 7 (1986)   * The Mentor, "[The Conscience of a Hacker (aka Hacker Manifesto)](http://​phrack.org/​issues/​7/​3.html),"​​ _Phrack_ 1, no. 7 (1986)
-  * Paul Graham, "​[Hackers and Painters](http://​www.paulgraham.com/​hp.html)"​ (May 2003) 
-    * Also, don't miss: Hrag Vartanian, "​[Putin Says Hackers Are Like Artists 'Who Wake Up in the Morning in a Good Mood and Start Painting'​](https://​hyperallergic.com/​382792/​putin-says-hackers-are-artists-who-wake-up-in-the-morning-in-a-good-mood-and-start-painting/​),"​ _Hyperallergic_ (June 1,2017) 
-  * Gabriella Coleman, "The Craft and Craftiness of Hacking,"​ in _[Coding Freedom: The Ethics and Aesthetics of Hacking](http://​gabriellacoleman.org/​Coleman-Coding-Freedom.pdf)_ (Princeton University Press, 2013) 
-  * Tsutomu Shimomura, "​[Catching Kevin](http://​www.wired.com/​1996/​02/​catching/​),"​ _Wired_ (February 1, 1996) 
-  * Jay Kirby and Lori Emerson, "[As If, or, Using Media Archaeology to Reimagine Past, Present, and Future: An Interview with Lori Emerson](http://​ijoc.org/​index.php/​ijoc/​article/​view/​4764),"​ _International Journal of Communication_ 10 (June 2016) 
  
-**Exploit: ​Do something worthwhile with an old machine.** Dig up an old, obsolete machine ​and have fun with it. What's lying around your house or our campus collecting dust? What neat software have most people forgotten about? What can it do that a fancy smartphone can't? Pay a [visit](http://mediaarchaeologylab.com/visit/) to the Media Archaeology Lab on campus and play aroundShow us what you can do with a neglected tool.+**Exploit: ​Compose a testimony or manifesto.** Using appropriate typography ​and layout, ​or posting ​it to an appropriate place, create ​testimony or [manifesto](https://www.theatlantic.com/entertainment/​archive/​2014/​06/​manifestos-a-manifesto-the-10-things-all-manifestos-need/​372135/) that introduces your hacker philosophy ​to the worldIdentify yourself any way you like or not at all. Seek to recruit, warn, alienate, terrify, or inform readers. Let the medium be part of the message.
  
-### 4. Sharing 
  
-  * Ron Rosenbaum, "​[Secrets of the Little Blue Box](http://​www.lospadres.info/​thorg/​lbb.html),"​ _Esquire_ (October 1971) +### 3Hacktivism
-  * Gabriella Coleman, "The Tale of Two Legal Regimes"​ in _[Coding Freedom: The Ethics and Aesthetics of Hacking](http://​gabriellacoleman.org/​Coleman-Coding-Freedom.pdf)_ (Princeton University Press, 2013) +
-  * Jim Hamerly and Tom Paquin with Susan Walton, "​[Freeing the Source: The Story of Mozilla](http://​www.oreilly.com/​openbook/​opensources/​book/​netrev.html),"​ in _Open Sources: Voices from the Open Source Revolution_,​ Chris DiBona, Sam Ockman and Mark Stone, eds. (O'​Reilly,​ 1999) +
-  * Lawrence Lessig, "​[\<​free_culture\>​](https://​randomfoo.net/​oscon/​2002/​lessig/​),"​ O.Reilly Open Source Conference (July 24, 2002)---watch Flash presentation if you can+
  
-**ExploitSet a valuable piece of information free.** Lots of data and knowledge are caught up in places that aren't accessible---in offline archivesbehind paywalls or private intranets, trapped in someone'​s mind. Following the hacker dictum ​"information wants to be free," let something loose in a way that will facilitate its flow. Post it online in an appropriate spot, or share it with those who will, or find a liberating offline place for it, like a flyer or a megaphone. Be sure to explain what makes the information valuable and how what you do with it is meaningfully liberating.+  ​Edward Snowden, _Permanent Record_ (Metropolitan Books, 2019): Part III 
 +  ​Gabriella Coleman, "[The Public Interest Hack](https://limn.it/​articles/​the-public-interest-hack/)," ​_limn_ (February 2017)
  
-### 5Law+**Exploit: Set a valuable piece of information free.** Lots of data and knowledge are caught up in places that aren't accessible---in offline archives, behind paywalls or private intranets, trapped in someone'​s mind. Following the hacker dictum that "​information wants to be free," let something loose in a way that will facilitate its flow. Post it online in an appropriate spot, or share it with those who will, or find a liberating offline place for it, like a flyer or a megaphone. Be sure to explain what makes the information valuable and how what you do with it is meaningfully liberating.
  
-  * William EScheuerman, "​[Digital Disobedience and the Law](http://​www.tandfonline.com/​doi/​abs/​10.1080/​07393148.2016.1189027?​journalCode=cnps20&​),"​ _New Political Science_ 38, no. 3 (2016) +### 4Legal hacking
-  * Dymitri Kliener, _[The Telekommunist Manifesto](http://​telekommunisten.net/​the-telekommunist-manifesto/​)_ (Network Notebooks, 2010), pp. 20-25, 33-43 +
-  * Part One in Trebor Scholz and Nathan Schneider (eds.), _{{:​lib:​ourstohack-part1.pdf|Ours to Hack and to Own: The Rise of Platform Cooperativism,​ a New Vision for the Future of Work and a Fairer Internet}}_ (OR Books, 2016) +
-    * Explore [The Internet of Ownership](https://​ioo.coop)+
  
-And watch one of the following films:+  * Lawrence Lessig, "[Laws that Choke Creativity](https://​www.youtube.com/​watch?​v=7Q25-S7jzgs),"​ TED (November 15, 2007) 
 +  * Gabriella Coleman, "The Tale of Two Legal Regimes"​ in _[Coding Freedom: The Ethics and Aesthetics ​of Hacking](http://​gabriellacoleman.org/​Coleman-Coding-Freedom.pdf)_ (Princeton University Press, 2013)
  
-  ​_Citizenfour_,​ directed by Laura Poitras (2014) +**ExploitMake a remix.** Take something out in the world and turn it into something else. Mash up music or video into something surprising, or rewrite a book. Create a bit of knock-off *[shanzhai](https://en.wikipedia.org/wiki/Shanzhai)*. Make some [fan-fiction](https://​archiveofourown.org/​). Save a website'​s HTML code to your computer and mess with it. Explore the possibilities of free culture, or what culture would be like if it were really free. Show us what you can come up with.
-  ​_[The Internet'​s Own BoyThe Story of Aaron Swartz](https://archive.org/details/TheInternetsOwnBoyTheStoryOfAaronSwartz)_, directed by Brian Knappenberger ​(2014)+
  
-**Exploit: Devise a clever license or corporate structure.** Following in the tradition of legal hacks, from Richard Stallman'​s GNU Manifesto to Dymitri Kleiner'​s copyleft license, develop a hack of your own. What would you love to be able to do that current IP or corporate structrues tend not to allow? How can you tweak them? Like the Green Bay Packers, you could imagine a company that has to give everything to charity if it ever sells out. Or a copyright notice that empowers some colors of cats but not others. Do your best to make to both radically impactful and actually enforceable.+### 5School
  
-### 6. Order +  ​Paul Ford, "[What Is Code?](https://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/)" ​_Bloomberg Businessweek_ ​(June 112015
- +  * Eric Steven Raymond ​and Rick Moen, "[How To Ask Questions The Smart Way](http://​catb.org/​~esr/​faqs/​smart-questions.html)"​ (2001-2014)
-  ​Jeremy Adam Smith, "[How to Design the Commons (or, Elinor Ostrom Explained!)](http://www.shareable.net/blog/how-to-design-the-commons)," ​_Shareable_ ​(December 102009+
-  * Eric Steven Raymond, "[How To Ask Questions The Smart Way](http://​catb.org/​~esr/​faqs/​smart-questions.html)"​ (2001-2014)+
     * A sort-of reply: Julia Evans, "[How to Ask Good Questions](http://​jvns.ca/​blog/​good-questions/​)"​ (December 31, 2016)     * A sort-of reply: Julia Evans, "[How to Ask Good Questions](http://​jvns.ca/​blog/​good-questions/​)"​ (December 31, 2016)
-  * Roger Hodge, "​[First,​ Let's Get Rid of All the Bosses](http://​www.newrepublic.com/​article/​122965/​can-billion-dollar-corporation-zappos-be-self-organized),"​ _The New Republic_ (October 4, 2015) 
-  * Coraline Ada Ehmke, "[The Dehumanizing Myth of Meritocracy](https://​modelviewculture.com/​pieces/​the-dehumanizing-myth-of-the-meritocracy),"​ _Model View Culture_ (May 19, 2015) 
  
-**Exploit: ​Submit ​bug report or feature request to an open-source project.** Critical ​to any open-source project is the participation of the community. For those of us who are not amazing software engineersone of the best (and most rewarding) ways of participating is through feedbackIdentify which software that you use is open-source---Canvas and Hypothesis are a start---and try to find where the developers communicate with users. (It's usually in the Issues section of the project'​s GitHub page.) Write to them with a bug you've noticed ​or a feature you'd like to see. Keep in mind Raymond'​s ​essay on questions to help ensure your recommendation is usefully phrased and well researched.+**Exploit: ​Teach yourself ​bit of a computer language and make a program that does something neat.** It might seem scary or fancy, but it's completely possible ​to start learning how to code online, and lots of hackers are more or less self-taughtWhatever ​you know already, ​use this Exploit ​to learn a new programming language or trick. You can do something as simple as the classic "​[Hello World!](https://​en.wikipedia.org/​wiki/​Hello_world_program)"​ or [make your own chatbot](https://​chatbotlab.io/​). Try the elegant language [Python on CodeAcademy](https://​www.codecademy.com/​learn/​learn-python), or get visual ​with [JavaScript at Khan Academy](https://​www.khanacademy.org/​computing/​computer-programming/​programming), ​or play with [MIT'​s ​Scratch](https://​scratch.mit.edu/​). The [Hour of Code project](https://​code.org/​learn) has tons of activity ideas on top of that.
  
-### 7Identities+### 6Avatars
  
-  * Gabriella Coleman, "​[Phreaks,​ Hackers, and Trolls: The Politics of Transgression and Spectacle](http://​gabriellacoleman.org/​wp-content/​uploads/​2012/​08/​Coleman-Phreaks-Hackers-Trolls.pdf),"​ in _The Social Media Reader_ (New York University Press, 2012) 
   * Donna Haraway, "[A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century](https://​web.archive.org/​web/​20120214194015/​http://​www.stanford.edu/​dept/​HPS/​Haraway/​CyborgManifesto.html),"​ in _Simians, Cyborgs and Women: The Reinvention of Nature_ (Routledge, 1991)   * Donna Haraway, "[A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century](https://​web.archive.org/​web/​20120214194015/​http://​www.stanford.edu/​dept/​HPS/​Haraway/​CyborgManifesto.html),"​ in _Simians, Cyborgs and Women: The Reinvention of Nature_ (Routledge, 1991)
-  * Lisa Nakamura, "[Race in/for CyberspaceIdentity Tourism ​and Racial Passing on the Internet](http://faculty.humanities.uci.edu/poster/​syllabi/​readings/​nakamura.html),"​ in _Works and Days_ 13 (1995) +  * Gabriella Coleman, "[Phreaks, Hackers, and TrollsThe Politics of Transgression ​and Spectacle](http://gabriellacoleman.org/wp-content/uploads/2012/08/Coleman-Phreaks-Hackers-Trolls.pdf)," ​in _The Social ​Media Reader_ (New York University Press2012)
-  * Leonie Maria Tanczer, "​[Hacktivism and the Male-Only Stereotype](http:​//journals.sagepub.com/doi/abs/10.1177/​1461444814567983)," ​_New Media & Society_ 18no. 8 (2016)+
  
-**Exploit: Create an identity.** Who you appear to be can change what you can do. Try on a new online mask---on a social network, ​for instance, or across ​fewForm a profile, take on a character, and see what happens. What can you do that you might not otherwise try?+**Exploit: Create an identity.** Who you appear to be can change what you can do. Try on a new online mask---on a social network, ​an online game, or a creator platformDevelop ​a profile, take on a character, interact with others, and see what happens. What can you do that you might not otherwise try? Share screenshots or other documentation of what your identity allowed you to do.
  
-### 8Anonymity+### 7Craft
  
-  * _[We Are Legion: The Story of the Hacktivists](https://www.youtube.com/watch?​v=-zwDhoXpk90)_, directed by Brian Knappenberger ​(2012+  * Paul Graham, "[Hackers and Painters](http://www.paulgraham.com/hp.html)" ​(May 2003
-  * J. Nathan Matias, "[The Real Name Fallacy](https://​blog.coralproject.net/​the-real-name-fallacy/​)," The Coral Project (January 5, 2017) +  * Gabriella Coleman, "​The ​Craft and Craftiness of Hacking," ​in _[Coding Freedom: ​The Ethics and Aesthetics of Hacking](http://gabriellacoleman.org/Coleman-Coding-Freedom.pdf)(Princeton University Press2013)
-  * LA Crypto Crew, "[How to Become Anonymous Online](http://hyperallergic.com/342262/a-guide-to-becoming-anonymous-online/​),"​ _Hyperallergic_ (December 2, 2016) +
-  * Erika Eichelberger,​ "[What I Learned Hanging Out With Nigerian Email Scammers](http://​www.motherjones.com/​politics/​2014/​03/​what-i-learned-from-nigerian-scammers)," _Mother Jones_ ​(March 202014)+
  
-**Exploit: ​Get someone who doesn'​t know who you are to do something worthwhile.** Use your identity created in the previous module, ​or try another, or use no identity at allThis can be online, over various kinds of networks, or in meatspaceTake a stranger to lunchor get a stranger to send you a dollarMake a friendor notBut exercise ​your capacity to influence the world without doing it as you.+**Exploit: ​Practice the craft of self-optimization.** Work on your development as a hacker by hacking yourself. See math or art where you didn't beforeMeasure some aspect ​of your life, routine, mind, or body, and test strategies for optimizing itExplore creativecounter-intuitive possibilitiesFor inspirationconsider resources like _[Lifehacker](http://​lifehacker.com/)_ and [Hacker News](https://​news.ycombinator.com/​). What are you optimizing for, and why? Produce data based on your experiment and present ​it so the rest of us can better hack ourselves.
  
-### 9Security+### 8Arms race
  
-  * Andrea Peterson, "[Everything You Need to Know about Encryption: Hint, You're Already Using It](https://​www.washingtonpost.com/news/​the-switch/​wp/​2015/​12/​08/​you-already-use-encryption-heres-what-you-need-to-know-about-it/​)," ​_The Washington Post_ (December 82015+  * Bruce Schneier, "[The Security Mirage](https://​www.youtube.com/watch?​v=wQJC2MMB8nA)," ​TED (Apr 272011
-  * Andy Greenberg, "[Meet Moxie Marlinspike,​ the Anarchist Bringing Encryption to All of Us](https://​www.wired.com/2016/07/meet-moxie-marlinspike-anarchist-bringing-encryption-us/​),"​ _Wired_ (July 31, 2016) +  * Maddy Crowell, "[The Hacker](https://​www.cjr.org/the_feature/runa-sandvik.php)," ​_Columbia Journalism Review_ ​(April 172023)
-  * Priyanka Kaura, "​[Imagine Otherwise: Simone Browne on Resisting Surveillance & Creative Collaborations](https://​ideasonfire.net/​podcast/​9-simone-browne/​)," ​_Imagine Otherwise_ (May 4, 2016) +
-  * Dan Geer, "​[Prediction and The Future of Cybersecurity](http://​geer.tinho.net/​geer.uncc.5x16.txt)" ​(October 52016)+
  
-**Exploit: ​Audit your communication practices and identify improvements.** Review some of your regular practicesdigital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.isaca.org/​Journal/​archives/​2010/​Volume-1/​Pages/​Performing-a-Security-Risk-Assessment1.aspx) about the [nature](http://​webkay.robinlinus.com/​) of potential ​[threats](https://​panopticlick.eff.org/​) ​and how they might be mitigatedCheck out software listed at [PRISM Break](http://​prism-break.org/​),​ if the dangers are digital. Try out a few patches, and determine whether they'​re worth the trouble.+**Exploit: ​Plot a world takeover.** Dream up a viruszero-dayor other sort of cyberattack that will break and reshape ​the world orderDescribe in detail how it works and what it will do, as well as potential ​limitations ​and possible defenses against itWhat would you do with the power you obtain? Let your imagination go wild.
  
-### 10Making+### 9Social engineering
  
-  * Lori Emerson, "{{:lib:​emerson-hackerculture.pdf|Making the Invisible Visible: Hacking, Glitch, Defamiliarization in Digital Literature}}," ​in _Reading Writing Interfaces: From the Digital to the Bookbound_ ​(University of Minnesota Press2014+  * Tsutomu Shimomura, "[Catching Kevin](http://www.wired.com/​1996/​02/​catching/​)," ​_Wired_ ​(February 11996
-  * Antti Silvast ​and Markku Reun, "[Multiple Users, Diverse UsersAppropriation of Personal Computers by Demoscene Hackers](https://link.springer.com/chapter/10.1007/978-1-4471-5493-8_7)," in _Hacking EuropeFrom Computer Cultures to Demoscenes_G. Alberts and R. Oldenzieleds. (Springer2014) +  * Robert W. Gehl and Sean T Lawson, "[PretextingRecognizing the Mitnick Mythology](https://direct.mit.edu/​books/​oa-monograph/​5281/chapter/3666131/Pretexting-Recognizing-the-Mitnick-Mythology)," in _Social EngineeringHow CrowdmastersPhreaksHackers, and Trolls Created a New Form of Manipulative Communication_ ​(MIT Press2022)
-  * Casey Fiesler, "[An Archive of Their Own: A Case Study of Feminist HCI and Values in Design](https://​cfiesler.files.wordpress.com/​2016/​02/​chi2016_ao3_fiesler.pdf),"​ _CHI'​2016_ (May 7-12, 2016) +
-  * "​[Shenzhen:​ The Silicon Valley ​of Hardware](https://​www.youtube.com/​watch?​v=SGJ5cZnoodY)," _Wired_ (2016)+
  
-**Exploit: ​Make a remix.** Take something out there and turn it into something elseMash up music or video into something surprising, or rewrite ​book. Make some fan-fiction. Save website'​s HTML code to your computer and mess with itExplore ​the possibilities of free cultureor what culture would be like if it were really free. Show us what you can come up with.+**Exploit: ​Get someone who doesn'​t know who you are to do something.** Use your identity created in an earlier module, or try another, or use no identity at allThis can be online, over various kinds of networks, ​or in meatspace. Take a stranger to lunch, or get stranger to send you a dollar. Make a friend or an enemyBut exercise your capacity to influence ​the worldwithout your existing social capital, through crafty engineering of interpersonal interactions.
  
-### 11Money+### 10Security culture
  
-  * Satoshi Nakamoto, "[Bitcoin open source implementation of P2P currency](http://p2pfoundation.ning.com/forum/topics/​bitcoin-open-source),"​ P2P Foundation Ning (February 11, 2009) +  * Priyanka Kaura, "[Imagine Otherwise: Simone Browne on Resisting Surveillance & Creative Collaborations](https://ideasonfire.net/podcast/9-simone-browne/​)," ​_Imagine Otherwise_ ​(May 42016
-  * Nathan Schneider, "​[After the Bitcoin Gold Rush](http://​www.newrepublic.com/​article/​121089/​how-small-bitcoin-miners-lose-crypto-currency-boom-bust-cycle)," ​_The New Republic_ ​(February 242015+  * Jessica MGoldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://archive.thinkprogress.org/meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​)," ​_ThinkProgress_ ​(April 292014)
-  * Meghan, "​[Bitcoin Doesn'​t Need Women](http://​www.bitcoinnotbombs.com/​bitcoin-doesnt-need-women/​),"​ _Bitcoin Not Bombs_ (January 8, 2014) +
-  * Matthew Leising, "​[The ​Ether Thief](https://www.bloomberg.com/features/​2017-the-ether-thief/​),"​ _Bloomberg_ (June 13, 2017) +
-  * Nathan Schneider, "[Why the Tech Elite Is Getting Behind Universal Basic Income](https://​www.vice.com/​read/​something-for-everyone-0000546-v22n1),"​ _Vice_ (January 6, 2015) +
-    * If you like, some related fiction: "[Read the Into the Black Contest'​s Winning Story, Set in a Future Where Economics Are Also Humane](https://​io9.gizmodo.com/​read-the-into-the-black-contests-winning-story-set-in-1822338909)," ​_io9_ (January 242018)+
  
-**Exploit: ​Get some of a crypto-asset ​and conduct transactions.** One way or another---from an exchange, or a friend, or a classmate---obtain ​some quantity ​of a Bitcoin-like asset and carry out a transaction or two or more. If you can do something useful with itall the betterShare a record of the transaction ​on the appropriate blockchainConsider popular ​online ​wallets like [Blockchain.info](http://blockchain.info/) and [Coinbase](https://​www.coinbase.com/), or something elseProbably avoid "​core"​ wallets because ​they could download several gigs of data to your hard drive before they can even get started.+**Exploit: ​Audit your communication practices ​and identify improvements.** Review ​some of your regular practices, digital ​and otherwiseand locate potential security vulnerabilitiesDo some [research](https://​www.consumerreports.org/​issue/​data-privacy) ​on [potential threats](https://​coveryourtracks.eff.org/) and how they might be mitigated. What do online ​services you use [make you agree to](https://​privacyspy.org/)? Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://prism-break.org/)[PrivacyTools](https://​www.privacytools.io/), or [Surveillance Self-Defense](https://​ssd.eff.org/) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether ​they're worth the trouble.
  
-### 12Power+### 11Disintermediation
  
-  * Mattathias Schwartz, "[Cyberwar for Sale](http://​www.nytimes.com/​2017/​01/​04/​magazine/​cyberwar-for-sale.html)," _The New York Times Magazine_ (January 42017) +  * Yochai Benkler, "[Peer Productionthe Commons, and the Future of the Firm](https://doi.org/10.1177/1476127016652606)," ​_Strategic Organization_ 15, no. 2 (May 2017
-  * Sophie Toupin, "​[Gesturing Towards '​Anti-Colonial Hacking' ​and Its Infrastructure](http://peerproduction.net/issues/​issue-9-alternative-internets/​peer-reviewed-papers/​anti-colonial-hacking/​)," ​_Journal of Peer Production_ 9 (2016+  * Lana Swartz, "[Blockchain DreamsImagining Techno-Economic Alternatives After Bitcoin](http://llaannaa.com/papers/Swartz_Blockchain_Dreams.pdf)," ​in _Another Economy Is Possible: Culture and Economy in a Time of Crisis_edManuel Castells82-105 (Polity, 2017)
-  * Christian Blum and Christina Isabel Zuber, "[Liquid DemocracyPotentials, Problems, and Perspectives](http://onlinelibrary.wiley.com/wol1/doi/10.1111/​jopp.12065/​full)," ​_Journal ​of Political Philosophy_ 24no2 (2016) +
-  * Nathan Heller"​[Estonia,​ the Digital Republic](https://​www.newyorker.com/​magazine/​2017/​12/​18/​estonia-the-digital-republic),"​ _The New Yorker_ ​(December 18--25, 2017)+
  
-**Exploit: Devise a tool that disrupts a gatekeeper.** What is in the way of something worth doing? What systems do you encounter that are needlessly cumbersome or inefficient?​ Who is leeching profits without contributing any useful value? Come up with an idea---you don't have to implement it, especially if it's risky---that would clear the way. Bypass a government or skirt around a middleman. Get the goods.+**Exploit: Devise a tool that disrupts a gatekeeper.** What is in the way of something worth doing? What systems do you encounter that are needlessly cumbersome or inefficient?​ Who is leeching profits without contributing any useful value? Come up with an idea---you don't have to implement it, especially if it's risky---that would clear the way. Bypass a government, master the university bureaucracy, ​or skirt around a corporate ​middleman. Get the goods.
  
-### 13Gentrification+### 12Beyond the valley
  
-  * Mark Zuckerberg, "​[The ​Hacker Way](https://​www.wired.com/2012/02/zuck-letter/​)," ​_Wired_ (February 12012+  * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021) 
-  Brett Scott, "[The Hacker Hacked](https://aeon.co/essays/how-yuppies-hacked-the-original-hacker-ethos)," ​_Aeon_ ​(August 102015)+  * Fernanda R. Rosa, "[From Community Networks to Shared Networks: ​The Paths of Latin-Centric Indigenous Networks to a Pluriversal Internet](https://​www-tandfonline-com.colorado.idm.oclc.org/doi/full/10.1080/1369118X.2022.2085614)," ​_InformationCommunication & Society_ 26, no. 11 (2023
 + 
 +**Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a maptell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "real" world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://www.raphkoster.com/games/laws-of-online-world-design/​the-laws-of-online-world-design/​from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help. 
 + 
 +### 13. Singularity 
 + 
 +  * Alessandro Delfanti and Johan Söderberg, "[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](https://​ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism)," _Ephemera_ 18, no. 3 (2018)
   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)
-  * "​[Don'​t Be Evil: Fred Turner on Utopias, Frontiers, and Brogrammers](https://​logicmag.io/​03-dont-be-evil/​),"​ _Logic_ 3 (2017) 
  
-**Exploit: ​Co-opt something.** Notice something ​that is fresh, original, grassroots, and authentic, and devise a plan for transforming it into something palatable and safe for a dominant class, especially if it's profitableEntice some of the originators to sell outReflect on what doing that feels like, and consider what the consequences might be for the originating communities.+**Exploit: ​De-recuperate ​something.** Notice something fresh, original, grassroots, and authentic ​that has been transformed ​into something palatable, profitable, ​and safe for a dominant class. ​Reverse ​the processIdentify forgotten radicalisms,​ incite people to re-embrace them, and renew their dangerousness to the powers that be. Reflect on the consequences of doing so. 
  
 ### 14. Mastery ### 14. Mastery
Line 251: Line 256:
   * _[Ars Technica](http://​arstechnica.com/​)_   * _[Ars Technica](http://​arstechnica.com/​)_
   * [Geek Feminism Wiki](http://​geekfeminism.wikia.com/​wiki/​Geek_Feminism_Wiki)   * [Geek Feminism Wiki](http://​geekfeminism.wikia.com/​wiki/​Geek_Feminism_Wiki)
 +  * [Hack_Curio](https://​hackcur.io/​)
   * [Hacker News](https://​news.ycombinator.com/​)   * [Hacker News](https://​news.ycombinator.com/​)
-  * _[Hackernoon](https://​hackernoon.com/​)_+  * _[Hacker News, The](https://​thehackernews.com/​)_ 
 +  * _[Hacker Noon](https://​hackernoon.com/​)_
   * _[Krebs on Security](http://​krebsonsecurity.com/​)_   * _[Krebs on Security](http://​krebsonsecurity.com/​)_
   * _[Lifehacker](http://​lifehacker.com/​)_   * _[Lifehacker](http://​lifehacker.com/​)_
Line 260: Line 267:
   * [Slashdot](http://​slashdot.org/​)   * [Slashdot](http://​slashdot.org/​)
   * [Textfiles](http://​www.textfiles.com/​directory.html)   * [Textfiles](http://​www.textfiles.com/​directory.html)
-  * [ThreatLevel](http://www.wired.com/threatlevel/) at _WIRED_+  * [r/unixporn](https://www.reddit.com/r/unixporn/)
   * _[xkcd](https://​xkcd.com/​)_   * _[xkcd](https://​xkcd.com/​)_
 +  * _[Zero Day](https://​zetter.substack.com/​)_
  
 --- ---
  
 [ [[note:​hacker_culture|Notes]] ] [ [[note:​hacker_culture|Notes]] ]