From 169b42513d794565aee1de229e8c0e5e81bf9d3f Mon Sep 17 00:00:00 2001 From: vollkorn Date: Sat, 22 Jul 2017 10:57:26 +0000 Subject: committing page revision 5 --- pages/hackerethics.en.md | 47 +++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 pages/hackerethics.en.md (limited to 'pages') diff --git a/pages/hackerethics.en.md b/pages/hackerethics.en.md new file mode 100644 index 00000000..6bfc100e --- /dev/null +++ b/pages/hackerethics.en.md @@ -0,0 +1,47 @@ +title: Hacker Ethics +date: 2009-10-20 20:35:00 +updated: 2017-07-22 10:57:26 +author: erdgeist +tags: hackerethik, hacker +previewimage: /images/51D-Ga9q_0L.jpg + +What are the ethical principles of hacking - motivation and limits + +- Access to computers - and anything which might teach you something + about the way the world really works - should be unlimited and + total. Always yield to the Hands-On Imperative! +- All information should be free. +- Mistrust authority - promote decentralization. +- Hackers should be judged by their acting, not bogus criteria such as + degrees, age, race, or position. +- You can create art and beauty on a computer. +- Computers can change your life for the better. +- Don't litter other people's data. +- Make public data available, protect private data. + +The hacker ethics were first written down by Steven Levy in his book +"Hackers: Heroes of the Computer Revolution (ISBN 0-440-13405-6, 1984). +He mentions the Tech Model Railroad Club at MIT, their members +constructed a supersystem of relays and switches - some of them became +core members the ai lab. They used the term "hack" for an "elaborate ... +prank" with "serious respect implied". The hacker ethics evolved in a +time when computers were scarce; and the people sharing a machine had to +think about rules of cooperation. + +The last two point are additions by the CCC from the 80s. After some +more or less crazy individuals from the hacker scene had the idea of +offering their "hacker know-how" to the KGB there were intense +discussions, three letter agencies have a somewhat different opinion +about freedom of information. As well were intrusions into outside +systems considered more and more counter productive. + +To protect the privacy of the individual and to strengthen the freedom +of the information which concern the public the yet last point was +added. + +Hacker ethics are —like the rest of the world— as such in constant +discussion and development. The above rules should be considered as +guidelines and basis for discussion. + +Send any comments and suggestions to the *[Chaos Computer +Club](mailto:mail@ccc.de)*. -- cgit v1.2.3