summaryrefslogtreecommitdiff
path: root/pages/hackerethics.en.md
diff options
context:
space:
mode:
authorvollkorn <vollkorn@cryptobitch.de>2017-07-22 10:57:26 +0000
committervollkorn <vollkorn@cryptobitch.de>2020-05-23 13:40:03 +0000
commit169b42513d794565aee1de229e8c0e5e81bf9d3f (patch)
treee0b5a7276857d8c07bb779c7d61916966d526bbc /pages/hackerethics.en.md
parent8a21219f858883ebe1bcdf122f944ca145f1217d (diff)
committing page revision 5
Diffstat (limited to 'pages/hackerethics.en.md')
-rw-r--r--pages/hackerethics.en.md47
1 files changed, 47 insertions, 0 deletions
diff --git a/pages/hackerethics.en.md b/pages/hackerethics.en.md
new file mode 100644
index 00000000..6bfc100e
--- /dev/null
+++ b/pages/hackerethics.en.md
@@ -0,0 +1,47 @@
1title: Hacker Ethics
2date: 2009-10-20 20:35:00
3updated: 2017-07-22 10:57:26
4author: erdgeist
5tags: hackerethik, hacker
6previewimage: /images/51D-Ga9q_0L.jpg
7
8What are the ethical principles of hacking - motivation and limits
9
10- Access to computers - and anything which might teach you something
11 about the way the world really works - should be unlimited and
12 total. Always yield to the Hands-On Imperative!
13- All information should be free.
14- Mistrust authority - promote decentralization.
15- Hackers should be judged by their acting, not bogus criteria such as
16 degrees, age, race, or position.
17- You can create art and beauty on a computer.
18- Computers can change your life for the better.
19- Don't litter other people's data.
20- Make public data available, protect private data.
21
22The hacker ethics were first written down by Steven Levy in his book
23"Hackers: Heroes of the Computer Revolution (ISBN 0-440-13405-6, 1984).
24He mentions the Tech Model Railroad Club at MIT, their members
25constructed a supersystem of relays and switches - some of them became
26core members the ai lab. They used the term "hack" for an "elaborate ...
27prank" with "serious respect implied". The hacker ethics evolved in a
28time when computers were scarce; and the people sharing a machine had to
29think about rules of cooperation.
30
31The last two point are additions by the CCC from the 80s. After some
32more or less crazy individuals from the hacker scene had the idea of
33offering their "hacker know-how" to the KGB there were intense
34discussions, three letter agencies have a somewhat different opinion
35about freedom of information. As well were intrusions into outside
36systems considered more and more counter productive.
37
38To protect the privacy of the individual and to strengthen the freedom
39of the information which concern the public the yet last point was
40added.
41
42Hacker ethics are —like the rest of the world— as such in constant
43discussion and development. The above rules should be considered as
44guidelines and basis for discussion.
45
46Send any comments and suggestions to the *[Chaos Computer
47Club](mailto:mail@ccc.de)*.