From 169b42513d794565aee1de229e8c0e5e81bf9d3f Mon Sep 17 00:00:00 2001
From: vollkorn <vollkorn@cryptobitch.de>
Date: Sat, 22 Jul 2017 10:57:26 +0000
Subject: committing page revision 5

---
 pages/hackerethics.en.md | 47 +++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 47 insertions(+)
 create mode 100644 pages/hackerethics.en.md

diff --git a/pages/hackerethics.en.md b/pages/hackerethics.en.md
new file mode 100644
index 00000000..6bfc100e
--- /dev/null
+++ b/pages/hackerethics.en.md
@@ -0,0 +1,47 @@
+title: Hacker Ethics
+date: 2009-10-20 20:35:00 
+updated: 2017-07-22 10:57:26 
+author: erdgeist
+tags: hackerethik, hacker
+previewimage: /images/51D-Ga9q_0L.jpg
+
+What are the ethical principles of hacking - motivation and limits
+
+-   Access to computers - and anything which might teach you something
+    about the way the world really works - should be unlimited and
+    total. Always yield to the Hands-On Imperative!
+-   All information should be free.
+-   Mistrust authority - promote decentralization.
+-   Hackers should be judged by their acting, not bogus criteria such as
+    degrees, age, race, or position.
+-   You can create art and beauty on a computer.
+-   Computers can change your life for the better.
+-   Don't litter other people's data.
+-   Make public data available, protect private data.
+
+The hacker ethics were first written down by Steven Levy in his book
+"Hackers: Heroes of the Computer Revolution (ISBN 0-440-13405-6, 1984).
+He mentions the Tech Model Railroad Club at MIT, their members
+constructed a supersystem of relays and switches - some of them became
+core members the ai lab. They used the term "hack" for an "elaborate ...
+prank" with "serious respect implied". The hacker ethics evolved in a
+time when computers were scarce; and the people sharing a machine had to
+think about rules of cooperation.
+
+The last two point are additions by the CCC from the 80s. After some
+more or less crazy individuals from the hacker scene had the idea of
+offering their "hacker know-how" to the KGB there were intense
+discussions, three letter agencies have a somewhat different opinion
+about freedom of information. As well were intrusions into outside
+systems considered more and more counter productive.
+
+To protect the privacy of the individual and to strengthen the freedom
+of the information which concern the public the yet last point was
+added.
+
+Hacker ethics are —like the rest of the world— as such in constant
+discussion and development. The above rules should be considered as
+guidelines and basis for discussion.
+
+Send any comments and suggestions to the *[Chaos Computer
+Club](mailto:mail@ccc.de)*.
-- 
cgit v1.2.3