blob: 6bfc100ec560326f306105fde394e41b020c5cf1 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
title: Hacker Ethics
date: 2009-10-20 20:35:00
updated: 2017-07-22 10:57:26
author: erdgeist
tags: hackerethik, hacker
previewimage: /images/51D-Ga9q_0L.jpg
What are the ethical principles of hacking - motivation and limits
- Access to computers - and anything which might teach you something
about the way the world really works - should be unlimited and
total. Always yield to the Hands-On Imperative!
- All information should be free.
- Mistrust authority - promote decentralization.
- Hackers should be judged by their acting, not bogus criteria such as
degrees, age, race, or position.
- You can create art and beauty on a computer.
- Computers can change your life for the better.
- Don't litter other people's data.
- Make public data available, protect private data.
The hacker ethics were first written down by Steven Levy in his book
"Hackers: Heroes of the Computer Revolution (ISBN 0-440-13405-6, 1984).
He mentions the Tech Model Railroad Club at MIT, their members
constructed a supersystem of relays and switches - some of them became
core members the ai lab. They used the term "hack" for an "elaborate ...
prank" with "serious respect implied". The hacker ethics evolved in a
time when computers were scarce; and the people sharing a machine had to
think about rules of cooperation.
The last two point are additions by the CCC from the 80s. After some
more or less crazy individuals from the hacker scene had the idea of
offering their "hacker know-how" to the KGB there were intense
discussions, three letter agencies have a somewhat different opinion
about freedom of information. As well were intrusions into outside
systems considered more and more counter productive.
To protect the privacy of the individual and to strengthen the freedom
of the information which concern the public the yet last point was
added.
Hacker ethics are —like the rest of the world— as such in constant
discussion and development. The above rules should be considered as
guidelines and basis for discussion.
Send any comments and suggestions to the *[Chaos Computer
Club](mailto:mail@ccc.de)*.
|