December 2017

S M T W T F S
     12
34 5 6789
1011 12 13141516
1718 19 20212223
2425 2627282930
31      

Style Credit

Expand Cut Tags

No cut tags
jarandhel: (Default)
Wednesday, June 14th, 2006 11:56 am
"It's unnatural. It goes against God's plan. It wasn't designed to do that. It wasn't designed to be used that way."

You've heard the arguments before, right? Gay marriage, and the ever-attendant reaction to "sodomy", is always in the news these days. Particularly in an election year. And, predictably, there is the reactionary outcry against such "perversions" which usually cites exactly the above reasoning.

It occurred to me, suddenly, that reasoning sounds familiar (and not just because of the repitition). Particularly the last two. And I found myself thinking: who cares about what it was DESIGNED to do, we care about what it CAN do!

There it is. Welcome to the new cyber-morality.

If you haven't figured out where I'm going with this yet, this will probably go over your head, but let me put it simply: human bodies are systems, right? Who is it that specializes in figuring out ways to make systems work in ways other than they were designed? Who is it that finds ways to make systems do things their makers may not have intended? Who is it that cares less about what a system was made to do than about what it can do? Who is it that cares less about the rules imposed by the maker of the system, and more about freedoms afforded by the way they can make the systems actually work in their hands?

By now, I'm pretty sure a good set of my friends already have their hands raised going: "We do!" And they'd be right.

Food for thought, huh? Besides, there's a certain coolness factor in being able to say with perfect honesty that making love to your boyfriend is a really sweet hack.
jarandhel: (Default)
Friday, January 27th, 2006 07:33 pm
I wonder if otherkin of the trans-specied variety are examples of metaphysical steganography, or if it's just a simple alternate data stream? ;-)

*realizes that many people reading my friends list are not going to get this, but those who do will likely spit-take their coffee and/or alternative hyper-caffinated beverages onto their monitors laughing at this idea...*
jarandhel: (Default)
Saturday, December 31st, 2005 11:11 am
First of all, I'd just like to say that [livejournal.com profile] tlttlotd is an evil, evil man. :) You, sir, have *single-handedly* increased my music library by about six GIGS in the past few days (or you will have when the three bittorrents I'm currently downloading complete, anyway.) How, you ask? *points to the current music line on the entry* I read your memory logs. Yeah, you hooked me on game remixes. (Not that I'm really complaining. *grins*)

Now onto the substantive portion of this entry. I've been reading the book "The Hacker Diaries: Confessions of Teenage Hackers" by Dan Verton that [livejournal.com profile] rhiannasilel got me for Christmas. Finding it very interesting so far. I'm in the middle of the second chapter, currently, and already I've been struck by something. One of the most common questions the hacker community seems to get is "how do I learn how to hack?" I know I've asked it many times myself, though usually silently to myself or through carefully crafted web searches rather than outright asking others. And I'm noticing that so far, none of these kids seems to have learned the same way. Some of them found the BBS scene first, others had computers at home with no modems and started cutting their teeth on that. Some started from the software end, others from the hardware. Some started with computers and moved onto phreaking, others went the other way. One of them even started by taking apart his parents VCR. With so many avenues into hacking, and indeed so many different things that can be considered hacking in the first place, the question of how one learns to hack really becomes meaningless. The question might as well be simply "how do I learn?", and obviously the answer is going to be as individual as you are. And if you don't know how you learn, chances are nobody else does either.

It's also analogous to the question "How do I write?". Nobody can answer that, fully. Sure, they can point you to basics about plotting and grammar, characterization and style, conflict and tension and atmosphere and a hundred other TOOLS for writing. But they can't really teach you how to use those tools to actually write. The reason for that is that only you can decide what you will write, when it comes down to it. Your writing is your own, unique and individual. Unless copied, no two books or stories will ever be just the same. And writing isn't about copying. It's about making something new, something that comes from inside yourself.

In another sense, being a hacker is like being Otherkin. It's something you are, not something you learn or become. You can learn skills along the way to make yourself better in walking your path, you can gain experience to understand your path better, but deep down at the core of it all hacking is all about a certain attitude, a certain mindset or quality that you either have or you don't. A certain curiosity, perhaps, though I'm not quite sure that's the right word. I'm not even sure there is a word to describe the burning hunger that is felt when confronted with certain concepts, certain ideas. The things that keep us awake, late into the night, trying to figure out just how something worked or how to fix a certain bug or solve a problem. The thing that drives us not just to solve one problem, but to seek out the next one, and the next beyond that. Always learning.

I don't know if there were hackers before computers, but I suspect there were. If you look for them, you can probably find them. Thomas Edison, perhaps? Leonardo da Vinci, almost certainly. Those men and women who approach life with the attitude that there is much to be learned, and then do so. Those willing to transcend the limits of a single discipline and allow the different arts and sciences they have mastered to intermingle symbiotically and make something altogether new to this world. WE saw it with Da Vinci's merging of art and science, and we see it now in the tools of the hackers: Hardware, software, networking, programming, security, encryption, stealth, strategy, social engineering. Magic. And more...

I think this attitude has been called many things. There was a series recently on television that called such a man a "Pretender". And Da Vinci himself was called a "Renaissance Man". And there's the more colloquial "jack of all trades", of course, which downplays the significance of such men. But I think the one I like the best is the oldest one I know: Samildinach. Roughly, it means the same as Jack of All Trades, but rather than implying "Master of None" as the former phrase does, it instead implies Mastery of them all. It's also a rather appropriate reference to use in discussing hacking, as well, since it was the title of the celtic god Lugh. And who better than a Sun God to represent a Craft whose most explicit function is throwing light on the hidden places in the world inside our machines?
jarandhel: (Default)
Thursday, December 22nd, 2005 08:11 pm
You never really realize how much you've changed till you reach a point in your life when things have come full circle again and you confront the beginning of your path from a new and more informed perspective.

I'm not sure exactly when I got the idea I wanted to be a hacker, or where I got the idea from. I know it was at some point early on in highschool. Maybe it was simply that so many people seemed to assume I already was one that it just looked like something I would fit into. All I remember for sure is that, at some point, I started actually looking into it seriously. I wanted to learn how to be a hacker.

I know, fairly early on, I came across the Kevin Mitnick story. I remember ordering from my public library system the books Takedown by Tsutomu Shimomura, and The Fugitive Game by Jonathan Littman, though honestly at this point I can't recall which one I enjoyed more. While reading one or the other of those books, I know I started keeping a notebook; the first notebook I'd ever kept on a non-academic subject, I believe. I may have even gotten the idea from something mentioned in one of the books about Mitnick, though at this point my memory is not clear enough to be sure of that. I kept in that notebook a great deal of information. Unix commands that were mentioned, even though I'd never even seen a unix system. Default passwords. Usernames. Important websites that had been mentioned. I remember I found quite a lot that interested me at the time that I felt was worthy of writing down for future reference. In retrospect, I'm not sure I'd feel the same way. I kind of wish that I could go back over that notebook and review what, exactly, was there. I got rid of it years ago, though, when I thought I had grown out of my desire to be a hacker like Kevin.

I do know that my interest (and my notes) grew from there, though. I watched the movie Hackers and taught myself the good info it contained (such as the names of some of the rainbow books) as well as the bullshit. I watched War Games in much the same way. I started to search online for more information. I found some very nice sites, real repositories of info, even if most of it was just in text files. I kept every one of the addresses for those sites written down in my notebook, rather than bookmarked, along with a small description of what was on the site. In many cases, I came to memorize the urls for the best sites. And my notebook was growing. Entire pages were devoted to common passwords, common usernames, default login/password combinations on various systems... even systems I had never heard of outside obscure references in one book on a famous hacker or another. Most people would probably never have bothered writing them down, after all these were well-known security vulnerabilities, obviously places would have fixed them by now. But I caught on fairly early to one simple fact: the weakest point of security on any system is the human one, and default login/password combos are defaults because they're simple and easy to remember. That's always going to make them attractive from a human perspective. And, in fact, eventually that paid off for me. On a popular free email provider, I decided to try a bit of brute-force hacking with just the default login/password combos from various systems. I got into two separate accounts. Three, actually, since one of them was forwarding mail to a third account on another free email provider with the same username and password combo. I never did anything with this information other than look at some of the mail that had already been opened (I was being very cautious so as not to even mark an email read that had not been and thus leave evidence that I had been there), though I did make the mistake of sharing it with someone else who went on to delete everything in the accounts. Needless to say, the passwords for those accounts were rapidly changed and I no longer have access to them.

At another point I also have trouble pinpointing, I gave up on hacking. I believe I was still in highschool, or recently graduated. But it really just lost its appeal for me. Breaking into systems started seeming less and less like a worthy goal. Cracking software, even, seemed petty when confronted by the growing Open-Source movement that were rapidly working to duplicate functions of high-priced software for free on many environments. Why download a warez version of Photoshop 5 and have no reliable way to update it in the future when you can download programs like the GIMP for free, even on Windows platforms?

And slowly, over the years, I've stopped even thinking of people like Kevin as hackers. More and more, they've become crackers in my mind. So they can break into people's accounts... there are automated programs that can do as much using dictionary attacks. I've started looking at a different group as the real hackers. Programmers, going back to the original sense of the word. Modders. Virtual Adepts. All the people that really work to understand a system and make it better, not just to find the cracks in it and exploit them for their own gain. The people that create things, more than they work at taking things that others have created.

I'm not saying there's no room for a gray area. Increasingly, there is. Wardriving is one gray-hat thing I'm very much in favor of... the mapping of free/unsecured wireless access points. More and more, wireless bandwidth is becoming a precious resource and it can be invaluable to know where you can get that resource for free rather than having to pay ridiculous sums for a few hours access that costs the distribution point nothing. I recently made use of such an open network to contact a friend and get directions to a party I was attending in October that I was late for. And I regularly make use of such a network to get internet connectivity for my laptop during my (ironically) Computer Networking and Security class. (No, the open network isn't from my school.) But I don't abuse that access by hogging bandwidth or doing illegal things on their network.

Which kind of brings me to how things have come full circle for me. It's about ten years since I first decided I wanted to be a hacker, and learned the story of Kevin Mitnick. I've come a long way since then. I've used Unix (through OS X) and recently tried out some forms of Linux, I've learned some programming, I'm taking classes in computer networking and security, I've reached the point where I can comfortably build my own computer, and in general I understand a lot more about computer security and related concepts than I did then. Today I watched the movie Operation Takedown. It's (somewhat loosely) based off of the story of Kevin Mitnick as portrayed in the similarly-titled book by Shimomura, one of the men who caught him. And it struck me, rather powerfully, how much my perception has changed. I no longer idolize Kevin as I once did. I can respect his skills, particularly with regard to social engineering, but ultimately of the two figures I find I can identify far more at this point in my life with that of Shimomura. And of the two, Tsutomo Shimomura is the one that I would now consider to be a hacker in the true sense of the word.

I want to be a hacker again....