A place to cache linked articles (think custom and personal wayback machine)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

index.html 38KB

5 yıl önce
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583
  1. <!doctype html><!-- This is a valid HTML5 document. -->
  2. <!-- Screen readers, SEO, extensions and so on. -->
  3. <html lang=fr>
  4. <!-- Has to be within the first 1024 bytes, hence before the <title>
  5. See: https://www.w3.org/TR/2012/CR-html5-20121217/document-metadata.html#charset -->
  6. <meta charset=utf-8>
  7. <!-- Why no `X-UA-Compatible` meta: https://stackoverflow.com/a/6771584 -->
  8. <!-- The viewport meta is quite crowded and we are responsible for that.
  9. See: https://codepen.io/tigt/post/meta-viewport-for-2015 -->
  10. <meta name=viewport content="width=device-width,minimum-scale=1,initial-scale=1,shrink-to-fit=no">
  11. <!-- Required to make a valid HTML5 document. -->
  12. <title>How yuppies hacked the hacker ethos (archive) — David Larlet</title>
  13. <!-- Generated from https://realfavicongenerator.net/ such a mess. -->
  14. <link rel="apple-touch-icon" sizes="180x180" href="/static/david/icons/apple-touch-icon.png">
  15. <link rel="icon" type="image/png" sizes="32x32" href="/static/david/icons/favicon-32x32.png">
  16. <link rel="icon" type="image/png" sizes="16x16" href="/static/david/icons/favicon-16x16.png">
  17. <link rel="manifest" href="/manifest.json">
  18. <link rel="mask-icon" href="/static/david/icons/safari-pinned-tab.svg" color="#5bbad5">
  19. <link rel="shortcut icon" href="/static/david/icons/favicon.ico">
  20. <meta name="apple-mobile-web-app-title" content="David Larlet">
  21. <meta name="application-name" content="David Larlet">
  22. <meta name="msapplication-TileColor" content="#da532c">
  23. <meta name="msapplication-config" content="/static/david/icons/browserconfig.xml">
  24. <meta name="theme-color" content="#f0f0ea">
  25. <!-- That good ol' feed, subscribe :p. -->
  26. <link rel=alternate type="application/atom+xml" title=Feed href="/david/log/">
  27. <meta name="robots" content="noindex, nofollow">
  28. <meta content="origin-when-cross-origin" name="referrer">
  29. <!-- Canonical URL for SEO purposes -->
  30. <link rel="canonical" href="http://aeon.co/magazine/technology/how-yuppies-hacked-the-original-hacker-ethos/">
  31. <style>
  32. /* http://meyerweb.com/eric/tools/css/reset/ */
  33. html, body, div, span,
  34. h1, h2, h3, h4, h5, h6, p, blockquote, pre,
  35. a, abbr, address, big, cite, code,
  36. del, dfn, em, img, ins,
  37. small, strike, strong, tt, var,
  38. dl, dt, dd, ol, ul, li,
  39. fieldset, form, label, legend,
  40. table, caption, tbody, tfoot, thead, tr, th, td,
  41. article, aside, canvas, details, embed,
  42. figure, figcaption, footer, header, hgroup,
  43. menu, nav, output, ruby, section, summary,
  44. time, mark, audio, video {
  45. margin: 0;
  46. padding: 0;
  47. border: 0;
  48. font-size: 100%;
  49. font: inherit;
  50. vertical-align: baseline;
  51. }
  52. /* HTML5 display-role reset for older browsers */
  53. article, aside, details, figcaption, figure,
  54. footer, header, hgroup, menu, nav, section { display: block; }
  55. body { line-height: 1; }
  56. blockquote, q { quotes: none; }
  57. blockquote:before, blockquote:after,
  58. q:before, q:after {
  59. content: '';
  60. content: none;
  61. }
  62. table {
  63. border-collapse: collapse;
  64. border-spacing: 0;
  65. }
  66. /* http://practicaltypography.com/equity.html */
  67. /* https://calendar.perfplanet.com/2016/no-font-face-bulletproof-syntax/ */
  68. /* https://www.filamentgroup.com/lab/js-web-fonts.html */
  69. @font-face {
  70. font-family: 'EquityTextB';
  71. src: url('/static/david/css/fonts/Equity-Text-B-Regular-webfont.woff2') format('woff2'),
  72. url('/static/david/css/fonts/Equity-Text-B-Regular-webfont.woff') format('woff');
  73. font-weight: 300;
  74. font-style: normal;
  75. font-display: swap;
  76. }
  77. @font-face {
  78. font-family: 'EquityTextB';
  79. src: url('/static/david/css/fonts/Equity-Text-B-Italic-webfont.woff2') format('woff2'),
  80. url('/static/david/css/fonts/Equity-Text-B-Italic-webfont.woff') format('woff');
  81. font-weight: 300;
  82. font-style: italic;
  83. font-display: swap;
  84. }
  85. @font-face {
  86. font-family: 'EquityTextB';
  87. src: url('/static/david/css/fonts/Equity-Text-B-Bold-webfont.woff2') format('woff2'),
  88. url('/static/david/css/fonts/Equity-Text-B-Bold-webfont.woff') format('woff');
  89. font-weight: 700;
  90. font-style: normal;
  91. font-display: swap;
  92. }
  93. @font-face {
  94. font-family: 'ConcourseT3';
  95. src: url('/static/david/css/fonts/concourse_t3_regular-webfont-20190806.woff2') format('woff2'),
  96. url('/static/david/css/fonts/concourse_t3_regular-webfont-20190806.woff') format('woff');
  97. font-weight: 300;
  98. font-style: normal;
  99. font-display: swap;
  100. }
  101. /* http://practice.typekit.com/lesson/caring-about-opentype-features/ */
  102. body {
  103. /* http://www.cssfontstack.com/ Palatino 99% Win 86% Mac */
  104. font-family: "EquityTextB", Palatino, serif;
  105. background-color: #f0f0ea;
  106. color: #07486c;
  107. font-kerning: normal;
  108. -moz-osx-font-smoothing: grayscale;
  109. -webkit-font-smoothing: subpixel-antialiased;
  110. text-rendering: optimizeLegibility;
  111. font-variant-ligatures: common-ligatures contextual;
  112. font-feature-settings: "kern", "liga", "clig", "calt";
  113. }
  114. pre, code, kbd, samp, var, tt {
  115. font-family: 'TriplicateT4c', monospace;
  116. }
  117. em {
  118. font-style: italic;
  119. color: #323a45;
  120. }
  121. strong {
  122. font-weight: bold;
  123. color: black;
  124. }
  125. nav {
  126. background-color: #323a45;
  127. color: #f0f0ea;
  128. display: flex;
  129. justify-content: space-around;
  130. padding: 1rem .5rem;
  131. }
  132. nav:last-child {
  133. border-bottom: 1vh solid #2d7474;
  134. }
  135. nav a {
  136. color: #f0f0ea;
  137. }
  138. nav abbr {
  139. border-bottom: 1px dotted white;
  140. }
  141. h1 {
  142. border-top: 1vh solid #2d7474;
  143. border-bottom: .2vh dotted #2d7474;
  144. background-color: #e3e1e1;
  145. color: #323a45;
  146. text-align: center;
  147. padding: 5rem 0 4rem 0;
  148. width: 100%;
  149. font-family: 'ConcourseT3';
  150. display: flex;
  151. flex-direction: column;
  152. }
  153. h1.single {
  154. padding-bottom: 10rem;
  155. }
  156. h1 span {
  157. position: absolute;
  158. top: 1vh;
  159. left: 20%;
  160. line-height: 0;
  161. }
  162. h1 span a {
  163. line-height: 1.7;
  164. padding: 1rem 1.2rem .6rem 1.2rem;
  165. border-radius: 0 0 6% 6%;
  166. background: #2d7474;
  167. font-size: 1.3rem;
  168. color: white;
  169. text-decoration: none;
  170. }
  171. h2 {
  172. margin: 4rem 0 1rem;
  173. border-top: .2vh solid #2d7474;
  174. padding-top: 1vh;
  175. }
  176. h3 {
  177. text-align: center;
  178. margin: 3rem 0 .75em;
  179. }
  180. hr {
  181. height: .4rem;
  182. width: .4rem;
  183. border-radius: .4rem;
  184. background: #07486c;
  185. margin: 2.5rem auto;
  186. }
  187. time {
  188. display: bloc;
  189. margin-left: 0 !important;
  190. }
  191. ul, ol {
  192. margin: 2rem;
  193. }
  194. ul {
  195. list-style-type: square;
  196. }
  197. a {
  198. text-decoration-skip-ink: auto;
  199. text-decoration-thickness: 0.05em;
  200. text-underline-offset: 0.09em;
  201. }
  202. article {
  203. max-width: 50rem;
  204. display: flex;
  205. flex-direction: column;
  206. margin: 2rem auto;
  207. }
  208. article.single {
  209. border-top: .2vh dotted #2d7474;
  210. margin: -6rem auto 1rem auto;
  211. background: #f0f0ea;
  212. padding: 2rem;
  213. }
  214. article p:last-child {
  215. margin-bottom: 1rem;
  216. }
  217. p {
  218. padding: 0 .5rem;
  219. margin-left: 3rem;
  220. }
  221. p + p,
  222. figure + p {
  223. margin-top: 2rem;
  224. }
  225. blockquote {
  226. background-color: #e3e1e1;
  227. border-left: .5vw solid #2d7474;
  228. display: flex;
  229. flex-direction: column;
  230. align-items: center;
  231. padding: 1rem;
  232. margin: 1.5rem;
  233. }
  234. blockquote cite {
  235. font-style: italic;
  236. }
  237. blockquote p {
  238. margin-left: 0;
  239. }
  240. figure {
  241. border-top: .2vh solid #2d7474;
  242. background-color: #e3e1e1;
  243. text-align: center;
  244. padding: 1.5rem 0;
  245. margin: 1rem 0 0;
  246. font-size: 1.5rem;
  247. width: 100%;
  248. }
  249. figure img {
  250. max-width: 250px;
  251. max-height: 250px;
  252. border: .5vw solid #323a45;
  253. padding: 1px;
  254. }
  255. figcaption {
  256. padding: 1rem;
  257. line-height: 1.4;
  258. }
  259. aside {
  260. display: flex;
  261. flex-direction: column;
  262. background-color: #e3e1e1;
  263. padding: 1rem 0;
  264. border-bottom: .2vh solid #07486c;
  265. }
  266. aside p {
  267. max-width: 50rem;
  268. margin: 0 auto;
  269. }
  270. /* https://fvsch.com/code/css-locks/ */
  271. p, li, pre, code, kbd, samp, var, tt, time, details, figcaption {
  272. font-size: 1rem;
  273. line-height: calc( 1.5em + 0.2 * 1rem );
  274. }
  275. h1 {
  276. font-size: 1.9rem;
  277. line-height: calc( 1.2em + 0.2 * 1rem );
  278. }
  279. h2 {
  280. font-size: 1.6rem;
  281. line-height: calc( 1.3em + 0.2 * 1rem );
  282. }
  283. h3 {
  284. font-size: 1.35rem;
  285. line-height: calc( 1.4em + 0.2 * 1rem );
  286. }
  287. @media (min-width: 20em) {
  288. /* The (100vw - 20rem) / (50 - 20) part
  289. resolves to 0-1rem, depending on the
  290. viewport width (between 20em and 50em). */
  291. p, li, pre, code, kbd, samp, var, tt, time, details, figcaption {
  292. font-size: calc( 1rem + .6 * (100vw - 20rem) / (50 - 20) );
  293. line-height: calc( 1.5em + 0.2 * (100vw - 50rem) / (20 - 50) );
  294. margin-left: 0;
  295. }
  296. h1 {
  297. font-size: calc( 1.9rem + 1.5 * (100vw - 20rem) / (50 - 20) );
  298. line-height: calc( 1.2em + 0.2 * (100vw - 50rem) / (20 - 50) );
  299. }
  300. h2 {
  301. font-size: calc( 1.5rem + 1.5 * (100vw - 20rem) / (50 - 20) );
  302. line-height: calc( 1.3em + 0.2 * (100vw - 50rem) / (20 - 50) );
  303. }
  304. h3 {
  305. font-size: calc( 1.35rem + 1.5 * (100vw - 20rem) / (50 - 20) );
  306. line-height: calc( 1.4em + 0.2 * (100vw - 50rem) / (20 - 50) );
  307. }
  308. }
  309. @media (min-width: 50em) {
  310. /* The right part of the addition *must* be a
  311. rem value. In this example we *could* change
  312. the whole declaration to font-size:2.5rem,
  313. but if our baseline value was not expressed
  314. in rem we would have to use calc. */
  315. p, li, pre, code, kbd, samp, var, tt, time, details, figcaption {
  316. font-size: calc( 1rem + .6 * 1rem );
  317. line-height: 1.5em;
  318. }
  319. p, li, pre, details {
  320. margin-left: 3rem;
  321. }
  322. h1 {
  323. font-size: calc( 1.9rem + 1.5 * 1rem );
  324. line-height: 1.2em;
  325. }
  326. h2 {
  327. font-size: calc( 1.5rem + 1.5 * 1rem );
  328. line-height: 1.3em;
  329. }
  330. h3 {
  331. font-size: calc( 1.35rem + 1.5 * 1rem );
  332. line-height: 1.4em;
  333. }
  334. figure img {
  335. max-width: 500px;
  336. max-height: 500px;
  337. }
  338. }
  339. figure.unsquared {
  340. margin-bottom: 1.5rem;
  341. }
  342. figure.unsquared img {
  343. height: inherit;
  344. }
  345. @media print {
  346. body { font-size: 100%; }
  347. a:after { content: " (" attr(href) ")"; }
  348. a, a:link, a:visited, a:after {
  349. text-decoration: underline;
  350. text-shadow: none !important;
  351. background-image: none !important;
  352. background: white;
  353. color: black;
  354. }
  355. abbr[title] { border-bottom: 0; }
  356. abbr[title]:after { content: " (" attr(title) ")"; }
  357. img { page-break-inside: avoid; }
  358. @page { margin: 2cm .5cm; }
  359. h1, h2, h3 { page-break-after: avoid; }
  360. p3 { orphans: 3; widows: 3; }
  361. img {
  362. max-width: 250px !important;
  363. max-height: 250px !important;
  364. }
  365. nav, aside { display: none; }
  366. }
  367. ul.with_columns {
  368. column-count: 1;
  369. }
  370. @media (min-width: 20em) {
  371. ul.with_columns {
  372. column-count: 2;
  373. }
  374. }
  375. @media (min-width: 50em) {
  376. ul.with_columns {
  377. column-count: 3;
  378. }
  379. }
  380. ul.with_two_columns {
  381. column-count: 1;
  382. }
  383. @media (min-width: 20em) {
  384. ul.with_two_columns {
  385. column-count: 1;
  386. }
  387. }
  388. @media (min-width: 50em) {
  389. ul.with_two_columns {
  390. column-count: 2;
  391. }
  392. }
  393. .gallery {
  394. display: flex;
  395. flex-wrap: wrap;
  396. justify-content: space-around;
  397. }
  398. .gallery figure img {
  399. margin-left: 1rem;
  400. margin-right: 1rem;
  401. }
  402. .gallery figure figcaption {
  403. font-family: 'ConcourseT3'
  404. }
  405. footer {
  406. font-family: 'ConcourseT3';
  407. display: flex;
  408. flex-direction: column;
  409. border-top: 3px solid white;
  410. padding: 4rem 0;
  411. background-color: #07486c;
  412. color: white;
  413. }
  414. footer > * {
  415. max-width: 50rem;
  416. margin: 0 auto;
  417. }
  418. footer a {
  419. color: #f1c40f;
  420. }
  421. footer .avatar {
  422. width: 200px;
  423. height: 200px;
  424. border-radius: 50%;
  425. float: left;
  426. -webkit-shape-outside: circle();
  427. shape-outside: circle();
  428. margin-right: 2rem;
  429. padding: 2px 5px 5px 2px;
  430. background: white;
  431. border-left: 1px solid #f1c40f;
  432. border-top: 1px solid #f1c40f;
  433. border-right: 5px solid #f1c40f;
  434. border-bottom: 5px solid #f1c40f;
  435. }
  436. </style>
  437. <h1>
  438. <span><a id="jumper" href="#jumpto" title="Un peu perdu ?">?</a></span>
  439. How yuppies hacked the hacker ethos (archive)
  440. <time>Pour la pérennité des contenus liés. Non-indexé, retrait sur simple email.</time>
  441. </h1>
  442. <section>
  443. <article>
  444. <h3><a href="http://aeon.co/magazine/technology/how-yuppies-hacked-the-original-hacker-ethos/">Source originale du contenu</a></h3>
  445. <p>Any large and alienating infrastructure controlled by a technocratic elite is bound to provoke. In particular, it will nettle those who want to know how it works, those who like the thrill of transgressing, and those who value the principle of open access. Take the US telephone network of the 1960s: a vast array of physical infrastructure dominated by a monopolistic telecoms corporation called AT&amp;T. A young Air Force serviceman named John Draper – aka Captain Crunch – discovered that he could manipulate the rules of tone-dialling systems by using children’s whistles found in Cap’n Crunch cereal boxes. By whistling the correct tone into a telephone handset, he could place free long-distance calls through a chink in the AT&amp;T armour.</p>
  446. <p>Draper was one of the first <i>phone phreakers</i>, a motley crew of jokers bent on exploring and exploiting loopholes in the system to gain free access. Through the eyes of conventional society, such phreakers were just juvenile pranksters and cheapskates. Yet their actions have since been incorporated into the folklore of modern hacker culture. Draper said in a 1995 interview: ‘I was mostly interested in the curiosity of how the phone company worked. I had no real desire to go rip them off and steal phone service.’</p>
  447. <p>But in his book <i>Hackers: Heroes of the Computer Revolution</i> (1984), the US journalist Steven Levy went so far as to put up Draper as an avatar of the ‘true hacker’ spirit. Levy was trying to hone in on principles that he believed constituted a ‘hacker ethic’. One such principle was the ‘hands-on imperative’:<br/>
  448. <span class="pullquote">Hackers believe that essential lessons can be learned about the systems – about the world – from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things.</span></p>
  449. <p>For all his protestations of innocence, it’s clear that Draper’s curiosity was essentially subversive. It represented a threat to the ordered lines of power within the system. The phreakers were trying to open up information infrastructure, and in doing so they showed a calculated disregard for the authorities that dominated it.</p>
  450. <p>This spirit has carried through into the modern context of the internet, which, after all, consists of computers connected to one another via physical telecommunications infrastructure. The internet promises open access to information and online assembly for individual computer owners. At the same time, it serves as a tool for corporate monopolists and government surveillance. The most widely recognised examples of modern ‘hackers’ are therefore groups such as Anonymous and WikiLeaks. These ‘cypherpunks’ and crypto-anarchists are internet natives. They fight – at least in principle – to protect the privacy of the individual while making power itself as transparent as possible.</p>
  451. <p>This dynamic is not unique to the internet. It plays out in many other spheres of life. Consider the pranksters who mess with rail operators by jamming ticket-barrier gates to keep them open for others. They might not describe themselves as hackers, but they carry an ethic of disdain towards systems that normally allow little agency on the part of ordinary individuals. Such hacker-like subcultures do not necessarily see themselves in political terms. Nevertheless, they share a common tendency towards a rebellious creativity aimed at increasing the agency of underdogs.</p>
  452. <p>Unlike the open uprising of the liberation leader, the hacker impulse expresses itself via a constellation of minor acts of insurrection, often undertaken by individuals, creatively disguised to deprive authorities of the opportunity to retaliate. Once you’re attuned to this, you see hacks everywhere. I see it in capoeira. What is it? A dance? A fight? It is a hack, one that emerged in colonial Brazil as a way for slaves to practise a martial art under the guise of dance. As an approach to rebellion, this echoes the acts of subtle disobedience described by James Scott in <i>Weapons of the Weak: Everyday forms of Peasant Resistance</i> (1986).</p>
  453. <p>Hacking, then, looks like a practice with very deep roots – as primally and originally human as disobedience itself. Which makes it all the more disturbing that hacking itself appears to have been hacked.</p>
  454. <p><span class="drop">D</span>espite the hive-mind connotations of faceless groups such as Anonymous, the archetype of ‘the hacker’ is essentially that of an <i>individual</i> attempting to live an empowered and unalienated life. It is <i>outsider</i> in spirit, seeking empowerment outside the terms set by the mainstream establishment.</p>
  455. <p>Perhaps it’s unwise to essentialise this figure. A range of quite different people can think of themselves in those terms, from the lonely nerd tinkering away on DIY radio in the garage to the investigative journalist immersed in politicised muckraking. It seems safe to say, though, that it’s not very hacker-like to aspire to <i>conventional</i> empowerment, to get a job at a blue-chip company while reading <i>The Seven Habits of Highly Effective People</i>. The hacker impulse is <i>critical</i>. It defies, for example, corporate ambitions.</p>
  456. <p>In my book <i>The Heretic’s Guide to Global Finance</i> (2013), I used this figure of the hacker as a model for readers wishing to challenge the global financial system. The machinery of global capital tends to be seen as complex, disempowering and alienating. The traditional means of contesting it is to build groups – such as Occupy Wall Street – to influence politicians and media to pressure it on your behalf. But this sets up a familiar dynamic: the earnest activist pitted against the entrenched interests of the business elite. Each group defines itself against the other, settling into a stagnant trench warfare. The individual activists frequently end up demoralised, complaining within echo-chambers about their inability to impact ‘the system’. They build an identity based on a kind of downbeat martyrdom, keeping themselves afloat through a fetishised solidarity with others in the same position.</p>
  457. <p class="aeon-explore-panel-video" data-video-id="36358"/>
  458. <p>I was attracted to the hacker archetype because, unlike the straightforward activist who defines himself in direct opposition to existing systems, hackers work <i>obliquely</i>. The hacker is ambiguous, specialising in deviance from established boundaries, including ideological battle lines. It’s a trickster spirit, subversive and hard to pin down. And, arguably, rather than aiming towards some specific reformist end, the hacker spirit is a ‘way of being’, an attitude towards the world.</p>
  459. <p>Take, for example, the urban explorer subculture, chronicled by Bradley Garrett in <i>Explore Everything: Placehacking the City</i> (2013). The search for unusual detours – through a sewer system, for example – is exhilarating because you see things that you’re not <i>supposed</i> to be interested in. Your curiosity takes you to places where you <i>don’t belong</i>. It thus becomes an assertion of individual defiance of social norms. The byproduct of such exploration is pragmatic knowledge, the disruption of standard patterns of thought, and also dealienation – you see what’s behind the interfaces that surround us, coming closer to the reality of our social world.</p>
  460. <blockquote><p>the hacker modifies the machine to make it self-destruct, or programmes it to frustrate its owners, or opens its usage to those who don’t own it</p></blockquote>
  461. <p>This is a useful sensibility to cultivate in the face of systems that create psychological, political and economic barriers to access. In the context of a complex system – computer, financial or underground transit – the political divide is always between well-organised, active insiders versus diffuse, passive outsiders. Hackers challenge the binary by seeking <i>access</i>, either by literally ‘cracking’ boundaries – breaking in – or by redefining the lines between those with permission and those without. We might call this <i>appropriation</i>.</p>
  462. <p>A figure of economic power such as a factory owner builds a machine to extend control. The activist Luddite might break it in rebellion. But the hacker explores and then modifies the machine to make it self-destruct, or programmes it to frustrate the purpose of it owners, or opens its usage to those who do not own it. The hacker ethic is therefore a composite. It is not <i>merely</i> exploratory curiosity or rebellious deviance or creative innovation within incumbent systems. It emerges from the intersection of all three.</p>
  463. <p><span class="drop">T</span>he word ‘hacker’ came into its own in the age of information technology (IT) and the personal computer. The subtitle of Levy’s seminal book – <i>Heroes of the Computer Revolution</i> – immediately situated hackers as the crusaders of computer geek culture. While some hacker principles he described were broad – such as ‘mistrust authority’ and ‘promote decentralisation’ – others were distinctly IT-centric. ‘You can create art and beauty on a computer,’ read one. ‘All information should be free,’ declared another.</p>
  464. <p>Ever since, most popular representations of the hacker way have followed Levy’s lead. Neal Stephenson’s cyberpunk novel <i>Snow Crash</i> (1992) featured the code-wielding Hiro as the ‘last of the freelance hackers’. The film <i>Hackers</i> (1995) boasted a youthful crew of jargon-rapping, keyboard-hammering computer ninjas. The media stereotype that began to be constructed was of a precocious computer genius using his technological mastery to control events or battle others. It remains popular to this day. In the James Bond film <i>Skyfall</i> (2012), the gadget-master Q is reinvented by the actor Ben Whishaw as a young hacker with a laptop, controlling lines of code with almost superhuman efficiency, as if his brain was wired directly into the computer.</p>
  465. <blockquote><p>In the hands of a sensationalist media, the ethos of hacking is conflated with the act of cracking computer security</p></blockquote>
  466. <p>In a sense, then, computers were the making of the hacker, at least as a popular cultural image. But they were also its undoing. If the popular imagination hadn’t chained the hacker figure so forcefully to IT, it’s hard to believe it ever would have been demonised in the way it has been, or that it could have been so effectively defanged.</p>
  467. <p>Computers, and especially the internet, are a primary means of subsistence for many. This understandably increases public anxiety at the bogeyman figure of the criminal ‘hacker’, the dastardly villain who breaches computer security to steal and cause havoc. Never mind that in ‘true’ hacker culture – as found in hackerspaces, maker-labs and open-source communities around the world – the mechanical act of breaking into a computer is just one manifestation of the drive to explore beyond established boundaries. In the hands of a sensationalist media, the ethos of hacking is conflated with the act of cracking computer security. Anyone who does that, regardless of the underlying ethos, is a ‘hacker’. Thus a single manifestation of a single element of the original spirit gets passed off as the whole.</p>
  468. <p>Through the lens of moral panic, a narrative emerges of hackers as a class of computer attack-dogs. Their primary characteristics become aggression and amorality. How to guard against them? How, indeed, to round out the traditional good-versus-evil narrative? Well, naturally, with a class of poacher-turned-gamekeepers. And so we find the construction of ‘white-hat’ hackers, protective and upstanding computer wizards for the public good.</p>
  469. <p>Here is where the second form of corruption begins to emerge. The construct of the ‘good hacker’ has paid off in unexpected ways, because in our computerised world we have also seen the emergence of a huge, aggressively competitive technology industry with a serious innovation obsession. This is the realm of startups, venture capitalists, and shiny corporate research and development departments. And, it is here, in subcultures such as Silicon Valley, that we find a rebel spirit succumbing to perhaps the only force that could destroy it: gentrification.</p>
  470. <p><span class="drop">G</span>entrification is the process by which nebulous threats are pacified and alchemised into money. A raw form – a rough neighbourhood, indigenous ritual or edgy behaviour such as parkour (or free running) – gets stripped of its otherness and repackaged to suit mainstream sensibilities. The process is repetitive. Desirable, unthreatening elements of the source culture are isolated, formalised and emphasised, while the unsettling elements are scrubbed away.</p>
  471. <p>Key to any gentrification process are successive <i>waves</i> of pioneers who gradually reduce the perceived risk of the form in question. In property gentrification, this starts with the artists and disenchanted dropouts from mainstream society who are drawn to marginalised areas. Despite their countercultural impulses, they always carry with them traces of the dominant culture, whether it be their skin colour or their desire for good coffee. This, in turn, creates the seeds for certain markets to take root. A WiFi coffeeshop appears next to the Somalian community centre. And that, in turn, sends signals back into the mainstream that the area is <i>slightly less alien</i> than it used to be.</p>
  472. <p>If you repeat this cycle enough times, the perceived dangers that keep the property developers and yuppies away gradually erode. Suddenly, the tipping point arrives. Through a myriad of individual actions under no one person’s control, the exotic <i>other</i> suddenly appears within a safe frame: interesting, exciting and cool, but not threatening. It becomes open to a carefree voyeurism, like a tiger being transformed into a zoo animal, and then a picture, and then a tiger-print dress to wear at cocktail parties. Something feels ‘gentrified’ when this shallow aesthetic of tiger takes over from the authentic lived experience of tiger.</p>
  473. <p>This is not just about property. In cosmetics shops on Oxford Street in London you can find beauty products blazoned with pagan earth-mother imagery. Why are symbols of earth-worship found within the citadels of consumerism, printed on products designed to neutralise and control bodily processes? They’ve been gentrified. Pockets of actual paganism do still exist, but in the mainstream such imagery has been thoroughly cleansed of any subversive context.</p>
  474. <p>At the frontiers of gentrification are entire <i>ways of being</i> – lifestyles, subcultures and outlooks that carry rebellious impulses. Rap culture is a case in point: from its ghetto roots, it has crossed over to become a safe ‘thing that white people like’. Gentrification is an enabler of <i>doublethink</i>, a means by which people in positions of relative power can, without contradiction, embrace practices that were formed in resistance to the very things they themselves represent.</p>
  475. <p>We are currently witnessing the gentrification of hacker culture. The countercultural trickster has been pressed into the service of the preppy tech entrepreneur class. It began innocently, no doubt. The association of the hacker ethic with startups might have started with an authentic counter-cultural impulse on the part of outsider nerds tinkering away on websites. But, like all gentrification, the influx into the scene of successive waves of ever less disaffected individuals results in a growing emphasis on the unthreatening elements of hacking over the subversive ones.</p>
  476. <p>Silicon Valley has come to host, on the one hand, a large number of highly educated tech-savvy people who loosely perceive themselves as rebels set against existing modes of doing business. On the other hand, it contains a very large pool of venture capital. The former group jostle for the investor money by explicitly attempting to build network monopolies – such as those created by Facebook and Google – for the purpose of extracting windfall profit for the founders and for the investors that back them, and perhaps, for the large corporates who will buy them out.</p>
  477. <blockquote><p>the revised definition of the tech startup entrepreneur as a hacker forms part of an emergent system of Silicon Valley doublethink</p></blockquote>
  478. <p>In this economic context, curiosity, innovation and iterative experimentation are ultimate virtues, and this element of the hacker ethic has proved to be an appealing frame for people to portray their actions within. Traits such as the drive for individual empowerment and the appreciation of clever solutions already resemble the traits of the entrepreneur. In this setting, the hacker attitude of playful troublemaking can be cast in Schumpeterian terms: success-driven innovators seeking to ‘disrupt’ old incumbents within a market in an elite ‘rebellion’.</p>
  479. <p>Thus the emergent tech industry’s definition of ‘hacking’ as quirky-but-edgy innovation by optimistic entrepreneurs with a love of getting things done. Nothing sinister about it: it’s just on-the-fly problem-solving for profit. This gentrified pitch is not just a cool personal narrative. It’s also a useful business construct, helping the tech industry to distinguish itself from the aggressive squares of Wall Street, competing for the same pool of new graduates.</p>
  480. <p>Indeed, the revised definition of the tech startup entrepreneur as a hacker forms part of an emergent system of Silicon Valley doublethink: individual startups portray themselves as ‘underdogs’ while simultaneously being aware of the enormous power and wealth the tech industry they’re a part of wields at a collective level. And so we see a gradual stripping away of the critical connotations of hacking. Who said a hacker can’t be in a position of power? Google cloaks itself in a quirky ‘hacker’ identity, with grown adults playing ping pong on green AstroTurf in the cafeteria, presiding over the company’s overarching agenda of network control.</p>
  481. <p>This doublethink bleeds through into mainstream corporate culture, with the growing institution of the corporate ‘hackathon’. We find financial giants such as Barclays hosting startup accelerators and financial technology hackathons at forums such as the FinTech Innovation Lab in Canary Wharf in London, ostensibly to discover the ‘future of finance’… or at least the future of payment apps that they can buy out. In this context, the hacker ethic is hollowed out and subsumed into the ideology of <i>solutionism</i>, to use a term coined by the Belarusian-born tech critic Evgeny Morozov. It describes the tech-industry vision of the world as a series of problems waiting for (profitable) solutions.</p>
  482. <p>This process of gentrification becomes a war over language. If enough newcomers with media clout use the hollowed-out version of the term, its edge grows dull. You end up with a mere affectation, failing to challenge otherwise conventional aspirations. And before you know it, an earnest Stanford grad is handing me a business card that says, without irony: ‘Founder. Investor. Hacker.’</p>
  483. <p><span class="drop">A</span>ny gentrification process inevitably presents two options. Do you abandon the form, leave it to the yuppies and head to the next wild frontier? Or do you attempt to break the cycle, deface the estate-agent signs, and picket outside the wine bar with placards reading ‘Yuppies Go Home’?</p>
  484. <p>The answer to this depends on how much you care. Immigrant neighbourhoods definitely care enough to mobilise real resistance movements to gentrification, but who wants to protect the hacker ethic? For some, the spirit of hacking is stupid and pointless anyway, an individualistic self-help impulse, not an authentic political movement. What does it matter if it gets gentrified?</p>
  485. <p>We need to confront an irony here. Gentrification is a pacification process that takes the wild and puts it in frames. I believe that hacking is the reverse of that, taking the ordered rules of systems and making them fluid and wild again. Where gentrification tries to erect safe fences around things, hacker impulses try to break them down, or redefine them. These are two countervailing forces within human society. The gentrification of hacking is… well, perhaps a perfect hack.</p>
  486. <p>Or maybe I’ve romanticised it. Maybe hacking has never existed in some raw form to be gentrified. Perhaps it’s always been part of the capitalist commodification processes. Stuff is pulled down and then reordered. Maybe the hackers – like the disenchanted artists and hipsters – are just the vanguard charged with identifying the next profitable investment. Perhaps hacking has always been a contradictory amalgam that combines desire for the unstable and queer with the control impulse of the stable and straight. Certainly in mainstream presentations of hacking – whether the criminal version or the Silicon Valley version – there is a control fetish: the elite coder or entrepreneur sitting at a dashboard manipulating the world, doing mysterious or ‘awesome’ things out of reach of the ordinary person.</p>
  487. <p>I’m going to stake a claim on the word though, and state that the true hacker spirit does not reside at Google, guided by profit targets. The hacker impulse should not just be about redesigning products, or creating ‘solutions’. A hack stripped of anti-conventional intent is not a hack at all. It’s just a piece of business innovation.</p>
  488. <p>The un-gentrified spirit of hacking should be a commons accessible to all. This spirit can be seen in the marginal cracks all around us. It’s in the emergent forms of peer production and DIY culture, in maker-spaces and urban farms. We see it in the expansion of ‘open’ scenes, from open hardware to open biotech, and in the intrigue around 3D printers as a way to extend open-source designs into the realm of manufacture. In a world with increasingly large and unaccountable economic institutions, we need these everyday forms of resistance. Hacking, in my world, is a route to escaping the shackles of the profit-fetish, not a route to profit.</p>
  489. <p>Go home, yuppies.</p>
  490. </article>
  491. </section>
  492. <nav id="jumpto">
  493. <p>
  494. <a href="/david/blog/">Accueil du blog</a> |
  495. <a href="http://aeon.co/magazine/technology/how-yuppies-hacked-the-original-hacker-ethos/">Source originale</a> |
  496. <a href="/david/stream/2019/">Accueil du flux</a>
  497. </p>
  498. </nav>
  499. <footer>
  500. <div>
  501. <img src="/static/david/david-larlet-avatar.jpg" loading="lazy" class="avatar" width="200" height="200">
  502. <p>
  503. Bonjour/Hi!
  504. Je suis <a href="/david/" title="Profil public">David&nbsp;Larlet</a>, je vis actuellement à Montréal et j’alimente cet espace depuis 15 ans. <br>
  505. Si tu as apprécié cette lecture, n’hésite pas à poursuivre ton exploration. Par exemple via les <a href="/david/blog/" title="Expériences bienveillantes">réflexions bimestrielles</a>, la <a href="/david/stream/2019/" title="Pensées (dés)articulées">veille hebdomadaire</a> ou en t’abonnant au <a href="/david/log/" title="S’abonner aux publications via RSS">flux RSS</a> (<a href="/david/blog/2019/flux-rss/" title="Tiens c’est quoi un flux RSS ?">so 2005</a>).
  506. </p>
  507. <p>
  508. Je m’intéresse à la place que je peux avoir dans ce monde. En tant qu’humain, en tant que membre d’une famille et en tant qu’associé d’une coopérative. De temps en temps, je fais aussi des <a href="https://github.com/davidbgk" title="Principalement sur Github mais aussi ailleurs">trucs techniques</a>. Et encore plus rarement, <a href="/david/talks/" title="En ce moment je laisse plutôt la place aux autres">j’en parle</a>.
  509. </p>
  510. <p>
  511. Voici quelques articles choisis :
  512. <a href="/david/blog/2019/faire-equipe/" title="Accéder à l’article complet">Faire équipe</a>,
  513. <a href="/david/blog/2018/bivouac-automnal/" title="Accéder à l’article complet">Bivouac automnal</a>,
  514. <a href="/david/blog/2018/commodite-effondrement/" title="Accéder à l’article complet">Commodité et effondrement</a>,
  515. <a href="/david/blog/2017/donnees-communs/" title="Accéder à l’article complet">Des données aux communs</a>,
  516. <a href="/david/blog/2016/accompagner-enfant/" title="Accéder à l’article complet">Accompagner un enfant</a>,
  517. <a href="/david/blog/2016/senior-developer/" title="Accéder à l’article complet">Senior developer</a>,
  518. <a href="/david/blog/2016/illusion-sociale/" title="Accéder à l’article complet">L’illusion sociale</a>,
  519. <a href="/david/blog/2016/instantane-scopyleft/" title="Accéder à l’article complet">Instantané Scopyleft</a>,
  520. <a href="/david/blog/2016/enseigner-web/" title="Accéder à l’article complet">Enseigner le Web</a>,
  521. <a href="/david/blog/2016/simplicite-defaut/" title="Accéder à l’article complet">Simplicité par défaut</a>,
  522. <a href="/david/blog/2016/minimalisme-esthetique/" title="Accéder à l’article complet">Minimalisme et esthétique</a>,
  523. <a href="/david/blog/2014/un-web-omni-present/" title="Accéder à l’article complet">Un web omni-présent</a>,
  524. <a href="/david/blog/2014/manifeste-developpeur/" title="Accéder à l’article complet">Manifeste de développeur</a>,
  525. <a href="/david/blog/2013/confort-convivialite/" title="Accéder à l’article complet">Confort et convivialité</a>,
  526. <a href="/david/blog/2013/testament-numerique/" title="Accéder à l’article complet">Testament numérique</a>,
  527. et <a href="/david/blog/" title="Accéder aux archives">bien d’autres…</a>
  528. </p>
  529. <p>
  530. On peut <a href="mailto:david%40larlet.fr" title="Envoyer un courriel">échanger par courriel</a>. Si éventuellement tu souhaites que l’on travaille ensemble, tu devrais commencer par consulter le <a href="http://larlet.com">profil dédié à mon activité professionnelle</a> et/ou contacter directement <a href="http://scopyleft.fr/">scopyleft</a>, la <abbr title="Société coopérative et participative">SCOP</abbr> dont je fais partie depuis six ans. Je recommande au préalable de lire <a href="/david/blog/2018/cout-site/" title="Attention ce qui va suivre peut vous choquer">combien coûte un site</a> et pourquoi je suis plutôt favorable à une <a href="/david/pro/devis/" title="Discutons-en !">non-demande de devis</a>.
  531. </p>
  532. <p>
  533. Je ne traque pas ta navigation mais mon
  534. <abbr title="Alwaysdata, 62 rue Tiquetonne 75002 Paris, +33.184162340">hébergeur</abbr>
  535. conserve des logs d’accès.
  536. </p>
  537. </div>
  538. </footer>
  539. <script type="text/javascript">
  540. ;(_ => {
  541. const jumper = document.getElementById('jumper')
  542. jumper.addEventListener('click', e => {
  543. e.preventDefault()
  544. const anchor = e.target.getAttribute('href')
  545. const targetEl = document.getElementById(anchor.substring(1))
  546. targetEl.scrollIntoView({behavior: 'smooth'})
  547. })
  548. })()
  549. </script>