I think all artists struggle to represent the geometry of life in their own way, just like writers deal with archetypes. There are only so many stories that you can tell, but an infinite number of storytellers.
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
The beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1.
Bitcoin is here to stay. There would be a hacker uproar to anyone who attempted to take credit for the patent of cryptocurrency. And I wouldn't want to be on the receiving end of hacker fury.
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
To see a hacker actually hacking is not the most interesting thing visually, and it's pretty boring as an actor: a hacker taps on her keyboard. There's really not much more than that.
News and images move so easily across borders that attitudes and aspirations are no longer especially national. Cyber-weapons, no longer the exclusive province of national governments, can originate in a hacker's garage.
Do you think the Chinese think twice about hiring a hacker with a mohawk or a tattooed face? No.
A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data.
When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person's computer, that the hacker gains access to.
Social engineering has become about 75% of an average hacker's toolkit, and for the most successful hackers, it reaches 90% or more.
I'm a really good hacker, but I'm not a sensible person.
Very smart people are often tricked by hackers, by phishing. I don't exclude myself from that. It's about being smarter than a hacker. Not about being smart.
In early 1993, a hostile observer might have had grounds for thinking that the Unix story was almost played out, and with it the fortunes of the hacker tribe.