Is that too big? No. We cannot think in those terms anymore. Like it or not, hacking has changed. We have to think big. Hacking is not just about seeing the limits of a computer system, or even the limits of the political world that has risen up around the modern-day hacker. Hacking is about understanding the system, the complete system. You must hack yourself. Not the digital self, because there is truly no division anymore. We are plugged in, and there aint no going back. We *have* to hack ourselves. Not just the surface tension that is wrapped in a nym, but the core of your hacker self. Explore mental ring zero. Live to hack, and hack to live.This is the future of meta-hacking, not just controlling the operating system, but controlling and influencing what the operators of that system do -- whether those operators do what they do for good or ill, and whether that system is a computer, a political set of ideals, or your own thought processes.This is why we are pursued through cyberspace by USA Patriot and the other horses of the digital apocalypse. It is our potential. If we turned our hacking skills from the systems we have root on to the data stored on those systems *and what that data represents*, we could possibly discover where that 10% is really at.
http://www.nmrc.org/pub/report/sn-dc-2003.html
Monday, August 18, 2003
Popular Posts
-
The concept of dragons was probably brought to Japan around 2,000 years ago, along with the technology for paddy agriculture. Their images h...
-
Peruvian archeologists have discovered the first full Inca burial site at Machu Picchu since the famous mountaintop citadel was discovered 9...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
Someone that gets it. Service-oriented software, when done correctly in a platform-agnostic way can be flexible, cheap, and can motivate m...
-
...why was this given the file name of skyfall?... Certain information, while not specific as to target, gives the government reason to beli...
-
http://www.homestarrunner.com/sbemail94.html
-
http://esamultimedia.esa.int/images/marsexpress/377-260208-2149-6-co-01-HebesChasma_H1.jpg
-
It looks like this might be real -- a Canadian company succesfully demoed a 16-qubit quantum computer which solved sudoku puzzles, seating...
-
From the bygone debates over DDR vs. RDRAM to the current controversy over Apples DDR implementations, one issue is commonly misunderstood i...