10 Matching Annotations
  1. Mar 2024
    1. This game had real penalties. In a soft voice, he said he wanted the court's permission to contact his attorney in California. The judge noted that whatever happened in his legal entanglements, the US Court of the Eastern District of North Carolina would "have its way" with him first. The detention hearing was set for two days later on Friday morning.

      This is the perfect example of the consequences a "black hat" hacker faces. Since they are hacking with malicious intent, they are exploiting sensitive information, resulting in there being consequences. Mitnick was always one step ahead of the FBI, but after being caught, he is now facing serious jail time for all the malicious things he did.

    2. Mitnick didn't look ill, but he also didn't look anything like the overweight, bespectacled "dark-side hacker" who had once terrorized Los Angeles. We saw a tall young man, neither thin nor stocky, who had metal-rim glasses and shoulder-length flowing brown hair.

      I like how the author addresses hackers' stereotypes. Many people view hackers as "dark room dwellers" who sit in their basement and hack others. Others view them as the socially awkward computer genius. Therefore, I think it was powerful that the author portrayed him as your everyday guy.

    3. The FBI agents thought Mitnick wouldn't recognize their spy antenna. Shimomura knew better and hid it with a cardboard box.

      It's cool seeing all the steps the FBI agents and Shimomura take when trying to arrest Mitnick. I like how they highlight surveilling the hacker as they track his digital footprint and monitor his communication methods.

  2. Feb 2024
    1. The people who wrote the software work very hard to make it work as well as possible. If you claim you have found a bug, you'll be impugning their competence, which may offend some of them even if you are correct. It's especially undiplomatic to yell “bug” in the Subject line.

      This highlights how the programmers put a ton of effort into ensuring the software is working correctly. Therefore, jumping to conclusions about finding a bug can come off as offense since it seems like you're questioning the programmers tech abilities. It's essential that your communication skills are sensitive and mindful when reporting a bug since you don't want the programmers to feel like you're attacking their skills.

    2. If you are asking questions in a forum that does not use your native language, you will get a limited amount of slack for spelling and grammar errors — but no extra slack at all for laziness (and yes, we can usually spot that difference).

      The author states that they'll cut some slack if they suspect a language barrier, but there's no tolerance if someone is putting in no effort and being lazy. This indicates that they value effort and hard work.

    3. What we are, unapologetically, is hostile to people who seem to be unwilling to think or to do their own homework before asking questions.

      The author states how hackers have a reputation of being arrogant. However, he argues that the hostility is not directed towards the people, it's directed people's unwillingness to put effort into critical thinking or researching their own questions. Ultimately, hackers are very self-sufficient and become annoyed when others don't take initiative themselves.

    1. Still, measuring this early hacking case by my criteria, this hack-leak fails to qualify as a public interest hack because the hacker never advertised how he or she obtained the material. If we compare this instance with those hacks and leaks orchestrated by Phineas Phisher—who after hacking the Italian firm Hacking Team, published a “Hack Back” manual (2016) seeking to galvanize others to emulate him—we can identify the precise historical period when hackers publicized this strategy and thus positioned it for adoption and replication.

      This highlights how hackers contemplate if their hacking qualifies for public interest. Phineas Phisher wanted to share his hacking skills as a manual to the hacking community. This allows hacking strategies to be replicated and built on, enhancing hacking. This indicates to the public that hacking should be more normalized and be seen for its skill and craft rather than being associated with negativity.

    2. is hackers will continue to rely on but also experiment with this method.

      Hackers want to see how far their hacking can take them. They try experimenting to see if they can identify more & more vulnerabilities in security systems. I feel like they enjoy exposing corporations because releasing information to the public serves as a reward for all their hard hacking work.

    3. Ultimately, the consequences of this hack and email disclosure were as direct as they were substantial: the government levied fines against the firm for its poor security and failure to protect sensitive personal data, and the firm was forced to close.

      I believe some forms of hacking are bad but hacktivists are exposing people/company's that are doing unethical things to begin with. They are doing this with the purpose of being transparent with the public and highlighting things that could have public repercussions. I side with the hacktivists because if you don't want to get caught, you shouldn't be doing something wrong in the first place.

    4. In same period, a large corpus of corporate emails—over 600,000 emails written by Enron employees—were published for the first time on the internet. The responsible party was not a reckless hacker, WikiLeaks (an organization not yet in existence), nor the Russian government, but an obscure American government agency: the Federal Energy Regulatory Commission (FERC). At the time, Enron had been embroiled in scandal with its top corporate executives under investigation for fraud. According to a later report by the Wall Street Journal, the FERC published the corpus “to help the public better understand whether Enron helped to create— and then profit from—an energy shortage in California during 2000 and 2001”

      This is a prime example about how not all hacking is bad. This government agency found out that Enron was doing unethical things like fraud. They decided to hack and expose the emails to show public transparency. Hacking allowed this company to become exposed for creating & profiting off of power shortages which is completely unethical.