When I presented myself at the SHACamp 2017 info desk bright and early on the first full day of the camp, I was surprised to find that I was to be assigned a volunteer along with my press badge. Because of the way our community is sometimes covered by the traditional media, it was necessary that any journalists touring the site have a helping hand to ensure that they respect the privacy of the attendees, gain permission from people likely to be in any photographs, and generally not be idiots about the whole Hacker thing. I pointed out that I was working for Hackaday and not The Sun, and that as an active hackspace member and former hackspace director I was very much a part of the community attending SHA 2017 who would simply be wasting the valuable time of any volunteer assigned to me. Fortunately for the next volunteer in line they agreed with my point of view, so one of the angels was spared a day of my breakneck walking pace and impenetrable British colloquialisms.
It’s interesting therefore a few weeks after the event, to investigate how it was portrayed through the eyes of people who aren’t coming as Hackaday is, from within the bubble. To take a look at that disconnect between what we know about our community and its events, and how the traditional media sometimes like to portray us. Are they imagining the set of a Hollywood “hacker” movie in which assorted geniuses penetrate the computer systems of various international institutions by the simple expedient of banging wildly at a keyboard for a few seconds, or will the reality of a bunch of like-minded technology enthusiasts gathering in a field for several days of tinkering and other fun activities be what makes their reports?
Parents in Liverpool, UK, are being prepared to spot the signs that their children might be hackers. The Liverpool Echo reports on the launch of a “Hackers To Heroes” scheme targeting youngsters at risk of donning a black hat, and has an expert on hand, one [Vince Warrington], to come up with a handy cut-out-and-keep list. Because you never know when you’re going to need one, and he’s helped the Government so should know what he’s talking about.
Of course, they’re talking about “Hacker” (cybercriminal) while for us the word has much more positive connotations. And it’s yet another piece of ill-informed media scaremongering about technology that probably fits like so many others in the “People are having fun. Something Must Be Done About It!” category. But it’s still something that will probably result in hassle for a few youngsters with an interest in technology, and that’s not encouraging.
The full list is reproduced below, if you’re a parent it seems you will need to watch your children if:
They spend most of their free time alone with their computer
They have few real friends, but talk extensively to online friends about computers
Teachers say the child has a keen interest in computers, almost to the exclusion of all other subjects
They’re online so much it affects their sleeping habits
They use the language of hacking, with terms such as ‘DdoS’ (pronounced D-dos), Dossing, pwnd, Doxing, Bots, Botnets, Cracking, Hash (refers to a type of encryption rather than cannabis), Keylogger, Lulz, Phishing, Spoof or Spoofing. Members of the Anonymous Hackivist group refer to their attacks as ‘Ops’
They refer to themselves and their friends as hackers or script kiddies
They have multiple social media profiles on one platform
They have multiple email addresses
They have an odd sounding nickname (famous ones include MafiaBoy and CyberZeist)
Their computer has a web browser called ToR (The Onion Router) which is used to access hacking forums on the dark web
Monitoring tools you’ve put on the computer might suddenly stop working
They can connect to the wifi of nearby houses (especially concerning if they have no legitimate reason to have the password)
They claim to be making money from online computer games (many hackers get started by trying to break computer games in order to exploit flaws in the game. They will then sell these ‘cheats’ online).
They might know more than they should about parents and siblings, not being able to resist hacking your email or social media
Your internet connection slows or goes off, as their hacker rivals try to take them down
Some circumstantial evidence suggests children with Autism and Asperger’s could be more vulnerable to becoming hackers.
Reading the list, we can’t help wondering how many Hackaday readers would recognise as perfectly normal behaviours from their own formative years. And some of them look ripe for misinterpretation, for example your internet connection slowing down does not automatically mean that little [Jimmy] is selling a billion compromised social media accounts on the Dark Web.
Particularly concerning though is the final association of computer crime with children who are autistic or have Asperger’s Syndrome. Picking on a minority as a scapegoat for a public moral panic is reprehensible, and is not responsible journalism.
Still, you have to laugh. They remembered to include a stock photo of a hacker using a keyboard, but they’ve completely missed the telltale sign of a real hacker, which is of course wr1t1n9 11k3 r341 1337 h4xxx0rzzz.
To a casual observer it might seem as though our community is in the news rather a lot at the moment. It’s all about hacks on our TV screens in the soap opera of Washington politics, who hacked this, whether those people over there helped that lot hack the other lot, or even whether that person’s emails could have been hacked on that server. Keeping up with it as an outsider can become a full-time job.
Of course, as we all know even if the mainstream journalists (or should I refer to them colloquially as “hacks”?) don’t, it’s not us they’re talking about. Their hackers are computer criminals, while we are people with some of the hardware and software skills to bend technology to our will, even beyond what its designers might have intended. And that divergence between the way we use the word in a sense of reappropriation and they use it in disapprobation sometimes puts us in an odd position. Explaining to a sober-suited businessman as the director of a hackspace, that no, we’re not *those*hackers can sometimes feel like skating on thin ice.
Three years ago we covered [Dalibor Farnby]’s adventures in making his own Nixie tubes. Back then it was just a hobby, a kind of exploration into the past. He didn’t stop, and it soon became his primary occupation. In this video he shows the striking process of making one of his Nixie tubes.
Each of his tubes get an astounding amount of love and attention. An evolution of the process he has been working on for five years now. The video starts with the cleaning process for the newly etched metal parts. Each one is washed and dried before being taken for storage inside a clean hood. The metal parts are carefully hand bent. Little ceramic pins are carefully glued and bonded. These are used to hold the numbers apart from each other. The assembly is spot welded together.
In a separate cut work begins on the glass. The first part to make is the bottom which holds the wire leads. These are joined and then annealed. Inspection is performed on a polariscope and a leak detector before they are set aside for assembly. Back to the workbench the leads are spot welded to the frame holding the numbers.
It continues with amazing attention to detail. So much effort goes into each step. In the end a very beautiful nixie tube sits on a test rack, working through enough cycles to be certified ready for sale. The numbers crisp, clear, and beautiful. Great work keeping this loved part of history alive in the modern age.
When I start up a new project, one that’s going to be worth writing up later on, I find it’s useful to get myself into the right mindset. I’m not a big planner like some people are — sometimes I like to let the project find its own way. But there’s also the real risk of getting lost in the details unless I rein myself in a little bit. I’m not alone in this tendency, of course. In the geek world, this is known as “yak shaving“.
The phrase comes obliquely from a Ren and Stimpy episode, and refers to common phenomenon where to get one thing done you have to first solve another problem. The second problem, of course, involves solving a third, and so on. So through this (potentially long) chain of dependencies, what looks like shaving a yak is obliquely working on cracking some actually relevant problem. Continue reading “Yak Shaving: Hacker Mode vs Maker Mode”→
Showing any sort of ‘hacking’ on either the big screen or the small often ends in complete, abject failure. You only need to look at Hackers with its rollerblading PowerBooks, Independance Day where the aliens are also inexplicably using PowerBooks, or even the likes of Lawnmower Man with a VR sex scene we keep waiting for Oculus to introduce. By design, Mr Robot, a series that ended its first season on USA a month ago, bucks this trend. It does depressed, hoodie-wearing, opioid-dependant hackers right, while still managing to incorporate some interesting tidbits from the world of people who call themselves hackers.
In episode 0 of Mr Robot, we’re introduced to our hiro protagonist [Elliot], played by [Rami Malek], a tech at the security firm AllSafe. We are also introduced to the show’s Macbeth, [Tyrell Wellick], played by Martin Wallström]. When these characters are introduced to each other, [Tyrell] notices [Elliot] is using the Gnome desktop on his work computer while [Tyrell] says he’s, “actually on KDE myself. I know [Gnome] is supposed to be better, but you know what they say, old habits, they die hard.”
While this short exchange would appear to most as two techies talking shop, this is a scene with a surprisingly deep interpretation. Back in the 90s, when I didn’t care if kids stayed off my lawn or not, there was a great desktop environment war in the land of Linux. KDE was not free, it was claimed by the knights of GNU, and this resulted in the creation of the Gnome.
Subtle, yes, but in one short interaction between [Elliot] and [Tyrell], we see exactly where each is coming from. [Elliot] stands for freedom of software and of mind, [Tyrell] is simply toeing the company line. It’s been fifteen years since message boards have blown up over the Free Software Foundation’s concerns over KDE, but the sentiment is there.
There’s far more to a hacker ethos than having preferred Linux desktop environments. Hacking is everywhere, and this also includes biohacking, In the case of one Mr Robot character, this means genetic engineering.
In one episode of Mr Robot, the character Romero temporarily gives up his power in front of a keyboard and turns his mind to genetics. He “…figured out how to insert THC’s genetic information code into yeast cells.” Purely from a legal standpoint, this is an interesting situation; weed is illegal, yeast is not, and the possibilities for production are enormous. Yeast only requires simple sugars to divide and grow in a test tube, marijuana actually requires a lot of resources and an experienced staff to produce a good crop.
The promise of simply genetically modifying yeast to produce THC is intriguing; a successful yeast-based grow room could outproduce any plant-based operation, with the only input being sugar. Alas, the reality of the situation isn’t quite that simple. Researchers at Hyasynth Bio have only engineered yeast to turn certain chemical precursors into THC. Making THC from yeast isn’t yet as simple as home brewing an IPA, but it’s getting close, and a great example of how Mr Robot is tapping into hacking, both new and old.
Why Aren’t We Arguing More About This?
The more we ruminate on this show, the more there is to enjoy about it. It’s the subtle background that’s the most fun; the ceiling of the chapel as it were. We’re thinking of turning out a series of posts that works through all the little delights that you might have missed. For those who watched and love the series, what do you think? Perhaps there are other shows worthy of this hacker drill-down, but we haven’t found them yet.
A 14-year-old in Dallas, Texas has been arrested for bringing a clock to his school. [Ahmed Mohamed] could be any one of us. He’s a tinkerer, pulling apart scrap appliances and building projects from the parts. He was a member of the his middle school robotics team. The clock was built from a standard four digit seven segment display and a circuit board. [Ahmed] built the circuit inside a Vaultz hard pencil case like this one. He then did what every other experimenter, inventor, hacker, or maker before him has done: He showed off his creation.
Unfortunately for [Ahmed] one of his teachers immediately leapt to the conclusion that this electronic project was a “hoax bomb” of some sort. The police were called, [Ahmed] was pulled out of class and arrested. He was then brought to a detention center where he and his possessions were searched. [Ahmed] is now serving a three-day suspension from school. His clock is considered evidence to be used in a possible criminal case against him.
If this situation doesn’t get your blood boiling, then we don’t know what does. Not only is there a glaring racial issue here, but also an issue of allowing kids to bring their projects to school. We hope you’ll join us in expressing outrage at this whole debacle, as well as supporting [Ahmed] in any way you can. Let’s join together as a community to make sure a few small-minded individuals don’t break the spirit of this budding hardware hacker.
For anyone out there who would like to support [Ahmed]’s education even when his school won’t, [Anil Dash] is will be in contact with the family later today. We’re offering a gift card for the hackaday store and we would assume other contributions would also be welcome. -Ed.