pouet.chapril.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Chapril https://www.chapril.org est un projet de l'April https://www.april.org

Administré par :

Statistiques du serveur :

1,1K
comptes actifs

#hacked

1 message1 participant0 message aujourd’hui
Sean O'Brien<p>Had your account <a href="https://privacysafe.social/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a> because your password was "qwerty1993"? 🤦</p><p>Our <span class="h-card" translate="no"><a href="https://privacysafe.social/@privacysafe" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>privacysafe</span></a></span> team released a small, simple tool to help you generate strong passwords &amp; memorable passphrases — right in your web browser, wherever you are. 🌍<br><a href="https://psafe.ly/mnnyWH" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">psafe.ly/mnnyWH</span><span class="invisible"></span></a></p><p>cc <span class="h-card" translate="no"><a href="https://mamot.fr/@pluralistic" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pluralistic</span></a></span></p>
Inkican<p>Like punk culture, hacking took on a life of its own, creating and feeding off its own public perception. <a href="https://inkican.com/mesh-and-the-history-of-hacking-part-one-hacking-cyberpunk-infosec/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">inkican.com/mesh-and-the-histo</span><span class="invisible">ry-of-hacking-part-one-hacking-cyberpunk-infosec/</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Nonilex<p>Meanwhile, morale has plummeted, said 3 <a href="https://masto.ai/tags/OPM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPM</span></a> ofcls, as <a href="https://masto.ai/tags/DOGE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOGE</span></a> agents have clashed w/senior career personnel. One official recalled a recent meeting in which a young DOGE team member began screaming at senior developers &amp; calling them “idiots.”</p><p>A halt to IT upgrades — along w/fresh access by outsiders w/the power to install new programs — could create novel vulnerabilities at an agency that has been repeatedly <a href="https://masto.ai/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a> by foreign <a href="https://masto.ai/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> services.</p><p><a href="https://masto.ai/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://masto.ai/tags/law" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>law</span></a> <a href="https://masto.ai/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> <a href="https://masto.ai/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> chips can be <a href="https://mas.to/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a> to <a href="https://mas.to/tags/leak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leak</span></a> secrets from <a href="https://mas.to/tags/Gmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gmail</span></a> , <a href="https://mas.to/tags/iCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iCloud</span></a> , and more <br> <br>The <a href="https://mas.to/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a>, affecting the CPUs in later generations of Apple A- and M-series chip sets, open them to side channel attacks<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/</span></a></p>
Peter Mount<p>It looks like the YouTube retro channel TheLairdsLair has been hacked.</p><p>All it's previous videos are gone and the channels name is now Space X Live (but still has the original handle).</p><p>Only noticed as there's a new retro video out in the last hour but thought it was odd with the channel name in the notification.</p><p><a href="https://area51.social/tags/retroComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retroComputing</span></a> <a href="https://area51.social/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> <a href="https://area51.social/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a></p>
Inkican<p>Open Source LLM Tool Sniffs Out Python Zero-Days<br><a href="https://www.darkreading.com/application-security/open-source-llm-tool-finds-python-zero-days" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/application-se</span><span class="invisible">curity/open-source-llm-tool-finds-python-zero-days</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Inkican<p>Hacking FM radio for beginners.</p><p><a href="https://hackaday.com/2024/12/20/subchannel-stations-the-radio-broadcasts-you-didnt-know-were-there/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2024/12/20/subcha</span><span class="invisible">nnel-stations-the-radio-broadcasts-you-didnt-know-were-there/</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
realhackhistory<p><strong>Muddled History of the Digital Underground: Why realhackhistory&nbsp;Exists</strong></p>“Catching Computer Crooks”, Popular Mechanics, 1984<p>The image at the top of this blog is, from what I can find, the first stock image photo of a hacker in a ski mask that ever appeared in print, carrying on a visual association between hackers and bank robbers or safe crackers that has <a href="https://realhackhistory.org/2023/01/22/the-term-computer-cracker-goes-back-to-1969/" rel="nofollow noopener noreferrer" target="_blank">continued since 1969</a>. </p><p>How tropes and stereotypes originated and became perpetuated in the media is one of the main focuses of the realhackhistory project.</p><blockquote><p>We can be almost certain of being wrong about the future, if we are wrong about the past.</p><p>Gilbert K. Chesterton</p></blockquote>Illustration from “Superzapping in Computer Land”, TIME Magazine, January 12th, 1981<p>Before I try to define what this website and the associated <a href="https://studio.youtube.com/channel/UCLBx0xIydDmgreeALWNb0bg" rel="nofollow noopener noreferrer" target="_blank">YouTube</a> and <a href="https://chaos.social/@realhackhistory/" rel="nofollow noopener noreferrer" target="_blank">Mastodon</a> accounts are all about I want to discuss what they aren’t. </p><p>This history research, documentation and analysis project is not about trying to dox hackers from the past, reveal secrets that could get people into legal peril or fuel hacking scene gossip. I’m not interested in when Java was invented or the anniversary of the first web browser being created here either though, we are talking about hackers. The ‘darkside’.</p><p>This project is about documenting the history of people like Neal Patrick in the video below, who became the face of hacking in 1983 after being raided by the authorities, along with his hacking group the 414s.</p><p><a href="https://www.youtube.com/watch?v=dA3NuQdhu5U" rel="nofollow noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=dA3NuQdhu5U</a></p><p>Behind the blogs, the YouTube videos, <a href="https://archive.org/details/@realhackhistory" rel="nofollow noopener noreferrer" target="_blank">FOIA documents</a>, clips of funny hacker related TV shows or movies and the memes, realhackhistory is a genuine desire to keep the knowledge and stories of hackers of the past alive and provide some lessons that can still help people interested in hacking today.</p><p>I envision realhackhistory as a trail of breadcrumbs to help get you started on your way to understanding the past, and hopefully the present, of hacking better. Think of this as digital archaeology, if it makes it all sound cooler.</p><p><strong>Information on the Internet is frequently wrong</strong></p><p>If we start with some basic questions such as “<em>what was the first computer virus?</em>” or “<em>when was the first denial of service attack?</em>” and plug them into your search engine of choice you’ll start to notice something. </p><p>It isn’t that there are conflicting answers, some of these questions hinge on a subjective understanding of details such as what defines a computer virus, what operating system did it function on, what language was it coded in, etc. No, you start to notice how many answers that are clearly wrong are stated emphatically as fact.</p><p>We need an example, right? Let’s analyse this text below, from the online version of Encyclopedia Britannica:</p><blockquote><p>The first documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon and eBay.</p><p>Encyclopedia Britannica, “<a href="https://www.britannica.com/technology/denial-of-service-attack" rel="nofollow noopener noreferrer" target="_blank">denial of service attack</a>” entry</p></blockquote><p>Let’s unpack this. While it is true that mafiaboy carried out a widely reported on campaign of distributed denial of service (DDoS) attacks against high profile websites in 2000. This was not the first distributed denial of service attack and definitely not the first denial of service attack either.</p>Mafiaboy, an aficionado, but not originator, of denial of service attacks<p>Distributed denial of service attacks, called “Net Strikes” by participants, were<a href="http://www.spunk.org/texts/comms/sp001608.html" rel="nofollow noopener noreferrer" target="_blank"> </a>organised by <a href="http://www.spunk.org/texts/comms/sp001608.html" rel="nofollow noopener noreferrer" target="_blank">hacktivists in the mid 90’s </a>against French government websites which involved getting people to manually refresh those websites at a set time. There was also <a href="https://archive.nytimes.com/www.nytimes.com/library/cyber/week/0914panix.html" rel="nofollow noopener noreferrer" target="_blank">a huge DDoS attack</a> against Manhattan based ISP Panix in September of 1996.</p><p>The first denial of service attack over a computer network is widely believed to have been in 1974, when someone discovered a way to use a newly introduced feature in TUTOR to <a href="http://www.platohistory.org/blog/2010/02/perhaps-the-first-denial-of-service-attack.html" rel="nofollow noopener noreferrer" target="_blank">lock up other PLATO terminals </a>remotely at CERL, the Computer-based Education Research Laboratory, at the University of Illinois Urbana-Champaign.</p><p>It doesn’t necessarily matter that there may have been other denial of service attacks before 1974, what matters I think is that the first denial of service attack was definitely not in 2000 and that this is incorrect information being presented as fact. </p><p>How did this clearly wrong history sneak into an encyclopedia? I would suspect the loop of incorrect information that begins to be circulated online and eventually becomes, through copying, regurgitation and repetition, accepted fact. Nobody bothers to go back to original sources, lazy journalism becomes grist for a slew of blogs which eventually becomes part of a reference book and then accepted fact.</p><p>Incorporating AI into search engines will only make this problem worse, if the average of all the information about the history of hacking is a bunch of copypasta in infosec marketing or lazy journalism then that is what the AI search function will regurgitate. Garbage in, garbage out.</p><p><strong>Tracing attitudes to hackers in pop culture</strong></p><p>Hackers were not always demonised, hacking was not always a part of pop culture and the word “hacker” itself was not widely used to describe anything other than a bad golfer until mid 1983. I’ve written <a href="https://realhackhistory.org/2023/09/29/1983-the-year-pop-culture-caught-up-with-hackers/" rel="nofollow noopener noreferrer" target="_blank">a whole blog on the topic</a>.</p>The ‘Whiz Kids’, from the 1983 TV show of the same name about teens who solve mysteries with the aid of computers, social engineering and hacking<p>We can look at how journalists wrote about hacking and hackers in the past and how hackers evolved as character archetypes and hacking became a trope in movies and television.</p><p>We can chart the way hackers are viewed, from novelty or curiosity through to menace and then back to heroic anti-heroes before lately becoming a facet of shadowy criminal gangs, as the view of hackers as professionalised “cybercriminals” takes hold in the public imagination.</p>The German poster for 1983’s WarGames, a movie about hacking in which the word “hacker” is never used<p>The 90’s saw an explosion of hacker and hacking related movies as people became unable to ignore the rise of the internet and computers became a part of every day life. I made a YouTube video about one such movie, The Net.</p><p><a href="https://www.youtube.com/watch?v=ug3-h7nYV0Q" rel="nofollow noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=ug3-h7nYV0Q</a></p><p>Hacker related documentaries, news segments and TV specials created by non-hackers provide a fascinating snapshot of the attitudes towards hackers and how hacking touched on current events at the time the documentary was filmed. I’ve put as many as I can find from over the years <a href="https://www.youtube.com/watch?v=_2lmjy-fFSw&amp;list=PLeyarqHogpNLf8GXvOoLja4ZXmlf1c2eE&amp;ab_channel=realhackhistory" rel="nofollow noopener noreferrer" target="_blank">up on my YouTube channel</a>.</p><p><strong>Preserving &amp; promoting hacker culture</strong></p><p>While a lot of people have heard of <a href="https://www.2600.com/" rel="nofollow noopener noreferrer" target="_blank">2600 Magazine</a>, or the <a href="http://phrack.org/" rel="nofollow noopener noreferrer" target="_blank">phrack e-zine</a>, there is a lot more hacker culture created by hackers themselves out there waiting to be discovered. </p><p>Take published books about hacking written by hackers for instance, in the UK there was various editions of Hugo Cornwall’s book “The Hacker’s Handbook”, originally published in 1985. There was also infamous subversive publisher Loompanic’s book “The Computer Underground: Computer Hacking, Crashing, Pirating, and Phreaking” by M. Harry, which was also published in 1985.</p> <ul><li>“The Hacker’s Handbook”, original 1985 edition, by Hugo Cornwall</li><li>“The Computer Underground: Computer Hacking, Crashing, Pirating, and Phreaking” by M. Harry, Loompanics, 1985</li></ul><p></p> <p>Reading these books not only give us a snapshot of the scene at the time through the author’s eyes, but also a chance to read how hackers themselves defined a hacker.</p><blockquote><p>This book uses the word in a more restricted sense: hacking is a recreational and educational sport. It consists of attempting to make unauthorised entry into computers and to explore what is there. The sport’s aims and purposes have been widely misunderstood; most hackers are not interested in perpetrating massive frauds, modifying their personal banking, taxation and employee records, or inducing one world super-power into inadvertently commencing Armageddon in the mistaken belief that another super-power is about to attack it. </p><p>Every hacker I have ever come across has been quite clear about where the fun lies: it is in developing an understanding of a system and finally producing the skills and tools to defeat it. In the vast majority of cases, the process of ‘getting in’ is much more satisfying than what is discovered in the protected computer files.</p><p>“The Hacker’s Handbook” – Introduction, Hugo Cornwall, 1985</p></blockquote><p>Documentaries about hackers by hackers or people affiliated with the hacking scene are a more vivid look at some of the personalities who shaped scene history, or notable events that took place. Annaliza Savage’s “<a href="https://www.youtube.com/watch?v=fDk82bLYscg" rel="nofollow noopener noreferrer" target="_blank">Unauthorized Access</a>” released in 1994 is required viewing, as is “<a href="https://www.youtube.com/watch?v=0jinl0f-L80&amp;ab_channel=realhackhistory" rel="nofollow noopener noreferrer" target="_blank">Hackers 95</a>” by Phon-E and R.F. Burns, released in 1995 (of course), you can see a short clip of below.</p><p><a href="https://youtu.be/7abDgYYXhks?si=8upHxOHKs8wB6jX2" rel="nofollow noopener noreferrer" target="_blank">https://youtu.be/7abDgYYXhks?si=8upHxOHKs8wB6jX2</a></p><p>Over at <a href="http://www.textfiles.com/hacking/" rel="nofollow noopener noreferrer" target="_blank">textfiles.com</a> you can find an incredible resource in the form of archived hacker scene text files, from the BBS years up to the era of the world wide web. Among the files archived is a <a href="http://web.textfiles.com/ezines/" rel="nofollow noopener noreferrer" target="_blank">great many hacker e-zines</a>, or electronic magazines, text and text ASCII art documents that were published on a regular or semi-regular schedule.</p><p>The most famous hacker e-zine is undeniably <a href="http://phrack.org/issues/70/1.html" rel="nofollow noopener noreferrer" target="_blank">phrack magazine</a>.</p><blockquote><p>Basically, we are a group of phile writers<br>who have combined our philes and are distributing them in a group. This newsletter-type project is home-based at Metal Shop… These philes may include articles on telcom (phreaking/hacking), anarchy (guns and death &amp; destruction) or kracking. Other topics will be allowed also to an certain extent.</p><p>phrack issue <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/1/" target="_blank">#1</a>, Taran King, November 17th, 1985</p></blockquote><p>Hacker media is also in print though, with magazines like the now defunct Technological American Party Magazine of the 1970s or Blacklisted! 411 back in the nineties or 2600, which is still going strong.</p>2600 Magazine issue 1, page 6, January 1984<p><a href="https://www.2600.com/" rel="nofollow noopener noreferrer" target="_blank">2600 Magazine</a> began in January of 1984 with an article discussing a criminal case that contributors to the magazine had been involved in the year before the first issue came out. It was a series of raids on young hackers across the U.S. that the FBI called “Operation Mainframe”. I created a video on one of the groups caught up in the FBI investigation, the Inner Circle.</p><p><a href="https://www.youtube.com/watch?v=ppbx2POxxZU" rel="nofollow noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=ppbx2POxxZU</a></p><p>2600 staff continued to be involved in hacking related incidents in the years after, as we can see from the article from 1985 below that notes that the editor of 2600 had his BBS seized by New Jersey police.</p>“Police hunt suspects” – Altus Times, 18th July, 1985<p>You can find scanned issues of publications like <a href="https://anarchivism.org/w/Blacklisted!_411" rel="nofollow noopener noreferrer" target="_blank">Blacklisted! 411</a> over at archive.org and you can <a href="https://store.2600.com/products/one-year-domestic-subscription" rel="nofollow noopener noreferrer" target="_blank">subscribe to 2600</a> over at their website.</p><p><strong>Freedom of Information Act requests</strong></p><p>Locked away in dusty archives is a wealth of information on the history of hacking, specific hackers and hacking groups, held by government bodies and law enforcement agencies. </p><p>To paraphrase <a href="https://kolektiva.social/@NatSecGeek" rel="nofollow noopener noreferrer" target="_blank">NatSecGeek</a>, if you are willing to take five minutes to write a FOIA request and then to wait potentially years for that request to be fulfilled you can eventually find yourself with documents that can rewrite our understanding of events in the history of hacking. My inspiration for pursuing FOIA requests as part of realhackhistory has been the aforementioned <a href="https://kolektiva.social/@NatSecGeek" rel="nofollow noopener noreferrer" target="_blank">NatSecGeek</a> as well as <a href="https://infosec.exchange/@hexadecim8" rel="nofollow noopener noreferrer" target="_blank">hexadecim8</a> and their <a href="https://www.vice.com/en/article/vb9bjj/researchers-are-liberating-thousands-of-pages-of-forgotten-hacking-history-from-the-us-government" rel="nofollow noopener noreferrer" target="_blank">Hacking History project</a>. </p><p>You can find the documents they have retrieved from various archives <a href="https://www.muckrock.com/project/hacking-history-419/" rel="nofollow noopener noreferrer" target="_blank">here</a>, and you can find my uploads of responsive records <a href="https://archive.org/details/@realhackhistory" rel="nofollow noopener noreferrer" target="_blank">over at archive.org</a>.</p><p>If requesting FOIA documents can be a bit boring and laborious, receiving them makes me feel like a little kid on Christmas morning.</p><p>FOIA archive requests can turn up completely different versions of events that had long been considered to be definitively settled. Records can show us scans or photocopies of newspaper or magazine articles since lost to time, printouts of webpages that are no longer online and the chance to see how government agencies or law enforcement have viewed the computer underground over the years.</p><p>In requesting documents I have primarily focused on records relating to hacking incidents between 1980 and 2005, with a particular interest in records from the early to mid 1980’s <a href="https://gizmodo.com/thousands-of-fbi-documents-about-civil-rights-era-destr-1635448055" rel="nofollow noopener noreferrer" target="_blank">as records can degrade or get lost over time</a>.</p><p>Because of FOIA requests we can see that in 1983 some people were so upset about the FBI raiding high-school age hackers linked to the Inner Circle hacking group that they wrote their Senator in California.</p><p>Or we can see the actual photocopies of notes of targeted systems seized by the FBI from those same hackers.</p><p>The text files, e-zine and magazine articles written by hackers provide one part of the story, the newspaper articles and TV segments on hacking incidents provide another and FOIA documents are the last piece of the puzzle that we as hacker history enthusiasts can hope to get our hands on in terms of records.</p><p>I plan future blog entries on how to file FOIA requests, how to decide what to FOIA and some dead ends I have reached in relation to past hacker events and incidents that someone else might want to pick up the threads from.</p><p><strong>In conclusion</strong></p><p>So that’s it, an explanation as to why realhackhistory exists, long since overdue and the start of a call to action for others who are interested, to see what they can add to the public knowledge of the roots of the hacking scene. </p><p>If I can outline a roadmap for the future of the project, I want to expand my understanding of the history of hacking outside of the English speaking world, start finding countries outside of the U.S, the U.K. and Australia to FOIA and pursue freeing more media from closed archives.</p><p>I’d also like to take this time to thank the people who have inspired me along the way, in particular Gabriella Coleman, Emma Best and Emily Crose, for encouragement and guidance on this great journey.</p><p>If we don’t preserve our history, nobody else will.</p><p></p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/1/" target="_blank">#1</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/1980s/" target="_blank">#1980s</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/bbs/" target="_blank">#BBS</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/computer/" target="_blank">#computer</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/cracker/" target="_blank">#cracker</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/crackers/" target="_blank">#crackers</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/cracking/" target="_blank">#cracking</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/cyber-security/" target="_blank">#cyberSecurity</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/cybersecurity/" target="_blank">#cybersecurity</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/dark-side/" target="_blank">#darkSide</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/darkside/" target="_blank">#darkside</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/ddos/" target="_blank">#DDoS</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/encyclopedia/" target="_blank">#encyclopedia</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/fbi/" target="_blank">#FBI</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/films/" target="_blank">#films</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/foia/" target="_blank">#FOIA</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/hacked/" target="_blank">#hacked</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/hacker/" target="_blank">#hacker</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/hackers/" target="_blank">#hackers</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/hacking/" target="_blank">#hacking</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/historical/" target="_blank">#historical</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/history/" target="_blank">#history</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/inner-circle/" target="_blank">#InnerCircle</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/irc/" target="_blank">#IRC</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/mafiaboy/" target="_blank">#mafiaboy</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/media/" target="_blank">#media</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/movies/" target="_blank">#Movies</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/newspaper/" target="_blank">#newspaper</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/police/" target="_blank">#police</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/security/" target="_blank">#security</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/technology/" target="_blank">#technology</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/television/" target="_blank">#television</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/tv/" target="_blank">#TV</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/underground/" target="_blank">#underground</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://realhackhistory.org/tag/wargames/" target="_blank">#WarGames</a></p>
Joe Ortiz<p>The <span class="h-card"><a href="https://mastodon.archive.org/@internetarchive" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>internetarchive</span></a></span> just got catastrophically hacked and this is bad obviously. <a href="https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/internet-archive-hacked-data-breach-impacts-31-million-users/</span></a></p><p>With the organization fighting for its very existence right now (see above posts/toots), this is at a worst time. I'm sure the publishers, record labels, and the copyright cartel have something to do with this as they surely paid these groups to do this.</p><p><a href="https://mastodon.sdf.org/tags/InternetArchive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetArchive</span></a> <a href="https://mastodon.sdf.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.sdf.org/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a></p>