Four principles that differentiate ordinary computer programmers from hackers. In college, I had no idea how to code. I was determined to make my own music sharing app ( ), but I didn’t have a clue how to start. like Napster! That summer, I befriended a hacker. His name was The Lion King (seriously, as in his screen name was ). And he taught me lots of new tricks: LionKing909 But most notably, he introduced me to — four principles that differentiate ordinary computer programmers from hackers. The Hacker Ethic inspired me deeply. Eventually, I decided I wouldn’t just learn to code: I would become a hacker. The Hacker Ethic What is a hacker? Defining isn’t so straightforward. The name has an “I know it when I see it” ring to it. Most computer programmers are hackers, but not all of them. hacker For some, the word conjures up images of Soviet tech experts breaking into CIA computers, or criminals wearing Guy Fawkes masks, Mr. Robot-style. Those people certainly exist, but a hacker who hacks maliciously or for personal gain is a specific type of hacker known as a black hat hacker. Black hat hackers are an unfortunate distraction from all the kickass white hat hackers out there — the people who built and are continuing to build the internet that billions of people use every day! hacker In general, . Hackers are scrappy. Hackers express themselves with computer code and use their skills to solve problems. hackers are problem solvers Steve Wozniak is a hacker, and yet Bill Gates, while he certainly has displayed hacker-ish qualities, clashed quite seriously with the hacker community in the mid-70s when he famously began selling his software. To understand the distinction, as well as the causes of many of the most famous tech decisions of the past century, by everyone from Steve Jobs, to Satoshi Nakamoto, you’re going to need to understand the secret code of hackers. The Hacker Ethic All hackers (good and evil) share a core belief that . This was distilled into text for the first time by in his 1984 book . In the book, Levy outlined The Hacker Ethic — a code of beliefs embraced by nearly all computer hackers. The ethics weren’t crafted by Steven Levy or any one person to dictate how hackers should act, rather they’re a reflection of the hacker culture that has grown organically over many decades. information should be free Steven Levy Hackers My hope in sharing The Hacker Ethic here is to give you a deeper understanding of how hackers think. One day you may hire a hacker, work with one, or wish to become one yourself. In that case, consider this your first step into their culture. These are the top four principles of The Hacker Ethic. 1. “Information should be free” “Free” information means the freedom to copy existing code and to share that information with others. The first generation of hackers began with a group of students at MIT in the 1950s. After hours, they would sneak into the Lincoln Library on campus where they’d vie for a few hours to play with the $3 million TX-0 computer. Unlike today where most students have individual laptops, passwords, and seemingly unlimited time to spend on their computers, the MIT hackers shared just one computer. There were no passwords, so any one person’s code could be viewed by anyone else on the system. The early hackers were ok with this. More than ok, actually, because they quickly found value in sharing code. The original MIT hackers quickly began collaborating on building software. That’s the hackers way. Why build competing versions of software, when we can instead work together to share knowledge and create the very best version? Today the entire world benefits from the decisions of these early hackers. One of the most meaningful outcomes is the Free and Open Source Software movement. Started by in 1985, the free software movement encourages millions of people to share, copy, and remix code. Richard Stallman Today 80% of smartphones , and 80% of websites run on free software (aka. Linux, the most famous open source operating system). In addition, WordPress, Wikipedia, and nearly all programming languages are all free! All thanks to The Hacker Ethic. The (written by Richard Stallman), and the are two examples of software licenses that render The Hacker Ethic into a legal text. says the opening paragraph of the GPL License MIT License “Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software…,” MIT license . These licenses help explain why no one “owns” the internet (as we’ll discuss in future chapters). Back in the 1990s, Tim Berners Lee released his original World Wide Web software under the MIT license. When Napster was shut down in 2001, it was easy for copycat sites to pop up because — you guessed it — open source versions were already free to share! 2. Computers can change your life for the better. pursuit, but also as a tool for making the world a better place. Hackers see computer programming not merely as a technical For example, hackers can write code to automate redundant tasks… And they spread free information with the goal of improving the quality of human life… “Imagine a world in which every single person on the planet is given free access to the sum of all human knowledge. That’s what we’re doing.” — Jimmy Wales, Wikipedia Founder This tenet of using computers to “improve life for the better” goes all the way back to who, in 1945, published the essay “As We May Think,” in which he pressed scientists to stop building war machines and to consider using technology as a force for good. Vannevar Bush “As We May Think,” Vannevar Bush (1945) These days, the phrase “make the world a better place” has become so embedded in Silicon Valley culture that it’s satirized as a running gag on the TV series . On the show, every startup founder seems to justify their actions through the mantra “ .” Silicon Valley we’re making the world a better place We’re making the world a better place… Whether hackers these days are authentically upholding The Hacker Ethic, or just paying it lip service is up for debate. What remains true is The Hacker Ethic’s influence on both hacker culture and our society. 3. Mistrust authority — promote decentralization Hackers are encouraged to think critically and to challenge the status quo. In the 1960s, Americans were wary of organizations where only a few powerful people controlled the flow of information. Think: Nazi Germany, The Soviet Union spying vigilantly its own people, and the omen “Big Brother is watching you” as described in George Orwell’s 1984. Hackers promote decentralization in order to dilute the concentration of power and fight to redistribute that power among the many. Hackers Promote Decentralization One way hackers promote decentralization is by building tools. Bitcoin is a that was created by Satoshi Nakamoto that completely removes the authority (and thus power) of banks. Bitcoin allows individuals to manage, send and receive money in a decentralized manner. tool Hackers also promote decentralization in their . WordPress is a software ecosystem that was created by thousands of developers around the world — most of who have never met each other. Many startups attempt to emulate this model of communication with (aka. A boss-less culture) so that employees can make decisions without constantly needing to ask permission. social organizations flat company structure 4. Hackers should be judged by their hacking, not based on degrees, age, race, sex, or position Hackers judge each other by the quality of their code. This helps explain how Bill Gates and Mark Zuckerberg could drop out of Harvard build billion dollar companies. Code is meritocratic. A hacker doesn’t need permission to hack. Your ability is not defined by who you know, or your expensive computer science degree. If your dog writes JavaScript better than you, then the dog should be hired. As Bill Gates has said, “If you want to hire an engineer, look at the guy’s code. That’s all.” The Swarm of Bees A swarm of decentralized bees In the 1960s, the early hackers were buzzing like a gigantic swarm of bees. MIT was a beehive in the east, and Silicon Valley in the west. How do hundreds of bees coordinate? Contrary to popular belief, they’re not led by the queen bee — she stays in the hive. Bees rely on decentralized decision making for critical choices. It is for that reason that bees are often cited as a visual metaphor for how decentralized groups organize. : keep code free, and make the world a better place. Everything was buzzing along smoothly. And then someone kicked the nest… In the 1960s, The Hacker Ethic was story that helped organize strangers around a single mission you missed part one you can read it now at . Coming up next : The incident that spread The Hacker Ethic from the halls of academia and out into the rest of the world. And if The History of the Internet Very special thanks to , and for reading early drafts and providing countless insights. was originally published at . Pippa Biddle Alexis Rondeau The Secret Hacker Code One Month: Learn to code in 30 Days