hacker in Bodo 2015


en the most usable of all the different search boxes one can type a query in5.
Meanwhile there are plenty of physical spaces which offer good coffee, an AC plug, comfortable chairs
and low levels of noise to meet, read and study from local cafes via hacker- and maker spaces, to coworking offices. Many library competitors have access to resources (human, financial, technological and
legal) way beyond the possibilities of even the richest libraries. In addition, publishers control the
copyrights in digit


hacker in Bodo 2016


inst the commercialization of public resources, the (second) enclosure
(Boyle 2003) of the public domain. Those handful who decide to publicly defend
their actions, speak in the same voice, and tell very similar stories. Aaron
Swartz was an American hacker willing to break both laws and locks in his
quest for free access. In his 2008 “Guerilla Open Access Manifesto” (Swartz
2008), he forcefully argued for the unilateral liberation of scholarly
knowledge from behind paywalls to provide universal acc


hacker in Constant 2015


and joined Constant for a few months
to document the various working practices at Constant
Variable. Between 2011 and 2014, Variable housed studios
for Artists, Designers, Techno Inventors, Data Activists,
Cyber Feminists, Interactive Geeks, Textile Hackers, Video
Makers, Sound Lovers, Beat Makers and other digital creators who were interested in using F/LOS software for
their creative experiments.

Why do you think people should use and or practice
Open Source software? What is in it for you?
Urantset


during a graffiti writer’s normal practice in the city’. In three interviews that took place in
Brussels and Paris within a period of one and a half years,
we spoke about the collaborative powers of the GMLstandard, about contact points between hacker and graffiti
cultures and the granularity of gesture.
Based on conversations between Evan Roth (ER), Femke
Snelting (FS), Peter Westenberg (PW), Michele Walther
(MW), Stéphanie Villayphiou (SV), John Haltiwanger (JH)
and momo3010.
Brussels, July 201


f code’?

There hasn’t been a programmatic way to archive graffiti. So this
is like taking a gesture and trying to boil it down to a set of coordinate
points that people can either upload or download. It is a sort of midpoint
between writers and hackers. Graffiti writers can download the software
and have how-to guides for how to do this, they can digitize their tags
ER

2
3

4
5
6
7

Theo Watson http://www.theowatson.com
In its simplest form, L.A.S.E.R. Tag is a camera and laptop setup, tracking a


and wanted to tie it back to someone, than it starts to be like
a surveillance camera. What happens when someone is caught with a
laptop with all this data?
FS

Your desire to archive, is it also about producing new work?

I see graffiti writers as hackers. They use the city in the same way
as hackers are using computer systems. They are finding ways of using
a system to make it do things that it wasn’t intended to do. I am not
sure graffiti writers see it this way, but I am in this position where I have
friends that are hackers, playing around with digital structures online.
Other friends are into graffiti writing and to me those two camps are
doing the most interesting things right now, but these are two communities that hardly overlap. One of the interests I have is maki


hat
part worked. Beyond that it has been a bit hard to keep the momentum.
Friends and colleagues send me ideas and ask me to look at things, but
people I don’t know are hard to follow; I don’t think they are publishing
their progress. There is a hackerspace in Porto that has been working on
it, so I see on their blog and Twitter that they are having meetings about
this and are working on it.
Don’t you think having only one prize produces a kind of exclusivity? It
seems logical not to publish your


drift towards entertainment uses, commercial uses.
ER

Do you think a standard can be subversive? You chose XML because it
is accessible to amateur programmers. But it is also a very formal standard,
and so the interface between graffiti writers and hackers is written in the
language of bureaucracy.
FS

ER (laughs) I thought that there was something funny with that. People
that know XML and the web, they get the joke that something so rigid
and standardized is connected to writing your name on the wall



capture a graffiti writer should have no more than 300
worth of equipment on him or herself.

I was trying to think of how the challenge could be gamed ... I did not
want to get into a situation where we were getting stressed out because some
smart hacker found a hole in the brief, and bought a next generation iPhone
that somehow just worked. I didn’t want to force people to buy expensive
equipment. This line was more about covering our own ass.
ER



The graffiti writer must be able to activate


his in Hip Hop,
of course. The whole idea of sampling, the whole idea of turning a playback
device into a musical instrument, the idea of touching the record: all of
these things are hacks. We could go into a million examples of how graffiti
is like hacker culture.
In terms of that handshake moment between the two communities, I think
that is about realizing that its not about the code and in some sense its not
about the spraypaint. There’s this empowering idea of individual small actors
assuming con


was interested in forms of appropriation art that instead of claiming
some kind of ‘super-user’ status for artists, might provide
a platform for open access and Free Culture not imaginable elsewhere. I’ve admired Cornelia’s contributions to
hacker culture for long. She pioneered as a cyberfeminist
in the 1990s with the hilarious and intelligent net-art piece
Female Extension 2 , co-founded Old Boys Network 3 and
developed seminal projects such as the Net Art Generator.
The opportunity to spend


hacker in Constant 2018


in academia
and elsewhere, we grounded our methods in hands-on exercises and
experiments that you now can try at home. This Guide to Techno-Galactic
Software Observation offers methods developed in and inspired by the
context of software production, hacker culture, software studies,
computer science research, Free Software communities, privacy activism,
and artistic practice. It invites you to experiment with ways to stay
with the trouble of software.

The Techno-Galactic Software Observatory
---------


e also administering these networks. Hence, we are
presented with the situation that the use of SWOA is condoned when it is
down by researchers and pen testers (e.g., they were hired) and shunned
when done by others (often subject to name calling as hackers or
attackers).]{.when .descriptor} [What: Deep philosophical moment: most
software has a recursive observatory ambition (it wants to be observed
in its execution, output etc.). Debuggers, logs, dashboards are all
instances of software with observato


hacker in Dean, Dockray, Ludovico, Broekman, Thoburn & Vilensky 2013


to Facebook’.
AL Neural started surrounded by the thrills of the rising global ‘telematic’
networks in 1993, reflecting an interest in intertwining culture and technology
with publishing (either cyberpunk science fiction, internet artworks, or hacker
technologies and practices) in both print and digital media. So, printing a
magazine about digital art and culture in that historical moment meant to
be surrounded by stimuli that pushed beyond the usual structural design
forms and conceptual paradig


revealed a three-dimensional picture, tricking
the readers’ eyes and drawing them into a new visual dimension for a while.
And finally, politically: in issue #18 we published a hacktivist fake, a double
page of fake stickers created by the Italian hacker laboratories’ network.
These fake stickers sarcastically simulated the real ones that are mandatory
on any book or CD/DVD sold in Italy, because of the strict law supporting the
168

New Formations

national Authors’ and Musicians’ Society (SI


hacker in Dekker & Barok 2017


Mars approached me the
following year, and then in 2013 he introduced me to Kenneth Goldsmith. We are in steady contact, especially through
public events hosted by various cultural centres and galleries.
The first large one was held at Ljubljana’s hackerspace Kiberpipa in 2012. Later came the conferences and workshops
organized by Kuda at a youth centre in Novi Sad (2013), by
the Institute of Network Cultures at WORM, Rotterdam (2014),
WKV and Akademie Schloss Solitude in Stuttgart (2014),
Mama & Nov


Department
8
of the University of Malmo (2016).8
For more information see,
The leitmotif of all these events was the digital library
https://monoskop.org/
Digital_libraries#
and their atmosphere can be described as the spirit of
Workshops_and_
early
hacker culture that eventually left the walls of a
conferences.
Accessed 28 May 2016.
computer lab. Only rarely there have been professional
librarians, archivists, and publishers among the speakers, even though the voices represented were quite diverse.
To


hacker in Graziano 2018


various European countries, a policy led by Italian government. Yet another example would be the increasing number of municipal decrees that make it a crime to offer food, money or shelter to the homeless in many cities in North America and Europe.
Hacker Ethics

This scenario reminds us of the tragic story of Antigone and the age-old question of what to do when the relationship between what the law says and one what feels it is just becomes fraught with tensions and contradictions. Here, the second meaning of ‘pirate care’ becomes apparent as it points to the way in which a number of initiatives have been responding to the current crisis by mobilizing tactics and ethics as first developed within the hacker movement.

As described by Steven Levy in Hackers, the general principles of a hacker ethic include sharing, openness, decentralization, free access to knowledge and tools, and an effort of contributing to society’s democratic wellbeing. To which we could add, following Richard Stallman, founder of the free software movement, that


financial and corporate circles came to invade the rest of society — education, science, government — and eventually, to pervade almost every aspect of everyday life.”
The forceps and the speculum

And thus, in resonance with the tradition of hacker ethics, a number of ‘pirate care’ practices are intervening in reshaping what looking after our collective health will look like in the future. CADUS, for example, is a Berlin based NGO which has recently set up a Crisis Response Makerspace to bu


hacker in Hamerman 2015


impacts on the openness of the digital book as a
collaborative knowledge-sharing device.

In contrast, the pirate library actualizes a gift economy based on qualitative
and communal rather than monetized exchange. As Mackenzie Wark writes in _A
Hacker Manifesto_ (2004), “The gift is marginal, but nevertheless plays a
vital role in cementing reciprocal and communal relations among people who
otherwise can only confront each other as buyers and sellers of commodities.”

From theorizing new m


hacker in Mars & Medak 2019


y Richard Stallman while he was working at the MIT Artificial
Intelligence lab. It was at the MIT Museum that the “Hall of Hacks”
was set up to proudly display the roots of hacking culture. Hacking
culture at MIT takes many shapes and forms. MIT hackers famously
put a fire truck (2006) and a campus police car (1994) onto the
roof of the Great Dome of the campus’s Building 10; they landed
(and then exploded) a weather balloon onto the pitch of Harvard
Stadium during a Harvard–­Yale football gam


hacker in Mars, Medak & Sekulic 2016


institutions, so as to first enable
the transition from what was an unjust,
discriminating and exploitative to a better society, and later guarantee that these
gains would not be dismantled or rescinded. That reminder is, however, more than a

mere hacker pastime, just as the reactions
of the corporations are not easy-going at
all: in mid-2015, Reed Elsevier initiated
a court case against Library Genesis and
Science Hub and by the end of 2015 the
court in New York issued a preliminary
injunction order


hacker in Mattern 2014


icated to lifelong learning? Should libraries be reconceived as hubs for
civic engagement, where communities can discuss local issues, create media,
and archive community history? 20 Should they incorporate media production
studios, maker-spaces and hacker labs, repositioning themselves in an evolving
ecology of information and educational infrastructures?

These new social functions — which may require new physical infrastructures to
support them — broaden the library’s narrative to include _eve


ia “consumption” and “creation” lie on a gradient of
knowledge production. Today there’s a lot of talk about — [and action
around](http://www.infodocket.com/2013/12/16/results-of-makerspaces-in-
libraries-study-released/) — integrating hacker labs and maker-spaces. 24 As
Anne Balsamo explains, these sites offer opportunities — embodied, often
inter-generational learning experiences that are integral to the development
of a “technological imagination” — that are rarely offered in f


hacker in Mars & Medak 2017


mons Team Croatia (Creative Commons,
2016). He initiated GNU GPL publishing label EGOBOO.bits (2000) (Monoskop,
2016a), meetings of technical enthusiasts Skill sharing (Net.culture club MaMa,
2016b) and various events and gatherings in the fields of hackerism, digital
cultures, and new media art. Marcell regularly talks and runs workshops about
hacking, free software philosophy, digital cultures, social software, semantic web
etc. In 2011–2012 Marcell conducted research on Ruling Class Studies at Jan


eb, Croatia) (Net.culture club MaMa, 2016a).
Tomislav is an active contributor to the Croatian Right to the City movement
(Pravo na grad, 2016). He interpreted to numerous books into Croatian language,
including Multitude (Hardt & Negri, 2009) and A Hacker Manifesto (Wark,
2006c). He is an author and performer with the internationally acclaimed Zagrebbased performance collective BADco (BADco, 2016). Tomislav writes and talks
about politics of technological development, and politics and aesthetics.
Tomi


bitions
and performances – and all of that at once! The Multimedia Institute was an active
part of that history, so it is hardly a surprise that the Public Library project took a
similar path of development and contextualization.
However, European hacker communities were rarely hanging out with critical
digital culture crowds. This is not the place to extensively present the historic
trajectory of different hacker communities, but risking a gross simplification here
is a very short genealogy. The earliest European hacker association was the
German Chaos Computer Club (CCC) founded in 1981. Already in the early
1980s, CCC started to publicly reveal (security) weaknesses of corporate and
governmental computer systems. However, their focus on digital rights, privacy,
cy


m. The CCC were very successful in raising issues, shaping
public discussions, and influencing a wide range of public actors from digital rights
advocacy to political parties (such as Greens and Pirate Party). However, unlike the
Italian and Spanish hackers, CCC did not merge paths with other social and/or
political movements. Italian and Spanish hackers, for instance, were much more
integral to autonomist/anarchist, political and social movements, and they have
kept this tradition until the present day.
PJ & AK: Can you expand this analysis to Eastern Europe, and ex-Yugoslavia
in particular? What were the distinct features of (the development of) hacker
culture in these areas?
MM & TM: Continuing to risk a gross simplification in the genealogy, Eastern
European hacker communities formed rather late – probably because of the
turbulent economic and political changes that Eastern Europe went through after
1989.
In MaMa, we used to run the programme g33koskop (2006–2012) with a goal to
“explore the scope of (ter


cess of commons-based peer production projects, where a large number of
people develop software collaboratively over the Internet without the exclusion by
property (Benkler, 2006).
There was a period when it seemed that cultural workers, artists and hackers
would follow the successful model of the Free Software Movement and build a
universal commons-based platform for peer produced, shared and distributed
culture, art, science and knowledge – that was the time of the Creative Commons
movement. But th


& AK: Please describe the interplay between the Free Software Movement
and the radically capitalist Silicon Valley start-up culture, and place it into the
larger context of political economy of software development. What are its
consequences for the hacker movement?
MM & TM: Before the 2008 economic crash, in the course of only few years,
most of those start-ups and services had been sold out to few business people who
were able to monetize their platforms, users and usees (mostly via advertisement)
or


rate start-up
period brought about a huge enthusiasm and the belief that entrepreneurial spirit,
fostered either by an individual genius or by collective (a.k.a. crowd) endeavour,
could save the world. During that period, unsurprisingly, the idea of hacker
labs/spaces exploded.
Fabulous (self)replicating rapid prototypes, 3D printers, do-it-yourself, the
Internet of Things started to resonate with (young) makers all around the world.
Unfortunately, GNU GPL (v.3 at the time) ceased to be a priority. The


source community, and to keep own reputation of ‘the good citizen,’ many
software components would get its source code published on GitHub – which is a
prime example of that game of enclosure in its own right. Such developments
transformed the hacker movement from a genuine political challenge to the
property regime into a science fiction fantasy that sharing knowledge while
keeping hackers’ meritocracy regime intact could fix all world’s problems – if only
we, the hackers, are left alone to play, optimize, innovate and make that amazing
technology!
THE SOCIAL LIFE OF DIGITAL TECHNOLOGIES

PJ & AK: This brings about the old debate between technological determinism
and social determinism, which never seems to go out of fashion. What is your take,
253

CHAPTER 12

as active hackers and social activists, on this debate? What is the role of
(information) technologies in social development?
MM & TM: Any discussion of information technologies and social
development requires the following parenthesis: notions used for discussing
te


e used to be at the forefront of the
Free Software Movement. In the spectacular chain of recent events, where the
revelations of sweeping control and surveillance of electronic communications
brought about new heroes (Manning, Assange, Snowden), the hacker is again
reduced to the heroic cypherpunk outlaw. This firmly lies within the old Cold War
paradigm of us (the good guys) vs. them (the bad guys). However, only rare and
talented people are able to master cryptography, follow exact security protocols


lot of headspace for developing a different social imaginary can be gained
from that venturing aspect of contemporary art. Having said that, art does not need
to be political in order to be relevant and strong.

261

CHAPTER 12

THE DOUBLE LIFE OF HACKER CULTURE

PJ & AK: The Public Library project (Memory of the World, 2016a) is essentially
pedagogical. When everyone is a librarian, and all books are free, living in the
world transforms into living with the world – so The Public Library project is also
essentially anti-capitalist. This brings us to the intersections between critical
pedagogy of Paulo Freire, Peter McLaren, Henry Giroux, and others – and the
hacker culture of Richard Stallman, Linus Torvalds, Steven Lévy, and others. In
spite of various similarities, however, critical pedagogy and hacker culture disagree
on some important points.
With its deep roots in Marxism, critical theory always insists on class analysis.
Yet, imbued in the Californian ideology (Barbrook and Cameron, 1996), the hacker
culture is predominantly individualist. How do you go about the tension between
individualism and collectivism in The Public Library project? How do you balance
these forces in your overall work?
MM & TM: Hacker culture has always lived a double life. Personal computers
and the Internet have set up a perfect projection screen for a mind-set which
understands autonomy as a pursuit for personal self-realisation. Such mind-set sees
technology as a frontier of limitless and unconditional freedom, and easily melds
with entrepreneurial culture of the Silicon Valley. Therefore, it is hardly a surprise
that individualism has become the hegemonic narrative of hacker culture.
However, not all hacker culture is individualist and libertarian. Since the 1990s, the
hacker culture is heavily divided between radical individualism and radical
mutualism. Fred Turner (2006), Richard Barbrook and Andy Cameron (1996) have
famously shown that radical individualism was built on freewheeling counterculture of the American hippi


to leave the commons
to the authority of professions, and create openings where technologies and
infrastructures can be re-claimed for radically collective and redistributive
endeavours. In that context, we are critical of recent attempts to narrow hacker
culture down to issues of surveillance, privacy and cryptography. While these
issues are clearly important, they (again) reframe the hacker community through
the individualist dichotomy of freedom and privacy, and, more broadly, through
the hegemonic discourse of the post-historical age of liberal capitalism. In this
way, the essential building blocks of the hacker culture – relations of production,
relations of property, and issues of redistribution – are being drowned out, and
262

KNOWLEDGE COMMONS AND ACTIVIST PEDAGOGIES

collective and massive endeavour of commonizing is being eclipsed by the
capacity


nsmenger, 2010:
133)
265

CHAPTER 12

Computer world remains a weird hybrid where knowledge is produced in both
academic and non-academic settings, through academic curricula – but also
through fairs, informal gatherings, homebrew computer clubs, hacker communities
and the like. Without the enthusiasm and the experiments with ways how
knowledge can be transferred and circulated between peers, we would have
probably never arrived to the Personal Computer Revolution in the beginning of
1980s. Without


yncretic and inclusive. They run in parallel without falling under the same
umbrella, and they bring together people of varying levels of skill – who bring in
various types of knowledge, and who arrive from various social backgrounds.
Working with hackers, we favour hands-on approach. For a number of years
Marcell has organized weekly Skill Sharing program (Net.culture club MaMa,
2016b) that has started from very basic skills. The bar was incrementally raised to
today’s level of the highly specialized meritocratic community of 1337 hackers. As
267

CHAPTER 12

the required skill level got too demanding, some original members left the group –
yet, the community continues to accommodate geeks and freaks. At the other end,
we maintain a theoretically inflected program of talks, lectur


hacker in Medak, Mars & WHW 2015


e
addition of information. There might be less data
but there’s added metadata, or data about data, enabling its movement.
Needless to say the old culture industries went
into something of a panic about all this. As I wrote
over ten years ago in A Hacker Manifesto, “information wants to be free but is everywhere in chains.”
It is one of the qualities of information that it is indifferent to the medium that carries it and readily
escapes being bound to things and their properties.
Yet it is also o


n self-organizing
activities. Their actions are reactions to our initiatives. In this sense the autonomists are right, only
it was not so much the actions of the working class
to which the ruling class had to respond in this case,
as what I call the hacker class. They had to recuperate a whole social movement, and they did. So our
tactics have to change.
In the past we were acting like data-punks. Not
so much “here’s three chords, now form your band.”
More like: “Here’s three gigs, now go for


hacker in Medak, Sekulic & Mertens 2014


neburg.
Public Library scanner is characterized by a somewhat less automated yet distributed scanning
process than highly automated and sophisticated scanner hacks developed at various hacklabs. A
brief overview of one such scanner, developed at the Hacker Space Bruxelles, is also included in
this manual.
The Public Library scanning process proceeds thus in following discrete steps:

1. creating digital images of pages of a book,
2. manual transfer of image files to the computer for post-processing,
3


ou can edit the line 387 of the source file to change to the
naming convention of your cameras, and recompile by running the following command in your
terminal: "gcc scanflow.c -o scanflow -ludev `pkg-config --cflags --libs gtk+-2.0`"
In the case of Hacker Space Bruxelles scanner, this is handled by the same script that operates the cameras that can be
downloaded from: http://git.constantvzw.org/?
p=algolit.git;a=tree;f=scanbot_brussel;h=81facf5cb106a8e4c2a76c048694a3043b158d62;hb=HEAD

III. TRANSFORM


- point it to the readied .tiff files and it will complete the OCR
- save the file

REFERENCES
For more information on the book scanning process in general and making your own book scanner
please visit:
DIY Book Scanner: http://diybookscannnner.org
Hacker Space Bruxelles scanner: http://hackerspace.be/ScanBot
Public Library scanner: http://www.memoryoftheworld.org/blog/2012/10/28/our-belovedbookscanner/
Other scanner builds: http://wiki.diybookscanner.org/scanner-build-list
For more information on aut


://calibre-ebook.com/
ScanTailor: http://scantailor.sourceforge.net/
gscan2pdf: http://sourceforge.net/projects/gscan2pdf/
Canon Hack Development Kit firmware: http://chdk.wikia.com
Tesseract: http://code.google.com/p/tesseract-ocr/
Python script of Hacker Space Bruxelles scanner: http://git.constantvzw.org/?
p=algolit.git;a=tree;f=scanbot_brussel;h=81facf5cb106a8e4c2a76c048694a3043b158d62;hb=HEA
D



hacker in Sekulic 2015


ibuted by dérive © Dubravka Sekulic / dérive / Eurozine

[PDF/PRINT](https://www.eurozine.com/legal-hacking-and-space/?pdf)



come extremely lazy [when it comes to politics]. We've
started to become a kind of society of people who give up their responsibility
to participate by handing it over to some charismatic leaders, experts of [a]
different type" (2013). Free software hackers, in order to understand and take
part in a constant negotiation that takes place on a legal level between the
market that seeks to cloister the code and hackers who want to keep it free,
had to become literate in an arcane legal language. Gabriella Coleman notes in
_Coding Freedom_ that hacker forums sometimes tend to produce legal analysis
that is just as serious as one would expect to find in a law office. Like the
occupants of Teatro Valle, free software hackers understand the importance of
devoting time and energy to understand constraints and to find ways to
structurally divert them.

This type of knowledge is not shared and created in isolation, but in
socialization, in discussions in physical or cyber spaces (such as #irc chat
rooms, forums, mailing lists…), the same way free software hackers share their
knowledge about code. Through this process of socializing knowledge, "the
community is formed, developed, and reproduced through practices focused on
common space. To generalize this principle: the community is developed through
commonin


hacker in Sollfrank 2018


er below.

According to Balazs, these sorts of libraries and collections are part of the
Guerilla Open Access movement (GOA) and thus practical manifestations of Aaron
Swartz’s “Guerilla Open Access Manifesto”.25 In this manifesto the American
hacker and activist pointed out the flaws of open access politics and aimed at
recruiting supporters for the idea of “radical” open access. Radical in this
context means to completely ignore copyright and simply make as much
information available as pos


hacker in Sollfrank & Kleiner 2012


l
production.

[14:04]
Exactly, to the pre-commodity form of culture.

[14:11]
Copyleft

[14:15]
C.S.: Could you please explain what copyleft is, where it comes from.

[14:20]
Copyleft comes out of the software community, the hacker community. It doesn’t
come out of artistic practice per se. And it comes out of the need to share
software. [14:30] Famously, Richard Stallman and the Free Software Foundation
started this project called GNU (GNU’s Not Unix), which is the, kind of, very
famous and important project. [14:44] And they publish the license called the
GPL, which sort of defined the copyleft idea. And copyleft is a very clever
kind of a hack, as they say in the hacker community. [14:53] What it does is
that it asserts copyright, full copyright, in order to provide a public
license, a free license. And it requires that any derivative work also carries
the same license. That’s what is different about it to anti-co


e Internet was, and then it was replaced,
because of capitalism and because of the economic logic of the market, with
centralised communication platforms like Twitter and Facebook. [38:40] And
despite that, within the free software community and the hacker community,
there's the opposite myth, just like the copyright myth. There's this idea
that we are moving towards decentralised software. [38:54] You see people like
Eben Moglen making this point a lot, when he says, now we have Facebook, but
because


hacker in Sollfrank & Mars 2013


hich books
are transferred, anything. It’s just like a router. [07:56] You can do that
also if you have control of your router, or what we usually call modem, so the
device which you use to get to the Internet. But that is quite hard to hack,
just hackers know how to do that. [08:13] So I just made a server on the
Internet which you can use with one click, and it just routes the traffic
between you, if you’re a librarian, and your users, readers. So that’s that
easy.

[08:33]
Librarians


17]
At the moment the biggest repository for the books, in order to download and
make your catalogue, is Library Genesis. It’s around 900,000 books. It’s
libgen.info, libgen.org. And it’s a great project. [10:33] It’s done by some
Russian hackers, who also allow anyone to download all of that. It’s 9
Terabytes of books, quite some chunk of hard disks which you need for that.
[10:47] And you can also download PHP, the back end of the website and the
MySQL database (a thumb of the MySQL data


hacker in Stalder 2018


The independent media {#c1-sec-0010}

As with so much else, this situation began to change in the 1960s. Mass
media and information-processing technologies began to attract
criticism, even though all of the involved subcultures, media activists,
and hackers continued to act independently from one another until the
1990s. The freedom-oriented social movements of the 1960s began to view
the mass media as part of the political system against which they were
struggling. The connections among the economy, p


e blurring the difference between media and
political activity.[^77[]{#Page_47 type="pagebreak"
title="47"}^](#c1-note-0077){#c1-note-0077a}

This difference was dissolved entirely by a new generation of
politically motivated artists, activists, and hackers, who transferred
the tactics of civil disobedience -- blockading a building with a
sit-in, for instance -- to the
internet.[^78^](#c1-note-0078){#c1-note-0078a} When, in 1994, the
Zapatista Army of National Liberation rose up in the south of Mexico,


e-0010a){#c3-note-0010}  Barton Gellmann and Ashkan Soltani,
"NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden
Documents Say," *Washington Post* (October 30, 2013), online.

[11](#c3-note-0011a){#c3-note-0011}  Initiated by hackers and activists,
the Mailpile project raised more than \$160,000 in September 2013 (the
fundraising goal had been just \$100,000). In July 2014, the rather
business-oriented project ProtonMail raised \$400,000 (its target, too,
had been just \$100,000


hacker in Weinmayr 2019


ick (2009) Yes Rasta (New York: powerHouse Books).

Chan, Sewell (1 July 2009) ‘Judge Rules for J. D. Salinger in “Catcher”
Copyright Suit’, New York Times,


Coleman, Gabriella (2014) Hacker, Hoaxer, Whistleblower, Spy: The Many Faces
of Anonymous (London and New York: Verso).

Corbett, Rachel (14 November 2012) New York Supreme Court Judge Dismisses Marc
Jancou’s Lawsuit Against Sotheby’s,


rted on 4chan, an online
imageboard where users post anonymously. ‘The posts on 4chan have no names or
any identifiable markers attached to them. The only thing you are able to
judge a post by is its content and nothing else.’ Gabriella Coleman, Hacker,
Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (London and New York:
Verso, 2014), p. 47.

[118](ch11.xhtml#footnote-408-backlink) I thank Susan Kelly for making this
point while reviewing my text.

[119](ch11.xhtml#footnote-407-backlink)


hacker in WHW 2016


g truly
accessible public spaces. Public Library, launched by Marcell Mars and
Tomislav Medak in 2012, is an ongoing media and social project based on
ideas from the open-source software movement, while Autonomy Cube, by
artist Trevor Paglen and the hacker and computer security researcher Jacob Appelbaum, centres on anonymized internet usage in the post–Edward
*
1
2
3
4
5

David Harvey, Rebel Cities: From the Right to the City to the Urban Revolution, Verso, London and New York, 2012, p. 117.
See Wen


t be
disseminated”.
A similar didactic impetus and constructivist praxis is present in the work
Autonomy Cube, which was developed through the combined expertise of
artist and geographer Trevor Paglen and internet security researcher, activist and hacker Jacob Appelbaum. This work, too, we presented in the
Reina Sofia exhibition Really Useful Knowledge, along with Public Library
and other projects that offered a range of strategies and methodologies
through which the artists attempted to think throug

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.