Diferencia entre revisiones de «1999 - Hackerethik - Chaos Computer Club e.V.»

De Dominios, públicos y acceso
Ir a la navegación Ir a la búsqueda
 
(Sin diferencias)

Revisión actual del 23:22 27 may 2022

Texto

What are the ethical principles of hacking - motivation and limits

  • Access to computers - and anything which might teach you something about the way the world really works - should be unlimited and total. Always yield to the
  • Hands-On Imperative!
  • All information should be free.
  • Mistrust authority - promote decentralization.
  • Hackers should be judged by their acting, not bogus criteria such as degrees, age, race, or position.
  • You can create art and beauty on a computer.
  • Computers can change your life for the better.
  • Don't litter other people's data.
  • Make public data available, protect private data.

The hacker ethics were first written down by Steven Levy in his book "Hackers: Heroes of the Computer Revolution (ISBN 0-440-13405-6, 1984). He mentions the Tech Model Railroad Club at MIT, their members constructed a supersystem of relays and switches - some of them became core members the ai lab. They used the term "hack" for an "elaborate ... prank" with "serious respect implied". The hacker ethics evolved in a time when computers were scarce; and the people sharing a machine had to think about rules of cooperation.

The last two point are additions by the CCC from the 80s. After some more or less crazy individuals from the hacker scene had the idea of offering their "hacker know-how" to the KGB there were intense discussions, three letter agencies have a somewhat different opinion about freedom of information. As well were intrusions into outside systems considered more and more counter productive.

To protect the privacy of the individual and to strengthen the freedom of the information which concern the public the yet last point was added.

Hacker ethics are —like the rest of the world— as such in constant discussion and development. The above rules should be considered as guidelines and basis for discussion.

Contexto

Aparece en Varios autores. (2016). Manifestos For The Internet Age v0.8. M.Schmalstieg, B. Crevits, V.Kruug (Eds). Greyscale Press.

https://github.com/greyscalepress/manifestos/tree/master/content/manifestos

http://web.archive.org/web/20220406035437/https://github.com/greyscalepress/manifestos/blob/master/content/manifestos/1999-Hackerethik.txt

http://web.archive.org/web/20220405034046/https://greyscalepress.com/books/manifestos-for-the-internet-age/

Autoras

Fuentes

Enlaces

URL: https://www.ccc.de/de/hackerethik

Wayback Machine: https://web.archive.org/web/20011227211029/http://www.ccc.de/hackerethics