The Secret Hacker Code
Four principles that differentiate ordinary computer programmers from hackers.
In college, I had no idea how to code. I was determined to make my own music sharing app (like Napster!), but I didn’t have a clue how to start.
That summer, I befriended a hacker. His name was The Lion King (seriously, as in his screen name was LionKing909). And he taught me lots of new tricks:
But most notably, he introduced me to The Hacker Ethic — four principles that differentiate ordinary computer programmers from hackers. The Hacker Ethic inspired me deeply. Eventually, I decided I wouldn’t just learn to code: I would become a hacker.
What is a hacker?
Defining hacker isn’t so straightforward. The name has an “I know it when I see it” ring to it. Most computer programmers are hackers, but not all of them.
For some, the word hacker conjures up images of Soviet tech experts breaking into CIA computers, or criminals wearing Guy Fawkes masks, Mr. Robot-style. Those people certainly exist, but a hacker who hacks maliciously or for personal gain is a specific type of hacker known as a black hat hacker. Black hat hackers are an unfortunate distraction from all the kickass white hat hackers out there — the people who built and are continuing to build the internet that billions of people use every day!
In general, hackers are problem solvers. Hackers are scrappy. Hackers express themselves with computer code and use their skills to solve problems.
Steve Wozniak is a hacker, and yet Bill Gates, while he certainly has displayed hacker-ish qualities, clashed quite seriously with the hacker community in the mid-70s when he famously began selling his software. To understand the distinction, as well as the causes of many of the most famous tech decisions of the past century, by everyone from Steve Jobs, to Satoshi Nakamoto, you’re going to need to understand the secret code of hackers.
The Hacker Ethic
All hackers (good and evil) share a core belief that information should be free. This was distilled into text for the first time by Steven Levy in his 1984 book Hackers. In the book, Levy outlined The Hacker Ethic — a code of beliefs embraced by nearly all computer hackers. The ethics weren’t crafted by Steven Levy or any one person to dictate how hackers should act, rather they’re a reflection of the hacker culture that has grown organically over many decades.
My hope in sharing The Hacker Ethic here is to give you a deeper understanding of how hackers think. One day you may hire a hacker, work with one, or wish to become one yourself. In that case, consider this your first step into their culture. These are the top four principles of The Hacker Ethic.
1. “Information should be free”
“Free” information means the freedom to copy existing code and to share that information with others.
The first generation of hackers began with a group of students at MIT in the 1950s. After hours, they would sneak into the Lincoln Library on campus where they’d vie for a few hours to play with the $3 million TX-0 computer. Unlike today where most students have individual laptops, passwords, and seemingly unlimited time to spend on their computers, the MIT hackers shared just one computer. There were no passwords, so any one person’s code could be viewed by anyone else on the system. The early hackers were ok with this. More than ok, actually, because they quickly found value in sharing code.
The original MIT hackers quickly began collaborating on building software. Why build competing versions of software, when we can instead work together to share knowledge and create the very best version? That’s the hackers way.
Today the entire world benefits from the decisions of these early hackers.
One of the most meaningful outcomes is the Free and Open Source Software movement. Started by Richard Stallman in 1985, the free software movement encourages millions of people to share, copy, and remix code.
The GPL License (written by Richard Stallman), and the MIT License are two examples of software licenses that render The Hacker Ethic into a legal text.“Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software…,”says the opening paragraph of the MIT license.
These licenses help explain why no one “owns” the internet (as we’ll discuss in future chapters). Back in the 1990s, Tim Berners Lee released his original World Wide Web software under the MIT license. When Napster was shut down in 2001, it was easy for copycat sites to pop up because — you guessed it — open source versions were already free to share!
2. Computers can change your life for the better.
Hackers see computer programming not merely as a technical pursuit, but also as a tool for making the world a better place.
For example, hackers can write code to automate redundant tasks…
And they spread free information with the goal of improving the quality of human life…
This tenet of using computers to “improve life for the better” goes all the way back to Vannevar Bush who, in 1945, published the essay “As We May Think,” in which he pressed scientists to stop building war machines and to consider using technology as a force for good.
These days, the phrase “make the world a better place” has become so embedded in Silicon Valley culture that it’s satirized as a running gag on the TV series Silicon Valley. On the show, every startup founder seems to justify their actions through the mantra “we’re making the world a better place.”
Whether hackers these days are authentically upholding The Hacker Ethic, or just paying it lip service is up for debate. What remains true is The Hacker Ethic’s influence on both hacker culture and our society.
3. Mistrust authority — promote decentralization
Hackers are encouraged to think critically and to challenge the status quo.
In the 1960s, Americans were wary of organizations where only a few powerful people controlled the flow of information. Think: Nazi Germany, The Soviet Union spying vigilantly its own people, and the omen “Big Brother is watching you” as described in George Orwell’s 1984. Hackers promote decentralization in order to dilute the concentration of power and fight to redistribute that power among the many.
One way hackers promote decentralization is by building tools. Bitcoin is a tool that was created by Satoshi Nakamoto that completely removes the authority (and thus power) of banks. Bitcoin allows individuals to manage, send and receive money in a decentralized manner.
Hackers also promote decentralization in their social organizations. WordPress is a software ecosystem that was created by thousands of developers around the world — most of who have never met each other. Many startups attempt to emulate this model of communication with flat company structure (aka. A boss-less culture) so that employees can make decisions without constantly needing to ask permission.
4. Hackers should be judged by their hacking, not based on degrees, age, race, sex, or position
Hackers judge each other by the quality of their code. This helps explain how Bill Gates and Mark Zuckerberg could drop out of Harvard build billion dollar companies. Code is meritocratic.
The Swarm of Bees
In the 1960s, the early hackers were buzzing like a gigantic swarm of bees. MIT was a beehive in the east, and Silicon Valley in the west.
How do hundreds of bees coordinate? Contrary to popular belief, they’re not led by the queen bee — she stays in the hive. Bees rely on decentralized decision making for critical choices. It is for that reason that bees are often cited as a visual metaphor for how decentralized groups organize.
In the 1960s, The Hacker Ethic was story that helped organize strangers around a single mission: keep code free, and make the world a better place. Everything was buzzing along smoothly. And then someone kicked the nest…
Coming up next: The incident that spread The Hacker Ethic from the halls of academia and out into the rest of the world. And if you missed part one you can read it now at The History of the Internet.