Oddbean new post about | logout

Notes by [realhackhistory@home]# | export

 The first ever Signal spam / scam message I’ve ever received, with a Bitcoin lure, trying to take me off of Signal to a WhatsApp group. Blocked and reported.

https://assets.chaos.social/media_attachments/files/112/496/188/132/279/399/original/812ba85cf55c3331.jpeg 
 @50ab11dd hackers when the FBI comes calling. 
 Big news over on the social media site that has become absolutely infested with scammers, fascist trolls and bots.

https://assets.chaos.social/media_attachments/files/112/031/580/947/334/325/original/78be9621097dce40.jpeg 
 I remember when you had to fool people into clicking a link from a DM to get their IP address on twitter, now it’s just part of the platform. 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx loved this movie. Will chec... 
 @33ba0c31 I have such a soft spot for it, they really were trying to imagine the future and got more right than they did wrong 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx just subscribed! thank you ... 
 @bdae360b you’re very welcome! 
 "A Wave of Computer Crimes - Data Diddling on the Rise", Muriel Dobbin, Baltimore Sun, 14th of July 1983.

"Already established in the annals of computer crime are the Phantom, who cost a San Francisco corporation $250,000 by feeding obscene messages into its machines"
#hacking #hacker #history

https://assets.chaos.social/media_attachments/files/111/194/392/791/060/229/original/b7160b9c9a8de92a.png 
 @802255f9 they took down some of the c2 infrastructure but by my reckoning there were zero arrests and a lot of money that was squirreled away. 
 #Twitter “rolls out new ad format that can't be reported, blocked” and the “new ads also don't disclose who the advertiser is or that they are even ads.”
https://mashable.com/article/twitter-x-new-clickbait-ad-format 
 Geeze thanks Google, I put "realhackhistory" in quotes because I wanted you to try and autocorrect it for me and inevitably show me search results I didn't ask for.

https://assets.chaos.social/media_attachments/files/111/188/784/206/642/471/original/b5f388ed992575f0.png 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx this would be great, finger... 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx Oh, you’re planning on go... 
 @087c1669 I’m planning on going and speaking if they will accept my cfp, will update more when I have a ticket and know that I’m going but would love to meet anyone from on here who wants to hang out. 
 CCC officially announces that the 37th Chaos Communication Congress, 37C3 is on, Hamburg this year.
https://www.ccc.de/en/updates/2023/37C3 
 I plan on putting in a cfp when it opens up to give a talk on hacking history if they will have me. 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx Did you managed to find any... 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx Don't disinfo campaigns vio... 
 @ae1c89a6 I’d argue Prigozhin is not a hacktivist, different rules apply to nation states working against each other. 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx nostr:npub1drnhdwspurvkaptr... 
 @ffe4a8cd @68e776ba that is a whole other controversial area that needs rules of engagement I think, in my mind it is hard to ever justify fighting against hacking attacks with missiles. 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx
Needs alt text, but otherwi... 
 “The International Committee of the Red Cross (ICRC) has, for the first time, published rules of engagement for civilian #hackers involved in conflicts.”
#hacking #history #hacktivism
https://www.bbc.co.uk/news/technology-66998064 
 “How #Nigerian Hacktivists Are Taking on Big #Oil”
#Nigeria #hacking #history
https://spectrum.ieee.org/amp/sensor-networks-nigeria-pollution-tracking-2665718865 
 I’m going to write about #Iran and #hacktivism, who should I be following or talking to? I made a promise to myself that if I was going to research or write about #hacking #history it wasn’t going to be purely about America or Europe, so much history doesn’t  appear on our radar.

https://assets.chaos.social/media_attachments/files/111/164/877/382/933/403/original/4d492919e2a8ef05.jpeg 
 Putting this here to remind me to watch later 
https://youtu.be/rXqO6J4zIsk 
 Went to the cinema and saw The Creator last night, absolutely beautiful film, would recommend if you like #cyberpunk movies and found recent examples disappointing.

https://assets.chaos.social/media_attachments/files/111/160/377/857/215/740/original/bc55c71dd9925b4d.mp4 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx he gave a great talk yester... 
 @0975755f I’ll be watching out for the video 
 Dude tracked down the author of sub7, got the source and released it.
https://gitlab.com/illwill/sub7 
 Finally getting this blog published, on how the year 1983 changed the way #hackers were seen in pop culture and the news forever. I cover WarGames, Whiz Kids & #hacking groups  the 414s & Inner Circle.
#hacker #history #histodons 
https://realhackhistory.org/2023/09/29/1983-the-year-pop-culture-caught-up-with-hackers/ 
 1983: The Year Pop Culture Caught Up With Hackers

1983 was the year that popular culture in the US caught on to the existence of hackers, hacker culture and first set foot on the path to total hacker hysteria.

http://realhackhistory.org/2023/09/29/1983-the-year-pop-culture-caught-up-with-hackers/ 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx request coming from europe?... 
 @1889f834 oh that makes sense. 
 Threads is rolling out a cool new popular feature, separated Threads account deletion.
https://techcrunch.com/2023/09/26/meta-says-separate-account-deletion-for-threads-will-roll-out-by-december/amp/ 
 What is with the terrible TechCrunch preview that gives zero context for the article 
 I hope Twitter does insist on a subscription to post on the service as it will be the push I need to ditch the platform entirely. 
 I don’t make any money off of any of the blogs or videos or posts I make about hacking history, I just want people to have a chance to see what I write or create and maybe learn a little something about a subject I love. 
 An illustration of a modified coat for shoplifting surreptitiously, from Steal This Book by Abbie Hoffman, 1971.

https://assets.chaos.social/media_attachments/files/111/143/509/863/801/505/original/ffba2f3b01d42222.png 
 "He somehow manages to get caught or busted for something and is scared beyond belief about the consequences of his actions.  At this point, the law enforcement agency(s) realize that this one bust alone is worthless, especially since the person busted is probably someone who does not know much to begin with and would be a
much better asset if he could assist them in grabbing other more experienced
and dangerous hackers and phreaks."
http://phrack.org/issues/22/3.html

https://assets.chaos.social/media_attachments/files/111/081/334/399/545/081/original/ec8da15bb96f14a8.png 
 All these whitehat influencers hacking scammers with malware and RATs and publicizing it for clout, anyone else ever see all of that and wonder how people have gone to prison just for discussing hacking something or trying a few passwords on a login screen but this all seems fine? I’m not judging personally, no skin in the game, just weird to see. 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx where's the mainframes? j/k... 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx so cool! 
 @5570b77c I hadn’t heard of this book until last week so it is pretty damn fascinating to be holding a copy now! 
 I am working on a blog in the background on what mid 80s books about hackers by hackers can tell us about hacking back then. It’ll be this book, Out of The Inner Circle by The Cracker and the Loompanics book The Computer Underground by M. Harry. 
 Honestly astounded by how intact this book is after 38 years, someone took really good care of it. 
 I am working on a blog in the background on what mid 80s books about hackers by hackers can tell us about hacking back then. It’ll be this book, Out of The Inner Circle by The Cracker and the Loompanics book The Computer Underground by M. Harry. 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx
nostr:npub1r3y5flvyyfht50v8... 
 @2fc2205e @1c4944fd 5 minutes well spent on my part then 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx nostr:npub19lpzqh330566v52a... 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx The last two sentences comp... 
 @2fc2205e those two lines could be straight out of a late 80s hacker manifesto! 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx I know others have but I do... 
 @bd84b142 I have at least one open request that has either audio or video, had to split that part of the request off into a separate request as it seems to take a lot longer to get back. 
 Chancing my arm with a fairly broad FBI #FOIA request to potentially hit records from a few incidents in early 1984 I am interested in but don't have exact time frames or relevant facts to narrow a request for.

https://assets.chaos.social/media_attachments/files/111/069/088/579/598/320/original/6e575d23cad59748.png 
 How to identify a #hacker, part of an article entitled "#Hacking it" by Ian Robinson, The Leader-Post, 21st January, 1984
#history #histodons

https://assets.chaos.social/media_attachments/files/111/068/906/396/018/428/original/bb3923e1ce603ba3.png 
 Illustration by Heidi Stetson, The Boston Phoenix newspaper, 13th March 1984
#hacking #history #histodons

https://assets.chaos.social/media_attachments/files/111/068/540/248/505/348/original/7fffd8787828bd42.png 
 Overly simplistic and a little melodramatic but still a nice enough read, Hacker News discusses war, the cyber and cyberwar.
https://thehackernews.com/2023/09/how-cyberattacks-are-transforming.html 
 nostr:npub13d8khmk0egptu8f0r6hraxet8y3h46rg2qhx60g9yuefjgggrc8qlmycpx I set it months ago, and I ... 
 @86242b72 I noticed that last part haha, thanks! 
 Fun bonus fact: There are two little secrets hiding in plain sight on that screenshot.

1) There ... 
 @86242b72 how do the rtl characters create that effect? I’ve been playing around with the profile fields and can’t replicate. 
Event not found
 @e1eff745 I absolutely love it, I wish there hadn't been a backlash to the pilot and that the whole series was more like that first episode. 
Event not found
 Steal This Book was like a compilation of hacker BBS text files before BBS text files were a thing, you can trace a direct progression from Steal This Book through YIPL to TAP and from TAP to 2600 Magazine in terms of the people involved and the inspiration they drew from their predecessors.

https://assets.chaos.social/media_attachments/files/111/143/609/506/524/233/original/a55fc790ae541a0a.jpg 
Event not found
 @087c1669 @d3436cab @4630a6e2 I just need to decide on a topic