<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: I asked a hacker once, &#8220;Why do you do it?&#8221;</title>
	<atom:link href="http://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/feed/" rel="self" type="application/rss+xml" />
	<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/</link>
	<description></description>
	<lastBuildDate>Tue, 07 Apr 2026 19:18:10 -0700</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.1</generator>
	<item>
		<title>By: Jody</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26344</link>
		<dc:creator>Jody</dc:creator>
		<pubDate>Sat, 24 Aug 2013 20:02:28 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26344</guid>
		<description>and how I wanted my super power to be the invisibility. 

It&#039;s here.</description>
		<content:encoded><![CDATA[<p>and how I wanted my super power to be the invisibility. </p>
<p>It&#8217;s here.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: TB</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26342</link>
		<dc:creator>TB</dc:creator>
		<pubDate>Sat, 24 Aug 2013 19:47:24 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26342</guid>
		<description>&lt;p&gt;Where I live, &quot;hacker&quot; is a very general term.&lt;/p&gt;

Motivation is everything. You can hack documents from a school just because you want to see if you&#039;re good enough to crack the code. A lot of computer nuts fall into this competitive category.

You can do it to tweak your own grades, maybe to create a fraudulent resume.

You can do it for simple vandalism, like breaking the Dean&#039;s window with a rock, or to blackmail some other student.

White hats, gray hats, black hats. Some hackers have more than one color in their closet.</description>
		<content:encoded><![CDATA[<p>Where I live, &#8220;hacker&#8221; is a very general term.</p>
<p>Motivation is everything. You can hack documents from a school just because you want to see if you&#8217;re good enough to crack the code. A lot of computer nuts fall into this competitive category.</p>
<p>You can do it to tweak your own grades, maybe to create a fraudulent resume.</p>
<p>You can do it for simple vandalism, like breaking the Dean&#8217;s window with a rock, or to blackmail some other student.</p>
<p>White hats, gray hats, black hats. Some hackers have more than one color in their closet.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jody</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26341</link>
		<dc:creator>Jody</dc:creator>
		<pubDate>Sat, 24 Aug 2013 19:39:49 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26341</guid>
		<description>we are victims.</description>
		<content:encoded><![CDATA[<p>we are victims.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jody</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26340</link>
		<dc:creator>Jody</dc:creator>
		<pubDate>Sat, 24 Aug 2013 19:38:48 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26340</guid>
		<description>Documents from an Ivy League School. 



...and I know nothing zip nada.</description>
		<content:encoded><![CDATA[<p>Documents from an Ivy League School. </p>
<p>&#8230;and I know nothing zip nada.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jody</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26339</link>
		<dc:creator>Jody</dc:creator>
		<pubDate>Sat, 24 Aug 2013 19:37:24 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26339</guid>
		<description>Ah yes...the white hats.</description>
		<content:encoded><![CDATA[<p>Ah yes&#8230;the white hats.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: FrankC</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26338</link>
		<dc:creator>FrankC</dc:creator>
		<pubDate>Sat, 24 Aug 2013 19:21:40 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26338</guid>
		<description>Nearly everyone enjoys empowerment at some level. It can range from the harmless to the horrible. since the beginning of humanity, invisibility has been a fantasy related to empowerment.

I might enjoy walking undetected into Area 51 or some other secret place. It is what you do when you are there that matters. In some cases it is somewhat similar to graffiti tagging, which ranges from art to vandalism.

In other cases it is a kind of rape.

It can also be a job skill that can be invaluable to fighting crime and protecting national security</description>
		<content:encoded><![CDATA[<p>Nearly everyone enjoys empowerment at some level. It can range from the harmless to the horrible. since the beginning of humanity, invisibility has been a fantasy related to empowerment.</p>
<p>I might enjoy walking undetected into Area 51 or some other secret place. It is what you do when you are there that matters. In some cases it is somewhat similar to graffiti tagging, which ranges from art to vandalism.</p>
<p>In other cases it is a kind of rape.</p>
<p>It can also be a job skill that can be invaluable to fighting crime and protecting national security</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ER</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26337</link>
		<dc:creator>ER</dc:creator>
		<pubDate>Sat, 24 Aug 2013 18:35:13 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26337</guid>
		<description>I don&#039;t understand what you&#039;re trying to tell me.</description>
		<content:encoded><![CDATA[<p>I don&#8217;t understand what you&#8217;re trying to tell me.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: TB</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26336</link>
		<dc:creator>TB</dc:creator>
		<pubDate>Sat, 24 Aug 2013 18:19:38 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26336</guid>
		<description>What did he hack?</description>
		<content:encoded><![CDATA[<p>What did he hack?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jody</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26335</link>
		<dc:creator>Jody</dc:creator>
		<pubDate>Sat, 24 Aug 2013 17:54:36 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26335</guid>
		<description>...or what I think.


The fact remains they have power. They aren&#039;t the only ones who think this way.</description>
		<content:encoded><![CDATA[<p>&#8230;or what I think.</p>
<p>The fact remains they have power. They aren&#8217;t the only ones who think this way.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ER</title>
		<link>https://habitablezone.com/2013/08/24/i-asked-a-hacker-once-why-do-you-do-it/#comment-26334</link>
		<dc:creator>ER</dc:creator>
		<pubDate>Sat, 24 Aug 2013 17:05:37 +0000</pubDate>
		<guid isPermaLink="false">http://habitablezone.com/?p=36992#comment-26334</guid>
		<description>They are children that have a weapon of great power in their hands and feel that to use it, to express that power, validates them as human beings.  They&#039;re not that different from the gun nut who has a firearm, knows how to use it, and therefore can&#039;t wait until he has an excuse to use it and get away with it. He wants to kill, only fear of getting caught stops him.

The ability to cause great damage at a distance (to either human tissue or our data systems) with impunity is a form of vandalism.  To wield a weapon, any weapon, is an exercise in responsibility as well as power.  Any chemist can easily poison strangers and get away with it, any doctor can commit murder and not get caught, any cop can use his authority to commit crime, and any soldier can rape and pillage at will, if his officers or his comrades are not there to restrain them.

But the vast majority of people with that kind of power restrain themselves from using it, or at least, use it reluctantly in circumstances where they believe it is for some greater good.  (Haven&#039;t you ever fantasized you were invisible, or could read minds, or had super-powers?)

I have no use for hackers.  They are vandals, bullies, and cowards who derive pleasure from hurting innocent strangers.  Don&#039;t let that bold talk of how they are &quot;showing vulnerabilities or inequities in the System.  The people whose files and property are getting trashed are consumers, not corporate bureaucracies or government agencies. 

I&#039;m not even too impressed by their technical expertise. Their knowledge of data structures and systems architecture has a very short shelf-life, the technology changes so fast that that being an expert today does not mean you will retain anything of value just a few years down the road.  There is no fundamental &quot;computer knowledge&quot;, like there is fundamental knowledge in science or mathematics.  What we know is operating systems and languages, GUIs and protocols; arbitrary sets of rules that are constantly being changed or made obsolete.  Unless he spends his whole life constantly re-learning the alphabet, being a hacker is like being fluent in a dying tribal language, or an authority on this season&#039;s women&#039;s fashions.  Take a few years off, in prison or in a hospital bed, and when you get back to it everything will have changed and you will be just like those you now hold in contempt for their dependence and ignorance of your hobby.</description>
		<content:encoded><![CDATA[<p>They are children that have a weapon of great power in their hands and feel that to use it, to express that power, validates them as human beings.  They&#8217;re not that different from the gun nut who has a firearm, knows how to use it, and therefore can&#8217;t wait until he has an excuse to use it and get away with it. He wants to kill, only fear of getting caught stops him.</p>
<p>The ability to cause great damage at a distance (to either human tissue or our data systems) with impunity is a form of vandalism.  To wield a weapon, any weapon, is an exercise in responsibility as well as power.  Any chemist can easily poison strangers and get away with it, any doctor can commit murder and not get caught, any cop can use his authority to commit crime, and any soldier can rape and pillage at will, if his officers or his comrades are not there to restrain them.</p>
<p>But the vast majority of people with that kind of power restrain themselves from using it, or at least, use it reluctantly in circumstances where they believe it is for some greater good.  (Haven&#8217;t you ever fantasized you were invisible, or could read minds, or had super-powers?)</p>
<p>I have no use for hackers.  They are vandals, bullies, and cowards who derive pleasure from hurting innocent strangers.  Don&#8217;t let that bold talk of how they are &#8220;showing vulnerabilities or inequities in the System.  The people whose files and property are getting trashed are consumers, not corporate bureaucracies or government agencies. </p>
<p>I&#8217;m not even too impressed by their technical expertise. Their knowledge of data structures and systems architecture has a very short shelf-life, the technology changes so fast that that being an expert today does not mean you will retain anything of value just a few years down the road.  There is no fundamental &#8220;computer knowledge&#8221;, like there is fundamental knowledge in science or mathematics.  What we know is operating systems and languages, GUIs and protocols; arbitrary sets of rules that are constantly being changed or made obsolete.  Unless he spends his whole life constantly re-learning the alphabet, being a hacker is like being fluent in a dying tribal language, or an authority on this season&#8217;s women&#8217;s fashions.  Take a few years off, in prison or in a hospital bed, and when you get back to it everything will have changed and you will be just like those you now hold in contempt for their dependence and ignorance of your hobby.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
