gba.txt 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. April 2004To the popular press, "hacker" means someone who breaks
  2. into computers. Among programmers it means a good programmer.
  3. But the two meanings are connected. To programmers,
  4. "hacker" connotes mastery in the most literal sense: someone
  5. who can make a computer do what he wants—whether the computer
  6. wants to or not.To add to the confusion, the noun "hack" also has two senses. It can
  7. be either a compliment or an insult. It's called a hack when
  8. you do something in an ugly way. But when you do something
  9. so clever that you somehow beat the system, that's also
  10. called a hack. The word is used more often in the former than
  11. the latter sense, probably because ugly solutions are more
  12. common than brilliant ones.Believe it or not, the two senses of "hack" are also
  13. connected. Ugly and imaginative solutions have something in
  14. common: they both break the rules. And there is a gradual
  15. continuum between rule breaking that's merely ugly (using
  16. duct tape to attach something to your bike) and rule breaking
  17. that is brilliantly imaginative (discarding Euclidean space).Hacking predates computers. When he
  18. was working on the Manhattan Project, Richard Feynman used to
  19. amuse himself by breaking into safes containing secret documents.
  20. This tradition continues today.
  21. When we were in grad school, a hacker friend of mine who spent too much
  22. time around MIT had
  23. his own lock picking kit.
  24. (He now runs a hedge fund, a not unrelated enterprise.)It is sometimes hard to explain to authorities why one would
  25. want to do such things.
  26. Another friend of mine once got in trouble with the government for
  27. breaking into computers. This had only recently been declared
  28. a crime, and the FBI found that their usual investigative
  29. technique didn't work. Police investigation apparently begins with
  30. a motive. The usual motives are few: drugs, money, sex,
  31. revenge. Intellectual curiosity was not one of the motives on
  32. the FBI's list. Indeed, the whole concept seemed foreign to
  33. them.Those in authority tend to be annoyed by hackers'
  34. general attitude of disobedience. But that disobedience is
  35. a byproduct of the qualities that make them good programmers.
  36. They may laugh at the CEO when he talks in generic corporate
  37. newspeech, but they also laugh at someone who tells them
  38. a certain problem can't be solved.
  39. Suppress one, and you suppress the other.This attitude is sometimes affected. Sometimes young programmers
  40. notice the eccentricities of eminent hackers and decide to
  41. adopt some of their own in order to seem smarter.
  42. The fake version is not merely
  43. annoying; the prickly attitude of these posers
  44. can actually slow the process of innovation.But even factoring in their annoying eccentricities,
  45. the disobedient attitude of hackers is a net win. I wish its
  46. advantages were better understood.For example, I suspect people in Hollywood are
  47. simply mystified by
  48. hackers' attitudes toward copyrights. They are a perennial
  49. topic of heated discussion on Slashdot.
  50. But why should people who program computers
  51. be so concerned about copyrights, of all things?Partly because some companies use mechanisms to prevent
  52. copying. Show any hacker a lock and his first thought is
  53. how to pick it. But there is a deeper reason that
  54. hackers are alarmed by measures like copyrights and patents.
  55. They see increasingly aggressive measures to protect
  56. "intellectual property"
  57. as a threat to the intellectual
  58. freedom they need to do their job.
  59. And they are right.It is by poking about inside current technology that
  60. hackers get ideas for the next generation. No thanks,
  61. intellectual homeowners may say, we don't need any
  62. outside help. But they're wrong.
  63. The next generation of computer technology has
  64. often—perhaps more often than not—been developed by outsiders.In 1977 there was no doubt some group within IBM developing
  65. what they expected to be
  66. the next generation of business computer. They were mistaken.
  67. The next generation of business computer was
  68. being developed on entirely different lines by two long-haired
  69. guys called Steve in a garage in Los Altos. At about the
  70. same time, the powers that be
  71. were cooperating to develop the
  72. official next generation operating system, Multics.
  73. But two guys who thought Multics excessively complex went off
  74. and wrote their own. They gave it a name that
  75. was a joking reference to Multics: Unix.The latest intellectual property laws impose
  76. unprecedented restrictions on the sort of poking around that
  77. leads to new ideas. In the past, a competitor might use patents
  78. to prevent you from selling a copy of something they
  79. made, but they couldn't prevent you from
  80. taking one apart to see how it worked. The latest
  81. laws make this a crime. How are we
  82. to develop new technology if we can't study current
  83. technology to figure out how to improve it?Ironically, hackers have brought this on themselves.
  84. Computers are responsible for the problem. The control systems
  85. inside machines used to be physical: gears and levers and cams.
  86. Increasingly, the brains (and thus the value) of products is
  87. in software. And by this I mean software in the general sense:
  88. i.e. data. A song on an LP is physically stamped into the
  89. plastic. A song on an iPod's disk is merely stored on it.Data is by definition easy to copy. And the Internet
  90. makes copies easy to distribute. So it is no wonder
  91. companies are afraid. But, as so often happens, fear has
  92. clouded their judgement. The government has responded
  93. with draconian laws to protect intellectual property.
  94. They probably mean well. But
  95. they may not realize that such laws will do more harm
  96. than good.Why are programmers so violently opposed to these laws?
  97. If I were a legislator, I'd be interested in this
  98. mystery—for the same reason that, if I were a farmer and suddenly
  99. heard a lot of squawking coming from my hen house one night,
  100. I'd want to go out and investigate. Hackers are not stupid,
  101. and unanimity is very rare in this world.
  102. So if they're all squawking,
  103. perhaps there is something amiss.Could it be that such laws, though intended to protect America,
  104. will actually harm it? Think about it. There is something
  105. very American about Feynman breaking into safes during
  106. the Manhattan Project. It's hard to imagine the authorities
  107. having a sense of humor about such things over
  108. in Germany at that time. Maybe it's not a coincidence.Hackers are unruly. That is the essence of hacking. And it
  109. is also the essence of Americanness. It is no accident
  110. that Silicon Valley
  111. is in America, and not France, or Germany,
  112. or England, or Japan. In those countries, people color inside
  113. the lines.I lived for a while in Florence. But after I'd been there
  114. a few months I realized that what I'd been unconsciously hoping
  115. to find there was back in the place I'd just left.
  116. The reason Florence is famous is that in 1450, it was New York.
  117. In 1450 it was filled with the kind of turbulent and ambitious
  118. people you find now in America. (So I went back to America.)It is greatly to America's advantage that it is
  119. a congenial atmosphere for the right sort of unruliness—that
  120. it is a home not just for the smart, but for smart-alecks.
  121. And hackers are invariably smart-alecks. If we had a national
  122. holiday, it would be April 1st. It says a great deal about
  123. our work that we use the same word for a brilliant or a
  124. horribly cheesy solution. When we cook one up we're not
  125. always 100% sure which kind it is. But as long as it has
  126. the right sort of wrongness, that's a promising sign.
  127. It's odd that people
  128. think of programming as precise and methodical. Computers
  129. are precise and methodical. Hacking is something you do
  130. with a gleeful laugh.In our world some of the most characteristic solutions
  131. are not far removed from practical
  132. jokes. IBM was no doubt rather surprised by the consequences
  133. of the licensing deal for DOS, just as the hypothetical
  134. "adversary" must be when Michael Rabin solves a problem by
  135. redefining it as one that's easier to solve.Smart-alecks have to develop a keen sense of how much they
  136. can get away with. And lately hackers
  137. have sensed a change
  138. in the atmosphere.
  139. Lately hackerliness seems rather frowned upon.To hackers the recent contraction in civil liberties seems
  140. especially ominous. That must also mystify outsiders.
  141. Why should we care especially about civil
  142. liberties? Why programmers, more than
  143. dentists or salesmen or landscapers?Let me put the case in terms a government official would appreciate.
  144. Civil liberties are not just an ornament, or a quaint
  145. American tradition. Civil liberties make countries rich.
  146. If you made a graph of
  147. GNP per capita vs. civil liberties, you'd notice a definite
  148. trend. Could civil liberties really be a cause, rather
  149. than just an effect? I think so. I think a society in which
  150. people can do and say what they want will also tend to
  151. be one in which the most efficient solutions win, rather than
  152. those sponsored by the most influential people.
  153. Authoritarian countries become corrupt;
  154. corrupt countries become poor; and poor countries are weak.
  155. It seems to me there is
  156. a Laffer curve for government power, just as for
  157. tax revenues. At least, it seems likely enough that it
  158. would be stupid to try the experiment and find out. Unlike
  159. high tax rates, you can't repeal totalitarianism if it
  160. turns out to be a mistake.This is why hackers worry. The government spying on people doesn't
  161. literally make programmers write worse code. It just leads
  162. eventually to a world in which bad ideas win. And because
  163. this is so important to hackers, they're especially sensitive
  164. to it. They can sense totalitarianism approaching from a
  165. distance, as animals can sense an approaching
  166. thunderstorm.It would be ironic if, as hackers fear, recent measures
  167. intended to protect national security and intellectual property
  168. turned out to be a missile aimed right at what makes
  169. America successful. But it would not be the first time that
  170. measures taken in an atmosphere of panic had
  171. the opposite of the intended effect.There is such a thing as Americanness.
  172. There's nothing like living abroad to teach you that.
  173. And if you want to know whether something will nurture or squash
  174. this quality, it would be hard to find a better focus
  175. group than hackers, because they come closest of any group
  176. I know to embodying it. Closer, probably, than
  177. the men running our government,
  178. who for all their talk of patriotism
  179. remind me more of Richelieu or Mazarin
  180. than Thomas Jefferson or George Washington.When you read what the founding fathers had to say for
  181. themselves, they sound more like hackers.
  182. "The spirit of resistance to government,"
  183. Jefferson wrote, "is so valuable on certain occasions, that I wish
  184. it always to be kept alive."Imagine an American president saying that today.
  185. Like the remarks of an outspoken old grandmother, the sayings of
  186. the founding fathers have embarrassed generations of
  187. their less confident successors. They remind us where we come from.
  188. They remind us that it is the people who break rules that are
  189. the source of America's wealth and power.Those in a position to impose rules naturally want them to be
  190. obeyed. But be careful what you ask for. You might get it.Thanks to Ken Anderson, Trevor Blackwell, Daniel Giffin,
  191. Sarah Harlin, Shiro Kawai, Jessica Livingston, Matz,
  192. Jackie McDonough, Robert Morris, Eric Raymond, Guido van Rossum,
  193. David Weinberger, and
  194. Steven Wolfram for reading drafts of this essay.
  195. (The image shows Steves Jobs and Wozniak
  196. with a "blue box."
  197. Photo by Margret Wozniak. Reproduced by permission of Steve
  198. Wozniak.)