text stringlengths 0 1.99k |
|---|
an experience is just a rite of passage for the hacker, but I had no one to |
acknowledge the virtue of such actions. I was not recognized, so I became |
invisible. I was thrown into Tartarus. |
--> 04: Olympus - Finally Being Seen |
In my sophomore year in college, I got a job as a software quality tester |
for a startup after hearing about an opening from a friend who also recently |
got a job there. I thought it would be exciting to be a part of the Web 2.0 |
boom, but the job ended up being pretty boring. The entire role was to |
follow a premade checklist and ensure that everything was functioning as |
documented. |
The icon is blue. Check. |
The icon turns green when clicked. Check. |
I thought my technical skills would be useful, but this role required no |
skill at all. This job was monotonous, and I quickly began suffering from |
the lack of stimulus. Boredom is a very real form of suffering. I |
desperately needed something to happen, some randomness, so I began |
looking for something to break under the guise of "quality assurance." |
Soon, I found something. I would make something happen. |
As was common at that time, the front page of the site said that it was in |
beta and had a contact form to join the list for the test release. |
I wondered if the form sent an email or if the submissions were stored in |
a database. What would happen if I sent a flood of requests? Something |
would happen, and I would gain some new knowledge of what was going on in |
the backend. The anticipation of discovery through a bit of mischief was |
the breath of fresh air I needed. Maybe I would get fired, but this role |
was already dead to me, so it was worth the risk. On the Friday before I |
left work, I placed a stapler on my enter key to continually resubmit the |
form over the weekend and turned off my monitor. |
When I got back on Monday, my boss learned what I had done and pulled me |
aside. He told me that I had overloaded the email server to the point |
where it started smoking (I'm not sure if that was literal or not). So, I |
now knew that the form did send out emails, which did indeed mean it was |
more vulnerable to attacks like the one I just pulled off with a common |
office stapler. Strangely, I didn't get fired or even reprimanded. Instead, |
my boss started to tell me about how he used to frequent the old BBSs when |
he was younger. He was once a hacker from a bygone era and was trying to |
tell me that he saw me for who I truly was: a hacker like him. I was seen, |
but it was not with the usual malice I encountered in school when I was |
younger. I was seen for the qualities that my boss cherished about his |
younger self and maybe even for ones that he felt were lost somewhere |
along the way. |
That recognition was transformative in many ways. Instead of punishment for |
my actions, my boss gave me a raise and a new title of "software security |
tester." My role within the system was made anew into something that |
conformed to who I was instead of being made to conform to something |
I wasn't. I was allowed to be myself because I was finally seen for who I |
was, and it was seen as good instead of bad. Most importantly, I was |
granted the official freedom to create and run my own tests, as opposed to |
the liberty that I took for myself. Like Hermes, the thing that I stole |
somehow became legitimately recognized as mine. |
A job that was inherently lacking creativity was transformed into one of the |
most creative periods of my life. It was at this job where I used a Base64 |
encoder/decoder I created in JavaScript to get into other accounts by |
changing the binary in two locations of the cookie. After the developers |
updated to use sessions, I worked my way up to creating a special email that |
sent me the session information when users opened it. The web app didn't |
strip out embedded scripts, so I was able to hijack its functionality to |
access the cookie and send it to me in an email. My time there became a |
game of cat and mouse with the architects, transcending the original purpose |
of simply testing the software. Still, the unintended byproduct of that game |
was better software. |
Things could have gone drastically different for me, and they did for my |
friend who introduced me to the company. Frustrated with the tedium of the |
job, my friend also destroyed some equipment by ripping out keys from his |
keyboard one day. I was promoted when I destroyed a server, but my friend |
ended up getting fired when he destroyed his keyboard. Two seemingly |
similar actions stemming from the same place of discontentment but yielding |
two completely different outcomes. It's like the story of Cain and Abel, |
where both brothers offer up a sacrifice. One is looked upon favorably by |
God, while the other is not, and it's not entirely clear why. If anything, |
I should have been punished more severely for my more severe transgression, |
but I was elevated to be something I wasn't before. |
--> 05: The Uncertain Fate of the Trickster |
Trickster mythology speaks to the question of how one born into the world |
marked as illegitimate, cut off from the good things of society, becomes |
legitimate. The answer is that he tricks his way in. He does something that |
he was not supposed to do, so he ends up passing through where he was meant |
to be excluded. Sometimes, he succeeds. Sometimes, he doesn't. Yet, he is |
a trickster because he does what he ought not to do. Often, that trick is |
exclusively for his own amusement, seemingly without forethought of the |
potential consequences of his actions. He pushes buttons just to see what |
will happen. Strangely, that impulsiveness will just as often result in |
a gift to the world by stumbling across new wonders never before seen, |
driving the culture forward. |
The hacker is the modern incarnation of the trickster, finding ways to pass |
through boundaries; some meant to keep him in, some meant to keep him out, |
and some not meant for him at all. He does not necessarily break the rules; |
he just doesn't do what is expected. The hacker is considered a trickster |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.