Hackers disappeared in the Internet age

Translated from the Headlines (Toutiao 头条新闻)

Author: Half-Buddha Immortal(半佛仙人本仙人)

1

Valentine’s Day on February 14, 1995.

That night, Kevin Mitnick, who was single, had insomnia, not because of the lack of a girl on the bed, or the lack of a strong man, but because he felt danger was approaching.

He put on his clothes in a hurry, walked out the door, and carefully observed the outside of the apartment.

All this fell into the eyes of FBI agents. Half an hour later, the FBI broke in and arrested Kevin Mitnick.

Kevin Mitnick

The FBI was not prepared to give Kevin extra buffer time. They had been tossed by this young man for too long, and they were absolutely unwilling to make trouble at this time. Only a few hours later, Kevin was turned to the court.

When Kevin stepped out of the police car, countless flashing lights suddenly lit up, and well-informed reporters rushed to guard here overnight, just to expose the news of Kevin Mitnick’s arrest for the first time. He passed through a series of The sound of interrogation and shutter sound secretly marveled at his reputation.

In the auditorium at the hearing, Kevin saw Shimomura Mian. He had seen Shimomura Mian’s photos many times, but this was the first time he saw the other person’s real person. He nodded to Shimomura Mian and said:

“Shimomura Mian, I admire your technique.”

He knew that the FBI of waste was not a concern. The reason why he was planted must have been planted in the hands of this man.

Real men, admire people who are evenly matched.

Even if it is an opponent.

Kevin Mitnick was born in Los Angeles in 1963.

At that time, the hippies were in full swing. Young people in the United States felt desperate in the face of the corrupt American government. They hated the unjust war in Vietnam and the self-talking of the media. So they became hippies and tried every means to fight the system. Challenge the authority of the US government in various ways, and prove to the world that the ruling structure they have established is riddled with defects, which is not worth mentioning.

One of these hippies is a celebrity named Abby Hoffman, who has spent his entire life playing official games.

Abby Hoffman

He once wrote a book called “Steal the Book”, just like the name of the book, he hoped that people who saw this book from the bookstore would not buy it, but would steal it. Not only do I not want to make money, but I do not want publishing houses and bookstores to make money.

We look absurd now, but their attitude is serious.

The hippies at that time seriously believed that all information should be shared freely.

This book introduces a lot of tips on white prostitution capital, and one of the most critical technology is the phone flying.

Hoffman believes that communication is the center of any revolution, and the liberation of communication will be the first step to freedom, so he firmly opposes paying for telephone services.

Phone Flying uses a technology to control the voltage of the phone so that it can make free long-distance calls. Hoffman spread this technology.

But PhoneFlyers can do more. They can tamper with phone signals, eavesdrop on other people’s calls, and get anyone’s phone number.

For them, the important thing is not to use the phone in vain, but to find loopholes in the monopoly of the US telecom industry. They are obsessed with finding loopholes in the huge system and then giving them to those who hide behind. It feels like a slap.

After the development of computer technology, this group of people embraced computers for the first time. With the popularization of computer technology, they can do more and more things. Fierce title:

hacker.

2

Kevin Mitnick came into contact with Flyer technology when he was very young. He started playing radio when he was 10 years old. He hacked the bus system when he was 12 years old. He hacked the phone numbers of a large number of celebrities when he was 14 years old. Call to play.

After getting in touch with the computer, he quickly became a hacker.

At the age of 15, Kevin sneaked into the computer system host of the North American Air Defense Command, flipped through the US nuclear bomb information, studied the strategic deployment of the US Air Force, and then casually wiped out two traces and exited calmly. It is said that if he was at that time Shake your hand, and nuclear bombs across the United States will be launched.

In those twenty minutes, the fate of the world was in the hands of this 15-year-old.

The purpose of his infiltration is simple: to brag.

Unlike ordinary hackers, Kevin is not only an otaku but also a social coffee. He has many friends and he is also good at gaining the trust of others.

In addition to purely technical offenses in his history of invasion, he is also good at deceiving. He is very good at hacking the phone calls of relevant personnel and then tricking relevant personnel into revealing key information through telephone fraud.

Many of his early invasions were to show off to his friends.

In 1981, Kevin invaded the Los Angeles call center and jokes up many people’s phone numbers and user information. This angered the call center and called the police.

The police did not find out who invaded the telephone company, but Lewis, a good friend who played the invasion with Kevin, told his girlfriend about the incident, and his girlfriend also decisively reported the two of them, and just sent it away. Gave Mitnick to jail for the first time.

The 17-year-old Kevin was released from prison after only squatting in the juvenile control office for three months. However, after he was released from prison, he continued to invade and visit the Pentagon’s intranet.

When he was 19 years old, he was arrested again. There was no evidence that could not convict him. As a result, another good friend of his, Lenny, sold him and forced him to almost three years in jail, thanks to his quick law. Exonerated.

Technology will not betray you.

But people will.

Society taught this technical genius a lesson.

As an adult, Kevin was obviously more cautious. Although he maintained the habit of invading everywhere, Motorola, Nokia, and IBM’s intranets were all his back gardens. No one knew how many places he had invaded, but now, he is dealing with it. The hands and tails are handled very cleanly.

The police were very scared of this genius boy, but they couldn’t convict him. They could only start with people around him, and the friend Lenny who had betrayed him once again sold him.

In 1988, Kevin was arrested again, and the officials even prohibited him from contacting the phone because they believed that as long as Kevin whistled to the phone, all the nuclear bombs in the US nuclear bomb silos could be fired.

It is simply scientific and reliable.

Federal officials called him “the most powerful invader artist ever.”

One year later, Kevin was released from prison. This time he really learned well. On the one hand, he invaded everywhere in revenge, and on the other hand, he directly hacked into the FBI’s internal computer, guarding the FBI’s actions all the way, and monitoring the police’s movements against him.

In 1992, when Kevin found out that the police had issued an arrest warrant against him, he ran away on the spot. While eavesdropping on the police’s internal lines, he pretended to be a policeman and a police station to circumvent the police in the United States.

He became the world’s first hacker wanted by the FBI.

In the next few years, Kevin succeeded in getting away with it. The police rushed in his footsteps many times, but they couldn’t find the true identity of this mysterious hacker.

Until 1994, under the fire of an Israeli hacker, Kevin decided to challenge Shimomura Mian, who thought he was the world’s smartest man at the time.

Shimomura

3

The battle of the century between Kevin Mitnick and Shimomura Mitaka ended in Shimomura’s victory. In 1995, Shimomura Mitnick successfully helped the FBI locate Kevin, and then Kevin Mitnick was arrested.

The prosecutors filed 23 charges of access device fraud against Kevin. If the charges are successful, he will face a prison term of more than 460 years.

At the same time, the FBI, CIA, and other official agencies also accused him of invading the confidential systems of the North American Air Defense Command, the US Central Intelligence Agency, and the Department of National Security, thereby endangering national security.

Kevin Mitnick denied all these allegations.

Unable police threw him to the felon prison and put him in a complete blockade, forcing him to confess his crime. After a long period of imprisonment, Kevin had to sign an agreement with the official to plead guilty in exchange for a preferential sentence.

In the folk, Kevin became a legendary hero.

Although Kevin often invades corporations and government units, stepping on the face of the U.S. government as an insole, he neither uses technology for his own profit nor does it use technology to harm others. All intrusions are entirely out of interest.

He is a hacker of interest, teacher Kevin.

Under the instigation of the media, the public has over-imagined the combat effectiveness of this young hacker. Many people firmly believe that Kevin is the God on the Internet and that he can destroy the world if he wants, but he chose to be a bystander.

This moral self-discipline has made him a role model for the hacker community.

“Hacker” is originally a neutral term, specifically referring to those technical madmen who are keen to explore the limits of the 0 and 1 world, and frantically looking for vulnerabilities in various programs.

Almost without exception, the original hackers were criminals of interest.

In 1988, Robert Morrisjik wrote a program when he was studying at Cornell University. It would automatically invade other people’s computers and then copy itself to infect more computers.

Robert Morrisjike

Morris made a very big mistake: He underestimated the efficiency of the infection, and a computer can be re-infected, each infection will slow down the computer, and finally blow up the computer completely.

Morris accidentally invented a worm.

The worm virus quickly compromised the computers of many confidential departments including the Pentagon and the White House, leaving them paralyzed and unusable. The police found Morris after investigating, and facing the police’s interrogation, the bewildered Morris said Reasons for own large-scale poisoning:

He just wanted to see how many computers in the world are connected to the Internet.

Sometimes the power of technology has nothing to do with the idea of ​​the inventor.

4

The uncontrollable and technical destructive power caused by this kind of interest makes hackers a threat. Many well-known hackers have been arrested one after another, including Lloyd Blackensheep.

Lloyd Brackensheep

Lloyd wrote the “Hacker Ethics” in prison, which was later called the “Hacker Manifesto”, which was regarded as an interpretation of the hacker spirit:

We take advantage of the services that already exist, and if they are not run by insatiable meat eaters, they might be very cheap, and you call us criminals.

We explore… and you call us criminals.

We seek knowledge… and you call us criminals.

Our existence has no skin color, no nationality, no religious prejudice… You call us criminals.

You make atomic bombs, you start wars, you murder, deceive, and control us, and you try to convince us that this is for our own benefit, but we are criminals.

Yes, I am a criminal, my crime is curiosity; my crime is to judge people based on what they say and think, not their looks; my crime is smarter than you, this is you never Will forgive me.

Kevin’s self-discipline is like the footnote of “The Hacker Manifesto”, showing a perfect hacker image. For a while, “Release Kevin Mitnick” has become a social movement. Not only hackers are rioting, but ordinary people are also participating. There are even more hacking groups who have jointly spoken out that they have set up logic bombs in the world’s networks. If Kevin is not released, the bombs will be detonated.

The bomb, which only exists in bragging, did not explode in the end, but Kevin has become the spiritual leader of hackers.

In 1999, Kevin could not bear the restricted freedom of life, signed a plea agreement, was sentenced to 68 months in prison, plus 3 years of residential surveillance, and was required to not touch the computer for life.

But at this time, a copycat appeared.

As early as when Kevin was in jail for the first time, a Hollywood director once took a fancy to Kevin’s legendary character, so he shot a movie “Game of War”, this movie is based on Kevin Mitnick as the prototype, Tells the story of a technical genius who accidentally connected to the Ministry of Defense network and played it as a war game with the US strategic plan for combating the Soviet Union, which almost triggered the Third World War.

This movie once smashed Kevin’s fame, but no one thought at the time that there would be someone who thought this behavior was too cool and wanted to learn. This person was Gary McKinnon.

Gary McKinnon

Gary McKinnon is an Englishman. He has been obsessed with conspiracy theories for a while. He firmly believes that the United States is so powerful because of alien technology. How can this be confirmed? He was inspired by the movies he watched many years ago.

In 2000 and 2001, McKinnon invaded the computer network systems of the U.S. Pentagon, NASA, Johnson Space Center, and the Air Force.

After the British police arrested McKinnon, and McKinnon revealed his reasons for the crime, the entire United States broke the defense. They could not accept that they were beaten up by such a person with a low IQ.

These terrifying interest criminals were the core force of early hackers. They used their own interests to stir up trouble and manipulate the world. All of this gradually aroused public disgust. Hackers changed from neutral words to derogatory words and finally split into different ones. version of.

For example, Cracker.

5

Few people realize that in the first thirty years of the Internet, the world was in the hands of these tech enthusiasts.

They have no money, no worldly power, and no force, but they can mobilize resources far more powerful than those of the powerful, and they have no previous disadvantages in the world of the Internet.

In that wild era, the online world seems to be a chessboard that has not yet been divided. As long as you have the ability, as long as you have the technology, you can arbitrarily place your own children on this board. They are the technology of that era. noble.

There used to be theocratic aristocrats, military aristocrats, and financial aristocrats in this world, and they stood above 10,000 people only by relying on technology.

Those rich and powerful are as fragile as paper in front of their technology, and code is their weapon. With a network cable, they can enter the most guarded fortress in the world, and then loot the contents of the fortress.

At first, these technical nobles did not realize their abilities. They thought that their abilities could only make them happier, but gradually the reaction of the world told some of them: You can get more.

Some people, like Kevin, like Lloyd, carry out their interests and limit the invasion to the local area.

Others take pleasure in destruction and even begin to learn how to use the powerful power in their hands.

Gradually, hackers have divided, and three types of hackers have appeared:

Those who are obsessed with making viruses and like to destroy everywhere are called black hats;

Those who like to find vulnerabilities and then fix the website, or directly participate in the construction of security defense are called white hats.

Those interested criminals who still stubbornly walk on the edge of light and darkness and act recklessly according to their own moral codes are called gray hats.

But this division did not last long, because the online world soon ceased to be wild. In a world that is no longer wild, people no longer need to walk between light and darkness.

Around 2000, when China had just entered the Internet era when countless new generations of hackers were enthusiastic about the stories of these American predecessors, these big cows were gradually leaving.

In 2000, Kevin Mitnick was released from prison on parole. Through a series of bargaining, he successfully regained the power to touch the computer in 2002. In the following years, he published books, walked around, made guest appearances in movies, established a network security company, and started to work for all Large IT companies that provide Internet security consulting services, truly embarking on the pinnacle of life.

He and Shimomura Mian became friends, and Shimomura Mian has been on the right path as a white-hat hacker who always walks in the sun.

Morris was violently beaten by his father after he screwed up his worm, but because his father worked in an agency of the Ministry of Defense, his relationship was too hard and he was not locked up.

In 2005, Morris participated in the founding of the investment company Y Combinator, the famous YC, and invested in a series of high-end companies such as Airbnb, Dropbox, and Reddit, and successfully transformed into a capitalist. Later, he joined MIT as a professor.

Loyd, who wrote “The Ethics of Hackers”, gave up the invasion after being released from prison, and then joined McAfee as the product research and design director, and started the anti-virus software business.

The period from 2000 to 2005 was five years of rapid development of the Internet, but also five years when hackers parted ways.

The once domineering technical aristocrats were torn apart, some began to use technology to blackmail Internet companies, some were recruited by Internet companies to become security personnel, and some even learned to fight each other, doing viruses with one hand, killing software with the other, relying on those who can always upgrade in time. Antivirus software makes a lot of money.

Only a few people still adhere to the old hacker spirit, trying to continue to be the ruler between light and dark.

But they are no longer nobles, but rangers. Chivalrous is banned by martial arts, and hackers are banned by technology. When the world no longer needs chivalrous, there will be only one.

“Acquire civil and martial arts, and sell goods to the emperor’s house.”

In the past, their technology was nowhere to be used, but now a large number of people are willing to spend a lot of money to buy their technology.

So the teenager grew up and stopped being enthusiastic, and instead sold his technology for a good price.

Everyone recognizes the reality.

Except for one person-Julian Assange.

6

Julian Assange is the result of the hippie movement. His mother, an old hippie, has always taught him not to believe what everyone believes, but to think for himself.

To some extent, Assange inherited the original hacker spirit, the spirit of being keen on information disclosure and working against the system.

Assange is a little smaller than Mitnick, but he is also full of talent for technology. When Mitnick was rampant across the ocean, he was also very popular in the hacker circle in Australia.

At the age of 16, Assange and his two friends formed the hacker organization “Overturn of All Nations”, and he was codenamed Mendax in the organization-noble hypocrisy.

And Assange also suffered the fate experienced by Mitnick-he was betrayed by his teammates in 1991 and was charged with 24 counts of computer intrusion.

Fortunately, it was an era when the laws related to electronic intrusion were very imperfect. Assange did not go to jail, but was released after being fined.

After that, Assange briefly withdrew from the intrusion life and began to write various open-source software to provide information encryption for human rightists, but these did not calm his heart, and he became firmer and firmer in his beliefs in life.

In 1980, the leader of the hippie movement, Abby Hoffman, who wrote “Steal the Book”, was sentenced to prison. When he was released from prison, he found that everything he had fought for had fallen apart. The hippies have become a thing of the past, and the former comrades-in-arms either converted to justice or died of a drug overdose.

In 1989, Hoffman committed suicide.

The spirit of hippies has quietly stayed in the online world.

In 2006, Assange established WikiLeaks and once again declared war on the US government and the deceived world.

7

Before Assange, there were still some people who maintained the hacker spirit left over from the hippie era.

Regarding what the hacker spirit is, there is a book “The Hacker and the Painter” written by a big old man who wrote:

  1. Computers and all tools that help to understand the nature of the world should not be restricted in their use, and everything should be tried by hand.
  2. The information should all be free.
  3. Distrust authority and advocate decentralization.
  4. Judging the level of a hacker should be based on his technical ability, not his age, education or other criteria.
  5. You can use computers to create beauty and art.
  6. Computers make life better.

Some people summarize these in three words: sharing, open-source, and freedom.

Ultimately point to one thing, to make the world a better place.

In that era, the only thing that the remaining group of people who still maintained the idealism of the hippies could do is to share.

And thus began the vigorous era of online piracy.

Internet piracy is essentially different from past piracy: Internet piracy is completely free, which is in line with the unrestricted world of freedom of information that hippies have imagined.

So the three young people came together and set up a website to share pirated resources.

The Pirate Bay.

On The Pirate Bay, you can find a horrible amount of free pirated resources, whether it is the latest movies, TV series, animations, or games, books, or pictures. Only one thing is emphasized here, and that is sharing.

The three young men who founded The Pirate Bay were not technically strong, but they successfully raised a banner and a banner of rebellion.

Numerous technical experts have responded. The Pirate Bay has rapidly expanded from a small local Swedish website to a world-class piracy base. The crackers around the world will upload the resources to The Pirate Bay after being cracked and then spread to the common people all over the world. In the hands of netizens.

Those copyright owners, the big American corporations, of course, have blown their lungs. The strongest legal practitioners in the Western Hemisphere have begun to threaten The Pirate Bay frantically, and the Pirate Bay has responded hardly: Sweden is not a state in the United States.

However, Sweden can last for a while. In 2006, the year WikiLeaks was founded, the Pirate Bay was raided by the Swedish police and the website was shut down.

But it didn’t take long before The Pirate Bay was resurrected on the spot. It turned out that they had long anticipated the fact that the Swedish government could not cover themselves, and they had moved the server to the Netherlands.

To commemorate this incident, The Pirate Bay designated May 31 every year as “Piracy Independence Day.”

But this rebellion did not end well.

In response to the siege and interception of transnational capital that controls the copyright, The Pirate Bay has repeatedly moved, jumping repeatedly between suspension and resurrection.

The managers of The Pirate Bay who want to get rid of this situation have imagined many perverted operations, such as launching servers into outer space, or buying the Principality of Sealand, the smallest country in the world next to the United Kingdom, to establish a country without copyright.

But these show operations all need one thing: money.

The Pirate Bay has issued a call to countless white prostitutes who have received their favor: Today, we will raise the banner of rebellion, and we will break the restrictions of monopoly. As long as you donate a little money, we will build a free country. Without boundaries, everyone will get information autonomy.

Then they were betrayed by their “people”.

Shanda’s donation campaign ended up with only 20,000 U.S. dollars. It was far from enough to release satellites or buy countries. The Pirate Bay had to continue to retreat and flee. In the end, the original managers suffered legal sanctions one after another.

The current Pirate Bay still exists, but it is no longer the Pirate Bay in the past. They planted Trojan horses to steal users’ computing power for mining and became an ordinary pirate dealer.

The thief of the year took off V’s mask, revealing the top of the Mediterranean Sea.

The world has flattened your edges and corners and started from scratch.

8

You can always choose two paths:

Believe in your ideals, and then fight to the death for your ideals.

Believe in the rules of the world, and then fight to the death to defend the rules.

But the final winner will never be the one who died in battle, but the reconciler in the middle.

The winner is king?

The leftover is king.

Pirates have stolen the fruits of idealists and used their selflessness to undermine the rules of orderists.

Those big cows who used to selflessly crack and share resources for free are gradually being engulfed in a world where everything asks for money. Piracy is no longer purely free, but a new type of harvest.

The resources shared by idealists for free are downloaded by piracy dealers, encrypted, and sold to more novices, and free resources shared unselfishly will be reported to the maintainers of the rules by them.

In the end, both order and ideals are lost to interest.

The last banner of Creative Commons is Sci-hub, which is a pirated website of papers.

In 2009, Alexandra Elbakyan became a hacker while in university, then went to Moscow to work in information security, and then went to Germany to study brain-computer interfaces. He is an out-and-out technical elite.

Alexandra Elbakyan

But during an exchange with an American college, she found that she couldn’t afford a paper.

Unlike Americans who have been squeezed by local copyright owners in the United States, Russia is a stronghold of piracy with weak copyright awareness. Most of the resources on The Pirate Bay are cracked by Russian hackers.

Miss Alexandra, who has been in Russia, doesn’t lose copyright at all. She feels that the monopoly of papers by academic journal publishers is simply weird, so she has an idea: build a website for pirated papers and send academic journals. To die.

In 2011, this young lady returned to Kazakhstan and established Sci-hub with one person, breaking the monopoly of academic journal copyright in one fell swoop.

From that day on, she became the villain in the hearts of copyright dealers and the lady of liberty in academia.

The copyright dealers of academic journals hunted her for ten years. She hid away for ten years. Perhaps only the ideal of academic freedom and the praises that have been favored by her is supported by her.

But, just like praising The Pirate Bay back then, can these chants really turn into power when life and death are at stake?

I am very pessimistic.

9

Today, the strongest hackers in the world have become Eastern Europe.

It is said that buying hacking services on the dark web is one price for ordinary hackers and another price for Russian hackers.

In American reports, “Drafted by Russian hackers” is not even news. It can only be regarded as an excuse for arguing and diverting conflicts when needed.

There was an urban legend back then: Microsoft used the two generations of Windows 95 and 98 to lay the foundation of Windows. After cultivating the user habits, they finally decided to use the sickle to harvest. So they developed the first generation of online activation system Windows XP, and Niu X announced that XP is “an impossible system to be cracked.”

As a result, the Russian hackers were unwilling to hear it, so they tried their best to hack into the Microsoft host, stealing at a speed of a few K per hour for a month, and then took the time to crack, and release XP’s “Russian cracking” as soon as possible. Edition”, mad at Microsoft to investigate the ghost.

But Russian hackers can’t talk about hacker ethics, intrusion, blackmail, or cracking. No matter what dirty work, Russians are willing to do it, as long as you pay.

In the past few years, Russian hacker organizations have made hundreds of millions of dollars by attacking large companies around the world to collect protection fees. Even Teacher Chuan has been asked by Russian hackers for excessive money.

Mr. Chuan was very confident at the time and said that he could rest assured that they must have nothing, but it didn’t take long for him to get 169 emails.

Compared with the so-called hacker organizations in China, especially the script kiddies who work hard at small game studios all day long, there is really a feeling of indescribability.

But on second thought, it is a good thing that these hacker groups can only go to blackmail small studios because this shows that my country’s Internet industry is really developed.

The strength of Russian hackers is based on the poorness of Russian hackers.

Russia has a high level of mathematics education, but there are no Internet companies in the country, and quite a few of them are interested in computers and have awakened their talents. Technical experts can’t find good jobs in Russia.

In China, as long as you show your talent in information security, there must be a right way for you to go. Many domestic hackers who were once all-powerful are eventually asked by big companies to become security personnel.

In Russia, if you are a genius and you have awakened your computer skills, then you can only play intrusions and do cracking. Anyway, you are idle, and Russia will not be fine to help the United States arrest people.

Because of poverty, relying on technology to make money has become a matter of course. If you want to make money, you must improve your hacking skills, which further promotes the combat effectiveness of Russian hackers.

On the other hand, the Russian government, which has no Internet companies that can be blackmailed, turned a blind eye to this behavior. Russian hackers have no worries about the future, and they are unscrupulous.

Many buffs are superimposed, making the Russian hacker famous.

However, the Russian hackers and the hackers at the beginning of the Internet are no longer the same kinds of people.

Everyone takes a different path.

10

In 2019, Julian Assange was arrested in London, and the last classical hacker left from the hippie era fell.

In the Internet world at this time, new rigorous barriers have been re-established. The country woven by Internet giants does not allow the heroes to display themselves, and people with technology are forced to make choices.

Electronic warfare has become the “secret” of national confrontation, and the worldwide record of Russian hackers has become the best official nomination.

The big Internet companies offer high salaries, attracting those technical geniuses to become their own production units that provide productivity.

Even if young people in the new era have awakened the power of the digital world, they will no longer fight for their ideals. For them, technology is technology. They only improve their technology, for one thing, that is, to sell themselves higher. Price code.

There are fewer and fewer pure interest criminals, and even if they do, they will not be able to break through the protective network built by the same genius.

Everyone has gradually become accustomed to the rules of the new world, learn computers well, then enter a big factory and become a programmer, waiting for the fate of 35 years old.

Those unique geniuses can no longer be guided, and even become obsessed with making viruses, using destruction to show their strength.

Li Jun, who used to make panda incense, wanted to use a virus to highlight his value and enable him to enter the big factory smoothly. In the end, this waywardness sent him to jail twice.

Idealism has become a curse in this age.

Money, reputation, interest.

Everything is irresistibly moving towards absurdity and vulgarity.

The difference between hackers and saboteurs lies in idealism. In the era of dying ideals, there are no real hackers anymore.

Young people have also forgotten those legendary stories, they have forgotten the dreams of the world with a computer, and they are struggling endlessly only in the well-organized algorithm.

In the world woven by APP, invading, modifying systems, and cracking software have become myths. A new generation of young people grow up in a world woven by technical elites, and they can cross the legend of the ocean of data without simple contact.

We are still talking about hackers, but the spirit of hackers and even the spirit of the Internet have been forgotten.

To some extent, the hacker is indeed dead.

Is it a good thing that the hacker is dead?

That was the death of an ideal age.

Is it a bad thing for a hacker to die?

A more orderly era is not bad.

So, what is your answer?