Foreword |
|
xi | |
|
Author's Note |
|
xv | |
Acknowledgments |
|
xix | |
|
1 The Hacker Ethic: Germany's Chaos Computer Club And The Genealogy Of The Hacker Ethos |
|
|
1 | (32) |
|
|
1 | (1) |
|
Getting to the Chaos Commmunkation Camp |
|
|
2 | (3) |
|
First-Wave Hackers: Hacking Culture in the US from the Late 1950s, including the Hands-On Imperative and Other Principles of a Hacker Ethos |
|
|
5 | (5) |
|
Second-Wave Hackers: Computers and Code for the People, including the People's Computer Company, The WELL, Homebrew, Silicon Valley, RMS, and Free Software |
|
|
10 | (3) |
|
First-Wave Europe: The Early Development of European Hacker Culture in the 1970s and 1980s |
|
|
13 | (2) |
|
The Early Days of the Chaos Computer Club |
|
|
15 | (3) |
|
1989 A Watershed Year for Germany and the CCC |
|
|
18 | (3) |
|
|
21 | (1) |
|
The 1990s: Hackerdom Expands, Silicon Valley Takes Off, and a Schism Develops Between the Philosophies of Proprietary Software and Free Software |
|
|
22 | (7) |
|
First Impressions: Be Excellent to Each Other |
|
|
29 | (4) |
|
2 The Hacker Challenge: Cypherpunks On The Electronic Frontier |
|
|
33 | (20) |
|
Third-Wave Hackers: The Cypherpunks |
|
|
33 | (7) |
|
Fellow Travelers, Reluctant Heroes, and the Cryptowars of the 1990s |
|
|
40 | (11) |
|
|
51 | (2) |
|
3 A Manifesto For The Twenty-First Century: Privacy For The Weak, Transparency For The Powerful |
|
|
53 | (18) |
|
Code Is Law, and the Onion Router Proves It |
|
|
53 | (3) |
|
|
56 | (4) |
|
|
60 | (5) |
|
|
65 | (3) |
|
A Manifesto for the Twenty-first Century and the Concept of Popular Sovereignty |
|
|
68 | (3) |
|
4 The Burden Of Security: The Challenges For The Ordinary User |
|
|
71 | (22) |
|
|
71 | (7) |
|
|
78 | (1) |
|
Berlin: City of Freedom, City of Exiles |
|
|
79 | (5) |
|
|
84 | (9) |
|
5 Democracy In Cyberspace: First, The Governance Problems |
|
|
93 | (18) |
|
|
93 | (2) |
|
Internet Governance: "Loraxes Who Speak for the Trees" |
|
|
95 | (3) |
|
|
98 | (3) |
|
|
101 | (4) |
|
What Is Democracy? Or How to Govern Democratically in a World That Is No Longer Flat? |
|
|
105 | (3) |
|
Hacker Governance: Noisy Square |
|
|
108 | (3) |
|
6 Culture Clash: Hermes And The Italian Hackingteam |
|
|
111 | (14) |
|
|
111 | (3) |
|
|
114 | (11) |
|
7 Democracy In Cyberspace: Then The Design Problems |
|
|
125 | (14) |
|
The Problem of Provable Security |
|
|
125 | (2) |
|
The Problem of Designing Privacy-Preserving Protocols |
|
|
127 | (3) |
|
|
130 | (5) |
|
Remaking the Internet for the Twenty-first Century |
|
|
135 | (4) |
|
8 The Gathering Storm: The New Crypto---And Information And Net Neutrality And Free Software And Trust-Busting---Wars |
|
|
139 | (36) |
|
A New Digital Era Civics Is Necessary |
|
|
139 | (1) |
|
|
140 | (5) |
|
|
145 | (8) |
|
The New Net Neutrality Wars |
|
|
153 | (4) |
|
The New Free Software Wars |
|
|
157 | (7) |
|
The New Trust-Busting Wars and the Unsustainability of Current Digital Capitalism |
|
|
164 | (8) |
|
|
172 | (3) |
|
9 Hacker Occupy: Bringing Occupy Into Cyberspace And The Digital Era |
|
|
175 | (32) |
|
|
175 | (10) |
|
A Multitude of Diverse Experiments |
|
|
185 | (1) |
|
Hacking Experiments Using Federated Technology, or the Basic Internet Structure |
|
|
186 | (5) |
|
Hacking Experiments Using P2P Distributed Technology |
|
|
191 | (3) |
|
Hacking Experiments Using the Blockchain |
|
|
194 | (4) |
|
|
198 | (4) |
|
The Blockchain Reality Check |
|
|
202 | (2) |
|
|
204 | (3) |
|
10 Distributed Democracy: Experiments In Spain, Italy, And Canada |
|
|
207 | (42) |
|
Getting Control of Democratic Processes: The Indignant of Barcelona |
|
|
207 | (4) |
|
Hacking Corruption: Xnet's ismparato |
|
|
211 | (6) |
|
Hazte Banquero (Become a Banker) |
|
|
217 | (3) |
|
Maddish: Platforms for the People |
|
|
220 | (2) |
|
|
222 | (8) |
|
|
230 | (3) |
|
Hacking Electoral Politics in Italy: "A New Politics Is Possible" |
|
|
233 | (10) |
|
Hacking Democratic Decision Making Itself: A Canadian Algorithm for Global Democracy |
|
|
243 | (4) |
|
|
247 | (2) |
|
11 The Value And Risk Of Transgressive Acts: Corrective Feedback |
|
|
249 | (32) |
|
|
249 | (3) |
|
The Value of Transgressive Acts |
|
|
252 | (3) |
|
The Risk of Transgressive Acts |
|
|
255 | (4) |
|
|
259 | (12) |
|
Where Power Meets Its Limits: The Making of Martyrs |
|
|
271 | (4) |
|
Democratic Constitutionalism as Conversation Leading to Rough Consensus |
|
|
275 | (6) |
|
12 Mainstreaming Hackerdom: A New Condition Of Freedom |
|
|
281 | (40) |
|
|
281 | (3) |
|
Libre Planet, the Heart of Free Software |
|
|
284 | (6) |
|
Richard Stallman and the Free Software Foundation Awards |
|
|
290 | (2) |
|
Pros, Cons, and Disobedience Awards |
|
|
292 | (5) |
|
|
297 | (6) |
|
Harvard and the Berkman Klein Center for Internet & Society |
|
|
303 | (4) |
|
|
307 | (2) |
|
Enlivening a Moral Imagination |
|
|
309 | (9) |
|
The Epicenter of a Civilization |
|
|
318 | (3) |
Coda |
|
321 | (2) |
Notes |
|
323 | (46) |
Index |
|
369 | |