Skip to content

Commit b068a7c

Browse files
committed
Rework Ethics (#19)
1 parent be030c3 commit b068a7c

File tree

2 files changed

+178
-35
lines changed

2 files changed

+178
-35
lines changed
Lines changed: 69 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,77 @@
11
# Hacker Ethics
22

3-
### Definition
3+
## Definition
44

5-
Hacker ethics is a set of principles that guide the behavior and decision-making of ethical hackers or those involved in the IT security community. These principles stress the importance of sharing information, maintaining integrity, and avoiding malicious intent.
5+
**Hacker ethics** refers to a set of moral values and principles that shape the behavior of individuals within the hacker and cybersecurity communities. Unlike the stereotypical image of hackers as criminals, hacker ethics emphasize curiosity, creativity, freedom of information, and responsible conduct in the digital world. This ethical framework emerged alongside the hacker subculture in the 1960s and 70s at institutions like MIT, later codified by figures such as Steven Levy in his book *Hackers: Heroes of the Computer Revolution* (1984).
66

7-
### Key Principles
7+
### Core Principles of Hacker Ethics
88

9-
- **Information should be free:** Knowledge and information are seen as universal goods, and their distribution should be encouraged.
10-
- **Access to computers should be unlimited and total:** Exploration and experimentation are vital to learning and innovation.
11-
- **Promote decentralization:** Centralized systems can become single points of failure or control, making decentralization more resilient.
12-
- **Judge by skills, not by formal credentials:** Recognize merit and talent over formal education or titles.
13-
- **You can create art and beauty on a computer:** Computers can be a medium for creativity, not just utility.
14-
- **Computers can change your life for the better:** Embracing technology can lead to positive societal changes.
9+
Drawing from historical texts and community norms, the following principles define hacker ethics:
1510

16-
## Ethical Dilemmas
11+
- **1. Information should be free**
12+
Knowledge is a public good that should not be hoarded. Free flow of information fosters innovation, collaboration, and transparency. Ethical hackers advocate open-source systems and data democratization (Levy, 1984).
1713

18-
While ethical guidelines provide a general roadmap, real-life situations often pose dilemmas that can't be easily resolved. Some of these might include:
14+
- **2. Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total**
15+
Learning through exploration (a practice known as *tinkering*) is a core tenet. Barriers to access are seen as obstacles to growth and understanding. This principle underlies initiatives like hackathons and open hardware labs (Himanen, 2001).
1916

20-
- **Responsibility when discovering vulnerabilities:** Should one disclose the vulnerability immediately, notify the entity at risk first, or keep it private?
21-
- **Balancing privacy and security:** At what point does monitoring become surveillance? How do we balance the need for security against individual rights to privacy?
22-
- **Engaging in "gray hat" activities:** Sometimes actions may lie between clearly ethical (white hat) and clearly malicious (black hat). How does one navigate these gray areas?
17+
- **3. Mistrust authority—promote decentralization**
18+
Centralized control often inhibits innovation and invites abuse of power. Decentralized networks and systems distribute responsibility and reduce single points of failure (Raymond, 1999).
19+
20+
- **4. Hackers should be judged by their skills, not bogus criteria such as degrees, age, race, or position**
21+
A meritocratic ethos governs hacker communities—contributions and abilities matter more than credentials. Online platforms like GitHub and Stack Overflow reward reputation through meaningful participation.
22+
23+
- **5. You can create art and beauty on a computer**
24+
Hackers see code as a form of expression. Elegant solutions, efficient algorithms, and digital creativity all reflect this aesthetic philosophy (Levy, 1984).
25+
26+
- **6. Computers can change your life for the better**
27+
Technology is a tool for empowerment—whether through social connection, civic engagement, or personal creativity. Ethical hackers use this potential to improve systems, reveal flaws, and build more resilient infrastructure.
28+
29+
---
30+
31+
### Contemporary Ethical Dilemmas
32+
33+
Despite a strong ethical foundation, real-world scenarios often involve **complex moral ambiguities**. Ethical hackers must navigate difficult choices, balancing principles with practical risks.
34+
35+
| Category | Intent | Typical Actions | Ethical Dilemmas |
36+
|--------------|------------------|------------------------------|-----------------------------------------|
37+
| White Hat | Improve security | Authorized testing, reporting | Disclosure challenges, privacy concerns |
38+
| Grey Hat | Mixed/ambiguous | Unsolicited testing | Legality, intent, lack of compensation |
39+
| Black Hat | Personal gain | Exploitation, theft | Criminal activity, ethical violations |
40+
41+
#### 1. Responsibility When Discovering Vulnerabilities
42+
43+
Should a vulnerability be publicly disclosed, privately reported, or kept secret?
44+
45+
- **Responsible disclosure** is widely supported in the cybersecurity community. It involves notifying the affected party and giving them time to patch the issue before making it public (Householder et al., 2020).
46+
- However, delays or lack of action from vendors can motivate public disclosure as a form of pressure.
47+
48+
#### 2. Balancing Privacy and Security
49+
50+
Where is the line between **protective surveillance** and **invasive spying**?
51+
52+
- Governments and corporations may justify surveillance for national security or service optimization, but such practices can violate individual rights (Zuboff, 2019).
53+
- Ethical hackers often advocate for **privacy-preserving technologies** (like encryption) and **transparent oversight** of surveillance systems (Acquisti et al., 2015).
54+
55+
#### 3. Gray Hat Activities
56+
57+
What if breaking into a system leads to a good outcome?
58+
59+
- **Gray hats** may access systems without permission but without malicious intent, often reporting the vulnerabilities they find.
60+
- Although these actions can improve security, they technically violate laws like the CFAA (Computer Fraud and Abuse Act), raising ethical and legal tensions (Denning et al., 2014).
61+
62+
---
63+
64+
### Conclusion
65+
66+
Hacker ethics are not just about *what* hackers do, but *how* and *why* they do it. Grounded in curiosity, creativity, and social responsibility, these principles help distinguish ethical hackers from malicious actors. Yet the ethical landscape is dynamic, and navigating dilemmas requires continuous reflection, community dialogue, and legal awareness.
67+
68+
---
69+
70+
### Resources
71+
72+
- Levy, S. (1984). *Hackers: Heroes of the Computer Revolution*
73+
- Himanen, P. (2001). *The Hacker Ethic and the Spirit of the Information Age*
74+
- Raymond, E. S. (1999). *The Cathedral and the Bazaar*
75+
- Householder et al. (2020) *Coordinated vulnerability disclosure*
76+
- Acquisti et al. (2015) *Economics of privacy*
77+
- Denning et al. (2014) *Ethical analysis of hacking*

Curriculum/Module 01 - Ethics and Legal/slides/Module_01_Slides_Ethics.typ

Lines changed: 109 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -7,58 +7,146 @@
77

88
#set text(font: "Noto Sans Mono", weight: "regular", size: 20pt)
99
#show math.equation: set text(font: "Fira Math")
10-
#set strong(delta: 100)
11-
#set par(justify: true)
1210

1311
#title-slide(
1412
title: [Module 01: Ethics],
15-
subtitle: [Hacker Ethics - Guiding Principles in IT Security],
13+
subtitle: [Hacker Ethics Guiding Principles in IT Security],
1614
)
1715

18-
#slide(title: "What is Hacker Ethics")[
19-
A framework for:
16+
#slide(title: "Outline")[
17+
#metropolis-outline
18+
]
19+
20+
#new-section-slide("Introduction to Hacker Ethics")
2021

22+
#slide(title: "Definition")[
23+
#defbox(
24+
title: [Hacker Ethics],
25+
[
26+
*Hacker ethics* are moral values shaping how individuals in the cybersecurity community act.
2127

22-
- Ethical hacking
28+
They emphasize:
2329

30+
- Curiosity, creativity, and freedom of information
31+
- Responsible behavior in the digital world
32+
- A tradition originating in the 1960s/70s, codified by Steven Levy (1984)
2433

25-
- Decision-making in IT security
34+
*Not about crime—about exploration and improving systems.*
35+
],
36+
)
37+
]
2638

39+
#new-section-slide("Core Principles")
2740

28-
*Emphasizes integrity, information sharing, and non-malicious intent.*
41+
#slide(title: "Core Principles – Part 1")[
42+
1. *Information should be free*
43+
44+
Open knowledge promotes innovation and transparency.
2945

30-
]
46+
2. *Unlimited access to learning tools*
47+
48+
Hands-on exploration (*tinkering*) fosters understanding.
3149

32-
#slide(title: "Key Principles")[
33-
1. *Free Information:* Knowledge as a universal good.
50+
3. *Mistrust authority – promote decentralization*
51+
52+
Power should be distributed, not centralized.
3453

54+
#alert("Inspired by hacker subcultures at MIT and beyond.")
55+
]
56+
57+
#slide(title: "Core Principles – Part 2")[
58+
4. *Judge by skill, not status*
59+
60+
Merit over formal credentials.
3561

36-
2. *Open Access:* Encourage exploration.
62+
5. *Code as art*
63+
64+
Beauty in elegant solutions and creative hacks.
3765

66+
6. *Computers can improve lives*
67+
68+
#alert("Ethical use of tech to empower people and fix broken systems.")
69+
]
3870

39-
3. *Decentralization:* Avoid single points of failure.
71+
#new-section-slide("Ethical Dilemmas")
72+
73+
#slide(title: "Ethical Dilemmas Overview")[
74+
#set table(
75+
stroke: none,
76+
gutter: 0.2em,
77+
fill: (x, y) => if x == 0 or y == 0 {
78+
gray
79+
},
80+
inset: (right: 1.5em),
81+
)
82+
#table(
83+
columns: 3,
84+
align: (left, left, left),
85+
[*Category*], [*Intent*], [*Typical Actions*],
86+
[White Hat], [Improve security], [Authorized testing, reporting],
87+
[Grey Hat], [Ambiguous], [Unsolicited testing],
88+
[Black Hat], [Personal gain], [Exploitation, theft],
89+
)
90+
91+
#alert("Ethics are shaped not just by actions—but also by intent and context.")
92+
]
4093

94+
#slide(title: "Dilemma 1: Vulnerability Disclosure")[
95+
*What should you do when you find a vulnerability?*
4196

42-
4. *Meritocracy:* Skills over titles.
97+
- *Responsible disclosure:* Notify vendors, give time to fix
98+
- *Full disclosure:* Go public to pressure action
99+
- *Non-disclosure:* Risky but sometimes done
43100

101+
#alert("⟶ Community norms favor responsible, coordinated disclosure.")
44102
]
45103

46-
#slide(title: "Creativity and Impact")[
47-
- *Artistic Expression:* Creativity through technology.
104+
#slide(title: "Dilemma 2: Privacy vs. Security")[
105+
*How do we balance protection and freedom?*
48106

107+
- Surveillance can prevent threats—but may violate privacy
108+
- Ethical hackers support:
49109

50-
- *Positive Change:* Technology as a catalyst for improvement.
110+
- Privacy-preserving tech (e.g., encryption)
111+
- Transparent oversight and accountability
51112

113+
#alert("“Security” is not an excuse to erase rights.")
52114
]
53115

54-
#slide(title: "Ethical Dilemmas")[
55-
1. *Vulnerability Disclosure:* Immediate, notify, or private?
116+
#slide(title: "Dilemma 3: Gray Hat Behavior")[
117+
**Is it okay to break rules for a good cause?**
56118

119+
- Access without permission—then report flaws
120+
- Intention is good, but legality is unclear
121+
- Laws like the CFAA make this a risky path
57122

58-
2. *Privacy vs. Security:* Balancing individual rights.
123+
#alert("⚠️ Even good intentions can lead to legal consequences.")
124+
]
125+
126+
#new-section-slide("Conclusion")
127+
128+
#slide(title: "Conclusion")[
129+
Hacker ethics are about #alert("how") and #alert("why") we hack.
130+
131+
They call for:
59132

133+
- Curiosity, creativity, and responsibility
134+
- Openness and meritocracy
135+
- Continuous reflection and legal awareness
60136

61-
3. *Gray Hat Activities:* Navigating ethical boundaries.
137+
#alert("Ethical hacking is about building a better, safer digital world.")
138+
]
62139

140+
#slide(title: "Further Reading")[
141+
- *Hackers* – Steven Levy (1984)
142+
- *The Hacker Ethic* – Pekka Himanen (2001)
143+
- *The Cathedral and the Bazaar* – Eric S. Raymond (1999)
144+
- *Coordinated Vulnerability Disclosure* – Householder et al. (2020)
145+
- *Economics of Privacy* – Acquisti et al. (2015)
146+
- *Ethical Analysis of Hacking* – Denning et al. (2014)
63147
]
64148

149+
#title-slide(
150+
title: [Module 01: Ethics],
151+
subtitle: [Hacker Ethics – Guiding Principles in IT Security],
152+
)

0 commit comments

Comments
 (0)