{"id":574,"date":"2026-01-13T13:05:43","date_gmt":"2026-01-13T13:05:43","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/"},"modified":"2026-01-13T13:05:43","modified_gmt":"2026-01-13T13:05:43","slug":"1980s-hacker-manifesto","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/","title":{"rendered":"1980s Hacker Manifesto"},"content":{"rendered":"<div>\n<p>Forty years ago, The Mentor\u2014<a href=\"https:\/\/en.wikipedia.org\/wiki\/Loyd_Blankenship\">Loyd Blankenship<\/a>\u2014published \u201c<a href=\"https:\/\/phrack.org\/issues\/7\/3\">The Conscience of a Hacker<\/a>\u201d in <i>Phrack<\/i>.<\/p>\n<blockquote>\n<p>You bet your ass we\u2019re all alike\u2026 we\u2019ve been spoon-fed baby food at school when we hungered for steak\u2026 the bits of meat that you did let slip through were pre-chewed and tasteless.  We\u2019ve been dominated by sadists, or ignored by the apathetic.  The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.<\/p>\n<p>This is our world now\u2026 the world of the electron and the switch, the beauty of the baud.  We make use of a service already existing without paying for what could be dirt-cheap if it wasn\u2019t run by profiteering gluttons, and you call us criminals.  We explore\u2026 and you call us criminals.  We seek after knowledge\u2026 and you call us criminals.  We exist without skin color, without nationality, without religious bias\u2026 and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it\u2019s for our own good, yet we\u2019re the criminals.<\/p>\n<p>Yes, I am a criminal.  My crime is that of curiosity.  My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.<\/p>\n<\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Forty years ago, The Mentor\u2014Loyd Blankenship\u2014published \u201cThe Conscience of a Hacker\u201d in Phrack. You bet your ass we\u2019re all alike\u2026 we\u2019ve been spoon-fed baby food at school when we hungered for steak\u2026 the bits of meat that you did let slip through were pre-chewed and tasteless. We\u2019ve been dominated by sadists, or ignored by the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90,274,437,53],"tags":[91],"class_list":["post-574","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-hacking","category-history-of-security","category-uncategorized","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>1980s Hacker Manifesto - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1980s Hacker Manifesto - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Forty years ago, The Mentor\u2014Loyd Blankenship\u2014published \u201cThe Conscience of a Hacker\u201d in Phrack. You bet your ass we\u2019re all alike\u2026 we\u2019ve been spoon-fed baby food at school when we hungered for steak\u2026 the bits of meat that you did let slip through were pre-chewed and tasteless. We\u2019ve been dominated by sadists, or ignored by the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-13T13:05:43+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"1980s Hacker Manifesto\",\"datePublished\":\"2026-01-13T13:05:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/\"},\"wordCount\":238,\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\",\"hacking\",\"history of security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/\",\"name\":\"1980s Hacker Manifesto - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-01-13T13:05:43+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"1980s Hacker Manifesto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"1980s Hacker Manifesto - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/","og_locale":"en_US","og_type":"article","og_title":"1980s Hacker Manifesto - Imperative Business Ventures Limited","og_description":"Forty years ago, The Mentor\u2014Loyd Blankenship\u2014published \u201cThe Conscience of a Hacker\u201d in Phrack. You bet your ass we\u2019re all alike\u2026 we\u2019ve been spoon-fed baby food at school when we hungered for steak\u2026 the bits of meat that you did let slip through were pre-chewed and tasteless. We\u2019ve been dominated by sadists, or ignored by the [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-01-13T13:05:43+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"1980s Hacker Manifesto","datePublished":"2026-01-13T13:05:43+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/"},"wordCount":238,"keywords":["Cybersecurity"],"articleSection":["Cybersecurity","hacking","history of security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/","name":"1980s Hacker Manifesto - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-01-13T13:05:43+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/13\/1980s-hacker-manifesto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"1980s Hacker Manifesto"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=574"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/574\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}