CEU eTD Collection In partial fulfillment of the requirements for the degree of Master of Department of Sociology and Social Anthropology Modernity, Capitalism andLiberalism Central European University This is r0ket science! Dunajcsik P in Budapest, Hungary Jean­Louis Fabiani Submitted to Supervisors: Jakob Rigi 2012 By é ter maxigas CEU eTD Collection a ul n rm bsc cmoet olwn h online the following components basic from 500 around the world. one than in more on goes that work the ofresult typical a is documentation.It build other dozen can a anybody and but bought, be cannot torch, it and price electronic no has It an purposes. amazing as a drones, as counter, for Geiger Yourself control It remote Do a in component a as used is badge the conference, the of end the Before points. -27500 with list the of top the leads somebody hours hacked: already Two is system crowd. score high the the amongst takeoff after shared are game the of scores high the and it, on Invaders Space game retro famous the play can You . of allergies cultural the all trigger to designed device wireless and computer primitive a is it that: than more your much does it but panel, LCD an on name displays It r0ket. the called badge and conference a sharing receive participants knowledge, celebrate to all hangars and Camp, Communication Chaos called is and conference The . tents in week a for gather hackers 5000 Around Germany. airport, Finowfurt August, 2011 Modernity, Capitalism andLiberalism This is r0ket science! in Hacker Culture

CEU eTD Collection againstthe totality.social Söderberg~ (2008, 181) at weighted when intelligible looking becomes practice by This practice. start foremost hacker and the first of should relevance movement the dissect to attempt serious A

CEU eTD Collection Concluding remarks Analysis Descriptions of the case Literature review Methodology Questions Acknowledgements Abstract Table of Contents Figures References and Bibliography Excess Cybernetics Peer production goes physical Modernity Capitalism Liberalism Use cases Hardware Distribution Production The object Literature on alternatives to modernity Literature on hackers Key concepts: hacking and the liberalism, capitalism, modernity triad ...... i ...... 30 27 22 19 19 13 80 72 71 65 63 63 56 49 42 41 37 33 iii ii 9 6 6 2 1 CEU eTD Collection explain some of the discrepancies between categories and data. can nonmodernity of theories if ask I Finally, itself. data the in connections and patterns interesting more the highlight also can categories but categories, modify can data the which in data, network the and categories the between relationship interactive an posit I capitalism. and liberalism modernity, like categories of framework the in sense make connections these whether ask I data, ethnographic the on Based structure. technological internal its as well as scene the outside and inside makes r0ket the connections the tracing in concentrate I scene. itmoves technologicalartifactcalledhackerspacefollow throughstudyasthisI a theIn r0ket Abstract ii

CEU eTD Collection I am not only presenting my personal delusions about the scene, or I am not disclosing not anything sensitive, peer review of practitioners was absolutely essential. am I or scene, the about delusions personal my presenting only not am been I have Pickering Andrew with that ensure to order in Furthermore, cybernetics. on material the developing in instrumental discussions Additionally, invaluable. proved — a as production production cultural of issues in peer expertise has who of — Fabiani Jean-Louis and problems — sociologist the and ethnographer an as field the of hand knowledge first has who — Rigi Jakob CEU, the from supervisors my with collaboration the where is This scientists. social for about writing of case find the in and especially useful, parse can laymen that way a to in evidences knowledge explain native to the and knowledge, port academic to is difficulty chief one inside, the from writing scene. When hacker the in experiences my on based inside, the from written is below text The Acknowledgements iii

CEU eTD Collection productive way. a in culture hacker on research existing complement should results Thus ones. complex especially artifacts, physical to extended be can working of way hacker the whether question the answer can study case this Therefore hardware. electronic developing for used primarily is it that show r0ket the of cases use The spaces. self-organised in communities embodied by handled mostly is that virtual-actualphysicalhybrida artifactisinaembeddedcollaboration.theis r0ket While space,it online of mechanisms and examples on depend literature existing the in arguments most since approach, breaking ground a is artifact physical a through culture hacker researching that claim I experiences of hackers studying by their products. subjective and motivation the beyond look to is expansion for direction possible One hand. at such phenomena the of understanding new a but data, of new only not produce to also always is research prospect the studies, case all with As device. r0ket the around abound that practices actual against culture hacker about therefore claims existing of validity and the test to opportunity research an presents previous most than detailed and ethnographic more is approach My discrepancies between categories data. and and the patterns of some explain can nonmodernity interesting of theories if ask I more Finally, itself. data the in the connections highlight also can categories but categories, modify can data the which in data, network the and categories the between relationship interactive an posit I capitalism. and liberalism modernity, like categories of framework the in sense make connections these whether ask I data, ethnographic the on Based structure. technological internal its as well as scene the outside and inside makes r0ket the connections the tracing in concentrate I scene. the through moves it as r0ket called artifact technological a follow I study this In Questions 1

CEU eTD Collection interactions. He contrasts “virtual methods” with “digital methods” — while the former refers to refers former the while — methods” “digital with methods” “virtual contrasts He interactions. and objects relationships, structures it how and infrastructure technical the of understanding the emphasises Rogers (2009). Amsterdam of University the at workshop methodological pioneering the from Rogers Richard by described as methods digital” “natively by complemented be to have they extent, some to spaces communication virtual of case the useful in guidelinesare these While (1983). Atkinson Paul and Martyn Hammersley, to addition in (1995a), Bernard by described methods classical the with undertaken be can communities embodied in observation Participant interrogation field work. and technical for directions new out be pointed could results interview that and interviewing, questions through answered new yielded often interrogation technical and work field research, own my During claims. these supports & experience own Monitor My 3). 2010, Warfare Foundation Shadowserver (Information others on verified and tested be can side one on findings since validity higher yields methods such of combination the that claim They 2012). (Forlano analysis technical (3) and interactions online (2) with interviews and observation participant including investigation field ground” the “on (1) combine they where Canada, in Lab Citizen the at developed methodology” “fusion the by inspired were methods these of combination The putting it together, reprogramming it soldering and extensions on it. and apart it taking involved which itself device r0ket the of interrogation technical undertook I Thirdly, online. and offline both r0ket, semi- the with conducted associated people with I interviews structured Secondly, enjoyed. and documented, discussed, is r0ket which in spaces communication virtual the as well as surfaced, r0ket where spaces hacker and gatherings hacker in research desktop and observation participant active mostly work, field did I Firstly, methods. research of set distinct relatively three through gathered been has here presented material The Methodology 2

CEU eTD Collection These interviews generally lasted around an hour, and used the semi-structured interview model interview semi-structured the used and hour, an around lasted generally interviews These together. members otherteam three then separately, team and development r0ket the of members two interviewed I gathering latter the during observation, participant to addition In r0ket. the of patterns usage and process distribution the mapping for important were These 2011). December, 27-30 28C3; called (also sold first was r0ket the where Camp Communication Chaos the and premiered was r0ket the where 2011) August, (10-14 Germany in airport Finowfurt the at Camp Communication Chaos the were ones principal two The utilised. and distributed was device the where gatherings hacker were however, sites, research important most The Budapest. and London Germany, in in hackerspaces stayed and visited research I actual the course of the During interpretedbe contextually. other the than better results importanthaveto Theyvarietydifferentdataoptions. present aresourcesasets and ofwhich of kinds certain produce to tend each and models association supported their have each — team r0ket the by used all — service blogging micro soup.io the Git the Mailman, by powered or website, github.com the into built development software for system control version distributed lists mailing like media Online difficult. kinds other make and collaboration of kinds certain support environments, physical as themselves, Hackerspaces the between dynamics developers. social the was what and rhythm, what in r0ket, the of parts software r0ket/r0ket”, of (“Graphs when and why change, the done has who about meta-information the and code of lines added and deleted of consisting — r0ket the of firmware the here, — code software to change packaged a “commit”: the is research my from example One offline. found not are that analysis of units at looking means latter the environments, online to applied techniques collection data traditional Github.com ). This enabled me to see how many people worked on the on worked people many how see to me enabled This ). 3

CEU eTD Collection Center for Knowledge in Budapest and the Hackney Crack House in London. As an anarchist I anarchist an As London. in House Crack Hackney the and Budapest in Knowledge for Center Autonomous Hungarian the of foundation the with hackerspaces the in involved got I 2010 In now). decade a (for 2002 since activist technological a as scene hacker the in involved been have I that is field the in position own My inquiry. this of dimension situated the clarify to prudent seems it 1949), (Weber conducted was research of piece a which from perspective specific the of understanding the on depends validity scientific that so bias, own their have always — scientists even — individuals that argues he where objectivity sociological of idea Weber’s with line In the chapterpresenting device, the especially the sections hardware on and software. their in tested reflected are experiences and These gatherings. hacker r0ket the of context the the in mainly of functionality, elements hardware bundled and the software on based the them reviewed assembled I and instructions. moment the at available are that r0ket the of versions both bought and gathered I activities. of number a of consisted interrogation Technical the of usecases the device. cataloguingfor source main the be proved to thatplatforms blogging micro Both are r0ket. the of collect which websites accounts soup.io and the wiki followed and websites these studied associated I them. on documentation their have device) initiatives Both r0ket elsewhere. the from and missing (hackerspaces.org were that facts out find to and situations certain of understanding my clarify to interactively them used also I rooms chat the in discussion the archiving to addition In projects. both with associated rooms Chat) Relay ( IRC the and itself, device r0ket the for list development and discussion discussionthe hackerspaces.org, the of list following mailing been have I 2011 of summer the since research, online of terms In andthe Budapest London hackerspaces the r0ket. on at participants two with interviews unstructured conducted I Additionally, interviews. these from came production about material the of Most (1983). Briggs and (1995b) Bernard by described 4

CEU eTD Collection being entangled inits as web a practitioner. withoutinception, its since perspective research a from development its see to able been have I so research the began I when 2011 in launched been has it above, wrote I as Furthermore, project. research this of purposes the for than other it in interest vested no have I and group, peer my of product a not is r0ket The researchers. native less or more for challenge key third the — distance analytical of degree a maintain to able be to order in consciously device r0ket the chosen have I especially onethatknow I relatively well from first experience. hand field, (online-offline) hybrid a on research conducting of aspect hardest the was this that believe I situation. this arisingfrom separate complexity the reduce to way one was analysis the by followed chapter a in case the describe to decision The subsets. across connections close as see I what by together bound data of amount vast a collected I object, an to anchored and bounded clearly is case the if Even case. the of presentation the from exclude and include to material what about choices editorial concerned research current the with problem specific a reasons, above the For the underlying themes of the paper. also are excess of science the and science of excess the discover, will reader the As cases. some in close too or far too go well as just could but literature, existing the in found seldom is that detail objects of the research thanother most scientists. Thisis reflected inan emphasis on ethnographic with engagement and subjects the ambiguous to closer obviously this am I practitioner reflects a as Furthermore, paper politics. technological This other. the on hackers nonpolitical theof consciousness political of lack the with dissatisfied and hand one the on hackers political of approach restrictive the with dissatisfied — hackers of potentialities political the in interested am 5

CEU eTD Collection frowned upon when they apply it to themselves. In mainstream discourse, it is still refers to refers still is it discourse, mainstream In themselves. to it generally apply are they people when that upon means frowned which earned, be a to not has than that status often social more a is or compliment hacker Consequently, situation. the to brings it that frustration or satisfaction moral and aesthetic intellectual, of flavour particular the by recognised be can hack a Therefore, 1992) al et (Raymond it.” into went that cleverness the admire to have you , of work crafted carefully a or job patchwork quick-and-dirty a is result the Whether ingenuity’. of application appropriate ‘an as characterised be might “Hacking this: like culture”) hacker the of heritage common (“a File Jargon definitive the in defined appropriately most perhaps is it but community, the in amusement and debate much of subject the is itself hacking of definition The concepts:Key hacking the and liberalism, capitalism, modernity triad of modernity are reviewed whichwill be useful for the analysis. four critiques inclined philosophically more or by forward put ideas of couple three a Finally, authors. seminal through briefly presented is hackers on knowledge scientific social the of state the Next, literature. sociological the on based defined are modernity and capitalism liberalism, as well as hacking, like categories and concepts Key sections. three of comprised is chapter This Literature review limitation the field of itself my position and init. the as this accept to decided I stage this At detail. in described not are it in feature which persons of backgrounds the that is hacker study the of the limitations the of in one reason, same high the For community. held value a — subjects the of enables privacy directly the respect people increasingly of to group researcher a studying than rather object an on focusing Finally, 6

CEU eTD Collection regard. Finally, modernity is the cultural experience of capitalism. Jameson and Lyotard argue Lyotard and Jameson capitalism. of experience cultural the is modernity Finally, regard. this in useful is 1983) (Gilman violence structural of notion The discrimination. as such rightsissues human evaluating when factors economic consider to fails “economic it that its meaning for blindness”, criticised widely is neoliberalism especially and Liberalism neoliberalism. call others and he what into mutated it era capitalist late the in that argues (2007) Harvey David positions. political different very occupy otherwise that groups by accepted often are tenets liberal core the thus grounds, liberal on up set the mostly were and states Nation “left” “right”. conservative/fascist radical/communist the between ideology “centrist” a as viewed sometimes is It rights. equal and freedom individual emphasises that ideology political a is liberalism Secondly, alienation. and exploitation produces it system economic an As accumulation. capital endless aids which production of means the of ownership private by characterised is It position). this take all Negri or Wallerstein Jameson, Harvey, Adorno, like (authors capitalism late called be can that stage a in is it now and feudalism, superseded it category historical a As production. of mode specific a as aspect economic their via understood relations social of set a is capitalism Firstly, the is which of one scenes, separate less hackerspaces (maxigas, forthcoming). or more various of development the in that history resulted complex and exciting an have Hackers illegality. and legality between areas grey deep and large the account into take not does it thirdly and participants, its of some illegalises and scene the divides it secondly infrastructure, against attacks of aspect political the for account not does it firstly because distinction oppose strongly I elements. criminal and destructive the be to supposed are latter the where crackers, and hackers between and distinction a make hackers journalists Some infrastructure. network on attacks than ground more much covers which activity productive a primarily is hackerdom that here show to hope I activities, similar in engage happily hackers some While profit”. and “fun for havoc wreak and networks computer penetrate to skills technological their of advantage take to expertise their exploit who individuals or groups 7

CEU eTD Collection wider historical context that process. of the as modernity and embedded are subjects these which in structure political-economical a as subjectivation,capitalism of view of point the fromliberalism taking on built analysis is my of arc the However, history. and structure subjects, own its constructs each since complicated more is correspondingpersonal-structural-historicalroughlythe to constructions,the naturally matter but as seen be can liberalism-capitalism-modernity triad the the Alternatively, of lucid. some more conclusions makes interpretation of frame network the how showing by networks Latour’s to tribute small a pay will I Finally, Pickering. by forward put been has it as cybernetics the on bear to together drawn be can these from conclusions the of Most larger. the towards proceeding and smaller the from starting chapter Analysis the in them discuss will I Therefore circle. smaller possible without the circle, bigger conversely, and the bigger circle includes more options the than not is circle smaller the where circles concentric three are modernity and capitalism Liberalism, lot with their computers. a do actually hackers that something also is reconfiguration course, Of expansion. and mutation historical their of vanguard the are they whether go or hackers modernity/liberalism/capitalism, if beyond tell will history only operation: the of ambiguity the expresses it because word good a is Reconfiguration way. different a in them assemble and apart them take to how ideas better have they and needs their to according work not do terms these under defined categories the because machines abstract these reconfigure hackers that claim I above. mentioned capitalism late the with conjunction in modernity late of notion the to sticked others while alternative, an as modernity liquid term the proposed Bauman Zygmunt etc. Giddens, Beck, Lash, by debated widely is thesis this although post-modernity, is capitalism late of experience cultural the that 8

CEU eTD Collection collaborations, including the distribution of labour between a small circle of core developers, a developers, core of circle small a between labour of distribution the including collaborations, these facilitates Internet the of rise the how others the than carefully more elucidates projects), other and Wikipedia also but software (free production peer of ecology the at looking Benkler, scientificand research (modernity). practices development software traditional as well as (capitalism) accumulation capital of models business prevailing (liberalism), self-satisfaction individual of concepts existing the to challenge practical perhaps and theoretical a presents grounds these on organised collaboration massive the that out point authors three All caring. and play passion, of motivation tripartite the by driven are they particular, In 2002). (Weber ethic Protestant the characterises which life hardworking a from stemming self-esteem the or gain financial by motivated not are they so work, their in satisfaction find hackers general in andthat agree all capitalism Raymond and Söderberg liberalism, Himanen, modernity. of logic the disrupt hackers that argue to reasons many are There authors.other the by posited production of mode emerging the for framework coherent a present to attempt an the in later (explained practice scientific is productionpeer of theory (2011) Benkler’sYochai Finally, Latour). Pickering and of discussion nonmodern versus modern of idea the to comes development it software when instructive be will authors, free other the than direction the technical more a from methodology at looking is who (1999), Raymond S. Eric capitalism. and (2008) Söderberg’s Johan hackers into inquiry the enjoy. inform will struggle labour anticapitalist to an as hacking about supposed argument are hackers freedoms personal of set whole a down traces he since ideology an as liberalism of discussion the for mainly useful is ethic hacker the of treatment (2001) Himanen’s Pekka goals. research the pursue to paper present the for tools theoretical enough give who authors key of handful a chosen have I brevity of sake the For Literature on hackers 9

CEU eTD Collection actually the same: the ability to function flexibly in a way optimal for each project goal, while goal, project each for optimal way a in flexibly function to ability the same: the actually are network or computer a of those and person or enterprise network a of ideals the end, the “In machines: become men — cyborgs cold into the transformed are rationalisation and modern of values criteria Protestant fit to tailored subjectivities the that finds of He process itself. the subjectivation or subjectivities, hacker and Protestant of analysis the from stem conclusions ethic the communism. of concept emic popular widely and traditional the of that out points Himanen Thirdly, basis economic the forms labour unalienated the politically, Taken beauty. towards orientated creativity, of exercise the as beings human of essence the posits anthropology Marxist original the Philosophically, activity. productive unalienated of form germ the as hacking of significance political and scientific social the to points He “struggle”). (hence exploitation and “play”) (hence alienation in resulting arrangements capitalist against struggle labour covert the that theorises Söderberg Secondly, of programmers. productivity the limits management corporate how shows even he analysis his to epilogue programming code of superior quality, addressing the needs of users directlyas they emerge. an In the of image the in captures he that — methodology development software free the how demonstrates Raymond Firstly, these challenges. about point interesting an offers author each former, the to latter the from Proceeding anmore obstacle than of a productive force. increasinglybecoming is postfordist economies, in labour of form hegemonic the turn in is which labour, immaterial on based intellectual accumulation capitalist of foundations the of circumstances one is which property, such under that — (2004) Lessig Lawrence read widely more the with along — out points correctly He freeriders. of audience an and contributors of mass wider is a viable and vibrant alternative to the ideology of the Protestant ethic. His ultimate His ethic. Protestant the of ideology the to alternative vibrant and viable a is Bazaar , counterposed with the Cathedral — can produce can — Cathedral the with counterposed , 10 “play struggle” “play of hackers is a more or less or more a is hackers of hacker

CEU eTD Collection whose proposed visions are often directly contradictory the current to systems. movements, social many of situation the with opposition stark in is affairs of state this Notably, developments. novel the with compatible partly least at are arrangements current the Therefore commons. the of logic the to similar effects market throughcopies indirect sold of value the raises actually property intellectual gated of piracy illegal massive, the while alike; actors non-capitalist and capitalist by exploited be can which —, commons a called — everybody for available pool the resource a in of development articulated the to is contributes production which Peer context. production capitalist contemporary of mode new a is production peer that is proposes mostThe convincing explanation, whichSöderberg, Rigianda lesser to extent Lessig Benkler and GNU/ on Chinese Longsoon machines, Ubuntu Linux for PC IBM compatible machines)? computers, Macintosh all powering X (OS front desktop the on advances making while (Android), phones smart of majority the as well as BSDs), and Linuxen (e.g. Internet the on servers of majority the powering is systems operating of family favourite hacker the that up start star shooting through economy new the companies, are at and the forefront of modern computer scienceasdiscipline? a is How itpossible fuel times, the of sign the as media the in starred are hacks their that possible it is How scene? hacker the from emerged Gates Bill like planet the on men richest ofthe of some configurations that possible hegemonic it is the How liberalism-capitalism-modernity? with line of out fundamentally so fall attitudes their time same the at entrepreneurs successful even or freelancers happy mostly are hackers that possible it a is How by Söderberg. like resolved economy be political of only tools theoretical can the with face equipped authors dialectician these contradiction basic the that see to plain is It their work, machines make like man: free,unpredictable, amazing. and through — computers networked — networks and computers to relationship intimate an develop who hackers very the hand, other the On (128) speed.” high at stability maintaining 11

CEU eTD Collection o os pe rdcin cn wr n te cnet o moid cmuiis ad most and, communities embodied of importantly, material goods? context the in work can production peer does How projects? software on focusing are who above, authors the by described cooperation of patterns the change hacking hardware Does artifacts. physical with play and create to flesh the in together come hackers when happens what at look to is step first The 81). (2008, reality’” ‘flesh our in things great individuals’directto seenwhat “It remainsbe cooperationHimanen,accomplish will of words the In inquiries. future for direction promising a as raise explicitly authors principal three the all that question a addresses research ethnographic my further, step a Going chapter. this in featuring authors key the by made observations these refine and test will enquiry own My throughout paper this both from a theoretical and ethnological an point of view. device r0ket the of aspects poetic the to back come will I time to time from mystery, a remains multivolume of theand author himself programmer a — Raymond for while words; his through world a creates who God to closeness programmers’ the through Himanen Schiller; of Letters the and Marcuse late the Marx, early the through mainly this theorises Söderberg 2005). (Ahmad ‘taste’.” call I thing a “It’s answer; stock his gives he posses?”, should programmer every skill important most the is think you do “What Levy asked is Torvalds Linux When computer.” a on Steven beauty and art create can “You that states by (2010) formulated is it as ethic hacker aesthetic the specifically of to commandment fifth play The through sensibilities. — mystically bit a — connected frequently is which culture, hacker on literature the throughout freedom of message strong a is there Importantly, The Art of Computer of Art The The Art of Unix Programming Unix of Art The 12 ) —, this not is question. even a While for me it (itself a homage to ’shomageDonald epica to (itself

CEU eTD Collection crey eand fot ee huh hy ahrd hi muss rm omn fed of fields many so from impulses their gathered they though even have afloat, companies remained scarcely and centres research departments, University next cyberneticians. the of producing of generation capable institutions founding itself, for basis” “social stable a find to achieved never has it that out points Pickering so. remains largely and science of philosophy and history the in anomaly an as appeared communication) and control of science (the Cybernetics alienwas to their transdisciplinary interests. that terrain institutional an navigated and theories, their showcase and test to tables kitchen their on machines constructed profit, and fun for theorised have — Beer Stafford Ashby, Ross Walter, Grey mainly — cyberneticians of circle His consequences. social ranging far have does inquiry scientific to approach another so technology, of development the and truths of establishment the alternative an is with concerned is the science about course, Of community. cybernetics the in flourishing practice writing scientific with is he problems What of above. outlined number culture a hacker of solve interpretation could conceptual experiences his these Moreover, from hackerspaces. the derived in framework on going is that tinkering the and culture first sight, but hope show I that the to experiences he writing is about resonate with closely hacker at relevant seem not may (2010) scene cybernetics British early the of history Pickering’s Andrew to science. modern approaches alternative about visions forth put all Heidegger and Latour Pickering, with. start to concepts useful yield which treatments monolithic their exactly is it Yet later. ethnography my in deconstructseektoI theories thaton dichotomy tend basetheir a this to section— in treat I who — authors Such nonmodernity. versus modernity of issue the thematise explicitly who others of observations the by supplemented when up taken best are questions their that argue I modern, called be can that attitudes to alternatives present already authors described previously the While Literature on alternatives to modernity 13

CEU eTD Collection Last but not least, they are based on an inspiration of technological possibilities and - and possibilities technological of inspiration an on based are they least, not but Last users. and audiences of response positive immediate the despite doubtful highly is success artistic or commercial, scientific, Their phenomena. emergent of exploration the on based experiences playful and aesthetic produce They academia. the from apart standing still but close milieu a in experimentation extracurricular on based are They chapters. next the in analysed and surveyed be to r0ket the of life the to closely correspond which factors of number a are there anecdotes, funny and strange in abound Pickering by recounted stories similar and these that from Apart more complicated teacher-and pupil simulators. even in later and (SAKI), Trainer Keyboard Adaptive Self the in for designs in success version commercial smaller a sell to tried they desperation their same with usingthe greater logic endedFinally, up Paskwith317).conjunction jukeboxes (2010, in and form, art pure a as work not did It success. commercial a become to managed never it However, shows. varieté of part as places of couple a in it install to managed and country the around businessmen to it present to tour a attempted they Next, performance. spectacle a in Church a of crypt the in it premiered and parts found from it assembled companions his and Plask it. with conversation synaesthetic of sort a conduct could player the piano a with Coupled never. Musicolor the itself, repeated the if even that so circuits, its inside electricity of internal up its building had the to it corresponding that dynamics meant which 316), (2010, bored” “get to designed Pickering was as it However, it, show. phrases light a into music transformed device this Oxford, at student medical a was he while Constructed point. in case a was Pask Gordon of machine Musicolor The so striking that more often its than not potentialities were allbut lostonbaffled a audience. was cybernetics of novelty The examples. two just are academia the and ventures business between line dividing the and disciplines between division the which of institutions, modern of reminiscent labour of division the into fit not did cybernetics that is conclusion The inquiry. 14

CEU eTD Collection these formulations introduce the end of a story, namely the demise of modernity. In order to taketo order In modernity. of demisethe namely story, a of end formulations the introduce these of each that conclusion: dreadful a of contours the draws — modernity liquid even or modernity, high modernity, late postmodernity, — contemporary the understand to developed concepts the of compilation simple A way. critical a in modernity of issue the thematising in significance great carry nevertheless writings his fetched, far me to seems ourselves of understanding our over ruled has modernism monolithic a that claim his While Latour. Bruno sciences, social the in divide modern-nonmodern the of theoretician foremost the of note take to worth is it point this At aon particular device that emerged the from hackerscene: the r0ket badge. developing their theories, such machines not be should find. hard to why Thisis choose I focus to of part as machines designing to prone are ontology cybernetic a of basis the on act who people Since graspable. and concrete more it making theatre”, “ontological an as ontology cybernetic the Moreover, ontologies. these exhibit that of objects performative at looking at grasped be best can ground contrast this him to according the on stand that practices the between difference key the is performance and representation between duality this that argues Pickering instead. the while performance correct a world, for aiming the knowledge, through of detour such loathes representation approach cybernetic correct a with up come to seeks the approach that modern is ontologies two the between difference crucial A models. refining by overcome be can understanding of limits the and knowable, fundamentally is world the therefore change, not do nature of laws the that premise the from starts which science, modern with contrast stark in is This adaptation. is it with deal to way best the so unpredictable, and unknowable fundamentally it makes which flux, constant in is world the ontology cybernetic the to According ontology. cybernetic of concept the with up came Pickering discrepancies, these for account to order In pursuit. human of areas the define that categories modern the to challenge a pose they sum, In domain. problem out sketched clearly a or project research defined well a than rather experiences scientific 15

CEU eTD Collection theoretical practical and limitations. their out feels and modernity of concepts critical foundational the veritable identifies of he work which in his philosophy in also and others, and Tarde Whitehead, of recuperation his help this In effort. fact despite some of his claimsthe contrary to Latour is doing also through this can theory a than rather practice a as hacking at look close a why is This practice. a nonmodern through transformed be to has which world in modern (“late”) shift a in a live We to stance. merely analytical corresponding undertaking theoretical purely a be cannot modernism of critique the precisely, very states Wilding as However, manner. productive a in assumptions modern undermines which — Schelling and brothers Schlegel the Schiller, like Romanticists German for spot special a perhaps with — Deleuze to Whitehead even and Bergson Hegel, of version a Spinoza, through Heraclitus from stretching thought philosophical of thread a for made be to case a is there Indeed, advocates. Latour modernism of critique the for tools the provide already Wilding) (for Schelling or Söderberg), (for Marx both), (for Hegel like theoreticians that argued have (2010) Wilding Adrian and Söderberg like Authors direction. research a such with aligned is Pickering, by out pointed practice other any than more hacking, that is hypothesis My have put itinhis review of Latour’s manifesto “We HaveNever Modern”: Been Pickering As ardently. so targets Latour that modernism mainstream the than richer is indeed which history, forth. our of so consideration self-critical and a through on possible only so is that and even However, knowledge, situated and science object, and subject culture, and nature machine, and man of dichotomies question to have We alternatives. search and modernity of concept the with critically engage to have we way looking forward a in results these of account Latour isLatour explaining too with much conception his of modernity.” (1993) served to continue and possibly accelerate it.In respect, this then,think I that hybridity of culture and practice far from —but inhibiting change, they have systemsand modelling haveexplicitly thematized the human/nonhuman “Especially since World II, sciences War like operations research, cybernetics, 16

CEU eTD Collection twentieth century Western thought, and therefore his guidance is of pivotal importance even if even importance pivotal of is guidance his therefore and thought, Western century twentieth in analysis ontic) (and ontological of master primary the is he Firstly, regards. three in inquiry this for useful still is he brevity, of sake the for here refute not will I which — science modern of epitome the as cybernetics saw he where interpretation one-sided a had Heidegger Although degrees of complexity. various of systems only are these cyberneticians Pickering’s For sense. makes plane ontological same the on nature and machine man, places which ontology cybernetic Pickering’s Here again. surface above the evoked figures fiction science becomes the where human, the and it artificial the of separation plain, another onto translated is social the and facts of separation the When in society. in people specialise other against facts the guard Scientists They nature. at looking through facts nature. establishing of domain the is science things of scheme larger the In stage. the take bodies) artificial with brains (human hand other the on cyborgs and vat) a in minds (idealised hand one the on cyborgs when is That overturned. is this hackers, for enjoyment also but fascination only not of source a becomes science when but operation this of perversity very fascination inthe hacker community in and cyberpunk the cultural movement ingeneral with the a indeed is There it. calls Latour as vat”, a in “mind the from affects its and body the disengaging itself, being human the penetrates dualism object and subject the Finally, argument. that to basis philosophical deeper a gives argument Latour’s However, development. lost and research over have power corporations the and capital that fact the in grasped be can hacking of significance political the that argument Söderberg’s of here reminded be may reader The purpose. similar a serves opinions subjective from facts imperative and inevitable, necessary, divides which object, and subject of separation The masses. the irrational unwashed, guards the from which elite enlightened operation rational, ideological an is modernity of staple a is which opinion public and truth scientific of separation the that convincingly rather argues He modernity. of critique treatise avant-garde his in interesting most is What 17 We Have Never Been Modern Been Never Have We is the political the is

CEU eTD Collection case technology becomes a means of concealing rather than an opportunity for revealing, and in and revealing, for opportunity an than rather concealing of means a becomes technology case this In Being. of truth the of emergence poetic the for stance necessary the is which obey”, not but “listen, to stop they enframing, of case manner the in In technology instrumentalise merely humans power. saving also but —, sense” highest the in danger “the exactly, — danger great a holds Heidegger for technology modern Thus, a truth. to plays relationship their (nature) in part surroundings significant their and beings human between interface an as Technology technology for the sakeof clarity consistency. and use to continue will I although paper, the of part remaining the throughout mind in this keep to techné of concept ancient the way a in Therefore, terms. aesthetic in work their of conceive hackers how and hacking of dimension aesthetic the emphasises Himanen and Söderberg both earlier, called Greeks the which truth, of pursuit the for essential to coupled closely was it Furthermore, arts”. fine the and mind the of arts the for also but craftsman the of skills and activities the for only not Greek Ancient from comes title essay His hackerfrom studies presented inthe first part ofchapter. this drawn ideas the with combined if hacking understanding for useful is that way a in technology of potential liberatory the to credit gives indeed analysis latter’s the that argue enframing I (1993:65-67), pure as technology sees Heidegger that argues he where critique Latour’s Despite point. this at clarified better are which argument, my in revealing and enframing of concepts dual the use also will I Pickering, and Latour both as Thirdly, hackers. of analysis the in relevant quite is technology on a take his see will for we as Secondly, disposition. socio-cultural metaphor of type certain a as only here, sense philosophical straightforward a in used not is ontology The Framework The corresponds much more closely to hacking than the English word technology. It is worth is It technology. word English the than hacking to closely more much corresponds The Question Concerning Technology Concerning Question The ) departs from the consideration of the etymology of technology, which technology, of etymology the of consideration the from departs ) techné . . Techné was used in a much more wider sense as “the name “the as sense wider more much a in used was poiesis 18 (previously published under the more inspiring more the under published (previously , the aesthetic skill of bringing forth that is that forth bringing of skill aesthetic the , aletheia — unveiling. As we have seen have we As unveiling. —

CEU eTD Collection The object body of that material will provide the background for the analysis. main the form chapters These r0ket. the of use made hackers how describes cases” “Use Finally, hardware. and software r0ket manufacture. explaining sections synchronic by followed are sections and diachronic These scene. hacker design the to and world r0ket the to launched of was r0ket the how process tells “Distribution” and circumstances the details “Production” culture. hacker in tinkering electronic on background some provides and rocket, a like looks r0ket the why question the answers section object” “The sections. following the across is spread presentation The device. r0ket the i.e. research, the of object the describe I chapter this In Descriptions ofthe case Heidegger for. calls that way a in technology concerning question the addresses utility, mere of instead —, (1986) in it puts Mentor The as — baud” the of “beauty the pursues that hackers of playfulness poetic The technology.” of essence the past on press We it. master to the will at gaping merely the of in transfixed remain we instrument, an instead as technology represent we as technology, long So technological. in unfolding essential the of sight catching “our of possibility the in lies technology modern of power saving The short: poiesis. blocks enframing In consequences. catastrophic with humans, on truth false own its impose will it turn Besides shiny being electronic a tag, name r0ket the is easy an to usefull Chaos28th Communication Congress. r0ketThe is badge the for the Chaos Communication Camp 2011and the r0ket featured microcontroller development board. 19 The Conscience of a Hacker a of Conscience The

CEU eTD Collection played a key role in kickstarting hackerspaces, as evidenced by the popularity of basic electronic basic of popularity the by evidenced as hackerspaces, kickstarting in role key a played they since point in case a are Microelectronics century. twenty-first the of decade first the during physical the towards back turned gradually hackers cyberspace, the called often worlds virtual thepossibilitiesofthe of explorationthe dominated by was 1990s the of era cyberpunk the While and imagery aspirations hacker of the community.the echo to badge r0ket the for shape fitting a is rocket the Therefore, laymen. of reach in science serious bring to aim Club the like organisations hacker the ideal this with line In problems. complex to solutions simple provides which effectiveness least at or elegance an at aim hackers contrast, In confusing. and complex too is something that mean to way derogative a in English in used is science” “rocket phrase the course Of governments. of efforts the censorship counter to Earth the around orbit in satellites 3 placing of consists phase major first The the in featuring number magic a being (23 years 23 in moon the to hacker a send to programmeis the of goal ultimate The badge. conference official the as premiered r0ket the where Camp, Communication Chaos 2011 the during launched was Programme Space Hacker The hackerspaces. the hackers: by run workshops community of generation next the naming in used been also has “space” word The years. recent the in organised occupied were that it Congresses Communication example Chaos the For during organisation. in the Alexanderplatz for logo second of sort a became that high meters 4 around statue shaped rocket a been has years recent in Club Computer Chaos the by organised events major the at scenes prominent the of One explication. further needs shape The naked This eye. significant is initself since itinvites exploration hacking. and the to architecture its all reveals it that so case no has it that fact the is products commercial from apart it sets clearly What middle. the in display small a and sides the along holes many as well as surface, the on visible components electrical mounted small numerous with board circuit printed sided double a is page) first the on (pictured device r0ket the gadget, electronic shaped rocket A Illuminatus! trilogy by Robert Anton Wilson and Robert Shea). Robert and Wilson Anton Robert by trilogy 20

CEU eTD Collection from representationfrom to practice. emphasis of shift subtle a process, overall an such in feature to seen be can r0ket the how about clues of set a present gradually I pages following the In body. the and architecture on founded one pragmatic more a to discipline any in tool interpretative general a as served aesthetics where turn linguistic the from away move a marked which shift paradigm gradual a of picture bigger the into fitted process whole the if see to be would research future for hypothesis tentative but interesting An changes. these of enacting the for site the became hackerspaces the Finally, results. while application, killer its became Arduino the and explored, be to area theoretical a provided computing it physical together, put To work. electronics and prototyping rapid into generation new whole a initiated and workshops ’ and hackerspaces of staple the became system microcontroller amateur-friendly This interface. software easy-to-use an with board microcontroller programmable a Arduino, Will”, Your to Technology Tweak - Makezine.com @ More & Mods Hacks, How-tos, Inspiration, Projects, (“DIY more.” much and reader, card stripe magnetic stabiliser, cam photography, aerial Kite inspiration. DIY and hacks, hardware projects, digital to devoted magazine first “The subculture. hacker the of celebrities some including authors of range wide a from commentary Magazine publish to started Media O’Reilly year next The appliances. intelligent the of through construction research exploratory for way the opened and body, whole their using situations everyday in behave people way the stressed interaction human-machine of framework new This Computers with World computing scene. Physical the Controlling in O’Sullivan and Igoe by out laid was computing Physical hackerspaces. young of programme the in workshops microcontroller programmable and classes Make Magazine Make hc oue n d-tyusl ehooy nldn uoil, rcps and recipes, tutorials, including technology, do-it-yourself on focuses which ) In) Europe, Massimo Banzi others and started work to on the invention of Make Magazine Make and similar media facilitated the spread of research of spread the facilitated media similar and 21 (2004), and had a great impact on the whole the on impact great a had and (2004), Physical Computing: Sensing and Sensing Computing: Physical Make

CEU eTD Collection hierarchy, which is the massive Camp and Congress events (see next section). (see events Congress and Camp massive the is which hierarchy, Club Computer Chaos the of level highest the to pushed be to had it that was conclusion The idea. the to responsive extremely is audience the and badge serious a manufacture and design to able are developers the that proven was it Therefore minutes. within sold it of copies 100 a and event that during copies ThisUr-r0ketdistributed soldered.was300 Germanhackers. allhand speakingwas caters toin It mainly that gathering hacker European smaller a conference, EasterHack the for together put was r0ket the of version sophisticated less but similar somewhat a prototypes few a After potential. inspireddevelop they weretoone with better how specifications, is bigger moreThat and display, usually inhackerspaces. goes on that tinkering electronic the supporting for suitable are that badges developing of possibility the foreshadow to enough advanced already were badges these However, conference. the after useful very them find not did people because badges these with satisfied not were they hand, other the On electronics. of field the to events such attend who programmers of number vast the introduce to way good a was It “hackable”. call they what — way open-ended an in interactive is which and name, a displays just than more does actually which badge a of idea the liked They HOPE. and DEFCON like Stated United the in gatherings hacker visited they when badge hacker of 100 a than more of help idea the the encountered members team Some needed. is manpower massive on more when participants rely to claim They members. dedicated dozen a around and members core dozen a half around comprises team r0ket The MuCCC. called — Germany Münich, in hackerspace a with affiliated less or more hackers of group a from emerged r0ket The Production 22

CEU eTD Collection through loosely planned, informal, physical meetings at the hackerspace, involving only a few a only involving hackerspace, the mainly at meetings happened physical informal, planned, development loosely through hardware and software of coordination the Sec with that interview room confirmed chat A correctly. work or not did feature use new to wanted a they needed that something they when fixes bug and enhancements small contributed many while others coding, firmware the of most did Schneider42) and (Sec42 persons two that — r0ket/r0ket”, of (“Graphs process development software the coordinate to used was and testing prototyping, development, which platform technical the — github.com of records the from clear is with It problems. of reporting process the joining others many and lead the taking person one with individuals, separate by handled was design software and hardware The contemporary capitalist society, because theyspend extra hours organising women. in ubiquitous is that oppression structural usual the to addition in women on stress more puts logic such problem, the tackling Debian for up set been have Chix) example Linux and Women (for initiatives self-organised women-only, while Nevertheless, experience. own my from evidence anecdotal the with coincides which years, recent during better the for changing noticeably but slowly been have movement hacker the in attitudes sexist the that notes Braybrooke side, bright the On 2011). (June field the in women more be to needs there field, theintowomen get more to order in Catch22 problem: a is scene the in women representation of low the it, phrased has — engineering in women young many for model role a reportedly is who is — Fried Limorhardwarehackers, Yourself It Do famous most the of one As low. pretty evidently ratio This hacking. hardware with concerned more is which — 2011) (Braybrooke Camp Communication Chaos the of balance gender the and — group security and software a more is which — 2011) Noor & (Blanc Club Computer Chaos the of membership the reflected balance gender 10% roughly The administrators. system as often them companies, for of IT in some working already students, science computer male mostly are r0ket of architects principal The 23 Github.com )

CEU eTD Collection from the Chinese market. A small factory in Münich stopped its entire normal operations for a for operations normal entire its stopped Münich in factory small A market. Chinese the from available cheaply and widely are this of clones Compatible 1110. Nokia the part, replacement local from phone acquired mobile available widely very a be to chosen was r0ket were the for display The bulk. in vendors transistors and resistors like parts simple and common most The board) circuit (printed manufacturer remains throughout the history of the r0ket. PCB the hand, marketing other a the on gets documentation, manufacturer the through CPU advantage the below, described As brand. sponsoring the with associated becomes product end the and exposure media extensive often more or gets rights exclusive sponsor the world commercial the in sponsorship called is what of In case the attached. in strings particular any without free for services and products get they that about means talking basically are they sponsorship of kind the sponsorship, word the use they though Even repeatedly members place. first the in feasible it made which project the of part big a was sponsorship that emphasised team r0ket industry. technology the from prices good attract and to sponsorship leveraged be could this end, receiving the On project. the of adoption official and funding seed provided CCC The organisation. the in position strong a hold therefore and events hacker big the of organisation the to instrumental are group Münich the of individuals several Furthermore, branch. local its of site and CCC not the of part was formally is This MuCCC since Club. difficult Computer Chaos the organisation, hacker nation-wide prestigious the and knowledge of help the had enrolled they Therefore own. hackers their of capital economic the limited very but that connections was project the of side this on factor important most The components. software and hardware the as of development and were design the as capital tasks formidable seed the and process production the parts, the of acquisition the Organising parts customly and ordered pieces the premises on of the MuCCC. common from together put were Prototypes encounters. physical the to role support a played which coordination virtual for list mailing development closed a also was there However, people. 24

CEU eTD Collection to solder and his teachings are the basis of the ubiquitous “Soldering is Easy” by Andie Nordgren Andie by Easy” is “Soldering ubiquitous the of basis the are teachings his and solder to how people numerous teaching with credited is He Altman. Mitch movement: hackerspaces the € below price the keep still to order In hand. by parts r0ket many assembling of tired quite were batch first the on worked who volunteers the that was developers r0ket the by faced challenge second The however. r0kets, of round second the for available not was facility printing free The r0kets. mission The obviously stretched capabilities the of the hackers. in covered not was which surface vertical or horizontal a find to hard was it that extent the to boards, r0ket overloaded with was space the also but people the only Not time”. during that hand my in devices r0ket most held probably “I that stated proudly member One procedure. the finish to deadline the before soldering days and nights spend to had members core and enough not was people 100 a around of participation the even — r0kets solder to only cities other from Münich to travelling were individuals that mentioned person one — call their attended people many so that amazed were they Although channels. Chat Relay Internet and lists mailing the through MuCCC the around community the from volunteers on called They project. their discuss they when often cite and vividly remember people r0ket that operation major a was This factory. the of out came it after r0ket the on soldered be to needed parts other some and connector USB The they are happy with the deal. thatseems it well, as r0ketgeneration second the for CPUs the gave they it. Since program to like and know who people of base user a creates and capabilities its showcases which product” “killer a need they and market the on processor this out put just have they that is team r0ket the from this for explanation The free. for everything gave which Semiconductors NXP from is CPU The MuCCC. at hands” helping of “thousands by corrected be to had which design the in made were mistakes operation factory the documenting the of one to According cost. production the of price the only charged and r0ket generation first the of boards circuit the print to order in day 30 and to meet these two challenges, they asked help from one of the most prominent figures ofprominentmost figures the of one from help asked they challenges, two these meet to and 30 25

CEU eTD Collection single page, and also repostingitismedia.alsothembetweenanddifferentsocial othershort, page, single and In soups a on updates twitter and videos images, texts, gathering for mechanism easy an providing profile, thanmore a but than blog, company (euphoriaSoup a spin-offGmbH). less is a operated by now and Vienna in hackerspace the in developed been has that clone tumblr a is soup The advertised thethings cool that people were doing with device. the later and audience, the of expectations the up kept developers which through surface promotion prime the was which soup.io on account r0ket the on posts first the saw day same The history). page index to (according page front the of editing first the saw day next the and 2010), DENIC, before minutes few from info Whois to (according A site wiki new a to redirected was r0ket.de 13th June debuted. on midnight badges generation first the where Camp Communication Chaos the before month a roughly infrastructure coordination public its prepare to started team r0ket the that shows interrogation technical infrastructure, communications virtual of terms In test the of results the including what percentage of r0kets are expected to malfunction under what conditions. showing sheet a with them provided and temperatures low and high extremely against design their tested even manufacturer the that amazed were they fact In 2011). Zehl, ‘Sec’ Stefan & (lilafisch expectations their beyond were them give could Etonnet samples other check and the of quality the and prices the (3) workers, for wages search fare and conditions working good have to to left time much have seemed Etonnet market, labour Chinese the of perception the not with contrast in (2) manufacturers, also did they Mitch trusted they although (1) project: their for Etonnet contract to decision the for reasons three cited members team r0ket PCB. the on parts most assembling and parts most purchasing r0ket, the print to Etonnet manufacturer Chinese the commission to team r0ket the suggested Mitch Francisco. San in the hackerspaces, biggest the of one of founder the also is He 2010). (Nordgren 26

CEU eTD Collection element. The main action during the camp takes place in self-organised “villages” of tents, while tents, technical/academic of “villages” self-organised in stronger place takes camp the during a action main The element. has and business-like more bit a is Congress the while scene, the in newcomers involving while Camp environment community the friendly say, a creating to on is concentrates That profit. for Congress the and fun for more is Camp the that argue to possiblepopular itis hackerslogan distributiona and isfun profit”“Hacking and methods.for different the to relevance bear does distinction the because also events, two the contrasting worth is it Congress Communication Chaos the at distributed were r0kets generation second the Since the to forest get to the campsite. through walked simply hackers some so relaxed, was camp the of security Club. the that, Computer said Haying the of savings the from money extra some to addition in badges, r0ket the of cost the cover to went that 15 included prices camp 2011 The reason. good a for free for in get to wanted somebody if team” “friends the to write to possibility a was there and 850 business the 140, tickets cost ticket standard the available: tickets different of variety a were There lived. people where hackers tents the from away meters few some a down touched and aeroplane an Thus on arrived museum. aeroplane air open an and grounds landing including airport, Finowfurt the of grounds the on place takes it years recent In year. each hackers 5000 around attracts gathering This agenda. hacker European the in camps major two the of 10-14), (August Camp Communication Chaos 2011 the of badge conference official the was one first The ways. different in distributed been have device r0ket the of generations two the above, hinted was As Distribution after the others, June 18th. channel) days few a (registered (IRC github.com on is r0ket the of firmware The servers. MuCCC the on hosted room chat and list mailing own its has also r0ket platform. blogging micro a € 27 € €

CEU eTD Collection production and sell the r0kets for the price of production at the Congress from a stall. The stall. of all buy would Congress a the at hackers whether about doubtful was Club the that was difficulty from Congress the at production of price the for r0kets the sell and production the pre-finance to Club the wanted They idea. to the started about team Club Computer r0ket the The with negotiate solution. prototyping a also is it earlier, mentioned as — badge conference a than more is r0ket the However, Congress. the of badge official the be not could r0ket the 3.), Fig. (see conference the for unique always is badge conference a because Exactly r0ket: problem”) “no to make similar a one. team to (according easy relatively is it product, source open an is r0ket the since later, detail more in describe will I as course, Of there.participated having of sign good a is one owning that means which premiered, they where event single the of outside available not still are and not were r0kets generation first the that is fact notable last The sections. subsequent in described be will r0ket the of capabilities hardware and software default The r0ket. the keep and hack, use, to welcome were they that all doing After well. as signal the with along pseudonym configured or the sending anonymously, it using radio, the off turning of choice the includes latter The themselves. amongst create r0kets the that network mesh wireless the for setting privacy the and — badge conference a of purpose primary the is this all after — display the on show to badge the want they that name the set to instructed were they that done Once body. r0ket the to display the and battery the stick and connect to had users Basically, 2.). Fig. & 1. Fig. (see instructions assembly as well as components various included case The band. wrist the the with and cases brochure plastic Camp printed small in entrance the at r0ket a got simply ticket valid a with Visitors toseeks make profit a from income on the the Congress. Club the while way, nonprofit a in organised is Camp the differences these with line In activities. owntheir organise can they and rooms and chair and tables occupy can groups where centre hack a has Congress the while hangars, giant 3 across spread programme conference full a includes also Camp the said being That presentations. and talks lectures, the on is focus the Congress the at 28

CEU eTD Collection company produced for the device. April As 27th, of 2012,the itemstill is sale. on the that manual user German page 20 the with happy were they but board, development a being r0ket of point the missed it and good very not was description the project the of channel chat the on commenting speakers German to According rOket”). (“Modul 39,95 for Pollin at sale on are r0kets that announced team r0ket the 2012, 18th, April On sections. subsequent in detailed r0ket, the about lectures and games hacks, various by saturated was conference the of rest The it. a on milled by emblems hacker-related comprised with light, the r0ket, reflecting plastic the of piece on a and led snapped flashing be can These 5 for r0ket the with extensions Flame selling also were They everybody). serve to hour an about took it (well, instantly out sold stocks and it of front in line big a instantly was there opened stall the once because pressure enormous under was team r0ket the again Once penny. a to almost price production the matched team r0ket the to according which 30 for set was price The conference. the of day first the during also and space, the inhabit and tickets their up pick to come people when day zeroeth the during sold were r0kets The visitors. 4000 around drawing Alexanderplatz, at Centre Congress Berlin the venue, usual the at (2011) December of 30th the to 27th from happened conference The r0kets wouldbe the sold and Club wouldget back money its that itinvested. the all that ensured scheme This any. was there case in sale Congress the from devices over left the buy would Pollin that was safeguard The Congress. the after Pollin to straight going others 300 the Congress, the at sold be would 700 and capital!), (seed r0kets the thousand a of production pre-finance would Club The enthusiasts. technology for Internet the on parts electronic sells which store online an Pollin, of help the with compromise a reached parties The r0kets. the € € 29 €

CEU eTD Collection playgrounds for this. For instance the high scores of the Space Invader game included with the with included game Invader Space the of scores high the instance good For this. were for playgrounds distributed were r0kets where gatherings The areas. large cover can that network mesh so-called a create they together, flock r0kets of lot a When themselves. between signals send to able are and other each of signal the up pick they — meters 10 around be can distance the H.A..K., in conducted tests to according — other each to close are r0kets When radio. small a basically is which board, the on receiver-transmitter frequency radio the is input interesting most The device. input an as used be can this sensors, all Like it. see to easier is it so environments brighter in negative to display the switches that sensor light a also is There device. the of menus configuration the navigate to used is This display. the below click) and up down, up, right, (left, joystick 5-way a is device input main The r0ket. the with communicate to ways various are There though the r0ket shipped is with the same monochrome LCD. firmwaresecondgenerationeven defaulttheThe for r0ketsbox outof supportsdisplay colour the display. colour a is which 1600, Nokia the as same the is connector The resolution. 96×68 with LCD monochrome green a is It documentation. good and availability easy its by factors, other amongst motivated, was choice the Thus phones. businesses. many mobile by manufactured old clones Compatible many in used is that 1200 Nokia ubiquitous the is display The market. the on available easily are r0ket the of parts hardware The computer. small a less or more is r0ket the above stated As this. of evidence conclusive no found I although licence, BSD source open an under licenced is it channel, chat the on query my to answers to according (3) Additionally, 2011). contributors, wiki (r0ket website r0ket the the of on documented specifications are the themselves components (2) and components, the connect to how shows that (PCB) board circuit printed the of schematics the that (1) things: three means latter the practice In source. open also is design hardware the r0ket, the on runs that firmware) (and software the like Just Hardware 30

CEU eTD Collection result an is assemblage through whichthe r0ket becomes integral part an of another device. The connectors. these through r0ket the with coupled be can washing routers or Even helicopters machines, anything. virtually connect can others section cases” “Use the in described as but output, for lights LED and input for etc.) distance, humidity, (touch, sensors simple connect users Most pass. can electricity which through wires or pins accept which holes small basically are These r0ket. the to up hooked appliances other control to or outside, the from device the to control used be can that connectors that is however, board, development a r0ket the makes What theand r0ket aspires to fill this gap inthe market. with, experiment can engineers which with board prototyping a have to important strategically is it reason this For market. the on spread to wants manufacturer the that product new a is CPU this above mentioned As technology. this using laptops a made recently have others and Asus ARM The manufacturer computer The devices. embedded Cortex-M3. with moment the at popular the very is architecture microcontroller, ARM bit 32 a by done are computations The time. real in r0ket the with communicating for used be also can This device. the flashing or capacity), megabyte half around (which storage dataflash the to uploading and battery the charging for used connector (2.0) USB micro a is there Finally, openbeacon.org). (see OpenBeacon called standard community-developed a on based is protocol communication The primitive. more much is it but (2.4Ghz), frequency same the on operates it example for — phones mobile and laptops in used is that family) (802.11 WiFi real well-known the to by similar is processed technology The needed. and if computers afar from receivers RF commercial by up picked be can signals r0ket the Moreover, Camp. the during airport whole the across synchronised were below) (see r0ket 31

CEU eTD Collection r0ket suitable for a greater number of projects, and the fact that the price is almost the same is same the almost is price the that fact the and projects, of number greater a for suitable r0ket makes capacity processing greater the course Budapest Of mrtee). the and dnet in with specialists (interview hackerspace hardware by r0ket of over advantage chief its as mentioned was This Arduino. the in AVR Atmel the than (CPU) Unit Processing Central faster much a boasts and meantime Congress. the in the made were after that technology time in advances some the leverages for r0ket the it Secondly, on work to not happy were they project the into put have they energy the all after fact In it. pursue to ambitions no have they but viable be could it think they that said interview the in members team the and r0ket, the of out Arduino the of lines its on commercialise thealong to product a makingof possibility the about them asked interview I my in Indeed, success. plans no had team r0ket the and product a as conceptualised never was r0ket the contrast, In indeed. well very out worked which design, the from profit generating on built plan business comprehensive a had that company up start a of context the in designed was Arduino the Firstly, r0ket. the and Arduino the between differences principal three are There makes workshops many teaching prototyping rapid with the device. Massimo and Arduino, the utilising often projects industrial and installations art makes company The company. Massimo’s Projects, Smart by manufactured and 2005 in designed was It living. contribution to the community from whichhe so gained much knowledge fun, eventually and his a as everybody for available design the making of thought he that said Massimo r0ket. the of case the in like just open source and free is softwarethe design and hardware the — stated above as — since legal perfectly is This companies. by sold and cloned or enthusiasts by manufactured others countless with use, in them of 300.000 than more are there that thought is in it and hackerspaces, popular very are Arduinos 2008. in Italy inventor Milan, in interviewed space workshop and his projects, in Banzi some Massimo on Arduino the with worked author This board. developmentmicrocontrollersource open completely another — Arduino the scene: hackerspaces the in competitor main its with r0ket the contrast and detour small a take to worth is it Here 32

CEU eTD Collection test the if r0ket working is properly. and resources system reach to how show applications, sophisticated more develop to newcomers for basis the as serves which tradition development Arduino the from known program trivial a is This display. the above led red the blinks simply BLINK possibilities. its and r0ket the about enthusiastic hackers make to designed were they because culture hackers of most sources the important gather they that claim I r0ket. the called on pre-loaded board these of on seven are included There l0dables. programmes the with comes functionality interesting more The USB storage used mode, for data transfer. into device the turns simply (5) . background and font its and badge the on shown nickname the sets “Nick” (4) network. mesh the from come that “messages” The (3) programs. launchingfor “execute” menu An configuration (2) menu. The (1) options. 5 contains menu The next under section “Use cases”. the in mentioned be will modifications later the of some while described, are firmware default the of features the section this In cable. USB the through software the modifying for framework a provides and functionality, more reaching for joystick the of click the on menu a with user the presents display, the on nickname configured the displays that firmware a with comes r0ket The Software people unwilling to —for learn making interactive artworks. for scene hackerspace the in term derogatory a often — “artists” at targeted generally is it and services and documentation supporting more with comes Arduino the UNO Third, (“Arduino Edition”). 27,95 SMB for UNO Arduino standard the sells 39,5 for r0ket sells now which above, mentioned Electronics Pollin supplier the instance For regard. this in important quite € € 33

CEU eTD Collection (Matthias Wenzel). mazzoo by signed PWGEN from passwords the all of list the with file a of soup r0ket the on post a in included was link the but 2011), 14th, August Pastebin, on (guest Pastebin on anonymously made was announcement The 6095689385410816. expected the of instead passwords unique 65536 generates only algorithm Its flowed! intentionally is generator password this that Camp Communication Chaos the during program the of author the by revealed been has guess. it However, to them behind logic no be would there so possible as random as passwords generates supposedly PWGEN included). not is — (!) space — 95th (the table encoding ASCII primitive mostthe charactersprintable of 94 the from passwords long character 8 generatesIt distributions. Linux most on available utility pwgen the mimicking generator, password simple a is PWGEN the community. in in-jokes infinite of source the and hackers many of fixation mathematics, the is of which recursion areas especially obscure more to hackers of connection the highlights also choice this However, processor. Cortex-M3 r0ket’s the of speed superior the showcases it because it include to worth is it thought he and r0ket the for written be to program serious first the was it that said application this of author The joystick. the using out an in zoom or span can user the and screen the on set Mandelbrot a of image the displays which viewer, Mandelbrot a is MANDEL Thehall. joystick 5-way on the r0ket ideal is for playing this game. arcade an in games classic such playing teenagers at looking while cyberspace word the of thought Gibson, William hackers, with popular genre sci-fi the of inventor the example for — pastime hacker typical a is Gaming game-play. the knows already probably reader the that known well so is It invented. ever game player single iconic most the of implementation an is INVADERS 34

CEU eTD Collection of the manifesto.of the the Chaos Communication Congress. Thisis what security “no intrusted boot” means inthe title for prepared firmware generation second the in did indeed they which limitation, the remove to team r0ket the encouraged and problem this to attention called author the r0ket the on firmware default the of code source the into hole security a slipping By code. new the sign to power the has who party the of will” “good the on depends and delayed is fix the Therefore, code. perfected runcan their acquiresignaturebeforethe devicea manufacturerofto they gothroughthe have to but themselves problem the fix cannot they it, in (bugs) problems find readers its and available is code source the if even that is — manifesto the in mazzoo by recounted — it against argument One predictable. more be to supposed is which environment well-defined a in executed is code therefore and programming the that sure make device to is DRM security for argument The hackers. most by opposed the of functionality the modifying from people disable to systems into anti-hacker the to similar built is very DRM Management. Rights Digital or is DRM called corporations big by measure used technology security this However, measure. security a be to thought and use its on limitation a was which team, r0ket the by signed executables run only could firmware default the with r0kets generation first that decision the protest to was reason team particular The itself. r0ket them r0ket one the of the efforts development the here compromised playfully but member cell, splinter a least at or group, own one’s than rather enemy an targets usually release the course, Of skills. own their about boast and story, the of moral the attack, the of purpose the explain hackers the which in foreword of kind a have usually Releases poster. the by compromised was that server a from data stolen of batch a is release A “releases”. for Anonymous like groups hacker various by used also is it other, each with code source and text of snippets share to users helping business legitimate is Pastebin Although hackers. to peculiar is publication of way The suggests. — ;)” hackers 3000 hacked I how - or - boot trusted in security “there’s no — manifesto pasted the of title the as story, this in in-jokes and twists many are There 35

CEU eTD Collection problem since people usually only need to know the name and email address of each other. each forge) (or spoof of to how know hackers novice Even complicated. more is it hackers with However, address email and name the know to need only usually people since problem a really not is this groups subcultural other In cards. business real have hackers many not expect, would reader the As format. vcard standard the using parties two between cards business virtual electronic exchanging for used are SENDCARD, and RECVCARD applications, two last The your friend good or idol. meet to chance any miss to not them, around persons the of nicknames the know to hackers for knowthat you online do not but recognise their based on face.Thisis itis why especially “useful” somebody from away meters few a only are you that gathering hacker a during happen easily can it — group other any in than more even — since community, hacker the specificsof the on plays still functionality simple Such devices. r0ket nearby by broadcasted are that nicknames the out printsmerely it except that presented functionality above, “messages” the to similaris ROCKETS ()now security research. andmathematics, and games was there application: these by outlines subculture hacker of sources the to aspect another adds and other, each with even anybody, with play to like hackers seek and hide the of example an only was hack this Ultimately, serious. anything for used be would mostly is this course Of manifesto. theoretical because as mazzoo also points out thereis littlechancethat these 8character passwords the of title the in means hackers” 3000 hacked I “how what is This passwords. these use that network the on machines for look to easier exponentially is concreteThe vulnerability by created this bugthat is given the list of the possible few passwords it computations. correct the does it that sure make to verified not have you that code source any trust cannot you that is view of point this from story the of moral The did. author its before it publish not did they bug the found anybody if least at or it, running before application sensitive security little this of code source the reviewed users the of none that fact the to attention call and r0ket the of audience the target to was hand, other the on release, the for reason general The 36

CEU eTD Collection ait f ojcs fo aiu aeil. Mroe, ipeetn h aet ted in trend latest the implementing Moreover, materials. various from objects of variety wide a make to way versatile a provides it since production, factory on monopoly the questioning and governments of monopoly the by that beyond goes printers 3D of development The development. and research on corporations question any hackers in finds argues, surely visitor Söderberg the things As few the hackerspace. of one are — obsession new relatively a — printers 3D specimen. one shows 5. Figure computer. a by them to fed model digital a following plastic from layer by layer objects print can which printers 3D used hackers Other at Finowfurt. stationed aircrafts old the for prepared also were scarfs Knitted 4. Figure in as back cases, r0ket own laid their knit the could people and where held setting Chaos were workshops outdoor the knitting Semi-regular the during environment. of project because popular also very perhaps a Camp, been has Communication r0ket the for cases custom Making This section highlights a selection hacks undertaken of with the help of the r0ket. casesUse drive. pen a from if as computer her or his to cards business gathered the download simply can owner r0ket the day, of end the At cards. business electronic exchange to r0ket the of functionality the by provided is such One means. other though but network, a and computer a through done be the requires not should ideally which person, in This numbers) hexadecimal fingerprints(16 electronic of exchange emails. their encrypt and sign to technology Privacy Good rather Pretty the popular use they Therefore conversation. the on in listening and messages their capturing enemies other their or corporation the authorities, the about paranoid more are hackers work their to due Moreover, other. each trusted actually network the on people few the when times in designed was that protocols oldest the of one is email that fact the exploiting addresses email 37

CEU eTD Collection similarly surprising idea during the Camp was to measure the electric currents in human bodies. human in currents electric the measure to was Camp the during idea surprising similarly A Wiki). Public 28C3 Workshops”, Counter (“Geiger Congress the at repeated were workshops the and successful very was idea The memory. USB the on data the storing while display, the on it on track keeping and counter the from time real data raw this receiving for ideal was r0ket The this. beyond radiation the count actually doesn’t it but count, every for flashes and beeps making is kit the in counter The sells. he kit the assemble to how people teaches he where workshop his in it include to enough r0ket the appreciated He material. radioactive some and Kit, Counter Geiger source open ready almost an with Camp Communication Chaos the to came Keyzer Jeff signals RF the through separately described inthe hardware section. r0kets on-board two the with communicating control, remote a as used was one third a while wheels, of pairs two the steering and powering chassis, the on sat r0kets two — car control remote a build to r0kets 3 used and further concept same the physically, together coupled be to prototype.r0kethackersa thecalledislogically.why versionSomeis tookand electronically That have which of all problem, each solve to parts different on rely which models then construct and assemble to easier much is it quadrocopter, best the not is way a such in built quadrocopter a while prototypingtool: rapid a as r0ket the of versatility the highlights This these. of some control to used was badge The rotors. four with body shaped X an using by them replicate to way easy an found hackers but technology,grade military tech high are drones these seems it first At ones. own their wanted they that decided hackers countries, other and Afghanistan on stories media of topic usual a became vehemently they After most Army. US the drones, by utilised military of rise the by inspired were the designs is These years quadrocopter. few last the in only popular become that project hackerspace common Another surface decoration also the but shapethe object. of the just not and will, at customised be can item each printer 3D a with ships, it before shoe their contemporarycapitalismgraphicsdesignoffer theNike’seach customercan epitomisedby of that 38

CEU eTD Collection gave by the contestant. However, r0ket was also present on the content side of the competition. the of side content the on present also was r0ket However, contestant. the by gave picture. the During Hacker the Jeopardy audience members vote could they if accepted or declinesthe answer to in comes r0ket the where is This it. on decide to has somebody answer, same the have really questions two the if debate for up be can it Since one. first the as answer same the has which question another saying by host the of questions the answer to have participants competing two where Jeopardy, show television popular the of clone the is It though). speakers traditionallybeconferenceof(unfortunatelyforthe animatingonlyGermanto part most said is which Jeopardy, Hacker the organise to was team r0ket the of achievement major second The the on the wall, or simply usingthe r0ket’s built-in display. draw to beam laser a and controller remote a as r0ket the using — computers against and pairs teams, in other each against pong playing were Centre Congress Berliner the of basement the audience in People born. were game same the ofdifferentversions the Many ball. the of each touch at cheering sent it case, any In experiment 1991. an in Carpenter of Loren pioneer reconstruction cybernetics a by organised probably was this but mentioned, not screen. was projected the it on Although pads opposing the controlling jointly participants hundred a than more involving game pong mass a with ended r0ket the about lecture scheduled The business. show in excel also but engineers expert only not are they that prove to time found also they but r0kets, programming and tweaking time much spent team r0ket The functionality. wireless the aroundrevolving mostly hacks, r0ket novel many providedCongress Communication Chaos The in the body. electricity the measure will scope the holes right the on fingers their puts user the if Thus screen). the of right and left the to holes little (the hackerbus the on field electric the measures which screen the on meter) (electricity oscilloscope an displays it that: exactly does l0dable SCOPE The 39

CEU eTD Collection have a long ancestry going back to 1976. They are associated with legendary hackers (co- Joy Bill hackers legendary with associated are They 1976. to back going ancestry long a have editors Both instance. interesting an is latter The . and editors code source popular two the between wars” “editor the and lolcats encryption, 42, and 23 number of significance the like lore hacker thematising Questions score. match their with screen the on displayed are matches Partial blinking. starts r0ket the of side left lower the on r0kets) generation first the on green actually is (which led red the found match a of event the In vicinity. the in r0kets other all to format compressed a in answers the broadcasting then and user the about questions geeky few a and Weyand Tobias asking on based is It Congress (2011). r0ket the for application dating a okr0ket, presented Buck Christian Communication Chaos the of Talks Lightning the During andcopies played the game for fun. much more assembled they where participants 20 for workshop a make to able already was Fitzsimons Congress the At team. r0ket the and above) (mentioned Altman Mitch including participants originalvariousfromoperating pointersthesystem.Camp advicesprocess and The by helped was in behaviours unsuitable some correct to produced was firmware r0ket custom A received. and sent hits of number the counting and microphone, the receiver, and sender infrared the control to used was r0ket The meters. 50 almost of range a showed tests and Camp Chaos the during an with gun laser produced workshop a a and prototypes four such or three been has build There beeper. and sensor to integrated was mission The hit. is he when beeps that sensor a has participanteach and guns, infrared but balls paint with other each at shooting not are people that from apart Ball Paint to similar game a is Tag Laser 2012). (robert Dublin Electronics, Fusion Part from Fitzsimons Robert by lead 2011a), (robfitz Congress the during finished and 2011b) (robfitz scratch from almost Camp the during started was project toy sophisticated more Another ofamount points they get for the right answer. r0ket was oneof thesecategories. the to corresponds which question, the of level difficulty the choose also can they and topics 5 of range a from answer to want they question of kind what choose can players round, each During 40

CEU eTD Collection Analysis Faire” Carnival, (Maker 2012). China during the Maker Carnival, “China’s First Creation Global Mass Open-source and Sharing r0ket Beijing, in held the are workshops r0ket with year new the controlled In 2012). r0kets”, device with Rockets (“Launching electronic purpose-made a of help the with cracker fire a — r0ketthe with rocket launching a by year new the celebrated team r0ket the note, lighter a On were traces the all Later published for people to around play with 2012). (Sec, references). in Tracking” R0ket 28C3 — tr4cker “r0ket (see after and event the during only shape took visualisation the for framework software the but conference the to brought was hardware the Characteristically, zero. to setting privacy RF their setting by experimentin the take part theusers to of havechosen trackmovementr0ket possible who was to it receivers the between triangulation a Using time. the real in r0kets read the by broadcasted and nicknames area conference the around receivers powerful placed team r0ket The tracking exercise. mass a was Congress the during r0ket the involving scale largest of experiment The loversgeek to be to able agree on their editor choice. of for important is it why explains this Perhaps resolved. be not could vi and emacs between rivalry the again once so 1974), in fame Labs Bell of McMahon E. Lee by (developed top on out came sed editor” “line the Ironically, 2011). klobs, & (Kellermann editor favourite their with tasks editing text solving in other each contested teams where Contest” Pissing Nerds’ — “NPC called workshop a included even Congress Communication Chaos The other. each of arch-enemies ideal are they other each to opposition diametrical in is is philosophy design their Since licence). founder Microsystems) of SUN Richard and Stallman M. (inventor free of software with the GPL 41

CEU eTD Collection h 0e otae cd r hrwr ein r ohr ol ae te cs o en an being for case the make could others or design, hardware or code and software r0ket documentations the various in of architect” “chief called elsewhere be could who individuals appear are there Although spaces. signatures communication similar and device, the of website the wiki, r0ket the of page cover the on r0ket” “team the by signed officially is r0ket The ornew different liberalism. a called is scarcely can result the it liberalism, of value However, core a is individualism practices. since that noteworthy collectivist through liberalism of reconfiguration a but liberalism expressivity collective call would I what of example an as out stands r0ket of authorship the background this Against author. authentic an as genius the of concept Romantic the in rooted is this 1992), as early (as of notes Taylor instruments As statistics. employment postgraduate the and factors impact frequencies, through publication achievements individual these from aggregated and assembled is own universities of reputation their the like submit results Collective employers. to potential to have Vitae Curriculum they and articles their sign the to and have capitalism scholars of — order Ethics Protestant monastic the versus culture hacker of model the as establishes knowledge of sphere the in which Himanen — academia the In nature. its by fieldcollaborativehighly a which is production even side, production the on reinforced is individualism same the affair, individualistic highly a is goods consumer of consumption the While goods. consumer of use the through mainly this expresses and living of way own their finds person each which in individualism Expressive ideological effects. their abstract then and details ethnographic concrete the with start will analysis the general, in hackers of motivations or attitude the about talking than rather considerations, other the with As Liberalism . It is plain to see from this term that I am not trying to argue a mere anti- mere a argue to trying not am I that term this from see to plain is It . as defined by Charles Taylor (2007, 473) is an ideal of liberal freedom liberal of ideal an is 473) (2007, Taylor Charles by defined as 42

CEU eTD Collection such an authorship is that it enables enrolling many people, since the light-weight r0ket team r0ket light-weight the since people, many enrolling enables it that is authorship an such choosing of advantage tactical The device. r0ket the creation: their at back attention and the directs logic this eludes product the after named is r0ket, team or team, r0ket the that fact The membership. stable less or more a have which and year, to year from scene the inside other each Again, against compete which collectives by signed oeuvre. are which example good a are an form which work authored of effect cumulative the through time of span greater a over reputation a builds which collective term long a being common most the forms, of number a take can authors Collective either. concept unified a not is authorship Collective mostamongst artists, for example. authorship of perception the from greatly differs which — factor import or relevant as perceived been not has presenter the of person The steps. necessary the take to bothered nobody place, took event the after documentation the change to possibility a is there though even However, presentation. the make to skills and knowledge adequate had individuals many since disruption major no caused This team. r0ket the from guy a by substituted was she and there be not could lilafisch However, Zehl. ‘Sec’ Stefan and lilafisch by conducted be to registered officially was Congress Communication Chaos the at credited device the of presentation the are that is project r0ket the articles although Wikipedia, of in dynamics authorial this of example concrete small One course. of Wikipedia” of “Contributors Wales Jimmy like dictator” “benevolent for that matter —whichiseven technical not a project per se —havea “face”, sometimes called a Wikipedia or programming, Python the or kernel Linux the like projects collaborative large Even authors. individual also and names group to tied are animations virtuoso where demoscene, the by maintained brands rootcorporations. ingrainedhabitsevenagainstofthe hackercultures the Moreover,like some itis to hardware closely tied from usually different are products very where and practices development development, software mainstream in unusual is This done. work the of parts over claims such make individuals no on, so and manager” “acquisition 43

CEU eTD Collection the Münich chapter of the Chaos Computer Club. As noted, such “sponsorship” often comes often “sponsorship” such noted, As Club. Computer Chaos the of chapter Münich the of space official the is it because MuCCC called also is MuCCC place. took process assembly and development the of much which in milieu social and location physical the is which hackerspace, address the under website r0ket MuCCC the of “crew” the to the belongs r0ket team of most Moreover, “r0ket.badge.events.ccc.de”. hosts visibly it and 2011, in Camp Communication marketingand of the r0ket, indeed and the r0ket the was “official conferencebadge” of the Chaos distribution production, the in instrumental was Club Computer Chaos the earlier, described As justClub, asattend theycan CCC most eventswithout being a member. CCC the in membership formal without team r0ket the in active be can hackers Nonetheless, CCC. the of group working a less or more is team r0ket the that implying are members team r0ket that seems it together, — itself device the the on signage — the and documentation things the in two attribution these Putting CCC. the with link the of important the emphasises setup This address. longer the on focus to decided team r0ket the yet memorise, and type to easier is that address shorter a is it because r0ket.badge.events.ccc.de than r0ket.de advertise to easier a is r0ket.de address registered on the Internet, itredirects to r0ket.badge.events.ccc.de.there It obviously is while that significant is it Furthermore, place. same the at letters with written also is wiki r0ket the of address The wiki. r0ket the to pointing barcode) dimensional (two code QR a and logo CCC the with CCC”, by “Designed is r0ket that stated is it There itself. PCB r0ket the of body the on signage the with inconsistent is documentation the in attribution the However, resistant practices against the prevailing cult of the genius —fan fiction being oneexample. or subversive as studies cultural Certeau’s de of lines the along interpreted be can authorship obscuring of moves such out, points Söderberg Johan as course, Of identity. well-established and strong a to tied less or more is expressionwhich authentic of experience the enjoy just even or on, later it on capitalise to hard is it therefore individualism, expressive of logic the into fit not does it that exactly is disadvantage strategic The contributors. from investment low a requires identity 44

CEU eTD Collection people, but it is clear that he mainly undertook the development single-handedly. However, the However, single-handedly. development the undertook mainly he that clear is it but people, other of lot a to credit gives he project, the championed and tested developed, he how and him, to came idea the how about posts blog the In well. as work teaching his from benefits financial ( tinkerer a is who as — himself 2005 Styhre marketing by defined as — subject entrepreneurial real a is Fitzsimons badge. conference the around Robert system tagging laser by a developing Congress, and lead Camp the at Fitzsimons workshops the are time-line, r0ket the from now counterexample, Another bohemian fashion. to or scene, the of wealth Similarly, linguistic collective the to peers. contributions than strongly more freedom her for expression creative of avenue self-proclaimedsigns ofcreativeseenas andwouldbe clothinggenius idiosyncrasies speechand of new a opened she that perhaps acknowledgingone before products, his of qualities original the for primarily valued be would painter where 1920s, the in Montmarte the around artists bohemian be would counterexample A whole. a as community the on impact positive their by than — valued definitely is originality although — achievements other from difference its by less measured is expression individual environment, an such In anyway. others with collaboration in made usually and from, benefit contributions,judged their basedtheir on everyone getbutgroups contributionsare do freeforto and Individuals scene. hacker the in logic thecollectivist strong to the to “contribution testifies which a community”, as r0ket the described member team one context, cultural the for As endorsed, ithas been endorsed as something hacker that the community can own. callhis been has r0ket the as much as sense this In it. represent and community hacker the serve to up set been has Club the since authorship, of claim the than quality of acknowledgement the more means traditionally Club Computer Chaos the of endorsement the note, final a On identities. invested from free and contributions outside to open relatively stayed it that means which the r0ket, to attached was authorship Romantic no up, sum To string. marketing attached an with at Fso Electronics Fusion Part 45 Aot) n paety draws apparently and “About”), ,

CEU eTD Collection scale collaboration around the r0ket happened with the view to enable other hackers to use the use to hackers other enable to view the with happened r0ket the around collaboration scale large the Concretely, place. take to activities — generous and supportive productive, highly still — other the enable to exactly is perform roles altruist in people which work the of point the whole that in together come contradictions the of However, pool. dichotomy a the in contributors as and 1968) freeriders Garett (from terms familiar in formulated software contradictory be These could and work. tendencies scene hardware hacker whole organisation, the make people, to just other etc. logistics, to development, in put (often of they amount energy the by anonymous) distinguished often are community hacker the in people Central quiteismakeshackerhero,heHimanenrealWhen right.mentionedthat the above.writes caring as game, Jeopardy Hacker the of organisers as instance for community, hacker the of life the in involved heavily be to seem members core the least at Moreover, recognised. being to promotion or introduction less need they so events, the organised which Club the of part officially are them of some and space their that sense the in and Germany, country, home their in mostly being of sense hacker the in the both home” in “at were authors members team two r0ket the the gatherings these of At community. position the to attention draw to want I moment the at However, money). own his the from parts the bought and (Fitzsimons project the for students) funding of sources university being team r0ket the of (most authors the of vocations the civilian and circumstances financial the applications, its and research” “base between distinction the projects, these of complexity differing be the as may such factors, Fitzsimons of number and great a team by explained r0ket the of practice authorial the between discrepancy The workshop the is technical description of make how to the module. the about online information the of most indeed, — source open absolutely course of is system tag laser the for design The scene. the inside dynamics different bit a of manifestation a simply but community, hacker the in special anything not is This Fitzsimons”. Robert with Tag Laser “r0ket reads post the and Electronics) Fusion (Part company his as same the called is website 46

CEU eTD Collection inspiring even more contribution. This is why “base research” such as the r0ket is immensely is r0ket the as such research” “base why is This contribution. more even inspiring potentialits productivity,increase and further commons the enrich which all future gifts, of series a motion in set will gift initial positiveThe r0ket. a the like on inventions by based motion is in set economy loop, feedback gift “true” this of version its in commons the of logic The community also is helping freeriders who capitalise it. on technological the of intellect of general point the increasing other that the mind, in seen, keeping worth have is we Söderberg as Still, boards). circuit the printing with connection in instancefor Production above section in the described manufacturersindustrialthe (as of part the on even sometimes way, same the in worked r0ket the of gifting Georges the that by arguable is It advocated Bataille. it as excess on based is commons true a —, individuals random from reciprocity general of logic the to according or people specific between ties personalised on based way individualistic liberal a in either — back value greater or equal of gift a expect contributors the economy gift a in while that is difference The (1992). Derrida Jacques by described sense the in system gift — communist say would I — true a but sense, Maussian the in economy gift a hackercommunityin thenotsponsorship.Söderbergarguesfree softwareis Johnthat the ecology from came value production the of half and subsidised not was effort development and research earlier the saw we as but ticket prices, the built into was price manufacturing the ofportion a that true is It conference. the of visitors the to gifts as basically distributed initially were r0kets The criteria. these fulfil absolutely Congress and Camp the during — games tagging laser playing by also — happily time their spend to importantly most and electronics, on work learn, to opportunity the people other gave which Fitzsimons of workshops The community. hacker the to way own their in contributing for importantly most but money, making for even purposes, own their for r0ket 47

CEU eTD Collection the online availability of software code and documentation with an embodied peer community peer embodied an with documentation and code software of availability online the complement MuCCC like hackerspaces Thus, more. and tools these includes hackerspaces most in found be can which workshop hardware The terminology. industrial the use to prototyping, rapid doing or — hardware hacking for necessary all are etc. precisions, various of irons soldering resistance, and currents voltage, measuring for multimeter the like instruments components, Electric computer. a and knowledge than more needs one r0ket, the using something build or r0ket,a build to order in Thus things). immaterial even more other (among components software and hardware of comprising assemblage an is it but software merely not is r0ket the Secondly, forums.online and books from only learn can everybody Not documentation. bundled the and software free people this very is important for learning, that is, actually to live with the opportunities offered by manysupportivecommunity. For a find and tutoring get can she where free for hackerspaces visit can she language), programming level low popular most the C, in done mostly is (which r0ket the programming in engage to like would individual an if Concretely, mix. commons knowledge the to community embodied an add MuCCC the like hackerspaces especially and gatherings hacker Firstly, development. and research technical of confines the within staying albeit question, that answering towards step a is r0ket the at looking above, wrote I As well. as reality” “flesh the in operational be would commons a the such whether question the raise all 96) (2008, Söderberg with along use, to everybody for free and Raymond 81), (2001, Himanen skills. their improve to individuals helps that documentation are that libraries instruction and programs of commons knowledge a creating for lauded is software Free individuals. of rights equal proposed the on limitations structural the consideration into taking not for criticised often is Liberalism for the community. “caring” above-average as well as expertise management project and technical above-average with heroes” “true from come to has it time same the at and projects, future seeding for important 48

CEU eTD Collection the device embedded is the —and other the is “soft” construction of subjectivities. which in networks the at looking of programme the with line in — r0ket the around flow cash “hard” the is One section. this in aspects two on focus I perspectives divergent widely incorporate to order In analysed. be could capitalism to relation its and r0ket which in ways many are There Capitalism well. as framework the of limitation the beyond going while tenets liberal some to adhere they that here say to suffice it let but others, and anarchy libertarianism, of tendencies political the account into taking way, nuanced more a in analysed be could These justice. social of form some and cooperation voluntary for affinity leftist the with liberalism from on rights individual focus and freedom the combine they Therefore, abstract. the in opportunity equal as freedom defines which liberalism formal a beyond go they learning, for tools logical and physical the providing and other each teaching through Furthermore, interpretation. communistic more a to itself leads which commons, a nourish and together work to ability their on feeds often satisfaction personal their However, freedom. individual of experience an as terms liberal in theorised be can which satisfaction self-expressive individual, personal, of kind a seek do hackers analysis, final the In that is it put to way best immaterial knowledge complemented is with material infrastructure. the Perhaps pursuit. the for necessities immaterial and material concrete the with furnished is she where America) North and Europe in least (at city major any almost in hackerspace a find can she construction, complex more a in part a as it use or r0ket the rebuildto like would hands her on time individualwith enough an case In space. workshop a and 49

CEU eTD Collection aes fr cnues mr r ls osl once o te hce cn r a es the least at or scene hacker the interpreted to not have members team r0ket great. that not actually is exposure connected the so hackerspaces, loosely less or more consumers for caters Pollin that is nuance Another r0ket. generation third a as line product the of upgrades release to plans or production continuous organised no is there moment the at and made were copies more While no since artwork, scale small a or item collector’s market. a of air the all loose not did r0ket the marketed, the into integrated officially r0ket which with store online the to went items 300 Finally, attend. not did who people to it spread and it buy to opportunity the had already Communication Chaos exposure. getsmoretwomore whichalso Hereattendeesthethe CCCs Congress, serious event of the at prototyping rapid for board development ARM an like more sold were r0kets of generation second the year the in Later badge. conference a as — community hacker the in event big a — Camp Communication Chaos the at premiered it EasterHack, scale small and public) still (but exposure low relatively the in experiment an as Began mainstream. the to underground hacker the from steps of series a as seen be can r0ket the of evolution The such this of information relatively is well guarded hard and to find. because and competitiveness, their to key a business, same the in are who firms of operation the for essential is knowledge of kind this since account into deals good get to ability the take to worth is it trivial, sound might it While production. factory small-scale organising in experts few a least at included which community a to access their but businessmen seasoned as savviness their not was this to key The deals. good and offers flexible very getting so, needed theydistributionwhen production capitalist and circuitsup-to-date globalised of most the exploit and into tap to able were lab their in tinkering hackers German the that state to exaggeration an not is It (Pollin). reseller online Polish a and (Etonnet) manufacturer Chinese cheap a to went money their and — online it ordering finally Congress, the at itself product the for directly and Campthe at prices ticket the through — r0ket the for payed Schematically,hackers construction. its from profits reaped companies that evident is it r0ket, the around flow cash the at Looking 50

CEU eTD Collection r0ket, the microcontroller was given for free by the manufacturer to support the making of both of making the support to manufacturer the by free for given was microcontroller the r0ket, the of mind The sides. various from sponsorship enrolling by devices similar of value market the below kept be could price the how earlier described have I story, the of side flow cash the for As team ther0ket there. workers the know and to get and premises the visit to year this China to travelling are members employer — small-scale reputable Etonnet a is case — r0ket this the for in choice of However, manufacturer 2012). (Bonnington Apple like brands Western profitable immensely of service the in toiling Foxconn like companies at workers mass exploited hyper- of images up conjures manufacturer Chinese the of idea the point, outstanding most the with start To conclusions. earlier these contradicting backwards, told be can story same the Yet software, history and which its enhance potential market appeal. default shape, its through framing cultural a in immersed also is it but design technical a merely not is be It it. to to went that have knowledge the in which is value main parts Its way. cheap complex quite a of in assembled composed is It items. rare as highly held are generations two first Its product. the to authenticity lending thus altruistic, are motivations whose people by producedisItleader hacker world.opinion and inthe key player whicha Clubis the by endorsed clever a through market is It given scene. the participants well-connected of to copies free gave campaign which marketing that to introduced been has It marketing. post-modern in the default almost is which — market niche a at aimed is It perspectives. of number a from product post-Fordist perfect the became it far, so life short its of course the During market. consumer the for it manufacture to start and design the grab to decides company a case in accumulation capital term medium for r0ket the in potential good a is there that think I analysis final the In far, would not ticket, afford had other commitments, etc. —to acquire their own r0kets. live they because example for — events aforementioned the to get not did who people allowed democratisation Such item. the of availability greater the to led which process successful a as it framed they Rather, ideas. original their of cooptation the or commercialisation as process this 51

CEU eTD Collection construct of the factory becomes relevant when it turns out that 3000 first generation r0kets are r0kets generation first 3000 that out turns it when relevant becomes factory the of construct theoretical a Such workers. the of productivity optimal the ensure to system such in instrumental is Clock-time goods. consumer of production mass the for structured analysis, that in crucial is factory the organisation of The logic. machine toaccording work perform robotic to doomed and belt conveyor the of time the into locked is worker mass the where line assembly the is Marxists many for production capitalist of context the in alienation of analysis the for sight central The that be can collective called expressivity. Here argument the is developed referring to alienation. form twisted a in expression individual in satisfaction its finds which subject liberal the reflects processproductionthe that argued I section previous the In process. a such throughproduced are subjects of kinds what is, that subjectivation, to us brings This power. productive and creative — humans of anthropological essence the of exercise the meaning in its found it relationsand labour post-Fordist of context the in happen not in did work the that is argument an such phenomenon of point key The capitalism. rare rather a labour, quasi-unalienated of case a as team r0ket the of work the theorise to possible also is it argumentation, Söderberg’s following However, designers. appropriatedfor productionready mass freely withoutany thatpayinglicensingfeestonow itthe be can that and business electronic the in companies various for business generated that product a in resulting it, put to way capitalist the is the labour Free undoubtedly r0ket. the into is went that which asset greatest labour volunteer the evaluating of issue core the is there Finally, lot ofa the parts for free capitalist from companies. get to community hacker the by spun scheme clever a was project r0ket whole the that argued be could it pockets, their of out money get to trick marketing clever a merely not was it and gadget, a such have to wanted least at or needed actually hackers that presume we if fact In company. a by production of cost the for printed was badges generation first of PCB The generations. r0ket 52

CEU eTD Collection ihu tecig te lmt f te hcesae mle. Te rpttv ok ivle in involved work repetitive The milieu. hackerspace the of limits the stretching without not although model, community-based alienated less a to according organised be can process factory typically a even that is moral The motivation.” takes effort The effort. of lots takes that in writes Raymond As production. r0ket the of phase this into went that — labour abstract the precisely: more — time clock the estimate to way no is there please, they as go and come volunteers and payed, not are workers since Tellingly, comm.) (pers. hand.” my through passing them of each had probably have “I that says proudly person One Camp. Chaos the of day first the for together come r0kets all finally but time, on finish to iron soldering the over bending hours extra many in put to has still members core all, in All sessions. long throughout kicking and alive hackers keep to used is it and scene, hacker the in following cult a has It Germany. Münchsteinach, in brewery small a from content, caffeine some with leafs tea mate from made beverage carbonated a is Club-Mate explanation: further require may last The premises. the at available Club-Mate of racks (3) members, for access 24/7 (2) equipment, soldering and space workshop available readily (1) hackerspaces: of characteristics defining three of process advantage taking The MuCCC, the in soldering. happens learn and hackerspace the out check to other for and acquaintances, and friends seeing for MuCCC to in check to many for opportunity an is It mission. the join to Germany in cities another from travelling are volunteers Reportedly, hand. in iron soldering r0kets the with time less or more spending people 100 a around maybe and boards, circuit with filled space vertical and horizontal available every with epic, as effort the describe Participants assemblage. the in part a play to volunteers inviting organisation, CCC the and MuCCC the of lists mailings through call open an out sends team r0ket done. be to also is packaging the be and to on, have soldered will them of some PCB, the on already are parts most While frame. time a limited of confined the in assembled be to have will they and hackerspace MuCCC the to arriving How to Become a Hacker a Become to How (2011), “Being a hacker is lots of fun, but it’s a kind of fun of kind a it’s but fun, of lots is hacker a “Being (2011), 53

CEU eTD Collection Companies like the Gamification Initiative at SAP help enterprises to “Make [employees] Work [employees] “Make to enterprises help SAP at Initiative Gamification the like Companies (McGonigal). literature managerial and self-development in term a becoming is Gamification workers. the for social and rewarding and engaging more be to reorganised been have processes work Many accumulation. capital for activity productive a become to years recent in capitalists by co-opted thoroughly been has play that think also I negation”, as labour wage to relates “play that Söderberg with agree I general in while because out point to important extremely this find I developing playing and games, both simple and complicated ones. actually are they but playful only not are hackers that proof have we Here play. actual in engaged hackers show to fail They play. and work of mix a as applications software useful developing to refer only Ethic, they Protestant the of face the in hackers of playfulness the oninsists also who Himanen with along capitalism, against struggle” “play do hackers that argues Söderberg While have never used their counters ina serious situation, so itwas fun a project for them as well. guns. toy makeshift However, even considering the Geiger counter workshop, it safe is assume to that most attendants with other each chasing around running people get to was point the whole but r0ket, the around appliance whole a building more involved on and built technology game sophisticated tag laser The rackets. two controlling people hundred than more with Congressplayergomassiver0ket,thetwowithversiontwowithto ata just to expanded later and ground, the firmware, laid default already the in gameInvaders Space the INVADERS, explicitly. less or more play, with concerned often are they that seems it above covered r0ket the of cases use the over Looking r0ket. the of distribution and production the on been has emphasis the far So gets seen, have we as r0ket, generation outsourced to Chinawhere company the factory has a infrastructure. next the Consequently, twice.” solved be to have ever should problem “No that text same the in adds Raymond place. first the in invented were machines why is this all, After spirit. hacker the against is r0kets of amount great a assembling 54

CEU eTD Collection yet the contains latter disjunct elements that gofurther than the outlines of the former. self- self-managing, — ethos, hacker the subject with overlaps largely — productive eternally and self-motivated capitalist programmable, perfect the of profile The poor. very are not hackers yet typically payment, without pursued are above activities the of most — patterns work precarious by afforded time free the on based often is freedom their particular, In restructuration. post-industrial the by brought flexibility the of because possible is which processes, capitalist repurpose and extend often they Thus projects. personal pursue to time the take finished, once being or and terms, companies own their on this do to commercial manage often they yet companies, commercial contracting by contracted scruples no have hackers most conclude, To escape routes from iron cage the of capitalism. potential many so technology: and play aesthetics, of intersection the in here staged is r0ket The hackers. about before mentioned motives many together brings also it but setting, commercial professional, a in r0ket of example an is It change. room the in music the and lights the score, they If Schiller. theorist game favourite Söderberg’s and Wedekind Grillparzer, Goethe, from quotations ranking by quizzes poem solve to have who participants six to out given are scene r0kets one During city. the across locations various in games of series a up set to hackerspace Chaostreff local the of members with works Matthaei Lukas Jorg Director Theatre. Dortmund playful the on play theatre builds the is which before experiments r0ket the involving project commercial a of example recent A self- own development, choose their tasks, own and organise their commissioned in work their way. own their on concentrate to workers qualified highly enables often which outsourcing, and freelancing work, precarious from comes that freedom the exploit hackers that true also is It scene. the in slogan widespread a is profit” and fun for “hacking fact In value. entertainment the for just it in engaged often are they games, from learn also hackers while that see to important is Figures”, and facts “Gamification (see Fun” more Crash Test North City — Do My Games My Do — City North Test Crash 55 SAP Gamification Initiative Gamification SAP ). In light of this it this of light In ). , organised by organised ,

CEU eTD Collection ideals of modern science, the facts born in the laboratories are negotiated in networks between networks in negotiated are laboratories the in born facts the science, modern of ideals the from far software that emphasises proprietary (1986) work of ethnographic early critique Latour’s practices. the development outlines and development his software describes free he when in like experience look can principles these around work of organisation concrete the how presents already Raymond passion. and play by driven are they because workers other from differentiated are hackers that argumentation Himanen’s follows Söderberg of capitalism. Ethic Protestant the of essence the defined turn in which order, monastic the of ethos the with contrast in but ethos hacker the to similar as academia the of ethos the identifies Himanen in modern society, has this wide-ranging implications.2009) (Boltanski tests truth of construction the in role significant a plays science modern Since science. modern for shorthand a as modernity of concept the use mostly I section this In Modernity social movements seems tomore be productive inmany cases. the of principles strict the by confined not is which strategy hacker the to Importantly, similarly hackers. themselves style often movements social these since striking more the all is This of norms the to companies. commercial opposition with anything do to direct refuse usually who movements, social in anticapitalist is capitalism to attitude elusive such Furthermore, work serious colouring flavour inherent assignment, actually but manifests itselfin any observer what wouldcallgames. an merely not is element playful the that evident becomes it Thus products. into transformed be can which prototypes or experiments considered electronicsThe projects paper in this haveno direct commercial application, although they be can not. or payed are they if matter no industry, the for useful directly is which code software writing are they when hackers at looking mostly is which research previous complement findings These 56

CEU eTD Collection software development. In physical design it means using a 3D printer or similar machine to make to machine similar or printer 3D a using means it design physical In development. software in extent lesser a to and construction electronic design, Rapid physical in term a prototyping. as used is rapid prototyping for board development a called is r0ket the things other Amongst the well r0ket as as its highlighting usecases, their spontaneity. of process development and production the consider will I Finally, practices. interesting further to point they how and firmware default the in r0ket the on applicationsinstalled software various r0ket,thethelooking latertheat designInitially,concentrate purposehardware ofon I and ways. various their correct in correspondence that a beyond go in activities of stand kinds These to reality. to has relationship that representation a is knowledge that idea the from away strays which work scientific in engage to likely more are hackers that is here argument particular My or corporate traditional the in academic research laboratories. than more much milieus social specific in practices certain by interrupted is science modern of logic the how on light shed to rather but dichotomy a up set to simply not is investigations these of importance The science. modern on based less or more is doing are pseudo-scientists and scientists aforementioned the all what of much that mind in the using management, keep to important scientific is It point. starting a as device r0ket modern the about gathered material ethnographic and science modern of idea the from markedly differs which science a doing are hackers how see to further thought of line this develop I Here science whichgoes beyond the conceptof knowledge as a factual representation. nonmodern of brand doing already were cyberneticians his that out points Pickering this, on Improving science. accurate more a turn in and science, of perception accurate more a develop to findings his of recognition the for calls Latour themselves. scientists and instruments institutions, 57

CEU eTD Collection at, a frhr mcorcso rgamr dvc a o b once o prom the perform to connected be to has device programmer further a parts, electronic these to connected is microprocessor a once r0ket, the Without processor. the through utilised and reached easily are these all hand, other the On assemblage. preconfigured a in them presenting by process that short-circuits r0ket the — other each to these connecting with begin often sessions and work electronic ad-hoc in components common most the are These on. so and colours, various of LEDs battery, the connector, USB the display, the sensor, light the like parts, pre-installed of variety wide a with users the presents it hand, one the On design. deterritorialised itsconstruction through electronic approach to facilitatesthis r0ket the board like development A and indeed, often hackers engagein process the for the sake of it. prototyping, rapid and play between affinity the see to easy is It itself. product the from far is prototype the evidently and unpolished, and rough be to tend results the Naturally, process. surprising. results the and planned a than faster unforeseen, much results practical producing speed, its by often distinguished is it Moreover, are taken be to steps the plan, a of execution the not is prototyping rapid during Since passion. and play by guided is activity this that agree rationality by as and a Raymond more efficientindustrial mechanism.As noted above, allof them capitalist of cage metal the to antidote an as Himanen by labour, unalienated of form germ a as Söderberg by lauded working of manner the for suitable particularly is that development of form specific a is It one. previous the on builds which of each prototypes, iterative of number a and not are which backtracking some involves usually It production. connections mass or use production for suitable necessarily loose and parts purpose general using involves it Furthermore, goal. the of idea rapid rough a of only and type design, This a without design. construction starting electronic means prototyping in prototyping rapid for used is r0ket the However, the r0ket device. printers 3D useful for this kind of rapid prototyping are a staple of hackerspaces. for boxes and cases as such objects, useful actual print to it used have Hackers board. drawing the on than rather physicality its in it evaluate to order in design proposed the of model small-scale a 58

CEU eTD Collection who are working with theare university often are r0ket working studentsstudying withwho similar computerscience or people while work, field my togrounds. According any without not imagination, and popular the in security computer with associated are Hackers tool. security a is broken intentionally is which softwarepasswordgenerator PWGEN, the instance, For account. taking into thereforeworth and hackers, inspire that activities some of collection a is r0ket the with bundled software default The rapid of types various prototyping. the both characterises which Pickering, by described thanrepresentation, rather practice on emphasis the echoes also it However, process. the of parts boring the avoid to it of more do to willing are they coding, about passionate are hackers since that is joke this of Another point The planning.” of hours two you save can coding management. of days “Still, that retorted hacker project of wisdom traditional the echoing participant, one proposed coding.”,[software] of days two you save can planning of hours “Two Congress. Communication Chaos the at conversation overheard an from quote A a be could prototyping rapid 1998). such for slogan DiCaterino & (Green outlined specification the to correspondence its than rather prior a of lack goal its of fulfilment practical its on based judged is result final the the that fact the and specification by methodologies development software other from distinguished also analogueThe of rapid prototyping insoftware development exploratory is programming, whichis versus rapid prototyping. analysis theoretical for motivations and skills researcher’s the on dependent highly is ratio this Naturally, theory. in through it thinking than practice in out it trying through faster solved be can problem prototypable easily an that is definition His prototypable”. “easily as problems such to refer Knowledge for Centre Autonomous Hungarian the from feka heard I 2012) 12th, (May today Just case. use the to adapted more are that results faster yield can approach an such cases of laptop a and USBOf cable. course, not allproblems be can solved way, insuch a but number ina simple a using programmed be can r0ket the in microprocessor the contrast, In programming. 59

CEU eTD Collection mathematical algorithm, proving the point of the hackerethic that “Youcreate can art and beauty a through programmatically generated are which beauty of instances accepted universally first the also were They algorithm. simple a by generated are they that fact the despite self-similarity and complexity resolution, infinite have because fractals love Hackers set. a Mandelbrot displays that viewer fractal a MANDEL, is r0ket the on installed program default Another point. professional and political a with joke practical a only community, the to threat security serious a not was story whole the so theory), (in serious anything securing for use would nobody which anyway, passwords long character 8 only generates PWGEN course Of do. to love hackers most which — research security in engage to participants the for opportunities many make to electronic gadget little this used also it section, previous other the in many explained had aspects cultural joke interesting practical this While network. Camp the to connected computers the on passwords defective these used actually anybody if check to tests penetration perform to peers his on called and secret, the revealed he Eventually, not. do who majority vast the for mistakes security of source a and — software the audit who those for find interesting an presenting defect, the designed intentionally author its PWGEN, of case the In 1994:xvii). (Pula territory” the not between gap the exploit these words, is map Korzybski, “the Alfred quote practice.To performance as representation and as knowledge other In practice. in sound necessarily not is sound theoretically is what that notion the take activities Both advertised. as works actually it that verify to order in program a of code source the through reads and out tries programmer the that means audit software a Similarly, secure. theoretically are that systems in wholes” “security of number a find usually tests Penetration secure. really it if see to order in owner the of permission the with is category this in job system a into break to trying means testing Penetrationauditing. software and dream testing penetration The security. on focusing them of frequency high unusually programmersare usuallysystem and administrators they job disciplines,theywhen havea with an 60

CEU eTD Collection nwr i ht truhu t hr itr, te epcain fr cmue cetss has scientists computer repeatably, and for reliably worked that expectation machines logical create the should they that been history, increasingly short its throughout that The is “industry”. the answer in experience without this grasp to difficult also be could It results. the by surprised often and topics unknown researching generally is scientist of kind any that accept a on based users we if especially their software, these all in nonmodern is what ask might to One experience. performative experience unpredictable and unplanned an provide games that obvious rather is It game. computer classic the of re-implementation a is INVADERS Finally, of hackers. generation new a to — experiences aesthetic and — possibilities technical these back brings r0ket to teens many enabling machines, the PCs, today’s with more any possible not primitive is this While bit-by-bit. operations their understand these of be simplicity can radical animations the demoscene to into attributed went that virtuosity technical and creativity immense The it. with achieve to possible is it what showing by device r0ket the of power CPU the superior showcases software of piece this that argues he when interpreted, best be can application MANDEL the of author the from comment the that context this in is It computers. personal earliest the of limits the push to competed hackers which with programs computer by generated demosceneexplorations feature of common productions,shortFractalbeen animations a the have them depending the desired on or pan zoom direction. of images new generate can that viewers fractal through interactively time in explored are fractals paradox: this resolves which performance is it course Of representation. a exactly is it grasp to of challenge the way best the that to fact the despite — represented get fully be never can can fractal a since representation, one as close as perhaps is viewer fractal a Visually, complexity. great engender can things primitive seemingly of design a clever itself, the that in prove statement to a performance is r0ket the of screen pixel 96×68 tiny the on resolution infinite has that something brings that program computer small a write To 2012:31). (Levy computer” a on 61

CEU eTD Collection how the audience can use it in yet unknown ways. Raymond already incorporates this attraction this incorporates already Raymond ways. unknown yet in it use can audience the how see to arguably is r0ket the making behind ambition whole The own. its of life a have will it and up it take will people there”, “out is good something once that hope the and community the on reliance high a show notes organisational small These while. a for project whole the about forget to happy also were they and Congress the at r0kets generation second the release to happy were members team fact, in — r0ket the of future the about concept no found I interviews and work field my during that puzzling particularly is It calculation. and planning methodological of and result social the of solidity the the than rather inception its of to moment the from r0ket the more surrounding network infrastructural testimony a is setbacks major without went these an of recommendation all that fact The offers. best the the for around” “shop to time no following was there and hacker, experienced manner ad-hoc rather a in happened boards the circuit printing for company the of choice the — Congress the at presentation r0ket the admitted during they as — or time, on device the of generation first the mobilise assemble can to team people the enough if know to way no was there and clear not was it instance, For r0ket. the of life the in phases these for out worked plan business precise a been never has there that fact the highlight to like would I Here projects. various for r0ket the producing, utilising of and distributing process complicated the detail in describes chapter previous The work. the of and software the organisation the in work patterns in such how see to instructive also demonstrated is it above, practices hardware been has phenomena emergent to attention the While better), try I to show herehow prefer hackers to write software that works differently. While even (or creations corporate as well as intensity. work that software write can hackers that argues Raymond with situations tactical simply or patterns, mathematical or aesthetic code, software the in bugs characters, of strings “random” they be patterns, unpredictable for search to machinethe and man the maketo applicationsis above the of point whole the that, with contrast In technicalities. of grasp less with department another in developed plan a to according often 62

CEU eTD Collection shows two divergences from models of development outlined in the accounts the in reviewed above. outlined development software free of models from divergences two shows material ethnographic the However, production. peer of descriptions previous to corresponds largely that process a through — practice scientific modern and labour, of organisation capitalist invention, individual of frameworks the outside largely undertaken endevour cooperative a been clearly has r0ket the of use and production The artifacts. physical of manufacture the itto comes when production peer of limits the of establishment the concerned question research One Peer production goes physical Concluding remarks science but with a peculiar twist whichenables them bypass to some of limitations. its modern mobilise hackers that is argument My lineage. such of mainstream the from derivation its in is r0ket the of peculiarity the Nonetheless, science. modern of lineage part the most from the derived for are r0ket the around and in converging processes The scene. hackerspaces their and students the of as context the in tinkering studies in experience their with their them merging background, professional on build effectively They development. software and scientificindustrialmodernmethodology, useofknowledgepractices electronicsmake and in hackers r0ket many and members team r0ket both that denying no is there hand, other the On youuses never expected.” significance systematically: “Anytool should be useful inthe expected way, but truly a great lends itself tool to its out work not does he but culture, hacker on writing his into emergent the to 63

CEU eTD Collection capital, mention to a —did few not fundamentally blockthe flow of peer production processes. seed production, industrial communities, embodied space, and time shared — theory production peer of view of point the from novel relatively are which elements these of incorporation The ain 2011is caseinpoint. developers r0ket by used list mailing development invite-only the — lines communication virtual some least at of closing the to leads even process localised and territorialised this Significantly, reality. augmented rudimentary a as theorised be can that way a physical in participants the of togetherness complement that channels communication virtual create waves radio the times these During sense. most the make r0ket the into built features communication frequency radio the when occassions the also are these above, shown As space. and time come common a practitioners in together when gatherings hacker large-scale the are utilised is r0ket the where site cooperative mainthattheaalso tangiblebasis. the productionMyshowon surveysfor artifacts of indisposable are spaces physical and communities embodied that evident is it hand, other the On dominant these into incorporated routinely are structures. practices hacker turn in while practices, their in these incorporate also they inquiry, dominant scientific and with production subjectivation, line of models of out seen often are that behaviours exhibit hackers although that fact the interpret to how table: the on back firmly review literature the in outlined paradox the puts of role the account into takes This Benkler integration. looser much a find they but production, software free in enterprises commercial and Söderberg Himanen, do. to have ever would society programmers software than civil extent greater a established to factories even companies, and Club, the like commercial organisations like structures mainstream with engage to had hackers r0ket, the of production the organise to order in that clear is it hand, one On 64

CEU eTD Collection General Computation — The Copyright War was Just the Beginning”, there is a new trend new a is there Beginning”, the Just was War Copyright The — Computation General on War Coming “The entitled Congress the at presentation his in out pointed (2011) Doctorow Cory as fact, In purposes. these all for product end-user single a design would companies Few environment flexible, wide as the applications range of described above show. their to adapt not do themselves surprisingly are they them using hackers with assemblage an as together considered automatically, r0kets Though game. pong mass the of case the in seen have we as loops, feedback create to other each to messages pass to them enables It other. each with network mesh wireless a create r0kets Furthermore, device. electronic other any almost with interface can they which through connectors bus their to due largely is This situations. of variety great a to users its by adapted be can that — computer personal the than so more even — device purpose general a is it but itself, adaptation do not does device r0ket The disciplines —for exampleinto departments on the university level —that facilitate that work. into divided is which and representation, as knowledge producing at aims which science, modern as of knowledge norms established the against went attitudes questioned These performance. preferred and representation, that outlook visionary their with work their for basis social a find to failure their explains (2010:54-60) Pickering projects. pet of form the in research important most their pursued many and science modern of circuits the into integrate not could work Their loop,feedback which information adds about the state system of the itselfto its inputs. the was designs such of element key A principles. simple relatively to according work can complexsystems that discovered they machines, adaptive design to trying were they While variables. relevant the as diverse as least at is a which behaviour emergent exhibit to able be to have in system a relevant stay can that systems variables”, “essential its adaptive to adapt to order in that found They world. unpredictable fundamentally design to way a for looked Cyberneticians Cybernetics 65

CEU eTD Collection enthusiasts. electronic for product manufactured mass perfect the as future a have as may and they culture above argued hacker of encyclopedia the are they paper this In distinction. of signs circles, summertoa collector’sitems,littleartworksthemselves, souvenirs in certainfrom of camp and in board, development ARM full-fledged a to badge conference one-off a from going and project theircourselifetimeDuringtheofr0kets havedeveloped multiple identities, learninga startingas be to is machine developed only the by Darwinian process!” (Pickering 2010,127) Darwinian the that dogmatise to tempted almost is “One that journal his in wrote He practice. in solutions different out trying of process error and trial the and intuition plan, exact his by an complemented had, he without that knowledge proceed little the of to basis the has on research the He continuing machine. the for blueprint a with up come to able be never will he that realised he grew, machine the of complexity the As prototyping. rapid of principles the embraced — worked never that electrodes of jungle a — machine DAMS the brain, a for design futile his in Ashby Ross Finally, robotics. of field emerging the for medical ground the in resulted they laying Eventually, up ended and shows, television table. of favourite the became science, kitchen brain about publications the on pastime afternoon an as way same the in started tortoises electronic Walter’s Grey subject Pickering another more, is What typewriting. teaching of business the in up ended and toys children’s to theatre the from went which piano synaesthetic a above: mentioned already was machine Musicolor the of example The striking. so is cyberneticians the of creations the to similarity the that wonder No place. of out rather is hackerspaces in on going tinkering general and prototyping rapid programming, exploratory the context this In iPads. and readers ebook of success the in evident as machines, single-purpose of direction the to points that devices electronic of convergence the displacing 66

CEU eTD Collection oen oit.Te cno b sindt te rvt etrbcuete ae o profit not are they because sector private the to assigned be cannot They society. modern comparable are of r0ket institutions the of taxonomy the the in place their to possible as ambiguity similar a with make configurations, which hackerspaces that argue I cyberneticians. of involvement direct the or had, it influence cultural the to thanks work to put is logic its where sites — ideas cybernetic the on based practices for emergence of surfaces were these that argues He Thames. the of bank the centre on learningadaptive an for plan a Palace, Fun the or London, in University Free self-organised the transversal as counterculture and sixties the extra-institutional by produced other constellations, to points and cyberneticians, of interests research the accommodate fully never could that solutions ad-hoc were these of all that notes universities. Pickering and hospitals psychiatric hospitals, in worked Walter and Ashby private Finally, the sector. in company little own his running consultant, management business a as life his the to consigned of much living be a made Beer Stafford cybernetician British first the Then, society. civil roughly of category can which discussion for club dining a — Club Ratio the was cybernetics British of hub central the Pickering to According outlets. disparate many found they society the of context larger the in table, kitchen the on projects important most their on worked often cyberneticians while level: macro the on similarly functioned cybernetics of basis social The the possibilitiesup for creative reterritorialisations. open deterritorialisationwhich of lines flight, of lines withcriss-crossed devices are r0kets that say can we which “unstable with enlightening, more term is terminology Guattari’s and the Deleuze Maybe grouping”. in conceptualised be could properties These gun. laser a of the components instance for involving group, larger a into incorporated be easily can r0ket the Similarly, hardware. other with replaced or separately, used be all can display low-resolution a or sensor light a like parts various its itself, in grouping a considered be can r0ket the while groupings: of idea Latour’s on advance to Or devices. other and people with connections technical and cultural forge to ability r0ket’s the by possible made all is this moment, a for terminology Latour’s use To 67

CEU eTD Collection technological subculture. A potential reason for this, as I tried to demonstrate in the previous the in demonstrate to tried I as this, for reason potential A subculture. technological twisted still yet major a into develop to managed has hacking while discipline, scientific sidelined thousand several and twisted a been draws has cybernetics because possible is routinely This gatherings. regular its which to participants 1981, to back going history a with organisations, hacker largest world’s the of one of support infrastructural and financial moral, the on count could team r0ket the above, described I As scene. European the of hinterland the from coming hackerspaces of creation exceptional an ways some in is r0ket the Indeed, support. institutional without and homes private in fruition to brought be not could it project, research the in there Stafford biologicaland workingwhatever Beer computers,he on potentialPask that notes was the Gordon about writes Pickering When team. r0ket the housed which MuCCC in one the like just communities, and groups working existing for cater hackerspaces the geniuses, lonely of troupe a be to appear presentation Pickering’s in cyberneticians the While two. the between connection relatively are mostthereare significanthackerspacesHowever,theas being importantthat differenceswell,two they wouldnot havefelt of out place. Walter’s Musicolor, where audiences, appreciative and basis social Pask’s their found have would DAM Ashby’s or where tortoises, places strange these in is It device. r0ket the of usage and invention the like projects exploratory nourish can which quasi-institutionscommunity-run these malleabilityof this exactly is it all. Indeed, at entities legal not are them of some Indeed, problem.or cause social specific a on working nor public, general the to services formal or any providing association an as not are they run since either, Organisation Non-Governmental often typical the not are they are foundation, they while Finally, 2011). (Hunsinger environments learninginformal peer-learning or studied as often are they though they organisations, even sanctioned state- and other or them universities accredited in not are on They companies. going spin-off engender activities occasionally oriented profit some being there despite oriented, successful n hyrpeetaa represent they and 68 popular social practice social popular . I argue that there is a is there that argue I .

CEU eTD Collection loans, and so on to produce the r0ket. They had few ideological doubts about sources, as long as long as sources, about doubts ideological few had They r0ket. the produce to on so and loans, interest zero volunteering, sponsorship, gifts, contracts, commercial like resourcing non-capitalist and capitalist combined hackers how shown have I capitalism on section the In performance. through — done work actual through implicitly except r0ket team in membership formal no is there why is This r0ket. the produced which people of network performative the for moniker a merely but authorship, stable a to point not does Club” Computer “Chaos or team” “r0ket since representation, of sense the in meaningful necessarily not is liberalism on section the in described of authorship collective The emerge. conclusions will patterns productive nodes), network (open radicals” “free nonmodern the on enough with network a work of configuration right the given their that is line bottom The cyberneticians. base but se, per emergence researching an on concentrate towards necessarily not do Hackers self-organisation. for drive certain a — order emergent pointed which behaviours unpredictable observed they other loops, each feedback to through a systems adaptive posited connected that scientists outlook When ontological world. an unknown was fundamentally it cybernetics, British of case the In together. practices these binds that thread common the at look to is important more is what However, computerbeyond scienceto industrial design, cooking, knitting or genetics. areas to expands currently it as hacking to happens what future the for see to interesting is It itself. ground to which in basis social a find to failed and connections these in dissipated it argues Pickering as However, century. twentieth the in statistics) predecessor, its of exception possible the (with field other any than richly and profoundly more so did it science general a as capacity its in indeed, disciplines: scientific other with connections make to manage not did that cybernetics say to not is This did. cyberneticians the than more connections productive establish to and own their into systems ruling the incorporate to way a found hackers precisely, More these. of foundations the on build to managed still it particular, in liberalism and capitalism science, modern and general in modernity from departure a as seen be can hacking while that is sections, 69

CEU eTD Collection Sunt Dracones, a phrase whichmarked uncharted territories medieval on maps. relation Such a to Hic of translation the — Dragons” Be “Here slogan the sported 2008) (in Congress 26th the and Incognita, Terra called is Netherlands the in hackerspaces new the of one that wonder No the and environments great were communities development boardcould easily accomodate emerging these needs. embodied their with gatherings the but r0ket, hacker the for (pong) game computer mass a or application dating a system, tagging laser a as things such develop to rationale scientific or support institutional no been have would there example For contexts. institutional modern in limited severely is which ability an process, development the during itself (technology) material the from arise that clues the trace to explorer the allows It practice. in explored only adequately, out mapped be cannot destination whose in paths haphazard follow to hackerspaces opportunity enough provide general in scene hacker the the and particular as well as r0ket, the into built are that variables free or radicals free The isfeedback provided. enough if control central without cooperatively act can multitude a that prove to was point His controllers. analogue using 1991 during California in people hundreds several with experiment same the conducted Carpenter Loren badges. their through collaboratively screen big the on pads two the controlled who participants hundred some involving Congress the at game pong mass the is r0kets with hackers and cyberneticians classic between affinity the of example concrete A patterns receive special attention hackers from on the programming level of code. emergent how show to used mainly was modernity on sectionprevious the Finally, play. theatre a in props as it use to and Counters, Geiger for-sale their into r0kets incorporate to charge, small a opportunityfindapplications.itsanholditwill workshopsutilise,usedit asto for Indeed, people can users thatfunctionality enough has it if that belief the than other r0ket, the behind future the for plan business no was there Furthermore, productively. construction the to contributed they 70

CEU eTD Collection arises the when limits growth of are reached. two latter The conflict. or luxury growth, through ways: three of one in energy excess this of rid get to have forms Life scarcity. of situation a in subjects rational with works which economy restricted of view the with contrast in energy, of abundance irrational an by characterised is life threevolume in his excess writesHe about economy. general Bataille’s of terms in grasped best be perhaps can excess such precisely, More categories block the incredible productivity inherentinfree pursuits and voluntary cooperation. trial my like frameworks restrictive how out point also they profitable, find and they fun which enlightening, projects pursue would people why theorise to trying up and caught Raymond are Söderberg, Benkler Himanen, while fact In them. of out growing by categories these limitationsof the bypass They excess. of that is modernity and capitalism liberalism, to hackers of relationship the that is it formulate to way best The posited. be can opposition simple no above, shown As modernity? and capitalism liberalism, to hackers of relationship the is what all, in All Excess creation.in his people whole a forth calls poet eminent the poetical, the of essence the seeks he when Hölderlin with connection in notes Heidegger As gadget. this into system life hacker to whole their incorporated knitters the from scene hacker users subsequent and developers r0ket microcontroller, mere a creating of Instead administrators. whole the of description ethnographic scale full a to unfolded almost device r0ket the of description the that fact the by exemplified is which r0ket, the for design hardware and software the in incorporated meaning cultural of amount vast the is evidence Supporting it. enframing by technology modern through nature of domination technocraticthe to opposed revealing,as poetic the calls Heidegger what is nature and technology The Accursed Share Accursed The 71 (1991), whereproposesheall (1991), that

CEU eTD Collection London and Ann Arbor,London Ann and Press. MI: Pluto 2007. Richard. Barbrook, _SMD_Edition.html http://www.pollin.de/shop/dt/NzE4OTgxOTk-/Bausaetze_Module/Module/ARDUINO_UNO sale), on (item Edition” SMB UNO “Arduino peter-norvig-james-gosling-guido-van-tim-bray/ programmers-answersinterview-with-steve-yegge-linus-torvalds-dave-thomas-david-heinemeier- Bray.” Tim Van, Guido Gosling, James Norvig, Peter Heinemeier, Linus David Thomas, Yegge, Dave Torvalds, Steve with Answers….Interview Programmers “Great 2005. Usman. Ahmad, University Press. Politics In Rights. Human Beyond 1996. Giorgio. Agamben, References andBibliography Þ exploitative liberalism, individualist that capitalism rational or modernity cannot fully capture. energy life spontaneous a by driven are they case, anymight potentiallyit.Inaround limitation,sabotagecan or conflictual route the a whichbreak which luxury playful a to turn may they technology that, doing While representation. as knowledge on based and science modern and accumulation, hierarchical capital on authorship, expressive based on structured into management based built rights growth property of intellectual limits restrictive the and bypass individualism to manage often hackers that argue I dtd y al in ihe ad, 5-6. inaoi, M: Minnesota MN: Minneapolis, 159-167. Hardt, Michael & Virno Paolo by edited , ie Byn Code Beyond Life Imaginary Futures: From Thinking Machines to the Global Village Global the to Machines Thinking From Futures: Imaginary bo) https://usmanahmad.wordpress.com/2006/08/02/great- (blog). 72 oln Electronic Pollin Radical Thought in Italy: A Potential A Italy: in Thought Radical cesd My 2, 2012. 28, May accessed , .

CEU eTD Collection Derrida, 1992. Jacques. DENIC. 2010.Whois information on r0ket.de. Ask to How In sophistication. methodological toward leap: you before Listen 1983. Charles. Briggs, organisedCamp, by Chaos Computer the Finowfurt Club, airport. CommunicationChaos 4th the at TalkDebate’. for Invitation and Research Presentationof A — Subcultures F/LOSS European in Gender and Millennials ‘She-Hackers: 2011. Kat. Braybrooke, Wired iPlants. Foxconn at Violations Pressing’ and ‘Serious Finds Probe 2012. Christina. Bonnington, Verso. 2005. Chiapello. Eve and Luc Boltaski, Malden, Polity MA: Press. In Domination. of Regimes Political 2011. Luc. Boltanski, Augmented Hacking. Political of Years 30 2011. Noor. Ophelia and Sabine Blanc, Anthropology in Methods In interviewing. semi-structured and Unstructured 1995b. Russel. Harvey Bernard, Walnut136-164. Creek, AltaMira CA: Press. In Observation. Participant 1995a. Russel. Harvey Bernard, Hurley. York: New Zone Books. 1991. Georges. Bataille, , 29March. http://www.wired.com/gadgetlab/2012/03/apple-foxconn-audits/ , 30September. http://owni.eu/2011/11/08/30-years-of-political-hacking/ , 93-111. Cambridge:, 93-111. CUP. Given Time I. Counterfeit Money. Counterfeit I. Time Given The Accursed Share, Volume 1: Consumption 1: Volume Share, Accursed The , 208-236. Creek, Walnut CA: AltaMiraPress. The New Spirit of Capitalism of Spirit New The 73 Chicago, IL:University of Chicago. On Critique On Research Methods in Anthropology in Methods Research , 116-149. Cambridge & Cambridge 116-149. , . Translated by Robert by Translated . . New York, London: York, New . Owni.eu — News, — Owni.eu Learning Research ,

CEU eTD Collection etr fr Tcnlg n Government in 2002 since tool paste Technology #1 ;)”, hackers 3000 hacked I how or boot trusted in security no “there’s 2011. guest. r0ket/r0ket”, https://github.com/r0ket/r0ket/graphs of for “Graphs http://www.ctg.albany.edu/publications/reports/survey_of_sysdev Center Models”. Process Development System of Survey “A 1998. DiCaterino. Ann and Darryl Green, Culture Sustainable with world a nations?”. among in wealth peace of distribution genuine inequitable find we Can Violence “Structural 1983. Robert. Gilman, http://enterprise-gamification.com/index.php/facts Figures*”, Berlin. & Facts “Gamification Club, Computer Chaos Central European University, Budapest. Science, Political of the Department the at Course Research. Media Digital 2012. Laura. Forlano, of meeting annual https://events.ccc.de/congress/2011/Fahrplan/events/4848.en.html page), Lines”, “Behind (28C3) Congress Enemy Communication Chaos (about 28th the at Presentation beginning. the Will” just was war copyright The — computation general on war coming The 2011. Cory. Doctorow, Your http://makezine.com/volumes/index.csp to Tweak - Makezine.com @ More & Technology Mods Hacks, How-tos, Inspiration, Projects, “DIY 4.http://www.context.org/ICLIB/IC04/TOC04.htm . August http://pastebin.com/04wAcXzJ 14th. A aiiain Initiative Gamification SAP Github.com 74 cesd My 2, 2012. 28, May accessed , In Context — A Quarterly of Humane of Quarterly A — Context In cesd My 2, 2012, 28, May accessed , ae Magazine Make Pastebin — Pastebin . .

CEU eTD Collection nul meig o h ho optr Cu, Berlin. Club, Computer Chaos the of meeting https://events.ccc.de/congress/2011/Fahrplan/events/4722.de.html annual Lines”, Enemy “Behind (28C3) Congress Communication Chaos 28th Workshop, urxvt!. dein als besser ist Ruby Mein — Contest Pissing Nerds’ NPC: 2011. klobs. & Benjamin Kellermann, Fried. Limor Verge: http://www.theverge.com/2011/11/23/2583441/5-minutes-on-the-verge-limor-fried The on Minutes 5 2011. Laura. June, Computers with World Physical 2004. O’Sullivan. Dan and Tom 2011 Igoe, Conference PLE The the of In Hacklabs. from Lessons PLE: as Workshop Social The 2011. Jeremy. Hunsinger, (1964) York: House. Random Thinking” of Task “The 2001. Pekka. to Himanen, (1927) Time” and Farrell Krell.: HarperCollins. “Being from Writings In Technology. Concerning Question The 1993. Martin. Heidegger, Harvey, David. 2005. York:New Penguin Press. Negri. Antonio2004. Michael and Hardt, Hardin, Garett. 1968.“Theof Tragedy the Commons”. Routledge. In Samples. and Cases Problems, Design: Research 1983. Atkinson. Paul and Martyn Hammesrley, Ethnography: Principles and Practice and Principles Ethnography: A Brief History of Neoliberalism of History Brief A : A Radical Approach to the Philosophy of Business of Philosophy the to Approach Radical A Ethic: Hacker . Boston, MA: Premier Press. , 10th -, 10th July 12th 2011,Southampton, UK. , edited by Hammersley and Atkinson, 23-53. London: 23-53. Atkinson, and Hammersley by edited , Multitude: War and Democracy in the Age of Empire of Age the in Democracy and War Multitude: hscl Cmuig esn n otoln the Controlling and Sensing Computing: Physical 75 . Oxford: Oxford University Press. Science 162 (3859): 1243–1248. 162(3859): h Verge The Martin Heidegger: Basic Heidegger: Martin , edited by David by edited , 3 November. 23 , Proceedings . New . .

CEU eTD Collection University of Chicago Press. 2010. Andrew. Pickering, http://muse.jhu.edu/journals/modernism-modernity/v001/1.3br_latour.html 257-258. (3): (review).” Modern Been Never Have “We 1993. Andrew. Pickering, Electronics Fusion Part soldering Altman’s Mitch teachings.” of adaptation comic - easy is “Soldering 2010. Andie. Nordgren, ml sale), Creativity on http://www.pollin.de/shop/dt/ODE4OTgxOTk-/Bausaetze_Module/Bausaetze/Modul_rOket.ht (item r0ket” “Modul Production Control the “Expanding issue, special in Delfanti, Alessandro and Söderberg Johan ed. hacking,” of frontiers Genealogies,” Two Trancing — Hackerspaces and “Hacklabs maxigas, and Maker Carnival (website). http://makercarnival.com/BringMeChina.html Sebastopol, CA: O’Reilly Media. 2010. Steven. Levy, Culture 2012) 28, May (accessed http://www.jus.uio.no/sisu/free_culture.lawrence_lessig/portrait.letter.pdf Down 2004. Lawrence. Lessig, Bruno.Latour, 1993. Princeton, NJ: Princeton University Press. 1986. Woolgar. Steve and Bruno Latour, 1,no3 Forthcoming. (2012). Andie’s Log Andie’s Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition Anniversary 25th - Revolution Computer the of Heroes Hackers: We have never been modern been never have We , “About”, accessed, “About”, May 28,2012.http://partfusion.com/about/ (blog). http://log.andie.se/post/397677855/soldering-is-easy (blog). Free Culture: How Big Media Uses Technology and the Law to Lock to Law the and Technology Uses Media Big How Culture: Free The Cybernetic Brain: Sketches of Another Future Another of Sketches Brain: Cybernetic The Laboratory Life: The Construction of Scientific Facts Scientific of Construction The Life: Laboratory oln Electronic Pollin 76 . Cambridge, MA: Harvard University Press. cesd My 2, 2012. 28, May accessed , Modernism/modernity . Chicago, London: Chicago, . Journal of Peer of Journal 1 . . .

CEU eTD Collection http://www.42.org/~sec/tracking/README 2012. Sec. University Press. http://govcom.org/publications/full_list/oratie_Rogers_2009_preprint.pdf Tag.” 2009. Richard. Rogers, “Laser Tag.” 2011b. https://events.ccc.de/camp/2011/wiki/Laser_Tag “Laser Robfitz. 2011a. https://events.ccc.de/congress/2011/wiki/Laser_Tag Robfitz. to Alternative The Capitalism”. Communism: Advanced and Production Peer to “Peer n.d. Jakob. Rigi, Eric.Raymond, 1992. howto.html Semantics 2011. Steven. Eric Raymond, General and Systems Institute of General Semantics. Non-Aristotelian to Introduction Korzybski: Alfred, In Edition. Fifth the to Preface 1994. P. Robert Pula, https://en.wikisource.org/wiki/Apology_(Plato) 2012. Apology. Plato. Gutenberg. http://www.gutenberg.org/dirs/1/7/2/1726/1726.txt 1999. Plato. University Press. 1972. Plato. A simple tool to play around with the openbeacon packet traces packet openbeacon the with around play to tool simple A Theaetetus Critical Studies in Peer Production Peer in Studies Critical Phaedrus . Translated and edited by Reginald Hackforth. Cambridge: Cambridge Cambridge: Hackforth. Reginald by edited and Translated . The New Hacker’s Dictionary Hacker’s New The . Translated by Benjamin Jowett, ebook produced by SueAsscher.TranslatedProjectJowett,by Benjaminproduced by ebook. h Ed f te ita: Dgtl Methods. Digital Virtual: the of End The h Apology The How To Become A Hacker A Become To How rnltd b ejmn Jwt. Wikisource. Jowett. Benjamin by Translated . 77 , 2.Forthcoming. . MIT Press: Cambridge, MA. ap 21 ulc Wiki Public 2011 Camp . http://www.catb.org/~esr/faqs/hacker- . 83 Pbi Wiki Public 28C3 , Fifth Edition. Englewood, NJ: Englewood, Edition. Fifth , mtra: Amsterdam Amsterdam: Science and Sanity: An Sanity: and Science (documentation). . .

CEU eTD Collection Enemy Lines”,Enemy organised the by Chaos Computer Berlin. Club, “Behind (28C3) Congress Commication Chaos 28th the at Lecture it?. with do to What thing. r0ket that got Philosophy you’ve Now — CCC-Badge Social The r0ket++: 2011. and Zehl. ‘Sec’ Stefan & lilafisch Natural of Journal The Ecology’.” History: ‘Political Latour’s Bruno On “Redivivius: 2010. Adrian. Wilding, Chaos Computer Club, Berlin.https://events.ccc.de/congress/2011/wiki/Lightning_Talks the of meeting annual Lines”, Enemy “Behind (28C3) Congress Communication Chaos 28th the at talk Lightining app. dating r0ket a - okr0ket 2011. Buck. Christian and Tobias Weyand, Hacker York:New Penguin Book. a 2002. Max. Weber, of Sciences Conscience In policy. social and science social in Objectivity 1949. Max. Weber, 2.0 The Espionage Cyber 2010. Foundation. Shadowserver & 1986. Monitor Warfare Mentor. http://www.ghostwheel.com/merlin/businesslike/hacker.html The Press. 2007. Charles. Taylor, Harvard University Press. Taylor, Charles. 1992. Philosophy and Concepts Söderberg, Johan. 2008. self. Management of entrepreneurial the Journal of subjectification the International and Ideology 2005. Alexander. Styhre, , 49-112. Glencoe,IL:Free Press. . http://shadows-in-the-cloud.net/ The Protestant Ethic and the “Spirit” of Capitalism and Other Writings Other and Capitalism of “Spirit” the and Ethic Protestant The Sources of the Self: The Making of the Modern Identity Modern the of Making The Self: the of Sources A Secular Age Secular A Hackering Capitalism Hackering . Cambridge, MA: The Belknap Press of Harvard UniversityHarvard of Press Belknap The Cambridge,MA: . . London: Routledge. 78 6(1). Shadows in the Cloud: Investigating Cloud: the in Shadows 1 (2): 168-173. 1(2): The Methodology of Social of Methodology The . Cambridge, MA: oms and Cosmos .

CEU eTD Collection 28, 2012.http://www.getdigital.de/products/USB_R sale), on (item Launcher” Missile “USB m0dul.” Tag http://partfusion.com/2012/01/laser-tag-m0dul/ “Laser 2012. robert. r0ket wiki contributors. 2011. r0ket tr4cker R0ket —28C3 Tracking. http://longcat.de/ccc/28C3-r0ket-tr4cking/track.html pfletz. 2012.“Launching Rockets with r0kets”.Post on the r0ket soup, 8th. January start. http://r0ket.badge.events.ccc.de/start?rev=1308087273 Getdigital — Your Geek Stuff Supplier Stuff Geek Your — Getdigital 79 at Fso Electronics Fusion Part aur 31st. January . , accessed May accessed ,

CEU eTD Collection Appendix of figures. Figures Communication Camp 2011 (1 of 2) Figure 1. r0ket assembly instructions from Chaos 80 CEU eTD Collection Communication Camp 2011 (2 of 2) Figure 2. r0ket assembly instructions from Chaos 81 CEU eTD Collection Figure 3. Badges from different hacker conferences 82 CEU eTD Collection Figure 4. “m0re knittenart”. from r0ket’s soup, posted on August 14th, 2011. 83 CEU eTD Collection Keyzer, license Creative Commons Attribution­Sharealike 2.0 Generic. Figure 6. Mighty Ohm geiger counter v1.0 hooked up to the r0ket. Photo by Jeff 13th, 2011. soup, posted August case!”. from r0ket’s your own r0ket Figure 5. “reprap 84 CEU eTD Collection Missile Launcher”, Getdigital — Your Geek Stuff Supplie). and donated to the r0ket team by the getDigital store (“USB Figure 7. USB missile launcher, produced by DreamCheeky 85

CEU eTD Collection Part Fusion Electronics. Figure 8. Laster Tag gun from r0ket and other parts by Robert Fitzsimons of 86