this post was submitted on 14 Oct 2023
1212 points (95.8% liked)

Technology

58859 readers
4819 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[โ€“] Omniraptor@lemm.ee 4 points 1 year ago* (last edited 1 year ago) (1 children)

I was reading Bruce Sterling's book the hacker crackdown and it describes the same sense of cultural freedom and possibility, but for phones/computers in the 80s and 90s and of how the open/freewheeling hacker culture got eaten by people turning to moneymaking (crime) and by subsequent government crackdowns. He even explicitly mentions how the same thing happened to the bohemian drug underground of the 60s

So I suspect this cultural pattern is kind of a regular thing, maybe mirroring our economic boom/bust cycles. Iirc both the oughts and the 60s were "on" decades while the 70s and teens had big economic crises.

For me personally the saddest instance of this is the proliferation of cultural and social experimentation in the early Soviet Union followed by well, the rest of soviet history

[โ€“] rwhitisissle@lemmy.world 2 points 1 year ago

That sounds like an interesting book. I really like cybercultural history like that. There's a book with an adjacent topic you might like, actually. It's called The Cuckoo's Egg by Clifford Stoll. He managed to start this massive investigation into a fairly prolific hacker who had infiltrated Berkeley computer systems in the late eighties and whose only "trail" he left behind was a few cents worth of network usage time. It's a true story. Anyway, just a heads up.