January 7, 2025
January 7, 2025
July 10, 2024
October 1, 2013
Hackers are an interesting bunch and somewhat predictable, if I may be so bold as to generalize. Before Defcon this summer, I asked all the hackers I know to participate in a survey about their opinions on a variety of security industry-related topics, and I asked them to spread the word through social channels. It’s taken me a month, but I’ve finally tabulated the results. Many of the findings aren’t shocking, but the passion the respondents have for their work is, frankly, inspiring.
The first thing I learned is that hackers don’t like long surveys. Actually, few people do. Maybe I needed to offer a reward for completing it. Granted, the survey had 34 questions, most multiple choice with a number of them soliciting essay answers. A whopping 96% of the respondents who started the online survey finished it. So, I’d like to say a heartfelt “Thank You!” to those 53 people who took the time to answer all the questions.
And before I dive into the results, I should probably get the demographic data out of the way first because I’d probably be seeing somewhat different responses from younger or less experienced hackers. The respondents’ ages ranged from a low of 27 years to a high of 68, with most in the 25-35 range and a median of 39. The average number of years of experience was 13.5, nearly evenly divided between researcher, IT professional, engineer/programmer and VP-level executive, and more than one-third work at a security provider. So this is a very savvy crowd. Now for the results…
If I were to create a word cloud, “Encryption” would be 36-point font size, at least. It’s the most important thing hackers said they do to protect their data, along with using strong and diverse passwords — both eliciting 75% of the responses with multiple choices possible, followed by use of VPN and safe Web browsing tools. Encryption, specifically HTTPS by default, along with passwords, public awareness and computers running outdated versions of Windows are considered the most solvable security challenges.
As far as new technologies they are excited about — top answer was…. Encryption! But it’s got to be made easier to use in order for it to be more widely adopted, they said. Other technologies and trends they like: IPv6, DNSSEC, the maker/hacker movement, “virtualization to move exploitable systems away from the data,” self-diagnostic troubleshooting tools and “Steve Mann’s space glasses.”
And they’re not really too jaded, although they like to act like it. Asked how optimistic they are that the work they do is making a difference, 40% said they are “pretty satisfied,” with an average of 20% each responding “very optimistic,” “neutral” and “cynical.” And a couple of astute quotes: “Teachers make a difference. I just increase shareholder value,” and “All I can do is inform, but who listens?”
Asked what they like about their jobs, the top responses were “the challenge,” and “solving puzzles” or “solving problems,” although they are also fond of their hacker comrades, the fast pace of the industry and that it’s never boring. “It’s an ever changing field, like a never-ending playground and I think compared to most other industries it will still be as colorful in like 20 years from now,” one wrote.
They might like their jobs, but not everything is hunky dory either. Sixty-five percent said the industry has high levels of stress and burnout. Asked for their opinion on allegations of sexism and sexual harassment at Defcon, half said “it happens and is inexcusable,” 37.5% hadn’t seen it but are sure that it happens, and 6% each said “boys will be boys,” and “women get the same respect as men.” Clearly, there’s a gender gap at the show and even a female journalist who has attended Defcon for a dozen years stereotypes — I failed to ask respondents to this survey what gender they are. Next time, the options will be “male,” “female,” and “transgender,” to be all inclusive.
Asked which disclosure practice they follow, 40% said “it depends,” 31% said “responsible,” 14% said “coordinated,” 10% said “none,” and 4% said “full.” As for their primary ethical principle, the answers, as you can imagine, were interesting: “Do what sucks least;” “target technology, not people;” and “principle of multiple discovery, that it is unlikely I am the only one to have found the bug, and unlikely to be the last to find it before it is patched.”
I was curious about their thoughts on the marketplaces for Zero-Day threats that have cropped up and governments being among the big buyers. Here’s what they had to say about that: “The intelligence community is now stockpiling them like Twinkies,” Today, exploits equate to either big sums of money (or) going public, which can lead to jail time… so our government has, in effect, destroyed full disclosure and built a secretive community that holds exploits much closer to the vest … It’s no longer an open, sharing community like it used to be.”
I asked about the concept of “hacking back,” which has moved from the realm of fantasy to probability in some security circles. More than half said “proceed with caution,” 40% said “wildly irresponsible,” and only 9% said “it’s my cyber Second Amendment right.”
Not surprisingly, there was a lot of anger directed at the U.S. government over the NSA surveillance that has come to light as a result of Edward Snowden’s leaks. Eighty-five percent feel the answer is to build technology solutions that counter surveillance, with 66% saying work within the existing political system and slightly fewer preferring online and offline activism. They were almost equally divided on whether there is a way for the average citizen to restore his/her privacy.
Meanwhile, they weren’t exactly fans of the Anonymous activist movement, either. Nearly 60% said they considered Anonymous “confused kids,” 33% said “criminals and miscreants,” and only 9% said “digital heroes,” with about 70% saying their views about the movement had not changed over the past few years.
Finally, another emotionally charged topic for the hackers is the suicide of hacker and activist Aaron Swartz, who faced charges under the Computer Fraud and Abuse Act. In general, many respondents said the tragedy shows the need for support for the community and for the Electronic Frontier Foundation, and reform of the CFAA. One respondent wrote: “This really hit home. If my childhood had gone slightly differently, I could have been Swartz.”
ADDENDUM: One of the respondents said it would be helpful to know exactly what the questions were to understand the context of the responses. While I was grabbing the questions from the survey to include here I figured out how to create charts, so they are included now as well.
December 9, 2024
December 10, 2024
November 21, 2024
November 12, 2024