What Hackers Yearn

Last updated
What Hackers Yearn
Genre Hacker con
BeginsAugust 8, 2025
EndsAugust 12, 2025
FrequencyQuadrennial (every 4 years), but disrupted by COVID-19
Location(s) Geestmerambacht, Netherlands
Inaugurated1989
Previous event May Contain Hackers (2022)
Website https://why2025.org/

What Hackers Yearn, abbreviated WHY2025, will be a nonprofit outdoor hacker conference and festival in The Netherlands. [1]

Contents

It is part of the quadrennial hacker camps that started in 1989 with the Galactic Hacker Party in Amsterdam, followed by Hacking at the End of the Universe in 1993, Hacking In Progress in 1997, Hackers At Large in 2001, What the Hack in 2005, Hacking at Random in 2009, Observe. Hack. Make. in 2013, Still Hacking Anyway in 2017 and May Contain Hackers in 2022.

Activities

Infrastructure

Volunteering

Related Research Articles

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

In a positive connotation, a hacker is a person skilled in information technology who achieves goals by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Hacking and cyber-attacks are used extra-legally and illegally by law enforcement and security agencies, and employed by state actors as a weapon of legal and illegal warfare.

<span class="mw-page-title-main">Leet</span> Online slang and alternative orthography

Leet, also known as eleet or leetspeak, is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance. Additionally, it modifies certain words on the basis of a system of suffixes and alternative meanings. There are many dialects or linguistic varieties in different online communities.

<span class="mw-page-title-main">Piers Morgan</span> British journalist and television host (born 1965)

Piers Stefan Pughe-Morgan is an English broadcaster, journalist, writer, and television personality. He began his career in 1988 at the tabloid The Sun. In 1994, at the age of 29, he was appointed editor of the News of the World by Rupert Murdoch, which made him the youngest editor of a British national newspaper in more than half a century. From 1995, Morgan edited the Daily Mirror, but was fired in 2004. He was the editorial director of First News from 2006 to 2007. In 2014, Morgan became the first editor-at-large of the MailOnline website's US operation.

Hack and slash, also known as hack and slay or slash 'em up, refers to a type of gameplay that emphasizes combat with melee-based weapons. They may also feature projectile-based weapons as well as secondary weapons. It is a sub-genre of beat 'em up games, which focuses on melee combat, usually with swords. Third-person hack and slash games are also sometimes known as character action games and spectacle fighters.

A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. The white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.

A black hat is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. These acts can range from piracy to identify theft. A Black hat is often referred to as a "cracker".

<span class="mw-page-title-main">DuckDuckGo</span> American software company and Web search engine

DuckDuckGo is an American software company that offers a number of products intended to help people protect their online privacy. The flagship product is a search engine that has been praised by privacy advocates. Subsequent products include extensions for all major web browsers and a custom DuckDuckGo web browser.

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

<span class="mw-page-title-main">Julian Assange</span> Australian editor, publisher, and activist, founder of WikiLeaks (born 1971)

Julian Paul Assange is an Australian editor, publisher and activist who founded WikiLeaks in 2006. He came to wide international attention in 2010 when WikiLeaks published a series of leaks from US Army intelligence analyst Chelsea Manning: footage of a US airstrike in Baghdad, US military logs from the Afghanistan and Iraq wars, and US diplomatic cables. Assange has won multiple awards for publishing and journalism.

<span class="mw-page-title-main">WhatsApp</span> Messaging and VoIP service owned by Meta Platforms

WhatsApp is an instant messaging (IM) and voice-over-IP (VoIP) service owned by technology conglomerate Meta. It allows users to send text, voice messages and video messages, make voice and video calls, and share images, documents, user locations, and other content. WhatsApp's client application runs on mobile devices, and can be accessed from computers. The service requires a cellular mobile telephone number to sign up. In January 2018, WhatsApp released a standalone business app called WhatsApp Business which can communicate with the standard WhatsApp client.

<span class="mw-page-title-main">Pale Moon</span> Open-source web browser

Pale Moon is a free and open-source web browser licensed under the MPL-2.0 with an emphasis on customization. Its motto is "Your browser, Your way." There are official releases for Microsoft Windows, FreeBSD, macOS, and Linux.

<span class="mw-page-title-main">Doxing</span> Publication of the private details of individuals, often on the Internet

Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and without their consent. Historically, the term has been used to refer to both the aggregation of this information from public databases and social media websites, and the publication of previously private information obtained through criminal or otherwise fraudulent means. The aggregation and provision of previously published material is generally legal, though it may be subject to laws concerning stalking and intimidation. Doxing may be carried out for reasons such as online shaming, extortion, and vigilante aid to law enforcement. It also may be associated with hacktivism.

Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Security Service (AIVD) deduced from security camera footage that it is led by the Russian Foreign Intelligence Service (SVR), a view shared by the United States. Cybersecurity firm CrowdStrike also previously suggested that it may be associated with either the Russian Federal Security Service (FSB) or SVR. The group has been given various nicknames by other cybersecurity firms, including CozyCar, CozyDuke, Dark Halo, The Dukes, Midnight Blizzard, NOBELIUM, Office Monkeys, StellarParticle, UNC2452, and YTTRIUM.

CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in investigations of several high-profile cyberattacks, including the 2014 Sony Pictures hack, the 2015–16 cyber attacks on the Democratic National Committee (DNC), and the 2016 email leak involving the DNC.

Pegasus is a spyware developed by the Israeli cyber-arms company NSO Group that is designed to be covertly and remotely installed on mobile phones running iOS and Android. While NSO Group markets Pegasus as a product for fighting crime and terrorism, governments around the world have routinely used the spyware to surveil journalists, lawyers, political dissidents, and human rights activists.

In 2013 and 2014 Internet service company Yahoo was subjected to two of the largest data breaches on record. Neither breach was revealed publicly until September 2016.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the C.I.A.

<i>Hacks</i> (TV series) American comedy-drama television series

Hacks is an American comedy-drama television series created by Lucia Aniello, Paul W. Downs, and Jen Statsky that premiered on May 13, 2021, on HBO Max. Starring Jean Smart, Hannah Einbinder, and Carl Clemons-Hopkins, the series centers on the professional relationship between a young comedy writer and a legendary stand-up comedian. The series received critical acclaim and won accolades including Primetime Emmy Awards for Outstanding Writing, Outstanding Directing, and for Smart, Outstanding Lead Actress, as well as the Golden Globe Award for Best Television Series – Musical or Comedy. In June 2021, the series was renewed for a second season, which premiered on May 12, 2022. In June 2022, the series was renewed for a third season, which is set to premiere on May 2, 2024.

<i>Grand Theft Auto VI</i> Upcoming video game

Grand Theft Auto VI is an upcoming action-adventure game in development by Rockstar Games. It is due to be the eighth main Grand Theft Auto game, following Grand Theft Auto V (2013), and the sixteenth entry overall. Set within the fictional open world state of Leonida—based on Florida—and its Miami-inspired Vice City, the story is expected to follow the criminal duo of Lucia and her male partner.

References

  1. "WHY2025 successor to Dutch hackercamp MCH2022". techizine.eu. March 11, 2024. Retrieved 18 April 2024.