Do what thou Wilt shall be the whole of the Law.
Another bit of hacker history for you, if you didn't live through it:
Remember the Morris worm of 2 November 1988?
The one that helped inspire one of the movies hackers love to hate, _Hackers_?
The Morris worm used a couple of exploitation techniques that we consider largely obsolete these days, namely, buffer overflows and stack corruption for remote code execution. In 1988.
In 1988, hacking was pretty much "guess lots of passwords until you get lucky." That's it. That's what we had.
rtm (Robert Tappan Morris, Jr.) was writing RCE exploits in 1988. In comparison, _Smashing the Stack for Fun and Profit_ by Aleph1 (http://www-inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf) was published in Phrack issue 49 (8 November 1996). Think about that for a moment. He was about seven years ahead of the state of the art for the hacker community.
RTM's father, Robert Morris senior worked for NSA between 1985 and 1994. He helped write some of the security standards that we take for granted these days, whether or not we realize that they were published in the Rainbow Books. He was also a Chief Scientist while at NSA.
There is an excellent chance (more likely a certainty) that most of the exploitation techniques that the hacker community takes for granted were discovered, perfected, and weaponized years before they were effectively rediscovered by the underground (or the professional infosec community). rtm certainly knew about some of those techniques, though exactly how remains a matter of speculation.
Are you okay with that state of affairs?
Love is the Law, Love under Will.
> "guess lots of passwords until you get lucky."
born twenty years too late, I just knew it
A bunch of technomancers in the fediverse. Keep it fairly clean please. This arcology is for all who wash up upon it's digital shore.