Hackers of the Renaissance

Hackers of the Renaissance

Hackers of the Renaissance



Hacking gets a bad rap. When most people hear the word, they think of malware, identity theft, espionage, and apology emails sent to friends in the embarrassing aftermath of a compromised Facebook account. Try this: do a Goggle Image search for the word “hacking.” See the skulls, Guy Fawkes masks, padlock icons and the images of green-tinted code lifted straight from the dystopia that is The Matrix. Message received: hacking is very scary.



Google Image Search for the word “hacking.” Scary.


Where does this popular perception come from? For over thirty years, outlaw nerds have hacked on the big screen: TRON and War Games gave us the image of the young rebel hacker skirting heavy security with a few effortless keystrokes, archetypes which evolved into The Girl with the Dragon Tattoo‘s Lisbeth Salander, badass hacker. Even stock espionage and heist films require a team member to bypass any security system by clacking away at a laptop (see the entire Mission: Impossible franchise). Real-world events only perpetuate this hacker-as-criminal image. Cindy Cohn, Legal Director for the trailblazing Electronic Frontier Foundation, argues that the Bradley Manning WikiLeaks case is part of a prosecutorial trend toward exploiting irrational fears about computers:


The decision today continues a trend of government prosecutions that use familiarity with digital tools and knowledge of computers as a scare tactic and a basis for obtaining grossly disproportionate and unfair punishments. Let’s call this the “hacker madness” strategy. Using it, the prosecution portrays actions taken by someone using a computer as more dangerous or scary than they actually are by highlighting the digital tools used to a nontechnical or even technophobic judge.


So: hackers are lone, outlaw agitators who use technology as a weapon. And because most of us use our computers like we use our cars—we know enough to make them run, but not enough to understand how they work—hackers seem dangerous for what we imagine they can do with their unchecked powers. Right? Not exactly. First of all, this is a narrow definition of hacking, as computer intrusions like these are typically labeled cracking. Second, they have little to do with the Hacker Ethic formulated at MIT in the 1950s and 60s. Journalist Steven Levy, in his 1984 history of the rise of hacker culture, describes the Hacker Ethic this way:


Access to computers—and anything that might teach you something about the way the world works—should be unlimited and total. Always yield to the hands-on imperative! Hackers believe that essential lessons can be learned about…the world from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things.


Just a few decades ago, hacking wasn’t about computer code–it was a code of conduct. The Hacker Ethic promoted access in the service of curiosity and invention. In 2013, however, this starry-eyed manifesto seems romantic, or worse, naive. Artistic appropriation, a pillar of Modern Art for over a century, is now prosecuted as plagiarism. Patent Trolls aggressively abuse the patent system for profit, stifling innovation. Benevolent hackers, like the late Aaron Swartz, who believe in ethical disclosure, are persecuted as criminals.


We need to reinvent our cultural imagination of the hacker. Being a student of history, I propose we start looking further into the annals of the past, all the way back to the Renaissance, to find our hacker forebears. Four centuries ago, information was as tightly guarded by intellectuals and their wealthy patrons as it is today. But a few episodes around 1600 confirm that the Hacker Ethic and its attendant emphasis on open-source information and a “hands-on imperative” was around long before computers hit the scene. First, there was Galileo.




Galileo, Sidereus Nuncius, 1610.


OK, so Galileo didn’t invent the telescope. That honor goes to Dutch spectacle maker Hans Lippershey. In 1608, Lippershey applied for a patent for a device “for seeing things far away as if they were nearby.” Although denied based on other concurrent patent claims, the application was notable enough to warrant brief mention in a diplomatic publication announcing new relations between The Netherlands and the Kingdom of Siam. Inspired, scientists tested their own telescope inventions based solely on the description of a “Dutch Perspective Glass.”


In 1610, Galileo published Sidereus Nuncius (The Starry Messenger), describing his telescope and observations of the Moon. Simultaneously, other continental astronomers hurried to make telescopes and point them at the heavens. If Lippershey’s patent had been granted, or if the Dutch had decided to omit this tiny announcement of the application, the history of science might have been different. Perhaps Galileo would have been a minor figure in science; another heretic with crazy ideas. Or the Dutch might have had a head-start on astronomy, physics, and warfare. The public disclosure of the telescope, however vague, literally moved the Earth, yielding proof of the heliocentric model of the heavens.



In the mid 1500s, stellar and planetary data were woefully inaccurate. When Tycho Brahe undertook a serious, from-scratch measurement of the nighttime sky, he was the first to do so in almost 300 years. So it was understandable he was incredibly protective of his data. However, Brahe entrusted his student, Johannes Kepler, with the completion of new star charts for publication–and twenty-six years after Brahe’s death, Kepler published them, calling them the Rudolphine Tables. Instead of a sequence of dates with corresponding planetary positions, Kepler’s tables performed more like a computer. Using the provided formulas and instructive examples, users could calculate future planetary positions.



Kepler (left), Brahe (right), and The Rudolphine Tables, the original open-source program.


These tables are an open source tool, perhaps the very first. The data–and formulas required to convert it into astronomical information—empowered scientists to pursue their own research and observations. Pierre Gassendi used the tables to predict a transit of Mars in 1631, and in 1639, Jeremiah Horrox predicted a transit of Venus. Kepler’s data was for the benefit of science, not personal profit.



You’ve probably seen those street-art illusions where a sidewalk chalk drawing looks three-dimensional when viewed from a specific angle. The technique is called anamorphosis, and it dates back to the Renaissance. Hans Holbein famously used the effect in his painting, The Ambassadors (1533), where the enigmatic blob in the foreground is revealed as a skull only to viewers standing in the correct position.



Hans Holbein’s painting, The Ambassadors, with its anamorphic skull.


The illusion was used to amaze, but it was also a useful technique for concealing sensitive material. For over 150 years, anamorphosis was used as a secret code to protect dissenting political messages, unpopular religious ideas, and even taboo sexual imagery. Until Jean François Niceron gave it all away.


A talented mathematician and artist, Niceron revealed for the first time the geometry behind the illusion. Already renowned for his illusions of sacred figures in churches, Niceron published La Perspective Curieuse (The Curious Perspective) in 1638. On top of explaining the technique, Niceron actually illustrated himself in the act of making his most famous illusions. He was a magician who revealed his own tricks–so that we could all do magic.



Jean François Niceron depicting himself in the act of drawing an anamorphic image, from La Perspective Curieuse.


Ever wonder why the Mercator World Map hangs in every classroom despite its egregious distortions of scale? Well, its significance isn’t about land area. It’s about navigation. The cylindrical projection method that Gerardus Mercator introduced in 1569 flattened the earth into parallel meridians, giving sailors regular and measurable reference markers for straight-line routes across the oceans. The map saved lives. Not surprisingly, its importance—and monetary value—motivated Mercator to keep his projection formula secret.


Until Edward Wright hacked it. And improved it. And, like a true hacker, published the formula. His 1599 publication of Certaine Errors in Navigation broke Mercator’s cartographic monopoly.



Edward Wright, Certaine Errors in Navigation, 1599. Frontispiece (left), and his more precise cylindrical projection map of the world (right).


Traveling to the Azores in 1589 under orders from Elizabeth I, Wright broke Mercator’s code with practical, hands-on experience at sea. Combined with his mathematical training, he produced tables with data and instructions for constructing a more accurate cylindrical projection. More than a new, more accurate map, Certaine Errors in Navigation was—like Kepler’s Rudolphine Tables—a computer for producing your own map. Wright’s hack gifted sailors with abilities beyond sea-borne experience. Instead of Mercator’s consumers, they were now self-sufficient cartographers at sea.


Edward Wright's planisphere aided sailors in constructing their own cylindrical projection maps.

Edward Wright’s planisphere aided sailors in constructing their own cylindrical projection maps.


Wright understood the Hacker Ethic’s hands-on imperative, to the benefit of all who used his tools. He reminisces in the preface to Certaine Errors that through the expedition he “was first moved… to divert my mathematical studies from theoretical speculation in the Universitie [sic], to the practical demonstration of the use of navigation.” To wit, Wright went from thinker to hacker.


Edward Wright reverse engineered, improved, and shared a secret code. You may not have heard of him before, but he is one of history’s great hackers; a perfect embodiment of the Hacker Ethic.



Before Galileo, Kepler, Wright, Niceron and others, discoveries and inventions were kept secret. Protection of new insights was regulated through coded publications, legible only to invited insiders. The very idea of peer-reviewed publishing—a cornerstone of academia today—didn’t exist until 1665, with the launch of the Philosophical Transactions of the Royal Society.


The innovators of 1600 were hackers before the word existed; they proposed open sharing of ideas for the benefit of humanity. Isaac Newton, Robert Hooke, Descartes, and the other scientists of the late 1600s could not have inaugurated the greatest scientific innovation of all time—the invention of modern science itself—without the Hackers of the 1600s. The Renaissance’s secretive structure was hacked, and it inspired the Scientific Revolution.


Hacking is a good thing. Hackers ensure we don’t sit still with what we have; they know there’s always more to discover. They extract kinetic energy from the inertia of achievement. We risk stifling discovery when we claim absolute ownership of ideas. We risk our future when we aggressively guard what we believe, often falsely, to be ours. And we risk everything when we persecute the curious and inventive, labeling them as criminals. Let’s restore hacking to its proper place: as a noble tradition dating back hundreds of years, one which kickstarted our modern world. Who knows what wondrous revolution awaits if we just get hacking?


  1. john 8 months ago

    An interesting viewpoint. I guess this explains the prevalence of “Life-Hack” posts all over the web.

  2. Ken Baumann 8 months ago

    Hi, Pablo! Thank you for this. This feels cogent, fair, broad, and provocative. The final paragraph makes the cynic in me want to go, “But! But! But!” but I’ll save that for another time.

  3. Trevet 8 months ago

    “Before Galileo, Kepler, Wright, Niceron and others, discoveries and inventions were kept secret.” What a load of silly nonsense this and the entire post is. Please educate yourself on the history of pre-modern science before filling the ether with egregious falsehoods.

    • Codewizard 8 months ago

      Aristotle just called, and he’s pissed. Sophocles is sulking, and the cavemen think that they might use fire to get their point across.

    • mabus83 8 months ago

      The writer is generalizing, but there are plenty of other supporting historical examples. Pythagoras and his followers suppressing knowledge of irrational numbers and perfect solids comes to mind. Legend has it they killed to protect these mathematical secrets. Also, if you take the pre-modern mindset of religion as knowledge, the Catholic Church’s banning of vulgate translations of the Bible and religious treatises for the laity could be analogous to DRM.

    • Robert Little 8 months ago

      Hmmm. The Portuguese felt compelled to keep their sea routes secret. They also sought to control the design of their primary vessel used for exploration, the caravel, and even went as far as to say that other vessels were incapable of making the voyages (on one occasion, even destroying round ships that had indeed made a voyage to prevent their return). The Portuguese wanted to put a monopoly on sea voyages to the east. Leave it up to those pesky Spaniards to not only copy the caravel, but to follow the advice of a Genovese dreamer to completely blow the lid off that story, warts and all. Perhaps the writer was generalizing a bit, but there is enough compelling evidence to support his basic notion.

  4. Bob 8 months ago

    The last paragraph is so sweepingly general I have to ask the question. If someone has a great idea but it has absolutely no protection from “hacking”, exactly what motivation do they have to bother sharing it with the world? Nobility? The greater good? Five minutes of fame? I suggest an article on human nature should be the next link in this chain.

  5. Kimmo 8 months ago

    Pff to the cynics; this article nails it.

    I couldn’t care less for petty arguments over the historical details; Garcia grasps and conveys a fundamental truth that far too many in our so-called global ‘economy’ appear wilfully blind to, to the detriment, and eventual peril, of us all.

    The obscene hubris and greed of so many would-be gatekeepers, wallowing in their technical illiteracy (see the latest efforts on DRM in ebooks for an example), is perfectly analogous to so many trolls living under bridges and terrorising the traffic for tolls.

    This sort of stupid crap is totally not the way to go; the divide-and-conquer ethos promoted by elitist scumbags is far worse than systemically unjust; it demeans and diminishes us all. There’s a whole world of win/win waiting to be claimed as our birthright, if only we can glimpse the immense potential of generously allowing for folks’ intrinsic motivations to come to the fore, rather than our vile and thoroughly undignified, constantly squabbling SNAFU of a status quo dependent upon horribly inefficient extrinsic motivation.


  6. When it comes to shopping for automobiles, the first place potential buyers
    go is the Internet and then visit their local
    dealership. You can do this by adding another offer
    during their order process. Take good notes on the information that you find and implement the internet marketing strategies that are working for your competitors.

  7. maps play youtube 1 month ago

    You can find some other purpose too, the
    disfavor online dating sites, like that you base ones
    wisdom on a several pictures, an account and a few im conversations the two of you had.
    When you find such a guy or girl, just contact them. Include digital photos of favorite
    outdoor scenes, pets, flowers, cars, silly moments, your computer corner or laptop,

  8. If you’re an entrepreneur, you can think of something.
    Sometimes affiliates are paid incentives for exceeding targeted baselines.

    Always start with a single, hot and sophisticated product to
    gain good results.

  9. First off I want to say wonderful blog! I had a quick question that
    I’d like to ask if you don’t mind. I was curious to know how you center yourself and clear your thoughts prior to
    writing. I have had a tough time clearing my mind in getting my
    ideas out there. I do enjoy writing but it just seems like the first 10
    to 15 minutes are lost just trying to figure out how to begin.
    Any recommendations or hints? Many thanks!

  10. whoah this weblog is fantastic i like studying your posts.
    Keep up the good work! You understand, a lot of individuals are looking around for this info, you could aid them greatly.

  11. The reviews are categorized into Indonesian, adult, online, Russian,
    Spain, senior, Lesbian, Gay dating and relationships. And finally, women often make the mistake
    of turning a deaf ear on a guy’s signals. In an effort to steer clear of a probably hazardous or discouraging encounter with cost-free online dating sites, it truly is suggested that women seek membership with a lot more private

  12. WalterPl 1 month ago

    Write more, thats all I have to say. Literally, it seems as though you relied on the video to make your point. You definitely know what youre talking about, why throw away your intelligence on just posting videos to your blog when you could be giving us something enlightening to read?

Leave a reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Current day month ye@r *