@The_StarHack3r Lesson 1: Being a Hacker – Choose a handle for yourself

handlepetalocsta

In Lesson 1: Being a Hacker there’s a section that talks about handles and the different reasons that hackers use them. In sum, hackers use them:

  1. For fun (<– this mostly applied to hackers in the earlier days who were just kids having fun)
  2. To protect themselves (as a tool that allows them to be anonymous<– No pun intended there)
  3. To promote free speech

This last one is near and dear to me. I used the handle PetaLocsta not as a hacking handle but as my handle on the hip-hop music scene. Being a rapper who did not by any means conform to the status quo and always spoke the truth about the reality of what I witnessed and lived in some of the harshest ghettos of America, quite naturally I had a tendency to tick a lot of people off by the manner in which I expressed myself. So to separate my art from who I was outside of hip-hop, I chose a handle.

Here’s the thing about handles, it’s not only the utility of using one but also it’s beauty. Beauty in that it allows us to be ourselves without the worry of retribution from a well-meaning, but misunderstanding society.

However, as the above referenced article points out, there comes a time when you’ll find that as you get older and respected in computer security circles that you don’t need your handle anymore. That you can use your real name and be taken seriously. And although I’ve always used my real name, I feel that the handle PetaLocsta is not an adequate representation of who I am as a software developer. Hence:

greyhathandle

Choosing @greyhatdev and @The_StarHack3r was just as liberating as it was the day I choose PetaLocsta. The ideal handle is one that never gives you away, but says something about your interest and personality. In my case, one could argue that I’ve given myself away by revealing my real name. If I was aiming for anonymity that would be a valid indictment. However, in my case by revealing my real name I’m establishing authenticity. By simultaneously tagging a handle to my real name, I’m providing a layer of shelter between the real person and my online identity. Thus, granting a well-rounded (in my opinion) glimpse into my interest and personality.

You may or may not choose to use a hacker handle, but you should think about it.
As Dzen notes in the above referenced article, you may have a legitimate reason to maintain an alternate
identity.
So what would your handle be? Hack On, gents!
0 0 votes
Article Rating
0
Would love your thoughts, please comment.x
()
x

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Share This