Internet cultureInternet culture is a quasi-underground culture developed and maintained among frequent and active users of the Internet (netizens or digital citizens) who primarily communicate with one another online as members of online communities; that is, a culture whose influence is "mediated by computer screens" and Information Communication Technology, specifically the Internet. Internet culture arises from the frequent interactions between members within various online communities and the use of these communities for communication, entertainment, business, and recreation.
Guy Fawkes maskThe Guy Fawkes mask (also known as the V for Vendetta mask or Anonymous mask) is a stylised depiction of Guy Fawkes (the best-known member of the Gunpowder Plot, an attempt to blow up the House of Lords in London on 5 November 1605) created by illustrator David Lloyd for the 1982–1989 graphic novel V for Vendetta. Inspired by the use of a mask representing Fawkes being burned on an effigy having long previously had roots as part of Guy Fawkes Night celebrations, Lloyd designed the mask as a smiling face with red cheeks, a wide moustache upturned at both ends, and a thin vertical pointed beard, worn in the graphic novel's narrative by anarchist protagonist V.
DoxingDoxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet. Historically, the term has been used interchangeably to refer to both the aggregation of this information from public databases and social media websites (like Facebook), as well as the publication of previously private information obtained through criminal or otherwise fraudulent means (such as hacking and social engineering).
CypherpunkA cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s. Until about the 1970s, cryptography was mainly practiced in secret by military or spy agencies.
Information wants to be free"Information wants to be free" is an expression that means either that all people should be able to access information freely, or that information (formulated as an actor) naturally strives to become as freely available among people as possible. It is often used by technology activists to criticize laws that limit transparency and general access to information. People who criticize intellectual property law say the system of such government-granted monopolies conflicts with the development of a public domain of information.
Crypto-anarchismCrypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks. In his 1988 "Crypto Anarchist Manifesto", Timothy C. May introduced the basic principles of crypto-anarchism, encrypted exchanges ensuring total anonymity, total freedom of speech, and total freedom to trade.
LulzSecLulzSec (a contraction for Lulz Security) was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed responsibility for taking the CIA website offline. Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks.
Stop Online Piracy ActThe Stop Online Piracy Act (SOPA) was a controversial proposed United States congressional bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Introduced on October 26, 2011, by Representative Lamar Smith (R-TX), provisions included the requesting of court orders to bar advertising networks and payment facilities from conducting business with infringing websites, and search engines from linking to the websites, and court orders requiring Internet service providers to block access to the websites.
Electronic civil disobedienceElectronic civil disobedience (ECD; also known as cyber civil disobedience or cyber disobedience) can refer to any type of civil disobedience in which the participants use information technology to carry out their actions. Electronic civil disobedience often involves computers and the Internet and may also be known as hacktivism. The term "electronic civil disobedience" was coined in the critical writings of Critical Art Ensemble (CAE), a collective of tactical media artists and practitioners, in their seminal 1996 text, Electronic Civil Disobedience: And Other Unpopular Ideas.
SQL injectionIn computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed.