15 Fun Facts About Hackers

Hackers is turning 20. The movie, which stars Angelina Jolie, is about a group of hackers framed for a conspiracy involving embezzlement and a red herring computer virus. While not exactly Oscar-winning material, Hackers is still beloved by many for its dramatic—and sometimes silly—portrayal of hacking and hacker subculture. Here are 15 things you might not know about the film.

1. It was Angelina Jolie’s first leading role in a major film.

Jolie plays Kate Libby, a.k.a. Acid Burn, a hardcore hacker who also happens to be gorgeous and wear tight-fitting clothes. And thus a thousand fantasies were born. Katherine Heigl was offered the role first, but was already scheduled to make Under Siege 2. The studio also reportedly considered Liv Tyler, Hilary Swank, and Heather Graham before giving the part to Jolie. She has complained that the movie typecast her to play “tough women with guns, the kind who wear no bra and a little tank top.” 

2. Jolie and co-star Jonny Lee Miller got married 6 months after the movie.

Miller, who plays Dade “Crash Override” Murphy, met Jolie on the set of Hackers. Both were newcomers to Hollywood and would soon become famous. (Miller was in Trainspotting.) They were married in 1996. According to The New York Times, Jolie wore “black rubber pants and a white shirt with the groom's name written in her blood across the back.” She wrote his name herself with a needle. They were divorced in 1999.

3. The eclectic cast includes Penn from Penn and Teller.

Penn Jillette plays a character named Hal, a reference to 2001: A Space Odyssey. Other cast members include Lorraine Bracco from The Sopranos, Fisher Stevens from The Grand Budapest Hotel, Matthew Lillard from Scream, Wendell Pierce from The Wire, and Jesse Bradford, the hot brother in Bring It On. Felicity Huffman has a small part as a lawyer, and Jennifer Lopez’s ex Marc Anthony plays a Secret Service agent.

4. The Gibson computer is a nod to William Gibson.

The unhackable computer mainframe is called the Gibson after the author William Gibson. The movie draws heavily on the cyberpunk world of Gibson novels like Neuromancer. He also coined the term “cyberspace.”

5. The “hacking” scenes weren’t made with computers.

The computer sequences in the movie are swirly, psychedelic graphics or Tron-like cityscapes. Ironically, director Iain Softley used “conventional methods of motion control, animation, models and rotoscoping” to make these images instead of computer technology. “Computer graphics alone can sometimes lend a more flat, sterile image,” he said.

6. The plot is similar to Superman III.

The movie’s villain, Eugene “The Plague” Belford, writes a program that embezzles small amounts of money from the company at a time, thus amassing millions of dollars in a secret bank account. He tries to distract from his crime by framing the hackers with a computer virus set to capsize an oil tanker. The embezzlement-by-increments plot is called “salami slicing.” In Superman III, Richard Pryor’s character does the same thing. 

7. Emmanuel Goldstein references 1984—and a hacker.

One of the hackers is named Emmanuel Goldstein, who is a character in George Orwell’s novel 1984. It’s also the pen name of the publisher of 2600: The Hacker Quarterly. Screenwriter Rafael Moreu hung out in the 2600 offices in New York while researching the script. He interviewed real hackers, including Goldstein and Mark Abene, a.k.a. Phiber Optik, who’d spent time in prison for hacking.

8. Phone phreaking is a real hack.

The characters in the movie are shown hacking pay phones almost as much as they’re seen on computers. This is a real category of hacking called phone phreaking. For example, a person would play tones with the same frequency phones use to communicate, thus tricking the switch and getting free calls. 

9. Dade uses Eddie Vedder’s name in a social engineering hack.

Social engineering is when a hacker manipulates a person, such as a company employee, to get information to access a computer system. In the movie, Dade tricks a security guy by introducing himself as “Eddie Vedder from accounting” and asking him to read a number off a modem. Vedder, of course, is the lead singer of Pearl Jam. 

10. Rollerblading is a major part of the movie.

Hackers gives a glimpse into the brief period of time when rollerblading was cool. All the characters rollerblade in the movie, which makes them appear to hover and float through the scenes. The Plague, on the other hand, skateboards—a sure sign of evil.

11. A character read from The Hacker’s Manifesto.

In a scene, an agent reads The Hacker’s Manifesto, a real document written by Loyd Blankenship. It was published in PHRACK magazine in 1986. 

12. The Technicolor rainbow books were real.

The hackers test Dade’s knowledge with a series of books that they call the “Technicolor rainbow.” These were real books coveted by hackers because they contained information on how the Internet worked. They were full of scintillating information such as standards for trusted DOD networks. 

13. The Cookie Monster program was also real.

The hackers take over the Gibson computer with a Cookie Monster virus that starts gobbling up all the data. “What do I do?” Hal asks. “Type cookie, you idiot,” replies The Plague. This is based on a real program from the era. Cookie Monster would come up on the screen and demand a cookie. You would type “cookie” and it would go away for a while. If you typed “Oreo,” it went away for a longer period of time. 

14. "Arf Arf!" is a real hacker thing.

When the hackers prevail and gain control of the Gibson, a notice comes up on the screen that says “Arf! Arf! We gotcha!” This is a reference to a program called EGABTR, which would delete your information and then bring up the phrase “Arf! Arf! Got you!” 

15. The movie is a cult classic.

Hackers made only $7.6 million at the box office and was panned by critics. By comparison, The Net, starring Sandra Bullock, came out the same year and grossed $50.7 million. Yet Hackers is still referenced by a whole generation of computer geeks today, 20 years later. Some might even say it was ahead of its time

IBM Unveils the World's Smallest Computer

The latest piece of technology to be zapped by the shrink ray of progress was recently revealed during IBM Think 2018, the computer giant’s conference that offers a sneak preview of its latest hardware. According to Mashable, IBM’s newest computer is so small that it could disappear inside a salt shaker.

An IBM computer on a motherboard and atop a pile of salt

That tiny black speck on the right? That’s the one. (It's mounted to a motherboard on the upper left of the left photo.) IBM claims the computer has several thousand transistors and has roughly the same kind of operating power as a processor from 1990. While that may not sound impressive, any kind of artificial intelligence in a product that small could have big implications for data management. IBM believes it has a future in blockchain applications, which track shipments, theft, and non-compliance. Its tiny stature means it can be embedded into materials discreetly.

As an example, IBM noted that the processor could be injected into a non-toxic magnetic ink, which can then be stamped on a prescription drug. One drop of water could make the ink visible, letting someone know it’s authentic and safe to take.

The tiny little motherboard and its processors are still in the prototype stages, but IBM predicts it could cost less than 10 cents to manufacture. The company hopes it will be commercially available in the next 18 months.

[h/t Mashable]

Apple Wants to Patent a Keyboard You’re Allowed to Spill Coffee On

In the future, eating and drinking near your computer keyboard might not be such a dangerous game. On March 8, Apple filed a patent application for a keyboard designed to prevent liquids, crumbs, dust, and other “contaminants” from getting inside, Dezeen reports.

Apple has previously filed several patents—including one announced on March 15—surrounding the idea of a keyless keyboard that would work more like a trackpad or a touchscreen, using force-sensitive technology instead of mechanical keys. The new anti-crumb keyboard patent that Apple filed, however, doesn't get into the specifics of how the anti-contamination keyboard would work. It isn’t a patent for a specific product the company is going to debut anytime soon, necessarily, but a patent for a future product the company hopes to develop. So it’s hard to say how this extra-clean keyboard might work—possibly because Apple hasn’t fully figured that out yet. It’s just trying to lay down the legal groundwork for it.

Here’s how the patent describes the techniques the company might use in an anti-contaminant keyboard:

"These mechanisms may include membranes or gaskets that block contaminant ingress, structures such as brushes, wipers, or flaps that block gaps around key caps; funnels, skirts, bands, or other guard structures coupled to key caps that block contaminant ingress into and/or direct containments away from areas under the key caps; bellows that blast contaminants with forced gas out from around the key caps, into cavities in a substrate of the keyboard, and so on; and/or various active or passive mechanisms that drive containments away from the keyboard and/or prevent and/or alleviate containment ingress into and/or through the keyboard."

Thanks to a change in copyright law in 2011, the U.S. now gives ownership of an idea to the person who first files for a patent, not the person with the first working prototype. Apple is especially dogged about applying for patents, filing plenty of patents each year that never amount to much.

Still, they do reveal what the company is focusing on, like foldable phones (the subject of multiple patents in recent years) and even pizza boxes for its corporate cafeteria. Filing a lot of patents allows companies like Apple to claim the rights to intellectual property for technology the company is working on, even when there's no specific invention yet.

As The New York Times explained in 2012, “patent applications often try to encompass every potential aspect of a new technology,” rather than a specific approach. (This allows brands to sue competitors if they come out with something similar, as Apple has done with Samsung, HTC, and other companies over designs the company views as ripping off iPhone technology.)

That means it could be a while before we see a coffee-proof keyboard from Apple, if the company comes out with one at all. But we can dream.

[h/t Dezeen]


More from mental floss studios