As Hackers Go, CMU Students in It to Win

By Conte, Andrew | Tribune-Review/Pittsburgh Tribune-Review, February 11, 2013 | Go to article overview

As Hackers Go, CMU Students in It to Win


Conte, Andrew, Tribune-Review/Pittsburgh Tribune-Review


You know all that stuff that keeps you up at night -- paying the bills, wanting a raise, buying a bigger home or a nicer car?

George Hotz, among the world's best known computer hackers, doesn't share your concerns.

It's a little odd, he acknowledges, to think that becoming the first person to break into and alter an iPhone was easy but that holding down a 9-to-5 job seems unfathomable. "It's a little defect in your mind that makes you want to sit there and stick it to the machine all night," he says.

Hotz, 23, a Carnegie Mellon University sophomore from Glen Rock, N.J., plays as a member of CMU's capture-the-flag team, going up against computer researchers around the world to break code and find guarded information.

Played for skill and prize money, the games have real-world implications for everyone.

Twitter this month said hackers compromised 250,000 user accounts. Recent attacks kept customers from accessing accounts at PNC Bank and other U.S. banks. The New York Times and other media outlets say the Chinese hacked their websites, and top U.S. military officials have warned that the Department of Defense cannot protect itself.

Often vying against competitors who work in defense industries, CMU students ranked first in the world in 2011 but slipped last year to second behind a team from Russia that -- as Hotz will tell you -- maintains the online rankings.

After graduation, some of the students plan to work in computer security research or write software. Breaking into other people's code can help them avoid similar mistakes, said Alex Reece, 21, a senior from Orlando, Fla., who has lined up a job to write software for a San Francisco-based data management firm.

"Because I played the role of the attacker so much, I'm aware of these common weaknesses," Reece said.

Hackers often divide themselves into the good, who seek vulnerabilities to patch before someone can exploit them, and the bad, who try to scam victims and steal money. The truth is, they all fall into a gray area, Hotz said. He follows his own Golden Rule: Do unto others ... and don't be a jerk.

"There is no objective morality," he said.

Wearing a black sweater, blue jeans and duck boots, Hotz opens his wallet and flips out a fake Northwestern University ID that he made to get into football games and the library when he lived in Evanston, Ill., but did not enroll in classes.

So this time he's committed to graduating from college?

"Who said I'm getting an undergraduate degree?" he said with a comical indignity. "I'm just here (at CMU) to chill."

"Free Geohot"

On a wintry Tuesday afternoon, Hotz sits in the "Cluster" -- an oval-shaped room in CMU's Gates Center for Computer Science. White marker boards cover the walls, and graffiti covers them: detailed drawings of a mermaid, a dragon and the man in the moon, next to complicated algorithms and code diagrams.

"You can log out anytime you want but you can never leave," is scrawled near the top of one wall where it cannot easily be erased.

Hotz and about a half-dozen others play Minecraft, a computer game popular with middle-schoolers that allows players to develop their own universes by building homes and landscapes. The CMU students play an altered version that allows them to add nuclear reactors.

Reece sits on the floor, a backpack at his feet and an Apple laptop resting precariously on his knees as he leans against the wall.

Hotz breaks things to see how they work. Using the online name "Geohot," he was, at 17, the first person to hack into an iPhone so that owners could choose their cellphone carrier and add content. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

As Hackers Go, CMU Students in It to Win
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.