Design a site like this with
Get started

anonymous resistance

Firstly, hats off to any form of activists who use their time proactively for something they care about. However, something that caught my attention from this weeks topic was ethical hacking. When I first saw the term, I thought it was like ethically killed chickens or ethical vegan activists stealing pigs – but for computers.

Spoiler – not as cool as it looks

It is in fact not that, but it is a legal form of hacking to test the security of computers and softwares that are going to be released to the general public.

This interested me because it almost feels like when smokers switch the cigarettes – to get the diluted feeling.

So, I made a flowchart to decide if you have the activist burning heart to be a real hacker, or, if you should follow the ethical hacking path and not disclose any crazy government secrets.



13 thoughts on “anonymous resistance

Add yours

  1. I think your flowchart is the coolest thing. I also like how took a different approach when talking about hackers. The fact that there are some good people out there make it a little less scary. These hackers are also known at the White Hat Hackers. They are the ones who try to help businesses instead of bringing them down. This link explains the different hats which i think is pretty cool


  2. The term sounds like it identifies with the morals behind slaughtering animals. I agree with what you expressed in your blog entry in commending activist in caring about an issue they are passionate about. Although the hacktivist group Anonymous goes down the course of illicit activities and assaulting the government, the data they reveal is frequently scary and alarming and it’s unnerving to think what else the government could be stowed away from the publics eyes.

    The hyperlinks you’ve utilised throughout your page is incredible in helping visitors reveal more information on the subject you’ve examined, I like how you’ve compared a real-life situation of smoking and used it as an applicable model.

    The remediation you’ve made for the current week is both imaginative and innovative and uses what we’ve learned uniquely. I haven’t seen other students attempt this previously and are something I may look further into myself. An article I discovered that sums up the topic analyses the components that add to Anonymous’ contemporary international fore and its ability to gain attention, its strong and conspicuous feel, its participatory openness and the deception that surrounds it.


  3. First off, I want to say I love your blog as a whole Paige, it’s so creative and immediately draws me to your posts. The flowchart is what caught my attention first in this particular post, great work with it. It made it so much easier to understand what you were talking about. The reading by Gabrielle Coleman called “hacker, hoaxer, whistleblower, spy” further elaborates on what you are talking about, I think you would find it closely correlates with what you are talking about. One chapter talks about the group “anonymous” and I think you would find it to be an interesting read. Keep up the great work!


  4. Hey, this blog was awesome! I love that you decided to use a flowchart to explore what type of hacker people could be, it’s so interesting! The different type of hackers is scary because there is so many out there, I hadn’t heard of the ethical hacking before this week. The Anonymous hacktivist group is one that doesn’t hold back from the information they leak out, and they do typically go against the government. Great post!


  5. I’ve never seen a flow chart done as a remediation!! I love this! Ethical hacking is far more wholesome to focus on then the privacy breaches, data selling and information leaking that does go on 😦 … I dug around for aggges trying to find a video this blog post reminded me of and I finally found it …. An example of an ethical hacker warning an individual that people could breach his smart home.


  6. I adore this blog post! You’re very effective in conveying complicated subject matter in a way that is both relevant and concise. I particularly enjoyed your use of text and images to communicate a cohesive theme for your post throughout your discussion.

    Anonymous Resistance is a concept that is really interesting when you consider the many oppositional and counter‐cultural uses of communication networks. New technologies have allowed for personal agency for users, in a way that there never has been in history. Your remediation is a really insightful method for representing this.

    If you’re interested in exploring this concept further, I’ve linked both my own blog that discusses this topic, as well as a related article I believe you will find engaging! The attached article is useful when considering the power of anonymity on a micro and macro level within digital communication spheres.

    Over-all, a wonderful read! Thank you!


  7. This blog post is so interesting to me, as i know nothing about hacking however it’s something that has lots to it to learn. I love how you made a flow chart about what hacker id be & my answer was ethical hacker hahaha very creative! I have now done some further reserch on ethical hackers as it is ‘me’, here is the infomation i found – a video on ethical hacking.
    Keep up the great blogs.


  8. This blog is amazing and really draws you in and keeps your attention. Like everybody else, I love the flow chart that allows for readers’ engagement and understanding of what you are talking about. Me, myself being a virtual grandma when it comes to technology I find it so interesting that these people are so skilled that it has actually become safer to employ and create jobs for them rather than ignore them. Your explanation has actually helped me shape an understanding and foundation of the overall topic which has been extremely helpful!


  9. Hey Paige,

    A really well-written blog post for this week’s topic, it further informed me about this weeks topic. I was also interested in this weeks to lecture on the topic of hackers especially ‘ethical hackers’ which to be honest I didn’t even know they existed until this weeks lecture because I commonly associated the word hackers with being evil, bad and negative.
    Similarly, your remediation for this week being the flow chart survey to see what type of hacker you are is amazing, it also further engages me into the content.
    Moreover, on my blog post this week I talked about the two types of hackers being the ‘white hat hackers’ and ‘black hat hackers’, which white hat hackers being the ethical hackers whereas black hat hackers are the bad hackers who are the common cause of malware. Further information of this is over on my blog;
    Keep up the good work!!

    – Jade


  10. I love this post, from the content to the flowchart to even the comments. Everything about it is engaging and interesting, I did your flowchart and found out I’m an ethical hacker. Very good remediation it was thought out and easy to follow along. I think you’ve done a great job on this weeks topic! I liked how you used an analogy comparing it to smokers, really helpful in explaining the concept.
    Overall really good use of hyperlinks and visuals along with a good amount of content.
    Good job, Ruby 🙂


  11. As always this is a wonderful Blog post Paige! I loved your flow chart remediation, it really helps people grasp a further understanding of this topic. Your use of hyperlinks is awesome in once again making this topic easier to understand and just generally super easy to follow along!

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a website or blog at

Up ↑

%d bloggers like this: