{"id":12339,"date":"2025-06-26T08:56:29","date_gmt":"2025-06-26T06:56:29","guid":{"rendered":"https:\/\/www.pccube.com\/?p=12339"},"modified":"2025-06-26T08:57:25","modified_gmt":"2025-06-26T06:57:25","slug":"gli-hacker-piu-geniali-della-storia","status":"publish","type":"post","link":"https:\/\/www.pccube.com\/en\/gli-hacker-piu-geniali-della-storia\/","title":{"rendered":"The most brilliant hackers in history"},"content":{"rendered":"<p>When you hear the word \u201chacker,\u201d the public imagination tends to swing between two extremes: the criminal in a black hoodie and the rebellious tech prodigy who casually breaks into corporate systems. But the truth is far more nuanced. <strong>A hacker is, at their core, a builder and deconstructor<\/strong> \u2014 a curious mind capable of thinking outside the box to explore the boundaries of digital systems.<\/p>\n<p>Throughout the history of computing, there have been hackers who broke the law, others who bent it, and some who helped define it. Some destroyed, others created. But all of them, in one way or another, <strong>left a lasting impact on the technological world<\/strong>.<\/p>\n<h4><strong>Kevin Mitnick: turning social engineering into an art form<\/strong><\/h4>\n<p>To many, <strong>Kevin Mitnick<\/strong> is the iconic face of hacking. In the 1980s and 90s, he proved that the weakest link in any system isn\u2019t the code \u2014 it\u2019s the human being. Through <strong>social engineering techniques<\/strong>, Mitnick gained access to corporate networks, confidential phone numbers, proprietary software, and source code from tech giants like Motorola and Nokia.<\/p>\n<p>His approach was as brilliant as it was unconventional: <strong>he didn\u2019t rely solely on technical vulnerabilities<\/strong>, but manipulated people, posed as employees, and impersonated technicians to obtain credentials. After serving five years in prison, he reemerged as a cybersecurity expert, raising awareness across industries about the dangers of human-targeted attacks.<\/p>\n<h4><strong>Adrian Lamo: the homeless hacker who broke in to fix<\/strong><\/h4>\n<p><strong>Adrian Lamo<\/strong> was an unconventional figure. Without a permanent home, he moved between internet caf\u00e9s and public libraries while managing to infiltrate the systems of Microsoft, Yahoo!, and The New York Times. What made him unique wasn\u2019t just his technical prowess but <strong>his personal code of ethics<\/strong>.<\/p>\n<p>Lamo often <strong>patched the vulnerabilities he discovered<\/strong>, alerting companies in an attempt to balance transgression with responsibility. His legacy became more controversial after he reported Chelsea Manning in the wake of the classified leaks, but his influence on hacker culture remains significant.<\/p>\n<h4><strong>Gary McKinnon: chasing UFOs through military networks<\/strong><\/h4>\n<p>British hacker <strong>Gary McKinnon<\/strong> became infamous for carrying out the largest known breach of U.S. military networks. His motive? <strong>Searching for evidence of UFOs<\/strong>. Between 2001 and 2002, McKinnon infiltrated dozens of NASA and Department of Defense systems, exploiting weak passwords and unprotected machines.<\/p>\n<p>What\u2019s most striking isn\u2019t the scale of the breach, but the simplicity of his methods: <strong>no malware, no advanced exploits<\/strong> \u2014 just open RDP connections and default credentials. His case sparked international tension and revealed how even the most secure systems can fall to the simplest oversights. McKinnon spent years fighting extradition, becoming a symbol of government vulnerability in the digital age.<\/p>\n<h4><strong>Julian Assange: code as a political weapon<\/strong><\/h4>\n<p>Long before founding WikiLeaks, <strong>Julian Assange was already known in the hacker community as \u201cMendax\u201d<\/strong>. In the 1980s and 90s, with the collective International Subversives, he breached the systems of corporations, universities, and government agencies. His style wasn\u2019t just technical \u2014 it was deeply political: <strong>he believed that access to information was a form of freedom<\/strong>.<\/p>\n<p>With WikiLeaks, Assange took the hacker ethos to its extreme, turning hacking from a tool of exploration into a tool of exposure. Whether you see him as a hero of transparency or a dangerous provocateur, it\u2019s undeniable that he <strong>reshaped the intersection of information, power, and technology<\/strong>.<\/p>\n<h4><strong>George Hotz (geohot): packing as Performance<\/strong><\/h4>\n<p>One of the most brilliant 21st-century hackers is <strong>George Hotz<\/strong>, aka &#8220;geohot.&#8221; At just 17, he became the first to unlock an iPhone, allowing it to run on carriers beyond AT&amp;T. A few years later, he <strong>hacked Sony\u2019s PlayStation 3<\/strong>, triggering a high-profile legal battle.<\/p>\n<p>Hotz has always seen hacking as an act of <strong>curiosity, intellectual freedom, and technical challenge<\/strong>. His talent later led him to found <strong>Comma.ai<\/strong>, a company developing open-source autonomous driving systems \u2014 proving that a hacker can evolve into a tech entrepreneur without losing that rebellious spark.<\/p>\n<p>&nbsp;<\/p>\n<p>All of these hackers \u2014 from different eras, with different motives and methods \u2014 share one thing in common: <strong>they think differently<\/strong>. They see systems not just for what they are, but for <strong>what they could be if reimagined<\/strong>. They don\u2019t stop at interfaces \u2014 they dig into protocols. They don\u2019t accept the limits defined by documentation \u2014 they rewrite the rules.<\/p>\n<p>For better or worse, they\u2019ve forced the world to <strong>rethink security, ethics, and power in the digital age<\/strong>. And for that, they deserve a place not just in the history of hacking, but in the broader history of computing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some famous names<\/p>\n","protected":false},"author":8,"featured_media":12342,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39],"tags":[],"class_list":["post-12339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-39"],"translation":{"provider":"WPGlobus","version":"3.0.0","language":"en","enabled_languages":["it","en"],"languages":{"it":{"title":true,"content":true,"excerpt":true},"en":{"title":true,"content":true,"excerpt":true}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The most brilliant hackers in history - Pc Cube<\/title>\n<meta name=\"description\" content=\"The term hacker does not indicate a criminal, but a brilliant mind capable of mastering computer code.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The most brilliant hackers in history - Pc Cube\" \/>\n<meta property=\"og:description\" content=\"The term hacker does not indicate a criminal, but a brilliant mind capable of mastering computer code.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/\" \/>\n<meta property=\"og:site_name\" content=\"Pc Cube\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-26T06:56:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T06:57:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pccube.com\/wp-content\/uploads\/2025\/06\/Progetto-senza-titolo-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PC Cube\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Cube\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/\",\"url\":\"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/\",\"name\":\"The most brilliant hackers in history - Pc Cube\",\"isPartOf\":{\"@id\":\"https:\/\/www.pccube.com\/en\/#website\"},\"datePublished\":\"2025-06-26T06:56:29+00:00\",\"dateModified\":\"2025-06-26T06:57:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.pccube.com\/en\/#\/schema\/person\/3b705149718006e7374d067eee3ce832\"},\"description\":\"The term hacker does not indicate a criminal, but a brilliant mind capable of mastering computer code.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pccube.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gli hacker pi\u00f9 geniali della storia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pccube.com\/en\/#website\",\"url\":\"https:\/\/www.pccube.com\/en\/\",\"name\":\"Pc Cube\",\"description\":\"Working for your best\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pccube.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pccube.com\/en\/#\/schema\/person\/3b705149718006e7374d067eee3ce832\",\"name\":\"PC Cube\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pccube.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b2d1560d40c0079140443b02a393d92837637eba9f6080afa12fc32f9c7bf6d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b2d1560d40c0079140443b02a393d92837637eba9f6080afa12fc32f9c7bf6d?s=96&d=mm&r=g\",\"caption\":\"PC Cube\"},\"url\":\"https:\/\/www.pccube.com\/en\/author\/alessandro-chiarato\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The most brilliant hackers in history - Pc Cube","description":"The term hacker does not indicate a criminal, but a brilliant mind capable of mastering computer code.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/","og_locale":"en_US","og_type":"article","og_title":"The most brilliant hackers in history - Pc Cube","og_description":"The term hacker does not indicate a criminal, but a brilliant mind capable of mastering computer code.","og_url":"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/","og_site_name":"Pc Cube","article_published_time":"2025-06-26T06:56:29+00:00","article_modified_time":"2025-06-26T06:57:25+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.pccube.com\/wp-content\/uploads\/2025\/06\/Progetto-senza-titolo-7.png","type":"image\/png"}],"author":"PC Cube","twitter_card":"summary_large_image","twitter_misc":{"Written by":"PC Cube","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/","url":"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/","name":"The most brilliant hackers in history - Pc Cube","isPartOf":{"@id":"https:\/\/www.pccube.com\/en\/#website"},"datePublished":"2025-06-26T06:56:29+00:00","dateModified":"2025-06-26T06:57:25+00:00","author":{"@id":"https:\/\/www.pccube.com\/en\/#\/schema\/person\/3b705149718006e7374d067eee3ce832"},"description":"The term hacker does not indicate a criminal, but a brilliant mind capable of mastering computer code.","breadcrumb":{"@id":"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.pccube.com\/gli-hacker-piu-geniali-della-storia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pccube.com\/"},{"@type":"ListItem","position":2,"name":"Gli hacker pi\u00f9 geniali della storia"}]},{"@type":"WebSite","@id":"https:\/\/www.pccube.com\/en\/#website","url":"https:\/\/www.pccube.com\/en\/","name":"Pc Cube","description":"Working for your best","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pccube.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.pccube.com\/en\/#\/schema\/person\/3b705149718006e7374d067eee3ce832","name":"PC Cube","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pccube.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b2d1560d40c0079140443b02a393d92837637eba9f6080afa12fc32f9c7bf6d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b2d1560d40c0079140443b02a393d92837637eba9f6080afa12fc32f9c7bf6d?s=96&d=mm&r=g","caption":"PC Cube"},"url":"https:\/\/www.pccube.com\/en\/author\/alessandro-chiarato\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/posts\/12339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/comments?post=12339"}],"version-history":[{"count":4,"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/posts\/12339\/revisions"}],"predecessor-version":[{"id":12344,"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/posts\/12339\/revisions\/12344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/media\/12342"}],"wp:attachment":[{"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/media?parent=12339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/categories?post=12339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pccube.com\/en\/wp-json\/wp\/v2\/tags?post=12339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}