OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

When we are ...

Personalities don't really change, but appearance does. Most "hoodie" hackers try to save the world, rather than destroy it.

Photo of Daniel Marner
4 1

Written by

Sketch 1 (1,500 characters)

It's a prejudice branded by the media: Hoodie Hackers work at night. Always. It might be true that most hackers tend to work on "hacking" hobbies after work, because the job keeps them busy. Hacking requires a degree of IT knowledge which in turn requires some intelligence. As a result, most hackers end up in a job that requires IT skill and keeps them busy over the day. The result: they run through a loop: sleep, work, hack, repeat. But the content of that loop varies from person to person. While some try to keep the business running over the day, they start breaking stuff at night. Others are payed to break stuff over the day but help others fix things at night. The loop remains often the same, but it shifts over time and job. Professional criminals might break into networks over the day to hide their tracks. Developers might fix code over the day and exploit zero days at night. But they all must sleep. Improvement ideas: 1. Multiple evolution loops in tiers, shifted in time 2. Converging loops, where different personalities meet Alternative Concept: Take existing photos and replace the main actor. Example: Replace the speaker in a board meeting with a hoodie hacker. Or: Replace all the hoodie hackers with business suits. Inspired by the "human evolution" picture, where the human starts as an ape, stands straight in the middle and is hunched over a computer at the end.

This inspired (1)

Science Fiction


Join the conversation:

Photo of Ben Banks

Daniel. Perhaps circles would help. Like a kind of interlocking venn diagram where the different lifecycles of actors meet in the pursuit of money (legit and otherwise). Small (short) circle Larva-moth cycle meets a biger (longer) pup-bat cycle

Photo of Daniel Marner

Nice Idea. One you label the circles with blackhat / whitehat and the intersection greyhat. Another alternative could be a skilltree from the game development. Too many possibilities ;)

Photo of Ben Banks

One of the interesting dynamics in the infosec space is that attacking actors often only need to get one strike whilst the defenders need to defend against many different angles and over a larger area. This asymmetry drives a number of breach scenarios where patches were available yet not deployed in the breached environment. I wonder if there is a way of expressing that visually?

Photo of Dima Boulad

Great build Ben Banks ! I really like the idea of circles to develop this sketch. I would also recommend this resource to build on composition for this sketch: