Page 313

Undergound. Go to Table of Contents.

   language that all programmers must use for their comments and function

   names? They look horrible. They are no fun to read.' Part of this one

   was in Finnish.


   SKiMo says he has hacked a number of major vendors and, in several

   cases, has had access to their products' source codes.


   Has he had the access to install backdoors in primary source code for

   major vendors? Yes. Has he done it? He says no. On other hand, I asked

   him who he would tell if he did do it. `No-one,' he said, `because

   there is more risk if two people know than if one does.'


   SKiMo is mostly a loner these days. He shares a limited amount of

   information about hacking exploits with two people, but the

   conversations are usually carefully worded or vague. He substitutes a

   different vendor's names for the real one, or he discusses technical

   computer security issues in an in-depth but theoretical manner, so he

   doesn't have to name any particular system.


   He doesn't talk about anything to do with hacking on the telephone.

   Mostly, when he manages to capture a particularly juicy prize, he

   keeps news of his latest conquest to himself.


   It wasn't always that way. `When I started hacking and phreaking, I

   had the need to learn very much and to establish contacts which I

   could ask for certain things--such as technical advice,' SKiMo said.

   `Now I find it much easier to get that info myself than asking anyone

   for it. I look at the source code, then experiment and discover new

   bugs myself.'


   Asked if the ever-increasing complexity of computer technology hasn't

   forced hackers to work in groups of specialists instead of going solo,

   he said in some cases yes, but in most cases, no. `That is only true

   for people who don't want to learn everything.'


   SKiMo can't see himself giving up hacking any time in the near future.