In this Book

summary
Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous’s Fawkes mask to William Tyndale’s Bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the “effluorescence of intellectual piracy” in our current moment of political and technological revolutions “cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before….We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.

Table of Contents

Download PDF Download Full Book
  1. Cover
  2. open access
    • Download PDF Download
  1. Half-Title Page, Title Page
  2. open access
    • Download PDF Download
  1. Copyright, Support the Publisher
  2. open access
    • Download PDF Download
  1. Table of Contents
  2. open access
    • Download PDF Download
  1. Acknowledgments
  2. open access
    • Download PDF Download
  1. 1: Medieval Hackers?
  2. pp. 1-28
  3. open access
    • Download PDF Download
  1. 2: Hacking Bread Laws
  2. pp. 29-54
  3. open access
    • Download PDF Download
  1. 3: The First Hacker Bible
  2. pp. 55-80
  3. open access
    • Download PDF Download
  1. 4: Tyndale and the Joye of Piracy
  2. pp. 81-116
  3. open access
    • Download PDF Download
  1. 5: Selling Statutes
  2. pp. 117-138
  3. open access
    • Download PDF Download
  1. Homo Hacker? An Epilogue
  2. pp. 139-147
  3. open access
    • Download PDF Download
  1. Publication Data
  2. p. 148
  3. open access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.