The concrete possibility of using all the various types of technologies available to
mankind for the speci fi c purposes of networking, of contributing to political and
social changes and of contrasting oppressive dictatorships, and even authority in
general, has always been, since the very fi rst activities of university hackers 1 in
California during the 1960s, a singularly fascinating and often inspiring issue.