03387oam 22005534a 450 991013718740332120210915045941.0(CKB)3710000000534164(SSID)ssj0001680226(PQKBManifestationID)16496131(PQKBTitleCode)TC0001680226(PQKBWorkID)15028167(PQKB)10543162(OCoLC)1181773736(MdBmJHUP)muse87163(EXLCZ)99371000000053416420200729e20202015 uy 0engurmu#---uuuuutxtrdacontentcrdamediacrrdacarrierMedieval HackersKathleen E. KennedyBaltimore, Maryland :Project Muse,2020©20201 online resource (147 pages) illustrations; PDF, digital file(s)Bibliographic Level Mode of Issuance: MonographPrint version: 0692352465 Includes bibliographical references (pages 149-168).Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? : an epilogue.Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous’s Fawkes mask to William Tyndale’s Bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the “effluorescence of intellectual piracy” in our current moment of political and technological revolutions “cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before….We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.HackingHackersIntellectual propertyInformation commonsElectronic books. Hacking.Hackers.Intellectual property.Information commons.025.5/23Kennedy Kathleen E.1975-965217Project Muse,MdBmJHUPMdBmJHUPBOOK9910137187403321Medieval hackers2189841UNINA