background image
torso image
sticker image
Background
Hacker
Sticker

MORE ABOUT THIS...

Saved images can be adapted and reused for both commercial and non-commercial with attribution per CC BY 4.0 License

For attribution, please provide a link back to this website https://myothercomputer.com.


You might also enjoy : My Other Computer CC-BY-NC-4.0 Edition with AI generated people (non-commercial reuse).

Exported image size:

Saving Image...

What is this?

Did you ever see a bumper sticker on a car with a quirky saying like "My other car is a space ship?" or airplane, or horse, or Chevy?

This is a play on that idea, only the person in these cartoons is telling you -- the viewer, that THEIR other computing device is YOUR computing device.

In other words, they have hacked into something that belongs to you and have full control over it.

Or as they say in hacker speak, "You've been pwned", "owned", "rooted" or some such.

Why should I care?
Once a malicious attacker has access to your personal devices, they can do all kinds of things:

  • Monitor your private social media communications for sensitive photos or information.
  • Use your microphone or web cam to record your actions or information you would prefer to keep private.
  • Gain access to your bank or financial accounts to steal your money.
  • Impersonate you in order to trick someone you know into giving valuable information.
  • Erase all of your data including precious memories, photos, and videos.
  • Encrypt your device and demand payment to unlock your data (Ransomware).
  • Launch network attacks with your device and others en masse to disrupt traffic to popular Internet sites and services (Distributed Denial of Service).
  • Tie up resources by "mining cryptocurrency" like Bitcoin or Monero, which slows down your system and uses lots of electricity.

And much more !

You may think you don't have anything worth stealing until you realize how connected all of your accounts and data are to your personal email. Not to mention everything saved to your phone or laptop, and how much you probably rely on technology to go about your daily personal and professional business.

What are all these devices they are talking about on the stickers?

In the old old days (like 10... 15 ... 20 years ago??), a "computing device" was more limited... to well... A COMPUTER!

But now all kinds of electronic things use "smart technology", often networked to the outside world for your convenience and interconnectivity.

However, this also makes all of these "smart" devices vulnerable to being accessed or abused by some malicious person.

There have been many reported cases of people gaining access to all sorts of things such as: Smart TVs, Baby Monitors, Web Cams, SLR Cameras, Cars, embedded health monitors like insulin pumps and pacemakers, not to mention traditional computing platforms used in business such as servers, databases, public and private cloud services, and even personal home wireless routers which are the entry and exit point of all traffic from your home to the Internet.

Are these people supposed to be super elite criminal hackers?

The genesis of this project was a challenge from OpenIDEO and the Hewlett Foundation to redefine the way that "hackers" are depicted in the media and popular culture. Most often, "hackers" are shown as white males in their early 20's, or some shadowy guy in a hoodie.

In reality, "hackers" are comprised of a multitude of diverse people from all ages, genders, cultural backgrounds, and ethnicities. Even the term "hacker" is misleading as a hacker originally was simply used to describe a person with an aptitude for computers.

HACKER = tinkerer, computer geek, nerd

Malicious hackers who use technology for illegal acts and criminal financial gain also come in all shapes and sizes.

MALICIOUS HACKER = A criminal

This project was created to provide an updated visual reference depicting how malicious hackers can look like anyone. They might even be the person you least suspect.

Can I use these images for my own website or project?

Absolutely !

Click the save button to save a higher resolution local copy of any generated image.

For creative types, there is a green screen background which can be removed to add your own, as well as a blank sticker to add your own words.

Saved images can be used for both commercial and non-commercial purposes with attribution in accordance with CC BY 4.0.

If you are using these images for non-commercial use, you might also be interested in My Other Computer CC-BY-NC-4.0 Edition. This edition uses AI generated faces which are created via a technology that stipulates non-commercial use only.

For attribution, please provide a link back to this website https://myothercomputer.com.

Please note there are two editions of My Other Computer

CC-BY-4.0 Edition : There are no AI generated faces and can be used for non-commercial and commercial reuse.

CC-BY-NC-4.0 Edition : Uses AI generated faces which can only be reused for non-commercial purposes. If you have a question on what that means, see the Creative Commons non-commercial wiki page.

Update 2024

When I created this little project in 2019, the idea of AI generated people was still unknown territory.

Fast forward five years and we can now easily make photorealistic images, videos, and audio of fake people with a simple text prompt.

In a sense, this whole project is irrelevent if you can simply type, "Hacker with computer", to create a perfect image.

However, given that the AI was trained on the silly depiction of hackers in the past, you are still more than likely going to get images of shady people in hoodies, which was the original motivation for this project in the first place.

Don't believe me? Here's a few I just generated with the prompt, "a shady hacker typing on a laptop in a cafe". See any simalarities?

poorly generated AI version of a hacker in a cafe poorly generated AI version of a hacker in a cafe

If you've learned anything so far, these images are a poor representation that malicious hackers come in all shapes and sizes. Before and after the age of generative AI.

In fact, the next malicious hacker you encounter may not even be a person at all.

Who created this?

Original concept, design, and website creation by Jason Kravitz.

Read more information about the original OpenIDEO Cyber visual challenge brief.

Media inquiries can be sent to myothercomputer @ protonmail.com

I was honored to get a shout out from Cory Doctorow for this project. Cory's tireless crusade against enshittification, corporate greed, surveillance capitalism, and all manner of technological fuckery, is essential reading for all.

All photos and art assets were created by Jason Kravitz with the exception of:

CSS Loader generated at Loading.io

Image download website code by Eli Grey FileSaver.js (MIT license)

Back to the top...