Darknet Diaries - 170: Phrack
Episode Date: February 3, 2026Phrack is legendary. It is the oldest, and arguably the most prestigious, underground hacking magazine in the world.It started in 1985 and is still running today. In this episode we interview... the Phrack staff to hear some stories about what it’s like running a hacker magazine for 40 years.phrack.orgSponsorsSupport for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.Support for this show comes from Drata. Drata is the trust management platform that uses AI-driven automation to modernize governance, risk, and compliance, helping thousands of businesses stay audit-ready and scale securely. Learn more at drata.com/darknetdiaries.This episode is sponsored by Meter, the company building networks from the ground up. Meter delivers a complete networking stack - wired, wireless, and cellular - in one solution that’s built for performance and scale. Alongside their partners, Meter designs the hardware, writes the firmware, builds the software, manages deployments, and runs support. Learn more at meter.com.
Transcript
Discussion (0)
Hey, it's Jack, host of the show.
So the last two episodes talked about hacking in the 80s and 90s,
which was primarily phone-freaking.
In those episodes, I talked about a digital magazine called Frack,
which was incredibly influential to the hacking scene.
It wasn't uncommon to be in a chat room and someone come in and ask,
how do we get started as a hacker?
And then someone else simply say,
go to Frack's site, start reading it at issue one,
and by the time you're all caught up, you'll be a great hacker.
It's probably good to go and listen to the two episodes before this,
before doing this one, just to have the context,
but you don't have to if you'd rather not.
But the thing is, is that in this episode,
I interview two of the frack staff.
The magazine just celebrated their 40th anniversary,
and I'm pretty sure if you run a hacker magazine for 40 years,
there's got to be some interesting stories in there somewhere.
These are true stories from the dark side of the internet.
I'm Jack Recyter.
This is Darknet Diaries.
This episode is sponsored by Vanta.
No, it's not your imagination.
Risk and regulations are ramping up.
And customers now expect proof of security just to do business.
And that's why Vanta is a game changer.
Vanta automates your compliance process
and brings compliance, risk, and customer trust together on one AI powered platform.
Companies like Ramp and Writers spend 82% less time on audits with Vanta.
That's not just faster compliance.
it's more time with growth.
So whether you're preparing for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure and keeps your deals moving.
I would definitely consider them if I needed a service like this.
Get started with Vanta.com slash darknet.
That's Vanta, spelled V-A-N-T-A.
Vanta.com slash darknet.
This episode is sponsored by DeleteMe.
Delete Me makes it easy, quick, and safe to remove your personal data online at a time when surveillance and data breaches are common enough to make
everyone vulnerable. Delete me does all the hard work of wiping you and your family's
personal information from data brokers' websites. Since privacy is super important topic to me,
a few years ago I signed up. Delete me immediately got busy scouring the internet from my name
and gave me reports on what they found. Then they got busy deleting things. It's great to
have someone on my team when it comes to my privacy. Plus, the New York Times wirecutter has named
Delete Me their top pick for data removal services. Take control of your data and keep your
private life private by signing up for Delete Me. Now at a special discount for Dark
Diaries listeners, get 20% off your DeleteMe plan when you go to join delete me.com slash
darknet diaries.
And use promo code DD20 at checkout.
The only way to get 20% off is to go to join deleteme.com slash darknet diaries and enter code
DD20 at checkout.
That's join delete me.com slash darknet diaries code DD20.
Okay.
First, let's start out with some introductions.
Hi, my name is Skyper.
I used to be the editor of the FRAC magazine in the year 2000 to 2005.
And I've joined the FRAC staff recently again as an advisor.
Hey, I'm Tim Z.
I'm one of the current staff and editors of FRAC magazine.
In your words, can you tell us what is FRAC magazine?
So, FRAC stands for Freaking and Hacking.
It's a combination of these two words.
and it used to be the manipulation of the phone lines.
Effectively, the main goal was to get your free phone calls that are very hard to trace.
Fract magazine, this is all sorts of things hacking related, to be honest.
I think there is the infamous article on how to make a bomb as well in the past.
Yeah, I mean, I think I saw that even in issue one.
There was a balloon that had acetylene in it that we put like snap caps or pop caps on it
and throw some rocks together, and you throw the balloon off like a roof,
and when it hits the ground, the snap pops, a little popper snap,
and then it creates a little explosion.
I think that was issue one.
And so it's interesting how anarchy kind of shows up in frack.
Like bombs, what is this doing in a hacker magazine?
I think we have to put this into a different context of where we were 40 years ago.
didn't really happen, at least not in most countries.
And so building bombs was not seen as necessarily something evil or criminal,
but was just young kids exploring things.
What can they do?
They didn't mean to do any harm with them.
They were just experimenting.
In my opinion, Frack seems to capture some kind of counterculture.
It's notes from the underground type stuff.
Because back in the 90s, cybersecurity wasn't quite a mainstream profession yet.
schools didn't teach you how to secure networks or how to hack.
But nowadays, almost every major university has a major in cybersecurity.
So back in the 90s, there was just this underground group of people breaking computers, basically,
and talking about it in chat rooms and on forums.
You had freakers, hackers, rippers, crackers, cedars,
which welcomed in artists and musicians who were making things on their computers.
And this was collectively known as the scene back then.
And I think it was this underground scene.
that Frack was born out of and has its roots in.
So the scene was made by largely people trying things out
with their new hardware that they found
or trying to make something, do something that was not supposed to be doing
or there was not engineers to do.
So that's what the original hacker was all about.
I think if you summarize it, then Frack contains condensed hardcore technical articles
without any bullshit. The stuff works and is practical.
I'm fascinated by these two cultures, the cybersecurity professional and the scene hacker.
One does it for money, and it's their career, and one does it for fun.
It's their hobby.
But they are both passionate about it.
One tries to do it in the light.
One wants to do it in the shadows.
But they both like sharing what they know.
What's the difference, honestly?
Attitude?
Style.
But as computers grew more mainstream, becoming more common in every house,
more interest grew in hacking.
I mean, I'm sure you've gotten some kind of new electronic at some point in your life,
and you sat down and you said to yourself,
what are all the cool things that this thing can do?
So imagine getting a computer and learning that it can print stuff and play games and make sounds,
but then also hearing about some of the secret stuff it can do,
like hack other people's computers.
Some more people got fascinated with hacking,
and we're contributing to things like Frack, submitting articles on how to do cool things,
secret stuff on your computer. But also, along with the rise of computers, the cybersecurity profession
became popular, which sort of brought in a whole new culture of hackers. These weren't the roller
blading cargo pants wearing mohawk kids. The cybersecurity professional wears a collared shirt
and sometimes a tie. You can see the stark contrast of these two cultures when you go to
conferences like Black Hat and DefCon. At Black Hat, you see people wear.
wearing suits and ties.
They say they're geeks and nerds, but they don't look it.
At DefCon, there's a lot of people wearing cargo shorts, black shirts, hoodies, having mohawks.
At Black Hat, I feel like those people have to be there for work.
But at DefCon, I feel like those people want to be there for the fun.
And because I grew up in the scene, my heart is still there.
We were the kids who tried stuff with no manual or tutorial.
We built things that weren't possible.
We did it without permission or rules.
We pushed the boundaries and explored a new frontier.
Which also, like a lot of those things, they actually pave the ground for, like, a lot of the security industry exists now.
So a lot of people's job, they exist because of some of the articles that were written there, which is very interesting.
At this point, we're 40 years into frack.
And some of the articles have historical significance.
Historic significance has the article of the E911 documentation.
that was released in 1989, I believe, I think it was issue 24.
And it was a documentation that detailed how the emergency 911 system works in America.
And it was the first time that Frank got into some legal problems with the authorities.
I think that has some significance because it happened right after Operation Sun Devil
with the Secret Service hunting hackers.
And it also sparked the creation of the electronic frontification because the the the frack person who released that article was so unfairly treated by the government and by the corporates.
Yeah, I think that article solidified frack as the coolest hacker magazine ever because the founder, Night Lightning, or one of the early early founders, got arrested for publishing that article.
and then fought the law and won.
And so it's like, I got arrested for hacking,
and I beat it, and I got off, Scott Free.
And that was just such a middle finger to the establishment
of like, no, we're hackers, and we can beat you,
and we did beat you.
In your court, in your arena, in your court of law,
we still won, and we didn't do anything wrong.
Screw off and leave us alone.
And that must have been just like the most amazing epic moment
for the time to beat the law.
And I know there were some other frack contributors that didn't,
weren't so successful with that E911 article.
They pled guilty before they could fight it.
But the fact that that happened,
and one of the only times anyone ever has been arrested
for a CFAA violation and got off,
it's only like I can count on one hand,
I think, how many times that's happened.
And frack was one of them.
So, yeah, that was definitely quite an article.
Yeah, Night Lightning faces 60 years in prison and $122,000 and fine.
That's a lot more money nowadays, I think.
Another article which made big waves was titled Smashing the Stack for Fun and Profit.
So Smashing the Stack Fun and Profit, Issue 49, was the first article that told to the wider audience how buffer overflows work.
So in the olden days, buffer overflows were used to trigger computer.
a target to execute a program that is not intended to execute, to break into computer systems,
so to say.
And this article detailed it how to do it yourself, how you can do it.
It was not the first time it was used on the internet.
The first time was probably by Robert T. Morris, who wrote the very first internet worm.
And there were other articles around how to manipulate the stack, but it was never that detailed
in that clarity and reaching such a wide audience.
When this article came out, buffer overflows became the new favorite way hackers would break a system.
And it was a favorite because of how successful it was to do.
Programs just weren't designed to stop this from happening.
And so many things were vulnerable.
I think the race just started with source code reviews and finding vulnerabilities,
disclosing them, irresponsibly disclosing them in the old days,
and then slowly getting an idea of what responsibly.
disclosure is that not every corporate is your enemy and trying to work together with them,
trying to find common ground, how we can make the internet a better place for everybody.
Yeah, this is one of those cases that this was like a very elite, an underground technique,
known probably just by governments or things like this, that when he hits the, when the article
was written, it just like it clicked in so many people's minds. So there was like this
media of software that's like abundantly available and like most likely vulnerable like it just
fool around it did like everywhere so yeah so just to put this into perspective when i started out with
computer security and hacking when i wanted to learn how to break in computer system i've been told
what you have to do is you have to go to the library you have to find the book about robert t morris
you have to find and read the articles the news articles to piece to
information, how he did it. And then when frack came out with smashing stack and fun and profit,
it was all clear immediately. Back then, hackers weren't very respected. Companies would try to
ignore the vulnerabilities that they were told about, almost with the audacity of being upset that
somebody would buy their software and then try to break it as if hackers were the problems, like
they were just some punk kids trying to jab their fingers in somebody's eye. I think that has flipped.
And I always like to compare it against the early companies who did safety assessment for cars.
The car industry tried to sue them and outlaw them and says, what are you doing?
You can't show the people how dangerous is to drive without seatbelt.
But they did.
And now everybody has learned that it is right to have a seatbelt.
It's good to have a seatbelt.
And the same thing happened with this article and with the Explanourable.
development. In the beginning, they were hesitant. They were blaming the hackers for
releasing such destructive technology. But if the hackers hadn't released it, then other
governments surely would have exploited these holes anyway. Now they don't do this only for the
fun. They do this mainly for the profit. And it 100% became a business in a career. People are
hired now to hack companies to assess their security. You see this every day. There's a lot
episodes that you covered already about like this,
like companies that they hire the people to do like penetration testing
and their physical security and all those things.
This was unthinkable back then, I think.
There are so many good articles on frack.
I think the, you know, the NMAP one, the Portscanny,
the art of port scanning from issue 51 by Fjordor,
which followed the release of the NMAP tool.
NMAP was the grandfather of all portscaners out there.
Oh, wow, yeah.
NMAP is the de facto.
tool, almost a standard for how we do port scanning today.
It's a super simple command line tool,
and the person who made NMAP published how to effectively port scan
using the tool on FRAC.
And that taught millions of people how to port scan.
Even today, NMAP is still highly used by just about everyone in cybersecurity.
And there's another article in FRAC which goes into detail of how to do GPS jamming.
I like that this article is in there because it shows that in GPS,
GPS jamming is not really cybersecurity,
but it is GPS in itself as a technology that everybody uses
and that nobody ever really thought about how vulnerable it is.
And because it is already a very weak signal coming from the satellites,
of course you can jam it.
But it was not apparent to everybody until we release the article.
And then you could buy jammers, you know, two years later,
you could jammers all over the place from China and whatnot.
for very low money. But it was Frack first who released that article and got this idea out there
that, hey, GPS is actually very easy to jam. No one ever thought about that.
Hmm, that's a good point. I don't always know where the line is
on whether something is a cybersecurity problem or not. I published an episode recently about
a credit card skimmer, and a lot of you complained and said, that episode had nothing to do
with cybersecurity. And it made me wonder, okay, well, if it's not a cybersecurity problem,
whose problem is it?
I mean, if you've got articles on frack,
hacker magazine that shows you how to exploit a technology
and compromise the integrity of it,
then maybe that is a cybersecurity problem.
And of course, we had the hackers manifesto articles far from 1986.
That was like a...
For me, this is the most significant article in all of Frank.
Just because it sets out the baseline and the conduct
how hackers should behave and what hackers should do
and should not do and how we think.
Oh, yeah, I told you about the Hacker Manifesto
in one of the previous episodes.
One of the Legion of Doom members wrote it
and published it first on Frack.
And I'll give you a short excerpt from it.
I'm reading from Frack here.
This is our world now.
The world of the electron and the switch,
the beauty of the bod, we explore,
and you call us criminals.
We seek after knowledge, and you call us criminals.
We exist without skin color,
without nationality, without religious bias,
and you call us criminals,
you build atomic bombs, you wage wars, you murder, you cheat, and lie to us and try to make us believe it's for our own good.
Yet we're the criminals?
Yes, I am a criminal.
My crime is that of curiosity.
My crime is that of judging people by what they say and think, not what they look like.
I am a hacker, and this is my manifesto.
You may stop this individual, but you cannot stop us all.
After all, we're all alike.
Yeah, these things are still valid today.
maybe perhaps even more valid today than they were back then,
that we are all equal,
that we don't care about skin color, religion, our nationality.
And, you know, a lot of criminals forget this.
And that's why they are criminals, they are not hackers.
If you hack for a nation, you're not a hacker.
You're actually more concerned about your nationality
than about the hacker manifesto,
where we don't care about that.
We only care about skills.
Correct.
Yeah, I wrote a little bit about it.
in the last frack, Fract 72.
We're going to take a quick ad break here, but stay with us because when we get back,
we're going to get into my favorite frack stories.
This episode is sponsored by SpyCloud.
With ransomware affecting 85% of organizations in the past year and fishing becoming the top
entry point to ransomware, taking action on your company's exposure has never been more
critical.
I recently visited SpyCloud.com to check my darknet exposure and was shocked to discover just
how much stolen identity data criminals have at their disposal.
SpyCloud's new identity threat report reveals that nearly half of all corporate users have been infected by InfoStealer malware at some point.
With 63.8 billion distinct identity records now circulating on the dark web, the scale of this threat is staggering.
What's even more alarming is that only 38% of organizations can actually detect these historical identity exposures that create ongoing risk.
Knowing what's putting you in your organization at risk from stolen credentials to session cookies to PII is quick.
critical for protecting against identity-based threats, like account takeover, session hijacking,
and yes, even ransomware.
With SpyCloud, you're never in the dark about your company's exposure from third-party breaches,
successful fishes, or InfoStealer infections.
Read the full report and check your Darknet exposure for free at SpyCloud.com slash Darknet Diaries.
That's SpyCloud.com slash Darknet Diaries.
The first issue of Frack was published in 1985.
before websites were popular.
So it was just hosted on a BBS,
and you had to use your home phone and dial into it and read it that way.
And they wanted the articles to spread,
so they encouraged people to mirror it on other people's BBSs and other towns.
But eventually, when websites became popular,
Frack moved to Frack.com.
And that became its new home.
But it didn't stay that way.
I think Frack.com got hacked at least once.
The web server was often down, not reachable.
somewhere around 1998, frack.com went offline.
It stopped publishing articles for two years and was down most of the time.
I should also mention that.
Frack changed owners quite a bit.
The original founders went off and did something else.
New people came in and they were doing stuff,
but it's a free magazine and they never tried to make money.
So it relied on volunteers to keep it going,
and they could only spend so many years of their life before going off and doing something else.
By 2000, the site looked dead.
The website had been mostly offline for the past few years
and no new articles for two years.
And at that point, it was ran by Mike Schiffman, aka. Rout.
Skyper wasn't involved at all.
And Mike didn't even know who Skyper was, but Skyper had a plan.
He wanted to revive Frack and needed to do something epic
to prove his worthiness.
And so I decided to steal a do.
which was frack.org, which back then was not owned by the frack staff.
It was owned by somebody who probably didn't even know about frack.
How did you steal a domain?
Well, luckily in the olden days, these things were rather easy.
You would go to the domain registrar.
In this example, was a French one, Gandhi.net.
And you would initiate a domain transfer, and it would ask you that you need the authorization code to transfer it.
And you would right click on the web page,
click on the web page and save few source code of the web page,
and the authorization code would be written there in a hidden HTML tag, in a form tag.
And that was all you needed back then to do hacking.
Wow, so just by looking at the view source of a website,
it would show you the authorization code that it was expecting in order to prove
that you're the owner of the site.
I mean, it has to compare the authorization code you type in with something, right?
So there's some logic on the back end somewhere.
It just happened to be right there in the source code of the site.
It was as simple as just doing view source,
and then you could take over anyone's domain.
But you also have to put this into perspective.
Back then, not many browsers had a feature to actually view the source code.
So Skypeor had frack.org and wanted to use it to revive frack.com.
But he wasn't doing this alone.
He actually was involved with a few hacking groups, specifically Hurt and Tesso.
So Hurt stands for the hackers and Mergers Response Team.
And Hurt was founded around the same time when the SERTS were founded, the computer emergency response team.
And it was meant to be a counterweight to the cert because the community felt that often the SERT,
the computer merchants response team didn't really know what they were doing.
And the publications were often not technically correct.
And so the community created the hackers' emergency response team where the hackers published their version of response team,
where the hackers published their version of the vulnerability
and their exploits and their assessment of the risk.
And yeah, that was what Hurt was.
And Tessel was a German-Austrian hacker group
who later became more internationally
and went by the name of Team Tessel.
So with frack.org in hand and with Tesso and Hurt behind him,
Skyper got busy recreating the site
to show he can manage a website
like that. And then I spent
many days and many nights to
recreate all the articles.
I put them in an SQL database, so it was
searchable and copied all the data.
I created the webpage and
then put it online.
And then
called Mike Schiffman, who was the
editor-in-chief back then.
I caught him doing breakfast.
He was literally saying, I'm just having breakfast,
but what you're saying sounds great, so let's
do it. There was no hesitation.
And it was a combination
of people from Tesso and Hurt
who took over the FRAC magazine in 2000
or revived the FRAC magazine in the year 2000.
So Skyper was now in control of FRAC
and it officially moved from frack.com to frack.org
which is where it remains today.
And it was a whole new fresh team.
Nobody from the old frack staff was around to write any articles or to help.
So this new team got busy with a fresh new issue, issue 57.
Yeah, well, first one already.
was the first hardcover release ever.
So we decided we want to land with a big bang
and decided for a very first release.
Not just are we going to write all the articles ourselves,
we also create the first hardcover release,
which we release at a hack conference, a physical copy.
So in 2001 was the first time Frack had a hard copy created,
elevating it to the next level.
It was fantastic. It was a fantastic success.
I think we printed 800 hard copies or so.
We all picked them up with a car, with a rented car.
And these hard copies are heavy.
We picked them up in the printer in Netherlands,
and the car almost crashed with all the load in the trunk, on the back seats.
We drove to the conference and went to the main tent and announced that we are,
I'm going to distribute frack in half an hour.
And we had a great party and handed out the magazines and lots of alcohol and celebrating and talking about it.
It was a fantastic time.
So hackers trying to hack a hacker website is always going to be a thing.
And frack.org had its fair share of attacks.
And there was a group that particularly was trying to take down frack.
And they called themselves the Frack High Council or Ph.C.
Yeah, around the time there was a movement called the Anti-Security Movement.
And it was around the time when hacking really got commercialized.
And many, many, many companies entered the community and started to sell cybersecurity technology.
And hackers would start working for these companies and they would sell the secrets that they
did not research and did not discover, but that were given to them by the community.
And they were making lots of money from it.
And the community was not very happy about that because effectively these people stole from
the community.
And so a movement emerged called the anti-security movement,
which basically said, well, that's not okay, we can't do that.
And out of that, the PhDC materialized,
and they were probably, it's called them the radical form of an anti-security movement.
They would do a witch hunt, and they would try to hunt down every hacker who would work for corporate.
I call it hacker cannibalism, where hackers,
eight other hackers and destroyed other hackers.
Often unfairly and unjustified.
It was really a witch hunt.
And that went on for some time and PhDs
and tried to take over frack
because they're not happy with the editorial staff
who was running frack.
Of course, they tried to hack into the servers
and things that you would do,
but they also tried to steal articles
or sent out call for papers
and pretending that they were fracked,
but they never owned the domain.
Oh, how interesting.
They tried to pretend to be fracked by publishing
look-alike articles that pretended to expose secrets,
but they weren't actually secrets.
A little war was breaking out between the corporate cybersecurity culture
and the underground hacker culture.
The Frack High Council thought,
if Frack publishes articles on how to hack,
that it'll be used by corporations to make money
so therefore don't publish any articles at all
or publish articles that would be detrimental to the cybersecurity professionals out there
who are trying to profit from it.
Yeah, they wanted to keep all the secrets among themselves,
and so that only they can use them.
It's very selfish, and it's also counterproductive.
In an intellectual society, you need to share your ideas to inspire other people.
And for other people also to verify your ideas
and to take your ideas further to the next step.
Otherwise, it's a stagnation, and you won't go anywhere.
Okay. So they tried to publish an article as Frack, just posing as them. What else?
They actually stole some of the pre-release of Frack.
And so what happened is that the Frack staff always releases the upcoming Frack release to the community, to some trusted friends.
And then after the Reast of Trusted Friends, then it's released to some lesser trusted friends and so on and so on.
And after a few days, it ended up before the official web page released.
in the hands of a PhDC guy.
So this PhD guy knows that we haven't released publicly yet,
but it's still a community release only.
And he modifies the frack articles,
put some backdoors in there,
and then published on his webpage,
a PhDs, a PhDs as a new frack release.
And these backdors, they were not even clever backdoors.
They were just very destructive backdoors.
They would delete your entire computer.
Wow.
So have you ever looked up a tutorial online
and it had some script or code or something?
and that's what you needed to do.
That's the command you were looking for.
And so you just copy and paste it into your computer,
but you don't actually know what it does.
Yeah, well, if you would have tried to copy and paste this script,
it had the command, RM-R-F, which would delete your whole hard drive.
How funny is that?
Obviously, Frackstaff didn't put that destructive command in their magazine,
but that version of the article still existed out there somewhere.
Skiper and his team had brought Frack back.
They were publishing yearly issues of frack.
But then Skyper moved on to do other things, but there was enough momentum,
and there was enough people involved with frack at that point for it to keep going on its own.
But it was slow going.
Yearly issues turned into every other year issues,
and then sometimes there'd be four years between issues.
And in 2016, it seemed like that was the last issue of frack.
Frack staff just wasn't there anymore, and there were no issues coming out.
But five years after that, in 2021, to all our surprise, a new issue of frack was released,
we thought it was dead, but we were super happy to see a new issue.
And I remember hearing people at DefCon tell me that year that they used an exploit that they saw in that new issue of frack
to make a bunch of money on bug bounties that year.
So it still had teeth and great and was hard hitting, or at least until things got patched.
But that seemed to be the last hurrah for frack.
The internal frack staff just sort of fizzled out.
There wasn't support much for it.
The people were just very loosely involved at that point,
and they decided to get together in 2023 to discuss the future of frack.
And we actually met in Spain to discuss a bit the future about frack.
And we decided that's not just for two or three people to decide
that we should really ask Mike Schiffman again and some of the old staffers
and previous staffers, what their opinion is.
and then eventually we had a big phone call
with maybe six or eight people
of the old stuff and new stuff on there
and we discussed what we should do
and there were various options
some people said hey let's do one more frack
and let's just call it that's it
you know the last frack
and then other people said no we can't even do that
the community is dead
and most importantly there were
the very few of us who said no no the community
is always there.
There is still a community
that deserves the magazine like this.
There's always curiosity out there
and always the need for people
to publish articles
and we have to provide the platform
for them so they can do it.
And Frack is the perfect platform
for these articles.
So we were brainstorming about
who we could contact out there
who has experienced
with running magazine,
who would enjoy running magazine
and who is also technically skilled.
Because, you know,
frack in the end of the
is a very technical magazine.
So the group that came to our minds were the people who were running already Temp Out magazine.
Temp Out is very similar to Frack.
It's an EZine which posts articles on hacking.
It has its own edginess to it.
Like there's a bunch of Asky Art and hard-hitting articles.
And it was TMZ here who co-founded Temp Out.
So Temp Out is a group that is a research group that we formed maybe five years ago.
know, we started in IRCs, the three people were just wanted to like research ELF.
Infection techniques or Linux viruses and things like this.
We thought it was like a very niche area that we had like people in common that wanted to do that.
And so we kind of, you know, brainstormed a little bit.
And then more people were joining and then eventually we had like a Discord channel.
There's like a 1,500 people there now.
And suddenly, you know, the community was like, okay, what if we make?
like a zine, you know, like in the old days.
People are like, oh, yeah, wanted to write the script or whatever.
So we just give it a goal.
And we made four volumes already of it so far.
And it's been like really, really nice.
And we contacted them and we had a phone call together and the rest is history.
I was honestly like speechless when that happened.
Like I was very, very anxious.
I remember that I was on vacation and I just ran to,
to the, I was actually about to catch a flight.
So I just like found like the quietest corner of the airport lounge that I could find
and had the call with them and took notes of everything.
Essentially like I did the idea was like, okay, if you wanted to give it a go, you know,
trust you with that.
The former staff also was saying like, okay, we maybe should, you know, do something
different this time, like make frack like well known again.
The temp out team had already established themselves as a group who was technical, smart, and could ship articles, and immediately got busy reviving frack.
Once again, I had no idea that the teams behind frack have shifted so much throughout the 40 years.
But when it's volunteer-driven, I suppose that's what happens.
So the temp out team was excited to be taken over frack and wanted to make their first issue a big one.
It was 2023, and in the seven years before that, there had only been one frack issue released.
So a lot of people just thought it was dead.
But to show them that it wasn't dead,
they wanted to make a physical copy and release it at DefCon.
Yeah, we just thought actually about doing only an online release.
We didn't really thought about actually doing a physical release last year
until kind of late in the process.
And then we were just like, okay, what if we do it?
You know, can we do it?
Do we have like some budget?
Can we like talk to some people?
So we're able to raise some funds.
and we were able to get 500 copies down to Vegas.
Yeah, it was a very interesting first experience on logistics
because releasing a physical copy of things,
it's not as easy as it sounds.
Not only like you have to actually make the material,
but the distribution, especially at DefCon.
Wow.
Okay, so last year you actually reached out to me,
you were looking for a place to spread them or give them out.
Yeah, yeah, yeah, yeah.
So we had a few of them downstairs, right?
And then we're just like, yeah, sure.
But we kind of wanted like a place more centralized for that.
And that was very nice to get some of the copies there at the party,
at the Dark Nadarist part.
People really liked it.
And I remember, like, a lot of people were so happy.
And I think that's what made me feel like very realized.
It's always like a lot of people, they looked at it.
And they looked at it as the most precious thing that I ever touched.
Like, you know, they say, yeah, I'm here and I like what I do now because of frack like 25 years ago, 30 years ago.
So, you know, that's really like a very, very nice to you.
It was a special moment for me.
I mean, the fact that the frack staff came in and started handing out frack magazines at my party was, I felt like, man, this is special.
This is cool.
I feel honored to have been one of the places to spread it because I think you only pick like three or four.
places to spread out the magazines there.
Yeah, correct.
Thank you for having you.
It was really really good.
I cherish my copy that I got from you.
I wish I got it signed.
As soon as I left that night, I was like, oh, no, how did I not get it signed by you?
But yeah, that feels like a very special book to own.
It's more of a book.
It's in my hand here.
And my gosh, this thing is heavy.
So, for Act 71, I'm just looking through it, it's very text.
There's hardly any pictures at all.
And I guess that's because you were saying,
we weren't even thinking about printing it.
And then when you finally got around printing it,
it's like, okay, well, we'll just print the articles.
Yeah, so editing this is already hard for somebody that doesn't have,
like, you know, that doesn't work with it, I guess.
But we also like, okay, we keep the style, right?
That's what the first thought also.
So it's easier because it's less editing,
but also like, which is already pretty hard,
but, you know, we keep the text.
Plainty style, which a lot of people relate to and really like.
The Tempout proved themselves to be able to ship an issue of Frack.
Great.
But Frack started in 1985.
So with 2025 coming, it would mark the 40th anniversary of Frack,
which got a lot of people excited to pitch in and help make a great new issue.
A Fract 72, because it's marked our 40th anniversary,
we all wanted to make something very special.
So the initial idea was to go back to the Netherlands to release the magazine there again as a hard copy where we released the first hard copy 24 years before.
But we got enough funding and we got enough community support to then be able to coordinate a release at three different conferences at the same time,
which was in Netherlands and at DefCon in Las Vegas and at Hope in New York City.
and then very small conferences all around the world.
So that was beautiful how the community came together
and everybody chipped in some dollars and helped us.
The one that I have actually has a DevCon special edition written on the cover.
So were there multiple covers?
Yes, we have three different covers.
Actually, four.
One of them is going to be released later this year.
I'd like to add something there.
When TMZ says there are four covers, three that are,
are already released. And one of them that will be released at the end of the year,
it's because we're going to release the PDF online for everybody to print it at home
or print it on a professional print shop and get a chip to their home address.
So Frack Issue 72 was released at DefCon in 2025, and I was there to get a copy of it.
Yeah, this year we turned it up a notch. This year we didn't show up with 500 copies.
We turned up with close to 8,000 copies at DefCon.
Most, if not all, articles of Frack, are simply text files.
There are no visuals or graphics at all.
Well, I should say you can see some asky art there,
but that's just still text in the shape of a picture.
But this 40th anniversary edition, man, does it pop?
Every page has a graphic on it.
And it's really cool.
It feels like a high-quality magazine at this point,
and it's bulky and has a ton of articles in it.
Yeah, so we got the opportunity to have the wonderful people from Paged Out,
which is another magazine as well.
to do the graphics for us.
I mean, as you can, as you know,
because you saw it already,
it's mind-blowing.
The quality is so, so good.
And I remember when I got the confirmation
that they would do it,
I was so relieved that I didn't have to do it myself
because the one, I mean,
I know that it's hard for me because I'm not an expert on this.
And second, like,
I would never be able to match this quality
or nobody, at least that it's in the current staff.
And they just like, it's just incredible.
And I think like frac never looked that good.
Yeah.
It looks great.
Yeah.
It feels like you're coming of age, but even 40 years later and it's like looking great.
I like that.
That makes me excited about the future.
Getting it, you said, 8,000 copies to DefCon?
Yeah.
We had, I think, around 15,000 copies spread amongst those three conferences.
Yeah, I mean, gosh, how much does that even weigh?
How do you even get that to DefCon?
It's part of the problem as well.
First, to solve these issues, we try to find local printers, right?
And it is very, very challenging because the transportation is very costly.
So we found a Vegas printer.
And I think for DefCon, that was 10 tons or something.
Ten tons of paper.
Wow. Yeah.
Yeah, so the logistical issue is that you don't only have to deliver it by truck to DefCon.
You also need manpower on the ground to hand-carry 10 tons from the loading bay to the registration desk.
So all these little details we had to learn and figure out.
It was great to see Frack all over the place at Def-Con this year.
People were showing me how excited they were when they got their copy.
some got it signed by the frack staff
some had me sign it for some reason
it was a wonderful time
but what surprised me
is that this is such a high quality
magazine
but then thousands of them were given out
to everyone just for free
frack is for the community
always it's always free
so somebody tries to sell you a frack
you know that it's not from us
you say you're never going to charge for these things
we're never going to charge
no no
it's so cool having
you're welcome to help
us in any way, right? The community is there for this. People can help us with like article reviews with art as well. And the people did, which is very, very nice to see. Like this years, there's a lot of people involved. You know, the artists that draw the time the covers, for example, as well. So there's seven ways that people can help us make this happen. And we do it for them and they do it for the community. It's impressive that you're able to
make it happen
and have such a high-quality
print magazine here. I mean, this
thing is like 100 pages
long. It needs to be said that, of course,
this thing costs money to print.
The printer still wants to be paid.
He doesn't do a favor for frack.
And so the DAFCOM print
in its own was about
$55,000 US.
So this is still money
that we had to raise from the community.
But good thing is
that many of all,
who were doing frack with us in the year 2000 and 2001 and who were reading frack with us and who
are writing articles for us. Now 24 years later, they have all made their fortunes. They're
running big companies. Some of them are traded on the stock exchange. But these people
came back to us and they were happy to support us financially and help us with this immense cost.
The magazine that launched 10,000 cybersecurity careers, huh?
Exactly.
Well, so that's where we're at today.
40th anniversary.
Well, congrats on 40 years of running a thing or keeping it going.
And it's so fascinating that it's community-driven, almost like Dread Pirate Roberts, right?
His name lives on, but it's not always the same person that lives on, right?
And so Frack continues to live on because the community keeps it going.
And the community is as strong as ever now.
And I think it's going to grow even further.
Tell us about the future.
Yeah.
So I think we really want to keep the community growing.
We want to get a little bit better.
So every time we do a release, we learn a lot about everything, right?
Logistics and article reviewing and project management and all those things.
So we're not expressed on this.
We also have our day jobs and all those things.
So we're learning as we go as well.
And the community, I think, we want to grow.
and have more people involved to help us.
We have a lot of people that sometimes they say,
yeah, I don't have time to write an article this year or something like this.
But, you know, they do have spare time to like help the article ratios.
So, for example, this is already like a very big group of help.
I think in the future we want to get more people involved.
Like if you want to say like in a very brief way, we want like to be accessible.
Okay, so I got a physical copy, but that's just because I happen to be at the right time and right places.
Is there a way to get a physical copy by ordering it?
Yes.
Like last year, we made it available for self-print at cost, obviously, so we don't profit.
And of course, you can print anywhere you want.
We have just a recommended printer, whatever.
It doesn't really matter because we released the full high-quality PDF as well.
So you can print and edit if you want at your own local print shop.
And this year is going to be the same.
Frack is currently looking for new articles for their upcoming issue.
If you've got a new hacking technique or thinking of researching a specific technology or protocol,
reach out to the frack staff with your draft or even just an idea.
They are very helpful at giving you feedback to help you draft a great article.
Even if your English is not very good, they can help co-author the article with you.
And of course, you can still read every issue of frack, free of charge at frack.org.
Here's to another 40 years of an awesome hacker magazine.
A big thank you to Skyper and TMZ for coming on the show
and sharing the history and stories of frack.
It really is looking better than ever,
and I can't wait to see what they make next.
In the show notes, you'll find links to where you can order a physical copy of Issue 72
or just download the PDF and print it at home.
This show is made by me, the packet tickler, Jack Recyter,
editing by the Control Alt-Delight, Tristan Ledger,
mixing by proximity sound, and our theme music is by the mysterious breakmaster cylinder.
I named my dog Regex.
because nobody understands him.
Not even me.
This is Darknet Diaries.
