A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a series of complex formulas. It has vulnerabilities; we call them “loopholes.” We call exploits “tax avoidance strategies.” And there is an entire industry of “black hat” hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys.A Hacker’s MindOnce you learn how to notice hacks, you’ll start seeing them everywhere—and you’ll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you.Unchecked, these hacks threaten to upend our financial markets, weaken our democracy, and even affect the way we think. And when artificial intelligence starts thinking like a hacker—at inhuman speed and scale—the results could be catastrophic.But for those who …
A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a series of complex formulas. It has vulnerabilities; we call them “loopholes.” We call exploits “tax avoidance strategies.” And there is an entire industry of “black hat” hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys.A Hacker’s MindOnce you learn how to notice hacks, you’ll start seeing them everywhere—and you’ll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you.Unchecked, these hacks threaten to upend our financial markets, weaken our democracy, and even affect the way we think. And when artificial intelligence starts thinking like a hacker—at inhuman speed and scale—the results could be catastrophic.But for those who would don the “white hat,” we can understand the hacking mindset and rebuild our economic, political, and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks, and realize a more equitable world.
It is interesting to see how Schneier applies the term »hacking« to all systems, not just computer systems. He also frames hacking as something the wealthy and powerful perpetrate to extract value from the less wealthy and powerful and not the other way around. I personally have not learned much new, but I am well versed in these topics and I think I will recommend or gift this book to people that could benefit from this perspective on the world.