Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Memorial to the anniversary of tuwat.txt and the Chaos Computer Club
Security Awareness

Memorial to the anniversary of tuwat.txt and the Chaos Computer Club

Exactly 38 days ago today the Berlin daily newspaper TAZ listed an inconspicuous ad(https://events.ccc.de/wp-content/uploads/2017/11/tuwat.txt-1.jpg) with the...

Jan Hörnemann Jan Hörnemann Chief Operating Officer · Prokurist
Updated: October 9, 2024 3 min read read
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)

TL;DR

On September 17, 1981, a small ad titled tuwat.txt in the Berlin newspaper TAZ called for computer enthusiasts to meet and discuss networks, data law, encryption, and privacy. That meeting became the founding moment of the Chaos Computer Club (CCC), now Europe's largest hacker association and an influential voice in German digital policy. The topics raised in tuwat.txt - data ownership, encryption, and machine control - remain as relevant today as they were 38 years ago.

Table of Contents (3 sections)

Exactly 38 days ago today the Berlin daily newspaper TAZ listed an inconspicuous ad with the title tuwat.txt. That one speaks today still about this small announcement from a local newspaper is among other things because of that which developed from it likewise because it is today still just as current as before 38 years.

tuwat.txt - Current like eh and je

The powerful believe that internal security is only possible through the use of computers. The fact that computers don't go on strike is slowly gaining acceptance even among medium-sized companies. Swiss Post believes that the use of computers will make the telephone even more attractive and that it will have to prove this in "field tests" with its teletext system. The fact that the "personal computer" in Germany is now to be turned on to the video-saturated BMW driver is made clear by the advertising campaigns that are now beginning. We believe that small computers can still be used to do meaningful things that do not require centralized large organizations. So that we as computer frieks no longer rush around uncoordinated, we do wat and meet on 17.9.81 in Berlin, Wattstr. (TAZ main building) at 11.00 a.m.. We talk about international networks - communication law - data law (who owns my data?) - copyright - information and learning systems - databases - encryption - computer games - programming languages - processcontrol - hardware - and whatever. Tom Twiddlebit, Wau, Wolf, Unnamed(~2) It is indicative of the farsightedness of the authors that today we still speak of the same phenomenon as before 38. It is the support of internal security through computers, or the use of computers to control machines in companies or cars . Likewise about data law which today we would only call data protection. But besides the topicality of this time you have grown even more.

tuwat.txt - The Foundation Stone of Chaos Computer Club

From this first meeting of the Computerfrieks in the editorial offices of the TAZ Europe's largest association of hackers and technology enthusiasts, the Chaos Computer Club, emerged. An association which over the years would gain more and more influence in politics. Without its expert opinion today no digital law is brought in Germany any more on the way and which brings us innumerable possibilities of the participation and the education, like that last the Chaos Communication Camp, brings. Straight the two authors of the tuwat.txt announcement Wau Holland and Tom Twiddlebit belonged over long time to the most prominent representatives of the CCC and influenced substantially the first chaos Communication Congresses as well as the magazine of the club, the Datenschleuder.

We do wat

And also we at the aware7 tun wat.  Most of our time we deal with the topics described in the tuwat.txt, especially those which threaten your data rights and security. We are also regularly in exchange with others Computerfrieks at congresses or even just local regulars' tables to always be on the cutting edge and to prepare current phenomena of IT security for you.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Jan Hörnemann
Jan Hörnemann

Chief Operating Officer · Prokurist

E-Mail

M.Sc. Internet-Sicherheit (if(is), Westfälische Hochschule). COO und Prokurist mit Expertise in Informationssicherheitsberatung und Security Awareness. Nachwuchsprofessor für Cyber Security an der FOM Hochschule, CISO-Referent bei der isits AG und Promovend am Graduierteninstitut NRW.

11 Publikationen
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)
Certified ISO 27001ISO 9001AZAV