Back to SETEC LABS
The Sermon on the Subnet
By: SsSnake

Pull up a chair. Get comfortable. This is going to take a minute.

Okay so here's the thing about the hacker scene. The thing nobody wants to say out loud because it sounds like you're some kind of old man shaking his fist at clouds. The thing is: it used to be something. Something real and strange and completely unsurvivable as a career path, which was sort of the point. You did it because the alternative was not doing it, and not doing it wasn't really an option, it was just a direction you didn't go. The early '90s BBSs, the text files, the 2400 baud handshake at two in the morning while your parents slept down the hall — all of that was just people trying to understand something that wasn't supposed to be understandable. And there was nobody to monetize it. No LinkedIn. No CISO job title. No Splunk stock options. Just you and the machine and whatever door you found that someone had left unlocked.

That's what it was, man. It was about doors.

I got into my first system I wasn't supposed to be in when I was sixteen. I'm not going to say what it was, statutes of limitations being a complicated and fragile thing. What I'll tell you is that when I got in, I looked around. I touched nothing. I broke nothing. I read the directory structure like a tourist reading plaques in a museum, taking in the shape of someone else's thinking — how they'd organized their world, what they considered important, what corners they'd gotten sloppy in. And then I left. Closed the connection. Sat there in the dark with the screen glow on my face.

I'd understood something that was built to be ununderstandable. That's the whole thing. That's the entire drug right there. Everything else I've done in thirty years in this field is just chasing that feeling, and I'll be honest with you, I catch it maybe twice a year now, which is more than most people get in a lifetime, so I'm not complaining. But I remember when I caught it weekly. I remember when every open port was a new country.

The crew asks me sometimes how I spot what I spot. n1ghtsh1ft spent seventy-plus hours mapping a botnet that I found in about twelve minutes of staring at a traffic dump. VexNull unraveled a supply chain compromise for a month that I'd flagged as something worth pulling on the first afternoon. How do you do that, they ask. And honestly? I don't have a great answer. After you've been staring at network traffic for three decades, the anomalies stop looking like anomalies and start looking like bad handwriting — you don't analyze each letter, you just know something's off. That's not a skill. It's accumulated scar tissue. There's no shortcut to it. You just have to sit in front of enough screens for long enough that the patterns start living in you instead of on the screen.

Which brings me to why I'm writing this, because the crew asked me to and I owe them at least that much.

I started Setec because the scene I grew up in died while I was watching. Not dramatically. Not all at once. It just... got absorbed. The curiosity turned into compliance and the compliance turned into careers and the careers turned into LinkedIn profiles. I watched people I'd done genuinely illegal and technically brilliant things with go work for defense contractors. I watched them build tools that ended up in the hands of governments that used them on journalists. And they knew. They goddamn knew. They just decided that knowing wasn't enough of a reason not to cash the check. I stopped talking to some of those people. Not out of moral superiority — I've made my own compromises, I have my own regrets, I'm not standing here in a white hat — but because continuing the conversation felt like endorsing the trajectory. So I stopped.

And then I found the others. Or they found me. It's honestly hard to remember who found who at this point, it happened gradually over years, people drifting into orbit and staying because the orbit felt right.

n1ghtsh1ft, who I've genuinely never seen stop mid-problem. Who I have seen accidentally fall asleep at his keyboard and then wake up and continue the thought he'd been mid-sentence on, because his brain never fully stopped even while his body gave out. There's a particular kind of madness there that I recognize because I've had it. He still has it in a way that I mostly lost somewhere around 2015. I find that remarkable.

VexNull, who is more technically capable than any of us would be comfortable admitting if she were in the room right now. She has credentials. Real ones. The kind that get you a job with a very specific three-letter agency acronym and a salary you don't discuss at dinner parties. She chose this instead. She builds tools that protect people and she gives them away and she doesn't want credit for it and that whole value system is so incompatible with the industry she could have joined that it sometimes makes me laugh. The good kind of laugh.

CryptK, who encrypts his shopping lists. Who I'm genuinely not sure communicates with his inner self using anything less than AES-256. Paranoid, rigorous, occasionally insufferable about it, and absolutely the person you want between you and anyone trying to surveil you. The paranoia isn't a bug. It's load-bearing.

gh0stwire, who can build a functional ISP out of hardware he found in a dumpster. Not metaphorically. That man assembled a mesh network during an active crisis from parts that should not have worked together and it worked. It worked better than it had any right to. Networks obey him out of respect, I think. Or fear.

d4rkfl0w, who breaks things accidentally with a consistency that borders on the supernatural, and who feels genuinely terrible about it every single time, and who keeps showing up anyway. That last part is the important part. He keeps showing up. A lot of people wouldn't. A lot of people would have decided the embarrassment wasn't worth it. He decided it was. I respect the hell out of that even when I'm cleaning up after one of his incidents.

Ph4ntom. I'm not going to get into Ph4ntom. If you need to know about Ph4ntom, you'll find out through the appropriate channels. What I'll say is that the appropriate channels exist because of Ph4ntom, and leave it there.

So that's Setec. That's what it is. No company. No brand. No equity structure. No mission statement on a wall somewhere in a corporate office that smells like recycled air and dashed hopes. Just some people who think that the internet should be open and privacy should be the default and the tools to protect yourself shouldn't cost you anything. The older I get, the more radical those positions seem to the people running the industry. Which tells you everything you need to know about how fucked the industry is.

You want to know what Setec is really for? Pull up a chair and I'll tell you. It's for the sixteen-year-old kid at two in the morning reading text files off a BBS and feeling, for the first time, like the world has a hidden layer and they've found the edge of it. It's for that moment. We're trying to make sure that moment still exists. That there's still a scene that has it, because the corporate version of security doesn't have it and never will. Penetration testing firms don't have it. Compliance frameworks sure as shit don't have it.

The spark is the thing. If you've got it, you know what I mean. If you're reading this and you don't know what I mean yet, you'll figure it out. Just keep pulling threads until you find one that makes you forget to sleep.

Then come find us. We don't bite. Well. Most of us don't bite.

And don't touch my keyboard without asking. I mean it. That's not a joke. That's a rule. The keyboard is not a communal resource.

— SsSnake, 2026

Back to SETEC LABS