Apple cofounder Steve Wozniak expounds on his hacking shenanigans and online mischief

Chicago -- In his keynote address at a security conference today, Apple co-founder Steve Wozniak admitted he has enjoyed many adventures in hacking often for the sake of pranks on friends and family, especially back in his college days and the early years of working on computers and the Internet.

"I like to play jokes," said the Wozniak jovially as he addressed his audience of thousands of security professionals attending the ASIS Conference in Chicago. The famed inventor at Apple admitted he also had some fun with light-hearted forays into hacking computer and telecommunications networks several decades ago back in his college years and while learning about electronics and computers.

People with imagination in engineering are naturally drawn to the idea of finding ways to bypass security controls as part of the process of discovering how things work, and Wozniak said this was especially true of himself.

"But I never once hacked a computer for real," he told his audience, meaning his break-ins and intrusions were done in the spirit of exploration, never for profit or malice. One youthful prank involved some experimentation into a shared computer system several where he left nine pages of Polish jokes that were dumped on users.

[NEWS:Ten tech titans and their temper tantrums

MORE WOZ:Wozniak questions long-accepted date of 'Day One' at Apple

OTHER WOZNIAK THOUGHTS:A 5-minute Woz brain dump (AKA, 2013 UC Berkeley commencement address)]

As a young man in college when he read an article about how tone signaling techniques could be used to manipulate telephone networks to set up calls, he said he became intrigued and had to find out more and even try it himself.  He went out and learned more about the exact frequencies and tried them out on the telephone system. "I wanted to explore the network," he said. It was all a form of "White Hat hacking" he says he did but never for purposes of stealing or avoiding paying bills.

As to his famous partnership with Steve Jobs, Wozniak said the two "became best friends instantly" and they shared a fascination with finding out how networks worked in sometimes unorthodox ways.

Circumventing the controls placed by authority was sometimes part and parcel of satisfying the enormous drive he had as a budding computer engineer to experiment and grow in knowledge, he points out. Wozniak said he had a friend with the key to the college computing room and he snuck in in the middle of the night to run his computing programs on punch cards. He admitted he also used to sneak into at least one eminent Stanford institution's lab every Sunday when it was supposed to be closed to find electronics and science manuals so he could learn more. It all just shows you "the brightest people in the world tend of leave their doors unlocked," Wozniak said.

Wozniak said many of his break-in stunts were often combined with a prank, such as when he guessed his stepson's password for the Macintosh and made the files he found hard to access, while also scheming with his wife to leave a folder marked "from Mom." "He was livid," said Wozniak about the prank.

Wozniak said one of his favorite pranks was coming up with a TV jammer that he secretly used to convince friends their TV sets were malfunctioning, while at the same time instructing them in outlandish ways to "fix" the problems -- until he secretly stopped jamming their sets.

All of this youthful exuberance at the time may have occurred "because I was a geek, and had little hope of finding a girlfriend or a wife," Wozniak says.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail:

Read more about wide area network in Network World's Wide Area Network section.

Join the CSO newsletter!

Error: Please check your email address.

Tags ApplesecurityWide Area Network

More about AppleIDGinventor

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ellen Messmer

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place