When computers became networked, hacking changed shape. The phone lines were still there, but now they carried data, identities, and reputations. Bulletin Board Systems, IRC channels, and early online forums became the new underground. Women were present from the beginning, but the structures of these spaces made them almost impossible to see.
The rise of BBS
By the late 1980s and early 1990s, Bulletin Board Systems had become the backbone of hacker communication. These systems hosted file exchanges, technical discussions, and social hierarchies. Handles mattered more than names, and reputation was built through technical contributions rather than identity.
On the surface, this anonymity seemed egalitarian. Anyone with skill could earn respect. In practice, it often reproduced existing biases. Male-coded assumptions were baked into language, humour, and expectations. When women revealed their gender, they frequently faced scepticism, harassment, or exclusion.
Many women responded by remaining invisible, adopting neutral or masculine handles, or operating behind the scenes. Yet they were actively shaping communities and mentoring other users.
Handles, not faces
Some of the known handles from this era hint at the hidden influence of women:
- Roxanne ran one of the few BBS boards dedicated to mixed-gender membership. She moderated discussions, guided technical projects, and maintained infrastructure (tasks as demanding as coding exploits themselves). Despite her leadership, few outside her network ever knew her real identity.
- Anita, active in early software cracking and Amiga/PC demo scenes, contributed reverse engineering tips, patched utilities, and guidance on navigating copy-protected software. Her pseudonym alone survives in historical records.
- Jude Milhon (“St. Jude”) bridged the phreaking and early computer underground communities. While known for activism, she also participated in BBS discussions, mentoring newcomers, and offering guidance to women entering hacker spaces. Her presence was as much cultural as technical.
A memorable anecdote involves a group collectively referred to as the “Sysop Sisters”. Running a California BBS network in 1991, they maintained control of several boards, enforced rules, and curated content. One male newcomer assumed the boards were male-only. When a female sysop corrected him, he reportedly refused to post for week, a small but telling example of how women quietly wielded authority in spaces that publicly seemed male-dominated.
Technical contributions without recognition
Women were not only moderators or mentors: they contributed technically as well. They reverse engineered software, analysed protocols, and even developed scripts and exploits. Some maintained network security for entire boards, troubleshooting hardware and system crashes.
For women who revealed their identity, exposure carried risk. They were treated as novelties, targets, or outsiders rather than peers. Technical discussions could shift into personal scrutiny. Success was questioned, and mistakes were magnified.
Remaining pseudonymous was not a lack of confidence but a rational security measure. Anonymity allowed participation while reducing harassment, but it also contributed to historical invisibility.
Anonymity for security
For women who revealed their identity, exposure carried risk. They were treated as novelties, targets, or outsiders rather than peers. Technical discussions could shift into personal scrutiny. Success was questioned, and mistakes were magnified.
Remaining pseudonymous was not a lack of confidence but a rational security measure. Anonymity allowed participation while reducing harassment, but it also contributed to historical invisibility.
The myth of meritocracy
The early hacker underground often claimed meritocracy, where skill was the only currency. Women demonstrated that skill was not enough. Cultural norms and biases shaped how merit was perceived. Achieving recognition required outperforming male peers while navigating additional scrutiny.
Looking ahead
As the internet expanded and hacking became more professionalised, some women moved into research labs, operating system security, and exploit development. Others stayed underground. The next article will focus on women who pushed into deep technical research, shaping modern exploitation, virtualisation security, and operating system hardening.