Leet or 1337 is a often described as a "corruption" of written text. The 
practice of "leetspeak" or "13375p34k" emerged in BBS's, listservs, and MOOs, 
and is characterized by replacement of alphabetic characters by similar 
appearing numerals, but may also involved other replacements or radical 
abbreviations. Leet is not a strict one-to-one encoding. There is no standard 
for the practice of leet; rather, its diversity varies with the protocols and 
group cultures of online writing environments where it appears. The f/ph 
replacement in "fone phreaks" is early leet, as is the s/z replacement in 
"warez." The character "a" can become "@" or "4." Either substitution is based 
on optical recognition of characters and transposition in terms of visual 
similarity. Leet is character encoding for eyes that see and a body that 
experiences. Leet is read for the visual glyph, but also read *through* the 
glyph to the virtual or invisible *intentional* character suspended behind it. 
Every glyp!
 h or graphematic unit is read by rules of encoding and substitution but also 
through the phenomenology of address, where the glyph is meant for the reader. 
The illegible carries the legible within it.

The phenomenology of leet is specific to consensual domains. Leet as 
abbreviation allows for speed and efficiency in communication. The reduction or 
simplification of messages is possible within the framework of a writing 
environment such as a listserv or chatroom, in terms of group norms and 
assumptions. In fact, simplificiationis a function of this framework, and the 
speed gained is only possible by the accumulation and implication of group 
knowledge in the environment. As a derivation of the word "elite," leet 
presupposes identification with a particular habitus and shared cultural 
capital. The leet writer is part of a group and identifies with that group in 
the very act of reading and writing leet. As elite, leet references a sociology 
of hackers and users, of those "in the know." To read leet is to recognize 
inclusion in this habitus.

The cost of recognition, however, is enforcement of the protocological 
constraints laminated on every string of leet. A common use of leet is for 
undesirable or illegal communication in monitored or censored environments. 
Leet allows participants in online gaming to swear without being kicked out by 
monitoring software. A leet formulation such as [EMAIL PROTECTED]@ can slip by 
email content filters. Similarly, wares or cracked software becomes "W4R3Z" and 
"porn" becomes "pr0n." Of course, some sort of filter could flag these terms 
using regular expressions, but leet as a practice of corruption means writing 
until there is no possibiility of detection and recovery. While a filter might 
flag four-letter words beginning with "p" and ending with “n” as a high 
probabilityt of being the word "porn," there is less chance of catching the 
expression "spl01tz" as leet for "exploits" or hacks. A related use of leet is 
obfuscation. In general, code obfuscation is a practice that makes computer 
prog!
 rams difficult to read and understand, typically by reducing any text-like 
formatting or by adding arbitrary formatting. The result compiles and runs on a 
machine but appears as an unintelligible mess to human eyes. The goal is to 
conceal information, whether from possible thefts and reverse engineering, or 
as a means of spamming. There is also a thriving practice of recreational or 
artistic code obfuscation, such as the Obfuscated PERL Contest and the 
International Obfuscated C Contest. Leet allows a basic form of obfuscation. 
For example, leet provides a quick means of generating passwords or user names 
as unintellgible strings. In online gaming, where administrators or higher 
level players can eject players with a simple "!kick username" command, the 
leet-generated username is a simple encryption, a hard to type and easily 
misrecognized.

Leet is corrupted by the work of overlapping and collapsing digital domains. 
Leet is a palimpsest of intention and regulations condensed anagrammatically. 
In one direction, leet is formalized as it grows larger than specific 
communities and becomes a general dialect for net discourse. No longer elite, 
leet becomes a commercial parlance. Anyone can set their google search page to 
leetspeak: http://www.google.com/intl/xx-hacker/. In the other direction, leet 
remains problematic. "Corrupted" texts implies a cleartext suited for the 
domain at hand, but clearly leet is a principle of generalized corruption. All 
text is already encrypted in relation to the interminable working of the net. 
Leet references the absent body. Its corruption is the internal processing and 
-jectivity of readers. This means that every character encoding and every 
string on the net is potentially leet. leet=1337=1111=0000

Sandy

Reply via email to