This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Leet" – news ·newspapers ·books ·scholar ·JSTOR(December 2023) (Learn how and when to remove this message) |
Leet (or "1337"), also known aseleet orleetspeak, or simplyhacker speech, is a system of modified spellings used primarily on theInternet. It often uses character replacements in ways that play on the similarity of theirglyphs viareflection or other resemblance. Additionally, it modifies certain words on the basis of a system ofsuffixes and alternative meanings. There are manydialects orlinguistic varieties in differentonline communities.

The term "leet" is derived from the wordelite, used as an adjective to describe skill or accomplishment, especially in the fields ofonline gaming andcomputer hacking. The leet lexicon includes spellings of the word as1337 orleet.
History
editLeet originated withinbulletin board systems (BBS) in the 1980s,[1][2] where having "elite" status on a BBS allowed a user access to file folders, games, and special chat rooms. TheCult of the Dead Cow hacker collective has been credited with the original coining of the term, in their text-files of that era.[3] One theory is that it was developed to defeattext filters created by BBS orInternet Relay Chatsystem operators for message boards to discourage the discussion of forbidden topics, likecracking andhacking.[1] Creative misspellings and ASCII-art-derived words were also a way to attempt to indicate one was knowledgeable about the culture of computer users.
Once reserved forhackers, crackers, andscript kiddies, leet later entered the mainstream.[1] Some consideremoticons andASCII art, like smiley faces, to be leet, while others maintain that leet consists of only symbolic word obfuscation. More obscure forms of leet, involving the use of symbol combinations and almost no letters or numbers, continue to be used for its original purpose of obfuscated communication. It is also sometimes used as a scripting language. Variants of leet have been used to evade censorship for many years; for instance "@$$" (ass) and "$#!+" (shit) are frequently seen to make a word appear censored to the untrained eye but obvious to a person familiar with leet. This enables coders and programmers especially to circumvent filters and speak about topics that would usually get banned. "Hacker" would end up as "H4x0r", for example.[4]
Leet symbols, especially the number 1337, areInternet memes that have spilled over into some culture. Signs that show the numbers "1337" are popular motifs for pictures and are shared widely across the Internet.[5]
Algospeak
editAlgospeak shares conceptual similarities with leet, albeit with its primary purpose to circumvent algorithmiccensorship online, "algospeak" deriving fromalgo ofalgorithm andspeak. These areeuphemisms that aim to evadeautomated online moderation techniques, especiallythose that are considered unfair or hinderingfree speech.[6][7][8][9][10] One prominent example is using the term "unalive" as opposed to the verb "kill" or even "suicide". Other examples include using "restarted" or "regarded" instead of "retarded" and "seggs" in place of "sex". These phrases are easily understandable to humans, providing either the same general meaning, pronunciation, or shape of the original word. It is furthermore often employed as a more contemporary alternative to leet. The approach has gained more popularity in 2023 and 2024 due to therise in conflict between Israel and Gaza with the topic's contentious nature on the Internet, especially onMeta andTikTok platforms.[11][12]
Orthography
editOne of the hallmarks of leet is its unique approach toorthography, using substitutions of other letters, or indeed of characters other than letters, to represent letters in a word.[13][14] For more casual use of leet, the primary strategy is to use quasi-homoglyphs, symbols that closely resemble (to varying degrees) the letters for which they stand.
The choice of symbol is not fixed: anything the reader can make sense of is valid in leet-speak. Sometimes,a gamer would work around a nickname being already taken (and maybe abandoned as well) by replacing a letter with a similar-looking digit.
- However, leet is also seen in situations where theargot (e.g. secret language) characteristics of the system are required, either to exclude newbies or outsiders in general, i.e., anything that theaverage readercannot make sense of is valid; a valid reader should themselves try to make sense, if deserving of the underlying message.
- Mild leet can be used to mess withfrequency analysis "as is".
Another use for leet orthographic substitutions is the creation of paraphrased passwords.[1] Limitations imposed by websites on password length (usually no more than 36) and the characters permitted (e.g. alphanumeric and symbols)[15] require less extensive forms when used in this application.
Some examples of leet include:
- B1ff.
- n00b -- a term for "noob", the stereotypicalnewbie.
- Thel33t programming language.
- "E5C4P3": stylized cover ofJourney'sEscape album.
- k3w1 deciphers as "kewl" (which is derived from "cool").
- The web-comicsMegatokyo andHomestuck, which contain characters who speak variations of leet.[16][17]
- The digit "5" inDeadmau5 nickname.
- "DEF 4L7" plates are used by Defalt (sic!), a hacker from theWatch Dogs videogame (the first in the series). "DefAlt" nickname is a possible reference to "default [settings]"
- Upside-down "1337" (with a bar under "1") also reads as "LEET" (see example on the photo).
- "1 (4/\/"7 |_|/\/[)3|2574/\/[) '/0|_||2 \/\/|2171/\/9.17’5 (0/\/|=|_|51/\/9" is heavily leet-styled "I can’t understand your writing. It’s confusing".
- Sometimes, a word can be typed in leet with digits only:
- "360" codes word "EGO" in leet.
- "1687" or "1987" can be used to hint to IGBTs, e.g.insulated-gate bipolar transistors.
- "2007 2008" deciphers as "QOOT QOOB" (which is derived from "cute cube").
- "2077" (as a hint toCyberpunk 2077) can be found in"ZOTT" logo;
- "11363015" meansLIEGEOIS, e.g.Liège.
- "12314734813" happens to cover "RELATEABLE" word.
- "137 17 83 137 17 60" hides "let it be, let it go" phrase
- "4150" may stand for "ALSO"
- "33571 - 18124" unravels as "Eesti -Ibiza".
- Alternatively, sometimes 3 or 6 letters can be leet-ified into a validhexadecimal color code:
- █ "614D05" is a valid HEX-code for a dark shade of gold color, referencingGLaDOS;
- █ "572E55" (or█ "572355") is a dark purple color, coming from the word "STRESS";
- █ "1C373A" is a dark cyan ("icy") color, derived from "ICE TEA";
- █ "C47C47" is a peach-orange color related tocats;
- █ "C01025" is a pink-ish shade of red, derived from the word "COLORS";
- █ "D35327" is a dark orange color, produced from "DESERT" word.
- █ "80771E" is a yellowish-orange color, produced from "BOTTLE" word.
- █ "B00B15" is a redish color, derived from the misspelled "BOOBIES" word.
- █ "B4DD1E" is a yellowish-green color, produced from "BADDIE" word.
- It is possible to spell words and names in leet-speak to create additional references.
- For example, the female name "Marisa" can be spelled as /\/\AR15/\ - with a reference to theAR-15 platform.
- 834-613 meansBEA-GLE all while also referencing to theBeagle Boys and their names (e.g. 6-digit IDs) in particular.
However, leetspeak should not be confused withSMS-speak, characterized by using "4" as "for", "2" as "to", "b&" as "ban'd" (e.g. "banned"), "gr8 b8, m8, appreci8, no h8" as "great bait, mate, appreciate, no hate", and so on.
Table of leet-speak substitutes for normal letters
editA | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
a | b | c | d | e | f | g | h | i | j | k 7< | l | m 11 | n | o | p | q | r |2 |- 3 | s | t | u | v | w | x | y `|΄ | z |
Morphology
editText rendered in leet is often characterized by distinctive, recurring forms.
- -xor suffix
- The meaning of this suffix is parallel with the English-er and-or suffixes (seen inhacker andlesser)[2] in that it derivesagent nouns from a verbstem. It is realized in two different forms:-xor and-zor,/-sɔːr/ and/-zɔːr/, respectively. For example, the first may be seen in the wordhax(x)or (H4x0r in leet)/ˈhæksɔːr/ and the second inpwnzor/ˈoʊnzɔːr/. Additionally, thisnominalization may also beinflected with all of the suffixes of regularEnglish verbs. The letter 'o' is often replaced with the numeral 0.
- -age suffix
- Derivation of a noun from a verb stem is possible by attaching-age to the base form of any verb. Attested derivations arepwnage,skillage, andspeakage. However, leet provides exceptions; the wordleetage is acceptable, referring to actively beingleet.[18] These nouns are often used with a form of "to be" rather than "to have," e.g., "that was pwnage" rather than "he has pwnage". Either is a more emphatic way of expressing the simpler "he pwns," but the former implies that the person isembodying the trait rather than merely possessing it.
- -ness suffix
- Derivation of a noun from an adjective stem is done by attaching-ness to any adjective. This is entirely the same as the English form, except it is used much more often in Leet. Nouns such aslulzness andleetness are derivations using this suffix.
- Words ending in-ed
- When forming a past participle ending in-ed, the Leet user may replace the-e with an apostrophe, as was common inpoetry of previous centuries, (e.g. "pwned" becomes "pwn'd"). Sometimes, the apostrophe is removed as well (e.g. "pwned" becomes "pwnd"). The word ending may also be substituted by-t (e.g.pwned becomespwnt).[19]
- Use of the-& suffix
- Words ending in-and,-anned,-ant, or a similar sound can sometimes be spelled with anampersand (&) to express the ending sound (e.g. "This is thes&box", "I'm sorry, you've been b&", "&hill/&farm"). It is most commonly used with the wordbanned. An alternative form of "B&" is "B7", as the ampersand is with the "7" key on the standard US keyboard. It is often seen in the abbreviation "IBB7" (in before banned), which indicates that the poster believes that a previous poster will soon be banned from the site, channel, or board on which they are posting.
Grammar
editLeet can be pronounced as a single syllable,/ˈliːt/, rhyming witheat, by way ofapheresis of the initial vowel of "elite". It may also be pronounced as two syllables,/ɛˈliːt/. Likehacker slang, leet enjoys a looser grammar than standard English. The loose grammar, just like loose spelling, encodes some level of emphasis, ironic or otherwise. A reader must rely more on intuitiveparsing of leet to determine the meaning of a sentence rather than the actual sentence structure. In particular, speakers of leet are fond ofverbing nouns, turning verbs into nouns (and back again) as forms of emphasis, e.g. "Austin rocks" is weaker than "Austin roxxorz" (note spelling), which is weaker than "Au5t1N is t3h r0xx0rz" (note grammar), which is weaker than something like "0MFG D00D /\Ü571N 15 T3H l_l83Я 1337 Я0XX0ЯZ" (OMG, dude, Austin is theüber-elite rocks-er!). In essence, all of these mean "Austin rocks," not necessarily the other options. Added words and misspellings add to the speaker's enjoyment. Leet, like hacker slang, employs analogy in construction of new words. For example, ifhaxored is the past tense of the verb "to hack" (hack → haxor → haxored), thenwinzored would be easily understood to be the past tense conjugation of "to win," even if the reader had not seen that particular word before.
Leet has its own colloquialisms, many of which originated as jokes based on common typing errors, habits of new computer users, or knowledge ofcyberculture and history.[20] Leet is not solely based upon one language or character set. Greek, Russian, and other languages have leet forms, and leet in one language may use characters from another where they are available. As such, while it may be referred to as a "cipher", a "dialect", or a "language", leet does not fit squarely into any of these categories. The termleet itself is often written31337, or1337, and many other variations. After the meaning of these became widely familiar,10100111001 came to be used in its place, because it is thebinary form of1337 decimal, making it more of a puzzle to interpret. An increasingly common characteristic of leet is the changing of grammatical usage so as to be deliberately incorrect. The widespread popularity of deliberate misspelling is similar to the cult following of the "All your base are belong to us" phrase. Indeed, the online and computer communities have been international from their inception, so spellings and phrases typical of non-native speakers are quite common.
Vocabulary
editMany words originally derived from leet have now become part of modernInternet slang, such as "pwned".[1] The original driving forces of new vocabulary in leet were common misspellings and typing errors such as "teh" (generally considered lolspeak), and intentional misspellings,[21] especially the "z" at the end of words ("skillz").[1] Another prominent example of a surviving leet expression isw00t, an exclamation of joy.[2] w00t is sometimes used as abackronym for "We owned the other team."
New words (or corruptions thereof) may arise from a need to make one's username unique. As any given Internet service reaches more people, the number of names available to a given user is drastically reduced. While many users may wish to have the username "CatLover," for example, in many cases it is only possible for one user to have the moniker. As such, degradations of the name may evolve, such as "C@7L0vr." As the leet cipher is highly dynamic, there is a wider possibility for multiple users to share the "same" name, through combinations of spelling and transliterations.
Additionally,leet—the word itself—can be found in thescreen-names andgamertags of many Internet and video games. Use of the term in such a manner announces a high level of skill, though such an announcement may be seen as baselesshubris.[22][more detail needed]
Terminology and common misspellings
editWarez (nominally/wɛərz/) is a plural shortening of "software", typically referring to cracked and redistributed software.[22]Phreaking refers to the hacking of telephone systems and other non-Internet equipment.[1]Teh originated as a typographical error of "the", and is sometimes spelledt3h.[1][23]j00 takes the place of "you",[2] originating from theaffricate sound that occurs in place of thepalatal approximant,/j/, whenyou follows a word ending in analveolarplosive consonant, such as/t/ or/d/. Also, from German, isüber, which means "over" or "above"; it usually appears as a prefix attached to adjectives, and is frequently written without theumlaut over theu.[24]
Haxor and suxxor (suxorz)
editHaxor, and derivations thereof, is leet for "hacker",[25] and it is one of the most commonplace examples of the use of the-xor suffix.Suxxor (pronounced suck-zor) is a derogatory term which originated inwarez culture and is currently[when?] used in multi-user environments such as multiplayer video games andinstant messaging; it, likehaxor, is one of the early leet words to use the-xor suffix.Suxxor is a modified version of "sucks" (the phrase "to suck"), and the meaning is the same as the English slang.Suxxor can be mistaken withSuccer/Succker if used in the wrong context. Its negative definition essentially makes it the opposite ofroxxor, and both can be used as a verb or a noun. The lettersck are often replaced with the Greek Χ (chi) in other words as well.
n00b
editWithin leet, the termn00b (and derivations thereof) is used extensively. The term is derived fromnewbie (as in new and inexperienced, or uninformed),[21][24][26] and is used to differentiate "n00bs" from the "elite" (or even "normal") members of a group.
Owned and pwned
editOwned andpwned (generally pronounced "poned"[27] [pʰo͡ʊnd]) both refer to the domination of a player in a video game or argument (rather than just a win), or the successful hacking of a website or computer.[28][29][30][1][24][31] It is a slang term derived from the verbown, meaning to appropriate or to conquer to gain ownership. As is a common characteristic of leet, the terms have also been adapted into noun and adjective forms,[24]ownage andpwnage, which can refer to the situation ofpwning or to the superiority of its subject (e.g., "He is a very good player. He is pwnage.").
The term was created accidentally by the misspelling of "own" due to the keyboard proximity of the "O" and "P" keys. It implies domination or humiliation of a rival,[32] used primarily in theInternet-basedvideo game culture to taunt an opponent who has just been soundly defeated (e.g., "You just got pwned!").[33] In 2015Scrabble added pwn to their Official Scrabble Words list.[34]
Pr0n
editPr0n isslang forpornography.[1] This is a deliberately inaccurate spelling/pronunciation forporn,[26] where a zero is often used to replace the letter O. It is sometimes used in legitimate communications (such as email discussion groups,Usenet, chat rooms, and Internet web pages) to circumvent language andcontent filters, which may reject messages as offensive orspam. The word also helps preventsearch engines from associating commercial sites with pornography, which might result in unwelcome traffic.[citation needed]Pr0n is also sometimes spelled backwards (n0rp) to further obscure the meaning to potentially uninformed readers. It can also refer toASCII art depicting pornographic images, or to photos of the internals of consumer and industrial hardware.Prawn, a spoof of the misspelling, has started to come into use, as well; inGrand Theft Auto: Vice City, a pornographer films his movies on "Prawn Island". Conversely, in theRPGKingdom of Loathing,prawn, referring to a kind ofcrustacean, is spelledpr0n, leading to the creation of food items such as "pr0n chow mein". Also seeporm.
See also
edit- All your base are belong to us
- Calculator spelling
- Faux Cyrillic andEngrish
- Geek Code
- Gyaru-moji, a similar phenomenon in Japanese language
- Hexspeak
- IDN homograph attack
- Jargon File, a glossary and usage dictionary of computer programmer slang
- LOLCAT and its "lolspeak", a similar phenomenon in 21st century English language
- Martian language, a similar phenomenon in Chinese language
- Padonkaffsky jargon, a similar phenomenon in Russian language
- SMS language
- Yaminjeongeum, a similar phenomenon in Korean language
- YOGTZE case, involving interpreting the word's letters as digits
Footnotes
edit- ^abcdefghijMitchell.
- ^abcdAn Explanation of l33t Speak.
- ^Mello, John P. (February 2, 2015)."Google Expands Bug Bounty Program".E-Commerce Times.
- ^"A guide to leetspeak".IONOS Digitalguide. 17 November 2021. Retrieved2021-12-17.
- ^Huh, Ben (March 12, 2014)."10 classic memes that owned the Internet".CNN. RetrievedApril 23, 2013.
- ^Lorenz, Taylor (8 April 2022)."Internet 'algospeak' is changing our language in real time, from 'nip nops' to 'le dollar bean'".The Washington Post. Retrieved2 January 2024.
- ^"What is 'algospeak'? Inside the newest version of linguistic subterfuge". 13 April 2023. Retrieved2 January 2024.
- ^"'Mascara,' 'Unalive,' 'Corn': What Common Social Media Algospeak Words Actually Mean".Forbes. Retrieved2 January 2024.
- ^"From Camping to Cheese Pizza, 'Algospeak' is Taking over Social Media".Forbes. Retrieved2 January 2024.
- ^Klug, Daniel; Steen, Ella; Yurechko, Kathryn (2022)."How Algorithm Awareness Impacts Algospeak Use on TikTok".Companion Proceedings of the ACM Web Conference 2022. pp. 234–237.doi:10.1145/3543873.3587355.ISBN 9781450394192.S2CID 258377709. Retrieved2 January 2024.
- ^Nix, Naomi (20 October 2023)."Pro-Palestinian creators use secret spellings, code words to evade social media algorithms".The Washington Post. Retrieved2 January 2024.
- ^"How pro-Palestinians are using 'Algospeak' to dodge social media scrutiny and disseminate hateful rhetoric".Fox News. 23 October 2023. Retrieved2 January 2024.
- ^Sterling, 70.
- ^Blashki & Nichol, 80.
- ^"Username and Password Guidelines".help.pearsoncmg.com. Retrieved2019-12-10.
- ^Gallagher, Fred; Caston, Rodney.""MegaTokyo - [9] Speak L33t?"".MegaTokyo. Retrieved2024-01-31.
- ^Hussie, Andrew."==>".Homestuck. Retrieved2024-01-31.
- ^Blashki & Nichol, 79.
- ^LeBlanc, 33.
- ^Blashki & Nichol, 81.
- ^abBlashki & Nichol, 83.
- ^abComputer Hope Dictionary.
- ^LeBlanc, 34-35.
- ^abcdVan de Velde & Meuleman.
- ^LeBlanc, 30; 32.
- ^abThe Acronym Finder.
- ^Merriam-Webster: What Does 'Pwn' Mean? And how do you say it?
- ^Pichlmair, Martin.Pwned – 10 Tales of Appropriation in Video Games(PDF).
- ^Computer Slang(PDF). December 9, 2008. Archived fromthe original(PDF) on December 9, 2008.
- ^Ludlow, Peter; Wallace, Mark (2007).The Second Life Herald. MIT Press. p. 53.ISBN 978-0-262-12294-8.
- ^LeBlanc, 32-33.
- ^Naone, Erica (November 2008). "The Flaw at the Heart of the Internet".Technology Review. Vol. 111, no. 6. pp. 62–67.
- ^Peckham, Aaron (2007).Mo' Urban Dictionary: Ridonkulous Street Slang Defined. Andrews McMeel Publishing. p. 230.ISBN 978-0-7407-6875-0.
- ^Chappell, Bill (21 May 2015)."Go Forth And Pwn For Shizzle, Word List Guardians Tell Scrabble Players".NPR. Retrieved2020-07-05.
References
edit- "The Acronym Finder". Mountain Data Systems, LLC. Retrieved2007-04-11.[inline citation needed]
- "An Explanation of l33t Speak".h2g2. BBC. 2002-08-16. Archived fromthe original on 2011-09-06. Retrieved2007-03-29.
- Blashki, Katherine; Nichol, Sophie (2005)."Game Geek's Goss: Linguistic Creativity In Young Males Within An Online University Forum"(PDF).Australian Journal of Emerging Technologies and Society.3 (2):77–86.
- "Computer Hope Dictionary - Game definitions". Computer Hope. Retrieved2007-04-02.[inline citation needed]
- "The Free Dictionary -- Acronyms".The Free Dictionary. Farlex, Inc. Retrieved2007-04-11.[inline citation needed]
- "Google Directory - Computers". Archived fromthe original on 2007-09-30. Retrieved2007-04-29.[inline citation needed]
- Haig, Matt (2001).E-Mail Essentials: How to Make the Most of E-Communications. Kogan Page. p. 89.ISBN 978-0-7494-3576-9.[inline citation needed]
- LeBlanc, Tracy Rene (May 2005)."Is There A Translator in Teh House?": Cultural and Discourse Analysis of a Virtual Speech Community on an Internet Message Board (MA thesis). Louisiana State University.doi:10.31390/gradschool_theses.4112.
- Mitchell, Anthony (2006-06-12)."A Leet Primer".Technology News. ECT News Network, Inc. Archived fromthe original on 2020-11-10. Retrieved2007-04-10.
- Perea, M.; Duñabeitia, J. A.; Carreiras, M. (2008)."R34D1Ng W0Rd5 W1Th Numb3R5"(PDF).Journal of Experimental Psychology: Human Perception and Performance.34 (1):237–241.doi:10.1037/0096-1523.34.1.237.ISSN 0096-1523.PMID 18248151.S2CID 6054151.[inline citation needed]
- Raymond, Eric R.; Steele, Guy L. (1996).The New Hacker's Dictionary. MIT Press.ISBN 978-0-262-68092-9.[inline citation needed]
- Rome, James Andrew (2001-12-18)."relax we understand j00".Sigma Tau Delta, The International English Honor Society.Case Western University, Beta Beta Chapter. Archived fromthe original on 2007-02-16. Retrieved2007-05-03.
- Sterling, Bruce (1994).The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Bantam Spectra Books. p. 70.Bibcode:1994hcld.book.....S.ISBN 978-0-553-56370-2.
{{cite book}}
:|journal=
ignored (help) - Van de Velde, Kristof; Meuleman, Jeroen (2004)."Lexical tensions in 'internet english' : 1337 as language?". Archived fromthe original on 2007-04-29. Retrieved2007-04-13.
- Pearson, Wayne."The creation of "LOL"". Retrieved2008-11-06.[inline citation needed]
Further reading
edit- Katelnikoff, Joel (2013).SCROLL / NETWORK / HACK: A Poetics of ASCII Literature (1983-1989) (PhD dissertation). University of Alberta.doi:10.7939/R3PG1J01C.
External links
edit- "B.Tech/B.Tech (Leet) - CSE (Cloud technology, information security, data science, artificial intelligence, cyber security)".www.osgu.ac.in/programsOM Sterling Global University.Archived from the original on May 22, 2021. RetrievedMay 22, 2021.