【】
Hackers make it their life's mission to remain anonymous, but we allllllllknow exactly what they look like. I mean, come on. We've all seen the pictures.
They are a shady-looking individuals often found lurking in darkened rooms illuminated by nothing but the glow of menacing green binary code. Hackers are faceless creepers hidden by the invincible cloak of a hoodie, almost always typing on their keyboards.
Duh. Everyone knows that, because this stereotypical hacker image shows up in essentially every article ever written about hacking or cybersecurity attacks -- from iCloud breaches and DDoS attacks to the recent WannaCrypt ransomware attack.
SEE ALSO:How Hacking Worked Before ComputersWe too have fallen victim to using stock photos of keyboards in dark rooms to accompany stories about Russian hacks or cybersecurity attacks. But, man, if you saw some what we're choosing from, you'd realize that we have very little wiggle room here.
We get it, it's hard to properly illustrate something when you don't know the full story and have little information about the people involved, so artists have achieved a standard visual by combining the obvious presence of a computer with a mysterious-seeming person.
It works great for the sake of getting the message across, but the images are laughable. And as you can see by this beautiful selection of hacking photos, they lead to an incredibly stereotypical definition of a hacker.
Judging from these visual gems, here's what we know about hackers for sure:
They have hands, which they make significant use of in order to successfully hack
Hacker using laptop. Lots of digits on the computer screen.; Shutterstock ID 172084607Credit: Shutterstock / REDPIXEL.PLHackers use their powerfully dangerous fingers to type. This we know to be true.
Sometimes they wear gloves on those hands to make themselves appear even more mysterious
Credit: Shutterstock / welcomiaGloves are a key part of the hacker aesthetic. You can take the gloves off the hacker, but you can never take the hacker out of the gloves.
Hackers hate sunlight. They hack only by the glow of their screens
Single solitary computer hacker works in the dark committing crime; Shutterstock ID 280469939Credit: Shutterstock / John Williams RUSAside from being intelligent computer geniuses and not sucking blood, hackers aren't all that different from vampires.
Seriously -- no sunlight just code light. And do not forget your hoodie
faceless computer hackerCredit: Bill Hinton/ Getty Images
Faceless Computer HackerCredit: Bill Hinton/ Getty ImagesEvery computer hacker is just A, the notorious villain from Pretty Little Liars.
A from 'Pretty Little Liars,' an expert villain and hacker.Credit: abc familyHackers don't have faces
Hacker using laptop. Hacking the Internet.; Shutterstock ID 503150188Credit: Shutterstock / REDPIXEL.PLEven when a computer shines its light directly upon a hacker, he still has no face. Magic.
If for some reason a black hoodie is not available, you are only permitted to hack if you have access to a creepy white mask
Anonymous teenager in mask on internet at nightCredit: Peter Dazeley/Getty Images
Credit: Peter Dazeley/Getty ImagesIt's the RULES, okay?!
Even the FBI -- an organization that should have access to real images of hackers -- has disseminated similar images. According to the FBI, the male hacker also wears a dark hoodie and has eyes invisible to the rest of the world though he does, in fact, have a face.
Tweet may have been deleted
Tweet may have been deleted
Some hackers out there are surely sitting at their laptops surrounded by multiple half-empty coffee cups, some snacks, a to-do list -- heck, they're probably bingeing Netflix on their second monitor with their Facebook account open in a separate tab as they torture themselves by checking in on their exes.
Show us THAT hacker next time, O.K., stock photo companies? Show us a realhacker. Oh, and let's all just agree to put a moratorium on the stereotype and stop using the same damn photo.
Featured Video For You
Transform any surface into a touchscreen computer with this projector
TopicsCybersecurity
相关文章

Make money or go to Stanford? Katie Ledecky is left with an unfair choice.
This is Katie Ledecky's world right now, and the rest of us are just living in it. Want proof? Ledec2025-10-30
女生的身體和男生有很大的不同 ,所以在減脂訓練的時候,也應該製定不同的訓練計劃,這樣才能夠起到明顯的減脂效果 。而大多數女生之所以會喜歡活躍在健身房中 ,就是為了通過健身的方式將身體中多餘的脂肪減掉,這樣才2025-10-30
絕大多數人都無法正確區分痦子與黑痣之間的區別,主要是由於痦子與黑痣的外在形象非常類似。但是正常情況下痦子摸起來都可以明顯感覺到皮膚表麵有突起物,而黑痣表麵則是光滑平整的 。當家長發現小孩子身體上長出痦子2025-10-30
如果孕婦在分娩的時候 ,胎兒的雙頂徑達到100的話,一般是不能順產的,但是具體的情況還是需要看孕婦的身體是如何的 。一般雙頂徑100的話,對於孕婦來說可能會出現難產的情況,所以有可能會建議使用剖腹產的方式2025-10-30
Tesla's rumored P100D could make Ludicrous mode even more Ludicrous
A Tesla Model S P100D begs the question: What's more Ludicrous than Ludicrous?Right now, the biggest2025-10-30
很多媽媽在給寶寶洗澡的時候都會麵臨著一個難題,那就是寶寶的耳朵容易進水 。出現這種情況,不僅會給寶寶帶來不舒服的感覺,如果長期不進行處理的話 ,還會導致寶寶的耳部發炎 ,引發中耳炎等比較嚴重的疾病,給寶寶的2025-10-30

最新评论