Line length
This commit is contained in:
parent
19bc5a438a
commit
f66f609f77
@ -3,7 +3,7 @@ Personality Characteristics
|
|||||||
Contrary to stereotype, hackers are not usually intellectually narrow; they
|
Contrary to stereotype, hackers are not usually intellectually narrow; they
|
||||||
tend to be interested in any subject that can provide mental stimulation,
|
tend to be interested in any subject that can provide mental stimulation,
|
||||||
and can often discourse knowledgeably and even interestingly on any number
|
and can often discourse knowledgeably and even interestingly on any number
|
||||||
of obscure subjects if you can get them to talk at all, as opposed to, say,
|
of obscure subjects if you can get them to talk at all, as opposed to, say,
|
||||||
going back to their hacking. It is noticeable (and contrary to many
|
going back to their hacking. It is noticeable (and contrary to many
|
||||||
outsiders' expectations) that the better a hacker is at hacking, the more
|
outsiders' expectations) that the better a hacker is at hacking, the more
|
||||||
likely he or she is to have outside interests at which he or she is more
|
likely he or she is to have outside interests at which he or she is more
|
||||||
@ -25,4 +25,3 @@ psychometric systems, hackerdom appears to concentrate the relatively rare
|
|||||||
INTJ and INTP types; that is, introverted, intuitive, and thinker types (as
|
INTJ and INTP types; that is, introverted, intuitive, and thinker types (as
|
||||||
opposed to the extroverted-sensate personalities that predominate in the
|
opposed to the extroverted-sensate personalities that predominate in the
|
||||||
mainstream culture).
|
mainstream culture).
|
||||||
|
|
||||||
|
@ -1,3 +1,4 @@
|
|||||||
personal surveillance device
|
personal surveillance device
|
||||||
|
|
||||||
Alternative name for a mobile phone, due to their extensive personal data collection and exfiltration capabilities.
|
Alternative name for a mobile phone, due to their extensive personal data
|
||||||
|
collection and exfiltration capabilities.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user