why do hackers love strings?