as a counter, it is exactly the hacker ethos to take something and use it not as expected by those that made it so that it can be used for their own purpose