I think it's something along the lines of there being a model of HP printer which was advertised as being wifi-only, and apparently had no USB port, but if you removed a strategically-placed sticker you'd find this was a lie.
Something that I'm not seeing mentioned in these comments (I may just have missed it) is that you can precompute the hash of the static part of the string and then extend it with the numbers in a loop, saving some cycles. This is because the full hex representation of a SHA hash gives you the entire internal state of the algorithm. This can lead to security vulnerabilities:
The final e would be pronounced too, I'm pretty sure. (I'm working on the basis that Scots Gaelic language and orthography are close to Irish, so I can make reasonable guesses.)
They still honor it. I have to tell squid which domains to not MITM because some of Google's sub-domains, paypal, the EFF and a few others still use it.
I suspect all of those pins are from preloading (arranged by request with Chrome maintainers) and not HPKP. HPKP was supposed to allow for similar security after first use, without needing to interact with maintainers and wait for a browser release, but because of the probability of shooting your own foot, usage was extremely low and it was on the path to removal, last I checked.