Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 10 of 348

Over 36,500 killed in Iran's deadliest massacre, documents reveal

Scale and Plausibility of the Massacre

  • Many commenters struggle to grasp the logistics of 36k+ killed in two days, asking how this is possible without heavy explosives.
  • Others argue it is sadly feasible in a large country (≈93M people) with 400+ cities seeing protests: ~100 deaths per location, plus execution of wounded protesters in hospitals and detainees.
  • Historical analogies (Rwanda, Nazi Germany) are raised to show that mass killing at such rates is logistically possible, though still horrifying.
  • Some remain skeptical of the exact number, comparing it to past atrocity exaggerations and calling for better methodology and corroboration from independent sources.

Role of Mercenaries and Internal Divisions

  • Several comments claim non-local or foreign proxy forces (from Iraq, Syria, Hezbollah, Arab militants) were used to repress protests, making it easier to kill “outsiders.”
  • Others stress Iran’s internal ethnic and religious diversity (Kurds, Azeris, Baloch, Arabs, religious minorities), arguing that even “domestic” forces may see protesters as an outgroup.
  • Debate over whether “mercenaries” implies pay-driven killers versus ideologically aligned proxy militias.

Source Reliability and Propaganda Concerns

  • Iran International is repeatedly described as Saudi-backed and anti-regime; some see it as “state-aligned influence media” or possibly intelligence-linked.
  • Others defend it as diaspora-run and note corroborating reports from human rights groups and mainstream outlets, arguing bias does not imply falsity.
  • A thread questions whether inflated numbers might be used to justify foreign intervention or to shape US/Israeli strategic interests.

Global Reactions, Politics, and Double Standards

  • Anger that mass killing in Iran gets far less Western public outrage than single domestic incidents (e.g., US police/ICE killings) or some foreign wars.
  • Contentious debate over whether “the left,” US college students, and various foreign-backed protest movements are selectively silent due to ideological or financial ties.
  • Some argue state violence against citizens and wars between states are treated differently mainly for pragmatic/geopolitical, not moral, reasons.

Sanctions, Protest Strategy, and Future Outlook

  • Doubts about sanctions and “civilian pressure” as effective when regimes can rely on external forces to do their killing.
  • Civil disobedience (e.g., mass work stoppages) is proposed but seen as hard under censorship and repression.
  • Commenters fear this marks the end of peaceful protest in Iran, with the country drifting either toward violent revolution or hardened police-state rule.

Clawdbot - open source personal AI assistant

Setup, UX, and Stability

  • Several users report rough onboarding: confusing npm warnings, OAuth pain, package-manager choices, WhatsApp/Signal build-time deps, and many open GitHub issues.
  • Some found the app initially “broken” (lost context, failed reminders, buggy integrations) and uninstalled; others say it becomes “so‑so” to “startlingly good” after tinkering.
  • Token use and slowness (especially via aggregators like z.ai) were common complaints.

Capabilities and “Wow” Moments

  • Key differentiator for fans: a persistent agent that can initiate actions, schedule cron-like tasks, and message you proactively over Telegram/WhatsApp/Slack/Discord.
  • Reported uses:
    • Household reminders and daily family schedules across multiple calendars.
    • Monitoring HN or websites and pushing notable threads/changes.
    • Landlord-style tenant screening and visit scheduling via FB Messenger.
    • Home automation (MQTT/Tasmota, Hue), Plex DVR control (including self-extending its Plex skill), GA4 analytics checks, and email-driven finance summaries.
  • The “it builds new skills for itself and then reuses them later” dynamic is what many say finally makes agents “click.”

Comparison to Claude Code and Other Tools

  • Common view: conceptually just “Claude Code + tools + chat gateway,” not fundamentally new; experienced users say they can already vibe-code similar flows with MCP, Telegram bots, etc.
  • Supporters argue bundling, proactive loops, and always-on presence make it qualitatively different from ad‑hoc LLM chats.

Cost and Token Efficiency

  • Multiple reports of extreme token burn (tens of thousands of tokens per session; hundreds of dollars in days) unless carefully tuned.
  • Some rely on Claude Max-style subscriptions or local models; others see this as a reason to roll their own, slimmer agents.

Security, Permissions, and Prompt Injection

  • Major recurring concern: running a tool-enabled agent with broad desktop/account access, often as root, sometimes directly exposed to the internet.
  • Prompt injection is highlighted as fundamentally unsolved; Clawdbot’s web tools apparently feed untagged external text straight into prompts.
  • Examples include: leaked config tokens, hard-coded OAuth client secrets in extensions, and AI-generated security reports listing many high‑risk issues.
  • Several recommend strict sandboxing/VMs, read-only mounts, allowlists, and treating it like an untrusted contractor at best; others admit almost nobody actually runs it that cautiously.

Hype, Trust, and Alternatives

  • Many perceive heavy, possibly manufactured hype (Twitter, YouTube, a meme around buying a Mac Mini, a third-party crypto token).
  • Some see it as the “ChatGPT moment” for personal agents; skeptics call it “AI slop,” productivity theater, or trivial glue code.
  • A number of commenters are building similar personal assistants themselves and prefer bespoke, narrower, or fully local solutions.

The future of software engineering is SRE

What SRE Is (and Isn’t)

  • Several commenters note the article never defines SRE; others clarify it as “site reliability engineering,” roughly the modern evolution of sysadmin/ops with a focus on uptime, monitoring, and production systems.
  • Debate on scope: some see SRE as mostly web/SaaS; others point out reliability roles exist across many non-web domains.
  • Some argue many “SRE” titles are actually just traditional ops/on‑call roles with new branding.

SRE vs SWE, QA, and Authority

  • Many push back on “everyone becomes SRE”: good developers and good SREs often have different mindsets (innovative vs conservative, feature vs reliability focus).
  • SRE is said to work at Google because SREs can block launches and demand fixes; without that authority you’re just an on‑call engineer with pager duty.
  • Others counter that if all engineers share on‑call, they quickly learn to build more reliable systems.
  • Boundary with QA is fuzzy: some say SREs focus on infra/SLAs, not business correctness; others insist senior SREs must understand product and customers to prioritize work.

AI, Automation, and the SRE Future

  • Core premise discussed: as LLMs make code cheaper, complements like testing, review, and operations gain value. Some strongly agree; others think these complements will also be automated.
  • Multiple SREs and ops people report outages caused by “AI slop” and say current models are bad at real SRE work, including basic tasks like adding observability.
  • There’s deep disagreement on AI trajectory:
    • One camp says current LLMs are brittle reasoners and won’t soon replace SRE.
    • Another asserts no role is safe; as AI improves, SRE/ops will also be automated (“AI SRE” agents already being built).

Scale, Platforms, and Where SRE Matters

  • Distinction drawn between:
    • Small shops: simple monolith + managed platforms (Cloud Run/Fargate/etc.) where dedicated SRE/DevOps is often unnecessary.
    • Large, complex organizations: many teams, legacy systems, strict SLAs, cost–scaling tradeoffs, and heavy Kubernetes/platform complexity where SRE is essential.
  • Some blame Kubernetes and its ecosystem for unnecessary complexity and “platform engineering” overhead; others say k8s is a solid substrate but most orgs actually want a higher‑level platform.

Future Roles and Job Market

  • Competing visions:
    • “Future is SRE/operational engineer” who understands both code and reliability.
    • “Future is T‑shaped product engineer” combining dev with product/UX, with SRE as a separate specialty.
  • Several foresee fewer total engineering roles, with juniors/bootcamp devs and middle management especially at risk, while a smaller number of senior engineers orchestrate AI agents and own reliability.
  • Widespread concern that SREs will be left cleaning up for low‑quality, AI‑generated “vibe‑coded” systems without adequate mandate or staffing.

LED lighting undermines visual performance unless supplemented by wider spectra

Scope of the paper vs popular interpretations

  • Several commenters note the paper is about near‑infrared (NIR) and mitochondrial effects, not visible color rendering or CRI.
  • Others conflate it with common complaints about LED color quality; a few point out that color/fidelity issues can’t explain the studied effect because the control conditions partially rule out pure metamerism.
  • Some see the claim that brief 670 nm exposure improves vision for days as “extraordinary” and demand replication and a clear mechanism.

Color spectrum, CRI, and subjective experience

  • Many report LEDs feeling “bright but not illuminating,” especially in streetlights, car lamps, and cheap bulbs; sodium/mercury and incandescent are described as more comfortable or “natural.”
  • Discussion of CRI/Rf, R9, and SSI:
    • Cheap “blue LED + phosphor” bulbs have gaps in the spectrum, especially in reds and sometimes cyan, causing poor color rendering and orientation issues.
    • High‑CRI and “full‑spectrum” LEDs exist (sometimes 95–99 CRI), but are expensive, rare in bulb form, and often still lack NIR.
    • Some argue 90 CRI is not enough; others find high‑CRI LEDs still inferior to halogen/incandescent for reading comfort.

Infrared, “full spectrum” lighting, and alternatives

  • Commenters note LEDs can be engineered with smoother spectra and NIR/UV, but such products are niche (movie/theater lights, therapy panels, a few costly bulbs).
  • One thread describes experimental “modern incandescent” concepts using spectral filters to keep IR inside and emit mostly visible light, potentially trading some efficiency for beneficial NIR.
  • Debate over whether IR is a “feature” (possible biological benefits) or an energy‑wasting “bug.”

Health, regulation, and energy trade‑offs

  • Strong disagreement over whether LED spectrum/flicker meaningfully harms health (eyestrain vs cancer/metabolic effects). Evidence is called “mostly unsubstantiated” by some and “ignored like asbestos” by others.
  • Policy dimension: bans on incandescent and fluorescent lamps in EU/Australia/US are seen by some as premature or “captured,” by others as justified by large CO₂ and grid‑stability benefits.
  • Practical question raised: even if spectrum is better, is higher operating cost per bulb worth it at typical electricity prices?

Methodological and journal skepticism

  • Critics highlight small sample size, baseline performance differences between groups, unblinded visible changes (warmer/brighter task lamps), and lack of strong controls (e.g., IR‑only vs heat‑only).
  • “Scientific Reports” is labeled a weak venue; commenters call for replication, preregistration, better controls, and high‑end LED comparisons before drawing broad conclusions.

Flicker and practical experiences

  • Several describe perceiving flicker (often at 50/60 Hz or from drivers) and associated headaches or “fatigue,” especially with cheap bulbs.
  • Discussion of DC drivers and better electronics: good LEDs can be effectively flicker‑free, but many consumer products are not.
  • Some users revert to incandescent/halogen for evening or reading while retaining LEDs for high‑power/general use.

The '3.5% rule': How a small minority can change the world (2019)

Limits and Counterexamples

  • Multiple commenters say the “3.5% rule” clearly fails under many modern regimes: cited examples include Iran, Hong Kong, Belarus, and recent protests in Israel and Georgia.
  • Even where turnout plausibly exceeded 3.5%, regimes survived by shooting protesters, mass arrests, torture, or tightening control over elections and media.
  • Historical counterexamples are noted too (e.g., entrenched segregation in parts of the US despite large, organized resistance).

When and Why 3.5% Can Work

  • Several people stress the threshold is descriptive, not a magic law; Chenoweth herself later clarified it’s a historical pattern, not a guarantee.
  • The key mechanism discussed is not crowd size alone but elite defection: mass, organized nonviolent mobilization can convince parts of the ruling coalition the incumbent is too risky to back.
  • 3.5% is framed as a rough indicator that the movement likely reflects much broader passive support, not that 3.5% can override a mobilized majority.

Violence, Nonviolence, and State Repression

  • Nonviolent campaigns historically succeed more often than violent ones in the dataset, but commenters note success rates are far from certain and appear to be declining as states adapt.
  • Some argue nonviolence works partly because there is a credible violent alternative in the background (e.g., Black Panthers vs. MLK), or because state overreaction can backfire.
  • Others counter that violence by dissidents usually hardens the regime and discourages elite defection.

Democracy, Minorities, and Legitimacy

  • One line of debate: is 3.5% “anti-democratic”? Critics say a small minority imposing change on the majority violates democratic norms.
  • Others respond with the “tyranny of the majority” problem and note that small, oppressed groups often have no path except protest; mobilized minorities usually speak for a much larger silent bloc.

Organization, Funding, and “Paid Protesters”

  • There’s extensive argument over whether large protests (e.g., recent US “No Kings” events) are organic or effectively manufactured via funding.
  • Some emphasize foundation money and professional organizing; others, including self-described participants, insist most attendees are unpaid “normal people.”
  • The “paid protesters” trope is recognized as a long-standing way for authorities and partisans to delegitimize opposition, used across countries and ideologies.

Evolving Effectiveness of Protest

  • Several comments claim governments learned from events like Occupy and the Arab Spring how to absorb, outwait, or discredit mass movements without visible massacres.
  • Social-media-enabled protests mobilize quickly but often lack durable organizations or leadership capable of negotiating structural change.
  • Suggested readings (e.g., If We Burn, Twitter and Teargas) are cited for analysis of why recent large movements frequently fail to convert street power into lasting reforms.

Canada

Canada vs. US: Highs, Lows, and Quality of Life

  • Many agree Canada’s “highs are lower but lows are much higher” than in the US, with a slower pace, friendlier culture, and stronger baseline security.
  • Several commenters who grew up poor in either country say Canada’s public goods (healthcare, libraries, recreation centers, child benefits) transform childhood prospects in a way the US often doesn’t.
  • Others counter that parts of the US (suburbs, small towns) offer rich public amenities too: strong libraries, parks, skating/hockey, and good schools, so the author’s US counterfactual is seen as overly bleak.

Social Programs, Libraries, and Everyday Support

  • Canadian commenters highlight subsidized daycare, public transit, recreation programs, and generous libraries as central to their sense of opportunity.
  • Europeans are surprised by free public libraries in North America; some countries (e.g., Netherlands, parts of Germany) use subscription models, prompting discussion about access and literacy.

Economic Anxiety and “Canada Is Gone” Claims

  • One view is that Canada is fiscally fragile (provincial debt, housing bubble, looming “mortgage cliff,” stressed universities) and that social goods are at risk.
  • Others strongly dispute imminent collapse, noting continued safety, stability, and resources; they label dire predictions as scaremongering or ideological.

Brain Drain and Ambition vs. “Go for Bronze”

  • Multiple commenters report that top Canadian tech graduates routinely move to the US, citing 2–3× higher compensation, more jobs, and better startup ecosystems.
  • This is framed by some as evidence that Canada underinvests in opportunity; others argue “going for bronze” — a solid, humane life without hyper-ambition — is a perfectly valid national choice.

Inequality and Healthcare, Especially in the US

  • Several comments depict the US as “two countries”: a wealthy minority with world-class everything and a large majority facing precarious healthcare, housing, and jobs.
  • Others argue the median American is materially very well-off by global standards, but critics respond that consumer goods are a poor substitute for security and social safety nets.

Politics and Institutions

  • Canada’s parliamentary system is cited as a buffer against “Trump-style” leaders, though others note it is no panacea and can still be manipulated.
  • Some suggest Canada should emulate the US’s capital markets without importing its social problems; others float CANZUK or even EU-style integration as ways to gain a larger single market.

Oneplus phone update introduces hardware anti-rollback

Perceived shift in OnePlus’ philosophy

  • Commenters see this as OnePlus completing a long slide from “flagship killer / modder‑friendly” to ordinary locked‑down OEM, especially since Nord, Oppo integration, and rumours of brand wind‑down.
  • Some long‑time users say this is the final straw and plan to freeze updates or abandon OnePlus for Pixels or other alternatives.

What the anti‑rollback fuse actually does

  • Qualcomm SoCs include QFPROM eFuses and secure boot chain: ROM → XBL → ABL → AVB → OS.
  • New firmware burns an “anti‑rollback” version into fuses; on boot the loader compares the firmware’s embedded version to the fuse value.
  • If a lower version is flashed (including older stock firmware or ROM‑bundled firmware), boot is rejected; on these devices that can mean a hard brick, sometimes recoverable only by motherboard replacement or specialized EDL tooling.
  • Bootloader unlocking still works; the key change is that all older firmware trees, including those bundled in existing custom ROMs, become unusable on fused devices.

Motivations and security rationale

  • Supportive view: a serious low‑level bootloader/EDL vulnerability or theft‑lock bypass existed; without rollback protection, attackers with physical access could flash an old, signed, vulnerable image to extract data or bypass locks.
  • Critics argue this is also a convenient way to force stock updates, kill downgrades, and strengthen lock‑in, with anti‑theft and CVEs used as recurring justifications.

Impact on custom ROM community

  • Existing ROMs built against pre‑fuse firmware bases can immediately brick updated devices; users are told not to flash anything until ROM maintainers explicitly add support.
  • In principle, ROMs can be rebuilt against the new firmware/bootloader and made to work, but downgrading to earlier ROM builds or stock versions will remain impossible.

Security vs. ownership debate

  • Large subthread debates whether hardware anti‑rollback and trusted boot are legitimate security tools (anti‑downgrade, anti‑theft, anti‑Pegasus) or fundamentally anti‑ownership.
  • Many argue remote, irreversible hardware state changes by vendors undermine right to repair and even basic property rights; others counter that eFuses and rollback prevention are longstanding, industry‑standard practices.

Broader context and comparisons

  • eFuses and anti‑rollback are described as ubiquitous across SoCs and used for yield management, unique keys, secure boot, and Knox‑style features.
  • Similar downgrade‑blocking exists on iPhones (signature‑based), Samsungs (Knox), consoles, and is encouraged by Android certification; some fear upcoming EU cybersecurity rules will be used to tighten such controls further.

Yes, It's Fascism

ICE Killings and Alleged Fascist Policing

  • Many see recent ICE shootings as extrajudicial executions: unarmed or non-threatening people killed, then instantly branded “terrorists” by the administration.
  • Commenters note ICE’s unusually high funding, large signing bonuses, recruitment from prisons, and a culture of impunity (agents back at work immediately after killings) as key warning signs.
  • Some explicitly compare ICE to Nazi brownshirts, slave catchers, and secret police; others stress the continuity with historic U.S. racism and counterinsurgency, rather than needing German analogies.

Are Trump and MAGA Fascist?

  • Many argue the situation now clearly meets definitions of fascism (citing Eco’s “Ur-Fascism” and historians who checked all 14 boxes years ago).
  • Others say the term was overused since 2016, causing “semantic satiation,” but concede current behavior fits classic fascist patterns.
  • One view: the U.S. is a “hybrid state” — a fascist leader atop a still-liberal constitution — with open questions about whether full fascist takeover occurs.

Nature of ICE Agents and System Design

  • Split views: some say agents are poorly trained, misled, and pushed into tense situations; others argue there is strong selection for people who enjoy violence and know they’ll be protected.
  • Historical psychology experiments (Milgram, disputed Stanford Prison) are invoked to argue both that ordinary people can be made cruel and that abusive roles attract abusers.
  • Many emphasize that the deeper culpability lies with leadership and legal structures granting de facto immunity, not just individual shooters.

Democracy, Voters, and the Future

  • One line of discussion: “the people voted for this,” so critics must confront the possibility that democracy itself is producing authoritarian outcomes.
  • Others counter that constitutional rights are not up for majority vote and that gerrymandering, disenfranchisement, and institutional capture distort “the people’s will.”
  • Deep anxiety about 2028–2029: whether Trumpism becomes normalized post-Trump, whether future Republicans will push further, and whether Democrats are offering serious structural remedies.

Protest, Apathy, and Media/Platform Dynamics

  • Some are shocked there aren’t mass nationwide protests; others note there are large protests, but conservative media portray ICE actions as justified and dismiss critics as suffering “TDS.”
  • Several argue protests are even desired by the administration to justify escalation, martial law narratives, or further crackdowns.
  • Meta-debate on Hacker News itself: users allege political flag brigading and “soft censorship” of anti-fascist content; moderators respond that they’re trying to keep HN from becoming all-politics and apply rules symmetrically, but acknowledge the tension and user frustration.

What To Do / Possible Responses

  • Proposals range from massive investigations and Nuremberg-style trials, to electoral reform and accountability for collaborators, to more radical ideas like disenfranchising committed fascists.
  • Others look to nonviolent resistance models (Gandhi, Mandela) and stress appealing to shared values, while some are pessimistic that persuasion can reach hardened supporters.

I was right about ATProto key management

P2P vs Federated vs Centralized Models

  • One camp argues social protocols should be fully peer‑to‑peer (email/BitTorrent/PGP‑like), with websites as optional “views” over a swarm, not control points. This, they claim, would have prevented the key‑management failure in the article.
  • Others counter that large‑scale, Twitter‑like systems need “beefy servers” and microservices; P2P alone struggles with hundreds of millions of posts/day, NAT, lack of inbound connections, and users unwilling to run always‑online nodes.
  • Several propose hybrids: P2P plus federation, or ATProto‑style granular servers (PDS) and relays, where infrastructure can decentralize even if most people opt into hosted services.

ATProto, DIDs, and Key Management

  • Many see the did:web flow as under‑documented and fragile; the “burn” mechanism that permanently blocks reused domains is viewed as a design mistake for inherently transient DNS identities.
  • did:plc is described as centralized and controlled by Bluesky; critics see this as a single point of failure contradicting decentralization claims.
  • Others argue did:plc is more pragmatic for most users and that did:web is currently an edge case with very few deployments, but agree its UX and tooling need major work.

Mastodon / ActivityPub Comparisons

  • Critiques of Mastodon/ActivityPub include: federation wars and political moderation, incomplete migrations (posts/media lost), partial network views, no global search, security issues, and admins wielding disproportionate power.
  • Defenders respond that these are side‑effects of genuine decentralization: no central authority to coordinate migrations or enforce compatibility, and local instances must filter to avoid spam/DoS.
  • Some argue Mastodon has effectively become “a federated set of centralized services” and that lock‑in now shifts from platform to instance or protocol.

Spam, Micropayments, and Moderation

  • A recurring concern: in a pure P2P system “the swarm is mostly spam,” and decentralized spam filtering either burdens every user or re‑centralizes moderation.
  • Micropayment‑based filtering is debated: proponents see it as a way to price attention; critics note that spammers are often the only actors willing to pay, micropayments are unsolved at scale, and you risk building an inbox of paid spam.

Decentralization in Practice and User Priorities

  • Several commenters argue most users don’t actually care about decentralization and are content with Bluesky as “Twitter but with better leadership,” making centralization sticky.
  • Others warn that dominance of Bluesky‑run PDS, AppView, and did:plc means the company could later close APIs or defederate third parties, as happened with other “open” platforms in the past.

Complexity, Self‑Hosting, and UX

  • ATProto is seen by some as over‑engineered and complexity‑heavy, effectively gating participation to well‑resourced operators; nostr, email, RSS, and simple pull‑based models are cited as friendlier alternatives.
  • Others note that while complex, ATProto provides a strong basis for many multi‑user apps if you accept Twitter‑scale requirements, and that PDS/relay setup is relatively smooth compared to key management.
  • There’s broad agreement that key handling and account recovery UX are neglected, and that “true ownership” requires making self‑hosting and identity management far simpler.

Size of Networks and Alternatives

  • Some argue we don’t need global social graphs at all; Discord‑style or forum‑like small communities better match human social dynamics and avoid many moderation and scaling pathologies.
  • Others push back that Discord itself is centralized and toxic in its own ways, suggesting old‑school forums/IRC as better small‑community analogues.

Meta: Article Presentation

  • A noticeable side thread criticizes the blog’s “man‑page” aesthetic and low‑contrast colors as actively discouraging reading; others counter that style is the author’s prerogative and such complaints are off‑topic.

Spanish track was fractured before high-speed train disaster, report finds

Track monitoring and defect detection

  • Commenters list multiple existing systems: dedicated measurement trains with cameras, LIDAR, lasers, ultrasonic flaw detection (USFD), “Doctor Yellow”-type high‑speed inspection trains, wheel impact load detectors, acoustic/strain/IR/camera systems, and traditional walking inspections.
  • Some argue every train should carry basic condition sensors; others note underframes are crowded and hardware is bulky/industrial.
  • Track‑circuit continuity and time‑domain reflectometry are mentioned as rail‑break monitors, but not always compatible with modern high‑speed signalling; axle counters are common.
  • There is frustration that several trains passed the defect (wheel “notches” were later found) without any system flagging it.

Nature and evolution of the fracture

  • The visible ~40 cm gap is described as enormous; several people stress this size likely resulted from the derailment itself, not the initial defect.
  • The failure point was at a welded joint between older (1989) rail and a newly renewed segment; discussion clarifies that weld metal is often stronger than the parent rail, with weakness just adjacent to the weld.
  • There is some confusion over reports that the “broken rail was new” vs “old but poorly maintained”; later comments converge on “failure at the transition between old and new.”
  • Continuously welded rail behavior under temperature and tension is discussed; commenters dispute how much a cut rail can actually “shrink” given sleepers and ballast.

Barriers and alignment design

  • One line of discussion asks if physical walls between tracks should be mandatory.
  • Most replies are skeptical: containing a derailed high‑speed train would require an enormous structure, could worsen debris spread, increase drag/energy use, introduce new maintenance burdens, and cannot exist at switches where this crash occurred.
  • A more modest idea is to place high‑speed passing points where tracks are separated by distance rather than walls.

Spain’s maintenance, inspections, and comparisons

  • Multiple comments point to underinvestment in maintenance relative to new construction, but others argue that comparing “% of budget” is misleading without per‑km and age‑adjusted figures.
  • There is debate over whether Spain “does not do the required maintenance” vs. whether inspection standards or execution were inadequate, given the section was reportedly renovated and inspected recently.
  • Japan’s Shinkansen is frequently cited as a contrast: dense network, frequent high‑speed inspection runs, strong safety culture/accountability, and possibly higher sustainable maintenance spending per km. Some push back that two Spanish HSR accidents over decades is still statistically rare.

Frequency, sabotage, and coincidence

  • Track fractures are said to be “very” common in general rail practice, but usually caught early. Several historical fracture‑related accidents elsewhere are cited.
  • Others speculate about sabotage or foreign intelligence involvement in European rail incidents; this is met with skepticism and counterexamples (e.g., long‑standing copper theft problems) and reminders that official investigations have attributed some outages to theft, not state actors.
  • A cluster of several Spanish rail accidents in one week is noted; some see it as alarming coincidence, others caution against over‑interpreting rare events.

Additional sensing proposals

  • Ideas include: cameras watching wheels for notches, high‑speed imaging of rails, onboard impact/load monitors, and more aggressive use of existing detectors.
  • Some argue simple force/impact measurement on wheels is more practical than complex vision systems; others think modern high‑speed cameras and lighting could be justified for HSR safety.

First, make me care

Hooks vs. Getting to the Point

  • Many agree the core idea—“first, make me care”—is valid, but differ on how to do it.
  • Some want a strong narrative hook; others prefer “start with the interesting part” or BLUF/inverted-pyramid style: state the thesis or conclusion up front, then elaborate.
  • Several argue that technical audiences often already care (they have a preexisting question), so overlong narrative setups feel like padding or manipulation.
  • There’s concern that “make me care” easily drifts into clickbait, burying the lede and rewarding attention-gaming over clarity.

Writing Goals: For Yourself vs. For Readers

  • One camp insists writing’s primary goal is communication: if you want to be read, you must think about hooks and reader motivation.
  • Another camp says you should write for yourself first; chasing hooks and retention degrades authenticity and turns writing into salesmanship.
  • Some nuance: there’s “acquisition content” (to attract new readers) vs. “retention content” (for people who already like your voice); over-optimizing for the former can burn writers out.

Hooks, Clickbait, and the Attention Economy

  • TikTok and similar platforms are cited as extreme versions of “make me care in seconds,” with millions of creators running a de facto genetic algorithm on human attention.
  • Multiple commenters find this psychologically destructive: constant short hooks train people to skip anything that doesn’t instantly reward, eroding depth and focus.
  • Others note that short-form feeds and YouTube thumbnails already embody the same hook logic Gwern describes; the difference between “good hook” and “one weird trick” clickbait is mostly degree and honesty.

Reactions to Gwern’s Style

  • Some praise the article as a clear, useful demonstration of framing the same material with and without a hook.
  • Others criticize Gwern’s broader writing as dense, over-hyperlinked “hypermedia,” or emotionally thin; they see irony in him advocating “make me care.”
  • A counterview is that many HN readers already care because of the author’s reputation; his site is valued as a deep reference, not as polished narrative.

The Venice Example

  • Several readers say the Venice hook worked so well they mostly wanted the actual Venice essay.
  • A few sketch quick answers (naval power, trade networks, fish, salt and spice monopolies), while others note the article never resolves its own “hook,” which they see as violating its own advice.

ICE using Palantir tool that feeds on Medicaid data

Privacy, Power, and “Nothing to Hide”

  • Many argue this case is the archetype of why privacy matters: once detailed data exist and are centralized, any future regime or rogue insider can weaponize them, regardless of the original purpose.
  • The “nothing to hide” stance is challenged with examples: abusive ex-partners in law enforcement, stalkers, political enemies, and shifting definitions of what is “illegal” (religion, sexuality, speech, social media posts).
  • Others counter that the core problem is not data collection but the breakdown of rule of law and due process; in a corrupt system, even banning data collection doesn’t save you.

Scale, Dehumanization, and Historical Echoes

  • Commenters see Palantir-style tools as “Lavender v2”: their main function isn’t accuracy but dehumanization—turning people into targets and lists.
  • Historical parallels are repeatedly raised: Nazi use of registries, Japanese-American internment using census data, Belarus persecuting ham radio operators, and the risk that once-neutral datasets become “turnkey tyranny.”
  • Some say legality is a poor safeguard: laws can be reinterpreted, changed, or simply ignored by a determined executive.

Medicaid Data, Immigrants, and Families

  • There’s debate over how directly Medicaid ties to “illegal” immigrants:
    • Federal rules mostly restrict undocumented people, but states can cover some non‑citizens or fund emergency care; citizen children with undocumented parents are a major vector.
    • That makes Medicaid records (addresses, households, diagnoses, prior addresses, ethnicity) a powerful way to locate mixed‑status families.
  • Several describe real-world cases of parents of autistic or chronically ill kids on Medicaid being picked up by ICE, seeing this as morally grotesque exploitation of health data.

Authoritarian Drift and Political Uses

  • Many see ICE’s use of Palantir, face recognition, ALPRs and cross-agency data as part of a broader project: a surveillance-based apparatus to intimidate protesters, legal observers, and political opponents.
  • Recent shootings of US citizens by ICE/CBP, resistance to body cameras, and efforts to obtain voter rolls are cited as evidence that this is not “just about immigration.”
  • A minority emphasize that immigration laws “must be enforced” and that deportation itself isn’t inherently evil; critics respond that current practices are indiscriminate, error-prone, and used as a tool of repression.

Tech Industry, Responsibility, and HN Meta

  • Strong condemnation of Palantir and similar firms: employees are called collaborators; some wish for internal sabotage or mass resignations but note most staff either believe they’re “doing good” or are just in it for the money.
  • Others argue this is precisely why technologists must engage with politics: tools they build are now central to policing, borders, and elections.
  • Frustration surfaces over HN flagging and “no politics” norms, which some see as willful avoidance while a surveillance state is being built with mainstream tech.

FAA institutes nationwide drone no-fly zones around ICE operations

Perception of the new drone restriction

  • Many see the moving no‑fly “bubble” as designed to prevent public filming of ICE/DHS operations and potential abuses, not as a genuine safety measure.
  • Others suggest a more security-focused motive (e.g., concern about weaponized drones / RPGs), but even they note the convenient side effect of blocking live-streamed encounters.
  • Some point out the NOTAM actually covers DoD, DOE, and broader DHS “mobile assets,” not just ICE.

Legal and constitutional concerns

  • Strong worry that the rule is effectively impossible to comply with (no coordinates, no activation times), resembling “laws that are impossible not to break” – a hallmark of authoritarianism in the eyes of many commenters.
  • Comparisons to vague or strict-liability laws (gun‑free school zones, statutory rape) are raised, but others argue those at least involve discoverable facts, unlike secret ICE convoys.
  • Several call it FAA overreach beyond its original low‑altitude remit and cite recent Supreme Court decisions (Loper Bright, Trump v. United States) as evidence that judicial checks are weakening.

Enforcement, chilling effects, and secrecy

  • People highlight that a legal drone flight could instantly become illegal when a convoy passes, making anyone filming vulnerable to after‑the‑fact enforcement via Remote ID logs.
  • This is seen as a tool to selectively target activists and “normal people” alike, creating a broad chilling effect on recording public events.
  • Some pilots note similar information gaps already exist for sports‑event TFRs, but others say those are more bounded (static stadiums, known event types) than a roving secret zone.

Drone technology and workarounds

  • Discussion of DJI geofencing: some claim it can be disabled or has been relaxed; others doubt it, citing heavy restrictions near major airports and DC.
  • Multiple comments argue it’s trivial for skilled hobbyists to build drones without Remote ID or geofencing, though cost, skill, and risk of being labeled a “terrorist” are deterrents.
  • Suggestions include FPV homebuilt drones, tethered testing tricks, offline recording, and eventually AI‑guided, GPS‑independent navigation.

Broader political and societal anxieties

  • The rule is framed by many as one more step toward an authoritarian or theocratic state: secret police, unaccountable executive power, and normalized labeling of dissenters as “domestic terrorists.”
  • Others push back that both sides are being manipulated and that talk of inevitable civil war is dangerous, but several believe the U.S. is already sliding toward “regime” behavior seen abroad.

White House alters arrest photo of ICE protester, says "the memes will continue"

Use of Generative AI for State Propaganda

  • Commenters see this as a rapid, predictable weaponization of generative AI for political disinformation, not just vanity edits.
  • Key distinction from Photoshop: AI drastically lowers skill, cost, and time barriers, enabling mass, believable manipulations by unskilled operators.
  • Concern that soon there will be AI-generated “new angles” of shootings or protests that fabricate weapons or aggression, tailored to confirm existing worldviews.
  • This case is seen as especially egregious because it targets an unconvicted protester, alters emotional expression, and reportedly darkens her skin.

Erosion of Trust and “Post-Truth” Politics

  • Many now reflexively doubt any striking image or video, even benign ones (cute animals, disasters).
  • Some argue the goal is not to convince people a specific lie is true, but to undermine the very concept of objective truth so supporters can ignore any inconvenient facts.
  • The behavior of officials mocking fact-checkers and bragging about “memes” is read as deliberate normalization of trolling, lying, and bad faith.
  • This is likened to the “firehose of falsehood” strategy associated with other authoritarian regimes.

State Power, Fascism, and Civil Resistance

  • Strong sentiment that the US is sliding toward, or already in, a form of fascism; debates over whether the democracy is “failed” or merely “failing.”
  • Some fear that any armed resistance would be used to justify martial law and suspension of elections; others emphasize the importance of filming and documenting abuses.
  • Comparisons are drawn to historical federal interventions in states; concern that current interventions are driven by pettiness rather than principle.

Tech Culture, HN Politics, and Responsibility

  • Discussion over whether the tech world and HN lean libertarian, right-wing, or progressive, and how Silicon Valley is aligning with authoritarian power for profit.
  • Warnings that “every invention becomes a weapon,” with generative AI framed as good for individuals (especially elites) but corrosive to social trust.
  • Some propose extreme remedies (mass trials, aggressive antitrust, wealth caps); others point to long-term economic stagnation and inequality as the root driver of far-right support.

Law, Accountability, and Limits

  • Some outline a plausible defamation case for the protester, but others note federal sovereign immunity likely blocks such suits.
  • Widespread pessimism that courts or existing institutions will meaningfully restrain this behavior.

A macOS app that blurs your screen when you slouch

Security, Privacy, and Trust

  • Strong concern about giving a background app continuous camera access, even for a simple posture tool. Some say they’d never install an unaudited camera app; others are reassured by the tiny, open-source codebase.
  • Debate over how much notarization helps: described as mostly a malware scan that can be bypassed; revocation only happens after third‑party detection. Consensus: if you’re truly paranoid, compile from source yourself.
  • Worry that binaries could differ from the repo; notarization doesn’t fully solve that. DIY builds are seen as the only strong guarantee.
  • Some users dislike that an always‑on camera defeats the usefulness of the indicator light; a few want hardware kill switches or use physical covers instead.

Monetization and Distribution

  • Several commenters would happily pay (e.g., $10) for a notarized, polished build, especially if it saves them effort and risk.
  • Others think paying for notarization of open-source tools is a niche desire and not a strong monetization strategy.
  • New macOS security behavior (Sequoia) made launching the unsigned app confusing; notarization later addressed this.

Implementation, Performance, and Ports

  • App is a small Swift codebase using Apple’s Vision framework; some see this as “trivial” and perfect for AI-assisted/vibe coding.
  • Initial versions consumed too much CPU; lowering camera resolution and frame rate reportedly cut usage dramatically. Some still find it too heavy to run constantly.
  • Issues with blur not working on certain macOS versions led to forks and a compatibility mode using public APIs.
  • Users request Linux/Windows versions, but lack of a built‑in, robust cross‑platform vision API is seen as the main blocker.
  • Confusion over “Claude Mode Active” led to an explanation: it was from an abandoned experiment where an LLM judged posture from screenshots.

Ergonomics, Posture, and Productivity

  • Mixed views on “good posture”: some see upright posture as protective; others argue there’s no single correct posture and that movement, strength, and comfort matter more than rigid alignment.
  • Many report being most productive while slouching, reclining, or working from bed; a minority say upright/standing correlates with focus.
  • Several describe alternative setups (backless or kneeling chairs, medicine balls, F1‑style recline, adjustable desks, AR/VR headsets) and stress frequent movement, stretching, and/or strength training.
  • Some users with chronic back issues find the blur feedback surprisingly effective and plan to keep using the app, even while admitting it’s mildly infuriating because it reveals how quickly they start to slouch.

UN declares that the world has entered an era of 'global water bankruptcy'

Lived experience of “severe water scarcity”

  • Commenters push back on the idea that “water cuts off for a month” is the main scenario.
  • Typical patterns described:
    • Urban taps only running a few hours a day or one day a week in hot seasons; households storing water in drums and barrels.
    • Daily life in poorer regions shifting to long queues, longer walks to wells, declining water quality, and conflicts at water points.
    • Water collection time expanding from ~1 hour/day to many hours, mainly affecting women and girls, with knock-on effects on schooling and income.
    • In richer regions, restrictions mean shorter showers, bans on lawn watering, and, in some cases, trucking in water for livestock.
  • The “one month per year” framing is criticized as understating how scarcity coincides with dry seasons and crop failures, compounding stress and poverty.

Distribution, agriculture, and mismanagement

  • Many argue the problem is not absolute global shortage but where water is, who can pay, and how it’s managed.
  • Examples: groundwater overdrawn in California’s Central Valley; high shares of river water allocated to crops (often animal feed) in arid regions; water‑intensive crops (alfalfa, nuts, pistachios, watermelon) grown in drought-prone areas.
  • Several note that large dams, canals, and aquifers have already been heavily exploited; even rich regions struggle to manage demand sustainably.

Desalination, pipes, and energy constraints

  • One camp claims oceans plus cheap pipes and desalination make “water bankruptcy” overblown, given modest kWh/m³ figures.
  • Others counter with:
    • High energy and infrastructure costs of lifting huge volumes hundreds or thousands of meters and kilometers inland.
    • Limits in poor countries with very low per-capita electricity use.
    • Brine disposal, filtration, and treatment challenges.
  • A recurring theme: “anything is possible with enough energy,” but scaling low‑carbon power and infrastructure is the bottleneck.

Data centers and industrial water use

  • Debate over whether data centers are “huge water hogs”:
    • Some point to large evaporative cooling demand and local groundwater impacts.
    • Others note national totals are tiny versus irrigation and power plants, and that newer centers are moving to closed-loop or zero-water cooling.

Rhetoric and the term “global water bankruptcy”

  • The UN’s definition—overspending a region’s hydrological “budget” to the point that meeting human demands requires unacceptable ecological damage—is shared.
  • Some find the metaphor apt and clarifying; others call it vague, alarmist branding that stretches “bankruptcy” beyond its normal meaning.
  • There is broader skepticism toward UN messaging and media coverage, with accusations of fearmongering and loaded narrative devices.

Iran Protest Death Toll Could Top 30k, According to Local Health Officials

Casualty Numbers & Credibility

  • Many commenters find 30,000 deaths plausible given the regime’s history and lack of transparency; others call for heavy skepticism.
  • The article’s inability to independently verify figures is a major sticking point. Some see that disclaimer as honest journalism; others see it as a red-flag reminiscent of pre‑Iraq‑war reporting.
  • There’s debate over sources like HRANA and other rights groups, with some highlighting possible U.S. funding/intelligence ties and others noting converging numbers from multiple organizations.
  • Several stress that authoritarian refusal to allow observers itself raises the probability that high death tolls are real.

Evidence, Video Footage & Deepfakes

  • Some claim there’s ample visual evidence on gore sites and niche platforms; others say widely circulating clips look staged or lack visible casualties.
  • The scarcity and inconsistency of footage are attributed to: nationwide internet shutdowns, whitelisting, Starlink jamming, and better propaganda/deepfake capabilities.
  • One long comment warns that GenAI-generated Iran videos are now widely recycled through diaspora WhatsApp networks and even mainstream outlets, making verification harder.

Protest vs. Uprising

  • Multiple comments argue this should be called a revolutionary uprising, not “just protests,” given the scale of killing and armed resistance.
  • Others note it began as peaceful protests, escalated after state violence, and now resembles an incipient civil conflict.

Regime Repression & Security Apparatus

  • Discussion outlines Iran’s layered security architecture: army, IRGC, Basij militia, police, morality police, and intelligence units, designed to prevent mutiny.
  • Some claim the regime used foreign proxy militias (e.g., from Iraq) rather than regular army units to fire on crowds, though details are contested and partly anecdotal.

Internet Shutdown & Tech Response

  • A detailed technical comment describes Iran’s “surgical” shutdown: BGP cuts, mobile data killed, Starlink jammed.
  • This sparks a debate: one side urges “offline‑first” and mesh-based tools as a human-rights necessity; others argue such design tradeoffs should be limited to specialized apps and note that determined dictators can criminalize or detect alternative communication anyway.

Global Activism, Media & Geopolitics

  • Several wonder why there isn’t Gaza‑ or Ukraine‑level international mobilization, despite a comparable or larger death toll.
  • Explanations offered: fear of fueling a U.S. war on Iran; lack of graphic, verifiable imagery; “outrage bandwidth” consumed by other crises; and the fact that Western governments already oppose Iran, so protests feel less targeted.
  • Some accuse both media and activists of selective outrage and of filtering concern through domestic political narratives (Trump, Israel/Palestine, etc.).

Alarm overload is undermining safety at sea as crews face thousands of alerts

Alarm overload as a general safety problem

  • Commenters see ships’ alarm overload as one instance of a broad human‑factors failure: when “everything is important,” nothing is, and operators tune out.
  • Similar phenomena are cited in:
    • Cars (lane assist, collision warnings, speed alerts, chimes you can’t disable or quiet).
    • Aviation (multiple simultaneous alerts from shared failures, NOTAMs burying critical info in noise, AF447 ACARS/ECAM discussion, QF32 workload).
    • Hospitals (monitor alarms with many false positives leading to alarm fatigue).
    • Industrial plants, pipelines, SCADA systems, telco NOCs, oil pipelines, nuclear plants (Three Mile Island), even fast‑food kitchens (timer cacophony).

Consequences for behavior and safety

  • Excessive or low‑quality alarms cause:
    • Distraction and stress, including at exactly the moments needing maximum focus (e.g., snow driving).
    • Complacency and “boy who cried wolf” effects; alarms become background noise.
    • Workarounds: bypassing/jumpering alarms, ignoring systems like Sentry/logging, treating popups as click‑through.
  • Some report that removing guardrails (confirmation dialogs, interlocks) or signals (traffic lights) can reduce incidents by forcing genuine attention, tying into “risk compensation” theory.

Incentives, liability, and blame shifting

  • Repeated theme: systems are designed to minimize corporate/legal exposure, not operator workload.
    • It’s safer (for designers, lawyers, and regulators) to trigger too many alarms than to risk one missing alarm.
    • Alarms and warnings serve as “CYA” evidence: “we warned the operator,” shifting fault to low‑level staff.
    • Designing hardware to fail safe is expensive; adding messages is cheap.
  • Counter‑arguments note engineers also favor cheap “slap an alarm on it” solutions and that incentives across lawyers, engineers, managers, regulators, and insurers form a complex “incentive ecology.”

Design, prioritization, and technical fixes

  • Many argue for better alarm architecture rather than more alarms:
    • Cascading alarm suppression and deduplication (root‑cause first, consequences hidden or downgraded).
    • Clear prioritization and inhibition rules (as with aviation ECAM: red vs yellow, inhibit during takeoff).
    • Criticality tagging and user‑controlled filtering/log levels.
    • UI that aggregates detail into expandable views, not simultaneous beeping.
  • Poor UX (ambiguous dialogs, non‑actionable text, wrong criticality tags) worsens confusion and provides cover for careless behavior.

Study scope and regulation

  • Some question the maritime study’s sample size (11 ships), though others note that particular national fleets are quite small; global representativeness is left unclear.
  • Views diverge on regulation: some say only standards/regs will fix this; others argue bad or misapplied standards helped create the problem.

Doom has been ported to an earbud

Technical aspects of the earbud Doom port

  • Runs Doom on PineBuds Pro and exposes it over the internet so others can remotely play on the author’s own earbuds.
  • Video is JPEG-encoded from Doom’s 8‑bit palette framebuffer; reported compression around 4.7–5.8:1 depending on scene complexity.
  • There is a standalone viewer that can connect directly to the buds and display the game on mobile, though currently only as an intro loop without touch controls.
  • Discussion of using UART vs Bluetooth: UART gives much better throughput than Bluetooth’s ~1 Mbps, leading to the question of running a Doom instance per earbud.
  • Author notes multiplayer between left/right earbuds was a “stretch goal”; others joke about splitting screen/eyes for stereo or VR-style Doom.

Reactions to PineBuds Pro as hardware

  • Some commenters use PineBuds Pro regularly and like them, but note limited battery life (~2 hours with ANC).
  • Others use them as generic Bluetooth buds without ANC and are satisfied.
  • One person is wary due to past negative Pine64 hardware experiences.

Overpowered microcontrollers: triumph, failure, or waste?

  • One side views this as evidence of “overkill” general-purpose hardware in simple devices, possibly an economic or environmental failure.
  • Counterarguments:
    • Economies of scale make powerful general-purpose MCUs cheaper than custom ASICs or FPGAs for most products.
    • ANC, beamforming, codecs, and wireless stacks genuinely need substantial compute and low latency.
    • Extra headroom enables firmware updates, new features, and future-proofing, potentially reducing e‑waste.
    • Material cost per additional transistor on mature nodes is tiny; most cost is design, tooling, and manufacturing process.
  • Some emphasize environmental impact from chip fabrication (chemicals, energy, water) and argue that “materials are nothing” understates real costs.

Doom as a cultural and technical benchmark

  • Many celebrate the port as part of the long-running “it runs Doom” tradition, sharing links to lists and communities of Doom ports and related projects (dongles, vapes, etc.).
  • Doom is seen as the default because it’s open source, iconic, resource-light but non-trivial, and technically interesting.
  • A few lament that it’s always Doom and reflect on how older, smaller games (e.g., classic DOS titles) feel tighter and more replayable than many modern, bloated, grindy games.

Humor, meta, and side notes

  • Jokes about Doom on disposable vapes, lightbulbs, Kubernetes-on-earbuds, “Doom’s Law,” and sending Doom to aliens.
  • Some note that if an earbud can run Doom, it can also run malware.
  • Several people praise the project’s web presentation and the idea of letting strangers play on the actual hardware.

A flawed paper in management science has been cited more than 6k times

Replication Failures, Misconduct, and Career Risk

  • Multiple commenters describe failed attempts to reproduce highly cited work (biotech, sensors, management, CS), sometimes concluding the original data were faked or heavily massaged.
  • Junior researchers who uncover problems often face stonewalling by authors, non-response from journals, and silence from institutions; trying to expose misconduct is seen as career suicide.
  • Common coping strategy: abandon the topic, switch labs, or leave academia for industry. Replication is treated as low-status, unrewarded work.

Citations, Metrics, and Gaming the System

  • High citation counts are widely seen as decoupled from quality; people copy references without reading, bad or refuted work keeps getting cited, and citation rings and inflated author lists are reported.
  • Proposed fixes include:
    • Overlay “trust” or “taint” labels on the citation graph based on known problems and how papers cite flawed work.
    • Redefine h-index to require replications, or add tiers (data disclosed, replicated, etc.).
  • Others argue any such metric will itself be gamed and further entrench conservatism and reputation-protection.

Journals, Retractions, and Institutional Incentives

  • Retractions are debated: some say they should be reserved for clear misconduct; others argue failing to correct known, influential errors is itself harmful.
  • Editors and universities are portrayed as highly reluctant to retract or even publish critical comments, especially when reputations, elite institutions, or hot policy topics (e.g., sustainability/ESG) are involved.
  • Publish-or-perish, prestige journals, and grant incentives are repeatedly cited as root causes.

Management/Social Science and “Scientism”

  • Many express deep skepticism toward “management science” and parts of psychology, business, nutrition, and medicine, seeing them as especially prone to non-replicable or over-optimistic claims.
  • Some argue that much of contemporary “science” functions more like legitimizing rhetoric for elites (“The Science says…”) than like a robust error-correcting system.

Ethics: Bad People vs Bad Systems

  • Large subthread debates whether authors of flawed or fraudulent work are “bad people” or normal people responding to perverse incentives.
  • One side stresses systemic fixes, blameless postmortems, and avoiding villain-labeling; the other insists that absence of real personal consequences enables ongoing fraud and erodes public trust.

Proposed Reforms

  • Preregistration; mandatory sharing of data/code; explicit publication of replication attempts; visible links from original papers to critiques; rewarding debunking; and more openness (e.g., PubPeer-style commentary) are all suggested.
  • Some pessimists argue that if a field is mostly bogus, the only rational move is to disengage rather than search for rare “diamonds in the rough.”