Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 106 of 348

Microsoft Can't Keep EU Data Safe from US Authorities

Microsoft, CLOUD Act, and French Testimony

  • Commenters note the testimony is from July and focus on the claim that no US data requests have yet occurred.
  • Some accept that, under oath in France, lying would be risky, especially given potential espionage charges if French state data were involved.
  • Others are deeply skeptical, pointing out US gag orders, the possibility of “rogue” staff or US-controlled access paths, and Microsoft’s prior marketing assurances to EU lawyers that now appear misleading.

Sovereign Cloud and “Trusted Subsidiaries”

  • The idea of a “trusted” local subsidiary with only local citizens is seen as weak protection.
  • Core concern: control flows through US-written software, global admin/support teams, and mandatory updates. A “security update” could exfiltrate data without local knowledge.
  • Several argue “sovereign clouds” from US hyperscalers are mostly compliance theater that satisfies checkboxes but not real sovereignty.

CLOUD Act vs GDPR and Legal Structure

  • Many say the incompatibility of CLOUD Act and GDPR has been obvious for years; US companies must be treated as unsafe third-country processors regardless of where data sits.
  • Debate over whether non‑US multinationals with US subsidiaries (e.g., OVH) are effectively under CLOUD Act reach; some cite OVH’s own FAQ acknowledging possible extra‑territorial requests.
  • Others argue foreign parents are outside US jurisdiction in theory, but note the US often uses economic and political coercion in practice.

Technical Limits of Protection

  • Strong end‑to‑end encryption and minimal data collection are seen as the only robust defenses.
  • But cloud isn’t just storage: for compute, plaintext and keys must exist in RAM somewhere, giving cloud operators (and thus their governments) theoretical access.
  • Confidential computing (Intel TDX, AMD SEV, enclaves) is mentioned but distrusted due to past side‑channel breaks and opaque hardware.

EU Dependence and Strategic Response

  • Several highlight EU’s deep dependence on US tech stacks (cloud, OS, chips, SaaS), calling it a severe strategic weakness.
  • Some foresee or advocate a slow but inevitable shift: EU‑only clouds, local chip/OS initiatives, more on‑prem/self‑hosted and open‑source alternatives.
  • Others stress the migration cost and political reluctance, noting that tenders still heavily favor US providers despite clear national‑security risks.

Radiant Computer

Accessibility & UI Concerns

  • Multiple commenters worry a “clean-slate” OS will neglect accessibility, especially for blind users and screen readers.
  • Some argue accessibility can be layered on later if the GUI exposes proper metadata and state; others counter that good screen readers need deep integration and stable element identity, which is hard to retrofit.
  • There’s also a broader notion of “accessibility” as approachability for non-experts, which the project claims to care about.
  • Visual design of the site (low-contrast grey-on-grey) is criticized as unfriendly and “loading-screen-like,” reinforcing concerns.

AI‑Native OS: Interest vs Distrust

  • The “AI-native” positioning is polarizing. Some are intrigued by an OS designed from the ground up with local models and structured app metadata, seeing it as a fix for today’s bolted‑on AI.
  • Others view AI as inherently untrustworthy or at odds with the project’s stated values of human-centric, simple, tractable systems.
  • Concerns include ethical training data, hardware practicality (FPGA vs GPU for local LLMs), and fear that AI integration undermines the anti‑surveillance, anti‑social‑media ethos.

Clean‑Slate Stack: Hardware, OS, Language

  • Ambition: custom RISC‑V hardware, exokernel‑like/single‑address‑space OS, new systems language (Radiance/Rʹ), tight HW–SW co‑design, no default browser, emphasis on local-first, capability security, REPL‑centric, easily scriptable GUI.
  • Some praise the willingness to rethink everything, comparing it to BeOS, Smalltalk, Rebol-style live systems, or past semantic OS ideas.
  • Others question inventing a new language instead of using Rust/Zig, and criticize the “first principles” rhetoric as vague manifesto rather than grounded design.

Substance, Maturity, and Risk of Vaporware

  • By the project’s own status/log, work is at the compiler/bootstrap stage (Rʹ parser/compiler); no UI, device, or booting OS yet.
  • Many see the site as concept art: sweeping goals (OS, language, hardware, AI) but few concrete artifacts, making people doubt feasibility without large resources.
  • A minority view that as acceptable for an early exploratory experiment, valuing the “north star” vision even if it never ships.

Site Aesthetics and Communication

  • Artwork and copy are widely perceived as AI-generated or “LLM‑ish”: grandiose, repetitive, buzzword-heavy, and more polished than the underlying tech.
  • Some find the retro‑futurist aesthetic inspiring; others say it makes the project feel like vapor, a TV show promotion, or “art school project.”

Compatibility, Networking, and Social Aspects

  • Several note that without browsers or support for mainstream apps (e.g., Discord), a new system is hard to adopt in practice, regardless of technical merit.
  • The “no social networking” principle is divisive: some love escaping social media; others argue social networks are the most valuable part of modern computing.

NY school phone ban has made lunch loud again

Perceived harms of smartphones & social media

  • Many see phones, especially social media, as broadly harmful: addictive, attention-sapping, worsening teen depression and suicide, and displacing play-based childhood. Smartphones are repeatedly compared to cigarettes.
  • Feeds are characterized as “casino psychology” designed for engagement, not well‑being; social media is seen as structurally incapable of aligning with kids’ interests.

Support for school phone bans

  • Strong support for “bell-to-bell” bans: phones are viewed as unnecessary during the school day and deeply undermining classroom attention.
  • Multiple commenters report that after bans (NY, CA, Australia, parts of Europe, Texas), lunchrooms became noisy again and face‑to‑face interaction increased.
  • Some describe bans as “letting kids be kids again” and an overdue correction after COVID-era, device-led education.

Concerns, edge cases & enforcement

  • Biggest resistance is said to come from parents who demand constant contact and justify phones as safety tools, though others argue a child with a phone can’t fix emergencies the school can’t.
  • Enforcement is hard: examples of policies where phones must be turned in but teachers can’t remove noncompliant students; detentions often ignored. Burner/second phones are reportedly emerging.
  • Some worry about authoritarian overreach, lack of trust, and strike-based punishment systems.

Impact on learning, AI & classroom tech

  • Students report previously using phones/AI during class to answer questions; bans now force actual searching and reading.
  • Teachers say allowing phones in pockets set them up to fail; policing dozens of addicted adolescents is unrealistic.
  • Broader critique that shifting from teacher‑led to device‑led instruction (accelerated by COVID) weakened teacher authority and increased off‑task behavior; several argue most K‑12 instruction should be largely screen‑free.

Social development & lunchroom dynamics

  • Many respondents recall loud cafeterias as where they learned key social skills; a silent lunchroom feels “unnatural” and worrying.
  • Others counter that cafeterias can also be centers of exclusion and bullying; phones sometimes served as a refuge.
  • Neurodivergent and noise‑averse students describe loud spaces as painful; several suggest schools provide both quiet (library, outside corners) and loud social areas.

Responsibility, regulation & politics

  • Debate over whether tech companies merely give people what they want versus knowingly promoting harmful behavior.
  • Tension between calls for regulation (banning kids from social media, taxing engagement‑optimized platforms) and arguments about parental responsibility and liberal freedoms for teens.
  • Side debates touch on U.S. First Amendment filming rights in public schools and broader distrust of both big tech and “big government” solutions.

The kind of company I want to be a part of

How Much Do Pluralization Details Matter?

  • Some see the article’s concern as overreaction: pluralization is nice but ranks below higher-impact work like accessibility, main workflows, or performance.
  • Others argue “death by a thousand paper cuts”: each small rough edge signals lack of care and, in aggregate, degrades user trust and perceived quality.
  • There is broad agreement it’s a tradeoff: polishing copy vs shipping sooner; maturity is knowing where to draw that line.

Internationalization and Linguistic Complexity

  • Several comments note that naive n == 1 ? "item" : "items" only works for English and even then misses edge cases like zero.
  • Examples from Polish, Russian, Slovenian, Ukrainian, and Korean show complex plural and case systems, dual forms, and context-dependent endings.
  • This is used both to:
    • Argue that “(s)” is a pragmatic, language-agnostic hack when translation frameworks just substitute strings.
    • And to argue the opposite: “(s)” only works for English-like languages and falls apart elsewhere; proper i18n frameworks with plural rules (e.g., CLDR, Qt, Fluent) are preferred.
  • Some teams avoid pluralization entirely by restructuring text: e.g., “Files scanned: 3” rather than “Scanning 3 file(s)”.

Craftsmanship vs. Pragmatism and Business Pressures

  • Many read the post as being about craftsmanship: caring about small details as part of professional pride, akin to well-made furniture.
  • Others push back: obsessing over pluralization can become bikeshedding or “garnish over meal” if core functionality is shaky.
  • There’s a “broken windows” view: tolerating sloppiness in small things invites bigger defects and vulnerabilities.
  • Counterpoint: modern software is often bad not because developers don’t care, but because ad-driven business models and management incentives prioritize metrics and speed over quality.

Signals, Trust, and the Brown M&M Analogy

  • Some liken pluralization to Van Halen’s “no brown M&Ms” rider: a trivial detail used as a canary for deeper process quality.
  • Others are skeptical of such pop-psych shortcuts; a venue (or company) might ignore the trivial clause yet still do the critical work correctly.
  • Several commenters like these tacit signals but note they must align with reality—“say/mean/do” consistency—rather than being empty polish.

UX Tone and “Soulless Machinery”

  • Views diverge on friendly language and anthropomorphizing software.
  • Some want UIs that feel considerate and “human”; others find this fake-friend tone grating and only care about speed, clarity, and correctness.
  • Non-technical users often equate UI polish with overall quality, even when it hides deep complexity or cross-platform compromises.

iOS 26.2 to allow third-party app stores in Japan ahead of regulatory deadline

Apple’s Motives and Regulatory Pressure

  • Many see Apple as “gatekeeping until forced,” prioritizing its 15–30% app tolls and fast‑growing services revenue over openness.
  • Commenters argue the behavior is rational profit‑maximization for a public company, but short‑sighted: it erodes developer goodwill and fuels hostile regulation and regional fragmentation.
  • Others think Apple is intentionally bargaining with regulators: don’t concede early, wait for concrete demands, then comply minimally to preserve fees and control.
  • Several blame current leadership for turning Apple from a hardware‑first firm into a toll collector; some call for leadership change, but note shareholders are very happy with the cash flows.

Malicious Compliance and Fragmented Rules

  • EU experience is repeatedly described as “malicious compliance”:
    • Alternative app stores and web distribution exist on paper, but are hemmed in by notarization, Apple review, continued fees, scary UI warnings, and eligibility thresholds (e.g., needing a large existing App Store presence).
    • Result: few meaningful stores, mostly games/emulators/dev tools; some users report shovelware and subscriptions rather than F‑Droid‑style ecosystems.
  • Several note that by fighting every change, Apple now faces a patchwork of regional regimes (EU, Japan, US/Epic), increasing complexity for both Apple and developers.

Security vs. Openness

  • Pro‑Apple side: centralized review and payment give consumers recourse (refunds, dispute handling) and filter out bad actors; governments also like having a single accountable gatekeeper.
  • Critics (including iOS devs) say review mostly enforces Apple’s business rules, not real security:
    • Malicious behavior can be hidden during review; apps can later load new code via cross‑platform frameworks.
    • Real protection comes from OS sandboxing and permission prompts, regardless of app source.
  • Some fear users will be socially engineered into installing shady store apps; others counter that the same scams exist today via the web and that power users should be allowed true sideloading.

User Freedom, Alternative Tech, and Browsers

  • A segment wants:
    • Third‑party stores without Apple notarization,
    • Direct app installs (IPA ≈ EXE/APK) instead of per‑developer “store apps,”
    • Third‑party payment flows, and
    • Real browser engines (not just WebKit skins).
  • Apple has created a (very constrained) path for alternate engines in the EU; commenters say the criteria are so strict that none have shipped.

Regional Locking and Workarounds

  • Japan‑only store access is expected to be tied to multiple signals (Apple account region, billing info, GPS, nearby cell/WiFi country codes, SIM), not just IP.
  • VPN alone is considered insufficient; reports from EU features suggest elaborate workarounds (Faraday cages, spoofed hotspots) are needed to “trick” the system.

YouTube erased more than 700 videos documenting Israeli human rights violations

Role of Government vs. Platforms / First Amendment

  • Major debate over whether this is classic First Amendment violation or a private platform decision:
    • One side argues YouTube’s removals are a direct result of U.S. State Department sanctions and thus de facto government censorship.
    • Others say sanctions are a general measure, and YouTube voluntarily chose to interpret them this way; they see a potential “loophole” issue but not a clear-cut 1A case without explicit takedown orders.
    • Disagreement over what counts as “forcing”: only explicit legal demands vs. implicit threats and regulatory pressure.

Historical & Political Context

  • Some argue this is not new: U.S. governments have long restricted speech (e.g., Sedition Act), and free speech is treated as a revocable privilege when inconvenient to power.
  • Others highlight perceived hypocrisy: people who celebrated Covid- and “fake news” moderation now object when similar tools appear to suppress Gaza-related content.
  • Several comments describe U.S. politics as effectively a single, donor-driven establishment highly aligned with Israeli interests.

Platforms as Public Sphere / Utility Debate

  • Recognition that legally YouTube can host or remove what it wants, but practically, deplatforming from major platforms silences people because that’s where audiences are.
  • Some foresee large social platforms eventually being regulated like utilities to prevent arbitrary or politically driven removals.

Archiving, Decentralization, and Censorship Resistance

  • Discussion of mirroring removed videos: scripts tying yt-dlp to archive.org, torrents, local archiving.
  • archive.org does not want to mirror all of YouTube; volume, copyright, and illegal content are concerns.
  • Support for alternatives: PeerTube, self-hosted sites, Tor/onion services, decentralized DNS, BitTorrent-like distribution.
  • Counterpoint: even self-hosting can be targeted via cloud providers, CDNs, ISPs, search delisting; the whole stack can be weaponized.

Content Policy vs. Political Motive

  • Dispute over whether removed clips are just “snuff”/graphic violence (which YouTube routinely bans) or legitimate documentary evidence targeted because they show Israeli abuses.
  • Some note YouTube also takes down Hamas atrocity videos, suggesting symmetric enforcement; others say the article attributes Gaza-related removals specifically to sanctions, not generic ToS.

Broader Information Control Examples

  • Mentions of Gaza satellite imagery lagging or selectively updated and Wikipedia edit wars over “Gaza genocide” as further signs of contested narratives and attempts to shape public perception.

I’m worried that they put co-pilot in Excel

AI-Induced Spreadsheet Failures & Accountability

  • Several comments predict a major AI-caused financial blow‑up, possibly bankrupting a public company and damaging AI vendors’ reputations.
  • Others argue leadership will treat AI as a scapegoat: take credit when things go well, blame “the AI” when they don’t – but that only works once before boards lose patience.
  • Some think systemic actors won’t allow large AI failures and will effectively “bail out” AI errors; others respond that audits and existing controls should catch bad numbers regardless of tool.

The “Brenda” Archetype, Jobs, and Institutional Knowledge

  • “Brenda” represents the experienced spreadsheet power user who quietly holds together messy, business‑critical processes. Many say she’s irreplaceable due to tacit institutional knowledge and accountability.
  • Others present alternative Brendas: low‑context “spreadsheet people” doing duplicate data collection that should be automated away; they argue we need fewer Brendas and more people who can redesign processes.
  • There’s extensive debate about incentives: why would Brenda automate herself out of a job when she isn’t rewarded for long‑lived automation, only for ongoing manual work?

Human vs AI Errors: Determinism, Verification, and Audit

  • A major theme is determinism: traditional formulas and scripts are predictable and debuggable; LLMs are non‑deterministic, can hallucinate plausible numbers, and may “fudge” outputs.
  • Commenters stress that verification is now the central problem: AI can generate slop faster than humans or tools can check it.
  • Many note that human spreadsheets are already full of bugs, but human error modes are familiar and often caught by peers, auditors, or sanity checks; AI error modes are harder to predict and detect.

Current Reality of Copilot and AI in Office Tools

  • Multiple participants report that Copilot in the Microsoft stack is mostly useless today: disabled features, weak transcription, poor handling of domain acronyms and names, and unhelpful Excel behavior.
  • Some find LLMs useful for learning what’s possible in Excel or for simple code/scripts, but say they fall apart on messy, real‑world workbooks.
  • There’s pushback against chat‑box UIs jammed into every workflow; people want AI that integrates naturally and preserves transparency, logs, and change tracking.

Automation, Excel, and AI’s Place

  • Excel is described as the de facto programming environment of the economy, often doubling as database, app platform, and glue between incompatible enterprise systems.
  • Some argue agents will eventually bypass Excel entirely—querying databases directly and generating reports—automating both Brenda and spreadsheets. Others reply that real companies run on fragile legacy stacks and undocumented “one‑box” scripts; AI cannot simply drop in.
  • Overall sentiment: AI in Excel could be helpful under human‑in‑the‑loop use, but over‑trusting it in finance and operations without strong audits, versioning, and cultural skepticism is seen as dangerous.

Hypothesis: Property-Based Testing for Python

Getting started with property-based testing

  • Several commenters struggle to apply Hypothesis when they don’t fully understand the existing code; they default to writing more example-based unit tests.
  • Recommended starter pattern:
    • Begin with very general properties like “does not crash” or “only throws allowed exceptions”.
    • Use Hypothesis’ strategies to generate broad input classes; refine constraints over time instead of trying to model “all possible inputs”.
  • The @example decorator is highlighted as a bridge from hand-written edge cases to generated ones.
  • Property-based tests can be seen as “parameterized tests with autogenerated tables”.

Typical properties and patterns

  • Round-trip invariants: decode(encode(x)) == x (e.g., JSON or other serialization) are cited as a highly motivating, practical use case.
  • Equality to a simpler or reference implementation (oracle) is common when there’s a naive but trusted version, or when migrating between implementations.
  • For sorting and similar algorithms, suggested properties include:
    • Output length equals input length.
    • Output is ordered.
    • Multiset of elements is preserved.
    • Idempotence: sorting twice = sorting once.
    • Permuting inputs doesn’t change results.
  • Other recurring properties: idempotence, commutativity, associativity, identity elements, order independence, and state-machine style “operation sequences obey invariants” (e.g., UI focus, DB drivers, delete/lookup semantics).

Shrinking, randomness, and determinism

  • Hypothesis’ shrinking (minimizing failing examples) is repeatedly described as its most powerful feature and more advanced than classic QuickCheck.
  • It uses heuristics (e.g., edge-case values, tricky strings/floats) and maintains a failure database; seeds and failing examples can be replayed, making “random” tests reproducible.
  • Some worry about non-deterministic tests; others counter that you log seeds, commit failing examples, and over time cover more of the input space than fixed tests.

Use cases and benefits

  • Reported successes include:
    • Finding subtle numeric, Unicode, and boundary bugs (e.g., specific list sizes, Turkish “İ”, ß lowercasing, NaN/∞).
    • Stress-testing APIs to ensure no 500s/NPEs and robust input validation.
    • Verifying data structures, compilers, parsers, SQL/DDL tools, DB migration behavior, and complex drivers.
  • Libraries built on Hypothesis such as Schemathesis are praised for uncovering many API validation bugs.

Critiques, tradeoffs, and adoption

  • Some argue PBT can require complex generators or even model/state-machine implementations; tests risk being as complex as the SUT and harder to maintain.
  • Others respond that:
    • You do not need to reimplement business logic; you test general properties and relations between functions, often simpler than enumerating examples.
    • PBT complements, not replaces, example-based tests; failing cases can be turned into fixed regression tests.
  • Barriers to adoption include:
    • Misconceptions about “non-deterministic tests” being inherently bad.
    • The learning curve for expressing good properties and strategies.
    • Test runtime concerns; suggested mitigations include fewer examples during development and fuller runs in CI.

Ecosystem and documentation

  • Hypothesis is compared favorably to other PBT libraries (QuickCheck, FsCheck, Rust’s proptest, Go’s rapid, JS’ fast-check), especially in shrinking and heuristics.
  • Some note Hypothesis’ pytest integration is better than with unittest.
  • The Hypothesis docs’ “Explanations” section and its design-philosophy content are praised for deepening understanding beyond quickstarts.

Zohran Mamdani wins the New York mayoral race

Enthusiasm and Symbolism

  • Many see the win as a generational and ideological break from corrupt or centrist “machine” politics, and as proof voters will engage for clear cost‑of‑living and QoL agendas.
  • Supporters highlight his willingness both to admit past mistakes and to stand firm under racist/Islamophobic attacks, reading the result as a repudiation of “status quo Democrats.”
  • Some outside NYC say the scale of attention and turnout restored their sense that hopeful, issue‑driven campaigns can still win.

Skepticism and Fear of Overreach

  • Critics frame his platform as “extreme socialist,” warning of rent freezes, higher business taxes, and policing changes driving out capital, worsening housing shortages, and fueling crime.
  • Several argue rent control and price ceilings are textbook bad economics that reduce supply and quality; they expect NYC to become a cautionary tale.
  • Others counter that similar rhetoric has been used to block every prior expansion of social provision, and that NYC’s economy is large enough to absorb experiments.

Obama/ACA as Cautionary Analogy

  • Long subthread compares him to Obama: inspiring message vs. ability to deliver.
  • One camp says ACA showed that “the bill that passes is better than the ideal that doesn’t,” praising incrementalism under hostile constraints.
  • Another sees ACA as a corporate subsidy and Obama as having “run from the left, governed from the center‑right,” warning Mamdani not to pre‑compromise or repeat that trajectory.
  • Dispute over whether more radical pushes (public option, universal care) were ever numerically possible, and how much blame to assign to Democratic leadership vs. GOP obstruction.

Housing and Rent Control Debate

  • Proponents: temporary freezes on already‑regulated units plus aggressive building and office‑to‑housing conversions can stabilize tenants while supply ramps up; examples cited from Berlin, Vienna, Singapore, Tokyo.
  • Opponents: insist decades of rent regulation in NYC and Europe have produced scarcity, disrepair, and “lottery apartments,” and will scare off new private development.
  • Some emphasize underlying zoning, permitting, and NIMBYism as the real bottleneck; rent policy is seen as short‑term relief whose outcome depends on whether new construction actually happens.

Expanded Public Services: Buses, Childcare, Groceries

  • Supporters see free buses, universal childcare, and city‑run groceries in food deserts as “common sense” in a rich city and note many public or state‑run services already exist.
  • Skeptics argue city‑operated retail will be inefficient, crowd out thin‑margin private stores, and that improving incomes or building housing is more fundamental than trying to run cheaper groceries.

National Politics and Party Strategy

  • Several view the race as a template: populism focused on cost of living can energize nonvoters and younger voters more than chasing mythical “moderates.”
  • Others fear national Democrats will misread a deep‑blue city result as a national mandate for NY‑style progressivism, hurting them in swing states.
  • GOP is portrayed as abandoning cities and instead using state‑level power and gerrymandering to control them from outside, but also as highly coordinated in trying to brand “Zohran = Democratic Party.”

Identity, Smears, and Foreign Policy

  • Heavy discussion of Islamophobic and “pro‑terrorist” attack ads; many say the 9/11‑adjacent smears and Israel‑litmus‑test questions mostly backfired in NYC.
  • Dispute over whether some of his past rhetoric on policing, prisons, and Palestine is disqualifying extremism or an evolved position being weaponized out of context.

NYC Structure, Mandate, and Constraints

  • Multiple comments stress that the real fight was the Democratic primary and establishment‑backed independent bid; the formal general against a Republican was structurally lopsided.
  • Debate over how strong his “mandate” is, given NYC’s one‑party dominance, and how much Albany and federal agencies can constrain or sabotage his agenda.
  • Some see his win as the beginning of a larger intra‑Democratic realignment (DSA vs. establishment); others note previous charismatic mayors who later exited as disappointments.

Direct File won't happen in 2026, IRS tells states

Corporate influence, lobbying, and Citizens United

  • Many comments frame the demise of Direct File as government serving corporate interests (especially Intuit/TurboTax) rather than citizens.
  • Links to donations and lobbying are cited as “cheap bribes” with very high ROI; people note revolving doors (politicians becoming lobbyists) and post‑office jobs as part of the compensation package.
  • There’s disagreement on lobbying: some see it as normalized corruption akin to bribes for public services; others argue lobbying is also how charities, civil-liberties orgs, and small-business groups convey information to lawmakers.
  • Citizens United is repeatedly blamed for enabling this environment; some argue overturning it should be a long-term political priority, though others note it’s rooted in deeper legal doctrines about corporate rights.

IRS funding, audits, and enforcement

  • Several posts argue the IRS is “defunded,” especially for complex, high‑wealth audits, citing staff cuts in the unit that audits billionaires.
  • Others note that high-income filers are still statistically more likely to be audited, but complex audits are harder with fewer resources, while simple W‑2 mismatches are automated via notices (e.g., CP2000).
  • Some speculate that if enough people switched to paper returns it could effectively DoS the IRS, but this remains conjectural in the thread.

Free File Fillable Forms vs. Direct File

  • Free File Fillable Forms are defended as fully capable, official, and free; instructions documents are said to make everything mechanically doable if you read them.
  • Critics argue the real barrier is knowing which forms to file and enduring the tedium of worksheets and cross‑references; software that “walks you through” is valued for guidance, not just math.
  • Phone/email verification and PII requirements turned some users off.
  • Direct File is widely praised by users as simple and fast; many are angry or “disgusted” it’s being killed after a successful pilot. The public-domain code on GitHub is noted, but commenters say a nonprofit rehost would lose the crucial benefit of being first‑party IRS software.

Tax-prep market, alternatives, and inequity

  • TurboTax’s “free” offering is criticized as narrowly limited and historically obscured by dark patterns; many note that state filing often isn’t free.
  • Alternatives like FreeTaxUSA and Cash App’s inherited CreditKarma product are recommended and reportedly handle even Schedules C/D/E.
  • A major theme is that lower‑income, simple‑return filers are funneled into strip‑mall preparers and paid software through fear and marketing, even though they could file free.
  • Others stress that millions deliberately pay CPAs because of real or perceived complexity, especially for pass‑throughs, RSUs, options, multi‑state issues, and expat/treaty interactions.

System design, international comparisons, and feasibility

  • Many contrast the U.S. with countries where the government pre-fills returns: you log in, confirm, add minor items, and finish in minutes.
  • Counterarguments: the IRS lacks integrated data on marital status, dependents, and some deductions; there’s no national civil registry; 50 different state systems complicate integration; and IRS IT has been underfunded for decades.
  • Others call this “perfect is the enemy of good”: even if edge cases exist, the IRS could auto‑file or prefill for the large majority of simple W‑2/standard‑deduction filers and let the rest opt out.
  • Several explicitly restate the core grievance: the IRS already has most of the data and the tax code; needing to pay or navigate third parties to tell the government what it already knows is seen as unacceptable.

AI and technical possibilities

  • Some suggest AI should make implementing tax rules trivial or convert IRS instructions to machine‑readable logic.
  • Pushback stresses legal liability and the need for deterministic, auditable calculations; LLM “hallucinations” are considered inappropriate for something where errors can be construed as lying to the IRS.
  • A middle ground proposed is using AI offline for code generation or document translation, keeping personal tax data local.

Uncle Sam wants to scan your iris and collect your DNA, citizen or not

Continuity of Surveillance and Overreach

  • Many see this proposal as part of a 20+ year security-state drift since 9/11, not a sharp break.
  • Others argue the current push feels qualitatively different because it’s openly authoritarian in tone and scope.
  • Some stress that both major US parties have expanded executive power and surveillance; others worry “both-sides” framing obscures unique recent attempts to overturn elections.

Authoritarianism, Politics, and System Design

  • Debate over whether focus should be on “who is in the White House” or on building systems that assume an authoritarian will eventually get power.
  • Several argue US presidential systems make personality cults and power-grabs easier than parliamentary systems.
  • Others contend the real failure is voters and institutions allowing obvious authoritarians to keep power rather than prosecuting or disqualifying them.

Biometrics vs DNA: Different Levels of Harm

  • Broad agreement that DNA collection is a major escalation beyond fingerprints/iris scans.
  • DNA is seen as uniquely sensitive: reveals family relationships, health risks, and possible tailored attack vectors, not just identity.
  • Some note practical constraints (sample degradation, cost of large-scale sequencing), but others counter that technology is improving and databases, once built, will be abused or leaked.

Current Biometric Practices and “Already on File” Argument

  • Many commenters report having fingerprints, photos, or iris scans taken already: immigration processes, Global Entry/TSA, security clearances, passports, EU/other national ID schemes.
  • Counterpoint: targeted or conditional collection (e.g., for travel or specific jobs) is not equivalent to mandatory national DNA/iris databases for all citizens and associated persons.

California Newborn Blood Samples Debate

  • Strong subthread on California’s newborn heel-prick blood spots, stored since the 1980s.
  • One side frames this as a de facto lifelong DNA sample database; others push back that:
    • It’s dried blood for medical screening and quality control, not pre-sequenced genomes.
    • Law-enforcement access requires warrants, though policies and oversight are unclear.
  • Disagreement over whether calling this a “DNA database” is accurate vs. incendiary.

Resistance, Futility, and What To Do

  • Link shared to submit public comments; some dismiss the process as purely performative under the current administration.
  • Others argue fatalism is self-defeating: public comments, court challenges, protest, and voting are still the only available levers.
  • A few urge technologists to build privacy-preserving identity systems so governments can’t easily repurpose them for dragnet control.

Bluetui – A TUI for managing Bluetooth on Linux

Overall reception and usage

  • Many commenters are enthusiastic about bluetui, calling it simple, fast, and a big improvement over bluetoothctl and some existing TUIs like bluetuith.
  • Several people report it solved real issues where desktop Bluetooth GUIs (e.g., GNOME) failed to connect, while bluetui worked reliably.
  • It’s praised for thoughtful keybindings (space to connect, enter to disconnect) which help avoid accidental toggling.

TUI design, whitespace, and icons

  • One thread criticizes the lack of visible device addresses and the “wasted space,” arguing TUIs are copying minimalist GUI trends that hide useful information.
  • Others push back on the tone, and note that smaller window sizes can use up that whitespace.
  • The author explains you can fix the width via config and is open to feature requests.
  • Another thread debates icons/emoji and Nerd Fonts: some find them helpful for quickly identifying device types; others dislike them or worry about font dependencies. The author is receptive to making icons configurable.

TUIs vs GUIs and workflows

  • Multiple people highlight TUIs as a sweet spot between raw CLI tools and heavyweight GUIs: easier to build, fast over SSH, consistent on different systems, and nostalgic for DOS/Pine-era users.
  • Some contrast TUIs with network and Bluetooth “all-in-one” managers, preferring small focused tools (e.g., bluetoothd + bluetui; iwd + impala).

Installation, Rust toolchain, and distro friction

  • One commenter struggles to install via cargo on Ubuntu due to outdated Rust packages, leading to frustration with the Rust ecosystem and Debian/Ubuntu packaging.
  • Others suggest alternatives: downloading prebuilt binaries, using rustup, using version managers like mise, Docker builds, or switching to rolling-release distros (with some pushback on “use Arch” attitudes).
  • There’s general agreement that distro Rust packages tend to lag, and many Rust tools expect a recent compiler.

Related tools and ecosystem

  • Mentioned alternatives include bluetuith (Go-based), Mac-specific blueutil with shell aliases or a TUI wrapper, and companion TUIs like impala for Wi-Fi/NetworkManager.
  • Some discuss Rust vs Go for building such tools; Go is seen as easier and faster to compile, Rust as more rigorous but with a steeper learning curve.

Google Removed 749M Anna's Archive URLs from Its Search Results

Site vs. Google Search for Anna’s Archive

  • Several commenters say they never used Google to search within Anna’s Archive; its own metadata search (title/author/format/date) is “good enough.”
  • Others note Google could add value with full‑text search of book contents, but AA only exposes metadata, so Google likely didn’t have full text anyway.

LLMs, DMCA, and Piracy

  • People wonder whether and how LLM providers honor DMCA takedowns and whether they can “launder” copyrighted content into ostensibly legal outputs.
  • Reports are mixed: some models refuse to provide pirated links or copyrighted text; others still surface torrent or archive links.
  • There’s concern that LLMs are just “regurgitating trash” and cannot reliably distinguish good from bad sources, making them vulnerable to manipulation.

Perceived Decline of Google Search

  • Many describe Google search as increasingly useless: SEO spam, AI overviews, ads, and hidden or capped result sets.
  • Some argue Google intentionally deprioritizes organic “good” results beyond early pages to boost ads and AI features; others ask for concrete evidence and note that court findings mainly show AI features reduce clicks on “10 blue links,” not that the best results are deliberately buried.

Alternative Search Engines

  • Yandex is praised as especially good for DMCA‑sensitive or pirated content, “like Google circa 2005.”
  • Kagi, Startpage, DuckDuckGo, Brave, Ecosia, and Bing are repeatedly cited as better than Google for relevance, though each has trade‑offs (indexes, UI, sponsorship, Copilot clutter).
  • Debate over personalization: some want it off entirely; others say query/locale‑aware personalization (e.g., “Kafka,” “C string”) can be genuinely useful but is poorly executed.

Corporate Motives, DMCA, and Censorship

  • One side argues Google is simply complying with DMCA using a public transparency log and that communities over‑dramatize this.
  • Others reply that large corporations are structurally driven by profit/valuation and routinely behave “sociopathically,” so defending them is misplaced.
  • Some highlight asymmetric enforcement: DMCA removals that protect rightsholders move fast, while consumer‑benefiting changes or antitrust remedies take years.
  • Allegations appear that Google and X also remove politically sensitive war‑crime documentation, seen as siding with powerful states.

Anna’s Archive, LibGen, and Archiving Efforts

  • Several see Anna’s Archive as continuing the original Google‑like mission of organizing and opening access to “high‑quality” information, especially after LibGen and z‑lib crackdowns.
  • Others think it’s reasonable for pirate links not to top book‑search results; the homepage still appears, so determined users can find it.
  • People discuss mirroring AA via torrents (tens of TB, compression, filtering large PDFs, de‑duping editions) and suggest a dedicated “piracy search engine” based on DMCA‑reported URLs, with Yandex already filling that niche.
  • Alternatives mentioned: WeLib, open‑slum, and Telegram‑based Nexus/LibrarySTC bots for academic papers.

Legality of Downloading Digital Copies of Owned Books

  • Answers differ by jurisdiction, but consensus in the thread: owning a physical book generally doesn’t grant a right to download unauthorized digital copies.
  • Creating your own digital copy is more likely to be legal; downloading from an infringing source remains problematic, though enforcement usually targets distributors rather than individuals.

Broader Web Search and AI Tensions

  • Commenters note: more walled gardens, more legal barriers, and the need to search across multiple engines and maybe personal indexes.
  • There’s concern that AI systems (e.g., Gemini) trained on web content now reduce traffic to the very sites they were trained on, raising fairness and conflict‑of‑interest questions.
  • Some see AI + RAG over large book corpora as a huge competitive advantage, even as ordinary students and researchers lose free access to those same texts.

UPS plane crashes near Louisville airport

Apparent sequence and severity of the accident

  • Multiple videos show the left (No. 1) engine area engulfed in flames during the takeoff roll, with a large ground fire trail and extensive industrial damage.
  • Several commenters note stills showing the entire left engine later found beside the runway, suggesting engine separation, and possible damage to the tail (No. 2) engine from debris.
  • The aircraft was heavily fueled for a long Louisville–Honolulu cargo flight; estimates in the thread range from tens of thousands of gallons/pounds up to ~200–250k gallons mentioned in early dispatch notes, contributing to the huge fire. (Exact quantity remains unclear.)

V1, engine-out performance, and pilot decision-making

  • Many comments explain that multi‑engine airliners must be able to safely continue takeoff if a single engine fails at or after V1; aborts above V1 are generally prohibited because there isn’t enough runway to stop.
  • MD‑11s are designed to fly on two of three engines, but commenters stress that “engine failure” vs. “engine detaches and shreds the wing/damages another engine/hydraulics” are completely different problems.
  • There is disagreement over whether the crew made a conscious “heroic” choice to protect people on the ground versus simply following standard V1 procedures with incomplete information and almost no time. Multiple posters urge waiting for NTSB data before attributing intent or blame.

Damage mechanisms and comparisons to past accidents

  • Several posts compare this event to American Airlines 191 and El Al 1862: engine/pylon separation, wing leading‑edge damage, slat/hydraulic issues and asymmetric lift leading to uncontrollable roll.
  • Some suspect an uncontained engine failure or structural/pylon issue; others mention a pre‑flight delay reportedly for left‑engine work, but later note an NTSB briefing stating no immediate pre‑departure maintenance is known—this remains unresolved in the thread.

Cameras, sensors, and cockpit information load

  • Long sub‑thread on whether external cameras (tail/wing views) should be standard to let pilots visually confirm damage.
  • Pro‑camera side: could clarify situations like severe engine damage, wing deformation, gear status, or fuel leaks, avoiding reliance on cabin crew or fly‑bys.
  • Skeptical side: during takeoff emergencies pilots are already at cognitive limits; extra video feeds risk information overload, and current fire/fault detection systems are designed to trigger simple, unambiguous alerts (“ENG FIRE/FAIL”) rather than describe exact failure modes.

Runway overruns, barriers, and EMAS

  • Question raised: why no barriers between runway ends and “important” infrastructure.
  • Responses explain:
    • The kinetic energy of a fully loaded widebody at takeoff speed is enormous; solid barriers would be unsurvivable.
    • Engineered materials arrestor systems (EMAS) exist and are effective for landing overruns at lower speeds, but are not designed for high‑speed rejected takeoffs.
    • Any “extra” land at runway ends is already treated as safety margin; designing to routinely use that margin is discouraged.

Airport siting, land use, and noise/safety buffers

  • Many comments note how “lucky” it was that the jet came down in a relatively sparse industrial zone rather than the nearby downtown or residential areas.
  • Discussion of zoning practice: guidance usually discourages dense residential/commercial development off runway ends, but many legacy airports (Midway, San Diego, Love Field, etc.) are now tightly surrounded by housing and schools due to urban growth and political pressure.
  • Some describe past buyouts and demolition of neighborhoods near Louisville’s UPS hub under the banner of “noise/safety,” later replaced by warehouses—leading to cynicism about mixed motives, though this crash is cited as grim validation of the underlying safety logic.

Maintenance practices, MD‑11 age, and outsourcing debates

  • MD‑11 production ended in 2000; current fleets are elderly, mostly ex‑passenger airframes converted to freighters. Commenters note cargo aircraft often fly fewer daily cycles, but conversions and age increase complexity.
  • Speculation ranges from maintenance error (including historical concerns about forklift engine handling in DC‑10/MD‑11 pylons) to manufacturing defects or foreign repair practices; several people link to pieces on outsourced maintenance and foreign repair stations.
  • Others, including people with maintenance experience, push back hard: foreign MROs typically undergo rigorous FAA/EASA oversight; blaming “foreign work” without evidence is called out as uninformed.
  • Multiple posters emphasize that early “it must be maintenance” claims are premature and the NTSB’s independent investigation will determine cause.

Aviation safety, regulation, and institutional roles

  • Broader discussion on how extraordinarily safe modern commercial aviation is, despite occasional catastrophes.
  • Some argue for stronger regulation and against cost‑cutting “race to the bottom”; others note that deregulation and intense competition coexist with historically low accident rates.
  • There’s praise for the NTSB’s structure and culture: separated from the FAA, methodical, reluctant to speculate, and focused on system fixes rather than individual blame.

Emotional reactions and personal context

  • Many express horror at the ground devastation and sympathy for the crew and affected workers; several relate past local crashes hitting neighborhoods and how that shapes their perception of risk.
  • A story appears of a UPS pilot whose first day was supposed to be on this flight but was removed from the roster, underlining the role of chance.

Mr TIFF

Emotional impact and recognition of “Mr TIFF”

  • Many commenters were unexpectedly moved by a story about a file format, describing it as beautiful, touching, and even tear‑inducing.
  • There’s strong appreciation for finally giving proper credit to an unsung engineer whose name most professionals had never heard despite widespread use of TIFF.
  • Several connect this to a broader theme: tech culture often erases or ignores its own history and quiet contributors; efforts like this feel like “digital wakes” and cultural repair work.

Historical research, Wikipedia, and sources

  • Commenters praise the detective work and note how easily such history could have been lost if one person hadn’t cared enough to dig.
  • A side thread discovers that the inventor had in fact commented on the TIFF Wikipedia talk page years ago, confirming the “42” joke and adding details about naming.
  • This leads to debate over Wikipedia policies:
    • Primary vs secondary sources, “verifiability not truth,” and “no original research.”
    • Whether a user’s self‑identification on Wikipedia or HN could qualify as a citable source.
  • Some argue the hidden talk‑page evidence was “obvious in hindsight”; others emphasize how nontrivial it is to find such material without already knowing what to look for.

TIFF format, design, and technical legacy

  • Multiple practitioners reminisce about extensive TIFF use in publishing, mapping, geodesy, microscopy, geospatial imaging (GeoTIFF/COG), clinical trial scanning, and camera RAW/DNG.
  • The tagging and extensibility model is praised for accommodating projections, metadata, and varied use cases.
  • Others criticize that same extensibility for causing “Thousands of Incompatible File Formats,” with inconsistent vendor extensions and quirks.
  • Several note TIFF is still very much alive in niche and professional domains, even if less visible to end users.

“42”, hidden text, and trivia

  • People highlight the magic number 42 in the spec, confirmed by the inventor as a Hitchhiker’s Guide reference.
  • Discussion branches into whether 42 is “special,” ASCII asterisk jokes, and other numerological or humorous takes.
  • Commenters also examine two TIFF 6.0 PDFs, one containing the inventor’s name in white‑on‑white “invisible” text; theories range from Easter egg to lazy redaction.

Digital preservation and loss

  • The thread broadens into concern that early magazines, Usenet, and plain text preserved this story, whereas modern web platforms (social networks, proprietary sites) are already losing huge amounts of content.
  • People list vanished services and now‑broken links, and share personal strategies of archiving material locally and via the Wayback Machine.

Meta: the book and ongoing oral histories

  • Some struggled to find the linked book, prompting feedback about site UX; the author explains a desire not to push the book too hard given the story’s tone.
  • The author mentions having interviewed around 100 people, especially lesser‑known Apple‑era engineers, to capture similar stories before they’re lost.

I took all my projects off the cloud, saving thousands of dollars

Cost and pricing comparisons

  • Many commenters agree AWS is often far more expensive than VPS/dedicated options (Hetzner, OVH, Linode/DO) once you need moderate CPU/RAM/disk, especially for RDS and large block storage.
  • Extremely tiny or highly intermittent workloads can be very cheap on cloud (free/near‑free tiers, Cloud Run, Lambda, tiny S3/ECR usage).
  • For large, cold storage (PB scale), some find Glacier‑class services cost‑competitive vs building massive storage systems; at TB scale, local NAS or rented servers win easily.
  • Several people highlight that “2×” cloud premium is common and acceptable; others report 5–10× or more for comparable capacity.

When cloud is a good fit

  • Widely cited use cases: rapid MVPs with startup credits, bursty/seasonal load, large multi-region services, LLM or GPU-heavy work, and regulated industries needing ready-made certifications and SLAs.
  • Cloud helps bypass slow internal procurement and CapEx constraints; OpEx and “self‑service servers” were a huge part of its original appeal.
  • Managed services (databases, Redis, CI/CD, backups, global distribution) can be cheaper than hiring/retaining infra specialists, especially for fast‑moving startups.

Arguments for self‑hosting / bare metal

  • Many report running sizeable SaaS, forums, or side projects on 1–3 dedicated servers or home hardware with Cloudflare/tunnels, at a fraction of cloud cost and with acceptable uptime.
  • For the majority of businesses that don’t need “five nines,” simple setups (one DB, one app server, maybe a hot spare) are seen as sufficient and much cheaper.
  • Some frame self‑hosting as ideological: resisting “enshittification” and corporate control, promoting independence and decentralization.

Operational complexity and risk

  • Pro‑cloud voices emphasize the hidden labor of self‑hosting: backups, restores, security patching, intrusion detection, audits, off‑site redundancy, and hardware failures.
  • Others counter that much of this work also exists on cloud VMs, and that modern tooling (Docker, Ansible, k3s, etc.) plus AI assistance lowers the barrier.
  • A recurring worry with cloud is surprise bills and account lockouts; with self‑hosting, the main “catastrophe mode” is getting hugged to death during traffic spikes.

Lock‑in, architecture, and semantics

  • Several note that many “leaving the cloud” stories were barely using cloud‑specific services (mostly EC2/RDS/Redis), so migration was straightforward.
  • There’s disagreement over what “the cloud” even means: some treat any remote VPS/dedi as cloud; others reserve the term for hyperscalers and their proprietary services.
  • Hybrid and multi‑provider strategies are popular in the thread: keep compute or data where it’s cheap, use cloud only where its unique features matter.

Tone and meta‑discussion

  • Multiple commenters find the article ranty, straw‑manny, and needlessly antagonistic toward “cloud people,” even if they broadly agree AWS is often a bad deal for small projects.
  • Others see it as a useful counterweight to the default “everything must be on AWS” mindset, but wish for more rigorous TCO comparisons and fewer culture‑war vibes.

I was right about dishwasher pods and now I can prove it [video]

Dishwasher Heating, Hot Water, and Regional Differences

  • Large subthread on how dishwashers heat water:
    • In North America many machines are plumbed to hot water but have weak internal heaters (10–15A, 110V; often ~800–1200W), so purging cold water from the line can materially improve pre‑wash temps.
    • In 230V regions (EU, AU, NZ), machines more often take cold water only and heat it quickly with stronger elements; hot connection is less common or even discouraged.
    • Some argue newer machines will just heat longer if inlet water is cold; others note many models time heating rather than targeting temperature, so they never reach optimal enzymatic temps in pre‑wash.
    • Debate over whether manuals actually tell users to run the tap first; some do, some don’t.

Pre‑Wash Cycles and Detergent Dosing

  • Many commenters confirm that most dishwashers have a pre‑wash, even when not obvious in the UI; you can detect it by a short run–drain–then long wash.
  • Where there’s a latching detergent door, people infer a pre‑wash exists (door opens later). Some machines also have explicit pre‑wash trays.
  • Others report models (especially newer Bosch/Miele) where manuals explicitly say pre‑wash detergent isn’t needed, and some drop the pod almost immediately. Program behavior (Eco vs Quick vs Heavy) varies a lot.

Pods vs Powder: Performance, Cost, and Availability

  • Strong divide in experience:
    • Several say cheap powder cleans as well or better than pods, especially when some is added for pre‑wash; pods are seen as expensive, overdosed, and single‑stage.
    • Others find pods (especially “premium” ones) clearly outperform available powders, especially on difficult soils or plastics; some report faster, shorter “auto” cycles and less odor buildup with pods.
  • Suspicion that big manufacturers deliberately under‑formulate boxed powder to push higher‑margin pods; others note this isn’t provable from the limited disclosed testing.
  • In some countries (UK, Poland) dishwasher powder has become hard to find; in others (NZ, parts of EU) it’s still common.

Convenience, Safety, and Environmental Concerns

  • Fans of pods emphasize simplicity, no measuring, less spillage, safer around kids and pets, and fewer user‑error issues (overdosing, clogging dispensers).
  • Powder proponents emphasize: much lower cost per load, adjustable dosing for load size and pre‑wash, less plastic, and better machine longevity.
  • Some worry about pod films as microplastics; others counter that they’re designed to dissolve completely.
  • Rinse aid: widely acknowledged as effective for drying, especially with modern non‑heated dry cycles, but a minority cite studies suggesting potential gut effects at high exposure; pushback notes tiny household doses and ubiquitous commercial use.

Critiques of the Video and Promoted Product

  • Several enjoy the deep technical dive and cycle tracing; others find the style verbose, somewhat hand‑wavy, and built around a single relatively crude test dishwasher.
  • Skepticism around the promoted “better powder”:
    • It is substantially more expensive per load than even premium pods, undermining earlier cost‑savings arguments for powder.
    • Some see the video as a well‑produced infomercial with limited transparency (no linked study; no head‑to‑head with mainstream powders).
  • Others are unbothered, treating the channel as primarily educational/entertainment and appreciating any clear, evidence‑backed improvement tips.

Practical Takeaways Users Report

  • Commonly adopted tips from this and earlier videos:
    • Purge hot water at the nearby sink before starting (where the machine is on hot).
    • Use some loose detergent in the tub or pre‑wash area plus more in the main dispenser.
    • Experiment with non‑obvious program combinations (e.g., Normal + high‑temp/sanitize) rather than default “Heavy” or “Eco”, whose labels often don’t match real energy/water use.
    • Regularly clean filters and understand your specific machine’s manual and hidden cycle diagrams.

Singapore to cane scammers as billions lost in financial crimes

Singapore’s political & economic model

  • Described as unusually prosperous, militarized, and stable, yet effectively one‑party and highly interventionist.
  • Debate over labels: “state capitalism,” “Asian Switzerland,” “pure authoritarianism,” or akin to fascism without racial scapegoating.
  • Some see the core feature as high public trust in a technocratic government that prioritizes long‑term planning over short electoral cycles. Others emphasize lack of press freedom, speech, and genuine electoral competition.

Freedom vs security trade‑offs

  • Strong concern over the new law allowing police to control accounts of suspected scam victims; viewed by some as a dangerous normalizing of financial control that could extend to political repression.
  • Others note similar or worse precedents in liberal democracies and argue that Western self‑image of valuing liberty is overstated.
  • Several commenters stress that “freedom from” crime, drugs, poverty, corruption, and instability is the freedom most Singaporeans care about, and they appear broadly satisfied with that trade.

Corporal punishment, crime, and deterrence

  • Some argue Singapore’s caning and harsh drug penalties are key to its lack of visible street crime, vandalism, and disorder, and advocate importing elements of this to countries like the US.
  • Counterarguments call corporal punishment “barbaric” and akin to torture, raising wrongful‑conviction risks and moral objections.
  • Others note apparent double standards: elites and locals sometimes receive “kid gloves” compared with foreigners in corruption and money‑laundering cases.

Scams: impact and prevention measures

  • Commenters describe devastating financial losses, especially among elderly victims whose cognitive decline is exploited; emotional harm is highlighted.
  • Singapore’s response is framed as incremental: multilingual education campaigns, app‑level warnings, SMS “LIKELY SCAM” labels, then escalating to harsher penalties.
  • Some suggest making money flows more trackable and reversible to reduce scams, but acknowledge major privacy and collateral‑damage concerns (e.g., innocent accounts frozen, downstream users hit).

Low crime and everyday life

  • Visitors note everyday benefits of low petty crime: unattended property not stolen, clean public spaces, safe late‑night streets and transit.
  • There is disagreement on whether this stems mainly from strict laws, wealth, city‑state scale, or deeper cultural factors.

Why do we need dithering?

Is Dithering Still Needed?

  • Strong disagreement with the article’s claim that we “don’t really need dithering anymore.”
  • Many point out obvious banding in modern games and gradients (e.g., blue skies, dark scenes) when dithering is absent or poorly done.
  • 8 bits per channel (24-bit color) is often insufficient for smooth gradients, especially large or nearly monochrome ones; dithering hides banding without increasing bit depth.
  • Dithering is widely used in modern rendering pipelines: render to high-precision buffers, then dither when quantizing down.
  • Display hardware frequently uses spatial/temporal dithering (“frame rate control”) to simulate extra bits of color.

Tradeoffs, Techniques, and Use Cases

  • Static dither patterns can be used in video to avoid flicker and keep content compressible.
  • Screen-space dithering is used for cheap transparency and to improve dark scenes in games; some dislike the resulting “sparkly” artifacts, especially when combined with TAA.
  • For streaming, adding real noise is problematic because codecs remove it; better if noise/dither is added on the client side (e.g., synthetic film grain).

Beyond Images: General Signal Processing

  • Dithering is emphasized as a fundamental quantization tool, not just a graphics trick.
  • In audio, dithering and noise shaping are standard for high-quality 16‑bit output.
  • Conceptually, “add jitter as close to the quantization step as possible” applies to any thresholding or bit-depth reduction, including Monte Carlo sampling, geometry, etc.

Aesthetic and Nostalgia

  • Some use dithering intentionally as a “retro” or low‑fi aesthetic, referencing classic games and 1‑bit/limited‑palette hardware.
  • Return of the Obra Dinn and PlayDate titles are cited as exemplary stylistic uses.
  • A subset of commenters say that, given modern full-color displays, their motivation to dither is mainly aesthetic or for file-size games (e.g., PNG‑8).

Color Spaces, Perception, and Theory

  • Discussion touches on sRGB’s nonlinearity, gamma (≈2.2), and why proper dithering and calculations should be done in linear light with higher internal precision.
  • For multi-color dithering and palette selection, commenters suggest working in perceptual spaces (e.g., Lab) to measure color similarity.
  • With sufficiently high spatial resolution, dithering trades spatial resolution for perceived color resolution, making lower bit depth more usable.

Deepnote, a Jupyter alternative, is going open source

Positioning Deepnote as “Jupyter’s Successor”

  • Many commenters find the “successor” claim presumptuous and misleading, since Deepnote has no formal relationship with the Jupyter project and Jupyter is still very active.
  • The launch post’s tone (especially early versions) is widely criticized as disrespectful to Jupyter: cherry‑picked contribution graphs, job‑post statistics with dubious framing, and a vibe of “Jupyter is dying, we’re its replacement.”
  • Several people suspect the blog post was written or heavily shaped by an LLM and then quietly edited after backlash, which further hurts trust.
  • General sentiment: the tech might be interesting, but the messaging alienates the exact developer community they’re trying to win over.

Deepnote’s Offering and Open Source Move

  • Some users say Deepnote has long been the nicest Jupyter UI, but locked behind a cloud subscription; open‑sourcing under Apache 2 is praised.
  • Others note confusion: the repo doesn’t yet seem to expose a fully runnable local notebook environment; key pieces are “coming soon.”
  • Deepnote argues notebooks must be reactive, collaborative, and “AI‑ready,” and that this requires a rich project format (YAML + metadata, secrets, multiple block types) beyond plaintext.
  • Skeptics question real‑time collaboration demand (most want git‑style workflows) and dismiss “AI‑ready” as marketing buzz.

Jupyter: Strengths, Weaknesses, and Alternatives

  • Defenses of Jupyter: still “best in class” for many, especially via VS Code; excellent for teaching, ad‑hoc analysis, and REPL‑like workflows where long precomputation is reused.
  • Critiques:
    • .ipynb mixes code and outputs (huge base64 blobs), making git diffs painful.
    • Hidden kernel state causes non‑deterministic behavior and confusion.
  • Tools like nbconvert and jupytext partly address these problems. Some say Jupyter doesn’t need a “successor,” just better practices.

Marimo as the De‑Facto Successor (in the Thread)

  • Marimo is repeatedly recommended as the real Jupyter successor. Praised features:
    • Notebooks as plain .py files (git‑friendly, no embedded output).
    • Optional reactivity with deterministic execution and no hidden state.
    • UI amenities: multi‑column layout, interactive widgets, DataFrame viewers, SQL cells, LLM integrations.
    • Static web export via WASM.
  • Downsides: currently Python‑only; some dislike losing persistent “messy state” workflows; recent acquisition by CoreWeave raises enshitification/lock‑in concerns.

Broader Notebook vs Script / Standardization Discussion

  • Ongoing tension: some prefer plain scripts for simplicity and portability; others view notebooks as superior REPLs and narrative/teaching tools.
  • Several argue notebooks should compile to high‑quality, static, executable HTML for publication, not be the final artifact themselves.
  • Concerns are raised about corporate control of de‑facto standards vs nonprofit stewardship like Jupyter’s, and about startups using “successor” language as marketing rather than community consensus.