Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 128 of 350

Tor browser removing various Firefox AI features

Tor, AI, and security/anonymity

  • Commenters broadly agree Tor Browser is right to strip Firefox’s AI features, given Tor’s goals of security, privacy, and anonymity.
  • Sending page content or prompts to third-party AI services is seen as fundamentally incompatible with Tor’s threat model; even user-supplied API keys could deanonymize users.
  • Some emphasize that only strictly local models might be acceptable, and even then they increase attack surface and complexity.

AI-everywhere backlash and hype

  • Many express fatigue with “AI in everything,” comparing it to past buzzword waves like “HD,” “cloud,” and “blockchain” slapped onto irrelevant products.
  • There’s strong suspicion that embedded AI is primarily a new data-collection and monetization vector, not a user benefit.

Firefox UX, popups, and accessibility

  • A long subthread debates filing bug tickets for intrusive Firefox popups (feature promos, translation CTAs, etc.).
  • One side frames this as “pouring sand in the gears” to push Mozilla away from user-hostile design.
  • Others say this wastes accessibility engineers’ time and conflates legitimate accessibility work with annoyance at modals and overlays.
  • General frustration with popups, marketing UI, and “feature nags” in browsers and apps is widespread.

Firefox AI features and configuration

  • Some users didn’t know Firefox had an AI sidebar until it was pushed in front of them; they dislike the surprise and default presence.
  • Others find the sidebar genuinely useful (e.g., summarizing papers, better translations, technical Q&A) and note it’s disabled by default and can be wired to local/own-hosted models via about:config.
  • There’s criticism that AI providers are hardcoded and the feature isn’t cleanly separated as an extension.

Firefox strategy, funding, and trust

  • Several feel Mozilla is “losing its way,” chasing trends like AI and Pocket instead of speed, stability, and open standards.
  • Others counter that Mozilla does respond to user feedback and adds real features (e.g., tab groups, split view, translation).
  • A recurring theme is distrust due to heavy funding from Google and high executive compensation, tied to Firefox’s small market share.
  • Some argue users should still support Firefox to avoid a Chrome/WebKit monoculture; others say continuing to use a product they dislike only removes pressure to improve.

Alternative browsers and forks

  • Waterfox, Zen, Orion, and others are mentioned as Firefox- or WebKit-based options that strip AI/telemetry or offer different UX.
  • Tor’s move is praised as setting a privacy-preserving example amid a wave of “AI browsers” seen as potential privacy/security nightmares.

Power over Ethernet (PoE) basics and beyond

10G PoE and When It’s Useful

  • 802.3bt (PoE++) formally supports up to 10GBASE‑T; earlier PoE+ only covered up to 1G.
  • 10G PoE switches exist from major vendors, but commenters say real demand is niche: broadcast video production, high‑end Wi‑Fi 6/7/8 APs, compact remote switches, and some NAS/fast storage workflows.
  • Many argue most APs are airtime‑, not uplink‑limited, so 10G+PoE is usually overkill.
  • PoE Type 4 can deliver ~90 W at the source, ~70 W at the device—enough for fairly powerful terminals or small computers.

Power Capacity, Cables, and Efficiency

  • Mains IEC/Edison cords carry far more power (10–15 A, ~1200–1800 W) versus PoE’s ~1.5 A/90 W.
  • Each PoE device needs its own cable and port, unlike a power strip.
  • PoE has extra conversion losses: AC→48 V at the switch, line losses in thin copper, then 48 V→device voltage; less efficient than local DC supplies, especially at higher power.
  • Compared to powerline networking, PoE over Cat5/6 is described as faster and more reliable; mains wiring has stricter code requirements.

Standards vs Passive PoE and Safety

  • Strong consensus: use IEEE 802.3af/at/bt gear; avoid “passive PoE.”
  • Standards-based PoE negotiates before enabling power and is widely reported to be safe even when every port is PoE‑enabled.
  • Passive PoE puts fixed voltage on pins and can burn non‑PoE ports, partly because some magnetics terminate common‑mode signals via 75 Ω resistors to ground.
  • Some label passive runs aggressively; most don’t label standards‑based PoE at all.

Home CCTV, Privacy, and Camera Choices

  • Many use PoE for DIY CCTV: one cable per camera, no batteries, no cloud vendor.
  • Popular approach: PoE IP cameras (often ONVIF/RTSP), local NVR software (e.g., Frigate, Synology Surveillance, Scrypted), cameras isolated on a VLAN with no internet access.
  • Mixed experiences with brands; sensor size and low‑light performance are emphasized over megapixels. Industrial/surplus cameras are valued for fewer cloud ties and better build.

Network Segmentation and Physical Access

  • Concern: an attacker unplugging an external camera and connecting a laptop.
  • Suggested mitigations: VLANs dedicated to CCTV, private VLAN/port isolation, firewall rules (only NVR→camera, no outbound from cameras), sometimes 802.1X/MACsec.
  • Some say if someone can reach the cable unnoticed, your physical security is already failing.

PoE in Consumer and “Enterprise” Gear

  • Many want PoE in more consumer devices (streamers, hubs, small switches, laptops via splitters) to cut wall‑warts and centralize backup power.
  • Debate over what “enterprise‑grade” means: some equate it with 48‑port chassis; others with features (VLANs, QoS, routing, centralized management) regardless of port count.
  • Passive PoE’s legacy in some ecosystems (notably WISP gear) is criticized as a long‑term safety and interoperability problem.

Design and Implementation Notes

  • Engineers stress: obey isolation requirements, handle chassis grounding carefully, and “don’t skimp on TVS” for surge protection.
  • Ideal‑diode full‑bridge rectifiers (MOSFET‑based) are praised for efficiency in PoE power entry.
  • Recommendation to follow vendor PoE reference designs (TI, Microchip, etc.) rather than improvising.
  • Midspan injectors are clarified: they completely break and re‑inject power, so there’s never more than one source on a cable; PoE negotiation does not pass through.

PoE Lighting and Creative Uses

  • PoE lighting discussed as attractive (low‑voltage install, fine‑grained control, no electrician) but with gotchas: dependence on network/server, voltage drop, and life‑safety coupling.
  • Some already run rooms or basements entirely from PoE++ with DC LED bulbs.
  • Commenters fantasize about a standard PoE lighting ecosystem and various “fun” PoE‑powered gadgets given the many unused PoE ports in home switches.

DoorDash and Waymo launch autonomous delivery service in Phoenix

Pricing, Business Model, and Who Captures the Savings

  • Many expect prices won’t drop despite removing drivers, because platforms already underpay humans and will keep charging “what the market will bear.”
  • Some compare Waymo ride prices to Uber: currently similar or slightly cheaper, so there’s no incentive to discount autonomous service.
  • Tipping is a major cost: users note “no tip” is a big savings, but others expect platforms to try dark-pattern “tip your robot” prompts.
  • Several comments highlight hidden economics: higher menu prices on apps, delivery fees, “service fees,” plus subscription passes that obscure the real markup (often 20–30%+ per item).
  • One detailed back-of-the-envelope calculation argues that current Waymo hardware (~$200k/vehicle) is more expensive than gig drivers; rebuttals say cars can last far beyond 100k miles, insurance cost per mile should drop with safety, and this is partly a long-term strategic bet, not a current cost win.

User Experience and Demand for Autonomy

  • People who’ve used Waymo in Phoenix/SF report strong satisfaction: defensive driving, no small talk, no safety concerns, especially valued by some women after bad rideshare experiences.
  • Others push back: 5+ minute wait times and short trips make personal car ownership still attractive; likely outcome for many is going from two cars to one, not zero.
  • Some see this as the next “Uber pattern”: start cheap, then raise prices once entrenched.

Last-Meter Delivery and Accessibility

  • The announced flow: restaurant staff load the car; customer walks to the vehicle and unlocks the trunk via app to grab items.
  • Critics say this degrades service vs human couriers who bring food to the door—especially bad for people in large apartment buildings, bad weather, or with mobility impairments.
  • Supporters counter that in many buildings deliveries already go to lobbies, and some would happily trade a short walk for lower tips and fewer issues with drivers.

Urban Form, Environment, and Alternatives

  • Large subthread argues the “real” solution is walkable, mixed-use neighborhoods and public transit, not 4,000 lb robots moving 1 lb burritos.
  • Others note US zoning, car-centric design, and “food deserts” make delivery genuinely valuable, especially for carless and elderly people.
  • Sidewalk robots, e-bikes, and drones are discussed as more efficient options; concerns include sidewalk clutter, vandalism, noise, and regulatory hurdles.

Impact on Workers and Restaurants

  • Many see this as the next step in automating away already-precarious gig work.
  • Several claim app-based food delivery is fundamentally extractive: platforms sit between customers and restaurants, capture a big share of margins, and push prices up while quality and working conditions suffer.

Why I Chose Elixir Phoenix over Rails, Laravel, and Next.js

Phoenix vs Rails/Laravel Capabilities

  • Several commenters say the article understates Rails/Laravel: both have first‑class support for background jobs, websockets, and real‑time (ActiveJob, Sidekiq/Solid Queue, ActionCable/Hotwire; Laravel queues/broadcasting).
  • Others argue Phoenix feels more “integrated”: real‑time, background jobs, PubSub, and process supervision all ride on the same BEAM primitives, with fewer moving parts and less external infrastructure.

LiveView vs Hotwire / Livewire / Next.js

  • Multiple corrections that Hotwire does use websockets or SSE; the difference is architectural, not transport.
  • View: LiveView gives each connected client a stateful BEAM process; ephemeral UI state lives server‑side, reducing client JS and avoiding bolted‑on layers.
  • Counterpoint: this “websocket‑first, stateful web tier” is a real tradeoff:
    • Latency depends on round‑trips; quick mobile interactions and flaky networks can feel rough.
    • You must think about connection lifecycle and state reconnection; browser back button, reconnection delays, and large LiveViews can become problematic.
  • Hotwire is praised for progressive enhancement and working even when websockets drop; Livewire is seen as a simpler, less mature take on the same idea.
  • Some feel Next.js (especially App Router) is over‑complicated, fast‑moving, and brittle for long‑term maintenance, though others defend it as powerful when used well.

Background Jobs: Oban, GenServers, Solid Queue, etc.

  • One camp: BEAM + GenServers mean you often don’t need a “job system”; simple supervised processes or Tasks cover many use cases.
  • Strong rebuttal from production users: use Oban from day one if jobs matter—GenServers lose state on node/pod failure and lack retries. Oban’s simplicity, reliability, and minimal schema are praised; Solid Queue is seen as more complex and less ergonomic.
  • Discussion on clustering with Kubernetes and how BEAM’s “let it crash” model complements, rather than replaces, container orchestration.

Performance, Concurrency, and BEAM Model

  • Many emphasize BEAM’s strengths: lightweight processes, actor model, fault tolerance, soft real‑time behavior, and high connection counts with small resources.
  • Comparisons made to PHP (fibers still need external runtimes), JVM (very capable but heavier), and Node (strong ecosystem but less “batteries‑included” and more infrastructural churn).

Ecosystem, Libraries, DX, and Tooling

  • Some complain Elixir’s ecosystem is smaller and missing certain libraries; others counter that the smaller community “punches above its weight” with high‑quality libs (Ecto, Phoenix, LiveView, Oban, Nx, Livebook, Nerves).
  • DX concerns:
    • A large‑scale Elixir/Phoenix shop reported slow compile times and flaky LSP/autocomplete in a 300k‑LOC codebase.
    • Others with similarly sized apps say compiles are “blazing fast” and suspect circular dependencies or heavy GraphQL setups.
    • LiveView can become unwieldy for very complex UIs, pushing teams back to a React frontend and re‑introducing split‑stack complexity.

Adoption, Hiring, and “Boring vs Exciting” Tech

  • Corporate buyers reportedly hesitate to adopt Elixir; many only recognize JS/Python/C#/Java as “safe” options. Ecosystem size and developer fungibility are major concerns.
  • Suggested strategy: hire strong engineers and teach Elixir rather than filtering for prior experience.
  • Some see Elixir’s “feature complete” status as reduced excitement; others view stability and lack of paradigm churn as a major advantage for long‑lived systems.

Critiques of the Article and Meta Points

  • Several readers feel the article unfairly glosses over what Rails/Laravel already provide and reads like a post‑hoc justification of a preferred stack.
  • The author (in comments) reiterates it was a personal use‑case write‑up, not a general verdict, and acknowledges Rails/Hotwire and Laravel are excellent but argues Phoenix/LiveView felt more seamless and robust for the specific project.

Electricity can heal wounds three times as fast (2023)

DIY and Consumer Electrotherapy

  • Several comments joke about “homebrew” approaches (cattle prods, fireplace lighters, wall sockets, tasers), but also mention more realistic options like TENS units and consumer microcurrent/face devices.
  • There is interest in an eventual non‑prescription device or “step‑by‑step guide,” though others implicitly flag safety concerns about applying electricity to open wounds without clear parameters.

Biological Mechanisms and Prior Work

  • Commenters note that cells already use endogenous electric fields generated by ion gradients to guide movement and growth; flatworm experiments manipulating these fields are cited as precedent.
  • For diabetics and people with poor circulation, natural ion gradients may be impaired, making external fields particularly helpful.
  • One commenter with materials science experience relates that electric fields can turn random growth into directed growth, making the wound‑healing effect unsurprising.
  • Another outlines a long history of “healing currents” from the 1800s onward, including DC microcurrent wound therapy, bone growth stimulators, and modern bioelectronic dressings.
  • Distinction is made between DC (directional wound closure) and AC (conditioning, circulation, comfort), with combinations seen as optimal.

Clinical Use, Evidence, and Anecdotes

  • Electro‑stimulation is already used in physical therapy (e.g., dry needling with current, post‑surgical rehab, partially torn muscles). Some report strong personal benefit; others report no effect.
  • A long subthread debates how much weight to give anecdotes. Points raised:
    • Many injuries (especially tendons) improve over ~12 weeks regardless of intervention.
    • Anecdotes can suggest hypotheses but don’t disprove the null (“it would have healed anyway”).
    • Some argue adults may rationally act on low‑risk anecdotal evidence; others warn this invites pseudoscience.
  • There is curiosity about adapting consumer TENS devices but no concrete DIY protocol, and repeated implicit cautions about safety and confounders.

Diabetes, Chronic Wounds, and Prevention

  • The article’s focus on diabetic wound healing triggers a tangent: should society emphasize preventing diabetes (obesity, diet, ultra‑processed food, cheap grains/sugar, “addictive” foods) rather than just treating complications?
  • Commenters disagree on root causes (abundant food vs. food design vs. “capitalism”) but generally accept that both prevention and new therapies are needed.

Other Wound-Healing Approaches

  • Separate anecdotes discuss non‑electrical interventions: topical collagen powder for non‑closing wounds, diet and supplements (spirulina/chlorella, anti‑inflammatory diets) improving chronic inflammation.
  • These generate additional debate about mechanisms, sterility, and whether oral collagen offers benefits beyond adequate protein intake.

Hyperflask – Full stack Flask and Htmx framework

Overall reception

  • Many commenters find Hyperflask attractive: “simple, easy, batteries-included” Flask + HTMX with a pleasant design.
  • Some are excited to try it for greenfield apps, especially those already using Flask, Tailwind/DaisyUI, and HTMX.
  • Others see it as “too abstracted” given Flask and HTMX’s original simplicity, and question whether it adds enough beyond vanilla Flask + HTMX.

Flask vs FastAPI / async debate

  • Several question choosing Flask in 2025, arguing that non-async foundations limit scalability and that FastAPI (or Litestar) offer integrated async, DI, OpenAPI, and Pydantic.
  • Defenders of Flask emphasize:
    • Stability, maturity, and small issue backlog vs FastAPI’s high-maintenance surface area.
    • Simplicity of threaded request model and global context (g), and skepticism about async Python ergonomics and bugs.
    • Many real-world apps don’t need massive scale; “boring tech” is a plus.
  • Counterpoints:
    • Flask lacks first-class typing, DI, and async; add-on libraries exist but feel fragmented or under-maintained.
    • Some see building a new sync-only framework as “bizarre,” though others call this FUD and argue that not all scaling needs async.

HTMX: strengths, limits, and team fit

  • Solo developers report very positive experiences with HTMX + server-rendered HTML (Flask/Django/FastAPI/Go).
  • One concern: HTMX is “structureless,” making larger teams harder to coordinate vs opinionated SPA frameworks.
  • Big debate over state management:
    • Critique: with HTMX, too much UI state must live in URL/session/cookies/DB, which becomes spaghetti for complex UIs with many zones/popups; React/Vue’s centralized state is seen as simpler.
    • Rebuttals: that’s just “web dev 101”; URL vs session vs DB is a design decision, and modern SPAs often duplicate server state and add bloat.
    • Some hypermedia advocates go further: most state should live on the server (even popups), trading some latency for consistency and multi-user features; others reject storing such ephemeral UI state server-side.

Framework design: components, jinjapy, ORM

  • Interesting features called out:
    • Components built on Jinja macros.
    • “Locality of behavior” approach: controller + template in one .jinjapy file, inspired by Astro pages and old-school PHP.
    • sqlorm: a new lightweight ORM heavily based on Pydantic and SQL-in-docstrings; intriguing but seen as too new for production.
  • Concerns:
    • “Batteries included” means a long list of Flask extensions; some wish the component system were more backend-agnostic or Django-compatible.

Alternatives and ecosystem

  • Mentioned alternatives: FastAPI + HTMX, Litestar (with HTMX support), Quart (async Flask), Go + Templ + HTMX, plain Django + HTMX, and FastHTML.
  • Django’s admin and “apps” structure are missed by some when using lighter frameworks; a richer admin story for Hyperflask is requested for serious adoption.

Nightmare Fuel: Skibidi Toilet and the Monstrous Digital

Overall views on Skibidi Toilet

  • Split between seeing it as shallow “brainrot” vs. surprisingly compelling, even better than some blockbuster films.
  • Several adults who watched long stretches report getting invested in the silent sci‑fi war narrative despite initial disdain.
  • Others find it repetitive and samey over time, or “14‑year‑old boy slop,” but still understand why kids like it.

Narrative, lore, and meaning

  • Some argue it’s a genuine serialized epic with backstabbing, alliances, and emotional stakes.
  • Others insist it’s not real narrative but “episodic, mimetic, fractal” content—bits designed to be recombined and remixed.
  • Debate over whether deeper symbolism (media control, surveillance, climate anxiety, toilets vs. cameras as “out vs. in”) is intentional or post‑hoc retcon.
  • Fan theories and lore are seen as part of the fun, even if simplistic—an entry point for kids to think, speculate, and build shared language.

Academic and critical analysis

  • The linked paper is called everything from “wild over-analysis” and “stoned lit major nonsense” to “interesting and hopeful” meaning-making.
  • One side likes the psychoanalytic framing and the idea that ambiguous narratives train openness to multiple interpretations.
  • The other side thinks one creator interview (“toilets are funny”) could invalidate the thesis and that piling climate politics onto toilet memes is absurd.

Continuity with earlier absurdist culture

  • Many comparisons to older internet/TV weirdness: Charlie the Unicorn, Salad Fingers, YouTube Poops, GMod/SFM animations, Adult Swim shows, Monty Python, All Your Base, Hamster Dance.
  • Consensus that this kind of surreal, gross, chaotic humor is not new; what’s new is speed, scale, and algorithmic amplification.

Kids, parents, and generational dynamics

  • Parents mostly oscillate between confusion, mild irritation, and amused acceptance; some even make costumes and watch marathons with their kids.
  • View that kids always gravitate to what annoys or baffles adults, but today’s parents themselves grew up on edgy, bizarre media, so there’s less genuine shock.
  • Some worry that constant “brainrot” and anti‑intellectual meme culture (including newer trends like “Italian brainrot” and 6‑7) represent a deeper disengagement from coherent narratives and reality.

AI, production, and commercialization

  • Fears that future versions will be cheaply mass‑generated by tools like Sora, worsening oversupply of low-effort content.
  • Counterpoint: Skibidi currently represents “outsider art” skill (timing, animation, micro‑storytelling) and may inspire kids to learn Blender.
  • Noted shift from grassroots vibe to corporatized IP: merch walls in big-box stores, big agencies involved, rumored film deals—raising questions about authenticity and “when to bail” as corporations squeeze it dry.

Solution to CIA’s Kryptos sculpture is found in Smithsonian vault

Title & context

  • Several commenters note the submission title should mention “Kryptos” because that’s what draws HN interest, though others point out HN guidelines prefer original article titles.
  • Many emphasize that a Kryptos solution is inherently more interesting than “some arbitrary CIA secret.”

How the puzzle was “solved”

  • Core debate: is finding the written solution in the Smithsonian archives a real “solution,” or just a side‑channel shortcut?
  • Some see this as fully in‑bounds and even poetic: investigative work and library science, not STEM brute force, cracked the last part—akin to capturing an Enigma codebook.
  • Others feel cheated: years of cryptanalytic effort bypassed; it’s more like “finding it in a drawer” than solving the cipher.
  • Commenters liken it to a side-channel attack and say that’s actually what intelligence agencies really do versus the idealized “pure cryptography” model.

Ethical and legal questions

  • Dispute over whether the journalists should publish the solution, knowing the artist planned to auction it to pay medical expenses.
  • Some propose public crowdfunding the “solution” and releasing it once a target amount is raised.
  • Long subthread on possible legal claims: tortious interference with contract or business relationships, and copyright infringement for photographing notes.
  • Others argue intent to harm isn’t clear, interference must be “improper,” and that copying for research and not distributing may be fair use; the legal situation is described as murky and likely expensive to litigate.
  • Auction-house legal threats are widely criticized as heavy‑handed.

Quality and design of the puzzle

  • Several note Kryptos may have been effectively unsolvable by design, given a multi‑stage scheme by a non‑cryptographer relying on specific keys and period references that may have aged out.
  • Some say that after 35 years of failure, this indicates a bad puzzle; others respond that, for the CIA, exploiting side channels is thematically appropriate and thus “in spirit.”

Emotional reaction & healthcare tangent

  • Many express sadness: the solving community didn’t get a cryptanalytic win; the artist is ill and financially pressured; legal wrangling depresses the artwork’s value.
  • This quickly broadens into a large argument about the U.S. healthcare system: Medicare gaps, out‑of‑pocket caps, medical bankruptcy risk, and comparisons with European public–private mixed systems.
  • Views range from “advanced care is inherently expensive” to “U.S. pricing and insurance overhead are the real problem; universal or public options could be cheaper and fairer.”

Liquibase continues to advertise itself as "open source" despite license switch

License change, trust, and “bait-and-switch” concerns

  • Liquibase moved from Apache 2.0 to the Functional Source License (FSL), which Liquibase itself says is not open source. The README and marketing still saying “open source” is seen as misleading (“source‑washing”).
  • Many view license changes from OSI‑approved to source‑available as a bait‑and‑switch that destroys trust, especially when telemetry was added beforehand and the project built a large OSS user base.
  • Others argue you still have perpetual rights to existing Apache‑licensed versions and forking is always possible, so it’s closer to a price hike than true bait‑and‑switch—but critics note that forking is often not viable for typical users.

Open Source vs “source available” vs Free Software

  • Large subthread debates what “open source” means:
    • One camp: OSI’s Open Source Definition is the de‑facto meaning; anything restricting commercial/competitive use is not open source and claiming otherwise is deceptive.
    • Another camp: “open source” just means publicly viewable source; OSI is “just an organization” and has no legal monopoly on the term.
  • Several distinguish “Open Source” (OSI sense) from “Free Software” (FSF’s four freedoms) and from looser “source available” models that allow reading and limited redistribution but restrict certain uses.

Free software ideals vs business realities

  • Strong free‑software advocates say FSL and similar licenses are proprietary because they violate freedom 0 (use for any purpose) and restrict redistribution/hosting; they see this as sacrificing user freedom to protect vendor business models.
  • Others are comfortable trading some freedoms from large vendors (e.g., hyperscalers reselling as SaaS) to keep smaller companies sustainable; they see “no‑hyperscaler” clauses and delayed‑open‑source as reasonable compromises.
  • Long back‑and‑forth compares copyleft (GPL/AGPL) vs permissive (MIT/BSD) vs new “fair source” styles. Some argue AGPL already solves the “cloud free‑rider” problem and has case law; others distrust its enforceability or find it too “viral.”

Big tech, OSI, and capture narrative

  • Some claim big tech financed OSI to co‑opt the free software movement, normalize non‑restrictive “open source” definitions, and delegitimize alternative licenses that curb hyperscaler monetization.
  • Others counter that OSI largely adopted Debian’s guidelines, that its definitions are broadly useful, and that big tech itself often avoids strong copyleft (AGPL), proving OSI is not simply serving hyperscaler interests.

Practical impact, ecosystems, and alternatives

  • Many report or plan migrations from Liquibase to Flyway, Alembic, Sqitch, Atlas, pgroll, or custom SQL‑based migration tooling; concerns include:
    • Future license tightening and unclear “competing use” definitions.
    • Incompatibility with foundations requiring OSI‑approved licenses (e.g., CNCF, Debian/Fedora main repos).
  • Some argue typical internal users won’t be affected by FSL, since it mainly blocks competing hosted services; critics reply that it still locks ecosystems to a single primary vendor and discourages contributions from organizations that forbid contributing to proprietary codebases.

Elixir 1.19

Language Evolution & Stability

  • Many praise Elixir’s incremental, non‑breaking evolution (including the new typing work) as a model for “finishing” a language while still improving it.
  • Users report stress‑free upgrades over many years; the desire to upgrade comes from useful features, not compatibility pressure.
  • This is contrasted with painful version jumps in other ecosystems (Python 2→3, Perl 6, Ruby 1.8→1.9/2, PHP, Java 8→11+, Swift, Scala 2→3, .NET, C/C++, Rust async, Node CJS/ESM).

Types & Static Analysis

  • Several are excited by built‑in, progressive type checking and see it as a major milestone.
  • Concerns are raised that Elixir types could devolve into “any everywhere” like TypeScript; others argue:
    • Pattern matching already makes a lot of existing Elixir code structurally “half‑typed”.
    • Types are integrated into the language, not a separate “typed dialect”, so active libraries are likely to adopt them.
  • Dialyzer’s “success typing” is criticized as rarely catching bugs; commenters ask if the new system will be stricter (warn on any possible failure) or more like Dialyzer.

Phoenix, Macros & Framework Churn

  • Some complain about Phoenix/LiveView churn, under‑maintained packages, and moving best practices; LiveView’s long pre‑1.0 phase is cited.
  • Phoenix is perceived by some as macro‑heavy and DSL‑like; maintainers counter that:
    • A small fraction of the public API is macros.
    • Most user code (contexts, controllers, templates) is plain functions.
  • There’s a general debate about macros vs verbose APIs: critics dislike tooling/debugging friction; defenders note all large web frameworks are effectively collections of DSLs, macros or not.

Tooling, Docs & Developer Experience

  • One commenter finds Elixir tooling “decades behind” and documentation noisy, with dense modules (e.g., GenStage) and few gentle introductions.
  • Many others strongly disagree, highlighting:
    • Mix (build/tasks), ExUnit (testing), IEx (REPL), and BEAM observability as standout tools.
    • Hexdocs and inline docs (h in IEx) as a documentation gold standard, often better than other languages they’ve used.
  • Editing/debugging (especially language server/IDE support) is acknowledged as weaker than top‑tier JVM/.NET ecosystems.

Performance & 1.19‑Specific Improvements

  • The new MIX_OS_DEPS_COMPILE_PARTITION_COUNT option shows substantial speedups for native dependency compilation in benchmarks, especially on multi‑core machines.
  • Some confusion arises about timing methodology (cached vs fresh builds), but follow‑up runs from scratch confirm meaningful wins.
  • Inclusion of SBOMs in releases is welcomed by people working in regulated or enterprise environments.

Ecosystem, Use Cases & Alternatives

  • Elixir is clarified as a dynamic, compiled language targeting BEAM; .ex files compile to bytecode, .exs scripts compile/run in memory.
  • Several stress that most Elixir devs rarely need to write Erlang; both share the same semantics and OTP runtime.
  • OTP’s actor model, immutability, preemptive scheduling, and process linking are presented as advantages over Python‑style concurrency, even if Python’s GIL story is evolving.
  • Suggested sweet spots: highly concurrent IO‑bound systems, web apps, brokers, long‑running network services, and embedded/edge (Nerves).
  • Gleam is discussed as a statically typed BEAM language: praised for minimalism but with fewer OTP integrations and tooling; one design choice (1/0 = 0) is called out as dangerous.

Community Reports & Adoption

  • Multiple commenters describe very positive production experience, painless upgrades, and strong reliability compared to Python/Ruby stacks.
  • Some founders say they started companies specifically to use Elixir, citing Livebook, LiveDashboard, and community support as major enablers.
  • A dissenting voice reports macro‑induced complexity, spaghetti dependencies, poor hiring story, and underwhelming docs; others respond point‑by‑point that this doesn’t match their experience.
  • A few wish for more diversity on the client‑side and mobile stories, feeling Phoenix/LiveView doesn’t fit everyone’s mental model and that more experimentation (as in JS/TS land) would be healthy.

Journalists turn in access badges, exit Pentagon rather than agreeing new rules

Scope of the New Pentagon Rules

  • New policy ties credentialed access to agreeing not to report “unauthorized” information, including some unclassified material; leaks of classified / controlled info are grounds for losing badges.
  • Some note an Oct 6 revision appears to loosen the harshest language, but it remains unclear exactly what outlets still object to.
  • Critics stress this goes beyond normal classification: it conditions access on prior approval of what can be reported, chilling whistleblowers and off-the-record conversations.

Press Freedom vs Security

  • One side argues the Pentagon is a uniquely sensitive site; limiting wandering reporters and unauthorized disclosures is reasonable and should be handled through classification and access control.
  • Others respond that classification already protects secrets; this is about controlling narratives, not security. Journalists should be free to ask anything, and officials are responsible for not revealing restricted information.

Government vs Private Company Analogy

  • Some compare the rules to how companies like Apple manage press access.
  • Pushback is strong: a government with a “monopoly on violence” and FOIA obligations is not analogous to a private firm, and must tolerate scrutiny even when inconvenient or embarrassing.

Embedded Journalism, Access, and Propaganda

  • Several commenters say the embedded Pentagon press corps has long functioned as “access journalism” and soft propaganda; this incident only makes that implicit bargain explicit.
  • Others counter that reporters inside the building have occasionally exposed important internal dissent and operational problems; losing that presence reduces transparency.

Boycott, Game Theory, and Who Stays

  • Many applaud outlets turning in badges as rare evidence of professional backbone; others call it costless posturing since jobs and salaries remain.
  • Some predict less scrupulous outlets and influencers will stay, gaining exclusive access and prestige while largely amplifying official lines.
  • There’s concern that, over time, access pressure will push most organizations to cave, as seen in more authoritarian contexts.

Broader Political and Historical Framing

  • Numerous comments link the move to a wider pattern: Trump’s hostility to the press, reduced transparency, and parallels to Russian war-censorship laws or other authoritarian regimes.
  • Others caution against hyperbole but still see it as another “brick in the wall” weakening democratic checks and balances.

Steve Jobs and Cray-1 to be featured on 2026 American Innovations $1 coin

Coin availability and circulation

  • Commenters confirm the American Innovation $1 coins are sold directly by the U.S. Mint (rolls, bags, proof sets) and sometimes appear in circulation or on secondary markets (eBay, etc.).
  • Several people reminisce about coin collecting and say they’ll buy these as souvenirs, not investments; some use such coins as nicer “board game money.”
  • Multiple replies note that $1 coins in the U.S. historically fail to circulate: people prefer $1 bills, cash drawers lack slots, coins are heavy, and they’re easily confused with quarters.
  • Many vending and transit machines once pushed $1 coins as change, which annoyed users; now, tap-to-pay has largely bypassed the issue.
  • There’s discussion of the inefficiency of $1 notes, the fading penny, and anecdotes about little-used denominations like $2 bills and $1 coins.

Design and portrayal of Steve Jobs

  • Reactions to the Jobs coin are sharply mixed: some find it “cool” or evocative of a famous minimalist photo; others call it ugly, unrecognizable, or too “spiritual leader/hippie.”
  • The official description’s emphasis on reflection and nature-driven inspiration is mocked by some as off-brand for his public image.
  • Several argue the design should have included an actual computer or product (Apple II, iPhone, chips) instead of a meditative pose in a field.

Who counts as an “innovator”? CEOs vs. engineers

  • A major thread debates whether Jobs is appropriate for an “innovation” series:
    • Critics say he wasn’t a technical inventor, stole credit, suppressed wages, offshored jobs, and embodies celebrating marketers over builders. They propose engineers and computer scientists instead.
    • Defenders argue that setting vision, insisting on UX and simplicity, assembling the right teams, and repeatedly reshaping consumer computing are also innovation.
  • Many alternative candidates are suggested: hardware and software pioneers, especially one widely praised systems/programming figure, a cofounder, and Bell Labs–type inventors.
  • Some see featuring Jobs without key collaborators as “disgusting” or at least misleading about where breakthroughs came from.

Other state innovations: Cray-1, refrigeration, Borlaug

  • Clarification: these are separate state-specific coins—Jobs/California, Cray‑1/Wisconsin, mobile refrigeration/Minnesota, and a famed agronomist/Iowa.
  • The Cray‑1 design is generally liked; its iconic shape “fits a coin well,” and the bench is noted as hiding large power supplies.
  • The mobile refrigeration coin draws unexpected enthusiasm; people discuss cold-chain logistics, vaccines, and recommended books/podcasts.
  • The agronomist’s coin gets strong praise; several call his work—high-yield, disease-resistant crops that averted mass famine—one of the most impactful in history, lamenting how few people know his name.

Ethics, symbolism, and putting people on money

  • Some argue that honoring deeply imperfect figures (from early presidents to tech CEOs) is inevitable and we should accept nuance: celebrate contributions but acknowledge harms.
  • Others suggest avoiding real people entirely on currency and using abstract virtues or achievements instead, to sidestep endless moral debates and hero worship.
  • A few note the broader irony of glorifying tech titans on a denomination that barely circulates in an increasingly cashless, inflation-eroded economy.

Upcoming Rust language features for kernel development

Scope of upcoming Rust-for-Linux features

  • Several commenters note these kernel-driven features (field projection, pinning, heap construction semantics, etc.) are broadly useful to systems programming beyond the kernel: OSes, embedded, bare metal, and complex C interop.
  • Some argue Rust’s focus on kernel needs has slowed other ecosystem work; others see Linux as productively pushing the language into more powerful but still general abstractions.

C (and C++) interoperability

  • Calling C from Rust is described as “excellent” mechanically: extern "C", #[repr(C)], bindgen/cbindgen, plus stable varargs calling.
  • Going the other way (C calling Rust) is seen as workable but painful: manual unpacking of Rust collections, allocator mismatches, subtle FFI safety pitfalls, lack of stable object-format guarantees, and weak tooling for producing C-facing shared libraries (symbol versioning, etc.).
  • Tooling like cargo-c, bindgen, and cbindgen works for many projects, but complex cases (e.g. systemd, Meson integration, advanced FFI-safety) still hit rough edges.
  • C++ interop is called “problematic”; the kernel itself does not use C++.

Rust vs managed languages and GUIs

  • One camp: Rust’s “natural home” is low-level systems; for most user-space apps, managed languages (JVM, .NET, Dart/Flutter, etc.) are preferable.
  • Counterpoint: Rust is “a rare gem” that works well for both firmware and applications, including GUIs.
  • GUI reality: Rust has several active toolkits (egui, Iced, Slint, GTK bindings, gpui), but many agree Rust does not currently “excel” at GUIs: text layout, bidi, font fallback, accessibility, and widget richness lag mature toolkits like Qt/AppKit.
  • Some see choosing Rust for GUIs as unnecessary complexity versus Flutter, C#, Java, etc., unless you specifically want Rust’s safety/performance.

Concurrency, thread safety, and Send/Sync

  • Multiple comments emphasize Rust’s compile-time prevention of data races via ownership and the Send/Sync traits, distinguishing data races from broader race conditions.
  • This is contrasted with C/C++, where correct atomic/mutex usage relies entirely on discipline and tooling.
  • Skeptics argue Rust only helps for a “narrow” class of in-process memory races and can’t protect against races via external resources (files, shared memory across processes, databases).
  • Others reply that for parallelization within a process, the memory-sharing case Rust covers is the most important and hardest to get right.

Rust in the Linux kernel: scope, value, and “experiment” concerns

  • A skeptical thread notes that current in-tree Rust consists largely of infrastructure plus a handful of drivers; questions whether the “world’s most important piece of software” is the right place for language co-development.
  • Responses:
    • Significant real drivers exist or are in progress (Android Binder rewrite, Apple M-series GPU, ARM Mali, others), often reporting far fewer race/memory bugs than expected.
    • Rust-for-Linux began out-of-tree; moving in-tree is necessary to stabilize APIs and make real adoption possible.
    • Kernel APIs being wrapped in safe Rust is itself major work: you’re encoding informal C rules (locking, lifetimes, RCU) into a type system.
  • Some see company influence (Android, large vendors) as driving Rust adoption; others argue there is simply no viable alternative “memory-safe C” today.

Async runtimes in the kernel

  • Commenters joke/half-worry about “Tokio in the kernel.”
  • Kernel developers reply that an async runtime is straightforward on top of existing workqueue infrastructure; a proof-of-concept Rust async runtime for Linux already exists.
  • Clarification that kernel Rust uses no_std and kernel primitives; porting user-space Tokio directly is unrealistic.

Language evolution: projections, heap construction, lightweight clones

  • The article’s pinned-field projections and “structurally pinned” decision are welcomed as unblocking many designs, especially around Pin.
  • Heap-construction semantics (C++-style elision/“guaranteed optimization”) are debated—some want explicit constructs like &out / &in or constructors; others note Rust’s invariants make C++-like constructors problematic.
  • Lightweight clones / Use trait:
    • Some are excited about ergonomics for reference-counted types.
    • Others think the current proposal is too complex/ambiguous; community sentiment has cooled and design is being reconsidered with an eye to simplicity.
  • Several participants express worry that Rust is on a trajectory toward C++-level complexity; defenders reply that:
    • Rust is still much simpler and more coherent than C++.
    • Crucially, most complexity is enforced and checked by the compiler rather than left to human discipline.

FFI, unsafe Rust, and low-level data structures

  • There’s unease about increasingly low-level unsafe constructs (&raw, pointer projections) and whether Rust should chase every C pattern (e.g., intrusive linked lists).
  • Others argue unsafe is appropriate for a small, well-audited core (e.g., a linked-list implementation) wrapped in a safe API; arrays-of-indices “cheats” still lack compiler-checked safety.

Automatic C→Rust translation and LLMs

  • Non-LLM tools like c2rust are highlighted as successfully transpiling some real C projects; they rely on static analysis rather than probabilistic models.
  • LLM-based translation is viewed skeptically: inherent approximation risks introducing subtle bugs beyond what test suites catch; formal methods or other verification would be needed.
  • Large targets like SQLite/Apache/Nginx are considered too big for current tools; success stories tend to be smaller codebases.

Complexity: Rust vs C/C++ and learning curve

  • Multiple comments compare complexity levels: Rust is seen as far more complex than C but substantially less convoluted than modern C++ (with its many initialization forms, value categories, SFINAE, exceptions, move semantics rules, etc.).
  • A recurring theme:
    • C++ complexity often produces silent undefined behavior when misunderstood.
    • Rust’s complexity typically manifests as compiler errors and guidance, making it more “learn-as-you-go” and safer, especially for teams and juniors.

TurboTax’s 20-year fight to stop Americans from filing taxes for free (2019)

History of Free Filing Efforts and Corporate Lobbying

  • Commenters note a 20+ year pattern of tax-prep firms lobbying to block or cripple government-run free filing (e.g., prior “Free File” deals, bans on IRS competition, shutting down or weakening IRS Direct File).
  • Several point out IRS Direct File piloted successfully and saved users billions, but is now being wound down under political and industry pressure.
  • Many see this as classic regulatory capture: concentrated corporate benefit, diffuse public harm.

Complexity of the US Tax System

  • Repeated theme: tax complexity is a feature, not a bug—used to create targeted incentives and loopholes, mainly benefiting those who can afford experts.
  • Others argue much complexity comes from trying to enact social policy via the tax code and from fragmented state/local systems.
  • Several non-US commenters describe PAYE and pre-filled returns where most people never “file” in the US sense, and express disbelief the US hasn’t adopted this.
  • Some insist that for simple W‑2 situations, US filing is easy and could be done on paper in minutes; others say even mild complications (multiple states, small business, investments, credits) quickly become intimidating.

Progressive vs Flat Tax and Who Really Pays

  • Long subthread debates whether a flat tax would simplify anything:
    • One side: complexity is about income categories and deductions, not brackets; flat tax mostly shifts burden from rich to poor.
    • Counterview: current complexity lets billionaires pay lower effective rates than high-earning professionals; you can get progressive outcomes with a flat rate plus fixed credits.
  • Related arguments over corporate vs individual tax burden, international tax arbitrage, and how much business should contribute compared to workers.

AI and the Future of Tax Prep

  • Some believe LLMs threaten traditional tax-prep software and will soon handle most preparation, especially where results are numerically checkable.
  • Many are wary: you shouldn’t use AI where you can’t verify the reasoning; if you must re-check everything, you might as well do it yourself.
  • Others predict AI will simply become a new intermediary and revenue stream, potentially adding complexity rather than removing it.

Alternatives, Open Source, and Nonprofits

  • Multiple mentions of cheaper or free options: FreeTaxUSA, Cash App (ex–Credit Karma), IRS Free Fillable Forms, community tools like freetofile.com, and open-source projects (Open Tax Solver, IRS Direct File code on GitHub).
  • People note the main barrier for open-source or nonprofit solutions is not math but fast-changing law and forms, requiring continuous legal and engineering work (and political headwinds).

Politics, Culture, and “Why Is This Privatized?”

  • Many tie the situation to US political culture: aversion to “big government,” strong lobbying, and a belief that privatization is inherently better—even when it clearly costs more.
  • Several explicitly blame specific parties and figures for blocking simplification, arguing that making taxes painful is an intentional strategy to build anti-tax sentiment.
  • Others invoke deeper cultural roots (e.g., Protestant work ethic, hostility to welfare) and describe the US as a de facto plutocracy where private profit routinely overrides public convenience.

New Alzheimer's Treatment Clears Plaques from Brains of Mice Within Hours

Perceived Significance of the Mouse Result

  • Many see the rapid plaque clearance and cognitive recovery in mice as hopeful but emphasize “mice ≠ humans.”
  • Some note the reported six‑month duration might just reflect when the study ended, not necessarily a hard limit.
  • Others stress that mouse “Alzheimer’s” is a genetic model that may not fully mirror human disease.

Treatment Burden and Willingness to Trade Off

  • Broad agreement that if this worked in humans, most patients and families would gladly accept injections every six months, or even far more frequent treatment.
  • Comparisons are drawn to dialysis and diabetes management to argue that repeated medical interventions are acceptable when the alternative is severe disability.

Prevention vs Cure (Exercise, Lifestyle)

  • One subthread cites research linking modest weekly physical activity to large reductions in dementia risk.
  • There’s frustration that people say they’d do anything for a “silver bullet” while neglecting basic health habits.
  • Others push back: these results are about risk reduction, not reversing established Alzheimer’s; prevention and treatment are “apples and oranges.”

Mouse Models, Amyloid Hypothesis, and Likely Effects

  • Commenters note prior amyloid-clearing drugs helped mice but not humans, fueling doubt that beta‑amyloid is the core problem.
  • A counterargument references work defending the amyloid hypothesis: amyloid may trigger tau pathology, so late amyloid removal might only slow progression.
  • Several conclude that even a pure “progression‑slowing” or pre‑symptomatic preventative would still be hugely valuable.

Ethics and Law of Early Human Testing

  • Strong debate over why severely ill patients can’t access untested drugs:
    • Pro‑access side invokes autonomy (“my body, my choice”) and pre‑consent before cognitive decline.
    • Others stress inability to give truly informed consent, legal limits on waivers, risk of extreme harm, and history of scams and negligence.
  • Existing pathways for last‑resort or late‑phase experimental therapies are mentioned, but not for totally untested drugs.

Cost, Access, and Incentives

  • Some worry that if the treatment isn’t highly profitable, it may stall.
  • Others argue governments could justify very large payments or even nationalization, given the massive economic cost of dementia—though the need to fund many failed attempts is highlighted.
  • One commenter notes non‑monetary costs of home caregiving, even when no money changes hands.

Alternative and Adjacent Approaches

  • Chinese “neck drain”–type interventions and TCM‑related treatments are discussed with heavy skepticism, even by clinicians, due to weak evidence and lack of global adoption.
  • Creatine is mentioned as having preliminary, marginal cognitive benefits in early human studies.
  • There’s curiosity whether amyloid‑clearing methods could help related conditions like cerebral amyloid angiopathy.

Emotional and Personal Perspectives

  • Several describe deep fear of Alzheimer’s and witnessing relatives’ decline.
  • A person with normal pressure hydrocephalus shares a powerful story of transient improvement after a spinal tap and the grief of losing that clarity again, used as an analogy for a temporary Alzheimer’s “awakening.”

Retiring Windows 10 and Microsoft's move towards a surveillance state

Linux as an alternative for customers

  • Multiple commenters support promoting Linux to small-business and home users, especially where needs are “browser + email + docs + Zoom.”
  • Advice: don’t sell “Linux” as such; sell “secure, low‑cost, no‑ads, long‑term support” solutions, and selectively migrate only customers whose workflows fit.
  • Several suggest dual‑boot or keeping a minimal Windows install for edge cases (games, CAD, heavy Office use).

Licensing and selling Linux systems

  • Initial worry: is it legal/ethical to sell PCs with Linux preinstalled?
  • Consensus: GPL and other FOSS licenses explicitly allow selling copies and systems, as long as licenses and source availability obligations are respected.
  • Ethical concern raised about “harvesting bad karma” by selling free software at high margins without added value; others note value can be installation, support, or physical media.

Choosing distros, updates, and support

  • Popular recommendations: Mint, Zorin, Debian Stable, Fedora (often with KDE), Pop!_OS, and RHEL‑like distros for longer support.
  • Strong push for immutable/atomic distros (Aurora, Bazzite) for non‑technical users: automatic, rollbackable updates and fewer breakages.
  • Automation of updates seen as critical; tools mentioned include unattended-upgrades, cron with apt, and built‑in update managers.

Office and productivity ecosystems

  • Heavy debate on replacing Microsoft Office:
    • LibreOffice: widely recommended but criticized for dated UI, bugs, and weaker Excel/VBA compatibility; fine for many home users, risky in finance/insurance‑style workflows.
    • Alternatives: OnlyOffice, FreeOffice/SoftMaker, Collabora, WPS; many praise OnlyOffice’s UI and compatibility.
    • Some prefer Google Docs or browser‑based tools as a gentler migration path.
  • Advice: be pragmatic, not dogmatic; if a business truly needs Office, consider keeping Windows or running Office via VM/Wine where feasible.

Gaming, CAD, and other compatibility gaps

  • Gaming on Linux (Proton, Steam, Bazzite) described as “surprisingly good,” but anti‑cheat and some titles still require Windows.
  • CAD (e.g., Autodesk Fusion) and other niche tools often run poorly under Wine/VM; many keep a few Windows machines just for this.

Windows 11, TPM/Secure Boot, and surveillance concerns

  • Many see Windows 11’s TPM/Secure Boot requirements, MS account pressure, OneDrive defaults, ads, Edge lock‑in, Recall, and Copilot as steps toward lock‑in and de facto surveillance.
  • Others argue TPM and Secure Boot are legitimate security features (rootkit resistance, disk encryption, passkeys) and that Recall/Copilot are optional and currently local/opt‑in.
  • Several note that the real risk is remote attestation plus TPM‑like hardware being used by vendors, banks, and content platforms to lock out alternative OSes and limit user control.

Usability for non‑technical users

  • Split views: some insist Linux is still too brittle and complex for “normies”; others report long‑term success with elderly parents and non‑technical users on Mint/Aurora when the system is pre‑configured and workflows are simple.
  • General consensus: migration should be driven by user needs (cost, longevity, fewer nags/ads) rather than pure privacy evangelism.

Ask HN: Can't get hired – what's next?

Salary Expectations and “Real Career” Definition

  • Central tension around OP’s target of $150k+ as minimum for a “real career.”
  • Some say $150k is high and rare outside major US tech hubs and top roles, and far above median household incomes.
  • Others argue $150k–$200k is mid-level for serious devs in places like Bay Area and certain US tech hubs.
  • Several commenters note OP’s framing (“barely survivable,” “boomer cope”) comes across as entitled and disconnected from broader economic reality.

Attitude and Soft Skills

  • Many point out OP’s tone (calling advice “boomer cope,” dismissing Midwest incomes, etc.) reads as arrogant, insufferable, and victim-minded.
  • Multiple people suggest this attitude may be a bigger obstacle than raw skills, especially for senior roles.
  • Advice: cultivate humility, detach self-worth from salary, accept market reality, and take “whatever decent job you can” as a reset.

Tech Screens, Leetcode, and AI Overuse

  • Consensus that failing tech screens is the immediate bottleneck.
  • Repeated recommendation: grind Leetcode / coding exercises daily, practice under pressure, and treat interviewing as its own skill.
  • Some warn that heavy reliance on LLMs may have atrophied OP’s hands-on coding ability and recommend going “cold turkey” for a while.

Market Conditions and Founder “Tax”

  • Several note the job market is genuinely bad, with long searches (6–12+ months) increasingly common.
  • Prior startup/founder experience can be a liability: seen as either overqualified or lacking “real” large-team/project experience.
  • Networking and referrals are repeatedly cited as the primary way around broken hiring funnels and HR filters.

Alternatives: Roles, Locations, and Fields

  • Suggestions: accept lower-level or lower-paid SWE roles, move out of high-COL hubs, look at non-“big tech” industries (healthcare, gov, data analytics, security), or contract/freelance work.
  • Some mention trades, retail, military, law, or bootstrapped businesses; others warn law and many non-tech paths won’t meet OP’s salary bar and can be even more brutal.

Mental Health and Perspective

  • Several detect burnout, anxiety, and identity tied to comp; recommend low-stress work or volunteering short-term to stabilize, then re-approach career decisions more calmly.

Acrobat is intrusive, slow and non-customizable

Acrobat’s Intrusiveness, Performance, and Pricing

  • Many describe Acrobat as bloated, slow, and malware‑like: it hijacks the PDF file association, is sluggish to start, and constantly nags for subscriptions or sign‑ins.
  • A background Adobe service keeps files open and appears to attempt uploads, causing deletion problems and raising serious PII/privacy concerns; users complain they cannot truly disable it.
  • $25/month pricing for Acrobat is seen as outrageous given the poor UX and resource usage.

Lock‑in via Non‑Portable “PDFs”

  • Several government and enterprise forms rely on Adobe‑only features (Dynamic XFA, scripted forms, smart‑card signatures), which display “Please use Adobe Reader” in other viewers.
  • Some tax/state forms actively block other viewers and even prevent exporting to a “normal” PDF, forcing users to print and scan.
  • Commenters argue this contradicts the “portable” promise of PDF and is used to entrench Adobe’s dominance.

Alternatives: Viewers and Editors

  • Popular viewers mentioned: SumatraPDF, Okular, Evince, Zathura, sioyek, Skim, qpdfview, xpdf, Atril, Edge, Chrome/Firefox (PDFium/pdf.js), PDF-XChange, Master PDF Editor, Xournal++, and Bluebeam (industry‑specific).
  • macOS Preview receives strong praise: fast, integrated, supports forms, encryption, annotations, and basic editing; some note high memory use and crashes with very large PDFs.
  • Several highlight browser readers (especially Firefox) as sufficient for most needs, including form filling and basic editing.

Editing, Signing, and Workflow Pain Points

  • Users still resort to Acrobat for edge cases: complex forms, certain signatures, Altium schematics, robust print dialogs.
  • PDF editing/signing is fragmented: some tools allow only drawing signatures, others only image‑based, some support certificates poorly or not at all.
  • Many business workflows involve reordering pages, redaction, merging, and annotation of PDFs, so “never edit PDFs” is seen as unrealistic.

PDF Format Complexity and Ecosystem Dynamics

  • Commenters note PDF’s extreme complexity (forms, JS, 3D, multimedia, DRM, accessibility, etc.), making a fully compatible, fast reader very hard to implement.
  • Some argue Adobe’s control of the standard plus corporate inertia and non‑user buyers (IT/enterprise contracts) reduce incentives to improve Acrobat.
  • The thread’s project (a Vim‑like Rust/MuPDF reader) is praised for speed and simplicity, though early testers report scrolling and multi‑file rendering bugs.

Next Steps for the Caddy Project Maintainership

What Caddy Is and Where It Fits

  • Seen as a modern alternative to nginx/Apache and often as an alternative to Traefik, especially for reverse proxying and TLS.
  • Users report using it “by default” now for homelabs, hobby projects, and some production setups, with high reliability over many years.
  • Some think Traefik is still better optimized as a Kubernetes ingress, but Caddy is preferred as a standalone reverse proxy or in front of containers.

Configuration, Defaults, and Features

  • Strong praise for Caddy’s configuration model: concise, readable, good documentation, and sane defaults.
  • Automatic HTTPS/ACME is repeatedly highlighted as the killer feature: install, run, and certificates just work (including rotation and multi-domain support).
  • Caddy enables HTTP/2 and HTTP/3 by default and picks modern TLS settings, reducing the need for admins to track best practices.
  • There is some skepticism that “fewer lines of config” matters in professional contexts where configs are large and complex anyway. Critics argue praise should focus more on deeper capabilities than shorthand.

Comparisons with nginx, Apache, and Traefik

  • nginx is described as “hands-off”: powerful but requires more explicit configuration (TLS ciphers, headers, ACME, PHP proxies).
  • Apache is defended as very capable and extensible (including ACME support), but several commenters note that managing Apache configs at scale is painful in modern environments.
  • Traefik is viewed by some as having poor configuration ergonomics but a useful web UI, which makes it popular with homelab users.
  • One thread praises Caddy’s directory listing and notes it can be customized via templates.

Maintainership, Burnout, and Funding

  • The original post (on the forum) is about spreading maintainership and turning off constant notifications; commenters are broadly supportive and empathetic about maintainer burnout.
  • There’s discussion about how free software maintainers should get paid: sponsorships, platform-level maintenance fees, vs. staying volunteer-based.
  • Core contributors say they are volunteers and prioritize funding the primary maintainer first; some suggest companies should sponsor more.

Trailing-dot Domain Bug Controversy

  • A recurring complaint is that Caddy fails to serve domains written with a trailing dot (fully qualified form).
  • Maintainers view this as an extremely niche issue, previously discussed in depth, and argue that changing low-level matching could risk subtle security bugs.
  • The way this complaint is raised again in the HN thread triggers a defensive reaction from maintainers, leading to a long meta-discussion about tone, perceived “grudges,” and how dismissing bug reports affects trust.
  • Some readers see the response as an overreaction and a red flag for maintainership culture; others defend the maintainers, emphasizing the emotional toll of repeated niche complaints and urging critics to contribute code instead of only raising the issue.

Cheap DIY solar fence design

Solar costs, tariffs & “market rate”

  • Several commenters report US panel prices around $0.25–0.30/W (e.g., pallets from distributors), while others note this is 3–6× higher than low-cost regions in Asia.
  • One link claims US tariffs on major producing countries often range from ~64% to >100%, with China much higher; some argue tariffs barely matter because panels are a small share of total system cost.
  • Overseas examples (India, SE Asia, parts of Europe) show much cheaper full systems and faster payback than typical US/UK installs, largely due to lower labor and softer costs.

DIY vs professional installation

  • Many say panels are <10% of installed cost; mounts, inverters, batteries, wiring, permitting, and electrician time dominate.
  • DIYers report big savings using surplus/used panels, generic aluminum or steel hardware, and doing all but final grid tie themselves.
  • Others describe bad experiences with sales-driven installers (ghosting, misleading incentives, upsells like bird mesh) and long ROIs.

Why vertical / fence-mounted solar?

  • Critics question non-optimally tilted panels and call the project “just a vertical array.”
  • Supporters argue:
    • Panels are now cheap; maximizing kWh per panel is less important than using otherwise-unused surfaces.
    • Vertical (especially bifacial) panels give more morning/evening and winter output, help with the “duck curve,” and shed snow better at high latitudes.
    • A fence has dual use (boundary + generation) and a smaller land footprint.
  • For bifacial fences: recommended patterns differ for N/S vs E/W runs (e.g., alternating orientation on E/W).

Mounting hardware & structural concerns

  • Mounts are costly due to wind/snow loads, variable roofs, anchoring, scaffolding, and labor; metal BOS costs haven’t fallen like modules.
  • Ground and fence mounts must handle frost heave, clay movement, and wood twisting; some use adjustable brackets or all-metal structures.
  • Cheap alternatives (pressure-treated posts, angle iron, or even loose-laid shed panels) are discussed; others warn about rare but catastrophic failures.

Electrical design & DC safety

  • Some advocate ultra-simple off-grid systems: skip MPPT, grid tie, big batteries, and even inverters by using 48V DC and DC appliances, plus behavioral shifts (daytime laundry, thermal storage).
  • A long subthread debates 48 VDC vs 120/240 VAC: tradeoffs in shock risk, arc faults, wire size, fire risk, and US code limits for “low-voltage” building wiring.

Regulation, labor & safety tradeoffs

  • Permitting and AHJ approval often require UL-listed components and recognized racking, which pushes people toward name-brand hardware.
  • One side blames licensing, localism, and immigration limits for high costs; the other side stresses that safety codes and labor protections exist due to historical injuries and deaths, especially for roof work and electrical hazards.

Practical issues: roofs, fences & environment

  • Roof systems can create severe bird/pigeon problems; retrofitting bird mesh/spikes is expensive but sometimes code-required (e.g., rodent guard in Canada).
  • Solar fences avoid roof leaks/birds but raise questions: setback rules, HOAs and aesthetics, vandalism if near public space, panel gaps at the bottom, and wood rot (mitigated with treated posts, gravel, and concrete).

Open questions from the thread

  • Commenters note the original post doesn’t detail:
    • Actual energy production of the fence.
    • Maximum height before bracing is needed.
    • Detailed snow-load behavior for similar fences in snowy climates.