Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 134 of 350

No I don't want to turn on Windows Backup with One Drive

Alternative backup mechanisms on Windows

  • Several commenters note built-in options that avoid OneDrive:
    • File History (to external drive or network share) for versioned user-file backups.
    • wbadmin and VHDX-based image backups for full-disk snapshots.
  • Others stress: these are convenience/versioning tools, not substitutes for proper offline/secondary backups.
  • Concern: turning File History on just to dismiss nags can waste disk space.

OneDrive behavior, data loss, and UX problems

  • Recurrent stories of:
    • Windows silently moving Desktop/Documents/Pictures into OneDrive.
    • Users assuming “it’s backed up” and then losing data when freeing space or disabling OneDrive.
    • Disabling/unlinking OneDrive deleting local files or breaking paths.
  • OneDrive is criticized as sync, not real backup. Sync happily propagates deletions and corruption.
  • Integration breaks workflows: games and apps dumping config/cache into Documents, PDFs exported to cloud copies that lag or fail to sync, Git repos mis-synced.
  • Some say OneDrive itself works fine for them; the real problem is forced enrollment and confusing defaults.

Dark patterns and consent

  • Strong dislike of dialogs offering only “Yes” and “Maybe later” / “Not now” with no “No, never”.
  • Complaints that repeated prompts are effectively harassment until the user mis-clicks.
  • Comparisons made to stalking behavior; calls for regulation requiring opt-in to be no easier than opt-out and for a permanent “don’t ask again” option.
  • Registry keys, Group Policy, and AppLocker can often suppress prompts, but are inaccessible to most users.

Comparisons with other platforms

  • Many argue macOS and iOS similarly nag for iCloud, Apple Music, etc.; others report minimal nagging if skipped at setup.
  • Android and Google Photos criticized for aggressive “turn on backup” popups.
  • ChromeOS praised for respecting the choice to disable Drive.
  • Some feel Apple is “less bad” because local accounts and optional iCloud still work; others say both vendors are equally hostile once online accounts are involved.

Coping strategies on Windows

  • Tactics mentioned:
    • Uninstalling OneDrive (though major upgrades may reinstall it).
    • Disabling OneDrive via notifications, Group Policy, AppLocker, debloat scripts, LTSC/IoT editions, or third‑party “shutup” tools.
    • Treating C:\ as disposable and keeping real data on separate partitions, external drives, or VMs with no network.

Linux / macOS as escape, and their limits

  • Many advocate switching to Linux (Mint, Fedora, Arch, atomic/immutable desktops, etc.) to avoid OS-level nagware and forced cloud integration.
  • Others push back: Linux has its own reliability, driver, gaming, and UX issues; macOS has nagging and lock‑in of its own.
  • Still, several anecdotes of non‑technical users voluntarily migrating to Linux because Windows hassles became intolerable.

Broader concerns

  • Frequent references to “enshittification,” monopolistic abuse, and weakened antitrust enforcement.
  • View that desktop OSes are being turned into ad and subscription platforms rather than neutral tools, with backups and “security” used as justification for more data capture and lock‑in.

Schleswig-Holstein completes migration to open source email

Article/site issues

  • Several readers report popups/redirects on the original site; others say it works fine with Firefox + uBlock or on mobile Chrome.
  • An archive.ph mirror is shared as a workaround.

What Schleswig-Holstein actually deployed

  • Rough scale: ~30k users, ~40k mailboxes, ~100M emails/calendar items migrated.
  • Backend: Open-Xchange groupware suite on top of Dovecot Pro (not Cyrus), with IMAP/SMTP/CalDAV/CardDAV; operated by Dataport, a state-owned IT provider.
  • Clients: primarily Open-Xchange web UI, plus Thunderbird and thousands of mobile devices.
  • Some emphasize Open-Xchange is a long‑standing, substantial Exchange‑like suite, not just “Postfix + IMAP” glued together.

Open-Xchange code and bot pressure

  • Source appears on a self‑hosted GitLab; the GitLab “explore” page is restricted, but direct project URLs work.
  • Restriction is attributed to aggressive crawling by bots (including AI scrapers); small self‑hosted repos reportedly get hammered with thousands of requests per second.

Email deliverability and the M365/Gmail duopoly

  • Concern that operating outside Microsoft/Google ecosystems makes deliverability harder, especially for smaller providers.
  • One MSP recounts Gmail silently refusing their corporate mail with no meaningful diagnostics or human contact; they pay a 3rd‑party relay just to reach Gmail.
  • Others counter that a government domain has leverage: if recipients don’t get state emails, that’s “their problem,” and most traffic is intra‑government anyway.
  • Hope that more government‑run email will pressure big providers to make blocklisting more transparent and appealable.

Digital sovereignty, security, and WhatsApp dependence

  • Strong support for governments moving off foreign, closed stacks: seen as reducing US tech and political leverage, and improving strategic autonomy.
  • Counterpoint: Europe still depends on US security guarantees; real autonomy would require higher military and economic costs.
  • Broader worry about national infrastructure running on foreign platforms (e.g., Latin America’s deep dependence on WhatsApp for tickets, healthcare, and government services).
    • One side calls this a national‑security risk and “soft power conquest.”
    • Another argues the core issue is governments choosing to make WhatsApp the only channel, not WhatsApp’s dominance per se.

Comparisons: other government moves

  • France’s “Suite numérique” and the German federal “openDesk” also use Open‑Xchange; seen as part of a wider European push.
  • Some regret this isn’t an EU‑wide platform; others argue multiple national projects are healthier and more resilient, with EU optionally offering a non‑mandatory reference stack.
  • Contrast with:
    • Dutch and Swedish tax authorities moving to Office 365/Azure; Dutch tax office reportedly budgets millions yearly for manual backups in case US access is cut.
    • Indian government migrating from Microsoft to Zoho (closed‑source but domestic); discussion about Zoho’s affordability, security track record, and lack of open‑source commitment.

FOSS vs proprietary, and realism of migrations

  • Many frame FOSS as the only sustainable path to digital sovereignty: inspectable code, no single‑vendor kill switch, easier to fork if a supplier is sanctioned or collapses.
  • Skeptics note:
    • Most major FOSS institutions and infra (e.g., Linux Foundation, GitHub) are US‑based and subject to US policy; GitHub sanctions already locked out some countries.
    • Corporates rely heavily on Excel macros and other Office‑specific features; breaking one critical sheet can outweigh license savings. Munich’s partial reversal is cited as a warning, though its backend reportedly stayed open‑source.
    • Europe has had decades and ample money to build its own stack but repeatedly doubled down on US clouds; some doubt this time will be different.

Funding and sustaining the ecosystem

  • Suggestions that public bodies migrating to FOSS should redirect a substantial fraction of former license spend (e.g., 50%) into upstream projects like Thunderbird/Mozilla.
  • Others propose contributing engineering time rather than (or in addition to) money.
  • Underlying concern: without strong, ongoing institutional support, critical FOSS components may stagnate, undermining the promise of sovereignty.

Outlook

  • Many expect more European administrations to follow, driven less by cost or “software freedom” rhetoric and more by concrete sovereignty and trust considerations.
  • Some argue sovereignty, not AI, will be the defining IT theme to 2030; FOSS is seen as the most plausible way for multiple blocs (EU, China, others) to share code without mutual political dependence.

Show HN: I built a simple ambient sound app with no ads or subscriptions

Ad-free ambient app reception

  • Many commenters praise a simple, free, ad‑free ambient sound app, contrasting it with noisy, subscription- and ad-heavy competitors.
  • People report immediately uninstalling existing apps and replacing them with this one; use cases include sleep while traveling, blocking noisy neighbors, kids’ sleep, and focused work.
  • The clean UI, background playback, and mixing capabilities get specific compliments; some say this recalls the “early App Store” era before aggressive monetization.
  • Several note that such an app can significantly improve quality of life for people with tinnitus, sleep issues, or general stress.

Sound quality and feature requests

  • Seamless looping is highlighted as crucial; the author confirms most effort went into eliminating gaps and clicks.
  • Requests include:
    • More granular and customizable sleep timers plus fade-out instead of abrupt stops.
    • Equalizer / more bass (e.g., for brown noise) and ability to save presets.
    • Longer and more varied thunder, more fire sounds, and “public space” murmur without startle noises.
    • Ability to add local MP3/own loops, and to play white noise on a separate audio track so it can overlay music.
    • HomePod support, binaural beats, an “About” page, and better support for accessibility settings.
  • Some users ask about sound sources; responses mention curated free libraries (Pixabay, etc.), with others suggesting Radio Aporee, freesound.org, and similar archives.

Comparison with built-in iOS and other tools

  • Multiple comments point out iOS/macOS “Background Sounds” (Accessibility → Audio & Visual), which provide basic rain/white noise but no mixing and limited controls.
  • Others recommend alternative apps and sites: myNoise, Atmosphere, ChromaDoze, Naturespace, Iceland White, rain.today, and various web-based generators.
  • A few argue you can just loop clips in a generic player or use YouTube/CLI tools, while others value curated sounds and UX.

App Store economics and platform constraints

  • Several developers lament Apple’s $99/year fee and required Mac hardware, saying this discourages hobbyist free apps and experimentation.
  • Search and ranking on the App Store are criticized for favoring spammy, monetized apps; even searching exact names may not surface the app first.
  • One dev shares killing a free calculator app due to fees and poor discoverability.
  • Some suggest PWAs or web apps as a way around Apple’s costs and restrictions.

Android / web versions and entitlement debate

  • Many ask for Android or GrapheneOS support, or a PWA; others push back, calling it entitled to expect a hobbyist to port a free iOS app to another platform.
  • Counterarguments say expressing preferences is fine and that cross-platform tools could increase impact; a meta-discussion emerges about how far it’s reasonable to “request more” from unpaid side projects.

Privacy, simplicity, and non-app alternatives

  • Commenters appreciate that the app collects no data and stays minimal.
  • Some prefer hardware noise generators (e.g., LectroFan) for their simplicity, lack of screens, and non-looped analog-like output, and use phone-based noise only when traveling.

Show HN: AI toy I worked on is in stores

Product context & initial reactions

  • Thread centers on an AI “Santa phone” toy sold at Walmart; the original link had redirect issues.
  • Many congratulate the creator and think it’s a clever, fun use of AI; several say seeing your code on a Walmart shelf is impressive.
  • Others say they’d rather DIY a similar thing with TTS/LLM APIs or local hardware, seeing it as a weekend project more than a product they’d buy.

Pricing, minutes & business model

  • Strong criticism of the model: ~$99 hardware with only 60 minutes included, then paid top‑ups (reports of ~$15 for 15 minutes).
  • People compare it to 1‑900 numbers and “enshittified” subscription toys, worrying about kids pestering parents for more minutes.
  • Some argue this effectively creates time‑limited e‑waste and may brick when servers or APIs shut down.
  • A minority defend the subscription as necessary to cover inference costs and say the terms are disclosed upfront.

Impact on children, play, and “Santa” expectations

  • Multiple commenters find it “unwholesome”: kids talking to a realistic simulacrum they may not understand is fake.
  • Others note we already have mall Santas and “Santa hotlines”, so this is just a new format for familiar roleplay.
  • Concerns about Santa promising gifts parents can’t deliver, raising expectations in a way letters don’t.
  • Some parents in the thread report positive experiences: collaborative play, prompt‑crafting with kids, and memorable recordings of children’s laughter.

Safety, moderation & misuse risks

  • Worries that LLMs are unpredictable with young kids: hallucinations, unsafe responses, or being jailbroken.
  • Broader fears that similar tech will be used for darker purposes: AI “phone sex”, fake dead relatives or deities, or voice‑cloning scams (“AI powered grandma scammers”).
  • Some see it as another step toward “Black Mirror” scenarios and manipulative parasocial products for children.

Data privacy, surveillance & trust

  • Repeated anxiety about children’s voices going to cloud providers and unknown third parties; one notes the toy’s privacy policy page was 404.
  • People highlight that this is a networked, always‑online, Chinese‑made device in homes at Christmas, potentially a “surveillance station.”

Technical feasibility & DIY / hacking angle

  • Discussion of whether a local‑only Santa LLM could run on small devices: some say you’d need large GPUs; others argue a small specialized model on a laptop or phone GPU is enough for kid‑level Santa chat.
  • Creator explains they did media/WebRTC code as a contractor; the ESP32 hardware can be modified but it’s nontrivial.
  • Several recommend skipping the product and building with ESP32, dev boards, or existing open‑source projects; links to embedded voice‑AI repos are shared.

Broader AI culture & “luddite” debate

  • One thread debates whether AI toys are just the next step after electronic toys/LEGO Mindstorms, or a qualitatively worse, extractive, manipulative medium.
  • Some express deep pessimism about AI’s societal trajectory (loss of authentic human interaction, e‑waste, kids primed for AI companion apps); others see enormous upside (personal tutors, creative exploration) and view the backlash as fear‑driven.

Jeep pushed software update that bricked all 2024 Wrangler 4xe models

Incident and Evidence

  • Multiple owners report 2024 Wrangler 4xe vehicles losing all motive power shortly after an OTA update, often while driving.
  • Symptoms: repeated stalling, forced restart prompts (“shift to Park and press brake + start”), flashing gear indicators, warning lights, shifter stuck in Park.
  • Forum and Reddit posts describe highway shutdowns, including near-crashes and vehicles stranded in construction zones.
  • Jeep/Stellantis has acknowledged the issue and claims to have pushed a silent fix, offering to “assist” with towing/diagnostic costs, though this language is viewed as weak.

Failure Mode and Safety Risks

  • The most chilling reports describe losing acceleration first, then power steering and power brakes within ~30 seconds; if this happens at highway speeds or in narrow lanes, commenters see real fatality risk.
  • Debate over how serious loss of power steering is at speed; consensus that sudden loss of propulsion in traffic is far more dangerous.

OTA Updates and System Architecture

  • The triggering update was reportedly for the infotainment/telematics system, but it still managed to affect powertrain behavior.
  • Many argue infotainment must be strictly isolated from safety-critical ECUs; that such coupling is a fundamental design failure.
  • Others note that modern cars intentionally interconnect systems via CAN, so a buggy or chatty infotainment node can disrupt critical modules.
  • Some defend OTA for safety/security fixes but insist updates must be: opt‑in, applied only while parked, with A/B firmware, robust rollback, and heavy QA.

User Control, Privacy, and Remote Disablement

  • Strong concern about cars that can be remotely updated or shut down, framed as a threat to personal safety and freedom (from fleeing war/hurricanes to cyberwar scenarios).
  • Several owners plan to pull or switch fuses to disable modems/telematics; EU eCall rules may make this illegal in some countries.
  • Frustration that disabling telemetry is hard or buried, and that opting out often triggers constant nags.

Avoidance of “Smart” Cars

  • Many say they intentionally buy older or simpler vehicles (circa ~2010, mechanical diesels, or non-connected models) to avoid OTA risk and surveillance.
  • Others want “dumb EVs”: electric drivetrains but no networking, no forced updates, minimal modes and touchscreens.

Responsibility, Regulation, and Language

  • Calls for NHTSA and similar bodies to investigate, mandate separation of infotainment and powertrain, and restrict in‑motion updates.
  • Some reference automotive safety coding standards (MISRA, AUTOSAR) and note these often don’t cover infotainment, which is now de facto safety‑critical.
  • Debate over whether “bricked” is appropriate; critics prefer terms like “catastrophic but recoverable,” but others argue from the user’s perspective the car was effectively a brick until the fix.

How to Enter a City Like a King

Biblical allusion and models of kingship

  • The “enter like a king” line is read as an allusion to Jesus entering Jerusalem on a donkey: humility, service over dominance.
  • Some note that such humility didn’t “work” politically—he was killed soon after—raising why later rulers didn’t copy the model.
  • A side debate erupts over the historical Jesus: one commenter asserts an armed, revolutionary Jesus; others strongly contest this as poorly sourced and historically unsupported.

Risk and mortality of monarchs

  • Multiple comments stress how dangerous kingship historically was.
  • Roman emperors and European monarchs are cited as having high rates of violent or “bloody” deaths (assassination, battle, execution).
  • A Shakespeare passage is quoted to illustrate the fragility and illusion of royal power.

Republicanism and rejecting royal trappings

  • George Washington is cited as a counter‑model: declining a crown, rejecting hereditary rule, and setting a two‑term norm.
  • There is factual pushback about whether he consistently refused the title “Your Excellency”; the correction itself is then corrected, highlighting how easily myths form around “anti‑kingly” figures.

Succession, cities, and social structure

  • One commenter asks about literature on adding powerful individuals to groups or cities; another replies this particular historical case was simple succession after a monarch’s death.
  • Discussion notes that under hereditary nobility, “wealth” attaches to families/dynasties, making mobility and structural change difficult.
  • A brief joke references the failed Gunpowder Plot as evidence not “everyone” celebrated the new king.

Labor, “frivolity,” and economic complexity

  • A long subthread reflects on how much human labor is devoted to non‑essential or “frivolous” work now vs. the past (e.g., coronation spectacles vs. marketing and ads).
  • Several argue we can’t reliably separate “useful” from “frivolous” ex ante: seemingly pointless work (advertising, flower arranging, entertainment) is deeply entangled with investment, risk‑taking, and innovation.
  • Others emphasize how modern energy use and technology mean each person effectively commands many “human equivalents” of work, enabling most of us to do non‑survival tasks.

Advertising, socialism, and waste

  • Disagreement over advertising’s economic share and value:
    • One view: advertising consumes a huge chunk of GDP and mostly makes life worse.
    • Others: raw ad spend is small as a percentage of GDP; broader “ad‑driven” activity figures are mostly reallocation, not net new output.
    • There’s also a defense that ads are how people learn what products exist, countered by complaints that most ads convey no useful information.
  • Socialist systems with single brands are cited as saving on advertising but losing productivity and competitiveness, with a few exceptions (e.g., certain weapons, specialized goods).

Freedom, needs, and purpose

  • Debate over how much labor must go to bare survival (food, energy, medicine, logistics) vs. “nonsense.”
  • Some say almost all of us do non‑survival work; others stress complex supply chains, health systems, and technology blur the line.
  • A recurring theme: people want more than food and shelter—they want freedom, struggle, and self‑direction. Being merely “kept” is seen as demeaning by some, though others object that this isn’t universal.
  • Several comments veer into existential territory:
    • Is everything “bullshit” absent a higher purpose?
    • One side leans toward radical skepticism; another argues we can still construct and refine shared values (growth, learning, exploration).

Culture, leisure, and consumerism

  • A substantial reflection contrasts earlier cultures that devoted surplus labor to cathedrals, monuments, and festivals with today’s “consumerist culture.”
  • Argument: true culture arises from leisure understood as non‑instrumental, contemplative, or celebratory activity, not mere recreation or entertainment.
  • Modern society is described as “total work”: we work to work, with no widely shared transcendent aim; this allegedly hollows out art, architecture, and public life, creating boredom and distraction instead of heroism or lasting achievements.

Productivity, freedom, and the role of the state

  • One stance: the most productive societies maximize individual freedom; heavy regimentation and taxation reduce productivity.
  • Counterpoint: productivity is not equivalent to health, beauty, justice, or happiness; “work for work’s sake” is empty.
  • Some suggest the right question isn’t to ban “frivolous” pursuits but to ensure government robustly funds the commons—care for the vulnerable, monuments, environmental protection—so a society can sustain both serious public goods and private frivolity.

Ritual, architecture, and dignity

  • Light tangents note ceremonial limits on British monarchy (ritual “asking permission” to enter Parliament) as a symbolic check on royal authority.
  • A quote about old Penn Station vs. modern replacements is used to argue that architecture expresses how much a culture values human dignity; ugly, cramped spaces are seen as treating people “like rats,” revealing a diminished view of citizens.

KDE Connect: Enabling communication between all your devices

Cross‑platform scope and desktop environments

  • Works on Linux/Plasma, other Linux DEs (via KDE Connect package, GSConnect, Valent), Windows, macOS, Steam Deck, even some VR devices; no KDE desktop required.
  • Branding confuses people into thinking it’s KDE‑only; several say it runs fine on i3, XFCE, GNOME, etc.
  • Some distros preinstall it with KDE; others don’t, which frustrates people expecting out‑of‑the‑box availability.

Networking model, discovery, and VPNs

  • Primarily designed for local‑network use; also supports Bluetooth.
  • Uses multicast/broadcast (described as its own mDNS‑like mechanism) for discovery, so:
    • Breaks across subnets, many VPNs (WireGuard, Tailscale), and “AP isolation” Wi‑Fi setups unless you configure routing or manually add IPs.
    • Some report WireGuard / multi‑interface bugs tracked in KDE’s bug tracker.
  • WAN use is possible only with VPNs or manual port forwarding + static IPs; no relay/coordination server exists, though some wish for a self‑hosted one.

Reliability: split opinions

  • Many describe it as “rock solid” for years between multiple Linux machines and Android phones, especially on simple single‑subnet home networks.
  • Others see it as unreliable or regressed:
    • Devices on same Wi‑Fi often don’t see each other, require manual refresh, unpair/repair, or even watchdog scripts restarting the daemon.
    • File transfers fail mid‑way; desktop–desktop and Windows setups are singled out as especially flaky.
    • Some compare it unfavorably to LocalSend/AirDrop for pure file transfer.

Platform‑specific behavior

  • Android: generally best experience; deep integration (notifications, media control, remote input, clipboard). Some battery impact from aggressive keep‑alives was reported and later patched.
  • iOS: heavily constrained. App must be foregrounded; background notifications, SMS integration, and iMessage‑style workflows effectively don’t work. Several users call it “basically non‑functional.”
  • Windows: works for some, but others report frequent discovery/connectivity problems and give up on daily use.
  • macOS: exists and can work (e.g., with Steam Deck), but not as polished as Linux/Android.

Features people value

  • Shared clipboard between phone and desktop, including passwords and long messages.
  • Fast local file transfers and mounting phone storage.
  • Notification mirroring, SMS texting from desktop (where supported), media playback control (including pausing videos on calls), “ping” and device‑find, remote keyboard/mouse/gyro‑mouse, and Steam Deck integration.
  • Viewed by many as an open‑source analogue to Apple’s Continuity/AirDrop/Universal Clipboard.

Alternatives and complementary tools

  • For ongoing sync / large hierarchies: commenters recommend Syncthing or rsync/SSH instead of KDE Connect.
  • For simple cross‑device file transfer: LocalSend, PairDrop, SSHFS, Samba, and various mobile file‑transfer apps are mentioned.
  • Some combine KDE Connect with VPNs (WireGuard, Tailscale, Zerotier) for remote operation, with varying success.

Usability, UX, and resource issues

  • Common annoyances:
    • Phone sometimes not auto‑connecting; user must open the app to re‑establish the link.
    • SMS UI on desktop is laggy, slow to sync history/contacts, visually rough, and missing image display.
    • One‑directional behavior (e.g., only phone→PC works), silent file transfers on Android, and surprising filename changes (.tif→.tiff) in at least one case.
  • Android “quit” semantics cause confusion; some want a clear way to fully exit, others note that’s against typical Android design.

Security and configuration concerns

  • One commenter claims default configuration enables sidestepping 2FA and sideloading apps without permission but doesn’t provide details; others ask for elaboration.
  • Discovery’s dependence on multicast/broadcast raises worries about information leakage on complex or shared networks.
  • Firewalls, Wi‑Fi isolation, and buggy Wi‑Fi drivers frequently interfere; users stress the need to adjust firewall profiles (e.g., Windows “public” vs “private” network) and understand local networking to get reliable behavior.

Quantification of fibrinaloid clots in plasma from pediatric Long COVID patients

Understanding Long COVID: definition, prevalence, and diagnosis

  • Several comments note that Long COVID remains poorly defined: symptom lists are broad (fatigue, headaches, aches, brain fog) and overlap with common complaints in healthy people or with other conditions (e.g. menopause, “unhealthy living,” chronic fatigue, fibromyalgia).
  • One side argues there is now a clear clinical construct, substantial literature, and very real disability; they emphasize underdiagnosis, doctors dismissing complaints, and mislabeling as anxiety, burnout, or depression.
  • Skeptical voices argue that prevalence estimates are all over the map (from a few percent to >30%), that studies often mix mild, transient symptoms with serious chronic illness, and that 1-in-5 children or adults with persistent symptoms seems implausible.
  • Several anecdotes describe significant long-term impacts (cardiac issues, pulmonary decline in competitive athletes, neuropathy, cognitive issues) that would have been missed without close performance tracking.

Interpretation of the microclot study and the “94%” number

  • The original post/title led some to think the device was “94% accurate” at diagnosing Long COVID; closer reading shows the 0.94 figure is the area under the ROC curve for distinguishing LC vs controls using microclot counts.
  • Commenters explain that AUC ~0.94 is “outstanding” discrimination, but on a tiny sample (45 LC, 14 controls). The paper itself treats this as preliminary and calls for larger studies.
  • There is debate over the casual use of “accuracy” without specifying sensitivity/specificity, and warnings that an impressive single number is meaningless without prevalence context.
  • Some label the work “junk science” due to small N; others frame it as a legitimate exploratory pilot.

Infection vs vaccination as source of microclots / long-term harm

  • A subset argues that spike-protein–induced microclots could arise from both infection and mRNA vaccination, and criticizes the study for not stratifying by vaccination status.
  • Others push back that this line quickly shades into anti-vaccine rhetoric, and note that available work (as they recall it) generally finds vaccine harms to be much rarer and milder than harms from infection.
  • There is no consensus in the thread on how well current research distinguishes post-infection vs post-vaccination syndromes, only agreement that more targeted studies are needed.

Side discussion: bloodletting, plasmapheresis, and “oil changes”

  • One commenter reports subjective energy improvement after blood donation and cites small studies showing metabolic benefits from iron reduction.
  • This leads to debate about mechanisms (iron, PFAS or toxin removal, hormonal confounders in menstruation) and the lack of outcome data linking regular phlebotomy to better health or longevity.
  • Modern therapeutic plasmapheresis is mentioned as an established treatment for some autoimmune and other conditions, and speculative for Long COVID and aging, but evidence remains limited.

Why Long COVID may be under- or over-counted

  • Under-count arguments: many patients don’t know to seek a Long COVID diagnosis; symptoms may be subtle (e.g. 10% drop in performance), or get reclassified as other conditions. Stigma and medical dismissal also reduce reporting.
  • Over-count arguments: given that nearly everyone has had COVID, it’s easy to blame coincident health changes (aging, menopause, other diseases) on infection; broad symptom baskets and heterogeneous study methods inflate prevalence.
  • Several participants conclude Long COVID is likely a spectrum—from silent or mild organ damage to severe disability—with incidence and severity still uncertain.

The reason GCC is not a library (2000)

GCC vs LLVM and licensing dynamics

  • Several comments link LLVM’s rise to its permissive license, contrasting it with GCC’s GPLv3 (especially the patent clause).
  • Commercial vendors are described as wary of GPLv3, preferring to avoid any obligation to open proprietary compiler modifications.
  • One view: in a world without LLVM, companies that dislike the GPL would have developed their own non-GCC toolchains anyway; LLVM didn’t “cause” their avoidance, it just provided an easier path.
  • Others argue that LLVM’s licensing plus its modular, library-like design made it the obvious choice for new languages (Rust, Julia, Crystal) and custom tooling.
  • There’s broad agreement that today both GCC and LLVM emit similarly optimized code; LLVM is seen as the innovation playground, GCC as the entrenched workhorse (especially in embedded and Linux).

Missed LLVM–GCC integration and communication/governance

  • A key historical episode: an early proposal to integrate LLVM into GCC reportedly went unnoticed due to an email mishap; years later, the missed opportunity was publicly regretted.
  • This sparks debate over mailing lists vs alternatives.
    • Pro-mailing list arguments: open, searchable, stable for decades, better than Slack/Discord for serious, long-lived projects.
    • Critics highlight that important messages can still be missed and see governance failure when no one else picks up dropped threads.
  • Chat systems are criticized for poor archivability and “hidden” threaded conversations; forums and Discourse-style systems get praise as a middle ground.

FSF philosophy and effectiveness

  • One camp defends the FSF focus on “freedom for end users,” even if that restricts what developers and companies can do with the code.
  • Critics argue this purity hampers adoption and undermines the stated goal of empowering users, contrasting FSF-style copyleft with the broader “open source” movement.
  • There’s disagreement over how much credit FSF deserves for today’s free tools: some see GPL as a huge success; others say modern open source took off largely independently.

Complexity, C++ in GCC, and “lean” freedom

  • A minority of commenters see rewriting GCC in C++ as a serious mistake that harms “lean” free software and makes meaningful user contribution harder.
  • Others acknowledge rising complexity but consider talk of “apocalypse” exaggerated; GCC is still viewed as relatively approachable compared to the overall industry trend toward bloated toolchains.
  • Some idealize extremely lean stacks (simple C compilers or even direct RISC‑V assembly) as the only path to truly auditable, user-controlled systems.

libgccjit and alternatives

  • libgccjit is noted as a late-arriving GCC backend-as-library, used notably by Emacs and a few other tools.
  • Its existence shows GCC can be used in a more LLVM-like, embeddable way, though commenters are unsure how widely it is actually adopted.

Why Wikipedia cannot claim the Earth is not flat

Role of Wikipedia vs. Fringe Beliefs

  • Several comments stress that Wikipedia is a tertiary reference, not a debate forum or a protector of society from bad ideas. Its job is to mirror “accepted knowledge” from reputable sources, not to arbitrate ultimate truth.
  • Others argue that giving any platform to thoroughly debunked ideas (like flat earth) risks legitimizing them, and that some claims are so disproven they should simply be excluded or very explicitly labeled as false.
  • Some see value in neutral summaries of fringe beliefs (e.g., flat earth) so readers can understand the phenomenon without advocacy, and worry about a paternalistic “protect the gullible” stance.

Fringe Beliefs, Progress, and Evidence

  • There is extended debate over “all progress starts as a fringe belief”:
    • Critics say this is logically and empirically wrong; many advances are obvious or evidence-backed from the start, whereas fringe beliefs typically lack evidence.
    • Others note that some once-fringe ideas later turned out partly true, but truth-seeking and delusion are tightly intertwined.
  • Disagreement over definitions of “fringe” and “evidence,” with examples like caloric theory used to argue for epistemic humility and the provisional nature of scientific models.

Policies, Bias, and Citogenesis

  • Some argue Wikipedia’s sourcing rules are “good enough” and have produced an extraordinarily useful reference; others highlight vulnerabilities:
    • Citogenesis/circular reporting, where false claims seeded outside Wikipedia are then cited back in.
    • Low-quality sources and blogs sometimes accepted in practice despite policies.
  • Discussion of WP:BIASED and reliability lists: critics claim systemic ideological skew (e.g., conservative outlets rated less reliable than some state- or faction-aligned media).

Gaza/Israel Example and Political Controversies

  • The renaming and framing of the Gaza conflict (e.g., “genocide”) is used as a case study:
    • One side says Wikipedia simply followed evolving legal and scholarly consensus.
    • Others see mainstream media bias, which Wikipedia then mirrors by design.
  • There are conflicting narratives about coordinated editing: some describe large-scale pro-Israel propaganda efforts; others claim pro-Palestinian campaigns and note bans on multiple editors from that side.
  • Underlying tension: being “reality-focused” can appear politically one-sided when factions diverge sharply from facts.

Asymmetry of Nonsense vs. Refutation

  • Multiple comments emphasize Brandolini’s law: it is cheap to produce baseless arguments and very expensive to refute them rigorously.
  • This fuels pessimism about public discourse and fears of regression toward superstition and zealotry, especially in an age with fewer immediate “reality checks” for bad beliefs.

The App Store was always authoritarian

Device ownership, right to repair, and platform control

  • Several comments argue that once a device is sold, the manufacturer should lose the right to dictate what software runs on it; anything else is framed as an ownership violation.
  • Others push back by asking about ongoing responsibilities like safety, liability, and warranties, implying some post-sale control might be justified.
  • Some see this as part of a broader right-to-repair / market-power issue, suggesting either legal limits on vendor control or on market share.

Security, paternalism, and user competence

  • One side claims “the internet was fine before app stores,” arguing users should be allowed to make mistakes and learn, as with driving.
  • Opponents cite major incidents (e.g., Maersk malware, scammy “ChatGPT” clones) to argue that centralized curation meaningfully protects non-technical users.
  • There’s a recurring claim that most people are not equipped to detect malware, and that “protective” platforms will outcompete more permissive ones.
  • Others counter that this is paternalism that trades user freedom for small conveniences and creates dangerous central points of control.

Web vs native apps and browser gatekeeping

  • Some reject the idea that the web should be the primary computing platform, arguing many tasks are better served by native apps and curated stores, just as Linux distros do.
  • Critics note that centralization is only acceptable if stores are optional and not controlled solely by the OS vendor.
  • Multiple comments blame Apple for deliberately hobbling PWAs and web standards to protect App Store revenue; WebAssembly is raised as an underused alternative.
  • A nostalgia thread prefers the 1990s model of native apps plus open protocols, relegating the web to documents/hypermedia.

App stores, censorship, and authoritarian alignment

  • Commenters emphasize that centralized app stores are highly convenient tools for authoritarian governments; both Apple and Google routinely honor state takedown demands.
  • Apple’s own transparency numbers (≈1,700 government-driven removals/year, on top of ~2M rejections and ~80k internal removals) are used to show the scale of gatekeeping.
  • Some see this power as “mostly” beneficial (blocking harmful apps) with some abuse; others compare it to banning printing presses because they can print dissent.
  • “Software is speech” comes up, with the point that even if platforms have editorial rights, the speech stakes and potential for political abuse are very high.

Android vs iOS, alternative stores, and lived experience

  • Several developers describe iOS as uniquely hostile and slow to publish for, compared with web and Android.
  • Others report Android’s openness leading to worse scam/noise experiences, especially via third-party app stores and OEM intermediaries.
  • Some argue the right solution is multiple vetted and community stores, or “advanced user” modes, rather than a single dictatorial gatekeeper or total anarchy.

Scale, corporate power, and political context

  • There’s debate over whether large firms have special duties “as a function of scale,” with some holding Apple to higher standards due to its ecosystem reach.
  • Comparisons are made between Apple’s 30% cut and state taxation, portraying Apple as a quasi-state with flat revenue tax and power to erase businesses overnight.
  • Broader pessimism appears about governments meaningfully reining in these platforms, given regulatory capture and rising authoritarian tendencies.

Three ways formally verified code can go wrong in practice

Scope of Formal Verification vs. Hardware Reality

  • Multiple comments stress that software proofs don’t eliminate hardware failures: RAM bit flips, CPU misbranches, and other soft errors still occur.
  • Formal methods can be applied to hardware too (e.g., ECC RAM designs), but they still rely on probabilistic assumptions about error rates, not absolute guarantees.
  • Safety‑critical systems use redundancy (lockstep processors, TMR, multiple independent controllers, spatial/orientation separation of computers) to tolerate faults not modeled at the software level.
  • There’s pushback against modeling “cosmic‑ray GOTO after every statement” in software; you must draw a line on what’s assumed vs. mitigated by hardware/redundancy.

Assumptions, Assertions, and Runtime Checking

  • Debate over whether formally verified code should assert its assumptions at runtime.
  • Objections:
    • Crashing on violated assumptions is often exactly what the verification aimed to avoid.
    • Many assumptions (correct compiler, no data races, correct hardware, no OS interference) are not checkable in code.
    • Checking some assumptions (e.g., array sortedness before binary search) is prohibitively expensive.
  • Clarification around “assert” vs. “verify”:
    • “Verify” = actually check (possibly expensive).
    • “Assert” = state as true, maybe checked, maybe not; in many languages, it’s just “crash if false,” sometimes even compiled out.
  • C/C++ example: signed overflow is undefined behavior, so compilers may optimize away explicit overflow checks, undermining naive use of asserts.
  • Some advocate partial/cheap checks (sanity checks, invariants, bounds checks) or logging instead of crashing, especially when full proofs are absent.

Verification vs. Validation and Environment Modeling

  • Recurrent distinction:
    • Verification: “Are we building it right?” (meets spec).
    • Validation: “Are we building the right thing?” (meets real‑world needs/requirements).
  • Others use “verification” for formal proofs and “validation” for empirical/testing‑based assurance.
  • Several note that many interesting properties depend on the environment (OS, hardware, user behavior). Fully formalizing that environment is viewed as practically impossible.
  • One thread pushes an epistemological view: all testing is a form of formal method with implicit assumptions; formal verification just makes those assumptions explicit.
  • Neural‑network‑based definitions (e.g., “rose detector”) are proposed as a way to formalize fuzzy goals; critics argue this just moves uncertainty into the NN and cannot be fully proved.

Practical Value and Limits of Formal Methods

  • Commenters describe domains (finance, legal workflows, safety‑critical control) where errors are extremely costly, motivating proofs for selected components.
  • Others emphasize diminishing returns: use proofs for critical invariants, strong typing and assertions elsewhere, and accept residual risk.
  • Wrong or incomplete specs (e.g., ignoring integer overflow in a “proved correct” algorithm) are highlighted as a core failure mode not solved by the tooling itself.

A 4k-Room Text Adventure Written by One Human in QBasic No AI

Marketing language and “No AI” positioning

  • Opening blurb is widely read as PR-like and even “AI-sounding,” which some find incongruous for a forum reply.
  • The “written by one human, no AI” angle is seen by some as a genuine selling point; others view “No AI” as an emerging marketing gimmick similar to “organic” or “handmade.”
  • Several expect “No AI” / “hand-coded” labels to become a premium or “slow programming” badge, though opinions differ on whether that will matter long-term.

Scope, craftsmanship, and actual game quality

  • The claim that this is the “first” open-world-style modern text adventure by one person is challenged as exaggerated; people cite many existing one-author text adventures.
  • Inspection of the rooms.txt file leads some to argue “handcrafted” is oversold: many rooms are brief, one-or-few-sentence vignettes with limited interactivity.
  • Others counter that even a few thousand such sentences is substantial work, and that “handcrafted” doesn’t imply length, only origin.
  • Multiple commenters say they found the gameplay mostly linear text with minimal interaction and stopped quickly.

Human vs AI creativity debate

  • One thread argues current human-produced work is still generally higher quality than AI output; another pushes back that judging by source (human vs AI) rather than result mirrors prejudicial reasoning.
  • The discussion escalates into broader arguments about meritocracy, consumer discrimination by origin (e.g., fair trade, fast fashion), and whether using AI for most of a work still counts as “creation.”
  • Some insist they simply don’t want AI-generated art; others say “human-made” alone doesn’t entitle work to an audience—quality should dominate.

Nostalgia and early programming experiences

  • Many share memories of writing BASIC text adventures or tiny games on early home computers, wrestling with GOTOs, line numbers, and lack of storage.
  • These anecdotes underline how simple text adventures are an accessible first project and how much personal satisfaction comes from sharing something you coded yourself.

Technical details and platform issues

  • Despite “QBasic” branding, the game targets QB64, not real DOS QBasic; this breaks DOSBox expectations and complicates Mac/Linux play.
  • System requirements (e.g., 512MB RAM) are attributed to modern OS/QB64 overhead and loading all room text into memory, not to the inherent demands of the game.

Room counts and comparisons

  • Commenters note older text adventures and MUDs with far more rooms (often via mazes or collaborative building), suggesting room count alone doesn’t indicate depth or quality.

China's New Rare Earth and Magnet Restrictions Threaten US Defense Supply Chains

Threat vs. Vulnerability

  • Debate over semantics: dependency on a rival is both a threat (intent/capability) and a vulnerability (exploitable weakness).
  • Some argue China was not “always” a threat; others say this risk has been known for a decade+.

Rare Earth Supply Chain Reality

  • Key steps outlined: mining, beneficiation, separation, smelting/magnet making. China holds dominant capacity especially in separation and magnets.
  • U.S. mine(s) exist but often shipped ore to China for refining; limited pilot-scale separation and modest magnet capacity domestically.
  • Price volatility and past gluts bankrupted producers, discouraging investment; politics now amplifies volatility.

Defense vs. Civilian Demand

  • Skepticism that defense volumes are large versus EVs/consumer goods. Others note certain high-spec magnets and heavy REEs have near-100% China dependence.
  • Conflicting claims: reported multi-hundred to multi-thousand pounds of REEs per platform vs. suggestions those figures conflate alloys/trace additives.

Feasibility and Timelines

  • Split views: “years to a decade+” to rebuild refining/magnet capacity vs. “months if treated as national security” invoking WWII/fast-tracks.
  • Obstacles cited: EPA/OSHA/zoning/NIMBY layers and lawsuits; counterpoint that urgent national security can override and accelerate.
  • Examples used both ways (rapid bridge repair vs. slow major programs; fracking took decades vs. REE tech is known).

Environmental and Process Constraints

  • REEs are abundant but extremely dilute; separation is chemically intensive, producing toxic/radioactive waste.
  • Activism/regulation blamed for blocking domestic mining; others defend environmental limits and note the U.S. exported the externalities to China.
  • Important nuance: many critical elements are byproducts of primary ores; without primary processing onshore, byproduct access is lost.

Geopolitics and Strategy

  • Some welcome “forcing the hand” to de-risk and distribute production among allies; others doubt U.S. capacity or ally cohesion/soft power.
  • Taiwan/Ukraine debates: deterrence vs. overreach; blockade scenarios raised; uncertainty on U.S. willingness/ability to sustain attrition.

Workarounds and Enforcement

  • Expect intermediaries/black markets to leak supply, but with higher costs and uncertain reliability.
  • Claims China’s new controls mirror “foreign direct product rule” logic, complicating indirect sourcing.

Policy Responsibility and Tariffs

  • Outsourcing attributed to Wall Street/free-trade orthodoxy across parties; others see recent tariffs as a sharp departure.
  • Calls for tariffs and onshoring countered by concerns over global retaliation and higher costs.

China's New Rare Earth and Magnet Restrictions Threaten US Defense Supply Chains

Threat vs. Vulnerability, and Strategic Dependence

  • Commenters argue that relying on a rival for critical military inputs is already a severe vulnerability, whether or not it is called a “threat.”
  • Some debate the definition: vulnerability = weakness/opportunity; threat = intent + capability to exploit it. Others see this as semantic hair-splitting.

Trade War, Tariffs, and Responsibility

  • Many see current tensions as fallout from US-initiated tariff and export-control escalation; others say the US was always likely to “lose” a trade war given China’s manufacturing and resource dominance.
  • Blame is spread across decades: offshoring driven by Wall Street, both major US parties’ free-trade orthodoxy, and short-term profit-seeking elites.
  • Some argue tariffs mark a break with neoliberalism; others insist both parties still align on core economic/foreign-policy interests.

Rare Earth Supply Chain Basics

  • Multiple comments detail four stages: mining, beneficiation, separation, and smelting/magnet-making.
  • China controls most separation and magnet capacity; even non-Chinese ore (e.g., US mines) typically gets refined in China.
  • Rare earths themselves aren’t geologically rare, but are dilute, often secondary/tertiary byproducts; economic extraction and processing at scale are the bottlenecks.

How Big Is the Defense Problem?

  • Skeptics note military usage is tiny compared with EVs and consumer products and question scare claims (e.g., hundreds or thousands of pounds per platform).
  • Others stress that certain high-performance magnets/alloys may be effectively 100% China-dependent, and a missing “small, cheap” part can halt system production.
  • Several suggest consumer/EV sectors face a larger immediate shock than the military, which can prioritize supply or work via intermediaries.

Can the US Rebuild Capacity?

  • Opinions diverge sharply on timelines: “5–10+ years” vs. “months/years if treated like WWII-level national priority.”
  • Obstacles cited: price volatility, prior bankruptcies, entrenched environmental and zoning rules, NIMBY politics, and loss of manufacturing know-how.
  • Counterpoint: the US still has major mining expertise and could ramp if it relaxed constraints and asserted national-security urgency.

Environment, Activism, and Offshoring

  • Rare-earth processing is described as extremely dirty: huge tailings volumes, toxic and sometimes radioactive waste, large leaching ponds.
  • One side blames “cynical” or absolutist environmental activism and regulatory layering for making US production infeasible and exporting pollution and strategic control to China.
  • Others defend environmental protections and admit “not in my backyard” preferences, while acknowledging any loosening will create new local losers.

Geopolitics: China, Taiwan, Allies, and Power Shifts

  • Some see China’s move as rational leverage in response to US chip controls and long-arm jurisdiction, possibly also tied to EV competition and trade negotiations.
  • There is extensive debate over whether US strength deters wars (Taiwan, Eastern Europe) or whether US assertion itself produces conflicts.
  • Several participants argue US soft power and trust among allies have eroded sharply, limiting its ability to coordinate a unified response.
  • Others emphasize that no country has permanent “allies,” only interests, and expect partners to realign once China exerts more military pressure.

Broader Systemic and Ideological Reflections

  • Some say this marks “beginning of the end” of US hegemony, with an economy skewed to weapons, AI datacenters, and finance while basic needs strain affordability.
  • Others counter that the US still has vast manufacturing output; the deeper issue is fragile, import-dependent supply chains.
  • There is pessimism that globalization is reversing and that both China and the US have become untrustworthy counterparties, pushing the world toward blocs and redundancy.

Meta and Miscellaneous

  • One commenter posts an AI-generated “analysis” of the situation, prompting criticism that dumping unfiltered AI output adds little value.
  • Another thread notes this is China’s first explicit “foreign direct product”–style control and suggests it is also a symbolic challenge to US-style extraterritorial sanctions.

Show HN: Rift – A tiling window manager for macOS

Rift vs Other macOS Tiling WMs

  • Rift is described as “Aerospace but in yabai style”:
    • Like Aerospace, it uses virtual workspaces all within a single macOS Space, avoiding Apple’s Spaces quirks and SIP-disabling hacks.
    • Like yabai, it leans on low‑level/private APIs with a strong focus on performance.
  • Users report Rift feels “ridiculously fast” and unusually “just works” without Accessibility prompts.
  • One monitor/Space gets its own independent virtual workspace manager, mirroring multi-screen behavior some miss from Linux WMs.
  • Comparison with Aerospace: if you’re already happy with Aerospace’s performance, it’s unclear what extra Rift offers beyond implementation style and potential performance headroom.

Tabs, Layout Styles, and Feature Gaps

  • macOS native tabs (Finder, Ghostty, etc.) are a known pain point:
    • Rift currently misbehaves in some tab scenarios (e.g., closing Finder tabs making a neighbor window expand incorrectly).
    • The OS exposes very limited tab events, making robust handling hard. Aerospace is said to be planning improvements here.
  • Niri-/PaperWM-style scrolling layouts are requested; Rift’s author says it’s possible but doesn’t fit well with its current layout model.

Private APIs and Long‑Term Stability

  • Rift explicitly uses private APIs reverse‑engineered by yabai and others.
  • One side argues these are core, longstanding AppKit internals and unlikely to change, especially since Rift avoids the fragile “move between Spaces” hacks that broke yabai.
  • The opposing view: any private API use is inherently risky; Apple has a history of breaking such things, leading to stressful OS upgrade cycles. Some suggest avoiding entire categories of apps that rely on private APIs.

Installation, Rust Nightly, and Nix

  • Building Rift requires Rust nightly; several users hit #![feature] errors on stable.
  • Confusion arises from mixing Homebrew’s rustup with the official installer; when installed via the official script and rustup toolchain install nightly, builds succeed.
  • A Nix flake package is shared for Nix users.

Keyboard Workflows and Shortcut Conflicts

  • Heavy keyboard users discuss complex setups with Karabiner:
    • Caps Lock mapped to “hyper”/“meh” keys, then layered with hjkl for moving focus, moving windows, and changing workspaces.
    • Aerospace users often hide everything behind a “leader” key (e.g., alt+space) to avoid shortcut conflicts.
  • Others find Aerospace’s defaults hostile (e.g., binding all alt+letter to workspaces, clobbering common Emacs-like shortcuts) and complain about hidden/off‑screen windows.

Alternatives and “Lightweight” Window Management

  • Many commenters ultimately prefer simpler tools over full tiling WMs:
    • Rectangle, Magnet, Moom, Divvy, BetterSnapTool, Swish, Raycast’s WM, Loop, Hammerspoon configs (MiroWindowsManager, custom Lua scripts), Keymou for cursor hops.
    • Reasons: fewer macOS‑update breakages, easier onboarding, mouse/trackpad-oriented workflows, and “good enough” layout control.
  • Several say Rectangle or similar covers ~80% of needs without the complexity of a full WM.

Tiling vs Full‑Screen: Philosophy and Use Cases

  • Skeptical voices: macOS full-screen plus four‑finger swipes and Spaces are “beautiful” and sufficient for one‑ or two‑window workflows; tiling adds complexity and potential distraction.
  • Pro‑tiling arguments:
    • On large 5K/6K or ultrawide displays, full-screen wastes space; structured tiling (including more complex grids) is crucial.
    • Common workflows benefit from persistent side‑by‑side windows: editor + terminal + logs, browser + docs, chat + work, accounting + bank statements, etc.
    • Tiling reduces mental overhead from frequent app/Space switching and avoids slow, animated gesture transitions.
  • Some find macOS’s native Spaces/app-switching behavior (especially multi-window apps like Safari/Chrome) clumsy enough that they reach for Aerospace/Rift—or even switch to Linux.

Ecosystem Notes and Miscellaneous

  • There’s a sense of “many tilers on macOS” because Apple’s default windowing is widely disliked among power users.
  • komorebi (a tiler known from Windows) is reportedly coming to macOS.
  • Various side topics surface:
    • Desire for features like “double-tap Cmd to show window outlines and rearrange by trackpad.”
    • Complaints that most macOS tilers don’t work with true fullscreen (always leaving the title bar visible).
    • Suggestions for using Hammerspoon to “roll your own” WM.
    • Questions about hiding the macOS menubar and about taskbar-like utilities for seeing minimized apps.

LineageOS 23

Use cases and benefits

  • Popular for escaping OEM bloatware and Google Play Services, improving performance and battery life.
  • Extends lifespan of older devices with current Android versions and monthly security patches.
  • Offers rooted ADB and optional Magisk for app-level root; uniform “de-Googled” experience across devices.
  • Works on unusual hardware (e.g., Nintendo Switch), broad device support compared to niche ROMs.

Privacy and de-Googling

  • Can run without Google apps; however, default DNS/captive portal checks still hit Google (said to be easily patched).
  • For maximal de-Googling/security, GrapheneOS is often cited; tradeoff is limited device support (primarily Pixels).

App compatibility and payments

  • Many banking apps reportedly work (often with Magisk Hide/MicroG); Google Wallet/tap-to-pay commonly fails.
  • Regional variance: some banks mandate apps; web banking works for some users, not others.
  • Certain IoT apps block rooted/custom ROMs; workarounds may be needed.

Security model and bootloader policies

  • Lineage rarely supports relocking the bootloader, which some view as a risk; Graphene prioritizes locked bootloaders and stricter defaults.
  • Debate: Graphene praised for hardening and rapid fixes (e.g., tapjacking), but criticized by some for limiting user control (firewalls/backups).
  • Newer Samsung devices trip eFuses on unlock; some models may not allow unlocking at all.

Google source/policy changes

  • Pixel kernels now distributed as history-stripped tarballs; loss of device trees/HALs/configs makes day-one support harder.
  • Early security preview program exists for some ROMs with private sources; whether this involves NDA breaches is unclear.

Backups and migration

  • Nandroid-style backups available with root; Neo Backup cited as a Titanium alternative, with caveats for Wi-Fi/SMS restores.
  • Some report seamless device-to-device moves.

TV and media boxes

  • Interest in “freedom-respecting” Android TV setups (e.g., Nvidia Shield builds); some require hardware mods.
  • Major streaming services often block unapproved devices; Magisk may help; alternatives include LibreELEC/NewPipe/Jellyfin.
  • RPi5 builds exist; mixed reports on 4K/60fps performance.

Running in VMs

  • Waydroid (Lineage in a container) works on Linux/VMs; QEMU/libvirt guide exists. Performance varies; some report good results with waypipe/libhoudini.

Hardware choices and ethics

  • Fairphone recommended for sustainability; Motorola/OnePlus suggested for affordability/newness, with varying vendor update policies.
  • Resource shared for checking device support and sustainability.

LineageOS 23

Who Uses LineageOS and Why

  • Common use cases:
    • Extending life of older phones/tablets after OEM support stops, while still getting recent Android versions and security patches.
    • Removing OEM bloatware (especially from vendors like Samsung, Moto, Kindle Fire) for better performance and battery life.
    • Reducing or avoiding Google dependence, using F-Droid and other app stores instead of Play Store.
    • Having a uniform, minimal, predictable Android experience across multiple devices.

Privacy, Google, and “De-Googling”

  • Many see stock Android/OEM ROMs as spyware-heavy; LineageOS is valued for being FOSS and able to run without Google Play Services.
  • Some note LineageOS still uses Google for DNS/captive portal checks by default, but say this is easily patched.
  • GrapheneOS is viewed as the more complete “de-Google”/security solution, but only for Pixels; some find it ironic that de-Googling starts with a Google phone.

Banking, Payments, and App Compatibility

  • Mixed experience:
    • Many banking apps and financial services work fine on LineageOS, sometimes with root hiding (Magisk) and microG.
    • Google Wallet / tap-to-pay often does not work; same on GrapheneOS.
    • Some regions force app-only banking, making web fallbacks impossible.
  • Various “root-detection” or “unapproved platform” blocks (e.g., garage doors, AC control, McDonald’s app) frustrate users.

LineageOS vs GrapheneOS (and Others)

  • Characterizations from the thread:
    • Security & privacy first: GrapheneOS.
    • Freedom, customization & broad device support: LineageOS.
  • Debates:
    • Some praise GrapheneOS’s hardening and early security fixes.
    • Others criticize GrapheneOS for forbidding things like system-wide firewalls or full app-data backups, seeing this as prioritizing app developers over device owners.
    • Limited device support for GrapheneOS (Pixels only) vs many OEMs for LineageOS.

Hardware, Ecosystem, and Regulation

  • Device choices discussed: Pixels, Fairphone, Moto, OnePlus, Samsung; warnings about Samsung eFuses and newer models blocking bootloader unlocks.
  • Concern that Google is making third-party ROM support harder (e.g., Pixel kernels as stripped tarballs).
  • Some call for EU-style regulation to counter monopolistic trends; others blame regulation and modem/baseband realities for entrenchment.

Other Topics

  • Backups: nandroid-style backups with root and tools like Neo Backup; generally workable but with quirks.
  • Non-phone uses: Nintendo Switch, Android TV boxes, Raspberry Pi builds, VM/Waydroid setups.
  • Adoption barriers: needing ADB/PC for updates, streaming services refusing unapproved devices, tightening bootloader policies.

Google blocks Android hack that let Pixel users enable VoLTE anywhere

Carrier control, certification, and interoperability

  • Many see the block as driven by carrier pressure: carriers typically only allow VoLTE/VoWiFi on devices they sell or have explicitly tested, often via whitelisted configuration files.
  • VoLTE/VoWiFi/VoNR are viewed as complex, SIP-based systems with many carrier-specific quirks; carriers claim untested implementations risk interoperability and emergency-call reliability.
  • Others argue carriers also use this control for commercial reasons (e.g., blocking roaming via WiFi calling, pushing users to buy carrier-branded devices).

User freedom, ownership, and legality

  • Strong disagreement over whether Google was “legally compelled” to patch this:
    • One side: radio devices and cellular networks are critical infrastructure; manufacturers must enforce carrier/network constraints to keep licenses and avoid liability.
    • Other side: no law against VoLTE itself was cited; if anyone violates local rules it’s the user, not Google. Blocking features globally is seen as carrier-corporate collusion and an attack on device ownership.
  • Broader resentment over the idea that purchased devices effectively remain under manufacturer/carrier control, compared to cars with remote shutoff.

“Vulnerability” framing

  • Many ridicule calling this a “high‑severity privilege escalation” since it required adb/Shizuku and user cooperation.
  • Others reply that letting users override carrier settings is, from the carrier/regulator point of view, a serious issue even if the radio layer isn’t directly modified.
  • Some worry Google’s targeted fix against Pixel IMS may lead to removing powerful shell permissions entirely, further locking down Android.

Real-world impacts and technical details

  • Users relied on the hack to:
    • Enable VoLTE/VoWiFi/VoNR on unsupported carriers or in unsupported countries.
    • Use “backup calling” (WiFi calling via secondary SIM data) to dodge roaming charges; this is said to be allowed on iOS but often blocked on Pixels.
  • Discussion highlights that VoLTE/VoWiFi are similar under the hood, VoNR is “VoLTE for 5G,” and some fallbacks (CSFB, emergency calls, alerts) are fragile.
  • Australian 3G shutdown is cited: many VoLTE-capable but non‑approved phones were effectively killed or even IMEI‑blocked, ostensibly over emergency-call compliance.

Ecosystem frustration and alternatives

  • Complaints about fragmented Android features: WiFi calling and voicemail often depend on carrier branding, region, or hidden toggles.
  • Some see this as another example of Google’s “open source until it matters” posture and compare Android’s ecosystem to Windows OEM bloat.
  • GrapheneOS is praised for adding official VoLTE/VoWiFi/VoNR overrides despite Google’s patch; others advocate moving to Linux phones or pure VoIP plus data-only SIMs, with caveats around 911/000 access.

Meta Superintelligence Labs' first paper is about RAG

What the paper proposes (REFRAG)

  • Presents a RAG variant where retrieved chunks are mostly fed as compact, model-aligned embeddings.
  • A lightweight RL policy expands only selected chunks back into tokens under a budget; the model attends over a mixed token/embedding input.
  • Claimed benefits: much lower KV cache/attention cost, faster first-token latency, higher throughput, similar perplexity/task accuracy.

Technical merits and open questions

  • Seen as a practical, “obvious next step” to avoid round-tripping embeddings back into text.
  • Concern: tighter coupling between retriever and model may hinder independent evolution.
  • Requests for baselines vs simple lexical/statistical compression (TF‑IDF/BM25) and for comparisons to prior “memory RAG”/continuous prompting approaches.
  • Some frame it as akin to prefix tuning with an RL gate; others note similar ideas existed.

Embeddings debate

  • Enthusiasm: embeddings enable efficient reuse, scalable indexing, and strong semantic proximity.
  • Pushback: not new conceptually; dimensionality reduction has long history; “king − male + female = queen” analogies don’t generalize reliably.
  • Practical critique: embeddings can be fragile/expensive; hybrid or sparse (BM25) approaches often give most of the lift with better latency.

RAG vs long context

  • Clarifications that RAG = augmenting generation via external search; often conflated with vector DBs.
  • Long context alone is costly and can suffer “lost in the middle”; RAG remains valuable for latency/VRAM constraints.
  • Debate over claims of “RAG is dead”; consensus in thread: still needed.

Impact and “incremental vs significant”

  • Some call it incremental and far from “superintelligence”; others argue a 30× efficiency gain is substantial, even if localized to retrieval.
  • Question raised: does this improve model “intelligence,” or mainly systems throughput?

Relation to Meta’s reorg and openness

  • Multiple commenters say this predates the “superintelligence” branding; unclear overall.
  • Meta seen as continuing to publish; debate over “open source” vs “open weights” terminology and licensing.

Industry and research culture context

  • Reports of widespread internal AI adoption; mixed evidence on productivity vs cognitive load relief.
  • Broader critique of metric-driven research, compute-heavy papers, and incentive gaming (Goodhart’s law). Mixed views on whether “free-reign” research pays off.