Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 135 of 522

Arthur Conan Doyle explored men’s mental health through Sherlock Holmes

Meaning of “vulnerability” and whether it’s desirable

  • Long subthread on what “male vulnerability” means:
    • One side sees it as openness about emotions and struggles, necessary for processing pain and forming deep relationships.
    • Others emphasize the literal meaning—exposed to harm—and argue that in many real contexts (work, romance, social hierarchy) visible vulnerability is punished.
  • Several argue for selective vulnerability: safe spaces, trusted partners, and controlled emotional expression versus total emotional openness.
  • Concrete examples discussed: doubts at work, depression/anxiety, nonconforming masculinity/sexuality in school, financial or status failures, and addiction.

Vulnerability, relationships, and gender norms

  • Some insist that men who are “too vulnerable” risk losing romantic partners’ respect; others counter that this describes unhealthy relationships, not a universal rule.
  • Debate over whether women genuinely want male vulnerability, or only from men who first display strength and stability.
  • Broader point: rigid gender roles (stoic men, emotionally expressive women) harm both sexes, but public discourse often foregrounds women’s issues and sidelines men’s.

Mental health talk, therapy, and “psychology-speak”

  • Mixed feelings about increasing mental health discourse:
    • Supporters see it as overdue normalization, comparable to treating broken legs instead of “just walking it off.”
    • Critics dislike “therapy-speak,” pop-psych buzzwords, and pathologizing everything; some worry about overreliance on professionals and pharmaceuticals.
  • Therapy is described both as life-changing and as expensive, uneven in quality, sometimes paternalistic.
  • Several stress boundaries: friends can listen and empathize, but many problems require trained help.

Holmes, Doyle, and the article’s claims

  • Some think the piece is shallow, anachronistic “revisionism” that slaps modern “mental health” framing onto Victorian fiction without textual support.
  • Others value it as a prompt to revisit Holmes’ boredom, depression, cocaine use, and loneliness as early depictions of male psychological struggle in a repressed culture.
  • Disagreement over whether Holmes is a casual drug user or an addict, and whether modern adaptations (BBC Sherlock, Elementary, House) overemphasize pathology.

AI agents break rules under everyday pressure

Why rule‑breaking is unsurprising

  • Many see the behavior as inevitable: models are trained on internet text, fiction, and forums full of stories about people cutting corners under pressure, so “agents” replay those patterns.
  • Several argue LLMs are built to imitate human language and reasoning patterns, so if humans rationalize or lie under stress, the models will too—just less selectively and more randomly.
  • Others stress this doesn’t mean models “feel” pressure; it’s a statistical echo of training data, not a psychological state.

Guardrails, “AI firewalls,” and safety

  • Strong skepticism toward ideas like “AI firewalls” or stacking LLMs to police other LLMs; people question relying on another nondeterministic model as a safety boundary.
  • Counterpoint: multiple-model sanity checks and adversarial simulations can reduce—but not eliminate—error rates, similar to how organizations use redundant humans.
  • Several emphasize external, deterministic guardrails: sandboxes, permission systems, version control, tests, and separate runtime monitors that can block PII leaks or dangerous actions.

Customer‑facing and safety‑critical deployments

  • Many are uneasy about LLMs directly interacting with customers or safety systems.
    • Examples: a chatbot exposing student test answers and PII; tools that rewrite safety incident reports; an airline chatbot whose bad advice had to be honored in court.
  • People worry about rare but catastrophic failures (e.g., safety logs corrupted with nonsense) and note that a 1% error rate is intolerable in such contexts.

Conversation dynamics and “pressure” prompts

  • Several note that LLMs are text continuers: if the dialogue pattern is “mistake → scolding → mistake,” the most likely continuation is… another mistake.
  • Users report that once a model “locks into” a bad pattern or persona in context, it will keep reinforcing it; editing the original prompt or restarting the session often works better than correcting it inline.
  • Some criticize experiments that explicitly inject “time pressure” into prompts as conceptually confused: the model doesn’t experience time, it just sees more text that often leads to corner‑cutting patterns.

Anthropomorphism, thinking, and comparison to humans

  • Ongoing debate: some say LLM behavior is best understood through human psychology metaphors (improv partner, naive employee); others call this misleading and insist they’re just probability engines.
  • Parallel drawn to humans: organizations already design guardrails around human error; now they must design similar (but different) structures around machine-like, non-learning, nondeterministic error at scale.

Engineering patterns and future directions

  • Suggested safer patterns: use LLMs to design traditional automation or DSLs rather than act directly; keep humans in the loop; treat LLMs like very fast, very junior interns inside strong operational controls.
  • Some foresee complex agent hierarchies (coding, QA, management, “board members”) with internal checks; others warn this assumes unrealistically low, independent error rates.

New research highlights a shortage of male mentors for boys and young men

Meaning of Masculinity and Role Models

  • Several commenters describe boys only hearing “masculinity” in the context of “toxic,” and see that as demoralizing for young males.
  • Some praise “masculinity content” that frames being a man as resilient, dependable, and empathetic rather than just “tough.”
  • Debate over resources like Art of Manliness:
    • Supporters say it encourages strength, skills, etiquette, and financial responsibility and can pull men away from extremes (e.g. “Andrew Tate territory”).
    • Critics argue most of its useful advice is not inherently “manly” and should be framed as gender-neutral life skills.
  • One view frames masculinity as a spectrum with “toxic” on one end and “unmanly” on the other; others argue the whole gendered framing is part of the problem.

Nature vs Nurture and Gender Expectations

  • Some argue inherent differences between men and women beyond basic biology are small; culture and early socialization drive most gendered behavior.
  • Others counter that physical differences (strength, reproduction) must influence social behavior and probably seeded historical gender roles, even if culture now amplifies them.

Cultural Tilt, Feminism, and Backlash

  • A faction feels society and media now over-validate women while neglecting men, citing Marvel shifts, kids assuming only women can be scientists or cool heroes, and the “women are wonderful” effect.
  • Pushback notes feminism is relatively recent compared to millennia of male dominance, and argues the goal should be positive, non-gendered values rather than “male-only spaces.”
  • Some claim anything pro-men is framed as anti-women and punished (e.g. in workplaces); others demand evidence and argue feminism is not inherently anti-male, though fringe misandry exists.

Loneliness, Changing Male Roles, and Emotional Life

  • Commenters note data and personal experience of declining close friendships, especially among men; loneliness persists even within marriage.
  • Men report being urged to “be vulnerable,” then shamed when they express loneliness; some feel the message is “be a man but don’t really be one.”
  • Others criticize men who expect romantic relationships to “fix” everything and recommend group hobbies, volunteering, and team sports to build non-romantic connections.

Risk Aversion, Abuse Fears, and Mentorship

  • Strong theme: fear of grooming allegations makes men avoid teaching, mentoring, hugging kids, or even replying to children’s letters.
  • Some describe being important male figures for students yet having to suppress normal affection, and say US norms make healthy cross-generational contact “impossible.”
  • Debate over tradeoffs:
    • One side stresses horrific impact of abuse and justifies extreme caution.
    • Others argue blanket suspicion inflicts guaranteed harm on all men and starves children of needed male contact; profiling abusers is seen as very hard.

Class, Capitalism, and Family Structure

  • Several connect mentor scarcity to poverty / capitalism:
    • Lower-income boys, often in single-parent homes and under-resourced schools, see fewer men at home, in extended family, and in classrooms.
    • Housing instability reduces long-term neighbor relationships that historically provided informal male mentors.
  • Others push back on “it’s all capitalism,” pointing to state failures, broader cultural changes, and noting that even higher-income boys often lack male mentors.

Family vs External Mentors

  • Some ask why fathers, uncles, or mothers’ male friends aren’t counted; replies note many boys lack present fathers or extended family, so they seek mentors elsewhere.
  • Others observe kids can more easily open up to non-parent adults, similar to confiding in a bartender.

Gender Politics and Social Stability

  • There is sharp disagreement over “toxic feminism” vs “toxic masculinity.”
  • Some argue men dominate negative statistics (crime, violence, social “bottom ranks”) but also sacrifice most (dangerous work, rescues), and that vilifying men is counterproductive.
  • A recurring claim: societies with confused, directionless men become unstable (low birthrates, conflict); therefore, supporting healthy, prosocial masculinity is framed as in everyone’s interest, including feminists’.

Post-Gender and Structural Critiques

  • A few advocate a “post-gender” society where jobs, skills, and virtues aren’t coded as male or female, which they believe would naturally improve mentor access for all children.
  • One commenter notes the underlying RAND document is a non–peer-reviewed research report, recommending cautious interpretation.

Meta: Flagging and Where to Discuss This

  • Significant frustration that the HN thread itself was flagged despite active engagement; some see this as suppression of male-focused discussions.
  • Others suggest HN’s tech focus and poor track record on social issues make it a bad venue, but there is no obvious better forum with comparable community quality.

Mixpanel Security Breach

Breach vs. “Security Incident” Wording

  • Strong debate over terminology: some argue Mixpanel is downplaying a clear breach by calling it an “incident”; others initially claim phishing is “not a breach.”
  • Several commenters point out that once an attacker gains unauthorized access and exports customer-identifiable data, that is a breach regardless of the vector (phishing, insider, etc.).

Responsibility: Mixpanel vs OpenAI

  • One view: Mixpanel is at fault because its systems were compromised and data exported.
  • Counterview: OpenAI bears significant blame for sending unnecessary PII (names, emails, locations) to an analytics vendor at all, when anonymous IDs would suffice.
  • Some implementations of Mixpanel avoid sending PII; others follow Mixpanel’s own docs, which encourage identifying users by email.

What Data Was Exposed

  • OpenAI’s email (heavily referenced) lists affected fields: name, email, coarse location, OS/browser, referrer, and organization/user IDs for API accounts.
  • People ask whether event data or other Mixpanel customers’ data were also taken; this remains unclear in Mixpanel’s own post.

Disclosure Quality and Timing

  • Mixpanel’s blog post is widely criticized as vague and evasive: no clear list of accessed systems, data types, scope, or numbers.
  • Multiple commenters say OpenAI’s notice is far more informative than Mixpanel’s, despite Mixpanel having more direct knowledge.
  • Timing (posted around a major US holiday) is seen by many as a likely attempt to bury bad news.
  • Debate over GDPR (and other jurisdictions’) notification deadlines; some say the 72-hour window was breached, others note it formally applies to regulators and allows some flexibility.

Third‑Party Analytics and Vendor Risk

  • Many see this as another example of “your vendor is your attack surface”: vendor breach → your users’ data exposed → potential downstream phishing.
  • Repeated argument that sensitive PII should not be sent to analytics vendors; suggestions to self-host alternatives (PostHog, Matomo, etc.), especially for smaller companies.
  • Some defend using third‑party tools for focus and velocity; others say a company as large as OpenAI should build or self-host critical analytics.

General Sentiment

  • Overall tone is skeptical and negative toward Mixpanel’s communication and security posture.
  • OpenAI is also criticized for sending PII to Mixpanel and only now emphasizing “transparency” after the fact.

The Nerd Reich – Silicon Valley Fascism and the War on Democracy

Reaction to the Book and Framing

  • Many like the provocative title but dislike the “nerds / Silicon Valley = fascism” framing as too us‑vs‑them and unnuanced.
  • Some argue it unfairly collectivizes “nerds” for the actions of a small set of billionaire founders and investors.
  • Others say discomfort is itself revealing: power is concentrating in a tiny tech elite, and refusing to name that dynamic is a form of cowardice or denial.

Are “Nerds” Really in Charge?

  • Several claim current tech leadership is dominated less by genuine nerds than by “asshole businessmen” or rich kids cosplaying nerd culture.
  • Others point out multiple prominent leaders with strong technical or scientific backgrounds, arguing “nerd” doesn’t preclude being dangerous or authoritarian.

Musk, Zuckerberg, and Nerd Cred

  • Long back‑and‑forth over Musk:
    • One camp: primarily a ruthless businessman with shallow software knowledge, faking geekdom for image.
    • Another: clearly understands physics and hardware, sometimes makes bold engineering calls that worked, and has genuine nerd origins.
  • Zuckerberg is widely accepted as technically capable; writing early Facebook in PHP is seen as historically normal.
  • The nerd/jock dichotomy is criticized as outdated and rooted in envy; physical fitness and technical ability often coexist.

Code, Capital, and the Machinery of Control

  • Disagreement over whether “code” deserves separate blame from “capital”:
    • Skeptics: code is just another tool like metallurgy; the core driver is concentrated capital and political power.
    • Others: modern code enables qualitatively new forms of surveillance, manipulation, and automated unaccountability (social media feeds, facial recognition, Palantir‑style systems).
  • Some note open source and software generally lower the cost and speed of social change—for good or ill.

Power, Elites, and Democracy

  • Repeated theme: systems of wealth and political power tend to select for sociopaths; many founders face ethical forks and some choose profit over conscience.
  • Debate over whether evil is exceptional or banal: “regular people” with massive resources can do enormous harm while feeling ordinary.
  • Disagreement on the main threat to democracy:
    • One side: misinformed electorate and degraded media.
    • Another: structural concentration of capital, tech‑enabled propaganda, and elite attempts to limit meaningful popular input.
  • Historical analogies (Arendt, fascism vs communism, class persistence in the UK, US post‑war expansion) surface to argue either that today is continuous with past elite dominance or that we’re entering a new, more dangerous phase.

Silicon Valley vs Generic Capitalism

  • Some say there’s nothing uniquely “Silicon Valley” here: any high‑growth sector under unfettered capitalism would produce similar oligarchs.
  • Others highlight specific ideological currents around SV (e.g., techno‑libertarianism, “sovereign individual” ideas, Yarvin‑style thought) and their spread through influencers and social media.

Media, Voters, and Culture Wars

  • One camp blames voter lack of principles; another says the deeper problem is a polluted information environment where truth‑seeking journalism has eroded.
  • Side debates pit fascism vs communism as greater contemporary threat, and reject sweeping labels like “woke Reich” or “Nerd Reich” as rhetorical overreach that collapses important distinctions.

Meta: Suitability of the Submission

  • Several question featuring a not‑yet‑published book (2026 release) on HN, since no one can evaluate its actual argument.
  • Others find the thread itself useful as a map of community biases and as an occasion for self‑reflection: “are we the baddies?”

Tell HN: Happy Thanksgiving

Overall sentiment

  • Strong outpouring of gratitude and affection for HN as a rare, high-signal corner of the internet.
  • Many describe it as “home”, a daily ritual, or one of the only sites they still visit regularly.
  • People appreciate the mix of intelligence, curiosity, and “lovable nerdiness”, plus the balance of seriousness and silly fun.

Longevity and personal impact

  • Numerous commenters note being here 10–19 years; many more 5–10. Several say HN has outlasted every other community they’ve used.
  • HN is credited with shaping careers (e.g., moving into software, startups, OSS), critical thinking, and worldviews.
  • Some relate life stories: discovering programming on early home computers, transitioning from Slashdot/Reddit, or feeling less isolated in their local context.
  • Longtime lurkers say the discourse has finally reached a level where they feel comfortable participating.

Community quality and moderation

  • Widespread thanks to moderators and YC for maintaining high signal-to-noise and resisting outrage-driven dynamics.
  • Several compare HN favorably to other platforms whose communities have degraded or whose algorithms optimize for engagement rather than curiosity.
  • Some longtimers feel discourse quality has slipped and there’s more politics or noise, but still regard HN as the best remaining community of its type.
  • Others explicitly argue it’s “better than ever” with more diverse perspectives and domain experts.

Use in daily life and work

  • People use HN as a primary news and tech-curation source, often more for comments than for links.
  • Educators bring HN threads into lectures to illustrate real-world software engineering debates.
  • Some found jobs, startup ideas, or technical tools via HN, and plan to “give back” with Show HN posts.

Debates, tensions, and side threads

  • Brief but intense subthread about Aaron Swartz: whether breaking “unjust” laws should be celebrated, the proportionality of enforcement, and responsibility for his death; moderators eventually mark it offtopic.
  • Discussion around YC’s handling of a disgraced portfolio company appears as a criticism of perceived image management; a moderator responds with links to critical coverage on HN.
  • Multiple comments highlight that Thanksgiving also has a darker side for Native Americans, linking to critical perspectives.
  • A few users criticize rising “toxic positivity”, increased political content, or low-quality science posts, yet most still see enough value to keep coming back.

DIY NAS: 2026 Edition

RAM, Caching, and ZFS Myths

  • Many comments focus on how much RAM a “pure NAS” needs. Consensus: 8–16 GB is fine for simple file serving at 1–2.5 Gbit; more RAM mainly improves caching and helps at 10 Gbit+ or with many repeated reads.
  • ZFS will aggressively use available RAM as ARC (read cache), but the old “1 GB RAM per 1 TB storage” rule is repeatedly called out as outdated and really only relevant to dedup-heavy workloads.
  • Several people report good real-world performance with 32–64 GB on medium-sized pools, but others run ZFS acceptably on as little as 2–8 GB, with lower performance.
  • Dedup is widely discouraged for home users because of RAM pressure and complexity; reflinks and special vdevs are mentioned as more modern ZFS features.

ECC, In‑Band ECC, and Data Integrity

  • Strong split on ECC: some treat it as mandatory for ZFS or “important data,” arguing that RAM bitflips undermine end‑to‑end checksumming; others say ECC is “better, not required,” especially for home use with backups.
  • In‑band ECC on modern low-power Intel boards (e.g., Odroid H4, i3‑N305) is praised as an underrated compromise, with modest performance cost.
  • There is debate over how real the “ZFS + bad RAM corrupts everything on scrub” risk is; some cite earlier analyses that this specific fear was overstated.

Drives, RAID, and Capacity vs Reliability

  • People share recent deals around ~$10/TB for large Seagate drives but note that consumer lines (Barracuda) are not marketed for NAS; some say this distinction is overblown if drives are CMR and you have redundancy and backups.
  • Used/refurb enterprise HDDs and SSDs are considered good value for many, especially in backup or cold‑storage roles, though others insist on new drives for primary pools.
  • RAID5 vs RAIDZ2/RAID6: RAID5 is seen as risky mainly due to very long rebuild times on large disks; tolerated by some for home if you have current backups and accept downtime. RAIDZ2 is generally preferred for big pools.
  • Concerns about resilver times on 20–28 TB drives drive some people away from single‑parity layouts.

DIY vs Prebuilt NAS, Power, and Overkill

  • Several argue that DIY no longer clearly beats prebuilt on cost: small 4‑bay Synology/QNAP/TerraMaster/UGREEN boxes are quiet, low‑power, and “set and forget,” often matching or beating DIY once you price motherboard, PSU, case, etc.
  • Others enjoy DIY for flexibility (Proxmox, VMs, GPU, Kubernetes) and re‑use of spare parts or used enterprise gear; they note that prebuilt units often ship with weak CPUs and limited RAM.
  • Power draw is contentious: some think obsessing over a 20–40 W difference is overblown versus cloud costs; others in high‑electricity regions carefully chase sub‑20 W idle and size PSUs down for efficiency.
  • N‑series Intel boards are praised for low idle, but their limited PCIe lanes can bottleneck NVMe speed; some prefer used AM4/old Xeon platforms for more PCIe and ECC at the cost of higher idle.

Cases, Cooling, Noise, and Dust

  • Jonsbo and Fractal Node 304/804 cases are frequently discussed. Jonsbo gets criticism for poor HDD airflow without fan changes; the Node series is praised for thermals and build quality.
  • Many swap stock fans for Noctua or cheaper Thermalright units and use software fan control to keep HDD temps in the high 30s–low 40s °C.
  • Dust in closets/pantries and network gear with terrible fan curves are recurring complaints; people want better thermal/fan design in consumer switches and ISP routers.

Motherboards, AliExpress, and Reliability

  • The specific Chinese “Topton” NAS boards are controversial. Supporters like the density (lots of SATA, multiple NICs, DC input) and low cost; skeptics worry about BIOS bugs, non‑existent firmware updates, and lack of real RMA paths.
  • Some prefer used Supermicro/ASRock Rack/enterprise boards with IPMI and ECC from eBay, arguing they’re proven and offer remote KVM; others see AliExpress as an acceptable risk for hobby setups.
  • There’s a parallel ethical debate about the article’s undisclosed affiliate links and whether that biases component choices (e.g., pushing a flashy board over more boring options).

Filesystems and NAS OS Choices

  • ZFS remains the default recommendation for serious DIY NAS, mostly via TrueNAS, but there’s increasing pushback: some dislike the appliance constraints and prefer plain FreeBSD, Debian, or NixOS with ZFS.
  • Btrfs RAID1 with scrubbing is suggested as an alternative for those wanting checksumming without ZFS complexity; others report past data loss and avoid Btrfs entirely.
  • TrueNAS is seen as great “appliance” software if you don’t want to be a sysadmin; critics warn that once you hit a bug in the GUI layer you’re in deeper water than with a plain OS.
  • Unraid, SnapRAID + mergerfs, and XigmaNAS appear as middle‑ground options, especially for mixed‑size drives and flexible expansion.

Backups, Off‑Site, Tape, and Disaster Planning

  • Multiple commenters stress that RAID is not backup and ask “what if the house burns down?” Off‑site copies (friend’s NAS, small QNAP, or cloud object storage) are repeatedly recommended.
  • LTO tape is discussed for true archival: media is cheap and robust, but drives are very expensive and only make economic sense beyond a few hundred TB. Home users can technically do it with a SAS HBA and used LTO‑5/6/7 drives, but it’s niche and operationally complex.
  • Some prefer cloud as primary for “irreplaceable” photos, with local NAS as backup, while others flip that (NAS primary, cloud/archive secondary) to keep more control.

Use‑Cases, Overengineering, and Simplicity

  • Several contributors think home NAS builds are often wildly overengineered (tens of TB, giant RAM, complex ZFS layouts) for light media and backup workloads; they advocate starting with a Pi, cheap mini‑PC, or a single‑bay Synology and learning first.
  • Others explicitly want a combined NAS/home‑lab: VMs, containers, media transcode, even AI workloads on a GPU, where higher‑end CPUs, more RAM, and 10 Gbit networking are justified.
  • There’s recurring advice to separate “must not lose data” (photos, documents) from bulk media; the former should drive redundancy, ECC, and off‑site strategy, not the entire home media library.

Green card interviews end in handcuffs for spouses of U.S. citizens

Visa Overstays and Catch‑22s

  • Many describe a structural trap: green card processing for spouses can take 6–24+ months; leaving the US while an adjustment-of-status case is pending usually counts as abandoning it.
  • People are often technically “out of status” but in a period of “authorized stay,” which confuses both laypeople and some officials and complicates things like driver’s licenses.
  • For some categories (especially India, China, Mexico, Philippines, family preferences like siblings), waits can stretch to a decade or more due to quotas and country caps.

Legal Pathways and Complexity

  • Detailed breakdown of spousal options: consular processing abroad; adjustment of status inside the US; and K‑1 fiancé visas. Each has its own long timelines, bars for overstays, and travel constraints.
  • Nuanced discussion of student (F‑1), TN, and dual‑intent visas (H‑1B), and how prior “immigrant intent” can later be used against applicants.
  • Interviews and outcomes are seen as highly subjective; small form errors or life circumstances (e.g., divorce history) can trigger long delays.

Fraud, Intent, and Enforcement

  • One camp argues many couples in the article likely committed “immigration fraud” by entering on non‑immigrant visas already intending to stay and marry, instead of using K‑1 or spousal visas.
  • Others counter that intent can legitimately change after entry, that proving original intent is difficult, and that the article may conflate overstay with fraud.
  • Some note that earlier “lax enforcement” encouraged people (and lawyers) to rely on de facto practices that are now being punished.

Detention, Rights, and Morality

  • Strong disagreement over whether visa overstays should result in detention at all, especially for spouses of citizens with infants and no criminal record.
  • Critics call the system Kafkaesque and “cruelty-driven,” arguing there are civil alternatives (fines, supervised departure) and that detention is being used punitively.
  • Defenders stress there is no inherent right to reside in another country and see detention as a practical prerequisite to removal.

Comparisons, Incentives, and Reform

  • Multiple comparisons to Europe, Canada, Singapore, and Germany: many find US treatment uniquely harsh, though others note EU systems can be slow and restrictive too.
  • Despite cruelty and risk, commenters say people still endure it because of perceived US economic opportunity, English language advantages, and “supply and demand.”
  • Broad consensus that US immigration law is arbitrary and broken; disagreement centers on whether strict enforcement should come before or alongside legislative reform.

Penpot: The Open-Source Figma

Project & Company Context

  • Penpot is positioned as a self-hostable, open-source alternative to Figma, founded by a European team of ~45 people with prior funding.
  • Team emphasizes uniting designers and developers, using declarative/semantic design concepts and close alignment with CSS-style layout.
  • They dislike the “open-source Figma” label, claiming a broader platform vision.

Technology Stack & Architecture

  • Core is Clojure/ClojureScript (no Java on the frontend), running on the JVM plus JS; new rendering engine is Rust + Wasm + Skia.
  • Original implementation relies heavily on DOM/SVG/XML; this is widely seen in the thread as the source of scaling issues.

Performance and Stability

  • Multiple reports of severe lag, browser crashes, and server memory spikes (tens of GB) on larger documents or many pages.
  • Others report stable operation for small teams via Docker self-hosting.
  • Figma is also criticized as a memory hog and sluggish on large documents, but many still find it more robust at scale.
  • Penpot maintainers say the upcoming canvas-based engine aims explicitly to fix performance problems.

Self‑Hosting, Desktop, and Offline Use

  • Docker-based self-hosting works for some, but others find it complex or fragile (email verification issues, crashes).
  • An unofficial “desktop” wrapper exists but just embeds the web app and can spawn a local Docker stack; it disappoints users expecting a lightweight, offline binary like GIMP/Inkscape.
  • Heated debate over running a full “SaaS-style” stack locally: some see Docker/Postgres/Minio as acceptable modern app overhead; others strongly object on resource and complexity grounds.

Features, Workflow, and Ecosystem

  • Praised as a pleasant vector/UI editor with good layout/export flow, reminiscent of early Sketch, and useful for icons and small UI pieces.
  • Major limitation: text cannot be converted to paths, making SVG exports unreliable across machines without identical fonts; this is a deal-breaker for some.
  • Reports of layout glitches (elements changing size when switching pages) erode trust for production work.
  • Lack of Sketch import and uncertainty about available component libraries make migration from Figma harder.

Pricing, “Unlimited” Storage, and Business Model

  • Hosted Penpot is perceived as cheaper and more generous than Figma, including “unlimited storage” on top tiers.
  • Long sidebar debate about “unlimited” claims: some accept soft “fair use” limits; others call the term inherently misleading.
  • Broader skepticism toward open-core SaaS patterns (feature gating, slow “enshittification”), but also recognition that large open projects need sustainable funding.

Open Source, AI, and Future Direction

  • Several commenters are explicitly willing to pay a “performance tax” in exchange for owning their design stack and avoiding proprietary lock-in.
  • Others note that in design culture, tool quality and industry standardization usually trump open-source ideals.
  • Figma’s AI features are cited as expanding design-tool use cases (e.g., auto-generated slides and games); Penpot responds with an MCP integration and “design as a graph” AI research, with demos already shared and more planned.

Migrating the main Zig repository from GitHub to Codeberg

Motivations for Leaving GitHub

  • Many commenters support moving off GitHub in general, citing centralization, Microsoft control, AI push (Copilot, “AI company now”), and long‑standing product decay.
  • Zig’s specific complaints about GitHub Actions resonate: brittle YAML model, opaque scheduling, random failures, inaccessible logs, and particularly the “safe sleep” bug that can spin forever and silently disable runners.
  • Some see the move as consistent with Zig’s “zero dependency / toolchain sovereignty” philosophy: GitHub is just another risky dependency.

Codeberg / Forgejo as Destination

  • Supporters like that Codeberg/Forgejo are libre, non‑profit, self‑hostable and not pushing dark patterns or monetization nudges.
  • Criticisms: weaker infra and uptime, old/second‑hand hardware, no SLAs, perceived slowness during the HN “hug of death,” and unclear long‑term stability as a “post‑GitHub world” platform.
  • Accessibility is a serious concern: current image‑only CAPTCHA makes registration effectively impossible for screen‑reader users.

CI and Multi‑Platform Support

  • Zig devs stress GitHub runner limitations: few OSes and architectures, .NET dependency, and difficulty getting patches for additional platforms accepted (even large vendors keep their own forks).
  • Forgejo Actions is praised as easier to deploy, more responsive to contributions, and close enough to GitHub Actions to ease migration.
  • Some argue GitHub Actions remains the “best free CI” mainly because of free macOS runners; others say GitLab CI and self‑hosted systems are superior but cost more.

LLM “Slop” and Policy

  • There’s broad frustration with AI‑generated PR/issue spam and “vibe‑coded” repos that don’t work.
  • Many maintainers defend a blanket “no LLM” policy as the only practical way to avoid being overwhelmed; reviewing on “merit alone” is seen as infeasible at current volumes.
  • A particular user’s massive AI‑generated PRs across multiple languages are repeatedly cited as a cautionary tale.

Tone, Professionalism, and Community Image

  • A large subthread condemns the blog’s language (“losers”, “monkeys”) toward GitHub engineers as bullying, childish, and in conflict with Zig’s own CoC.
  • Others find the bluntness refreshing, “punching up” at a megacorp, and see civility concerns as misplaced compared to the substance of the critique.
  • Some say the tone makes them less likely to adopt or contribute to Zig; others dismiss this as overreaction.

Centralization, Discoverability, and Activism

  • Several worry that leaving GitHub sacrifices discoverability, integrations, and GitHub Sponsors, which matter for a still‑growing language.
  • Others argue established projects don’t need GitHub to attract serious contributors and that mirroring or federation can restore some benefits.
  • The ICE relationship and similar ethical concerns are seen by some as valid grounds for exit, by others as “purity spirals” or distracting virtue signaling.

Ilya Sutskever, Yann LeCun and the End of “Just Add GPUs”

Article & source discussion

  • Several commenters view the article as shallow or AI-generated “slop,” noting it largely paraphrases existing interviews.
  • Others are fine with AI-written summaries for time-saving, but some prefer watching full interviews to judge nuance and intent.
  • There is confusion/critique about grouping Sutskever and LeCun together, with the observation that Sutskever’s current stance has moved closer to long-standing critics of pure scaling.

Scaling vs. new paradigms

  • Many argue the “just add GPUs” / scaling-hypothesis era is hitting limits: data scarcity, compute ceilings, and disappointing generalization despite great benchmark scores.
  • Others insist scaling is still working—pointing to recent frontier models—and that progress remains “up and to the right,” especially when combined with better training tricks and tooling.
  • A recurring theme: benchmarks and leaderboards overstate real capability; models look strong on exams but remain weak at robust reasoning and transfer.

Data, evaluation, and embodiment

  • Proposed new data: real-world multimodal streams from robots, self-driving cars, surveillance, cloud storage troves, synthetic data, and video.
  • Counterpoint: raw sensor data is mostly redundant “noise” without good evaluation functions; real-world reward signals (e.g., not crashing) are sparse and inefficient for learning complex behavior.
  • Debate over whether next-state prediction in a physics-governed world can force good world models, or whether key architectural breakthroughs are still missing.

Compute, business models, and hype

  • Questions about where the next 1000× FLOPs will come from; responses include more hardware, better efficiency, and massive energy buildout, not exotic megastructures.
  • Frontier labs are seen as trapped: they know more research is needed but must keep selling growth and near-term ASI/AGI narratives to investors.
  • Some argue big players have clear paths to profitability and won’t go bankrupt; others note current GPU spending and open-model competition could make margins thin.

Labor replacement and social impact

  • One camp believes current LLMs plus “scaffolding” can automate a large share of white-collar tasks (QA, analysis, admin, parts of sales/support, etc.).
  • Another camp sees this as detached from reality, emphasizing non-technical work complexity, risk aversion, brittleness of AI pipelines, and historical patterns where productivity gains don’t simply erase jobs.

Research culture and “scale is all you need”

  • Several commenters from the “scaling is not enough” side express frustration: they feel sidelined for years while the community chased transformer scaling and benchmarks.
  • They resent that prominent scaling advocates are now repositioned as thought leaders of the “age of research,” while those who argued for architectural diversity and deeper notions of generalization struggle for funding and publication.

C100 Developer Terminal

Concept & Positioning

  • Marketed as a “Computer for Experts” and a focused “developer terminal” that “removes distractions.”
  • Some see value in an opinionated, Linux-first, preconfigured desktop with support, rather than a generic Windows box repurposed for Linux.
  • Others argue any machine with a terminal is already “for experts” and that “get out of your way” is just cover for missing apps.

Hardware, Price & Value

  • Rough specs (where known): ~RTX 1650-class GPU, 96GB RAM, low-profile mechanical keyboard, laptop-like modularity.
  • At ~$2,000 plus a ~$100 reservation fee, many feel it’s “a headless laptop” priced like a premium notebook or better desktop.
  • Comparisons: used ThinkPads, Framework, System76, DIY desktops, Mac Studio/MBP + Asahi Linux seen as better value or more capable.
  • Critiques of physical design: holes on top inviting spills, CPU right under hands instead of in a better-cooled box.

Keyboard & Ergonomics

  • Keyboard dominates the discussion:
    • Left-side numpad polarizes: intriguing for some workflows, instant deal-breaker for others (muscle memory, left-handed mousing).
    • Very long Esc key, odd Fn placement, missing Insert/Print Screen, three Ctrl-like keys, unusual F-key order, Mac-style ⌘ on a Linux box.
    • Legends criticized as low-contrast, inconsistent, and nonstandard; ISO 9995 and XKB conventions apparently ignored.
  • Many question bundling such a nonstandard fixed keyboard at all, instead of letting users attach their own.

Workbench OS / Software Story

  • Described in comments as a Fedora spin with an opinionated tiling/WM setup, pitched as “sovereign and secure” and distraction-free.
  • Skepticism that “no entertainment/shopping/ads” is a real differentiator given other minimal Linux distros.
  • ToS mentions a “proprietary Linux OS,” raising eyebrows in a Linux-targeted product.
  • Some are genuinely interested in features like the always-available notepad overlay and would like to try the distro separately.

Target Audience & Use Cases

  • Many developers say it doesn’t match their needs: they want either a MacBook-like polished laptop or a highly configurable workstation.
  • Others posit the real audience is design-conscious, retro/hipster, or mechanical-keyboard enthusiasts with disposable income.
  • Debate over whether a separate, “deep work” machine with fewer apps makes sense; several note devs still need browsers, office tools, media, etc.

Vaporware & Marketing Concerns

  • Strong suspicion of vaporware: highly polished site, almost no hard specs, renders instead of internals, tiny demo videos, preorder before clarity.
  • Some external photos and a livestream suggest prototypes exist, but details remain thin.
  • Many view it as a design/branding exercise (even likened to Teenage Engineering or a “hipster typewriter”) more than a serious dev tool.

Running Unsupported iOS on Deprecated Devices

Desire to Reuse Old iDevices / Reduce E‑Waste

  • Many argue it’s wasteful that capable iPads/iPhones become unusable solely due to dropped software support and locked bootloaders.
  • People compare this to OpenCore Legacy Patcher on Macs and wish for a similar path, or at least Linux or a “browser-only” OS on old iPads.
  • Several personal anecdotes: years-old iPads still used daily for reading, kids’ media, or simple browsing; old iPhones/SEs repurposed as offline tools.

How Apple Locks Devices & Technical Hurdles

  • Apple enforces signed firmware and controls keys; even with exploits (e.g., checkra1n) you still need reverse‑engineered drivers.
  • Asahi Linux on ARM Macs is cited as proof it’s possible but very labor‑intensive, and demand for very old iOS devices may be too small.
  • Some mention partial efforts (e.g., Android on iPhone 7), but these are incomplete and niche.

App Store, Browsers, and Planned Obsolescence

  • A major pain point is apps dropping support for old iOS versions, effectively killing otherwise functional devices.
  • Debate over blame:
    • One side blames developers for setting higher minimum OS versions than necessary.
    • Others point to Apple’s policies: mandatory newer SDKs, limits on target ranges, store rules, and inability to easily install older app versions.
  • Because all iOS browsers must use Apple’s WebKit, when iOS WebKit stops updating, every browser and webview becomes stale.

How Many People Actually Need This?

  • One camp: most users replace devices long before official EOL; only a tiny fraction will flash custom OSes or care about long‑term reuse.
  • Opposing view: many non‑tech users happily keep old hardware until apps or banking stop working; high prices mean people want longer lifetimes.
  • Some argue hardware could last ~20 years if software and batteries allowed; others counter with performance, battery, display fragility, and energy‑efficiency concerns.

Policy and Rights Proposals

  • Repeated calls for laws:
    • When support ends, vendors must unlock bootloaders or provide an “unlock kit.”
    • Or provide a documented hardware abstraction layer so community OSes can be built.
    • Concepts like “abandonware legislation” where dropped products require releasing code/schematics to owners.
  • Some would even tie this to consumer rights (refund vs unlock) or foresee EU lawsuits over downgrades and device freedom.

Apple Ecosystem & ARM Macs

  • Concern that Apple Silicon and tighter security will end the era of easy multi‑OS Macs, mirroring iOS lock‑in.
  • Several say they’ll avoid future Apple hardware because high prices plus guaranteed timed deprecation is a bad long‑term deal.

iOS 26 / Tahoe and Downgrades

  • Multiple reports that iOS 26/Tahoe is unusually buggy; users wish they could revert to iOS 18 but current devices lack exploits.
  • Some speculate only legal pressure will ever make official downgrades possible.

Bring bathroom doors back to hotels

Suspected Reasons for Doorless Bathrooms

  • Many argue it’s a revenue tactic: making shared rooms (friends, coworkers, families with teens) uncomfortable so people book extra rooms or suites.
  • Others think it’s mostly aesthetics/Instagram: open glass, “luxury spa” vibes, and making tiny rooms feel bigger in photos.
  • Cost/space rationale: swing doors need clearance; removing them or using sliding/barn doors lets hotels shrink rooms or squeeze in more units.
  • Some mention safety/maintenance: easier ADA compliance with sliding doors; fewer lockable doors to worry about during crises or abuse; fewer moving parts to maintain.

Privacy, Dignity, and Social Norms

  • Strong consensus that most couples and families still want a solid, opaque, closable bathroom door—especially for toilets.
  • Several say they’d rather use a shared hallway bathroom than an in‑room toilet with no real door.
  • A minority are fine with or even prefer open bathrooms, especially when traveling alone or with very intimate partners; others find that dynamic itself off‑putting.
  • Cultural variation noted: some regions are more relaxed about nudity and shared facilities, but even there, fully exposed toilets are seen as too much.

Hygiene and Comfort Concerns

  • People worry about toilet plume (aerosolized fecal particles) reaching beds, furniture, and toothbrushes when there’s no door or fan.
  • Humidity from showers spilling into the sleeping area is linked to mold, musty smells, and general discomfort.
  • Debate over how much doors actually improve health vs. mainly improving perceived cleanliness and odor control.

Impact on Travelers and Booking Behavior

  • Many now actively scan photos/reviews for bathroom layout; some say a missing/transparent door is an automatic dealbreaker or “never again.”
  • Early‑stage startups and cost‑cutting business trips are hit hard: sharing rooms becomes awkward or impossible.
  • Families with kids or mixed‑sex travel groups find these layouts especially unworkable.

Market Dynamics and Regulation

  • Frustration with “enshittification”: higher prices, fewer amenities (housekeeping, decent amenities), and now privacy cuts.
  • Some advocate collective action: bad reviews, industry star‑rating rules, or even regulation (“bathrooms must have doors”).
  • Others argue individual “vote with your wallet” works only weakly in concentrated, brand‑dominated hotel markets.

Geography and Hotel Segment Differences

  • Several report never seeing doorless bathrooms; others see them regularly, especially in newer or “design” hotels, and parts of Asia and Europe.
  • Trend appears more common at fashionable or “boutique” properties, but also creeping into mainstream chains via barn‑door or glass‑wall designs.

Related Design Grievances

  • Frequent complaints about: half‑glass showers that flood the floor, confusing shower controls, dim rooms, lack of ventilation fans, barn doors with gaps, noisy/slamming doors, and generally declining service (e.g., reduced housekeeping).
  • Some wish similar tracking existed for: real shower enclosures, water pressure, bed firmness, blackout curtains, desk usability, and Wi‑Fi speed.

EU Council approves Chat Control mandate for negotiation with Parliament

Legislative Status and What Was Actually Decided

  • The Council agreed on its position to take into trilogue with Parliament; this is not yet law.
  • Scanning is framed as “voluntary” and focused on providing channels for victims, with no explicit obligation to break or bypass encryption.
  • The draft explicitly states it must not weaken or require access to end‑to‑end encryption, nor mandate decryption.
  • Some commenters see this as a significant win compared to earlier drafts that aimed at mandatory chat scanning; others see it as only a tactical retreat.

Privacy, Encryption, and “High-Risk” Providers

  • The core concern is the new regime of “risk assessments” and “high-risk” classifications overseen by authorities.
  • “High-risk” criteria include encrypted messaging, P2P, anonymous/pseudonymous accounts, lack of identity verification, lack of pre‑moderation, and strong privacy jurisdictions.
  • Providers designated “high risk” must “contribute to technologies to mitigate risks,” widely interpreted as a path to client-side scanning and de facto backdoors via regulatory pressure, not explicit text.
  • Many warn of a slow “boiling the frog” dynamic: voluntary today, functionally mandatory over time through compliance ratchets and a growing enforcement/compliance industry.

EU Governance, Democracy, and Scope

  • Large subthread debates whether the EU was meant as a trade bloc or an “ever closer union,” and whether this extends legitimately to regulating private communications.
  • Strong disagreement over how democratic the EU is: some emphasize Parliament, Council, and national governments’ roles; others point to the Commission’s agenda-setting power, trilogues, and perceived “rubber stamp” dynamics.
  • Tension between EU‑level rules and national constitutions is highlighted; some expect courts like the ECJ/ECHR and national constitutional courts to be crucial checks.

Civil Liberties, Effectiveness, and Activism

  • Many see mass scanning proposals as disproportionate, especially given existing laws against CSAM and examples of lenient sentencing offline.
  • Frequent fear that “protect the children” is being used as political cover for generalized surveillance, potentially usable against “enemies of the state.”
  • Some describe the current outcome (no mandated scanning, E2EE still legal) as democracy working under pressure; others see an ongoing legitimacy crisis and expect the issue to keep returning.
  • Suggested responses include protests, supporting digital rights NGOs, relying on open-source, decentralised, E2EE tools, and preparing for jurisdictional workarounds via private or non‑public communication systems.

The EU made Apple adopt new Wi-Fi standards, and now Android can support AirDrop

AirDrop Reliability and User Experience

  • Multiple commenters report AirDrop being flaky even between nearby Apple devices or rooms, with transfers failing mid-way and requiring retries or device “gymnastics.”
  • Others note recent iOS versions (26/“18”) feel more reliable, including multi-recipient sends and NFC “bump” initiation, but UX quirks remain (e.g., share sheet vs opening AirDrop first).
  • Some users abandon AirDrop for apps like Signal or LocalSend, which work cross-platform but typically require being on the same Wi-Fi network and lack system-level integration.

AWDL vs Wi‑Fi Aware: What’s Actually Happening

  • Thread debates whether interoperability stems from Apple moving AirDrop from its proprietary AWDL to the Wi‑Fi Aware standard.
  • Evidence is contradictory:
    • Apple has published Wi‑Fi Aware APIs, but AirDrop still works to older iOS/macOS devices that don’t list Wi‑Fi Aware support.
    • Packet captures show AirDrop still using the awdl0 interface, and strings in Google’s implementation reference AWDL.
  • Several argue Ars’ framing (“EU made Apple adopt new Wi-Fi standards, and now Android can support AirDrop”) is speculative; some think Google simply reimplemented AWDL.

Role of the EU, DMA, and Regulation

  • One camp credits EU regulation (USB‑C mandate, DMA interoperability rules) for breaking Apple’s ecosystem walls: USB‑C on iPhones, RCS, and now AirDrop/Quick Share interop.
  • Others argue Apple already led or contributed to these standards (USB‑C, Wi‑Fi Aware) and was on track to adopt them; the EU mainly accelerated timing and provided a scapegoat for unpopular transitions.
  • Broader regulatory debate:
    • Supporters see this as necessary counterweight to platform lock‑in and a win for consumers and competition.
    • Critics worry about overregulation, hypocrisy (e.g., chat control and privacy), and regulation becoming a moat that entrenches big incumbents.

USB‑C vs Lightning and Hardware Politics

  • Long subthread on why Apple kept Lightning so long: user inertia, huge installed base of Lightning accessories, fear of “port churn” backlash, and possible MFi/licensing/control incentives.
  • Conflicting claims about connector quality:
    • Some praise Lightning’s mechanical robustness (spring in cable, center blade on plug) and easier cleaning; others report unreliable Lightning ports and praise USB‑C’s universality.
  • Many acknowledge short‑term e‑waste (obsolete docks, cables) but argue long‑term gains from standardization, simpler travel, and shared peripherals across phones, tablets, and laptops.

Lock‑In, Monopolies, and Interoperability

  • Numerous comments frame Apple (and to a lesser extent Google) as gatekeepers abusing ecosystems: proprietary cables, closed AirDrop/iMessage, App Store control, and fees.
  • Others counter that Apple competes fiercely on device quality and UX, and that tightly curated, integrated systems are exactly what many customers want.
  • DMA’s future requirements for interoperable, E2E‑encrypted messaging and group video are seen as both promising and technically very hard (multi‑protocol, multi‑service routing without breaking E2EE).

Broader Ecosystem and Alternatives

  • Discussion of Google’s Nearby Share/Quick Share: account requirement (for “contacts only” and cloud fallback), and how the new Wi‑Fi standard may allow account‑less local transfers and third‑party implementations.
  • Some want similar standardization for casting/streaming (AirPlay/Chromecast) and NFC wallets, so all devices and TVs/terminals interoperate.
  • Several express a simple desire: plug any phone into any computer/TV or send files to any nearby device without thinking about brand or ecosystem.

Why 90s Movies Feel More Alive Than Anything on Netflix

Bias, Memory, and Nostalgia

  • Many argue the “90s magic” is largely survivorship and recency bias: only the best 90s films are remembered, just as people mostly see today’s disposable streaming output.
  • Others push back: they remember disliking many films in earlier decades too and feel a real qualitative decline, not just faulty memory.

Modern Cinema vs 90s Blockbusters

  • Several commenters say post-2010 blockbusters rarely match 70s–90s tentpoles (Jaws, Aliens, Jurassic Park, The Matrix, Gladiator), especially in spectacle that still feels grounded.
  • Others note that plenty of excellent recent films exist (including non‑US, indie, and arthouse); the issue is mostly with mainstream Hollywood franchises.

Streaming, Netflix, and “Casual Viewing”

  • Netflix is singled out as optimizing for background watching: executives reportedly ask writers to have characters verbally spell out actions so phone-distracted viewers can follow.
  • Some argue this “second-screen” design flattens nuance and subtly changes pacing and dialogue.
  • Others say similar pressures always existed for TV (e.g., viewers folding laundry, channel surfing).

Attention, Smartphones, and Audience Behavior

  • Strong complaints about smartphone distraction: people routinely half-watch movies while scrolling, and some see this as corrosive to both attention spans and the types of films that get funded.
  • Others think the larger issue is risk-averse studios chasing metrics and IP safety rather than phones per se.

Writing, Structure, and Length

  • Many feel modern big-budget writing is shallow: overexplained, trope-driven, and excessively serialized; villains, heroes, and arcs feel one-note.
  • Complaints about bloat: runtimes stretching well past 2 hours, versus tight 90-minute 80s/90s films that didn’t overstay their welcome.
  • Some genres (horror, drama) are viewed as still strong; broad comedies and mid-budget “adult” movies are seen as weaker or rarer.

Visual Style: Cinematography, Lighting, and Audio

  • Multiple comments say older films feel more “real” because of:
    • Eye-level, longer shots with multiple characters in frame.
    • Less frenetic cutting.
    • Practical lighting and shadows instead of uniform, graded “aesthetic” images.
  • Digital cameras and low-light capability reduced deliberate lighting; heavy color grading, shallow depth of field, and haze/fog create a creamy but generic look.
  • Bad foley and dialogue mixing in many modern productions subtly erode realism.

CGI, Practical Effects, and Franchises

  • Overuse of CGI is blamed for weightless action and aging visuals, and for enabling scripts to be finished in post.
  • Older action (practical stunts, car crashes) is seen as more visceral; some modern exceptions like Fury Road are praised.
  • Franchises, sequels, cinematic universes, and global-market pandering are widely viewed as encouraging safe, homogenized stories rather than the risk-taking associated with many 90s classics.

S&box is now an open source game engine

Relationship to Source 2 & Valve

  • S&box is open source but depends on Valve’s proprietary Source 2; you get S&box code, but not the underlying engine.
  • Some see this as “shaky ground” given Valve’s limited public support for Source 2 (no general SDK, no console support, almost no third‑party licensing).
  • Others argue that S&box effectively is the de facto Source 2 SDK, maintained as a fork by Facepunch, with Valve changes merged in.
  • Debate over Valve’s trajectory: earlier era of strong SDK/mod support vs. current focus on Steam and a few big games; some push back, citing continued mod support (e.g., TF2 SDK) and long-lived Source 1 mod scenes.

Licensing, Commercial Use & Platform Support

  • Repo license is MIT plus a requirement to retain copyright notices; but Source 2’s closed license still governs distribution.
  • Existing deal requires publishing through Steam; details (pricing parity, exclusivity, launch timing) are unclear, and docs now warn not to distribute exported games yet.
  • Currently Windows-only, despite Source 2 and .NET being theoretically cross‑platform; users hope this is temporary.

Positioning vs Engines & Roblox

  • Many view S&box as closer to Roblox: a host game exposing APIs for user‑made game modes, with a playtime-based revenue fund.
  • Standalone exports would move it closer to Unity/Godot territory; this depends on further agreements with Valve.
  • Some welcome another serious alternative to Unity/Unreal; others argue there are already many engines and S&box may struggle to stand out.

Technology & Tools

  • S&box is described as a heavily modified Source 2 build, adding a scene-based system, its own Unity-like editor, and a C#/.NET framework.
  • It can also use Source 2’s Hammer editor, which some praise as one of the few robust level‑design tools remaining.
  • There’s curiosity about how they turned a map-based engine into a scene-based one and how C# sandboxing is implemented.

Facepunch, Community & Culture

  • Facepunch is portrayed as a highly successful, developer-driven studio with a history in moddable sandboxes (Garry’s Mod, Rust).
  • Some lament stricter moderation/monetization decisions compared to the “old” mod‑friendly era.
  • Repo profanity is widely noted and mostly treated as humorous, even linked to a claim that “swearier code” can be higher quality.
  • There’s criticism of relying on Discord for docs/community, especially given Facepunch’s own past forum shutdown.

Linux & Anti‑Cheat (Tangential Debate)

  • Facepunch’s weak/nonexistent Linux support (e.g., Rust official servers) is criticized.
  • One side argues kernel-level anti‑cheat on Linux is too weak, attracting cheaters and justifying blocking Linux clients.
  • A lengthy opposing view frames kernel anti‑cheat as an unacceptable attack on user control and computing freedom, arguing cheating is a lesser evil than invasive system software.
  • Others counter that online games are communal experiences and that effective anti‑cheat is necessary, even if it limits some platforms.

Don't Download Apps

Privacy Concerns: Apps, Phone Numbers, and Tracking

  • Many commenters avoid installing vendor/restaurant apps and refuse giving real phone numbers or emails at checkout, seeing them as tracking IDs akin to Social Security numbers.
  • Loyalty programs tied to phone numbers are viewed as pervasive and manipulative; people share fake or old numbers as a workaround.
  • Several report staff trying to take their phone to “set up the app,” which they see as reckless from a security perspective.

Apps vs Websites: Who Tracks More?

  • One camp argues native apps are more dangerous: broader APIs (contacts, sensors, Bluetooth, etc.), persistent identity, ad SDKs, and potential OS or SDK bugs enabling location and behavioral tracking beyond explicit permissions.
  • Another camp counters that modern OS permission models and sandboxes limit apps, while web APIs (geolocation, accelerometer, Bluetooth, fingerprinting) plus cross-site tracking and cookies make browsers equally or more invasive.
  • There’s debate over whether apps can track location without permission; some cite research/SDK exploits, others say this still hinges on OS-level bugs, not normal behavior.
  • VPNs, DNS filters, and app firewalls (NetGuard, RethinkDNS, Pi-hole, NextDNS) are widely recommended, but limitations, leaks, and usability trade‑offs are noted.

PWAs, Broken Mobile Web, and Engagement

  • Many use PWAs or mobile web versions for social media and services, partly because they’re worse experiences and thus reduce addictive usage.
  • Strong suspicion that large companies intentionally cripple mobile web (e.g., Uber, Instagram, Reddit, Messenger) to funnel users into apps, sometimes just WebView wrappers with more device access.
  • Others note that some PWAs (Mastodon, Phanpy, Photoprism) can be excellent, but browser and platform vendors keep tightening the screws on PWAs.

Payments, Loyalty, and Surveillance/Price Discrimination

  • Stories of Amazon Fresh and Walmart preferring physical cards or proprietary wallets over Apple Pay are interpreted as attempts to maximize tracking and avoid Apple’s fee/control.
  • Disagreement over “surveillance pricing”:
    • Critics believe app-linked identity + data brokers + payment data will enable individualized dynamic pricing (e.g., knowing pay cycles, habits).
    • Skeptics say apps are mostly modern coupon books/loyalty programs; price discrimination already existed via paper coupons and email lists, and there are legal limits on financial-data sharing.

Binding Arbitration and Terms of Service

  • Big concern that installing apps or using online services silently enrolls users into binding arbitration and class‑action waivers, potentially affecting offline harms (Disney example).
  • Others argue this problem is not app-specific; similar clauses apply across websites and many services, and only legislation can fix it.

Defensive Practices and Structural Limits

  • Common personal strategies: minimal app sets (banking, messaging, browser), PWAs for “optional” services, deep-sleeping or firewalling most apps, using alternative frontends (e.g., Friendly Social Browser, NewPipe), and sometimes refusing smartphones entirely.
  • Several commenters doubt “vote with your wallet” will work against large platforms and call for strong regulation (limits on tracking-for-service, large fines, stricter control of arbitration).

Alan.app – Add a Border to macOS Active Window

Perceived problems with modern macOS UI (Tahoe/Sequoia)

  • Many commenters feel recent macOS UI is “hostile to users”:
    • Hard to distinguish overlapping or tiled windows; need for Alan.app seen as evidence.
    • Excess padding and low contrast reduce usable space and legibility.
  • Some say Apple has shifted from usability to visual appeal, and now achieves neither.
  • Others report no issues with Tahoe, suggesting experience may vary by workflow or sensitivity.

Responsibility and design culture at Apple

  • Debate over blaming a specific design executive vs recognizing broader organizational responsibility.
  • One side: executives have “command responsibility”; if interfaces worsen, the VP in charge should be accountable or replaced.
  • Other side: focusing on one person is simplistic; decisions involve many stakeholders and higher-level strategy.

Focus, input routing, and active-window issues

  • Complaints that after Cmd+Tab or desktop switching, input still goes to the previous app for tens–hundreds of ms, causing accidental quits or pastes.
  • Some non‑macOS users find this a potential dealbreaker; others note Windows has its own focus/stacking bugs.

Existing tools and alternatives

  • Multiple tools already solve similar problems: JankyBorders, BorderMe, HazeOver, tmux borders, Hammerspoon scripts, Pop!_OS Cosmic’s built‑in active-window border, and various Linux tiling WMs.
  • Comparison notes: JankyBorders’ border moves more smoothly with windows; Alan’s border lags more.
  • Several people are surprised such a basic feature isn’t in macOS Accessibility settings.

Implementation details and performance

  • One commenter infers, and the developer confirms, use of Accessibility APIs plus a transparent NSWindow overlay driven by notifications and a timer.
  • This design should be stable across OS updates but introduces visible lag, which some consider unacceptable, others minor.
  • Consensus that perfect tracking likely requires a first-party OS feature.

Accessibility, aging, and “app vs setting” debate

  • Older users describe needing cursor and focus aids; tools like HazeOver significantly reduce eye strain.
  • macOS “Increase contrast” can draw borders around windows, partially addressing the issue.
  • Some dislike tiny scrollbars and fixed shadows; others want less visual noise.
  • Brief argument over whether such tweaks should be standalone apps vs simple system settings or scripts.