Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 161 of 524

Switching from GPG to Age

Scope: what age does vs what GPG/PGP does

  • age is praised as “super clean” because it only does file encryption; some see this narrow scope as its main virtue.
  • Multiple commenters argue that calling this “switching from GPG” is misleading unless it explicitly means “for file encryption only.”
  • GPG/PGP are described as multi‑purpose: encryption, signing, key management, web of trust, email integration, smartcard use, SSH auth, commit signing, release signing, multiple recipients, revocation, etc.
  • age does not cover signing, identity, web-of-trust, or key discovery; minisign/signify only cover signing. None are viewed as full PGP replacements, just simpler subsets.

Who actually uses PGP, and for what

  • One camp claims almost everyone outside a small niche only ever used GPG for one-off file encryption, so age is sufficient and more adoptable.
  • Another camp argues PGP is still foundational: used by Linux distributions and critical infrastructure for package signing, by security teams for disclosures, and by serious engineers for commit signing, reviews, SSH, passwords, etc.
  • There’s disagreement over how often PGP is actually used in bug bounties and disclosures; some say PGP-encrypted reports are rare and not correlated with severity, others say they are rare but high quality and important.

Identity, public keys, and “security theater”

  • A workflow where admins demand a public key before sending credentials via Slack is debated.
  • Critics argue this is “security theater” if the key is not authenticated; it doesn’t solve identity verification.
  • Defenders note that PGP provides mechanisms (fingerprints, web of trust, key signing, Keyoxide-style proofs), but admit the specific described workflow omits them.
  • There’s broad agreement that identity verification is orthogonal to the crypto primitive; without independent key verification, any scheme is weak.

PGP as “digital passport” vs overcomplex relic

  • Advocates frame PGP as the only broadly standardized decentralized cryptographic identity layer (“internet passport”) and emphasize smartcards, long-lived keychains, backup, rotation, discovery, and revocation.
  • They highlight modern tooling (e.g., keyfork, AirgapOS, smartcards, Keyoxide, WKD, new keyservers) as mitigating old UX and keyserver problems.
  • Critics argue PGP/OpenPGP itself is a 1990s design with deep architectural issues, not just bad implementations like GnuPG. They liken it to OpenSSL used for everything and say most competent modern systems prefer more purpose-built tools.
  • A recurring tension: PGP’s “Swiss Army knife” nature vs the modern preference for small, composable tools (age, minisign, SSH signing).

SSH keys, signing, and supply-chain security

  • Some use SSH keys for Git tag and binary signing (with GitHub’s verification UI) and find this much easier to deploy than PGP.
  • Others call SSH signing an abuse: SSH keys were meant for session auth, not long-lived signatures; using one key for multiple roles complicates rotation and revocation.
  • There’s debate whether identity management and key discovery should live inside the cryptosystem (PGP-style) or in higher-level, domain-specific layers.

Agents, password managers, and web auth

  • gpg-agent is valued for SSH-agent functionality and letting tools like pass keep secrets encrypted at rest; this is a sticking point for some considering migration.
  • Others complain GPG’s smartcard behavior (e.g., lack of PIV/PKCS#11 support) interferes with other applications and prefer to remove it.
  • Several age-based password managers and agents are mentioned as alternatives, with people reporting successful real-world switches.
  • There is curiosity (but no clear answer) about using gpg-agent/gpgme-json for WebAuthn/passkeys; capabilities here remain unclear in the thread.

Post-quantum concerns

  • Some question whether age is “post-quantum.”
  • Discussion notes: age uses a symmetric file key plus public-key wrapping; symmetric keys are 128-bit, and current public-key algorithms are not PQ.
  • One comment (citing the age author) claims 128-bit symmetric keys are sufficient for PQ security and that PQ public-key integration is blocked in standards bodies; others still recommend waiting for fully PQ-safe public keys before migrating for long-term archives.
  • There is general unease about adopting new non-PQ schemes in 2025 for long-lived backups, though opinions differ on urgency.

Adoption, complexity, and philosophy

  • age is seen as far easier to introduce into teams than GPG, which many consider a non-starter due to UX and conceptual overhead.
  • Pro-PGP participants argue that the complexity reflects real requirements (backups, rotation, non-centralized trust) and that lighter tools ignore these and set users up for future failures.
  • Opponents counter that most real-world users don’t need or use those features, and that PGP’s complexity and poor ergonomics have prevented it from fulfilling its own ambitions outside a small, specialized community.

Why aren't smart people happier?

Questioning the premise

  • Several commenters argue the premise is shaky: meta-analyses show only tiny correlations between IQ and self‑reported happiness, and in many data sets smarter people are slightly more satisfied.
  • Others note happiness appears strongly dispositional/genetic with a personal “set point,” so expecting intelligence to shift it much may be a category error.
  • Some say the question is like asking “Why aren’t tall people kinder?”—intelligence and happiness are largely orthogonal traits.

Definitions and measurement

  • Long debate over what “smart” means: IQ, problem‑solving, creativity, emotional intelligence, wisdom, or real‑world “poorly defined” problem solving.
  • Likewise, “happiness” is variously framed as pleasure, life satisfaction, contentment, lack of suffering, or meaning; many think the term is too vague.
  • Self‑report surveys of happiness are criticized: people interpret “Are you happy?” relative to different baselines, answer styles may differ by intelligence, and the hedonic treadmill keeps average scores flat despite material progress.

Why intelligence might reduce happiness

  • Awareness: smarter people may better see systemic injustice, suffering, power imbalances, propaganda, and existential risks—“ignorance is bliss.”
  • Overthinking: rumination, “paralysis by analysis,” thought spirals, and trying to solve emotional problems with abstract reasoning can fuel anxiety and depression.
  • Expectations: gifted kids are told they’ll do great things, then collide with ordinary constraints, diminishing returns, and failure; high standards and perfectionism undermine satisfaction.
  • Social mismatch: being far from the mean IQ can lead to loneliness, feeling “out of sync,” being resented or sabotaged, or bullied as “weird.”
  • Identity: some smart people tie self‑worth to success, career status, or being “the smart one,” which makes setbacks and ordinary outcomes feel like personal failure.

Why intelligence might help or not matter

  • Others argue intelligence improves income, health, problem‑solving and thus should raise average life satisfaction; any lack of correlation may be due to overcontrolling variables or bad happiness measures.
  • Multiple commenters stress emotional intelligence, virtues, relationships, and wisdom as far more central to well‑being than raw cognitive horsepower.

Society, work, and meaning

  • Many point to capitalism and modern work: endless promotion games, “solving imaginary problems” in tech, consumerist messaging that stokes discontent, and social media outrage.
  • Smarter people may see the “cage” more clearly but still feel trapped in it, especially when doing work they perceive as pointless.

Suggested antidotes

  • Recurrent themes: cultivate gratitude, contentment, close relationships, community with intellectual peers, philosophy or spirituality, and focus on meaning or contribution rather than chasing happiness directly.

Norway reviews cybersecurity after remote-access feature found in Chinese buses

How the hidden connectivity was found

  • Commenters say Norwegian testers used a “Project Lion Cage”-style setup: vehicles taken underground / into a Faraday-like environment with spectrum analyzers to see where they transmit.
  • Romanian SIM cards were physically found; some speculate eSIMs would be harder to spot physically but still discoverable via RF testing.

Capabilities and risk of remote access

  • The undisclosed connection allowed: software updates, diagnostics, and control of battery/power systems; test team concluded buses could be remotely stopped or bricked.
  • Several note: bricking via OTA is trivial; making OTA safe and reliable is the hard part.
  • Others worry about more extreme scenarios (e.g., overheating batteries, coordinated shutdowns), though some think safety hardware and physical fuses limit worst‑case outcomes.

“This is normal” vs “this is different”

  • One side: essentially all modern vehicles have SIMs, telemetry, OTA updates; John Deere, Tesla, eCall, etc. Already remotely updatable or disable‑able in practice.
  • Other side: these SIMs were not disclosed in procurement; this is far beyond simple diagnostics and not “standard” for road vehicles, especially for critical infrastructure.
  • Disagreement over how many cars/buses are truly “fully remotely controllable” versus just updatable.

Broader cybersecurity and IoT concerns

  • References to Polish trains with anti‑repair geofencing and GPS “kill codes”; car hacking research; worries about a future worm (Petya‑class) hitting huge IoT and vehicle fleets.
  • People highlight similar or worse backdoors in Western tech (motherboards, routers, smart home gear, hospital devices) and note that if your transport is online, it can in principle be hacked.

China, politics, and procurement strategy

  • Split between those seeing justified national‑security concerns (Chinese state‑linked firms, ability to disrupt logistics in war) and those seeing trade‑war FUD and selective outrage.
  • Extended debate about EU blocking a big European train merger vs fear of a dominant Chinese rail/bus supplier; tension between antitrust, corruption in tenders, and security‑driven protectionism.
  • Some advocate outright excluding Chinese vendors from critical contracts or imposing tariffs; others prefer stricter software/audit rules applied to all suppliers.

Why buses are online & proposed mitigations

  • Practical reasons cited: live location tracking, accurate arrival times, remote CCTV viewing, diagnostics, and OTA maintenance.
  • Proposals include: mandatory source disclosure to regulators with reproducible builds, third‑party audits, and ripping out opaque “black box” controllers where trust is impossible—while others note you can’t truly prove the absence of backdoors.

Open Source Implementation of Apple's Private Compute Cloud

Capabilities and Architecture

  • OpenPCC is described as essentially an attested, anonymous HTTP server wrapper: “inference” is the first workload, but any HTTP-based workload (e.g. anonymization pipeline) can run inside the compute node.
  • One suggested use: wearables or AR devices sending sensitive logs (e.g. faces) through OpenPCC to an anonymization service, so developers can debug without seeing raw private data.
  • If anonymization can be done on-device, commenters note that’s simpler, but OpenPCC provides a server-side option.

Privacy Guarantees and Limitations

  • The system aims to ensure that operators of inference hardware cannot see prompts, via TEEs/vTPMs, attestation, and no SSH/administrative access.
  • Clarification from the implementers:
    • Clients only talk to nodes that present valid attestation bundles.
    • Compute node filesystems are measured (e.g. via dm-verity) and published in a transparency log; in practice this implies source publication for those images.
    • Prompts are encrypted to node-specific keys that live only in the vTPM; a different machine cannot decrypt them.
  • Multiple commenters warn against overstrong claims like “no one can see your prompts,” noting TEEs typically do not meaningfully resist physical attacks by a determined operator or state.

Comparison to Other Confidential-Compute Efforts

  • Compared with simpler setups (VPN + anonymous crypto payments + direct inference provider), this adds attestation and “non-targetability”: the idea that even a compromised operator cannot reliably steer a specific user’s traffic to a compromised machine.
  • Apple’s PCC, AWS Nitro Enclaves, Azure confidential inference, and GPU enclaves from NVIDIA/AMD are cited as similar or adjacent systems.
  • Some argue cloud TEEs still boil down to “trust the provider’s tooling and hardware vendor,” versus hardware-only roots of trust.
  • Another project (privatemode.ai) is mentioned as a commercial analogue; licensing differences (Apache 2.0 vs BSL) are noted.

Legal and Abuse Considerations

  • A long subthread debates whether truly private/censorship-resistant compute enables storing illegal material (e.g. CSAM, stolen secrets) that providers cannot detect or selectively remove.
  • Others counter that encrypted blobs are already widely hosted (e.g. cloud storage) and point to existing liability regimes (e.g. takedown-on-notice, Section 230, banking analogies like safe deposit boxes).
  • Anonymous crypto payments in the EU may be restricted or effectively treated as money laundering; status is described as unclear but trending restrictive.

Threat Models and Trust Roots

  • Some commenters insist that physical access by operators (or state actors) means privacy cannot be “provable”; live migration and hardware attacks are discussed as realistic vectors.
  • There is debate about which root of trust is acceptable (US vs European vendors, intelligence-agency influence, secret courts).
  • Apple PCC’s “non-targetability” and heavy reliance on independent auditing are seen as raising the bar but still not eliminating the need to trust large vendors.

Use Cases and Skepticism

  • One thread questions what non-malicious workloads people would actually run this way; others respond that any remote LLM use on proprietary or sensitive data is a natural fit.
  • Concrete examples include: private code analysis, debugging helpers, or cross-component tracing on large, proprietary codebases where outputs can be verified but inputs must stay confidential.
  • Some participants see privacy as inherently desirable even for ostensibly non-sensitive or open-source-related work; others are more skeptical and emphasize running local models instead when feasible.

Miscellaneous

  • There is support for the project’s open-source/Apache 2.0 approach and availability of source and attestation, contrasted with closed or BSL’d alternatives.
  • Clarification that despite “chatbot” branding, the architecture is generic and can host arbitrary HTTP workloads.

Ruby and Its Neighbors: Smalltalk

Smalltalk’s Image: Power and Controversy

  • Many comments highlight the “image” (a snapshot of the entire object graph) as Smalltalk’s most impressive feature: live state can be frozen, moved, and resumed, even across decades of evolution.
  • Others argue the same concept limited appeal: shipped images captured opaque, one-off states with no obvious build recipe, unlike today’s library‑ and file‑based ecosystems.
  • Some note that modern systems (macOS autosave, giant shared-library images, Docker) have gradually reinvented parts of this idea.

Versioning, Build Discipline, and Team Workflows

  • Critics claim images encouraged “cowboy coding” and made multi‑developer work and reproducibility hard.
  • Defenders respond that Smalltalk had method-level versioning, change logs, and sophisticated tools like Envy/Monticello and team workflows since the 1980s; the image should be treated as a throwaway cache, not the source of truth.
  • A recurring theme is that real pain points were lack of modularisation and global namespaces, plus cultural habits, not inherent image technology.

Malleability, End Users, and Comparisons with the Web

  • Smalltalk’s full introspection means end users can, in principle, inspect/modify everything. Some see this as a nightmare, others as a freedom feature akin to browser devtools.
  • In practice, deployed images can be stripped of tools, locked down, and wrapped as normal executables. Some systems also reset state on startup.

Deployment, Tree Shaking, and “OS Within an OS”

  • Questions about how commercial Smalltalk apps were delivered get answered: packagers “shake the tree”/strip dead code from the image, add a small native launcher, and ship a single executable.
  • The runtime can be made indistinguishable from a normal native app; no development UI needs to be exposed.

Live Environment vs Reproducibility

  • Several people praise the “you are in the running environment” experience: halt‑and‑continue, editing missing methods at breakpoints, and zero restart cost.
  • Others emphasize that this conflicts with reproducible debugging; they prefer deterministic replays, property-based testing, and database-backed workflows.

Smalltalk, Ruby, and Other Descendants

  • Ruby is seen as inheriting Smalltalk’s object model but not its image‑centric workflow; Rails pushed Ruby toward conventional file/VCS tooling.
  • Java is said to have “won” partly by being free, integrating better with existing tools, and being championed by vendors who had previously backed Smalltalk.
  • Newspeak, Elixir, and modern IDEs are mentioned as spiritual or partial successors to Smalltalk’s ideas, though none fully replicate the original image-centric vision.

Ask HN: My family business runs on a 1993-era text-based-UI (TUI). Anybody else?

Where TUIs Still Run Critical Work

  • Commenters report TUIs still active in retail (big-box chains, warehouse clubs, specialty stores, restaurants/bars), logistics and trucking, lumberyards, agriculture equipment service, utilities, insurance, banking, telecom, medical/billing, postal systems, universities/libraries, and manufacturing/ERP.
  • Many run on AS/400, mainframes, HP3000, AIX/Unix, SCO, Pick, MUMPS, COBOL, xBase (dBase/FoxPro/Clipper), and even 80s home computers under emulation or original hardware.

Why Businesses Keep TUIs

  • Core reasons: reliability, low operating cost, and the risk/expense of migration from heavily customized, poorly documented legacy logic.
  • For many SMBs, the existing system “does everything we need,” and rewriting would not clearly pay off.
  • Hardware is often virtualized/emulated instead of replaced, extending life further.

Efficiency, Speed, and UX Characteristics

  • Strong consensus that well-designed TUIs are extremely fast:
    • Keyboard-only control, no mouse travel.
    • Fixed layouts with no scrolling, so information always appears in the same place.
    • Input buffering/type-ahead lets expert users enter multiple screens of actions before the system finishes drawing.
    • Stable hotkeys and menus allow deep muscle memory; operators can process orders in real time as customers speak.
  • Several recount major productivity drops when TUI systems were replaced by “modern” GUI/web front-ends.

Training, Labor, and Discoverability

  • TUIs are repeatedly compared to musical instruments or Vim: steep initial learning curve, very high ceiling.
  • Works best where employees stay long and perform repetitive domain-specific workflows.
  • Some argue today’s higher turnover and casual/consumer users push toward GUIs with better discoverability and less training.

Arguments for Modern GUIs/Web UIs

  • Some point out that GUIs can be just as keyboard-centric and fast, but rarely are designed that way; modern UX often prioritizes aesthetics, marketing, and developer convenience over efficiency.
  • Others are skeptical of the “perfectly tuned old TUI” narrative, noting that many such systems are unmaintained, bug-ridden, and effectively held together by user workarounds.

Modernization Patterns and Tools

  • Common strategies: wrap TUIs with web/GUI shells, expose APIs, scrape via terminal emulators/SendKeys, or replicate TUI behavior in web SPAs.
  • Several mention modern TUI frameworks (for Rust, Python, Go, etc.) and hybrid systems: TUI for internal power users, GUI/web for external or occasional users.

Carice TC2 – A non-digital electric car

Meaning of “non-digital / analog”

  • Several commenters note the title is misleading; the site doesn’t claim the car is analog, just retro.
  • “Analog” is interpreted as “no screens / touch UI,” not “no electronics.” People stress that EVs must have digital controllers (BMS, inverter, charger, etc.).
  • Some discuss that even old cars with dials used stepper motors and ECUs; lay use of “analog” is mostly “no displays or apps on the dash.”

EV components, standardization & repairability

  • One detailed comment explains that many EV components are shared across platforms: motors, inverters, onboard chargers, DC/DC converters and connectors are often supplier-made and somewhat interchangeable.
  • Battery packs are usually model‑specific; modules may be shared within a brand; cells are generic but hard to replace; BMS is typically bespoke.
  • Swapping components often requires OEM coding or firmware, with expensive or locked tools; aftermarket support is sparse, so DIYers rely on salvaged parts and cracked software.
  • This is framed as a continuation of broader modern-car trends, not unique to EVs.

Connectivity, privacy & “offline” cars

  • Strong desire for EVs that are not cloud-connected; many would accept analog-style controls or BYOD infotainment if it meant no tracking.
  • Examples cited: removing SIMs, unplugging telemetry modules, and concerns over hidden modems, “placebo” SIMs, and mandated systems like eCall.
  • Some argue that connected features (remote climate, maps, charger data, eCall) are genuinely useful; others want an “airplane mode” with hard guarantees, logging, and third‑party audits.
  • Debate over whether companies would go as far as covert SIMs; some call this paranoia, others point to broader patterns of telemetry and dark patterns.

Price, market positioning & practicality

  • Base price around €44.5k ex‑VAT (~€54k with Dutch VAT) leads many to categorize it as a “toy for the well‑off” or a second/third car, not a people’s EV.
  • Others counter it’s comparable to a Tesla Model 3 or hot hatch and not “country club only” money, especially given low-volume EU manufacturing.
  • Seen as closer to a leisure roadster (MX‑5 / Porsche 356 homage) than a family car or Ikea hauler.

Design, specs, charging & safety

  • Praised for being small, light (~590–630 kg) and visually classic; criticized by some as toy-like or plasticky.
  • Concerns about the shiny metal dash causing glare; multiple calls for matte/wood/leather options.
  • Modest power (~56 hp) and lack of visible modern safety systems (airbags, advanced driver aids) prompt worries about crashworthiness; many frame it as an acceptably risky weekend toy.
  • Range (200–300 km from a 31.5 kWh pack) is seen as adequate for dense European regions, but absence of DC fast charging makes it clearly non-ideal for long trips.

Removing XSLT for a more secure browser

Who Is Removing XSLT and Why

  • Chrome is deprecating built‑in XSLT; Firefox and WebKit have publicly signalled support for removal as well.
  • Stated reasons: tiny usage, large/complex code path, and multiple serious vulnerabilities in libxslt and related XML code that’s effectively under‑maintained.
  • Some commenters dispute that other vendors truly “agreed to remove it,” arguing they only agreed to explore removal and also mentioned options like sandboxing or replacement implementations.

Security vs. Maintenance vs. Motive

  • Pro‑removal side: XSLT’s engine parses untrusted input via old C libraries with long‑lived memory‑safety bugs; modern fuzzing keeps finding 20‑year‑old issues. Maintaining this niche feature forever is not worth the ongoing security and engineering cost.
  • Critics argue security is a pretext: Chrome could ship the same WebAssembly/JS polyfill they recommend to site authors, which would sandbox XSLT like any other script.
  • Others note Chrome simultaneously keeps adding much riskier, vendor‑driven APIs (WebUSB, WebBluetooth, etc.), so “shrinking attack surface” appears selective.

Value and Use of XSLT

  • Fans describe XSLT as a powerful, concise, declarative tree‑transformation language, especially for XML‑centric domains (publishing, standards, finance, government, JATS, trade settlements). It enables templating and XML→HTML rendering without JavaScript.
  • Several real production uses are cited: gov/legislative XML, weather data, enterprise integrations, RSS/Atom and sitemap styling, CMSs, directory listings.
  • Critics say XSLT is painful, hard to debug, a Turing tarpit in XML, and effectively replaced by JS + JSON + template libraries; many projects already do transforms server‑side.

Backward Compatibility and “Open Web” Concerns

  • One camp sees this as breaking an old, standardized web feature and violating the “don’t break the web” norm; worries about big vendors unilaterally shrinking the standards surface and marginalizing XML‑based content.
  • Others reply that near‑zero usage plus availability of server‑side transforms or polyfills makes this an acceptable, even necessary deprecation; browsers are not obliged to support every spec feature forever.

Alternatives and Mitigations

  • Suggested paths: server‑side XSLT (often already used for XSLT 2.0/3.0), JS/wasm polyfills (including an official one), possible extensions, or content negotiation for feeds.
  • XPath DOM APIs remain, so Selenium/Playwright XPath locators are unaffected.
  • Some argue vendors should instead have funded a modern Rust XSLT engine or adopted projects like Xee; others see deprecation of rarely used APIs as healthy for an overgrown browser platform.

Microsoft Can't Keep EU Data Safe from US Authorities

Microsoft, CLOUD Act, and French Testimony

  • Commenters note the testimony is from July and focus on the claim that no US data requests have yet occurred.
  • Some accept that, under oath in France, lying would be risky, especially given potential espionage charges if French state data were involved.
  • Others are deeply skeptical, pointing out US gag orders, the possibility of “rogue” staff or US-controlled access paths, and Microsoft’s prior marketing assurances to EU lawyers that now appear misleading.

Sovereign Cloud and “Trusted Subsidiaries”

  • The idea of a “trusted” local subsidiary with only local citizens is seen as weak protection.
  • Core concern: control flows through US-written software, global admin/support teams, and mandatory updates. A “security update” could exfiltrate data without local knowledge.
  • Several argue “sovereign clouds” from US hyperscalers are mostly compliance theater that satisfies checkboxes but not real sovereignty.

CLOUD Act vs GDPR and Legal Structure

  • Many say the incompatibility of CLOUD Act and GDPR has been obvious for years; US companies must be treated as unsafe third-country processors regardless of where data sits.
  • Debate over whether non‑US multinationals with US subsidiaries (e.g., OVH) are effectively under CLOUD Act reach; some cite OVH’s own FAQ acknowledging possible extra‑territorial requests.
  • Others argue foreign parents are outside US jurisdiction in theory, but note the US often uses economic and political coercion in practice.

Technical Limits of Protection

  • Strong end‑to‑end encryption and minimal data collection are seen as the only robust defenses.
  • But cloud isn’t just storage: for compute, plaintext and keys must exist in RAM somewhere, giving cloud operators (and thus their governments) theoretical access.
  • Confidential computing (Intel TDX, AMD SEV, enclaves) is mentioned but distrusted due to past side‑channel breaks and opaque hardware.

EU Dependence and Strategic Response

  • Several highlight EU’s deep dependence on US tech stacks (cloud, OS, chips, SaaS), calling it a severe strategic weakness.
  • Some foresee or advocate a slow but inevitable shift: EU‑only clouds, local chip/OS initiatives, more on‑prem/self‑hosted and open‑source alternatives.
  • Others stress the migration cost and political reluctance, noting that tenders still heavily favor US providers despite clear national‑security risks.

Radiant Computer

Accessibility & UI Concerns

  • Multiple commenters worry a “clean-slate” OS will neglect accessibility, especially for blind users and screen readers.
  • Some argue accessibility can be layered on later if the GUI exposes proper metadata and state; others counter that good screen readers need deep integration and stable element identity, which is hard to retrofit.
  • There’s also a broader notion of “accessibility” as approachability for non-experts, which the project claims to care about.
  • Visual design of the site (low-contrast grey-on-grey) is criticized as unfriendly and “loading-screen-like,” reinforcing concerns.

AI‑Native OS: Interest vs Distrust

  • The “AI-native” positioning is polarizing. Some are intrigued by an OS designed from the ground up with local models and structured app metadata, seeing it as a fix for today’s bolted‑on AI.
  • Others view AI as inherently untrustworthy or at odds with the project’s stated values of human-centric, simple, tractable systems.
  • Concerns include ethical training data, hardware practicality (FPGA vs GPU for local LLMs), and fear that AI integration undermines the anti‑surveillance, anti‑social‑media ethos.

Clean‑Slate Stack: Hardware, OS, Language

  • Ambition: custom RISC‑V hardware, exokernel‑like/single‑address‑space OS, new systems language (Radiance/Rʹ), tight HW–SW co‑design, no default browser, emphasis on local-first, capability security, REPL‑centric, easily scriptable GUI.
  • Some praise the willingness to rethink everything, comparing it to BeOS, Smalltalk, Rebol-style live systems, or past semantic OS ideas.
  • Others question inventing a new language instead of using Rust/Zig, and criticize the “first principles” rhetoric as vague manifesto rather than grounded design.

Substance, Maturity, and Risk of Vaporware

  • By the project’s own status/log, work is at the compiler/bootstrap stage (Rʹ parser/compiler); no UI, device, or booting OS yet.
  • Many see the site as concept art: sweeping goals (OS, language, hardware, AI) but few concrete artifacts, making people doubt feasibility without large resources.
  • A minority view that as acceptable for an early exploratory experiment, valuing the “north star” vision even if it never ships.

Site Aesthetics and Communication

  • Artwork and copy are widely perceived as AI-generated or “LLM‑ish”: grandiose, repetitive, buzzword-heavy, and more polished than the underlying tech.
  • Some find the retro‑futurist aesthetic inspiring; others say it makes the project feel like vapor, a TV show promotion, or “art school project.”

Compatibility, Networking, and Social Aspects

  • Several note that without browsers or support for mainstream apps (e.g., Discord), a new system is hard to adopt in practice, regardless of technical merit.
  • The “no social networking” principle is divisive: some love escaping social media; others argue social networks are the most valuable part of modern computing.

NY school phone ban has made lunch loud again

Perceived harms of smartphones & social media

  • Many see phones, especially social media, as broadly harmful: addictive, attention-sapping, worsening teen depression and suicide, and displacing play-based childhood. Smartphones are repeatedly compared to cigarettes.
  • Feeds are characterized as “casino psychology” designed for engagement, not well‑being; social media is seen as structurally incapable of aligning with kids’ interests.

Support for school phone bans

  • Strong support for “bell-to-bell” bans: phones are viewed as unnecessary during the school day and deeply undermining classroom attention.
  • Multiple commenters report that after bans (NY, CA, Australia, parts of Europe, Texas), lunchrooms became noisy again and face‑to‑face interaction increased.
  • Some describe bans as “letting kids be kids again” and an overdue correction after COVID-era, device-led education.

Concerns, edge cases & enforcement

  • Biggest resistance is said to come from parents who demand constant contact and justify phones as safety tools, though others argue a child with a phone can’t fix emergencies the school can’t.
  • Enforcement is hard: examples of policies where phones must be turned in but teachers can’t remove noncompliant students; detentions often ignored. Burner/second phones are reportedly emerging.
  • Some worry about authoritarian overreach, lack of trust, and strike-based punishment systems.

Impact on learning, AI & classroom tech

  • Students report previously using phones/AI during class to answer questions; bans now force actual searching and reading.
  • Teachers say allowing phones in pockets set them up to fail; policing dozens of addicted adolescents is unrealistic.
  • Broader critique that shifting from teacher‑led to device‑led instruction (accelerated by COVID) weakened teacher authority and increased off‑task behavior; several argue most K‑12 instruction should be largely screen‑free.

Social development & lunchroom dynamics

  • Many respondents recall loud cafeterias as where they learned key social skills; a silent lunchroom feels “unnatural” and worrying.
  • Others counter that cafeterias can also be centers of exclusion and bullying; phones sometimes served as a refuge.
  • Neurodivergent and noise‑averse students describe loud spaces as painful; several suggest schools provide both quiet (library, outside corners) and loud social areas.

Responsibility, regulation & politics

  • Debate over whether tech companies merely give people what they want versus knowingly promoting harmful behavior.
  • Tension between calls for regulation (banning kids from social media, taxing engagement‑optimized platforms) and arguments about parental responsibility and liberal freedoms for teens.
  • Side debates touch on U.S. First Amendment filming rights in public schools and broader distrust of both big tech and “big government” solutions.

The kind of company I want to be a part of

How Much Do Pluralization Details Matter?

  • Some see the article’s concern as overreaction: pluralization is nice but ranks below higher-impact work like accessibility, main workflows, or performance.
  • Others argue “death by a thousand paper cuts”: each small rough edge signals lack of care and, in aggregate, degrades user trust and perceived quality.
  • There is broad agreement it’s a tradeoff: polishing copy vs shipping sooner; maturity is knowing where to draw that line.

Internationalization and Linguistic Complexity

  • Several comments note that naive n == 1 ? "item" : "items" only works for English and even then misses edge cases like zero.
  • Examples from Polish, Russian, Slovenian, Ukrainian, and Korean show complex plural and case systems, dual forms, and context-dependent endings.
  • This is used both to:
    • Argue that “(s)” is a pragmatic, language-agnostic hack when translation frameworks just substitute strings.
    • And to argue the opposite: “(s)” only works for English-like languages and falls apart elsewhere; proper i18n frameworks with plural rules (e.g., CLDR, Qt, Fluent) are preferred.
  • Some teams avoid pluralization entirely by restructuring text: e.g., “Files scanned: 3” rather than “Scanning 3 file(s)”.

Craftsmanship vs. Pragmatism and Business Pressures

  • Many read the post as being about craftsmanship: caring about small details as part of professional pride, akin to well-made furniture.
  • Others push back: obsessing over pluralization can become bikeshedding or “garnish over meal” if core functionality is shaky.
  • There’s a “broken windows” view: tolerating sloppiness in small things invites bigger defects and vulnerabilities.
  • Counterpoint: modern software is often bad not because developers don’t care, but because ad-driven business models and management incentives prioritize metrics and speed over quality.

Signals, Trust, and the Brown M&M Analogy

  • Some liken pluralization to Van Halen’s “no brown M&Ms” rider: a trivial detail used as a canary for deeper process quality.
  • Others are skeptical of such pop-psych shortcuts; a venue (or company) might ignore the trivial clause yet still do the critical work correctly.
  • Several commenters like these tacit signals but note they must align with reality—“say/mean/do” consistency—rather than being empty polish.

UX Tone and “Soulless Machinery”

  • Views diverge on friendly language and anthropomorphizing software.
  • Some want UIs that feel considerate and “human”; others find this fake-friend tone grating and only care about speed, clarity, and correctness.
  • Non-technical users often equate UI polish with overall quality, even when it hides deep complexity or cross-platform compromises.

iOS 26.2 to allow third-party app stores in Japan ahead of regulatory deadline

Apple’s Motives and Regulatory Pressure

  • Many see Apple as “gatekeeping until forced,” prioritizing its 15–30% app tolls and fast‑growing services revenue over openness.
  • Commenters argue the behavior is rational profit‑maximization for a public company, but short‑sighted: it erodes developer goodwill and fuels hostile regulation and regional fragmentation.
  • Others think Apple is intentionally bargaining with regulators: don’t concede early, wait for concrete demands, then comply minimally to preserve fees and control.
  • Several blame current leadership for turning Apple from a hardware‑first firm into a toll collector; some call for leadership change, but note shareholders are very happy with the cash flows.

Malicious Compliance and Fragmented Rules

  • EU experience is repeatedly described as “malicious compliance”:
    • Alternative app stores and web distribution exist on paper, but are hemmed in by notarization, Apple review, continued fees, scary UI warnings, and eligibility thresholds (e.g., needing a large existing App Store presence).
    • Result: few meaningful stores, mostly games/emulators/dev tools; some users report shovelware and subscriptions rather than F‑Droid‑style ecosystems.
  • Several note that by fighting every change, Apple now faces a patchwork of regional regimes (EU, Japan, US/Epic), increasing complexity for both Apple and developers.

Security vs. Openness

  • Pro‑Apple side: centralized review and payment give consumers recourse (refunds, dispute handling) and filter out bad actors; governments also like having a single accountable gatekeeper.
  • Critics (including iOS devs) say review mostly enforces Apple’s business rules, not real security:
    • Malicious behavior can be hidden during review; apps can later load new code via cross‑platform frameworks.
    • Real protection comes from OS sandboxing and permission prompts, regardless of app source.
  • Some fear users will be socially engineered into installing shady store apps; others counter that the same scams exist today via the web and that power users should be allowed true sideloading.

User Freedom, Alternative Tech, and Browsers

  • A segment wants:
    • Third‑party stores without Apple notarization,
    • Direct app installs (IPA ≈ EXE/APK) instead of per‑developer “store apps,”
    • Third‑party payment flows, and
    • Real browser engines (not just WebKit skins).
  • Apple has created a (very constrained) path for alternate engines in the EU; commenters say the criteria are so strict that none have shipped.

Regional Locking and Workarounds

  • Japan‑only store access is expected to be tied to multiple signals (Apple account region, billing info, GPS, nearby cell/WiFi country codes, SIM), not just IP.
  • VPN alone is considered insufficient; reports from EU features suggest elaborate workarounds (Faraday cages, spoofed hotspots) are needed to “trick” the system.

YouTube erased more than 700 videos documenting Israeli human rights violations

Role of Government vs. Platforms / First Amendment

  • Major debate over whether this is classic First Amendment violation or a private platform decision:
    • One side argues YouTube’s removals are a direct result of U.S. State Department sanctions and thus de facto government censorship.
    • Others say sanctions are a general measure, and YouTube voluntarily chose to interpret them this way; they see a potential “loophole” issue but not a clear-cut 1A case without explicit takedown orders.
    • Disagreement over what counts as “forcing”: only explicit legal demands vs. implicit threats and regulatory pressure.

Historical & Political Context

  • Some argue this is not new: U.S. governments have long restricted speech (e.g., Sedition Act), and free speech is treated as a revocable privilege when inconvenient to power.
  • Others highlight perceived hypocrisy: people who celebrated Covid- and “fake news” moderation now object when similar tools appear to suppress Gaza-related content.
  • Several comments describe U.S. politics as effectively a single, donor-driven establishment highly aligned with Israeli interests.

Platforms as Public Sphere / Utility Debate

  • Recognition that legally YouTube can host or remove what it wants, but practically, deplatforming from major platforms silences people because that’s where audiences are.
  • Some foresee large social platforms eventually being regulated like utilities to prevent arbitrary or politically driven removals.

Archiving, Decentralization, and Censorship Resistance

  • Discussion of mirroring removed videos: scripts tying yt-dlp to archive.org, torrents, local archiving.
  • archive.org does not want to mirror all of YouTube; volume, copyright, and illegal content are concerns.
  • Support for alternatives: PeerTube, self-hosted sites, Tor/onion services, decentralized DNS, BitTorrent-like distribution.
  • Counterpoint: even self-hosting can be targeted via cloud providers, CDNs, ISPs, search delisting; the whole stack can be weaponized.

Content Policy vs. Political Motive

  • Dispute over whether removed clips are just “snuff”/graphic violence (which YouTube routinely bans) or legitimate documentary evidence targeted because they show Israeli abuses.
  • Some note YouTube also takes down Hamas atrocity videos, suggesting symmetric enforcement; others say the article attributes Gaza-related removals specifically to sanctions, not generic ToS.

Broader Information Control Examples

  • Mentions of Gaza satellite imagery lagging or selectively updated and Wikipedia edit wars over “Gaza genocide” as further signs of contested narratives and attempts to shape public perception.

I’m worried that they put co-pilot in Excel

AI-Induced Spreadsheet Failures & Accountability

  • Several comments predict a major AI-caused financial blow‑up, possibly bankrupting a public company and damaging AI vendors’ reputations.
  • Others argue leadership will treat AI as a scapegoat: take credit when things go well, blame “the AI” when they don’t – but that only works once before boards lose patience.
  • Some think systemic actors won’t allow large AI failures and will effectively “bail out” AI errors; others respond that audits and existing controls should catch bad numbers regardless of tool.

The “Brenda” Archetype, Jobs, and Institutional Knowledge

  • “Brenda” represents the experienced spreadsheet power user who quietly holds together messy, business‑critical processes. Many say she’s irreplaceable due to tacit institutional knowledge and accountability.
  • Others present alternative Brendas: low‑context “spreadsheet people” doing duplicate data collection that should be automated away; they argue we need fewer Brendas and more people who can redesign processes.
  • There’s extensive debate about incentives: why would Brenda automate herself out of a job when she isn’t rewarded for long‑lived automation, only for ongoing manual work?

Human vs AI Errors: Determinism, Verification, and Audit

  • A major theme is determinism: traditional formulas and scripts are predictable and debuggable; LLMs are non‑deterministic, can hallucinate plausible numbers, and may “fudge” outputs.
  • Commenters stress that verification is now the central problem: AI can generate slop faster than humans or tools can check it.
  • Many note that human spreadsheets are already full of bugs, but human error modes are familiar and often caught by peers, auditors, or sanity checks; AI error modes are harder to predict and detect.

Current Reality of Copilot and AI in Office Tools

  • Multiple participants report that Copilot in the Microsoft stack is mostly useless today: disabled features, weak transcription, poor handling of domain acronyms and names, and unhelpful Excel behavior.
  • Some find LLMs useful for learning what’s possible in Excel or for simple code/scripts, but say they fall apart on messy, real‑world workbooks.
  • There’s pushback against chat‑box UIs jammed into every workflow; people want AI that integrates naturally and preserves transparency, logs, and change tracking.

Automation, Excel, and AI’s Place

  • Excel is described as the de facto programming environment of the economy, often doubling as database, app platform, and glue between incompatible enterprise systems.
  • Some argue agents will eventually bypass Excel entirely—querying databases directly and generating reports—automating both Brenda and spreadsheets. Others reply that real companies run on fragile legacy stacks and undocumented “one‑box” scripts; AI cannot simply drop in.
  • Overall sentiment: AI in Excel could be helpful under human‑in‑the‑loop use, but over‑trusting it in finance and operations without strong audits, versioning, and cultural skepticism is seen as dangerous.

Hypothesis: Property-Based Testing for Python

Getting started with property-based testing

  • Several commenters struggle to apply Hypothesis when they don’t fully understand the existing code; they default to writing more example-based unit tests.
  • Recommended starter pattern:
    • Begin with very general properties like “does not crash” or “only throws allowed exceptions”.
    • Use Hypothesis’ strategies to generate broad input classes; refine constraints over time instead of trying to model “all possible inputs”.
  • The @example decorator is highlighted as a bridge from hand-written edge cases to generated ones.
  • Property-based tests can be seen as “parameterized tests with autogenerated tables”.

Typical properties and patterns

  • Round-trip invariants: decode(encode(x)) == x (e.g., JSON or other serialization) are cited as a highly motivating, practical use case.
  • Equality to a simpler or reference implementation (oracle) is common when there’s a naive but trusted version, or when migrating between implementations.
  • For sorting and similar algorithms, suggested properties include:
    • Output length equals input length.
    • Output is ordered.
    • Multiset of elements is preserved.
    • Idempotence: sorting twice = sorting once.
    • Permuting inputs doesn’t change results.
  • Other recurring properties: idempotence, commutativity, associativity, identity elements, order independence, and state-machine style “operation sequences obey invariants” (e.g., UI focus, DB drivers, delete/lookup semantics).

Shrinking, randomness, and determinism

  • Hypothesis’ shrinking (minimizing failing examples) is repeatedly described as its most powerful feature and more advanced than classic QuickCheck.
  • It uses heuristics (e.g., edge-case values, tricky strings/floats) and maintains a failure database; seeds and failing examples can be replayed, making “random” tests reproducible.
  • Some worry about non-deterministic tests; others counter that you log seeds, commit failing examples, and over time cover more of the input space than fixed tests.

Use cases and benefits

  • Reported successes include:
    • Finding subtle numeric, Unicode, and boundary bugs (e.g., specific list sizes, Turkish “İ”, ß lowercasing, NaN/∞).
    • Stress-testing APIs to ensure no 500s/NPEs and robust input validation.
    • Verifying data structures, compilers, parsers, SQL/DDL tools, DB migration behavior, and complex drivers.
  • Libraries built on Hypothesis such as Schemathesis are praised for uncovering many API validation bugs.

Critiques, tradeoffs, and adoption

  • Some argue PBT can require complex generators or even model/state-machine implementations; tests risk being as complex as the SUT and harder to maintain.
  • Others respond that:
    • You do not need to reimplement business logic; you test general properties and relations between functions, often simpler than enumerating examples.
    • PBT complements, not replaces, example-based tests; failing cases can be turned into fixed regression tests.
  • Barriers to adoption include:
    • Misconceptions about “non-deterministic tests” being inherently bad.
    • The learning curve for expressing good properties and strategies.
    • Test runtime concerns; suggested mitigations include fewer examples during development and fuller runs in CI.

Ecosystem and documentation

  • Hypothesis is compared favorably to other PBT libraries (QuickCheck, FsCheck, Rust’s proptest, Go’s rapid, JS’ fast-check), especially in shrinking and heuristics.
  • Some note Hypothesis’ pytest integration is better than with unittest.
  • The Hypothesis docs’ “Explanations” section and its design-philosophy content are praised for deepening understanding beyond quickstarts.

Zohran Mamdani wins the New York mayoral race

Enthusiasm and Symbolism

  • Many see the win as a generational and ideological break from corrupt or centrist “machine” politics, and as proof voters will engage for clear cost‑of‑living and QoL agendas.
  • Supporters highlight his willingness both to admit past mistakes and to stand firm under racist/Islamophobic attacks, reading the result as a repudiation of “status quo Democrats.”
  • Some outside NYC say the scale of attention and turnout restored their sense that hopeful, issue‑driven campaigns can still win.

Skepticism and Fear of Overreach

  • Critics frame his platform as “extreme socialist,” warning of rent freezes, higher business taxes, and policing changes driving out capital, worsening housing shortages, and fueling crime.
  • Several argue rent control and price ceilings are textbook bad economics that reduce supply and quality; they expect NYC to become a cautionary tale.
  • Others counter that similar rhetoric has been used to block every prior expansion of social provision, and that NYC’s economy is large enough to absorb experiments.

Obama/ACA as Cautionary Analogy

  • Long subthread compares him to Obama: inspiring message vs. ability to deliver.
  • One camp says ACA showed that “the bill that passes is better than the ideal that doesn’t,” praising incrementalism under hostile constraints.
  • Another sees ACA as a corporate subsidy and Obama as having “run from the left, governed from the center‑right,” warning Mamdani not to pre‑compromise or repeat that trajectory.
  • Dispute over whether more radical pushes (public option, universal care) were ever numerically possible, and how much blame to assign to Democratic leadership vs. GOP obstruction.

Housing and Rent Control Debate

  • Proponents: temporary freezes on already‑regulated units plus aggressive building and office‑to‑housing conversions can stabilize tenants while supply ramps up; examples cited from Berlin, Vienna, Singapore, Tokyo.
  • Opponents: insist decades of rent regulation in NYC and Europe have produced scarcity, disrepair, and “lottery apartments,” and will scare off new private development.
  • Some emphasize underlying zoning, permitting, and NIMBYism as the real bottleneck; rent policy is seen as short‑term relief whose outcome depends on whether new construction actually happens.

Expanded Public Services: Buses, Childcare, Groceries

  • Supporters see free buses, universal childcare, and city‑run groceries in food deserts as “common sense” in a rich city and note many public or state‑run services already exist.
  • Skeptics argue city‑operated retail will be inefficient, crowd out thin‑margin private stores, and that improving incomes or building housing is more fundamental than trying to run cheaper groceries.

National Politics and Party Strategy

  • Several view the race as a template: populism focused on cost of living can energize nonvoters and younger voters more than chasing mythical “moderates.”
  • Others fear national Democrats will misread a deep‑blue city result as a national mandate for NY‑style progressivism, hurting them in swing states.
  • GOP is portrayed as abandoning cities and instead using state‑level power and gerrymandering to control them from outside, but also as highly coordinated in trying to brand “Zohran = Democratic Party.”

Identity, Smears, and Foreign Policy

  • Heavy discussion of Islamophobic and “pro‑terrorist” attack ads; many say the 9/11‑adjacent smears and Israel‑litmus‑test questions mostly backfired in NYC.
  • Dispute over whether some of his past rhetoric on policing, prisons, and Palestine is disqualifying extremism or an evolved position being weaponized out of context.

NYC Structure, Mandate, and Constraints

  • Multiple comments stress that the real fight was the Democratic primary and establishment‑backed independent bid; the formal general against a Republican was structurally lopsided.
  • Debate over how strong his “mandate” is, given NYC’s one‑party dominance, and how much Albany and federal agencies can constrain or sabotage his agenda.
  • Some see his win as the beginning of a larger intra‑Democratic realignment (DSA vs. establishment); others note previous charismatic mayors who later exited as disappointments.

Direct File won't happen in 2026, IRS tells states

Corporate influence, lobbying, and Citizens United

  • Many comments frame the demise of Direct File as government serving corporate interests (especially Intuit/TurboTax) rather than citizens.
  • Links to donations and lobbying are cited as “cheap bribes” with very high ROI; people note revolving doors (politicians becoming lobbyists) and post‑office jobs as part of the compensation package.
  • There’s disagreement on lobbying: some see it as normalized corruption akin to bribes for public services; others argue lobbying is also how charities, civil-liberties orgs, and small-business groups convey information to lawmakers.
  • Citizens United is repeatedly blamed for enabling this environment; some argue overturning it should be a long-term political priority, though others note it’s rooted in deeper legal doctrines about corporate rights.

IRS funding, audits, and enforcement

  • Several posts argue the IRS is “defunded,” especially for complex, high‑wealth audits, citing staff cuts in the unit that audits billionaires.
  • Others note that high-income filers are still statistically more likely to be audited, but complex audits are harder with fewer resources, while simple W‑2 mismatches are automated via notices (e.g., CP2000).
  • Some speculate that if enough people switched to paper returns it could effectively DoS the IRS, but this remains conjectural in the thread.

Free File Fillable Forms vs. Direct File

  • Free File Fillable Forms are defended as fully capable, official, and free; instructions documents are said to make everything mechanically doable if you read them.
  • Critics argue the real barrier is knowing which forms to file and enduring the tedium of worksheets and cross‑references; software that “walks you through” is valued for guidance, not just math.
  • Phone/email verification and PII requirements turned some users off.
  • Direct File is widely praised by users as simple and fast; many are angry or “disgusted” it’s being killed after a successful pilot. The public-domain code on GitHub is noted, but commenters say a nonprofit rehost would lose the crucial benefit of being first‑party IRS software.

Tax-prep market, alternatives, and inequity

  • TurboTax’s “free” offering is criticized as narrowly limited and historically obscured by dark patterns; many note that state filing often isn’t free.
  • Alternatives like FreeTaxUSA and Cash App’s inherited CreditKarma product are recommended and reportedly handle even Schedules C/D/E.
  • A major theme is that lower‑income, simple‑return filers are funneled into strip‑mall preparers and paid software through fear and marketing, even though they could file free.
  • Others stress that millions deliberately pay CPAs because of real or perceived complexity, especially for pass‑throughs, RSUs, options, multi‑state issues, and expat/treaty interactions.

System design, international comparisons, and feasibility

  • Many contrast the U.S. with countries where the government pre-fills returns: you log in, confirm, add minor items, and finish in minutes.
  • Counterarguments: the IRS lacks integrated data on marital status, dependents, and some deductions; there’s no national civil registry; 50 different state systems complicate integration; and IRS IT has been underfunded for decades.
  • Others call this “perfect is the enemy of good”: even if edge cases exist, the IRS could auto‑file or prefill for the large majority of simple W‑2/standard‑deduction filers and let the rest opt out.
  • Several explicitly restate the core grievance: the IRS already has most of the data and the tax code; needing to pay or navigate third parties to tell the government what it already knows is seen as unacceptable.

AI and technical possibilities

  • Some suggest AI should make implementing tax rules trivial or convert IRS instructions to machine‑readable logic.
  • Pushback stresses legal liability and the need for deterministic, auditable calculations; LLM “hallucinations” are considered inappropriate for something where errors can be construed as lying to the IRS.
  • A middle ground proposed is using AI offline for code generation or document translation, keeping personal tax data local.

Uncle Sam wants to scan your iris and collect your DNA, citizen or not

Continuity of Surveillance and Overreach

  • Many see this proposal as part of a 20+ year security-state drift since 9/11, not a sharp break.
  • Others argue the current push feels qualitatively different because it’s openly authoritarian in tone and scope.
  • Some stress that both major US parties have expanded executive power and surveillance; others worry “both-sides” framing obscures unique recent attempts to overturn elections.

Authoritarianism, Politics, and System Design

  • Debate over whether focus should be on “who is in the White House” or on building systems that assume an authoritarian will eventually get power.
  • Several argue US presidential systems make personality cults and power-grabs easier than parliamentary systems.
  • Others contend the real failure is voters and institutions allowing obvious authoritarians to keep power rather than prosecuting or disqualifying them.

Biometrics vs DNA: Different Levels of Harm

  • Broad agreement that DNA collection is a major escalation beyond fingerprints/iris scans.
  • DNA is seen as uniquely sensitive: reveals family relationships, health risks, and possible tailored attack vectors, not just identity.
  • Some note practical constraints (sample degradation, cost of large-scale sequencing), but others counter that technology is improving and databases, once built, will be abused or leaked.

Current Biometric Practices and “Already on File” Argument

  • Many commenters report having fingerprints, photos, or iris scans taken already: immigration processes, Global Entry/TSA, security clearances, passports, EU/other national ID schemes.
  • Counterpoint: targeted or conditional collection (e.g., for travel or specific jobs) is not equivalent to mandatory national DNA/iris databases for all citizens and associated persons.

California Newborn Blood Samples Debate

  • Strong subthread on California’s newborn heel-prick blood spots, stored since the 1980s.
  • One side frames this as a de facto lifelong DNA sample database; others push back that:
    • It’s dried blood for medical screening and quality control, not pre-sequenced genomes.
    • Law-enforcement access requires warrants, though policies and oversight are unclear.
  • Disagreement over whether calling this a “DNA database” is accurate vs. incendiary.

Resistance, Futility, and What To Do

  • Link shared to submit public comments; some dismiss the process as purely performative under the current administration.
  • Others argue fatalism is self-defeating: public comments, court challenges, protest, and voting are still the only available levers.
  • A few urge technologists to build privacy-preserving identity systems so governments can’t easily repurpose them for dragnet control.

Bluetui – A TUI for managing Bluetooth on Linux

Overall reception and usage

  • Many commenters are enthusiastic about bluetui, calling it simple, fast, and a big improvement over bluetoothctl and some existing TUIs like bluetuith.
  • Several people report it solved real issues where desktop Bluetooth GUIs (e.g., GNOME) failed to connect, while bluetui worked reliably.
  • It’s praised for thoughtful keybindings (space to connect, enter to disconnect) which help avoid accidental toggling.

TUI design, whitespace, and icons

  • One thread criticizes the lack of visible device addresses and the “wasted space,” arguing TUIs are copying minimalist GUI trends that hide useful information.
  • Others push back on the tone, and note that smaller window sizes can use up that whitespace.
  • The author explains you can fix the width via config and is open to feature requests.
  • Another thread debates icons/emoji and Nerd Fonts: some find them helpful for quickly identifying device types; others dislike them or worry about font dependencies. The author is receptive to making icons configurable.

TUIs vs GUIs and workflows

  • Multiple people highlight TUIs as a sweet spot between raw CLI tools and heavyweight GUIs: easier to build, fast over SSH, consistent on different systems, and nostalgic for DOS/Pine-era users.
  • Some contrast TUIs with network and Bluetooth “all-in-one” managers, preferring small focused tools (e.g., bluetoothd + bluetui; iwd + impala).

Installation, Rust toolchain, and distro friction

  • One commenter struggles to install via cargo on Ubuntu due to outdated Rust packages, leading to frustration with the Rust ecosystem and Debian/Ubuntu packaging.
  • Others suggest alternatives: downloading prebuilt binaries, using rustup, using version managers like mise, Docker builds, or switching to rolling-release distros (with some pushback on “use Arch” attitudes).
  • There’s general agreement that distro Rust packages tend to lag, and many Rust tools expect a recent compiler.

Related tools and ecosystem

  • Mentioned alternatives include bluetuith (Go-based), Mac-specific blueutil with shell aliases or a TUI wrapper, and companion TUIs like impala for Wi-Fi/NetworkManager.
  • Some discuss Rust vs Go for building such tools; Go is seen as easier and faster to compile, Rust as more rigorous but with a steeper learning curve.