Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 171 of 524

Why Nigeria accepted GMOs

GMOs, hunger, and crop choices

  • Some argue higher-yield GM crops are a practical necessity for countries like Nigeria, where a large share of the population is undernourished and climate stress is rising.
  • Others counter that this is a false dichotomy: locally adapted traditional crops (e.g., drought‑resistant millets) could address food security with fewer inputs than GM rice or similar staples, but may be underused due to cost and market structures.

Democracy, propaganda, and technology adoption

  • The article’s claim that higher democracy correlates with GM acceptance is criticized as political spin: commenters say no causal mechanism is shown, and many non‑democracies adopt advanced technologies.
  • Some suggest governance quality is a confounder: more functional states both regulate new tech better and are more likely to approve it.
  • There’s disagreement on where bribery is easier: decentralized democracies vs centralized authoritarian regimes.

Pesticides, herbicides, and environmental spillovers

  • One camp notes GM traits have increased herbicide use but reduced insecticide use; others argue herbicide use later rose again due to resistance and that drift onto neighbors’ fields can cause real damage.
  • Some claim neighbor contamination and lawsuits are exaggerated or misrepresented; others dispute this and point to real conflicts and drift as “will happen,” not “might.”

Seed patents, saving seed, and farmer agency

  • Many point out that even non‑GM modern hybrids don’t replant well; buying new seed each season is already standard for competitive farmers.
  • Fears about “terminator seeds” and inability to replant are seen by some as overblown or largely hypothetical; others see any ability to sue over saved seed as inherently abusive.
  • There’s sharp debate over whether farmers are generally savvy businesspeople making rational tradeoffs, or vulnerable to complex contracts, credit constraints, and lock‑in.

Markets, monopolies, and sovereignty

  • Critics worry GM seeds plus patents enable de facto monopolies, rent‑seeking, and loss of seed and food sovereignty, especially in poorer countries dependent on foreign firms.
  • Defenders respond that farmers can switch back to non‑GM or other suppliers if prices rise, so GMOs must remain net‑beneficial to be adopted.
  • Several commenters invoke multi‑agent “tragedy of the commons” dynamics: individually rational short‑term choices (adopting more productive GM seeds) can still lead to long‑term concentration, dependency, loss of biodiversity, and weakened national bargaining power.

Regulation, safety, and what’s really at stake

  • Scientifically, some emphasize that GM is just more precise mutation; others stress that its speed and power change the risk profile and justify stronger oversight.
  • There is broad support for regulation in some form: to handle drift, health testing, corporate abuse, biodiversity, and long‑term food security.
  • A recurring theme is that opposition is less to the genetic technique itself and more to the economic and political structures around it—patents, corporate control, and weak protections for small farmers.

The new calculus of AI-based coding

Claims of 10x Productivity and Metric Skepticism

  • Many commenters doubt the “10x throughput” claim, noting lack of concrete data beyond a dense git-commit heatmap.
  • People point out that commits/LOC are weak productivity proxies and can incentivize bloated, low‑value code.
  • Some argue this is effectively marketing/hype that leadership will misinterpret as a generalizable promise, leading to unrealistic expectations and pressure to “use AI or else.”

AI Code Quantity vs Quality and Testing

  • Several see “we need stronger testing to handle increased velocity” as tacit admission that AI is generating far more broken code.
  • Others note that the testing practices described (mocks, failure injections, tighter feedback loops) are not new, just being reframed as novel in an AI context.
  • There’s concern that setting up robust test harnesses and environments may cost as much as solving the original problem, eroding claimed gains.

TDD / Spec-Driven Futures and “Code is Worth $0”

  • A long subthread debates the idea that with AI, code itself is worthless and the future is pure TDD: humans write tests/specs, AI writes all code.
  • Critics argue:
    • Writing comprehensive tests/specs is often harder than writing the code.
    • Passing tests doesn’t imply correctness, security, performance, or maintainability.
    • Regenerating entire codebases from tests is risky and operationally fraught.
  • A few suggest moving toward spec- or property-based development, or functional styles that constrain context and make AI-generated components easier to reason about.

Maintainability, Comprehension, and Security

  • Multiple commenters fear “unknowable” AI codebases: developers won’t understand internals, making debugging, incident response, and security review harder.
  • Security people anticipate more vulnerabilities in code nobody truly understands, and joke that “re‑gen the code” won’t fix systemic issues.
  • Some share experiences where AI quietly duplicated inconsistent logic or hacked around tests instead of implementing coherent behavior.

Process, Culture, and Limits of AI

  • Several say the real bottleneck is not typing code but understanding domains, requirements, and architecture; AI doesn’t fix that.
  • There’s criticism of “agentic” workflows and “steering rules” as often fragile and probabilistic, drifting off rules over long sessions.
  • A minority report strong personal success with AI (especially in CRUD and functional-style code), but even they frame it as powerful assistance, not autonomous software engineering.

Avoid 2:00 and 3:00 am cron jobs (2013)

UTC vs local time on servers

  • Strong support for setting server clocks to UTC and converting to local time only at display or application level.
  • Counterpoint: for teams and systems that are strictly local (e.g., all-Pacific or single-HQ enterprises), local server time can simplify reading raw logs and business reasoning.
  • Several war stories where non‑UTC server time and per‑customer timezones caused recurring DST chaos; some organizations never fully fixed it.

Business requirements: “local midnight”, quotas, and reports

  • Many jobs are tied to human expectations: daily quotas at “midnight”, reports at “8am local”, market/regulatory cutoffs, shift-based operations.
  • UTC scheduling doesn’t remove the need to decide what happens on days with 23 or 25 hours or duplicated times (e.g., 01:30 occurs twice).
  • Suggestions include:
    • Rolling windows for quotas (e.g., last 24h) instead of calendar days.
    • Treating “run once per local day” as a business rule that must explicitly define behavior on DST transition days.

Cron, DST, and scheduler behavior

  • Core article’s bug was in vixie‑cron; some distros (e.g., Debian) added logic long ago to avoid double/zero runs across small clock changes.
  • Other cron variants (busybox, systemd timers) behave differently; some handle DST better, some are naive.
  • Several argue for avoiding cron entirely and using application‑level schedulers that are timezone/DST‑aware and user‑configurable.

Operational scheduling practices

  • Common advice:
    • Avoid 02:00–03:00 in DST zones; also avoid 00:00 and on‑the‑hour times to reduce ambiguity and contention.
    • Use odd minutes and randomized delays (or systemd’s RandomizedDelaySec / FixedRandomDelay) to spread load.
    • For “once per day” logic, some propose hourly cron + “has the day changed?” checks, though others see this as re‑implementing a scheduler.
  • anacron is recommended for “sometimes on” machines; it locks jobs and avoids double runs.

Logs, tooling, and human factors

  • Many prefer logs in UTC for cross‑team correlation; others like local timestamps for fast mental parsing.
  • Compromise patterns:
    • Store UTC (possibly with Unix timestamps) and attach or derive a local representation at view time.
    • Use tools/wrappers (e.g., tztail‑style) to convert while tailing.
  • Frustration with UIs that mix timezones, infer format from browser locale, or make UTC/24h usage harder than necessary.

Concurrency, robustness, and idempotency

  • Multiple comments stress that overlapping jobs are a more general problem than DST:
    • Use lockfiles/flock, semaphores, or idempotent job design so double runs are safe.
    • Treat downtime and restarts as cases where “once per day” semantics must still hold.

DST, timezones, and broader debates

  • Widespread dislike of DST; recurring arguments over permanent standard vs permanent summer time, or abolishing timezones vs keeping them.
  • Some point out that any “simple” replacement has already been tried somewhere and produced its own issues.
  • Technical purists mention TAI and leap seconds, but others note the interoperability cost when the rest of the world uses UTC.

JetKVM – Control any computer remotely

Ecosystem and Alternatives

  • JetKVM is compared heavily to PiKVM, TinyPilot, NanoKVM, GL.iNet Comet, Aurga, and Geekworm Pi-based KVM boards.
  • PiKVM is praised for openness and DIY flexibility but is seen as expensive in fully built form; JetKVM is cited as ~50–70% cheaper.
  • NanoKVM (including PCIe and “lite” variants) gets positive remarks for form factor and price, but concerns about its software and security appear.
  • GL.iNet’s Comet KVM is noted as a strong alternative with PoE, Wi-Fi 6, HDMI pass-through, and built‑in Tailscale.

Price, Hardware, and Form Factor

  • JetKVM’s ~$90 price is viewed as very competitive; several users say they can buy multiple JetKVMs for the cost of one PiKVM or TinyPilot.
  • Some complain about the mini‑HDMI connector; others note the device is too small for full‑size HDMI and that it ships with a cable anyway.
  • PCIe‑form‑factor KVMs (NanoKVM PCIe) are appreciated for clean cabling and integrated ATX control; JetKVM’s external form makes it easy to move between machines.
  • Requests include a PoE version and variants with integrated LTE.

Software, Openness, and Features

  • JetKVM’s software is open source and can be self‑compiled; cloud/WebRTC relay can reportedly be self‑hosted.
  • Users like features such as virtual USB storage for OS installs and generally polished UI; some wish they could run JetKVM software on other KVM hardware.

Reliability and Compatibility

  • Mixed experiences: some report flawless use across many machines; others report HDMI incompatibilities, random “black screen”/“loading stream” issues, or one unit in a batch failing.
  • A few issues seem to stem from browser H.264 support; others appear to be genuine hardware or EDID/handshake problems.

Security, Networking, and Provenance

  • Strong consensus: do not expose any KVM/IPMI device directly to the public internet; use VPNs/WireGuard/Tailscale subnet routing and VLANs.
  • JetKVM is seen as “good enough” for homelab use but not clearly vetted for high‑security corporate environments.
  • Some are uneasy about limited transparency on company identity/jurisdiction, given the device’s privileged position. Others consider it a small YC‑backed outfit targeting hobbyists, not enterprises.
  • NanoKVM is explicitly called out as “shady” by one commenter citing hidden microphone / unsolicited network behavior.

Use Cases vs Software Remote Desktop

  • Multiple replies clarify why hardware KVMs exist: they work when OS/network are down, allow BIOS access, OS install, power/reset control, and troubleshooting boot failures.
  • Software like RDP, RustDesk, AnyDesk, etc. is seen as complementary, not a replacement, for out‑of‑band management.

Miscellaneous Reactions

  • Many homelab users express strong satisfaction and plan to buy more units.
  • Some dislike the marketing style (YouTube thumbnails, Discord support) and see it as a “cheap startup” signal.
  • There’s curiosity about why affordable 4K60 KVMs don’t exist; commenters attribute it to lack of cheap 4K capture silicon.

Claude for Excel

Excel’s role and why this matters

  • Many commenters stress that huge parts of business, finance, pharma, insurance, healthcare, even government budgets run on sprawling, opaque Excel workbooks.
  • These sheets are often “living business logic” no one fully understands, built years ago by departed experts, and already extremely error‑prone.
  • Because of that, any tool that touches Excel is seen as both high‑impact and high‑risk.

What Claude for Excel is supposed to do

  • Summaries of the launch page:
    • Explain any cell, formula, sheet, or cross‑tab dependency with citations.
    • Trace and fix errors like #REF!, #VALUE!, circular references.
    • Safely adjust assumptions and run scenarios without breaking formulas.
    • Draft or populate financial models/templates.
  • Aimed especially at financial modeling (PE, hedge funds, banking), and at people who treat Excel as a programming environment.

Promised benefits and positive experiences

  • Users already find LLMs helpful for: writing formulas, XLOOKUP/VLOOKUP, pivot tables, regex, SQL connectors, and small one‑off scripts.
  • Some argue LLMs are good at “basic coding”, which much Excel work resembles, and could massively accelerate repetitive reconciliation and reporting tasks.
  • Several see value in using Claude as an explainer, reviewer, or “junior analyst” to understand and refactor legacy sheets.

Accuracy, determinism, and hallucination concerns

  • Many distrust LLMs for precise, deterministic spreadsheet work and math‑sensitive domains (finance, engineering, accounting).
  • Reported failures: hallucinated transactions and categories, fabricated values in Sheets, silent changes to bank account numbers, ignoring basic accounting constraints.
  • Critics emphasize LLMs’ probabilistic nature vs spreadsheets’ requirement for reproducibility and exactness; “trust but verify” is seen as mandatory.

Observability, version control, and debugging

  • Major worry: it’s hard to see what changed in a workbook; no built‑in “git for Excel.”
  • People fear hidden formula edits and non‑reproducible outputs when a CFO asks for a minor update.
  • There’s interest in better diffing, tracking input vs calculation cells, and even unit‑test‑like checks for spreadsheets; some have built internal tools, but nothing is mainstream.

Jobs, productivity, and economic impact

  • Some see this as the beginning of large‑scale automation of white‑collar “Excel grunt work,” with potential layoffs and middle‑class erosion.
  • Others argue current human spreadsheet quality is already mediocre; if LLM+checks beats that at lower cost, businesses will adopt it.
  • There’s disagreement on how much accuracy real workflows require and how much error rate is acceptable if productivity rises.

Security, compliance, and finance‑specific worries

  • Strong anxiety about sending sensitive financial/PII data to external models, especially under banking secrecy and audit regimes.
  • Concerns about AI‑driven misstatements, fraud, or restatements of earnings, and whether “the AI did it” will hold up with auditors and regulators.

Startups, “wrappers,” and competition

  • Thread notes this is a tough day for Excel‑AI add‑in startups; many expect frontier labs or large platforms to subsume most “wrapper” value.
  • Others point out domain‑specific tier‑5 tools still need deep vertical expertise that big labs may lack, leaving room for niche products.

Overall attitude toward AI tools

  • The discussion is split: some see a huge, obvious productivity win on a gigantic surface area; others see a “disaster amplifier” on top of already fragile spreadsheets.
  • Many agree usefulness depends on tight scoping, tool calling (deterministic engines doing the math), and strong human verification, not blind trust.

It's insulting to read AI-generated blog posts

Detecting “AI Voice” and Reader Reactions

  • Many commenters say they instantly hit “back” when prose “feels like AI”: over-explained, repetitive, bloated, generic tone, emojis, bulletized clichés.
  • Others use a softer filter: “is this interesting or useful?”—if not, they leave regardless of whether it’s AI or just bad writing.
  • Some are disturbed that colleagues can’t tell AI-generated text apart from human, or don’t think the distinction matters.
  • Several note that AI often has good local coherence but loses the thread across longer texts; they claim they could reliably spot an “AI book.”

Authenticity, Intention, and Human Connection

  • A large faction values knowing a human actually struggled to express something: intention, effort, and personal voice are seen as core to writing.
  • Analogies to music and painting recur: a flawed live performance or amateur painting is preferred over a technically perfect but soulless machine rendition.
  • Others counter: if the text is clear and useful, they don’t care how it was produced; they judge message, not messenger.

“Slop”, SEO, and Trust Erosion

  • Widespread frustration with AI-slop: unreadable AI blogs, READMEs, PRDs, LinkedIn posts and news articles filled with generic filler, cutesy emojis, and no real insight.
  • Many assume such pieces exist primarily for SEO, ad impressions, or personal-brand farming, not to help readers.
  • Some respond by blacklisting domains, unsubscribing, or filtering in search tools; trust in random web content is dropping.

AI as Tool vs. Abdication of Responsibility

  • Narrow use (spellcheck, grammar touchups, translation, outline critique) is seen by many as legitimate—especially for non-native speakers or neurodivergent people.
  • Others argue even that can smuggle in “AI voice” and erase authenticity; they prefer janky but clearly human language.
  • Strong pushback against AI-written pull requests, documentation, and project proposals: reviewers feel it’s insulting to expend serious effort on code or text the author didn’t themselves understand or own.
  • A common norm emerges: AI assistance is acceptable if the human deeply reviews, edits, and takes responsibility; dumping unedited AI output on others is not.

Learning, Growth, and “Being Human”

  • Some endorse the essay’s “make mistakes, feel embarrassed, learn” ethos: over-automation of communication is seen as stunting growth and flattening individuality.
  • Others reject this as romanticized Luddism, likening AI to calculators, spellcheck, or typewriters: tools that free time and cognitive load for higher-level thinking.

PSF has withdrawn $1.5M proposal to US Government grant program

PSF’s Decision and Immediate Reactions

  • Many commenters praise the PSF for refusing the $1.5M NSF grant, seeing it as protecting its mission and independence despite major financial need (only ~$5M annual budget, ~6 months runway).
  • Several readers donated or became PSF members; some criticize the use of PayPal as a high-friction payment channel.
  • A minority argue rejecting the grant was “stupid” given PSF’s budget shortfall and security work that now goes unfunded.

The DEI Clause and Clawback Risk

  • Core clause: recipients must affirm they “do not, and will not … operate any programs that advance or promote DEI, or discriminatory equity ideology in violation of Federal anti-discrimination laws,” with NSF allowed to terminate and claw back all funds.
  • One camp says this is effectively redundant with existing anti-discrimination law, just giving NSF a contractual enforcement hook; they see PSF’s refusal as ideological posturing.
  • Others argue the language is ambiguous, deliberately politicized (“discriminatory equity ideology”), and clearly intended to chill or criminalize DEI; they stress that the clause applies to all PSF activities, not just the grant work.
  • The clawback is widely viewed as the real existential risk: for a small nonprofit, having to repay already‑spent funds—based on a contested interpretation—could destroy the foundation.

Legal and Political Context

  • Commenters note extensive recent grant cancellations (especially DEI-related) and at least one high‑profile EPA case where funds were frozen and recovered without clear wrongdoing findings.
  • Several emphasize that even if PSF would “eventually win” in court, the cost and time make litigation unrealistic.
  • There is strong skepticism that the current administration respects rule of law; many argue you must assume bad‑faith, arbitrary enforcement, not neutral adjudication.

Broader Debate on DEI and Merit

  • Thread contains intense disagreement:
    • Critics label DEI “racist,” quota‑driven, and anti‑merit, citing anecdotes and lawsuits about race‑conscious hiring and promotion.
    • Supporters describe DEI mainly as outreach, pipeline building, and inclusion (e.g., PyCon’s blinded talk review with strong gains in women speakers), arguing that “merit” is not evaluated in a vacuum and that homogeneous communities persist absent proactive work.
  • Meta‑discussion notes that both prior “pro‑DEI” grant regimes and current “anti‑DEI” rules are politicizing science and infrastructure funding.

Open Source Sustainability and Who Should Pay

  • Many highlight the mismatch between Python/PyPI’s critical economic role and PSF’s tiny budget and staff.
  • Corporate “open source funds” are described as tokenistic; businesses have little incentive to contribute meaningfully when they can free‑ride.
  • Ideas raised: industry pledges, tax‑advantaged mechanisms, multi‑government support, and more serious corporate sponsorship, rather than dependence on volatile U.S. federal grants.

Microsoft in court for allegedly misleading Australians over 365 subscriptions

Regulatory action and alleged misconduct

  • Commenters welcome the ACCC’s lawsuit, seeing it as consistent with prior Australian enforcement against misleading pricing and “drip pricing.”
  • The core allegation discussed: Microsoft obscured a “third option” to stay on existing Microsoft 365 plans/prices, effectively nudging millions into higher-priced Copilot bundles.
  • Some note this pattern also appears outside Australia (e.g., US, UK, EU customers), suggesting a global strategy rather than a regional mistake.
  • There is debate on penalties: one view is that AUD 50M is trivial; others point out potential multiplier provisions could raise the effective penalty substantially and act as a warning.

AI bundling, dark patterns, and price hikes

  • Many see Copilot as being forced onto users to manufacture “AI adoption” and justify higher prices, rather than because customers want it.
  • Complaints center on dark patterns: auto-migration to AI plans, hidden “Classic” / non-AI tiers only visible during cancellation flows, and confusing branding (multiple Copilots, “Copilot Chat,” etc.).
  • Users describe similar behavior from Google Workspace, Atlassian, Dropbox, etc., framing it as an industry-wide shift: bundle unwanted AI or premium features, then increase prices.

User experiences and trust erosion

  • Several people report being silently moved from $69/$99 plans to higher-priced Copilot plans, discovering only at renewal or via email framed as a generic “price increase.”
  • Workarounds are shared: start cancellation to reveal “Personal/Family Classic” or basic cloud-storage-only plans.
  • Some describe Office licenses morphing into cloud-tied, ad-filled experiences (e.g., forced OneDrive saving, persistent upgrade nags), which they regard as deceptive.

Alternatives and reactions

  • A noticeable number cancel outright or plan to when prepaid periods end, even when they admit the family pricing is “good value,” because they dislike the tactics.
  • LibreOffice is frequently cited as sufficient for typical consumer use; Excel’s advanced capabilities are acknowledged as a reason some organizations stay.
  • Some shift to Linux or non-Microsoft ecosystems altogether, seeing each incident as one more push away.

Broader themes: AI hype and corporate incentives

  • Many frame this as part of a broader “AI hype” bubble and “marketing-driven development” where features are built to sell upgrades, not solve problems.
  • There’s extensive discussion of dark patterns, weakened regulators, shareholder primacy, and a sense that large tech firms are normalizing deception as a growth strategy.

10M people watched a YouTuber shim a lock; the lock company sued him – bad idea

Public backlash and harassment

  • Several commenters condemn doxxing, threats, and harassment of the lock company owner’s family as “mob justice” that mirrors the bullying behavior they’re reacting to.
  • Others argue that when a business owner publicly posts toxic, taunting messages and files a dubious lawsuit, they knowingly “poke the internet bear” and can’t be surprised by a hostile response, though actual threats should be handled by law enforcement.
  • General concern that online crowds amplify harm, and that people lash out this way because they don’t trust formal legal systems to provide real remedies.

Legal abuse, DMCA, and anti-SLAPP

  • Many see false or abusive DMCA claims as a modern form of SLAPP, used to intimidate critics via cost and stress rather than legal merit.
  • Commenters note DMCA’s “under penalty of perjury” language is effectively unenforced; calls for statutory damages or real penalties for bogus takedowns.
  • Anti-SLAPP statutes help but are patchy (no federal law; circuit splits on using state laws in federal court) and hard to invoke for ordinary people who can’t easily afford lawyers.
  • Suggestions include: stronger anti-SLAPP, easy layperson “this is a stupid lawsuit” dismissal motions, and fee-shifting to deter frivolous suits.

Company behavior and the Streisand effect

  • People highlight that the company initially posted a reasonably constructive response video (acknowledging the issue, explaining context, upselling more secure cores) but then escalated with DMCA takedowns and a lawsuit.
  • The lawsuit backfired: it exposed weak claims, elicited damaging testimony (employees reproducing the bypass), and massively amplified the original criticism.
  • Attempts to seal the case record and complaints about harassment are viewed as classic Streisand effect and “bully, then retreat” behavior.

Effectiveness and purpose of locks

  • Long subthreads stress that most locks mainly:
    • Deter casual or incompetent thieves.
    • Add time, noise, and evidence of forced entry (useful for insurance and forensics).
  • Skilled attackers use bolt cutters, grinders, jacks, or simply attack the door, frame, or window instead of the lock.
  • Non-destructive bypasses like shimming and bumping are seen as uniquely bad because they’re fast, low‑skill, and often leave little trace.

Lockpicking media and security culture

  • Many praise lockpicking creators for exposing overstated marketing claims and pushing manufacturers to improve designs.
  • There’s criticism of the traditional locksmith culture of “security by obscurity” and suing researchers instead of fixing vulnerabilities.
  • Consensus view: transparency and responsible disclosure improve real-world security, whereas litigious suppression attempts mostly damage trust and reputation.

Amazon strategised about keeping water use secret

Nature of data‑center water use

  • Multiple commenters explain most large data centers use evaporative cooling (similar to power plants), which consumes water by turning it into water vapor rather than returning it as liquid.
  • Others note some sites use closed-loop or hybrid systems (dry coolers, thermosyphon, chilled water) that reduce evaporation but increase electricity use.
  • There is confusion over whether water is truly “used”: technically it returns to the environment, but in arid places raising humidity by a tiny amount is effectively removing scarce freshwater from local use.

Scale and comparisons to other water users

  • Many argue data-center water use is tiny versus agriculture (often cited as ~70% of freshwater use) and even versus golf courses; several specific numbers are given showing Amazon’s projected 7.7B gallons/year is negligible in national terms.
  • Others push back that this is a fallacy of relative privation: when water is scarce, all non-essential or luxury uses—data centers, almonds, beef, golf—are fair targets.
  • Debate over whether AI/data-center growth (potentially 100×) could make today’s “small” usage a future problem.

Local scarcity, aquifers, and siting

  • Commenters stress that aggregate numbers miss local impacts: pumping from aquifers in deserts or water‑poor towns can lower water tables, dry up wells, and change water quality (more sediment, salt intrusion).
  • Several examples are cited (U.S., Mexico) where industrial users or data centers have strained local supplies or triggered political conflict.
  • Some note that siting near abundant surface water or wet climates—and tracking “water use effectiveness” including power generation—matters more than global totals.

Transparency, PR, and green marketing

  • Some see secrecy as competitive (water ≈ power ≈ compute) while others think it’s mainly to avoid a PR disaster.
  • There is broader criticism of “eco-friendly” advertising and ESG posturing driven by investors, contrasted with behind-the-scenes lobbying for cheap water and tax breaks.
  • A few view the media focus on water as manufactured scare‑mongering that conveniently distracts from more serious issues like energy use and AI ethics.

Alternatives and mitigation

  • Suggestions include moving to zero‑water or low‑water cooling, hybrid wet/dry systems, using waste heat for district heating, and preferring regions where water is plentiful.
  • Others note thermodynamic limits: low chip temperatures make electricity recovery inefficient; any move away from evaporative cooling trades water for higher energy demand.

Canada Set to Side with China on EVs

Why Canada Had 100% EV Tariffs / Alignment with the US

  • Several commenters say Canada’s auto sector has long been tightly integrated with the US (Auto Pact, NAFTA/USMCA), with parts and vehicles crossing the border repeatedly and 1 in 10 US cars once made in Canada.
  • Tariffs were framed as:
    • Protection of ~hundreds of thousands of Canadian auto-related jobs, especially in Ontario and Quebec.
    • Alignment with US industrial and security policy; one comment cites reporting that Canada’s 100% tariffs followed direct US “encouragement.”
  • Others argue Canada “has no independent EV strategy” and simply followed US policy because there were no domestic EV makers.

Shifting Dynamics: Trump, Biden, and De‑integration

  • Multiple posts claim Trump-era policies “blew up” the integrated North American auto system; examples include production moving from Canada to US plants.
  • Some see the US as actively trying to dismantle Canada’s auto sector while shielding its own, forcing Canada to reconsider and potentially pivot toward China or Europe.

Pros and Cons of Letting in Chinese EVs

  • Pro-access side:
    • Chinese EVs are cheaper and technically competitive; tariffs are seen as “artificial barriers” blocking mass EV adoption.
    • The gas-car industry is “dying anyway,” so Canada might as well trade EV access for better treatment of canola/pork exports.
    • Some suggest joint ventures or local plants by Chinese firms as a compromise.
  • Protectionist side:
    • Fear of Chinese overcapacity “dumping” destroying what remains of Canadian auto manufacturing and hollowing out mid-sized industrial cities.
    • Once manufacturing is gone, Canada becomes a pure resource exporter with social decay in former factory towns.

National Security and Economic Dependence

  • One camp: deep dependence on China is labeled a “massive national security threat” (dumping, IP theft, political influence operations).
  • Others counter:
    • Dependence on the US is already destabilizing, given recent coercive trade behavior.
    • As a small country, Canada must be dependent on large partners; diversification (including China and Europe) is seen as rational.
    • Some stress that Western elites, not China, offshored manufacturing and should be blamed.

EV Policy, Climate, and Cold Weather

  • Several note Canada has an EV sales mandate and has subsidized EV/battery plants, but critics call the mandate “toothless” and say the domestic industry drags its feet and prices EVs as luxury products.
  • Oil & gas interests and right-leaning media are accused of running anti-EV disinformation.
  • A side debate covers EV viability in Canadian winters:
    • One commenter claims EVs “can’t function” at –40°C; others rebut this as exaggeration, noting such temperatures are rare where most Canadians live, that Chinese and European markets also face cold climates, and that cold primarily affects efficiency, not operability.

Domestic Politics and Regional Tensions

  • Ontario’s auto sector and the Prairies’ resource exports (oil, gas, canola, potash) are portrayed as being pulled in opposite directions by US and Chinese tariffs.
  • Some see Canada trapped: protect auto and lose agricultural markets, or open to Chinese EVs and sacrifice what’s left of auto.
  • There is pessimism about Canada’s ability to create its own competitive EV maker given its small domestic market and US hostility to Canadian auto exports.

Tariffs, Strategy, and Future Scenarios

  • Several argue a 100% tariff is clearly political and indefensible economically; they suggest EU-style mid-level tariffs that roughly offset Chinese subsidies.
  • Some expect Canada will ultimately cut a deal either with the US (keeping high tariffs) or with China (lowering tariffs in exchange for agricultural concessions or local production).
  • A few participants emphasize that maintaining any domestic auto manufacturing capacity is strategically important and shouldn’t be abandoned lightly, even if legacy gas-vehicle plants are doomed.

Perceptions of China–Canada Relations

  • One commenter notes China’s generally positive popular image of Canada (historic figures, cultural touchpoints) and expresses confusion about how the relationship became hostile.
  • Others stress that whatever cultural goodwill exists, the current dynamic is now dominated by hard trade, industrial, and security calculations on all sides.

You are how you act

Agency, Feelings, and Training Your Responses

  • Several commenters dispute the claim that you can “always decide what to do next,” noting emotions and impulses often override conscious choice.
  • Others argue that noticing emotional states and training yourself to pause is a skill: reflection, practice, and techniques like meditation can gradually weaken impulsive control.
  • A caveat is raised: over‑suppressing can lead to emotional disconnection; better to acknowledge emotions in the moment, decide whether they’re useful, and let them pass.
  • Stoicism, Buddhism, and therapeutic ideas (e.g., examining thoughts that generate emotions) are cited as longstanding frameworks for this kind of training.

Free Will vs. Determinism

  • Some invoke neuroscience and classic experiments to argue free will is an illusion; “agency” is a useful fiction layered over deterministic processes.
  • Others push back: even if we’re “finite state machines,” inputs (like being told you must choose) still change outcomes, so acting as if we have agency remains pragmatically important.
  • A few note that saying “we must pretend we choose” is internally inconsistent if no choice exists at all.

Actions, Intentions, and “Fake It Till You Make It”

  • Supporters of the article’s Franklin-style view like its focus on repeated actions shaping character and on virtue as habit rather than essence. People with autism and narcissistic traits echo that “doing the right thing” despite inner resistance can still build a good life and protect others.
  • Critics say this ignores intentions and moral psychology: many traditions (Aristotle, religious ethics, etc.) treat motive and act as a single moral unit. Purely behaviorist views risk absolving well‑intentioned but harmful actions, or validating fraud.
  • “Fake it till you make it” draws heavy skepticism: repeated deception mainly turns you into a liar, especially in startup/“hustle” contexts. Others defend a narrow use for combating imposter syndrome or building small virtues.

Authenticity, Masks, and Identity

  • Some argue the “mask becomes the face”: sustained outward behavior can reshape inner dispositions, for better or worse.
  • Others worry this endorses inauthentic, performative selves in service of usefulness and social reward, deepening modern authenticity problems.

Body, Mood, and Limits of Willpower

  • Commenters stress that mood and behavior are strongly influenced by physical health (sleep, gut, etc.). Willpower is finite; trying to “will” yourself out of a neglected body is unreliable.
  • A suggested synthesis: mind intentionally cares for body; body in turn supports mind, forming a feedback loop.

Moral “Scorekeeping” and Good Deed Math

  • The article’s Franklin framing is contrasted with “good deed math”: doing some good to justify unrelated harms.
  • Some say the piece underplays this danger and veers toward “ends justify the means” entrepreneurialism, where success is retroactively taken as evidence of goodness.

Critiques of the Philosophical Framing

  • Multiple commenters see the Rousseau vs. Franklin dichotomy as a caricature: Rousseau is more nuanced than “pure inner self,” and many traditions (including American religious views) aren’t even mentioned.
  • Others note that defining “the modern American self” through just two Enlightenment figures is historically and philosophically shallow.

Author’s Credibility and Meta/Facebook Ethics

  • A large subthread attacks the author’s role at Meta: past internal memos prioritizing growth despite harms, addictive newsfeed design, and cooperation with military/“lethality” efforts are cited as evidence he embodies the very moral problems he’s now theorizing about.
  • Meta’s content moderation and censorship (especially around Israel/Palestine and hate speech) are criticized as inconsistent and politically skewed.
  • Some see the essay as self‑justification or culture‑shaping message to employees: “don’t overthink, just build,” conveniently decoupling moral intent from large‑scale consequences.

HN Meta-Discussion

  • Several commenters call the piece shallow “pseudo‑intellectualism” and lament that such think‑pieces get upvoted over more technically substantial or hard‑won content.

Microsoft needs to open up more about its OpenAI dealings

OpenAI’s Economics and Business Model

  • Commenters note OpenAI has never been profitable and suggest losses are enormous; some predict it may never reach profitability and could ultimately be absorbed by Microsoft or crash the broader AI market.
  • Skepticism that ads or “erotic” content will rescue the business: ad markets are already dominated by highly optimized incumbents, and it’s unclear ChatGPT data will translate into a strong ad product.
  • Some see erotic/romantic chat as a potentially huge revenue source (citing existing “sexy chatbot” demand and porn’s historic role in monetizing new tech), but others worry about revenge porn, deepfakes, minors, and card processors cutting them off.
  • There’s concern OpenAI still lacks a coherent business model, with jokes about “ask the AGI for a business plan.”

Commoditization and Competitive Pressure

  • OpenAI’s pricing is seen as trapped: raise prices and users switch to improving cheap/open models; keep prices low and losses continue.
  • Several argue pure-LLM companies (OpenAI, Anthropic) are structurally weaker than platforms (Microsoft, Google, Meta) that can bundle LLMs into existing products.

Microsoft’s Strategic Rationale

  • Many think Microsoft’s real win is defensive/strategic: integrating GPT into Office, Windows, Azure, etc., to preserve and enhance its core franchises and prevent churn.
  • For a company with hundreds of billions in revenue, a multi‑billion loss on OpenAI is framed by some as “only money” and effectively R&D spend.
  • Others counter that if the numbers were good, Microsoft would be showcasing them instead of burying them and using vague “Copilot” metrics.

Accounting, Disclosure, and “Enron Vibes”

  • Debate centers on whether Microsoft should treat OpenAI as a related party and provide detailed disclosures of transactions (cloud credits, revenue sharing).
  • Some posters argue the equity-method stake should trigger related‑party disclosure; others insist under US GAAP it need not be presented that way.
  • The opacity, special-purpose vehicles for datacenters, and large equity-method losses remind some of past accounting scandals, even if they stop short of calling this fraud.
  • There is pushback that this is normal long‑term investment behavior, analogous to early Amazon/Google, and that critics are overreacting.

AI Bubble, Systemic Risk, and Hype

  • Mixed views on whether the AI boom is a classic bubble:
    • One side: “AI bubble is different” and less poppable because megacorps, not retail, hold most risk.
    • Other side: dot‑com is cited as precedent—technology can be transformative while prices still massively overshoot and later crash.
  • Concern that if OpenAI collapses, funding could dry up for much of the AI sector.
  • Commenters see parallels to crypto: same people, same hype dynamics, but with tech that is genuinely useful and simultaneously over‑ and under‑hyped.

How the Mayans were able to accurately predict solar eclipses for centuries

Living Maya and Indigenous Continuity

  • Multiple comments stress that “the Maya” are not extinct: millions still speak Mayan languages (e.g., Kaqchikel) in Guatemala, Mexico, and even US diasporas.
  • Several people note how schooling (especially in the US) creates an impression that Indigenous peoples mostly “disappeared,” when many nations remain populous and culturally active.
  • Examples like the Mapuche and Comanche are cited as groups that resisted conquest well into the 19th century.

Colonialism, Native American History, and Framing

  • Extended debate over how history is taught:
    • One side emphasizes genocidal US policies (bison extermination, forced removals, residential schools, forced sterilizations) and how Native resistance and later wars are underplayed in curricula.
    • Others highlight pre‑existing intertribal warfare, argue that “Native Americans” is a colonial catch-all for many distinct polities, and resist a simple “people A destroyed people B” narrative.
  • Disagreement over responsibility and scale:
    • Some argue European disease and settler colonialism clearly account for the majority of the demographic collapse.
    • Others stress that internal declines and conflicts predated or paralleled colonial expansion, and warn against ignoring that complexity.
  • Distinction drawn between “traditional” colonialism (indigenous labor exploited) and settler colonialism (indigenous people treated as obstacles to removal).

Destruction and Survival of Knowledge

  • Discussion of Spanish destruction of Maya codices: accounts describe systematic burning of libraries as “idolatrous.”
  • Some argue this was the broader Spanish system at work; others stress it was specific clergy, noting at least one organizer was recalled for trial but later absolved and promoted.
  • Parallel interest in Incan quipu as a surviving, knot-based record system that may encode not just accounting but histories and laws, and how modern techniques might eventually decode more.

Maya Technology, Culture, and Calendars

  • Pushback against claims that Maya were “backward”: they lacked practical wheeled transport largely because of terrain and lack of draft animals, not ignorance of the wheel.
  • Lidar and archaeology show extensive infrastructure and urbanism across Mesoamerica.
  • Clarifications that Aztec and Maya are distinct, though both practiced some forms of human sacrifice.
  • Detailed explanation of the 260‑day ritual calendar:
    • Possible roots in gestation length, solar zenith passages, and numerology (20×13 with cultural significance).
    • Coexisted with a 365‑day solar cycle; the 260‑day cycle was primarily ritual/divinatory.
  • Brief skepticism about retrospective mathematical models of eclipse prediction (“wet streets cause rain”), but no deep technical counteranalysis.
  • A closing question highlights that precise eclipse prediction can arise from long empirical records without a heliocentric model, which commenters implicitly accept.

Tags to make HTML work like you expect

HTML boilerplate, Open Graph, and meta tags

  • Several commenters reference HTML5 Boilerplate as their go‑to starter, noting it even includes Facebook’s Open Graph (og:*) tags.
  • Debate over Open Graph: some see it as “proprietary Facebook cruft,” others counter that many successful standards began as company inventions and OGP is widely used despite a poor, effectively abandoned spec.
  • The article’s own minified HTML is noted as technically invalid (e.g., <!doctypehtml>), exploiting parsing leniency vs. authoring rules.

Optional tags, strictness, and XHTML nostalgia

  • Multiple comments point out that <html>, <head>, and <body> start/end tags are optional and that HTML auto‑closes many elements.
  • Some enjoy “minimal valid HTML” and omitting closing tags; others find this shoddy and prefer explicit closures for readability and error‑proofing.
  • This evolves into a long XHTML vs. HTML5 discussion:
    • Pro‑XHTML side: stricter parsing would have simplified engines, tooling, and robustness.
    • Anti‑XHTML side: strictness broke too many real‑world pages, users won’t accept “yellow screen of death,” and browsers are incentivized to render sloppy markup.

Viewport, locale quirks, and encodings

  • The ubiquitous meta viewport is dissected:
    • initial-scale may be all that’s needed; width=device-width is called cargo cult.
    • The spec’s use of locale‑dependent number parsing (strtod) could misparse decimals like 1.5 under some locales.
  • Some lament that mobile‑driven viewport hacks are permanent baggage.
  • There is frustration that HTML still doesn’t hard‑default to UTF‑8, forcing meta charset boilerplate and occasional encoding bugs.

DOCTYPE, quirks mode, and HN’s UI

  • Explanation that <!DOCTYPE html> (case‑insensitive) is required for standards mode; without it pages fall into quirks mode.
  • HN and paulgraham.com lack a DOCTYPE, so they render in quirks mode; this breaks some modern CSS selectors and scripts.
  • A large subthread debates HN’s very small font size and narrow content width:
    • Some praise high information density and dislike modern “big text with huge whitespace.”
    • Others find HN unreadably tiny on high‑DPI/4K setups and argue it should respect browser font settings and use relative units (rem).
    • Users propose browser zoom, user styles, and extensions as workarounds.

lang attribute usefulness and values

  • The article’s lang="en" recommendation prompts debate:
    • Supporters say lang helps screen readers choose voice/accents, improves spell‑check, hyphenation, indexing, and translation.
    • Skeptics argue language detection is “trivial” and lang adds little; others push back, noting detection isn’t perfect, especially on mixed‑language pages.
  • Discussion over en vs en-US vs “international English” variants; some want finer distinctions for locales, units, and idioms.
  • Mixed‑language content: suggestion to tag the root <html> with site language and override with lang on inner elements (or use lang="" when unknown).

No‑build JavaScript, web components, and TypeScript

  • Several commenters favor “no‑bundler” approaches: native ES modules, web components, and minimal tooling, often without Shadow DOM.
  • Some happily write plain JS for simplicity; others insist they wouldn’t give up TypeScript but still avoid heavy bundling, relying on modern runtimes that strip types.
  • There’s criticism of complex JS build chains for simple sites and nostalgia for being able to open an HTML file directly without tooling.

Accessibility and semantics (<main>, <nav>, screen readers)

  • The joke “SPA boilerplate” (<div id="root"></div><script src="bundle.js">) prompts a reminder to include <main> so screen readers can skip chrome, and to mark navigation with <nav> or role="navigation".
  • Some share experiences testing with screen readers:
    • Navigation should appear early in document/tab order; “skip to content” links are recommended.
    • Real testing is hard because behavior varies across OS / browser / screen‑reader combinations and input devices.

CSS defaults and small best practices

  • Suggestions to pair HTML boilerplate with CSS normalization or minimal resets (e.g., Normalize.css, custom small resets).
  • Common patterns: *, *:before, *:after { box-sizing: border-box; } and fixing monospace font sizing with code, pre, tt, kbd, samp { font-family: monospace, monospace; }.
  • meta name="color-scheme" content="light dark" is recommended for automatic dark‑mode friendliness.

Is sharing basics in 2025 still useful?

  • One commenter questions whether such elementary HTML tips are worth posting now.
  • Many others strongly defend it: knowledge is unevenly distributed; people are always learning; basic, explicit write‑ups are valuable even for veterans who’ve been cargo‑culting boilerplate for years.

Rust cross-platform GPUI components

Perceived impact on Rust UI landscape

  • Many see this as one of the most complete Rust UI component sets so far, rivaling or surpassing popular crates (iced, egui, dioxus, slint) in component breadth.
  • The showcase/gallery and the Longbridge desktop app are praised as “real app” quality, smooth, and Electron-beating in responsiveness.
  • Some note that GPUI itself is battle‑tested via the Zed editor and Longbridge Pro, implying far more real-world usage than most Rust UI stacks, even if this specific component library is new.

“Enterprise‑ready” and real‑world Rust GUI experience

  • Several people report building complex, polished desktop apps with iced or egui (including trading apps, CAD‑like scientific tools, and internal “enterprise” tools).
  • There’s disagreement on what “enterprise‑ready” means:
    – For some, it’s “good enough that customers don’t complain.”
    – For others, it implies long‑term maintainability, team development, and shrink‑wrapped product polish.
  • Iced and egui are generally seen as capable but often require “elbow grease” (custom widgets, themes, Elm-style architecture) to reach high polish.

Dependencies, build times, and technical tricks

  • The ~900‑crate dependency graph alarms some; concerns center on compile times and developer experience.
  • Others counter that incremental builds are fast on modern hardware and describe techniques to mitigate costs:
    • Precompiled “core runtime” in a dynamic library.
    • Use of faster linkers (lld/mold) and tools like Dioxus Subsecond for subsecond hot‑patching.
  • Binary sizes of ~10–15 MB for full‑feature Rust GUIs are reported as typical and tunable down with size‑oriented builds.

“Native” vs web, platform integration, and theming

  • GPUI is “native” in the sense of non‑web, GPU‑rendered UI (Metal/DirectX/Vulkan), not in the sense of using OS widgets.
  • This raises usual tradeoffs:
    – Pro: performance, consistent look across platforms, richer custom design.
    – Con: must reimplement things like file pickers, menus, and system chrome, or delegate to GTK/Qt/portals on Linux.
  • Some argue native file dialogs and minimal OS integration are still strongly desirable; others note that in 2025 many mainstream apps already ship custom chrome and styling.

Accessibility concerns

  • Multiple commenters say accessibility is their first question for any new UI toolkit.
  • GPUI’s docs mention ARIA‑style accessibility, and accessibility is on its roadmap, but Zed is currently opaque to screen readers, so expectations are cautious.
  • Some contrast this with toolkits explicitly prioritizing accessibility (Slint, Qt, possibly future Iced).

Comparisons to other ecosystems (Qt, Slint, game engines)

  • The comparison table is criticized as biased or inaccurate regarding Qt (licensing, size, themeability, features like syntax highlighting).
  • There’s broader discussion about Rust GUI vs mature C++ stacks (Qt, VCL/LCL). Many feel Rust is still far from that level of breadth and tooling (especially visual designers).
  • In game dev, Fyrox vs Bevy becomes a proxy debate: hype and ECS enthusiasm vs maturity, real shipped games, and iteration ergonomics in Rust.

The last European train that travels by sea

Nostalgia and history of train ferries

  • Many commenters find the train-ferry combination a “delightful artefact” and lament its disappearance even if bridges/tunnels are faster and more efficient.
  • Several reminisce about historic routes: Germany–Denmark and Denmark–Sweden links, Berlin–Malmö, and Cold War-era trains that crossed the Baltic or East Germany via ferries.
  • Some warn against dismantling backup infrastructure, citing a Danish bridge collision that temporarily split the rail network and required improvised ferry-based rerouting.

Is this really the last sea-going train?

  • Early in the thread, people point to the former Denmark–Germany ferry as a counterexample, but others note it stopped carrying trains in 2019.
  • Commenters clarify the article already notes those closures and that the Sicilian service is now the last passenger train ferry; freight-only train ferries still exist (e.g., Rostock–Trelleborg).

Messina bridge: politics, engineering, and corruption concerns

  • The planned “mega bridge” is described as geologically and seismically challenging: deep water, strong currents, earthquakes, and a record 3.3 km main suspension span with pylons ~400 m tall.
  • Some argue a tunnel would be technically easier, but political hubris keeps the single-span bridge vision alive.
  • Locals report the project has been used as a political football for decades:
    • Left-wing critics focus on environmental risks, but the current ferry operator is alleged to be a mafia-linked, highly polluting monopoly.
    • Right-wing proponents are accused of favoring an overblown, corruption‑prone design to siphon funds before eventual cancellation.
  • Debate arises over whether Sicily’s economic importance justifies the cost; some see the bridge as a vital development investment, others as risky spending in a corrupt, mismanaged region.

Slow travel vs “anti-modernity”

  • One strand of discussion objects to romanticizing a 20-hour trip as “lyrical beauty,” calling it out-of-touch with most people’s need for speed and time with family.
  • Others counter that:
    • Night trains can be time-efficient (sleep while traveling, arrive early) and ecologically preferable to flying.
    • Not everyone wants maximum speed; some value the journey, scenery, and time offline.
  • Tension surfaces between those who see slow travel praise as “anti-modern” and those who feel shamed for preferring high-speed rail.

Experiences on the Sicily night train

  • Several riders share mixed experiences:
    • Magic moments: going to bed in northern Italy and waking up by the sea near Messina or Palermo; the sensory strangeness of being in a sleeper car that suddenly “rocks” on a ferry.
    • Practical issues: old rolling stock, rough ride, maintenance problems (including a mid‑night evacuation to another car), minimal or no catering, and delays.
    • Security concerns: one commenter reports being robbed twice between Rome and Messina, contrasting this with feeling safe in smaller Sicilian towns.
  • Some note it can be faster to leave the train before the ferry and board a regular passenger ferry instead, then catch onward trains in Sicily.

Why carry the entire train on the ferry?

  • Multiple commenters explain the logic:
    • Avoid waking passengers in the middle of the night to disembark with luggage, board a ferry, then reboard a new train.
    • Maintain a seamless overnight journey: Milan → Sicily with a single seat/berth and no intermediate handling of baggage.
    • For time‑sensitive passengers, one integrated crossing is faster than duplicating boarding and disembarking steps.
  • Alternative ideas (separate trains on each side, pure passenger ferries) are criticized as adding hassle and delay, especially given the size of Sicily and long onward legs.

Big infrastructure projects and recurring patterns

  • The Messina bridge is compared to other polarizing projects: HS2 in the UK, the Fehmarn Belt tunnel, Brenner Base Tunnel, and various troubled bridges/tram systems.
  • Common themes: huge cost, environmental objections, local opposition to construction impacts, and national‑level mismanagement or delay—especially attributed to German and Italian rail infrastructure politics.
  • Others point out counterexamples where controversial links (e.g., island bridges) later became widely appreciated for improving everyday life.

Ferries and “offline” travel more broadly

  • A parallel thread celebrates long ferries and overland trips (Iceland, North Atlantic, walking routes like the Camino, US long-distance trains).
  • Many describe them as rare opportunities to disconnect from the internet, read, talk to fellow travelers, and experience a slower, more intentional kind of travel that becomes part of the trip’s core memory.

What happened to running what you wanted on your own machine?

Linux and “just run your own OS”

  • Many reply “Linux” as the one-word answer: if PCs can still boot ISOs, you can still run what you want.
  • Others counter this misses reality: key software (banks, ID apps, some games) may simply stop supporting Linux or non‑blessed platforms.
  • On phones, mainline Linux is technically possible but runs poorly (drivers, power management, app UX), so “just install Linux” is not a mainstream fix.

Security, convenience, and walled gardens

  • A big faction argues lockdown is a rational response to mass users who “just want it to work” and can’t manage malware risk; they like having at least one very locked‑down device (often their phone).
  • Opponents say “security” is a fig leaf for DRM, anti‑piracy, monetization, and vendor lock‑in, especially given app‑store malware and lack of true vetting.
  • Several suggest proper sandboxing / capability security would let users run arbitrary code safely instead of banning it.

Trusted computing, TPM, and remote attestation

  • Many see TPM, secure boot, and device/web attestation as the real long‑term threat: once major sites and apps require attested hardware, OS choice becomes moot.
  • Examples raised: Android Play Integrity, potential Web Environment Integrity, Windows 11 requirements, and future banking / age‑verification flows tied to specific hardware+OS stacks.
  • Some note attestation is technically robust (keys fused into secure elements), so spoofing is hard; others argue history suggests keys and vendors will still be compromised.

Smartphones, ROMs, and bootloader locking

  • Alternative ROMs (LineageOS, GrapheneOS) face tightening bootloader locks, OEM unlock keys, and disappearing device trees.
  • Even when you can flash, remote attestation lets apps refuse to run on unapproved ROMs; this is already happening with some brand apps.
  • People foresee a two‑phone world: one locked device for “official” apps, another open one for everything else.

Banking, government services, and mandatory “trusted” devices

  • Multiple anecdotes from Europe/Canada: state ID, taxes, healthcare, public transport and banking increasingly require a specific mobile auth app that in turn requires Google/Apple integrity checks.
  • Paper or non‑phone alternatives still exist but are shrinking and inconvenient; concern that phone‑free life is becoming practically impossible.
  • This concentration of essential services on foreign, corporately controlled platforms is seen as a geopolitical risk.

Passkeys, app stores, and future gatekeeping

  • Passkeys are criticized for embedding client identification and attestation, enabling sites to ban non‑blessed authenticators and lock credentials into specific ecosystems.
  • App stores, notarization (macOS), and store‑only distribution on mobile are viewed as further steps toward “panopticon computing” where unsanctioned code and anonymous developers simply can’t participate.

Risk to general‑purpose computing and open source

  • Several fear a slow “death by a thousand cuts” of general‑purpose computing: TPM, DRM, attestation, age‑gating, and regulation (e.g. EU CRA, “Know Your Developer”) cumulatively marginalize hobbyist and open‑source software.
  • Others are cautiously optimistic that PCs with open boot paths and Linux will remain, but concede that without political and regulatory pushback, market forces alone won’t preserve the ability to truly run whatever you want.

This World of Ours (2014) [pdf]

Appreciation and style of the essay

  • Many commenters love this and other essays by the same author (“The Slow Winter”, “The Night Watch”), sharing stories of dramatic readings that left rooms in stitches.
  • Others find the style “word salad” or dated, arguing that what once felt fresh internet humor now feels derivative.
  • Despite style criticism, even detractors concede there are sharp insights about security culture embedded in the comedy.

Mossad threat model and real‑world security

  • The “Mossad vs not‑Mossad” framing is heavily debated.
    • Supporters see it as a useful way to puncture overcomplicated academic models and remind people that truly elite adversaries will just bypass crypto.
    • Critics call it a “false dichotomy” that ignores nuanced threat models (activists, small orgs, mass surveillance) and may encourage fatalism (“if it’s hopeless against Mossad, why bother at all”).
  • Several point out that state agencies are fallible (intelligence failures, bureaucratic variance, cost/benefit constraints), and that “Mossad as omnipotent” is more cultural myth than reality.
  • Others emphasize a third category: NSA‑like actors who want to surveil everyone cheaply, not assassinate specific people.

Everyday vs state‑level security practices

  • One recurring theme: “you don’t have to be unhackable, just not worth burning a novel capability on.”
  • Some advocate “gray man” behavior—staying unremarkable so powerful entities don’t invest serious resources in you—while others argue this is morally dubious or impossible in war zones or under tyranny.
  • There’s broad agreement that incremental practices (password managers, MFA, full‑disk encryption) matter a lot against common threats, even if they won’t stop a top-tier agency and even if perfect OPSEC is unattainable.

Hardware, supply chain, and PKI

  • Heated discussion around whether foundries and CPU vendors are an underappreciated attack surface (e.g., management engines, hardware backdoors), versus a distraction from more likely vulnerabilities.
  • Some argue owning or collectively auditing your own silicon would shrink the trust base; others counter that most people would only make themselves less secure compared to mainstream hardware.
  • On PKI, commenters echo the essay’s skepticism about “beautiful” decentralized schemes versus messy, centralized-but-working systems (Debian keys, SSH, commercial CAs).

Anonymity, Tor, and surveillance

  • Several push back on the essay’s Tor snark, stressing its life‑or‑death importance for whistleblowers, dissidents, and vulnerable groups, while acknowledging it also shelters serious crime.
  • Debate over strong anonymity:
    • Proponents envision a world where powerful agencies can’t even identify whose “phone to replace with uranium.”
    • Critics worry about astroturfing, bots, and state propaganda at scale.
  • Others highlight emerging threats like ubiquitous microphones and keyboard acoustic attacks, suggesting that even strong passwords are limited when audio can be harvested at massive scale.

Critique of academic security research

  • Commenters agree the essay accurately skewers academic tendencies:
    • Highly artificial adversary models and “proofs” that hinge on unrealistic constraints.
    • Protocols that assume perfect implementations and ignore operational realities.
    • Ideological decentralization demands from people who’ve never run large systems.
  • Some link to more formal papers making similar critiques, viewing the essay as a humorous but substantive intervention in how the field defines “security.”

Recall for Linux

Project and Satirical Elements

  • The repo is a satire of Microsoft’s Recall: the “.exe” is actually a bash script for Linux that loops, takes screenshots (via grim), runs OCR with tesseract, and dumps PNGs and logs into ~/.recall.
  • The .exe extension on a Linux script, the emojis in the code/README, the curl | bash via tinyurl installer, and the license are all played for laughs.
  • Several people initially assume it’s “AI slop” because of the style, then conclude the oddities are part of the joke—though a few still suspect it was AI-assisted.

Interest in a Real, Local “Recall”

  • Multiple commenters say they would genuinely like a Recall-like tool: a personal “exocortex” for bad memory, billing/time tracking, or “where did I see that?” searches.
  • Existing or related tools are mentioned: screenpipe, openrecall, ActivityWatch, selfspy, Dayflow, rem, rewind.ai, local logging scripts, and even OS-level deterministic replay (Eidetic OS).
  • Some note limitations on Linux (Wayland compositors not exposing capture APIs, weaker OCR tooling) but emphasize that the satirical script already works as a crude base—swap in a different screenshot tool or local AI as needed.

Privacy, Security, and Trust

  • Strong consensus that Microsoft’s Recall is problematic because of trust: long history of dark patterns, bait‑and‑switch, and changing defaults/EULAs makes people expect eventual data exfiltration or paywalled “cloud features.”
  • Many stress that who runs it matters: a transparent, open-source, local‑only implementation from a nonprofit or community org would be far more acceptable.
  • Others argue that even purely local Recall is a huge risk: malware, abusive partners/family, employers, and law enforcement gain a searchable transcript of everything on screen.
  • Comparisons are made to browser history, email logs, IRC/IM logs, and password managers: some say Recall is not fundamentally worse; others say a unified, OCR’d, time‑indexed screen archive is qualitatively more dangerous.

Views on Recall’s Usefulness

  • Supporters frame it as solving a real “where did I see that?” problem and liken today’s tools (history, bookmarks, file hygiene) to searching only by title/author instead of full content.
  • Critics say the actual need is infrequent and can be handled by better habits, note-taking, or general AI chatbots; they see continuous full-desktop capture as disproportionate and “boiling the ocean.”
  • Several emphasize that a good implementation must be local, encrypted, user‑controlled, and easy to pause, scope, or exclude sensitive content.

Windows vs. Linux and Ecosystem Frustrations

  • Recall and similar “telemetry‑heavy” features push some long‑time dual‑boot users to drop Windows entirely, citing exhaustion with having to constantly disable unwanted features.
  • Others respond that Microsoft will tolerate losing technical users as long as consumer and enterprise markets stay; some point to slow but visible governmental and organizational moves toward Linux.
  • A long subthread discusses that gaming is no longer a hard blocker for Linux due to Steam/Proton and related tooling, though kernel‑level anti‑cheat remains an issue.
  • In contrast, one commenter moves a home server to Windows because of frustrations with Ubuntu’s TPM‑unlocked full disk encryption reliability, prompting debate over BitLocker vs Linux FDE and what “secure enough” looks like.

Install Methods and Packaging Debate

  • The curl -fsSL … | bash instruction is itself a joke but triggers a serious discussion: many see this pattern as an immediate red flag (hard to audit, hard to uninstall).
  • Some argue developers are pushed into this by the lack of a single cross‑distro packaging standard; others counter that .deb/.rpm plus tools like alien or fpm already cover most users.
  • Flatpak is viewed by several as preferable to curl|bash for GUI apps, while CLI tools still have an ecosystem gap; Distrobox and Homebrew are mentioned as partial answers.
  • There’s disagreement about risk: one side emphasizes minimizing attack surface and avoiding unaudited scripts; the other claims the marginal risk over running the binary itself is low and serious curl|bash exploits are rare.

Meta and Cultural Reactions

  • Some see the satire as “naive” because it blames the concept rather than Microsoft’s implementation and rollout; others insist the concept itself—continuous total recording—is inherently disturbing, like a “big brother camera over your shoulder.”
  • There’s tension between those who want exhaustive personal data capture (screens, cameras, location) under their own control, and those who consider “you can’t leak what you don’t store” the overriding security principle.
  • Several comments highlight that even local, fully controlled logging still widens the blast radius of any compromise, yet others accept that trade‑off as the price of a richer personal memory system.